Enables the use of
Robust Header Compression (RoHC) and enters the HSGW Service ROHC
Configuration Mode where RoHC parameters are configured for the service.
Configures the local
User Datagram Protocol (UDP) port for the A10/A11 interface
IP socket.
Sets the parameters
for IP source validation. Source validation is useful if packet
spoofing is suspected or for verifying packet routing and labeling
within the network. Source validation requires the source address
of received packets to match the IP address assigned to the subscriber (either
statically or dynamically) during the session.
Mode
Exec > Global Configuration
> Context Configuration > HSGW Service Configuration
configure > context context_name > hsgw-service service_name
Entering the above
command sequence results in the following prompt:
[context_name]host_name(config-hsgw-service)#
Syntax
ip { header-compression rohc | local-port number | source-violation { clear-on-valid-packet | drop-limit num | period secs | reneg-limit num } }
default ip { header-compression rohc | local-port | source-violation { drop-limit | period | reneg-limit } }
no ip { header-compression rohc | source-violation clear-on-valid-packet }
default
Resets the keyword
to its default value.
no
header-compression
rohc : Removes the RoHC configuration from this service.
ip source-violation
clear-on-valid-packet : Disables the ability of the service
to reset the reneg-limit and drop-limit counters after receipt of
a properly addressed packet.
header-compression
rohc
Specifies that Robust
Header Compression will be applied to sessions using this service
and enters the HSGW Service RoHC Configuration Mode where RoHC parameters
are configured.
local-port number
Specifies the UDP port
number as an integer from 1 through 65535. Default: 699
source-violation { clear-on-valid-packet | drop-limit num | period secs | reneg-limit num }
clear-on-valid-packet
Configures the service
to reset the reneg-limit and drop-limit counters after receipt of
a properly addressed packet. Default: disabled
drop-limit num
Specifies the number
of allowed source violations within a detection period before forcing
a call disconnect as an integer from 1 through 1000000. If num is not specified,
the value is set to the default. Default: 10
period secs
Specifies the length
of time (in seconds) for a source violation detection period to
last; drop-limit and reneg-limit counters are decremented each time
this value is reached.
The counters are decremented
in this manner: reneg-limit counter is reduced by one (1) each time
the period value is reached until the counter is zero (0); drop-limit
counter is halved each time the period value is reached until the
counter is zero (0). If secs is not
specified, the value is set to the default.
secs is an
integer from 1 through1000000. Default: 120
reneg-limit num
Sets the number of
allowed source violations within a detection period before forcing
a PPP renegotiation. If num is not
specified, the value is set to the default.
num is an
integer from 1 through 1000000. Default: 5
Usage Guidelines
Header Compression
RoHC: Use this command to specify that sessions using this service
will have Robust Header Compression applied and configure parameters
supporting RoHC.
Entering this command
results in the following prompt:[context_name]hostname(config-ip-header-compression-rohc)#
HSGW Service RoHC Configuration
Mode commands are defined in the HSGW Service RoHC Configuration
Mode Commands chapter.
Local Port: Specify
the UDP port that should be used for communications between the
Packet Control Function (PCF) and the HSGW.
Important
|
The UDP port setting
on the PCF must match the local-port setting for the HSGW service
on the system in order for the two devices to communicate.
|
Source Violation:
This function is intended to allow the operator to configure a network
to prevent problems such as when a user gets handed back and forth
between two HSGWs a number of times during a handoff scenario.
This function operates
in the following manner:
When a subscriber packet
is received with a source address violation, the system increments
both the IP source-violation reneg-limit and drop-limit counters
and starts the timer for the IP-source violation period. Every subsequent
packet received with a bad source address during the IP-source violation
period causes the reneg-limit and drop-limit counters to increment.
For example, if reneg-limit
is set to 5, then the system allows 5 packets with a bad source address
(source violations), but on the 5th packet, it re-negotiates PPP.
If the drop-limit is
set to 10, the above process of receiving 5 source violations and renegotiating
PPP occurs only once. After the second 5 source violations, the
call is dropped. The period timer continues to count throughout
this process.
If the configured source-violation
period is exceeded at any time before the call is dropped, the reneg-limit
counter is checked. If the reneg-limit counter is greater than zero
(0), the reneg-limit is decremented by 1. If the reneg-limit counter
equals zero, the drop-limit is decremented by half.
Example
The following command
specifies a UDP port of 3950 for the HSGW service to use to communicate
with the PCF on the A10/A11 interface:ip local-port 3950
The following command
sets the drop limit to 15 and
leaves the other values at their defaults:ip source-violation drop-limit 15