Redirects subscriber
sessions to a charging service based on the transmission control
protocol/user datagram protocol packets in the downlink
(from the Mobile Node) direction (Content Service Steering).
Privilege
Security Administrator,
Administrator
Mode
Exec > Global Configuration
> Context Configuration > ACL Configuration
configure > context context_name > ip access-list acl_name
Entering the above
command sequence results in the following prompt:
[context_name]host_name(config-acl)#
Syntax
redirect css service service_name [ log ] downlink { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port | range start_source_port end_source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dest_port | range start_dest_port end_dest_port ] }
after redirect css service service_name [ log ] downlink { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port | range start_source_port end_source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dest_port | range start_dest_port end_dest_port ] }
before redirect css service service_name [ log ] downlink { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port | range start_source_port end_source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dest_port | range start_dest_port end_dest_port ] }
no redirect css service service_name [ log ] downlink { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port | range start_source_port end_source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dest_port | range start_dest_port end_dest_port ] }
after
Indicates all rule
definitions subsequent to this command are to be inserted after
the command identified by the exact options listed.
This moves the insertion
point to be immediately after the rule definition which matches
the exact options specified such that new rule definitions will
be added, in order, after the matching rule definition.
Important
|
If the options specified
do not exactly match an existing rule definition, the insertion
point does not change.
|
before
Indicates all rule
definitions subsequent to this command are to be inserted before
the command identified by the exact options listed.
This moves the insertion
point to be immediately before the rule definition which matches the
exact options specified such that new rule definitions will be added,
in order, before the matching rule definition.
Important
|
If the options specified
do not exactly match an existing rule definition, the insertion
point does not change.
|
no
Removes the rule definition
which exactly matches the options specified.
css service service_name
The name of the active
charging service to which packets are to be redirected. At the executive
mode prompt, use the show
active-charging service all command to display the names
of all configured charging services.
service_name must
be an alphanumeric string from 1 through 15 characters.
downlink
Apply this rule definition
only to packets in the downlink (from the Mobile Node) direction.
log
Default: packets are
not logged.
Indicates all packets
which match the redirect are to be logged.
tcp | udp
Specifies the redirect
is to be applied to IP based transmission control protocol or the
user datagram protocol.
source_address
The IP address(es)
from which the packet originated.
This option is used
to filter all packets from a specific IP address or a group of IP addresses.
When specifying a
group of addresses, the initial address is configured using this
option. The range can then be configured using the source_wildcard parameter.
source_wildcard
This option is used
in conjunction with the source_address option
to specify a group of addresses for which packets are to be filtered.
The mask must be entered
as a complement:
-
Zero-bits in this
parameter mean that the corresponding bits configured for the source_address parameter
must be identical.
-
One-bits in this parameter
mean that the corresponding bits configured for the source_address parameter
must be ignored.
Important
|
The mask must contain
a contiguous set of one-bits from the least significant bit (LSB). Therefore,
allowed masks are 0, 1, 3, 7, 15, 31, 63, 127, and 255. For example,
acceptable wildcards are 0.0.0.3, 0.0.0.255, and 0.0.15.255. A wildcard
of 0.0.7.15 is not acceptable
since the one-bits are not contiguous.
|
any
Specifies that the
rule definition applies to all packets.
host
Specifies that the
rule definition applies to a specific host as determined by its
IP address.
source_host_address
The IP address of
the source host to filter against expressed in IPv4 dotted-decimal notation.
dest_host_address
The IP address of
the destination host to filter against expressed in IPv4 dotted-decimal notation.
eq source_port
Specifies a single,
specific source TCP port number to be filtered.
source_port must
be configured to an integer value from 0 to 65535.
gt source_port
Specifies that all
source TCP port numbers greater than the one specified are to be filtered.
source_port must
be configured to an integer value from 0 to 65535.
lt source_port
Specifies that all
source TCP port numbers less than the one specified are to be filtered.
source_port must
be configured to an integer value from 0 to 65535.
neq source_port
Specifies that all
source TCP port numbers not equal to the one specified are to be filtered.
source_port must
be configured to an integer value from 0 to 65535.
range start_source_port end_source_port
Specifies that all
source TCP ports within a specific range are to be filtered.
start_source_port is
the initial port in the range and end_source_port is
the final port in the range.
Both start_source_port and end_source_port can
be configured to an integer value from 0 to 65535.
dest_address
The IP address(es)
to which the packet is to be sent.
This option is used
to filter all packets to a specific IP address or a group of IP addresses.
When specifying a
group of addresses, the initial address is configured using this
parameter. The range can then be configured using the dest_wildcard parameter.
dest_wildcard
This option is used
in conjunction with the dest_address option
to specify a group of addresses for which packets are to be filtered.
The mask must be entered
as a complement:
-
Zero-bits in this
parameter mean that the corresponding bits configured for the dest_address parameter
must be identical.
-
One-bits in this parameter
mean that the corresponding bits configured for the dest_address parameter
must be ignored.
Important
|
The mask must contain
a contiguous set of one-bits from the least significant bit (LSB). Therefore,
allowed masks are 0, 1, 3, 7, 15, 31, 63, 127, and 255. For example,
acceptable wildcards are 0.0.0.3, 0.0.0.255, and 0.0.15.255. A wildcard
of 0.0.7.15 is not acceptable
since the one-bits are not contiguous.
|
eq dest_port
Specifies a single,
specific destination TCP port number to be filtered.
dest_port must
be configured to an integer value from 0 to 65535.
gt dest_port
Specifies that all
destination TCP port numbers greater than the one specified are
to be filtered.
dest_port must
be configured to an integer value from 0 to 65535.
lt dest_port
Specifies that all
destination TCP port numbers less than the one specified are to
be filtered.
dest_port must
be configured to an integer value from 0 to 65535.
neq dest_port
Specifies that all
destination TCP port numbers not equal to the one specified are
to be filtered.
dest_port must
be configured to an integer value from 0 to 65535.
range start_dest_port end_dest_port
Specifies that all
destination TCP ports within a specific range are to be filtered.
start_dest_port is
the initial port in the range and end_dest_port is
the final port in the range.
Both start_dest_port and end_dest_port can
be configured to an integer value from 0 to 65535.
Usage Guidelines
Block IP packets when
the source and destination are of interest but for only a limited
set of ports.
Important
|
The maximum number
of rules that can be configured per ACL varies depending on how
the ACL is to be used. For more information, refer to the Engineering Rules appendix
in the System Administration
Guide.
|
Important
|
Also note that "redirect" rule
definitions are ignored for ACLs applied to specific subscribers or
all subscribers facilitated by a specific context.
|
Example
The following command
defines a rule definition that redirects packets to the charging service
named chgsvc1 ,
and UDP packets coming from any host are matched: redirect css service chgsvc1 downlink udp any
The following sets
the insertion point before the rule definition above: before redirect css service chgsvc1 downlink udp any
The following command
sets the insertion point after the first rule definition above: after redirect css service chgsvc1 downlink udp any
The following deletes
the rule definition above: no redirect css service chgsvc1 downlink udp any