Traffic Treatment User Guide. Published. 2021-04-18 ... abnormal script exit or from a manual script exit. debug. Prints debug messages on console. 248 ...
Junos® OS Subscriber-Aware and Application-Aware Traffic Treatment User Guide Published 2021-04-18 ii Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Junos® OS Subscriber-Aware and Application-Aware Traffic Treatment User Guide Copyright © 2021 Juniper Networks, Inc. All rights reserved. The information in this document is current as of the date on the title page. YEAR 2000 NOTICE Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through the year 2038. However, the NTP application is known to have some difficulty in the year 2036. END USER LICENSE AGREEMENT The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks software. Use of such software is subject to the terms and conditions of the End User License Agreement ("EULA") posted at https://support.juniper.net/support/eula/. By downloading, installing or using such software, you agree to the terms and conditions of that EULA. iii Table of Contents About This Guide | xxiv 1 Subscriber-Aware and Application-Aware Traffic Treatment Overview Subscriber-Aware and Application-Aware Traffic Treatment Overview | 2 Subscriber-Aware and Application-Aware Traffic Treatment Overview | 2 Configuring Subscriber-Aware and Application-Aware Traffic Treatment Overview | 6 2 Applying Subscriber-Aware and Application-Aware Policies and Services Configuring the Service PIC, Session PIC, and TDF Gateway | 9 TDF Gateway Service PICs and Session PICs for Subscriber-Aware Traffic Treatment | 9 Configuring Service PICs and Session PICs Overview | 12 Preconfigured Groups for Service PICs and for Session PICs Overview | 13 Configuring a Services Interface for a Session PIC or Service PIC | 15 Configuring a TDF Gateway | 16 Making Predefined Groups Available for Session PIC and Service PIC Configuration | 17 Configuring Service PICs | 18 Configuring Session PICs | 19 Configuring Tracing for TDF Gateway | 20 Configuring Application Identification | 23 Application Identification Overview | 23 Downloading and Installing Predefined Junos OS Application Signature Packages | 24 Configuring Custom Application Signatures | 26 Uninstalling a Predefined Junos OS Application Signature Package | 33 Configuring HTTP Header Enrichment | 34 Junos Web Aware HTTP Header Enrichment Overview | 34 HTTP Content Manager (HCM) | 35 iv Configuring HTTP Header Enrichment Overview | 41 Configuring Tag Rules | 42 Configuring HCM Profiles and Assigning Tag Rules | 49 Configuring Policy and Charging Enforcement | 51 Understanding Junos Subscriber Aware Policy and Charging Enforcement Function (PCEF) | 52 Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment | 56 Understanding How Subscriber-Aware Policy and Charging Control Rules Are Provisioned Dynamically by a PCRF | 58 Understanding How Subscriber-Aware Policy and Charging Control Rules Are Provisioned Statically | 63 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 Understanding PCEF Profiles | 70 Understanding Network Elements | 71 Understanding AAA Profiles | 73 Understanding Static Time-of-Day PCC Rule Activation and Deactivation | 74 Understanding Usage Monitoring for TDF Subscribers | 74 Configuring Dynamic Policy Control by PCRF | 76 Configuring Static Policy Control | 77 Configuring Policy Control by RADIUS Servers | 78 Configuring Service Data Flow Filters | 79 Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware | 83 Configuring Policy and Charging Control Rules | 86 Configuring a Policy and Charging Control Rulebase | 89 Configuring RADIUS Servers | 91 Configuring RADIUS Network Elements | 94 Configuring an AAA Profile | 96 v Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Dynamic Policies | 98 Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Static Policies | 100 Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Policies That a RADIUS Server Controls | 101 Configuration of Static Time-of-Day PCC Rule Activation and Deactivation Overview | 102 Configuring the NTP Server | 103 Configuring Static Time-of-Day PCC Rule Activation and Deactivation in a Junos OS Subscriber Aware PCEF Profile | 103 Configuring TDF Subscriber Usage Monitoring for Traffic That Matches Predefined PCC Rules | 105 Configuring TDF Subscribers | 106 IP-Based and IFL-Based TDF Subscribers Overview | 107 IP-Based Subscriber Setup Overview | 107 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 Understanding Source IP Filtering with Address Pools in TDF Domains for IP-Based Subscribers | 110 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 Snooping RADIUS Accounting Requests for IP-Based Subscribers Overview | 114 Understanding IFL-Based Subscriber Setup | 115 Understanding the Definition of a Set of IFL-Based Subscriber Properties with a TDF Domain | 116 Configuring IP-Based TDF Subscriber Setup When MX Series Router Is a RADIUS Server | 117 Configuring IP-Based TDF Subscriber Setup When Accounting Requests Are Snooped | 118 Configuring Address Pools for Source-IP Filtering of IP-Based Subscribers | 119 Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Configuring the TDF Domain Name and AAA Parameters | 121 Configuring Address Filtering | 124 Configuring Subscriber Services and Policies | 125 Configuring Access Interfaces | 125 vi Configuring Session Controls | 126 Configuring Default Policy | 126 Configuring RADIUS Clients That Send Accounting Requests for IP-Based Subscribers | 128 Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Configuring the Term Name | 130 Configuring Match Conditions for the RADIUS Client | 131 Configuring Match Conditions for Snoop Segments | 131 Configuring Match Conditions for Predefined AVPs | 131 Configuring Match Conditions for Custom AVP Attributes | 133 Configuring the TDF Domain to Select | 135 Configuring the PCEF Profile to Select | 135 Configuring Snooping of RADIUS Accounting Requests for IP-Based Subscribers | 136 Configuring IFL-Based TDF Subscriber Setup | 139 Configuring IFL-Based TDF Subscribers and Properties with a TDF Domain | 140 Configuring the TDF Domain Name and Type | 140 Configuring IFL-Based Subscribers | 141 Configuring Address Filtering | 142 Configuring Subscriber Services and Policies | 142 Configuring Session Controls | 142 Configuring a TDF Logical Interface | 143 Configuring TDF Interface to Access Interface Associations in VRFs | 144 Configuring Services | 145 Overview of Applying Services to Subscribers | 145 Applying Services to Subscriber-Aware Traffic with a Service Set | 146 Configuring Diameter | 149 Diameter Profiles Overview | 149 Juniper Networks Diameter AVPs for Subscriber Aware Policy Control | 150 Configuring Diameter Overview | 152 Configuring Diameter Profiles | 152 vii Configuring Diameter Bindings | 154 Configuring Diameter Network Elements | 155 Configuring Diameter AVPs for Gx Applications | 156 Configuring Diameter Peers | 158 Configuring the Diameter Transport | 161 Configuring Advertisements in Diameter Messages | 162 Configuring Parameters for Diameter Applications | 162 Configuring the Origin Attributes of the Diameter Instance | 163 3 Configuring Reporting for Subscriber-Aware Data Sessions Configuring Reporting | 166 Logging and Reporting Function for Subscribers | 166 Log Dictionary for Template Types | 174 Configuring Logging and Reporting for Junos OS Subscriber Aware | 186 Configuring an LRF Profile for Subscribers | 187 Configuring the LRF Profile Name | 187 Configuring Policy-Based Logging | 188 (Optional) Configuring HTTP Transaction Logging | 188 Configuring Collectors | 188 Configuring Templates | 190 Configuring Logging and Reporting Rules | 192 Assigning an LRF Profile to Subscribers | 194 Configuring the Activation of an LRF Rule by a PCC Rule | 196 4 Modifying Subscriber-Aware Configuration Modifying Subscriber-Aware Configuration in Maintenance Mode | 200 Maintenance Mode Overview for Subscriber Aware Policy Enforcement | 200 Changing Address Attributes in the Address Pool | 202 Deleting an Address Pool | 203 Changing AMS Interface Parameters on a TDF Gateway | 205 viii Modifying a TDF Domain | 208 Modifying the TDF Interface of a TDF Domain | 210 Deleting a TDF Domain | 212 Changing a TDF Interface | 214 Deleting a TDF Interface | 216 Changing TDF Gateway Parameters with Maintenance Mode | 218 Changing PCEF Profiles, PCC Rules, PCC Rulebases, Diameter Profiles, Flow Descriptions, and PCC Action Profiles | 220 Changing PCEF Profiles, PCC Rules, PCC Rulebases, Diameter Profiles, Flow Descriptions, and PCC Action Profiles with the TDF Domain in Maintenance Mode | 221 Changing PCEF Profiles, PCC Rules, PCC Rulebases, Diameter Profiles, Flow Descriptions, and PCC Action Profiles with the TDF Gateway in Maintenance Mode | 223 Deleting a PCEF Profile | 225 Deleting a PCEF Profile with the TDF Domain in Maintenance Mode | 226 Deleting a PCEF Profile with the Gateway in Maintenance Mode | 228 Changing Static Time-of-Day Settings for PCC Rules | 231 Deleting a Services PIC | 232 Deleting a Session PIC | 234 5 Monitoring and Troubleshooting Monitoring and Troubleshooting | 239 Configuring Tracing for PCEF Operations | 239 Configuring Call-Rate Statistics Collection | 241 Using the Enterprise-Specific Utility MIB | 242 Using the Enterprise-Specific Utility MIB | 242 Populating the Enterprise-Specific Utility MIB with Information | 243 Stopping the SLAX Script with the CLI | 251 Clearing the Utility MIB | 251 Recovering from an Abnormal SLAX Script Exit or a SLAX Script Exit with the CLI | 251 6 Configuration Statements and Operational Commands Configuration Statements | 253 ix 3gpp-imsi | 262 aaa clients (TDF) | 264 aaa-policy-control (PCEF Profile) | 265 aaa-profile (PCEF Profile) | 267 access-interfaces (IFL Subscriber) | 268 access-interfaces (IP Subscriber) | 270 accounting (AAA Profile) | 271 accounting (RADIUS Client) | 273 accounting-port (RADIUS Server) | 274 accounting-secret (RADIUS Server) | 275 activation-attribute (AAA Profile) | 277 address (Diameter Peer) | 278 address (LRF Profile) | 279 address (RADIUS Clients) | 281 address (RADIUS Server) | 282 address-mapping (Application Identification) | 283 address-pools | 285 allow-dynamic-requests (RADIUS Server) | 287 alt-name (Application Identification) | 288 application (Application Identification) | 289 application-group | 292 application-groups (PCC Rules) | 293 application-identification (Application Identification) | 295 application-identification-profile (Service Set) | 299 applications (Services Application Identification) | 300 applications (Diameter) | 301 x applications (PCC Rules) | 303 attribute | 305 attributes (Diameter Gx Profiles) | 308 authentication (AAA Profile) | 309 burst-size (Default Local Policy) | 311 burst-size (TDF Domain) | 312 cac (TDF Gateway) | 314 cacheable (Application Identification) | 315 call-rate-statistics | 316 called-station-id | 318 calling-station-id | 319 chain-order (Application Identification) | 321 check-bytes (Application Identification) | 322 class | 323 client | 325 clients | 327 coa-accounting (AAA Profile) | 328 code | 330 code (AAA Profile) | 331 code (Application Identification) | 333 collector (LRF Profile) | 334 collector (LRF Rule) | 336 compatibility (Application Identification) | 337 connect-actively | 338 constant | 341 context (Application Identification) | 342 xi count (HTTP Header Enrichment) | 344 cpu (TDF Gateway) | 346 deactivation-attribute (AAA Profile) | 347 dead-criteria-retries (RADIUS Server) | 348 default-local-policy | 350 default-pool (Address Pools) | 351 description (Application Identification) | 353 destination (Application Identification) | 354 destination (LRF Profile) | 355 destination-address (HTTP Header Enrichment) | 357 destination-address-range (HTTP Header Enrichment) | 359 destination-ip-address (RADIUS Snoop Segment) | 360 destination-port (RADIUS Snoop Segment) | 362 destination-port-range (HTTP Header Enrichment) | 363 destination-ports (HTTP Header Enrichment) | 365 destination-prefix-list (HTTP Header Enrichment) | 366 diameter (Subscriber Aware Policy Control) | 368 diameter (TDF Gateway) | 370 diameter-profile (PCEF Profile) | 372 direction (Application Identification) | 373 direction (Service Data Flow Filters) | 375 disconnect-peer-timeout | 377 domain (TDF Domain Selection) | 378 domain-selection | 380 domains | 384 dynamic-policy-control | 387 xii dynamic-requests-secret (RADIUS Server) | 389 encrypt (HTTP Header Enrichment) | 390 equals | 392 exclude (Diameter Gx Profiles) | 394 external-assigned (Address Pools) | 395 family (Address Pools) | 397 family (Exclude Prefix) | 398 family (TDF Interface) | 400 flow-action | 401 flow-descriptions | 403 flows (PCC Rules) | 405 format (Unified Edge Gateways) | 407 format (LRF Profile) | 409 forwarding-class (PCC Action Profiles) | 410 firmware-revision | 412 framed-ip-address | 414 framed-ipv6-prefix | 415 from (HTTP Header Enrichment) | 417 from (PCC Rules) | 418 from (TDF Domain Selection) | 420 function (Diameter Network Element) | 424 gate-status | 425 greater-than | 427 gx-profile | 429 has-prefix (Unified Edge Gateways) | 431 has-suffix | 432 xiii hcm (HTTP Header Enrichment) | 434 hcm-profile (HTTP Header Enrichment) | 436 hcm-profile (PCC Action Profiles) | 438 host (Diameter Origin) | 439 http-log-multiple-transactions (LRF Profile) | 441 icmp-mapping (Application Identification) | 442 id-components | 443 idle-timeout | 446 ifl-subscriber | 447 immediate-accounting-response | 449 include (Diameter Gx Profiles) | 450 incoming-queue | 452 inet (TDF Subscriber Address) | 453 inet (TDF Subscriber Exclude Prefix) | 455 inet6 (TDF Subscriber Address) | 456 inet6 (TDF Subscriber Exclude Prefix) | 457 integer | 459 interface (Services PIC) | 460 interface (Session PICs) | 462 interface-service (Services Interfaces) | 464 ip-protocol-mapping (Application Identification) | 465 ip-subscriber | 467 ipv4-address (Steering Path) | 469 ipv4-mask (HTTP Header Enrichment) | 471 ipv4-or-value (HTTP Header Enrichment) | 472 ipv6-address (Steering Path) | 474 xiv ipv6-mask (HTTP Header Enrichment) | 475 ipv6-or-value (HTTP Header Enrichment) | 477 keep-existing-steering | 478 less-than | 480 local-port-range | 481 local-ports | 483 logging-rule (PCC Action Profile) | 485 lrf-profile (Service Set) | 487 matches | 489 maximum-bit-rate (Default Local Policy) | 492 maximum-bit-rate (PCC Action Profiles) | 493 maximum-bit-rate (TDF Domain) | 495 maximum-pending-reqs-limit | 497 maximum-pending-requests (Diameter) | 498 maximum-sessions (TDF Gateway) | 500 maximum-subscribers | 501 maximum-sessions-trap-percentage (TDF Gateway) | 502 member (Application Identification) | 504 memory (TDF Gateway) | 505 mif (TDF Interface) | 507 monitoring-key (PCC Action Profile) | 508 mtu (TDF Interface) | 509 nas-ip-address | 511 nat-rule-sets (Service Set) | 512 nat-rules | 514 network-element (AAA Profile) | 515 xv network-element (Diameter Base Protocol) | 516 network-element (Subscriber Aware Policy Control) | 518 network-elements (RADIUS) | 520 network (Address Pools) | 521 network (TDF Domain) | 523 no-application-system-cache | 525 no-send-to-ue | 526 order (Application Identification) | 527 order-priority (Application Identification) | 529 origin (Diameter Base Protocol) | 531 outgoing-queue | 532 over (Application Identification) | 534 packet-capture (Next Gen Services) | 536 path (Steering) | 539 pattern (Application Identification) | 540 pattern (Class Attribute) | 542 pcc-action-profile (PCC Rules) | 543 pcc-action-profiles | 545 pcc-rule | 548 pcc-rulebases (PCEF) | 550 pcc-rulebases (PCEF Profile) | 551 pcc-rules (PCEF) | 554 pcc-rules (PCEF Profile) | 556 pcc-time-of-day-profiles | 558 pcef | 560 pcef-profile (Service Set) | 563 xvi pcef-profile (TDF Domain) | 564 pcef-profile (TDF Domain Selection) | 566 peer (Diameter Base Protocol) | 568 peer (Diameter Network Element) | 569 pending-queue-watermark | 571 pending-queue-watermark-abate | 572 policy-based-logging (LRF Profile) | 574 pool (TDF Domain) | 575 port (LRF Profile) | 577 port (RADIUS Server) | 578 port-range (Application Identification) | 579 prefer-framed-ip-address (RADIUS Clients) | 581 prefer-framed-ipv6-prefix (RADIUS Clients) | 582 priority (Diameter Network Element) | 583 priority (RADIUS Network Elements) | 585 product-name | 586 profile | 587 profile (HTTP Header Enrichment) | 589 profile (LRF) | 590 profile (Services Application Identification) | 593 profile (Services PCEF) | 594 profiles (AAA) | 595 profiles (PCEF) | 597 protocol (Application Identification) | 600 protocol (Flow Descriptions) | 602 realm (Diameter Origin) | 604 xvii redirect (PCC Action Profiles) | 605 regex (Class Attribute) | 607 remote-address | 608 remote-port-range | 610 remote-ports | 612 report (LRF Rule) | 614 request-cache-timeout (RADIUS Snoop Segment) | 616 request-timeout | 617 response-cache-timeout (RADIUS Client) | 618 retry (RADIUS Server) | 620 revert-interval (RADIUS Server) | 621 routing-instance (PCC Action Profiles) | 623 rule (HTTP Header Enrichment for Tag Rule Set) | 625 rule (LRF) | 626 rule-activation-time | 628 rule-deactivation-time | 630 secret (RADIUS Client) | 632 secret (RADIUS Server) | 633 server (RADIUS Network Elements) | 634 servers (RADIUS) | 636 service-mode | 638 service-pics | 640 service-set (Subscriber-Aware) | 641 service-set (TDF Interface) | 643 session-pics | 644 session-pics (Diameter) | 645 shared-secret (RADIUS Snoop Segment) | 647 snoop-segment (TDF Domain Selection) | 649 snoop-segments (RADIUS) | 650 snoop-segments (TDF Gateway) | 652 source (Application Identification) | 653 source-address (LRF Profile) | 655 source-interface | 656 source-interface (RADIUS Server) | 657 source-interface (RADIUS Snoop Segment) | 659 source-ip-address (RADIUS Snoop Segment) | 660 static-policy-control | 661 steering | 663 string | 665 subscriber-address | 667 subscriber-awareness (Service Set Options) | 668 subscriber-aware-services | 669 subscriber-exclude-prefix | 670 subscriber-type (TDF Domain) | 672 subscription-id | 674 subscription-id-options | 675 subscription-id-type (Class Attribute) | 677 tag (HTTP Header Enrichment) | 679 tag-attribute (HTTP Header Enrichment) | 680 tag-attribute (HTTP Header Enrichment Tag Rule) | 682 tag-header (HTTP Header Enrichment) | 683 tag-operation (HTTP Header Enrichment) | 685 xviii xix tag-rule (Profiles for HTTP Header Enrichment) | 686 tag-rule (HTTP Header Enrichment) | 688 tag-rules (Service Set) | 690 tag-rule-set (HTTP Header Enrichment) | 692 tag-rule-sets (Service Set) | 693 tag-separator (HTTP Header Enrichment) | 695 tag-value (HTTP Header Enrichment) | 696 tags (Application Identification) | 697 targets | 699 tdf (Unified Edge) | 701 tdf-interface | 702 template (LRF Profile) | 704 template (LRF Rule) | 705 template-tx-interval (LRF Profile) | 707 template-type (LRF Profile) | 708 term (HTTP Header Enrichment) | 711 term (TDF Domain Selection) | 713 then (HTTP Header Enrichment) | 717 then (LRF rule) | 719 then (PCC Rules) | 720 then (TDF Domain Selection) | 722 time | 724 time-limit (LRF Rule) | 725 timeout (Diameter Network Element) | 727 timeout (RADIUS Server) | 728 traceoptions (Diameter Base Protocol) | 730 xx traceoptions (PCEF) | 732 traceoptions (TDF Gateway) | 735 trigger-type (LRF Profile) | 738 type (Application Identification) | 740 type (ICMP Mapping for Application Identification) | 741 unit (TDF Interface) | 743 url | 744 use-class (Class Attribute) | 746 user-name | 747 user-password (PCEF Profile) | 749 v4address | 750 v6address | 752 v6prefix | 753 vendor-id | 755 vendor-id (AAA Profile) | 756 vendor-support | 758 volume-limit (LRF Rule) | 759 watchdog-timeout | 760 Operational Commands | 763 clear services application-identification application-system-cache | 765 clear services application-identification statistics | 767 clear services lrf collector statistics | 769 clear services lrf statistics | 771 clear services sessions | 772 clear unified-edge tdf aaa radius client statistics | 777 clear unified-edge tdf aaa radius network-element statistics | 779 xxi clear unified-edge tdf aaa radius server statistics | 781 clear unified-edge tdf aaa radius snoop-segment statistics | 782 clear unified-edge tdf aaa statistics | 784 clear unified-edge tdf address-assignment pool | 786 clear unified-edge tdf address-assignment statistics | 788 clear unified-edge tdf call-admission-control statistics | 790 clear unified-edge tdf diameter network-element statistics | 791 clear unified-edge tdf diameter pcc-gx statistics | 793 clear unified-edge tdf diameter peer statistics | 795 clear unified-edge tdf statistics | 797 clear unified-edge tdf subscribers | 798 clear unified-edge tdf subscribers peer | 800 request interface load-balancing revert (Aggregated Multiservices) | 802 request interface load-balancing switchover (Aggregated Multiservices) | 804 request services application-identification application | 806 request services application-identification download | 808 request services application-identification download status | 809 request services application-identification group | 811 request services application-identification install | 813 request services application-identification install status | 814 request services application-identification proto-bundle-status | 816 request services application-identification uninstall | 817 request services application-identification uninstall status | 819 request unified-edge tdf call-trace clear | 820 request unified-edge tdf call-trace show | 822 request unified-edge tdf call-trace start | 826 xxii request unified-edge tdf call-trace stop | 829 show interfaces anchor-group (Aggregated Packet Forwarding Engine) | 831 show interfaces load-balancing (Aggregated Multiservices) | 836 show services application-identification application | 841 show services application-identification application-system-cache | 850 show services application-identification counter | 856 show services application-identification group | 860 show services application-identification statistics application-groups | 865 show services application-identification statistics applications | 868 show services application-identification status | 870 show services application-identification version | 873 show services ha detail | 874 show services ha statistics | 877 show services hcm statistics | 885 show services hcm pic-statistics | 888 show services lrf collector statistics | 896 show services lrf rule statistics | 898 show services lrf statistics | 901 show services lrf template | 903 show services traffic-detection-function hcm statistics | 906 show services traffic-detection-function sessions | 911 show unified-edge tdf aaa radius client statistics | 915 show unified-edge tdf aaa radius client status | 923 show unified-edge tdf aaa radius network-element statistics | 925 show unified-edge tdf aaa radius server statistics | 930 show unified-edge tdf aaa radius server status | 936 show unified-edge tdf aaa radius snoop-segment statistics | 940 show unified-edge tdf aaa statistics | 945 show unified-edge tdf address-assignment pool | 958 show unified-edge tdf address-assignment service-mode | 964 show unified-edge tdf address-assignment statistics | 967 show unified-edge tdf call-admission-control statistics | 970 show unified-edge tdf call-rate statistics | 974 show unified-edge tdf diameter network-element statistics | 978 show unified-edge tdf diameter network-element status | 981 show unified-edge tdf diameter pcc-gx statistics | 984 show unified-edge tdf diameter peer statistics | 992 show unified-edge tdf diameter peer status | 999 show unified-edge tdf domain service-mode | 1004 show unified-edge tdf domain statistics | 1007 show unified-edge tdf resource-manager clients | 1014 show unified-edge tdf service-mode | 1017 show unified-edge tdf statistics | 1020 show unified-edge tdf status | 1032 show unified-edge tdf subscribers | 1038 show unified-edge tdf system interfaces | 1059 show unified-edge tdf system interfaces service-mode | 1061 xxiii xxiv About This Guide Use this guide to configure and monitor subscriber-aware and application-aware traffic policies. This lets you identify the mobile or fixed-line subscriber associated with a data session, and enforce traffic treatment for the subscriber based on Layer 7 or Layer 3/Layer 4 application information for the session. 1 PART Subscriber-Aware and ApplicationAware Traffic Treatment Overview Subscriber-Aware and Application-Aware Traffic Treatment Overview | 2 2 CHAPTER 1 Subscriber-Aware and Application-Aware Traffic Treatment Overview IN THIS CHAPTER Subscriber-Aware and Application-Aware Traffic Treatment Overview | 2 Configuring Subscriber-Aware and Application-Aware Traffic Treatment Overview | 6 Subscriber-Aware and Application-Aware Traffic Treatment Overview IN THIS SECTION Introduction | 2 Access-Independent Subscriber Traffic Treatment | 3 Subscriber Identification Methods | 4 Application Identification | 4 Policy Control Methods | 5 Subscriber-Aware Data Session Logging and Reporting | 5 Usage Monitoring | 5 This topic contains an overview of subscriber-aware and application-aware traffic treatment. Introduction Junos Subscriber Aware identifies the mobile or fixed-line subscriber associated with a data session, and enforces traffic treatment based on policies assigned to the subscriber. This permits highly customizable differentiated services for subscribers. A subscriber policy can be based on Layer 7 application information for the IP flow (for example, YouTube) or can be based on Layer 3/Layer 4 information for 3 the IP flow (for example, the source and destination IP address). Junos Subscriber Aware resides on an MX Series router. Subscriber-aware policies can specify the following actions: · Redirecting HTTP traffic to another URL or IP address · Forwarding packets to a routing instance so that packets are directed to external service chains ( predefined sequence of services) · Setting the forwarding class · Setting the maximum bit rate · Performing HTTP header enrichment (provided by Junos Web Aware, which resides on the same MX Series router as Junos Subscriber Aware) · Setting the gating status to blocked or allowed Subscriber-aware policies can also specify the time of day that the policies are in effect. Access-Independent Subscriber Traffic Treatment Subscriber identification for both mobile access and wireline access provides a unified experience for the subscriber, regardless of the connection method. Junos Subscriber Aware resides on an MX Series router that is located between the gateway of the access network and the public network and network services, as shown in Figure 1 on page 4. Subscribers may be controlled by a broadband network gateway (BNG) in a wireline access network, by 4 a gateway GPRS support node (GGSN) in a 2G or 3G network architecture, or by a Packet Data Network Gateway (PGW) in a 4G/LTE network architecture. Figure 1: Subscriber-Aware Policy Enforcement on the MX Series Subscriber Identification Methods You can use the following methods to identify subscribers: · IP-based--Processes a RADIUS accounting start request to identify the subscriber. An IP-based subscriber session is for one unique user IP address. · IFL-based--Requires you to configure a subscriber name and specify a set of MX Series router access interfaces for the subscriber. Junos Subscriber Aware assigns all data sessions received on those interfaces to the configured subscriber. Application Identification Layer 7 application identification is provided by Junos Application Aware, which performs deep packet inspection (DPI) to determine whether the subscriber's data packets match an application signature. When an application is identified, the appropriate subscriber policy is applied to the packets. Juniper 5 Networks provides a set of predefined application signatures that you can download and that are periodically updated. You can also configure your own custom application signatures. Junos Subscriber Aware and Junos Application Aware reside on the same MX Series router, allowing policy control on a single platform. Policy Control Methods Subscriber-aware policies can be controlled dynamically by a policy and charging rules function (PCRF) server, can be activated by a RADIUS server, or can be under static control. Under dynamic control, a PCRF either sends policies to the MX Series router or activates predefined policies that you configured on the MX Series router. Dynamic policy control is provided by Junos Policy Control, which resides on the same MX Series router as Junos Subscriber Aware. Under RADIUS server control, the RADIUS server controls the activation of your predefined polices but does not send policies to the MX Series router. Under static control, your predefined policies are not controlled by a PCRF or RADIUS server. Subscriber-Aware Data Session Logging and Reporting Junos Subscriber Aware can log data for subscriber-aware data sessions and send that data in an IPFIX format to an external log collector. These logs can include subscriber information, application information, HTTP metadata, data volume, time-of-day information, and source and destination details. You can then use the external collector, which is not a Juniper Networks product, to perform analytics that provide you with insights about subscriber and application usage, enabling you to create packages and policies that increase revenue. Usage Monitoring For subscriber data sessions that are under the dynamic policy control of a PCRF, Junos Subscriber Aware can monitor the volume of traffic or amount of time the subscriber uses during a session, and send reports to the PCRF. The PCRF can use this information to adjust the policies for a subscriber. RELATED DOCUMENTATION Configuring Subscriber-Aware and Application-Aware Traffic Treatment Overview | 6 6 Configuring Subscriber-Aware and Application-Aware Traffic Treatment Overview To configure subscriber-aware and application-aware traffic treatment: 1. Configure service PICs and session PICs. See "Configuring Service PICs and Session PICs Overview " on page 12. 2. (Optional) Identify Layer 7 applications. a. Install application signature packages. See "Downloading and Installing Predefined Junos OS Application Signature Packages" on page 24. b. Configure custom application signatures. See "Configuring Custom Application Signatures" on page 26. 3. (Optional) Configure HTTP header enrichment. See "Configuring HTTP Header Enrichment Overview" on page 41. 4. Configure a policy enforcement method. · For dynamic policy control, see "Configuring Dynamic Policy Control by PCRF" on page 76. · For static policy control, see "Configuring Static Policy Control" on page 77. · For RADIUS server policy control, see "Configuring Policy Control by RADIUS Servers" on page 78. 5. Configure the policy enforcement for an IP-based subscriber. An IP-based subscriber session handles traffic for one unique user IP address. · If the MX Series router is identified as a RADIUS server for the access gateway, see "Configuring IP-Based TDF Subscriber Setup When MX Series Router Is a RADIUS Server" on page 117 · If the MX Series router is not identifed as a RADIUS server for the access gateway, see "Configuring IP-Based TDF Subscriber Setup When Accounting Requests Are Snooped" on page 118 6. Configure the policy enforcement for an IFL-based subscriber. An IFL-based subscriber session handles all the traffic received on a specific set of interfaces. See "Configuring IFL-Based TDF Subscriber Setup" on page 139. 7. Apply services to a subscriber. See "Applying Services to Subscriber-Aware Traffic with a Service Set" on page 146. 8. (Optional) If you configured dynamic policy control, configure Diameter. See "Configuring Diameter Overview" on page 152. 7 RELATED DOCUMENTATION Subscriber-Aware and Application-Aware Traffic Treatment Overview | 2 2 PART Applying Subscriber-Aware and Application-Aware Policies and Services Configuring the Service PIC, Session PIC, and TDF Gateway | 9 Configuring Application Identification | 23 Configuring HTTP Header Enrichment | 34 Configuring Policy and Charging Enforcement | 51 Configuring TDF Subscribers | 106 Configuring Services | 145 Configuring Diameter | 149 9 CHAPTER 2 Configuring the Service PIC, Session PIC, and TDF Gateway IN THIS CHAPTER TDF Gateway Service PICs and Session PICs for Subscriber-Aware Traffic Treatment | 9 Configuring Service PICs and Session PICs Overview | 12 Preconfigured Groups for Service PICs and for Session PICs Overview | 13 Configuring a Services Interface for a Session PIC or Service PIC | 15 Configuring a TDF Gateway | 16 Making Predefined Groups Available for Session PIC and Service PIC Configuration | 17 Configuring Service PICs | 18 Configuring Session PICs | 19 Configuring Tracing for TDF Gateway | 20 TDF Gateway Service PICs and Session PICs for Subscriber-Aware Traffic Treatment IN THIS SECTION TDF Gateway | 10 Service and Session PICs | 10 Redundancy for Service PICs and Session PICs | 11 You must configure at least one TDF gateway, one service PIC, and one session PIC to operate subscriber-aware traffic treatment. Each service PIC and session PIC is configured on an MS-MPC, and assigned to a TDF gateway. 10 TDF Gateway The traffic detection function (TDF) gateway on the MX Series router establishes a context and framework for configuring subscriber-aware services. You assign service PICs and session PICs to the TDF gateway, and specify the call admission control (CAC) parameters for subscriber sessions. Service and Session PICs A service PIC provides subscriber-aware policy enforcement and traffic redirection (steering) that is application-aware. Traffic steering refers to the capability to direct or traverse traffic from a specified source to an endpoint or the adjacent network element in a routing path. The service PIC is configured with software plugins to perform the configured or requested services, which include the policy and charging enforcement function (PCEF), application detection and control, HTTP header enrichment, HTTP redirect, and network address translation. The service PIC also stores the policy and charging control (PCC) rules that it enforces, and holds the subscriber records and rules that are sent from the session PIC. The subscriber's assigned TDF logical interface (mif) and the service set that is applied to the mif determine the service PIC to which a packet is sent. See "IP-Based Subscriber Setup Overview" on page 107. A session PIC supports access subscriber session setup and management, enabling the steering of subscriber traffic to the correct services PIC. The session PIC also sets up a session with the policy and charging rules function (PCRF) so it can receive subscriber PCC rules from the PCRF and send application-start messages to the PCRF. 11 Figure 2 on page 11 shows an overview of a service PIC and a session PIC and their functions. Figure 2: Service PIC and Session PIC Overview Redundancy for Service PICs and Session PICs You can configure a service PIC or a session PIC as an individual PIC or with a backup for redundancy. You can configure redundancy by including the interfaces for the primary and the backup PICs in an aggregated multiservices (AMS) interface . You can configure a session PIC with 1:1 redundancy -- a primary session PIC has one backup PIC that does not back up any other session PICs. 12 You can configure service PICs with N:1 redundancy -- multiple service PICs can share the same backup MS-PIC. In addition to the redundancy configuration, each PIC that is a primary or backup needs to be configured as a session PIC or service PIC at the [edit unified-edge gateways tdf gateway-name system] hierarchy level. RELATED DOCUMENTATION Configuring a TDF Gateway | 16 Configuring Session PICs | 19 Configuring Service PICs | 18 Configuring Aggregated Multiservices Interfaces Configuring Service PICs and Session PICs Overview You must configure at least one service PIC and one session PIC under a TDF gateway. The service PIC provides subscriber-aware services, such as the policy and charging enforcement function (PCEF), application detection and control, and HTTP header enrichment. The session PIC supports access subscriber sessions, policy and charging rules function (PCRF) sessions, and PCEF library installation from the PCRF. You can configure service PICs and session PICs on MS-MPCs, and you can configure them either as a member of a redundant group by using an aggregated multiservices (AMS) interface or as a standalone service PIC or session PIC. To configure service and session PICs: 1. Configure the TDF gateway. See "Configuring a TDF Gateway" on page 16. 2. If you want any of the service or session PICs to be members of redundant groups, configure an aggregated multiservices (AMS) interface for each group. See Configuring Aggregated Multiservices Interfaces. 3. If you want any of the service or session PICs not to be members of redundant groups, configure a services interface. See "Configuring a Services Interface for a Session PIC or Service PIC" on page 15. 4. Install predefined groups that are needed for configuration of the service PICs and session PICs. See "Making Predefined Groups Available for Session PIC and Service PIC Configuration" on page 17. 13 5. Configure each service PIC. See "Configuring Service PICs" on page 18. 6. Configure each session PIC. See "Configuring Session PICs" on page 19. RELATED DOCUMENTATION TDF Gateway Service PICs and Session PICs for Subscriber-Aware Traffic Treatment | 9 Preconfigured Groups for Service PICs and for Session PICs Overview | 13 Preconfigured Groups for Service PICs and for Session PICs Overview To simplify configuration, Junos Subscriber Aware software includes predefined configuration groups that include the parameters for stable operation of session PICs and service PICs. These groups are included in the /etc/config/tdf-defaults.conf file, which you load and then merge with your configuration. Next, you apply the appropriate group to each session PIC and service PIC configuration as follows: · For each session PIC, apply the tdf-session-xlp group. · For each service PIC that requires application identification but not HTTP header enrichment, apply the tdf-services-xlp-dpi group. · For each service PIC that requires both application identification and HTTP header enrichment, configure the tdf-services-xlp-dpi-with-hcm group. The predefined tdf-session-xlp group contains the following statements: [edit groups] tdf-session-xlp { chassis { fpc <*> { pic <*> { adaptive-services { service-package { extension-provider { boot-os embedded-junos64; package jservices-mobile; } 14 } } } } } } The predefined tdf-services-xlp-dpi group contains the following statements: [edit groups] tdf-services-xlp-dpi { chassis { fpc <*> { pic <*> { adaptive-services { service-package { extension-provider { boot-os embedded-junos64; package jservices-mss; package jservices-jdpi; package jservices-pcef; } } } } } } } The predefined tdf-services-xlp-dpi-with-hcm group contains the following statements: [edit groups] tdf-services-xlp-dpi-with-hcm { chassis { fpc <*> { pic <*> { adaptive-services { service-package { extension-provider { boot-os embedded-junos64; package jservices-mss; 15 package jservices-jdpi; package jservices-pcef; package jservices-hcm; package jservices-crypto-base; } } } } } } } RELATED DOCUMENTATION Making Predefined Groups Available for Session PIC and Service PIC Configuration | 17 Configuring Session PICs | 19 Configuring Service PICs | 18 Configuring a Services Interface for a Session PIC or Service PIC If a service PIC or a session PIC is not part of a redundant group (the service interface is not part of an aggregated multiservices interface), you must configure a services interface on the MS-MPC for the service PIC. · Configure the services interface. [edit] user@host# set interfaces ms-fpc/pic/0 unit logical-unit-number family family address address RELATED DOCUMENTATION Configuring Aggregated Multiservices Interfaces Configuring Service PICs | 18 Configuring Session PICs | 19 TDF Gateway Service PICs and Session PICs for Subscriber-Aware Traffic Treatment | 9 16 Configuring a TDF Gateway To run Junos Subscriber Aware, you must configure a traffic detection function (TDF) gateway on the MX Series router. The TDF gateway establishes a context and framework for configuring subscriberaware services for subscriber data that is accessing the network through the MX Series router. You also specify the call admission control (CAC) parameters for the TDF gateway. To configure the TDF gateway: 1. Configure a name for the TDF gateway. [edit unified-edge gateways] user@host# set tdf gateway-name 2. Configure the threshold for the maximum amount of CPU that the TDF gateway can use as a percentage from 1 through 90. [edit unified-edge gateways tdf gateway-name] user@host# set cac cpu cpu-pct If the amount of CPU that the TDF gateway uses reaches the threshold, the SNMP trap jnxScgSMCPUThreshHigh is generated. 3. Configure the maximum number of TDF subscriber sessions that can be running, expressed in thousands of sessions. [edit unified-edge gateways tdf gateway-name] user@host# set cac maximum-sessions max-sessions You can configure from 10 through 5000 sessions. 4. Configure the trap threshold for the number of TDF subscriber sessions as a percentage of the maximum number of sessions. [edit unified-edge gateways tdf gateway-name] user@host# set cac maximum-sessions-trap-percentage max-sessions-pct If the number of subscriber sessions reaches the threshold, the SNMP trap jnxScgSMSessionThreshHigh is generated. 17 5. Configure the threshold for the maximum amount of memory that the TDF gateway can use, as a percentage from 1 through 90. [edit unified-edge gateways tdf gateway-name] user@host# set cac memory memory-pct If the amount of memory that the TDF gateway uses reaches the threshold, the SNMP trap jnxScgSMMemoryThreshHigh is generated. RELATED DOCUMENTATION Configuring Service PICs | 18 Configuring Session PICs | 19 Making Predefined Groups Available for Session PIC and Service PIC Configuration You must make the predefined session PIC and service PIC groups available in your configuration. These groups are used when you configure the session PICs and the service PICs. To make the predefined groups available in your configuration: · Load and merge the tdf-defaults.conf file. [edit] user@host# load merge /etc/config/tdf-defaults.conf RELATED DOCUMENTATION Configuring Service PICs | 18 Configuring Session PICs | 19 TDF Gateway Service PICs and Session PICs for Subscriber-Aware Traffic Treatment | 9 18 Configuring Service PICs An MS-MPC must have a service interface configured as a service PIC in order to provide subscriberaware services, such as the policy and charging enforcement function (PCEF), application detection and control, or HTTP header enrichment. Repeat this procedure for each service interface that you want to serve as a service PIC. Before you begin to configure a service PIC: · Make sure that you installed the predefined groups. · If the service PIC is not part of a redundant group, make sure that you have configured the service interface on the MS-MPC. · If the service PIC is to function as a member of a redundant group, make sure that you have configured an aggregated multiservices (AMS) interface with the service interface as a member interface. To configure a service PIC: 1. Add the MS-MPC service interface to the list of service PICs. [edit unified-edge gateways tdf gateway-name system] user@host# set service-pics interface interface-name where interface-name is amsn if you have redundancy configured and is ms-fpc/pic/0 if you do not have redundancy configured. 2. Perform one of the following actions: · If application identification is required but not HTTP header enrichment, configure the tdf- services-xlp-dpi group to run on the PIC. [edit chassis] user@host# set fpc slot-number pic pic-number apply-groups tdf-services-xlp-dpi · If both application identification and HTTP header enrichment are required, configure the tdfservices-xlp-dpi-with-hcm group to run on the PIC. [edit chassis] user@host# set fpc slot-number pic pic-number apply-groups tdf-services-xlp-dpi-with-hcm 19 3. (Optional) For Next Gen Services, enable subscriber awareness. This steps loads MSS, PCEF, HCM (all subscriber related plugins) on the PIC. [edit chassis] user@host# set fpc slot-number pic pic-number subscriber-aware-services RELATED DOCUMENTATION Configuring a Services Interface for a Session PIC or Service PIC | 15 Configuring Aggregated Multiservices Interfaces Making Predefined Groups Available for Session PIC and Service PIC Configuration | 17 TDF Gateway Service PICs and Session PICs for Subscriber-Aware Traffic Treatment | 9 Configuring Session PICs An MS-MPC must have a service interface configured as a session PIC in order to support access subscriber sessions, policy and charging rules function (PCRF) sessions, and PCEF library installation from the PCRF. Repeat this procedure for each service interface that you want to serve as a session PIC. Before you begin to configure a session PIC: · Make sure that you have installed the predefined groups. · If the session PIC is not part of a redundant group, make sure that you have configured the service interface on the MS-MPC. · If the session PIC is to function as a member of a redundant group, make sure that you have configured an aggregated multiservices (AMS) interface with the service interface as a member interface. To configure a session PIC: 1. Add the MS-MPC service interface to the list of session PICs. [edit unified-edge gateways tdf gateway-name system] user@host# set session-pics interface interface-name where interface-name is amsn if you have redundancy configured and is ms-fpc/pic/0 if you do not have redundancy configured. 20 2. Configure the tdf-session-xlp group to run on the PIC. [edit chassis] user@host# set fpc slot-number pic pic-number apply-groups tdf-session-xlp RELATED DOCUMENTATION Making Predefined Groups Available for Session PIC and Service PIC Configuration | 17 Configuring a Services Interface for a Session PIC or Service PIC | 15 Configuring Aggregated Multiservices Interfaces TDF Gateway Service PICs and Session PICs for Subscriber-Aware Traffic Treatment | 9 Configuring Tracing for TDF Gateway To configure tracing operations for the TDF gateway: 1. Specify that you want to configure tracing options for the TDF gateway. [edit unified-edge gateways tdf gateway-name] user@host# edit traceoptions 2. Configure the name of the file used for the trace output. [edit unified-edge gateways tdf gateway-name traceoptions] user@host# set file file-name 3. (Optional) Configure the maximum size of each trace file. [edit unified-edge gateways tdf gateway-name traceoptions] user@host# set file file-name size size 21 4. (Optional) Configure the maximum number of trace files. [edit unified-edge gateways tdf gateway-name traceoptions] user@host# set file file-name files number 5. (Optional) Configure the read permissions for the log file. [edit unified-edge gateways tdf gateway-name traceoptions] user@host# set file file-name (no-world-readable | world-readable) 6. (Optional) Disable remote tracing capabilities. [edit unified-edge gateways tdf gateway-name traceoptions] user@host# set no-remote-trace 7. Configure flags to filter the operations to be logged. [edit unified-edge gateways tdf gateway-name traceoptions] user@host# set flag flag Table 1 on page 21 describes the flags that you can include. Table 1: Trace Flags Flag Description all Trace all operations. bulkjob Trace events that are handled by bulk jobs in order to prevent system overload. config Trace configuration events. cos-cac Trace class of service (CoS) and call admission control (CAC) events. ctxt Trace user equipment, Packet Data Network (PDN), or bearer context events. 22 Table 1: Trace Flags (Continued) Flag Description fsm Trace mobile subscriber finite state machine (FSM) events. gtpu Trace GPRS tunneling protocol, user plane (GTP-U) events. ha Trace high availability events. init Trace initialization events. pfem Trace Packet Forwarding Engine Manager events. stats Trace stats events. This flag is used internally by Juniper Networks engineers. waitq Trace waitq events. This flag is used internally by Juniper Networks engineers. 8. Configure the level of tracing. [edit unified-edge gateways tdf gateway-name traceoptions] user@host# set level (all | critical | error | info | notice | verbose | warning) RELATED DOCUMENTATION traceoptions (TDF Gateway) | 735 23 CHAPTER 3 Configuring Application Identification IN THIS CHAPTER Application Identification Overview | 23 Downloading and Installing Predefined Junos OS Application Signature Packages | 24 Configuring Custom Application Signatures | 26 Uninstalling a Predefined Junos OS Application Signature Package | 33 Application Identification Overview Junos Application Aware is an infrastructure plug-in on MS-MPC service PICs and on the MX-SPC3 services card that provides information to clients about application protocol bundles based on deep packet inspection (DPI) of application signatures. These clients can be any of the plug-ins on the MX Series router service chain, such as traffic detection function (TDF), that request application classification data. Starting in Junos OS Release 16.1R4 and Junos OS Release 17.2R1, application identification is available in Junos OS Broadband Subscriber Management. Starting in Junos OS Release 19.3R2, application identification is also supported for Broadband Subscriber Management on the MXSPC3 services card if you have enabled Next Gen Services on the MX240, MX480 or MX960 router. In application identification, you can apply application signatures as follows: · Predefined signatures--Junos Application Aware comes with a bundle of predefined, preinstalled application signatures, but we recommend that you download and install the latest version of predefined signatures. As new sets of signatures are supported, they are compiled and made available for you to download. · Custom application signatures--For any application signatures that are not predefined, you can create custom signatures for HTTP, SSL, and stream signature contexts and install them for application identification. After you have configured and committed custom signatures, they are serialized and merged with the predefined application signatures. You can specify the following types of custom application signatures: · Address based--You can define an application identification based on a specific IP address, or port, or both where a source IP address, destination IP address, or both are used for a known 24 application in a customer's network. This is useful, for example, when a Session Initiation Protocol (SIP) server initiates a session from its well known port, 5060. The customer can put the SIP server IP address and port 5060 as source IP/port for the SIP application. This method provides efficiency and accuracy of application identification for customer's network. · Internet Control Message Protocol (ICMP) based--Application identification based on types of ICMP messages. · IP protocol based--Application identification based on IP protocol. TCP, UDP, and ICMP are not supported for this method of signature creation. · Pattern-matching signatures--Application based on pattern matching combined with Layer 7 protocol identification. Release History Table Release Description 19.3R1 Starting in Junos OS Release 19.3R2, application identification is also supported for Broadband Subscriber Management on the MX-SPC3 services card if you have enabled Next Gen Services on the MX240, MX480 or MX960 router. 16.1R4 Starting in Junos OS Release 16.1R4 and Junos OS Release 17.2R1, application identification is available in Junos OS Broadband Subscriber Management. RELATED DOCUMENTATION Configuring Custom Application Signatures Downloading and Installing Predefined Junos OS Application Signature Packages Downloading and Installing Predefined Junos OS Application Signature Packages NOTE: Starting in Junos OS Release 19.3R2 and 19.4R1, application identification is also supported for Broadband Subscriber Management if you have enabled Next Gen Services on the MX240, MX480 or MX960 router with the MX-SPC3 card. To download, install, and verify the installation of predefined Junos OS application signature packages: 25 1. Use download ignore-server-validation if you want to skip server certification validation during the download. Validation is enabled by default. [edit services application-identification] user@host# set download ignore-server-validation 2. Configure the URL for the application signature packages server. [edit services application-identification] user@host# set download url https://services.netscreen.com/cgi-bin/index.cgi 3. Download the application signature package. · To download the latest signature package, enter the following command: user@host> request services application-identification download · To download a specific, known signature package, include the version number: user@host> request services application-identification download version version-number 4. Confirm the successful download of the package. user@host> request services application-identification download status Downloading application package succeed. 5. Install the application signature package. user@host> request services application-identification install 26 6. Confirm the successful installation of the application signature package. user@host> request services application-identification install status Compiling application signatures of package version. or Install application package succeed 7. View the protocol bundle status: user@host> show services application-identification status RELATED DOCUMENTATION Uninstalling a Predefined Junos OS Application Signature Package Application Identification Overview Configuring Custom Application Signatures Configuring Custom Application Signatures NOTE: Starting in Junos OS Release 19.3R2 and 19.4R1, application identification is also supported for Broadband Subscriber Management if you have enabled Next Gen Services on the MX240, MX480 or MX960 router with the MX-SPC3 card. You can configure custom application definitions using custom signatures. These definitions enable identification of protocol bundles through deep packet inspection (DPI) for use by interested services in the service chain. Before you configure custom application signatures, ensure that jservices-jdpi is configured on all required interfaces of your MS-MPC, or of your MX-SPC3 services card if you have enabled Next Gen Services on the MX240, MX480, or MX960. To review how to configure the package on your MS-MPC or MX-SPC3 services card: 27 · For Junos OS Subscriber Aware, see Preconfigured Groups for Service PICs and for Session PICs Overview. · For Junos OS Broadband Subscriber Management, see Installing Services Packages for Subscriber Management Application-Aware Policy Management. To configure one or more custom application signatures: 1. Specify a name for the application. [edit services application-identification] user@host# edit application application-name For example: [edit services application-identification] user@host# edit application my:http 2. Specify a description for the application. [edit services application-identification application application-name] user@host# set description description For example: [edit services application-identification application my:http] user@host# set description "Test application" 3. Specify an alternative name for the application. [edit services application-identification application application-name] user@host# set alt-name alt-name For example: [edit services application-identification application my:http] user@host# set alt-name my:http-app 28 4. Enable saving of the application system cache (ASC). [edit services application-identification application my:http] user@host# set cacheable 5. Specify the name of the Junos OS release for compatibility. [edit services application-identification application application-name] user@host# set compatibility junos-compatibility-version For example: [edit services application-identification application my:http] user@host# set compatibility 17.1 6. Specify any desired application tags, consisting of a user-defined name and value. [edit services application-identification application application-name] user@host# set tags tag-name tag-value For example: [edit services application-identification application my:http] user@host# set tags traffic-type video-stream 7. Specify one or more address-based signatures. · Specify a destination address and destination port-range. [edit services application-identification application application-name] user@host# set filter ip 200.0.0.2/24 port-range [80] 8. Specify an ICMP-based signature. a. Specify ICMP type and code. [edit services application-identification application application-name] user@host# set icmp-mapping type icmp-type code icmp-code 29 For example: [edit services application-identification application my:http] user@host# set icmp-mapping type 33 code 34 9. Specify an IP protocol-based signature. a. Specify the IP protocol by protocol number. [edit services application-identification application application-name] user@host# set ip-protocol-mapping protocol protocol-number For example: [edit services application-identification application my:http] user@host# set ip-protocol-mapping protocol 103 All ip-protocol-mappings are allowed except Protocol numbers 1,6,17 are not allowed to be configured under ip-protocol based signatures. If you try to configure protocols 1,6,17 under ipprotocol-mapping you will get commit errors. 10. Specify one or more Layer 4 and Layer 7 signatures using pattern matching in conjunction with a Layer 4 protocol. a. Specify a name for the Layer 4 and Layer 7 signature. [edit services application-identification application application-name over protocol-type] user@host# set signature l4-l7-signature-name For example: [edit services application-identification application my:http over http] user@host# set signature myl3l7 30 b. Specify the order to be used if conflicts occur during the application classification. In such a case, the application with lowest order is classified. [edit services application-identification application application-name over protocol-type signature l4-l7-signature-name member member-name] user@host# set order order For example: [edit services application-identification application my:http over http signature myl3l7 member m01] user@host# set order 1 c. Specify the priority for using this signature instead of using any matched predefined signatures. [edit services application-identification application application-name over protocol-type signature l4-l7-signature-name] user@host# set order-priority (high | low) For example: [edit services application-identification application my:http over http signature myl3l7] user@host# set order-priority high d. (Optional) Specify the protocol. If you are using Next Gen Services with the MX-SPC3 services card, do not perform this step. [edit services application-identification application application-name over protocol-type signature l4-l7-signature-name] user@host# set protocol (http | ssl | tcp | udp) For example: [edit services application-identification application my:http over http signature myl3l7] user@host# set protocol http 31 e. (Optional) Specify that members are to be matched in order. [edit services application-identification application application-name over protocol-type signature l4-l7-signature-name] user@host# set chain-order f. Specify a member. You can repeat this step to define up to four members. [edit services application-identification application application-name over protocol-type signature l4-l7-signature-name] user@host# edit member member-name For example: [edit services application-identification application my:http over http signature myl3l7] user@host# edit member m01 g. Specify the member's identifying pattern. [edit services application-identification application application-name over protocol-type signature l4-l7-signature-name member member-name] user@host# set pattern pattern For example: [edit services application-identification application my:http over http signature myl3l7 member m01] user@host# set pattern "www\.facebook\.net" h. Specify the direction of flows to which pattern matching is applied. [edit services application-identification application application-name over protocol-type signature l4-l7-signature-name member member-name] user@host# set direction (any | client-to-server | server-to-client) 32 For example: [edit services application-identification application my:http over http signature myl3l7 member m01] user@host# set direction any i. Specify the number of check-bytes. This option applies to TCP and UDP only. [edit services application-identification application application-name over protocol-type signature l4-l7-signature-name member member-name] user@host# set check-bytes max-bytes-to-check For example: [edit services application-identification application my:http over http signature myl3l7 member m01] user@host# set check-bytes 5000 11. (For Next Gen Services with the MX-SPC3 services card only) After you have committed your changes, you can check the status of the custom signature commitment. [edit services application-identification application my:http over http signature myl3l7 member m01] user@host> show services application-identification commit-status RELATED DOCUMENTATION Application Identification Overview 33 Uninstalling a Predefined Junos OS Application Signature Package NOTE: Starting in Junos OS Release 19.3R2 and 19.4R1, application identification is also supported for Broadband Subscriber Management if you have enabled Next Gen Services on the MX240, MX480 or MX960 router with the MX-SPC3 card. To uninstall the current application signature package: · Enter the uninstall command. user@host> request service application-identification uninstall RELATED DOCUMENTATION Downloading and Installing Predefined Junos OS Application Signature Packages 34 CHAPTER 4 Configuring HTTP Header Enrichment IN THIS CHAPTER Junos Web Aware HTTP Header Enrichment Overview | 34 HTTP Content Manager (HCM) | 35 Configuring HTTP Header Enrichment Overview | 41 Configuring Tag Rules | 42 Configuring HCM Profiles and Assigning Tag Rules | 49 Junos Web Aware HTTP Header Enrichment Overview Subscribers accessing Web-based services often need to have content added to the HTTP headers sent back and forth as part of the client-server exchange. You can use Junos Web Aware to configure HTTP header enrichment on the MX Series router. Junos Web Aware allows tag insertions. In addition to the International Mobile Subscriber Identity (IMSI) and mobile station ISDN (MSISDN) tags, you can specify tags for International Mobile Station Equipment Identity (IMEI), TDF gateway IP address, and Subscriber IP address. Support added in Junos OS Release 20.2R1 for only the insertion of IPv4 or IPv6 tags user addresses in an HTTP headers. No other tags are supported in this release for Next Gen Services. For example, this feature can add the last line to this sequence of HTTP headers: GET /256k.html HTTP/1.1 Host: 10.45.45.2 Accept */* Accept-Language: en-us Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; NET CLR 1.1.4322 name: value X-MSISDN: <MSISDN #> 35 You can also use HTTP header enrichment to replace a byte of the IPv4 or IPV6 user address in the HTTP header with a value you specify. Release History Table Release Description 20.2R1 Support added in Junos OS Release 20.2R1 for only the insertion of IPv4 or IPv6 tags user addresses in an HTTP headers. No other tags are supported in this release for Next Gen Services. RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 hcm (HTTP Header Enrichment) | 434 HTTP Content Manager (HCM) IN THIS SECTION Configuring the HTTP-Manager Package on the Router | 35 HTTP Content Management (HCM) is an application used for inspecting the HTTP traffic transmitted through port 80 (default) or any other port you use to transmit HTTP traffic. HCM can be installed on an MX Series router that is running the corresponding version of the Junos OS release. HCM inspects HTTP traffic even if the default port 80 is not used for HTTP traffic and is interoperable with ms, vms, and ams interface types. It supports fragmented HTTP request packets and GET, PUT, and POST requests. Support added in Junos OS Release 20.2R1 for only the insertion of IPv4 or IPv6 tags user addresses in an HTTP headers. No other tags are supported in this release for Next Gen Services. Configuring the HTTP-Manager Package on the Router 1. Before you install the HTTP-Manager package on the router, ensure that you have the appropriate version of the HTTP-Manager package for the Junos OS image you are using on the router. When 36 you have confirmed that you have the right package, use the request system software add command to install the HTTP-Manager package. You have to restart the CLI after the package is installed. user@router> request system software add jservices-x86-32-19.4R1.1.tgz NOTICE: Validating configuration against package-name. NOTICE: Use the 'no-validate' option to skip this if desired. Checking compatibility with configuration Initializing... WARNING: cli has been replaced by an updated version: CLI release 19.4R1 built by builder on 2020-06-10 02:36:22 UTC Restart cli using the new version ? [yes,no] (yes) Restarting cli ... 2. When the CLI has restarted, use the show version command to see whether the HTTP-Manager packages are installed. user@router> show version ... HTTP-Manager Management Component [19.4R1-1-A1.2] HTTP-Manager Dataplane Component [19.4R1-1-A1.2] user@router>.. 3. If you want to upgrade the Junos OS image on a router that has the HTTP-Manager package installed, you should first save and then delete the HTTP-Manager configuration from the router. · To view the HTTP-Manager configuration, use the user@router>extension juniper-http-manager show <section> command. · To delete the HTTP-Manager configuration from the router, use the user@router>extension juniper-http-manager delete <section> command. · Any remnant HTTP-Manager configuration left on the router will be deleted when the Junos OS image is upgraded. So, ensure that you have saved all necessary HTTP Content Management configurations. 37 · To delete the HTTP-Manager package from the router, use the user@router> request system software delete <http-manager-package> command. · Reinstall the HTTP-Manager package on the router after you upgrade the Junos OS image on the router. user@router> show version Hostname: router Model: mx480 JUNOS Base OS boot [19.4R1] JUNOS Base OS Software Suite [19.4R1] JUNOS Kernel Software Suite [19.4R1] JUNOS Crypto Software Suite [19.4R1] JUNOS Packet Forwarding Engine Support (M/T Common) [19.4R1] JUNOS Packet Forwarding Engine Support (MX Common) [19.4R1] JUNOS Online Documentation [19.4R1] JUNOS Voice Services Container package [19.4R1] JUNOS Border Gateway Function package [19.4R1] JUNOS Services AACL Container package [19.4R1] JUNOS Services LL-PDF Container package [19.4R1] JUNOS Services PTSP Container package [19.4R1] JUNOS Services Stateful Firewall [19.4R1] JUNOS Services NAT [19.4R1] JUNOS Services Application Level Gateways [19.4R1] JUNOS Services Captive Portal and Content Delivery Container package [19.4R1] JUNOS Services RPM [19.4R1] JUNOS Services HTTP Content Management package [19.4R1] JUNOS AppId Services [19.4R1] JUNOS IDP Services [19.4R1] JUNOS Services Crypto [19.4R1] JUNOS Services SSL [19.4R1] JUNOS Services IPSec [19.4R1] JUNOS Runtime Software Suite [19.4R1] JUNOS Routing Software Suite [19.4R1] 38 HTTP-Manager Management Component [19.4R1-1-A1.2] HTTP-Manager Dataplane Component [19.4R1-1-A1.2] user@router> configure Entering configuration mode [edit] user@router# extension juniper-http-manager show ## Last changed: 2020-06-07 13:21:36 PDT services { http-manager { traceoptions { level all; flag all; } 39 } } [edit] user@router# extension juniper-http-manager delete [edit] user@router# extension juniper-http-manager show [edit] user@router# commit commit complete [edit] user@router# exit Exiting configuration mode user@router> request system software delete http-manager-services Removing package 'http-manager-services' ... Removing /opt/sdk/service-packages/http-manager-services ... Removing http-manager-services-xlr-19.4R1-1-A1.2.tgz from /var/sw/pkg ... Notifying mspd ... user@router> request system software delete http-manager-mgmt Removing package 'http-manager-mgmt' ... Reloading /config/juniper.conf.gz ... Activating /config/juniper.conf.gz ... mgd: commit complete 40 Restarting mgd ... Restarting http-manager ... WARNING: cli has been replaced by an updated version: CLI release 11.4R3.7 built by builder on 2020-05-14 19:51:45 UTC Restart cli using the new version ? [yes,no] (yes) Restarting cli ... user@router> user@router> show version Hostname: router Model: mx480 JUNOS Base OS boot [19.4R1] JUNOS Base OS Software Suite [19.4R1] JUNOS Kernel Software Suite [19.4R1] JUNOS Crypto Software Suite [19.4R1] JUNOS Packet Forwarding Engine Support (M/T Common) [19.4R1] JUNOS Packet Forwarding Engine Support (MX Common) [19.4R1] JUNOS Online Documentation [19.4R1] JUNOS Voice Services Container package [19.4R1] JUNOS Border Gateway Function package [19.4R1] JUNOS Services AACL Container package [19.4R1] JUNOS Services LL-PDF Container package [19.4R1] JUNOS Services PTSP Container package [19.4R1] JUNOS Services Stateful Firewall [19.4R1] JUNOS Services NAT [19.4R1] JUNOS Services Application Level Gateways [19.4R1] JUNOS Services Captive Portal and Content Delivery Container package [19.4R1] JUNOS Services RPM [19.4R1] JUNOS Services HTTP Content Management package [19.4R1] JUNOS AppId Services [19.4R1] JUNOS IDP Services [19.4R1] JUNOS Services Crypto [19.4R1] JUNOS Services SSL [19.4R1] JUNOS Services IPSec [19.4R1] JUNOS Runtime Software Suite [19.4R1] JUNOS Routing Software Suite [19.4R1] 41 Release History Table Release Description 20.2R1 Support added in Junos OS Release 20.2R1 for only the insertion of IPv4 or IPv6 tags user addresses in an HTTP headers. No other tags are supported in this release for Next Gen Services. RELATED DOCUMENTATION show services hcm statistics | 885 Configuring HTTP Header Enrichment Overview You configure HTTP header enrichment by configuring tag rules and an HCM profile that points to specific tag rules. Tag rules identify the HTTP enrichment actions to take when the conditions in the tag rule are matched. For subscriber traffic under static policy control, a tag rule is used if it is included in the HCM profile specified in a PCC rule that the traffic matches. For subscribers under dynamic policy control, a message from the PCRF identifies the configured HCM profile to use for HTTP header enrichment. Support added in Junos OS Release 20.2R1 for only the insertion of IPv4 or IPv6 tags user addresses in an HTTP headers. No other tags are supported in this release for Next Gen Services. If you change the configuration of tag rules during an existing subscriber data session, the changes do not impact the existing session. The configuration changes are used by any new subscriber data sessions. To configure HTTP header enrichment for a subscriber: 1. Configure one or more tag rules to specify the HTTP header enrichment actions. See "Configuring Tag Rules" on page 42. 2. Configure an HCM profile and assign tag rules to it. See "Configuring HCM Profiles and Assigning Tag Rules" on page 49. 3. (For subscribers under static policy control) Assign the HCM profile to a PCC action profile. See "Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware" on page 83. 4. (For subscribers under static policy control) Configure a PCC rule that includes the PCC action profile. See "Configuring Policy and Charging Control Rules" on page 86. 5. Enable HTTP enrichment for a subscriber's service set. See "Applying Services to Subscriber-Aware Traffic with a Service Set" on page 146. 42 Release History Table Release Description 20.2R1 Support added in Junos OS Release 20.2R1 for only the insertion of IPv4 or IPv6 tags user addresses in an HTTP headers. No other tags are supported in this release for Next Gen Services. RELATED DOCUMENTATION Junos Web Aware HTTP Header Enrichment Overview | 34 Configuring Tag Rules Tag rules include one or more term statements that identify the HTTP enrichment actions to take when the conditions in the term are matched. You must configure at least one tag in the then clause of a term, and you can configure multiple tags. Terms are evaluated in the order they are configured. If a data packet matches all the criteria in the from statement in a term, then the actions specified in the then statement of the term are applied. If the from statement does not identify any criteria, then all traffic matches. After a data packet matches a term, further terms are not evaluated. If no terms match, then the HTTP header is not enriched. To configure a tag rule: 1. Configure the list of tag attributes that may be used in tag rules. [edit services hcm] user@host# set tag-attribute tag-attr-name The tag attributes currently supported for Adaptive Services are apn, ggsnipv4, ggsnipv6, imei, imsi, ipv4addr, ipv6addr, and msisdn. To configure multiple tag attributes, include them in square brackets ([ ]). Starting in Junos 20.2R1 IPv4 and IPv6 tags for HTTP Header Enrichment are supported for Next Gen Services on MX240, MX480 and MX960. No other tags are supported for Next Gen Services in this release. For example: [edit services hcm] user@host# set tag-attribute [msisdn apn] 43 2. Configure a name for the tag rule. [edit services hcm] user@host# set tag-rule rule-name For example: [edit services hcm] user@host# set tag-rule rule1 3. Configure a term for the tag rule. [edit services hcm set tag-rule rule-name] user@host# set term term-number NOTE: The term argument must have a numeric value. For example: [edit services hcm set tag-rule rule1] user@host# set term 1 4. (Optional) Specify the prefix that the HTTP request destination IP address must match. [edit services hcm tag-rule rule-name term term-number from] user@host# set destination-address prefix For example: [edit services hcm tag-rule rule1 term 1 from] user@host# set destination-address 192.0.2.0/24 44 You can also specify the type of address to match: [edit services hcm tag-rule rule-name term term-number from] user@host# set destination-address (any-ipv4 | any-ipv6 | any-unicast) You can specify multiple prefixes or address types by including the destination-address statement multiple times. 5. (Optional) Specify an IP address range that the HTTP request destination IP address must match. [edit services hcm tag-rule rule-name term term-number from] user@host# set destination-address-range low address high address For example: [edit services hcm tag-rule rule1 term 1 from] user@host# set destination-address-range low 10.10.10.1 high 10.10.10.255 You can specify multiple address ranges by including the destination-address-range statement multiple times. 6. (Optional) Specify the destination prefix list that the HTTP request destination IP address must match. The prefix list must already be defined at the [edit policy-options prefix-list] hierarchy level. [edit services hcm tag-rule rule-name term term-number from] user@host# set destination-prefix-list prefix-name For example: [edit services hcm tag-rule rule1 term 1 from] user@host# set destination-prefix-list customer1 You can specify multiple prefix lists by including the destination-prefix-list statement multiple times. 7. (Optional) Specify any addresses that you want to exclude from matching the HTTP request destination IP address with the except statement. To exclude addresses, you must also configure addresses that do match in a destination-address, destination-address-range, or destinationprefix-list statement at the [edit services hcm tag-rule rule-name term term-number from] hierarchy level. 45 For example: [edit services hcm tag-rule rule1 term 1 from] user@host# set destination-address-range low 10.10.10.1 high 10.10.10.255 user@host# set destination-address 10.10.10.9/32 except This matches all the addresses in the destination range except 10.10.10.9. You can use except in the following statements at the [edit services hcm tag-rule rule-name term term-number from] hierarchy level: destination-address { any-ipv4 except; any-ipv6 except; any-unicast except; prefix except; } destination-address-range { high address low address except; } destination-prefix-list { prefix-name except; } 8. (Optional) Specify a port range that the HTTP request destination port number must match. [edit services hcm tag-rule rule-name term term-number from] user@host# set destination-port-range high port-number low port-number You can specify multiple port ranges by including the destination-port-range statement multiple times. NOTE: If you do not specify any ports or port ranges to match, then all ports are matched. 9. (Optional) Specify the HTTP request destination port number that must be matched. [edit services hcm tag-rule rule-name term term-number from] user@host# set destination-ports value 46 You can specify multiple ports by including the destination-ports statement multiple times. 10. (Optional) Specify that you want to apply all HTTP header enrichment actions specified in the then statement of the tag rule to all HTTP requests by not including any matching conditions in the from statement. You must include a from statement in each term of a tag rule. [edit services hcm tag-rule rule-name term term-number ] user@host# set from For example: [edit services hcm tag-rule rule2 term 1] user@host# set from [edit services hcm tag-rule rule2 term 1] user@host# set then count 11. Configure a name for a tag. [edit services hcm tag-rule rule-name term term-number then] user@host# set tag tag-name For example: [edit services hcm tag-rule rule1 term 1 then] user@host# set tag msisdn-tag 12. Configure the tag header that the tag applies to the HTTP header. [edit services hcm tag-rule rule-name term term-number then tag tag-name] user@host# set tag-header header For example: [edit services hcm tag-rule rule1 term 1 then tag msisdn-tag] user@host# set tag-header X_MSISDN You can configure a maximum of 16 unique tag headers. The header values cannot be accept, accept-charset, accept-encoding, accept-language, authorization, expect, host, if-match, if-modified-since, if-none-match, if-range, if-unmodified- 47 since, max-forwards, proxy-authorization, referer, user-agent, or x-moz. These header values are reserved; you cannot configure them. 13. Specify the tag attribute that the tag applies to the HTTP header. To specify multiple attributes at one time, include the attributes in square brackets ([]). [edit services hcm tag-rule rule-name term term-number then tag tag-name] user@host# set tag-attribute [tag-attr-name] NOTE: The tag attribute must be listed in the tag attributes configured in Step "1" on page 42. For example: [edit services hcm tag-rule rule1 term 1 then tag msisdn-tag] user@host# set tag-attribute msisdn 14. Specify the separator that the tag uses in the HTTP header. [edit services hcm tag-rule rule-name term term-number then tag tag-name] user@host# set tag-separator separator For example: [edit services hcm tag-rule rule1 term 1 then tag msisdn-tag] user@host# set tag-separator / 15. (Optional) Specify a hash method and prefix key for the insertion of the tag in the HTTP header. [edit services hcm tag-rule rule-name term term-number then tag tag-name encrypt] user@host# set hash algorithm prefix hash-prefix Currently, only the md5 hash method is supported. 48 For example: [edit services hcm tag-rule rule1 term 1 then tag msisdn-tag encrypt] user@host# set hash md5 prefix gatewaykey1 16. (Optional) Enable the collection of statistics for HTTP header enrichment for the tag rule. [edit services hcm tag-rule rule-name term term-number then user@host# set count 17. (Optional) Configure how the tag replaces a byte of the IPv4 or IPv6 user address with a different value in the HTTP header. [edit services hcm tag-rule rule-name term term-number then tag tag-name] user@host# set (ipv4-mask ipv4-mask | ipv6-mask ipv6-mask) (ipv4-or-value ipv4-or-value | ipv6-orvalue ipv6-or-value) To identify the byte you want to replace, enter 255 for IPv4 or ff for IPv6 in the corresponding byte of the ipv4-mask or ipv6-mask and enter zero in the other bytes. To specify the new value for that byte, enter the value in the corresponding byte of the ipv4-orvalue or the ipv6-or-value and enter zero in the other bytes. For example, the following replaces the first byte of the IPv4 user address with the value 168: [edit services hcm tag-rule tag1 term term1 then tag subscip4] user@host# set ipv4-mask 255.0.0.0 ipv4-or-value 168.0.0.0 18. If you want to configure more tags for the then statement in the term, repeat Step "11" on page 46 through Step "17" on page 48. 19. If you want to configure another term statement for the tag rule, repeat Step "3" on page 43 through Step "18" on page 48. Release History Table Release Description 20.2R1 Starting in Junos 20.2R1 IPv4 and IPv6 tags for HTTP Header Enrichment are supported for Next Gen Services on MX240, MX480 and MX960. No other tags are supported for Next Gen Services in this release. 49 RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 Configuring HCM Profiles and Assigning Tag Rules | 49 Junos Web Aware HTTP Header Enrichment Overview | 34 Configuring HCM Profiles and Assigning Tag Rules The HCM profile for a subscriber specifies the tag rules to apply to a subscriber's traffic. Tag rules identify the HTTP enrichment actions to take when the conditions in the tag rule are matched. You can have a maximum of 100 HCM profiles. Support added in Junos OS Release 20.2R1 for only the insertion of IPv4 or IPv6 tags user addresses in an HTTP headers. No other tags are supported in this release for Next Gen Services. For subscriber-aware traffic under static policy control, a tag rule is used if it is included in the HCM profile specified in a PCC rule that the traffic matches. For subscriber-aware traffic under dynamic policy control, a message from the PCRF identifies the configured HCM profile and tag rules to use for HTTP header enrichment. To configure an HCM profile: 1. Configure the HCM profile name. [edit services hcm] user@host# set profile profile-name For example: [edit services hcm] user@host# set profile hcm1 2. Assign a tag rule to the HCM profile. [edit services hcm profile profile-name] user@host# set tag-rule rule-name 50 For example: [edit services hcm profile hcm1] user@host# set tag-rule rule1 Release History Table Release Description 20.2R1 Support added in Junos OS Release 20.2R1 for only the insertion of IPv4 or IPv6 tags user addresses in an HTTP headers. No other tags are supported in this release for Next Gen Services. RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 Configuring Tag Rules | 42 Junos Web Aware HTTP Header Enrichment Overview | 34 Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware | 83 51 CHAPTER 5 Configuring Policy and Charging Enforcement IN THIS CHAPTER Understanding Junos Subscriber Aware Policy and Charging Enforcement Function (PCEF) | 52 Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment | 56 Understanding How Subscriber-Aware Policy and Charging Control Rules Are Provisioned Dynamically by a PCRF | 58 Understanding How Subscriber-Aware Policy and Charging Control Rules Are Provisioned Statically | 63 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 Understanding PCEF Profiles | 70 Understanding Network Elements | 71 Understanding AAA Profiles | 73 Understanding Static Time-of-Day PCC Rule Activation and Deactivation | 74 Understanding Usage Monitoring for TDF Subscribers | 74 Configuring Dynamic Policy Control by PCRF | 76 Configuring Static Policy Control | 77 Configuring Policy Control by RADIUS Servers | 78 Configuring Service Data Flow Filters | 79 Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware | 83 Configuring Policy and Charging Control Rules | 86 Configuring a Policy and Charging Control Rulebase | 89 Configuring RADIUS Servers | 91 Configuring RADIUS Network Elements | 94 Configuring an AAA Profile | 96 Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Dynamic Policies | 98 Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Static Policies | 100 Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Policies That a RADIUS Server Controls | 101 52 Configuration of Static Time-of-Day PCC Rule Activation and Deactivation Overview | 102 Configuring the NTP Server | 103 Configuring Static Time-of-Day PCC Rule Activation and Deactivation in a Junos OS Subscriber Aware PCEF Profile | 103 Configuring TDF Subscriber Usage Monitoring for Traffic That Matches Predefined PCC Rules | 105 Understanding Junos Subscriber Aware Policy and Charging Enforcement Function (PCEF) IN THIS SECTION Static Policy Control | 53 Dynamic Policy Control | 53 RADIUS Server Policy Control | 55 The policy and charging enforcement function (PCEF) of Junos Subscriber Aware enforces policy and charging control (PCC) rules for the treatment of a subscriber's packets. A PCC rule is installed on, and enforced by, the PCEF. The PCC rules can be under static control, under dynamic control of the policy and charging rules function (PCRF), or under activation/deactivation control of a RADIUS server, depending on the PCEF profile that is assigned to a subscriber. 53 Static Policy Control For static policies, the PCEF enforces PCC rules you predefined on the MX Series router with no interaction from the PCRF or a RADIUS server, as shown in Figure 3 on page 53. Figure 3: Static Policy Control Dynamic Policy Control For dynamic policies, the PCEF acts upon messages received from the PCRF. The PCRF is the central entity that makes policy and charging decisions based on input from different sources, such as mobile operator configuration, user subscription information, and services information. The PCC rules are either provisioned by the PCRF and sent to the PCEF over the Gx interface using Diameter AVPs, or predefined on the MX Series router and activated by a Diameter message from the PCRF. The PCEF also provides the PCRF with subscriber and access information. See Figure 4 on page 54. 54 When PCC rules are under dynamic control, the PCEF gives precedence to rules sent by the PCRF over rules that are predefined on the PCEF. Figure 4: Dynamic Policy Control 55 RADIUS Server Policy Control For polices under control of a RADIUS server, a RADIUS server activates and deactivates policy and PCC rules that you have predefined on the MX Series router, as shown in Figure 5 on page 55. Figure 5: RADIUS Server Policy Control RELATED DOCUMENTATION Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment | 56 Understanding How Subscriber-Aware Policy and Charging Control Rules Are Provisioned Dynamically by a PCRF | 58 Understanding How Subscriber-Aware Policy and Charging Control Rules Are Provisioned Statically | 63 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 56 Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment IN THIS SECTION Understanding Service Data Flow Filters | 56 Understanding Application Filters | 57 Understanding PCC Action Profiles | 57 You can configure policy and charging control (PCC) rules to define the treatment to apply to specific service data flows or to packets associated with specific applications. A PCC rule is applicable to a subscriber's traffic if the rule is in the subscriber's PCEF profile. These predefined PCC rules contain a from clause that identifies the service data flows or applications, and a then clause that specifies the PCC action profile that identifies the treatment to apply. A predefined PCC rule can be used in three ways: · When PCC rules are under static control, predefined rules are the only rules used. The provisioning of PCC rules involves no interaction from the policy and charging rules function (PCRF) or a RADIUS server. · When PCC rules are under dynamic control, a predefined PCC rule must be activated by the PCRF. (With dynamic control, PCC rules can also be sent from the PCRF.) · When PCC rules are under RADIUS server control, a predefined PCC rule must be activated by the RADIUS server. This topic includes the following sections: Understanding Service Data Flow Filters Service data flow (SDF) filters (flow identifiers) are specified in the from clause of a PCC rule to identify IP packets belonging to a particular Layer 3 or Layer 4 service data flow. If the IP packet matches the SDF filter in a PCC rule, the treatment specified in the PCC action profile in the then clause of the rule is applied. To configure Layer 3 or Layer 4 SDF filters, you specify one or more of the following parameters: · Source IP address 57 · Destination IP address · Source port · Destination port · Layer 4 protocol (UDP or TCP) Understanding Application Filters Applications or application groups are specified in the from clause of a PCC rule to identify IP packets belonging to a specific application. If the IP packet is for an application identified in a PCC rule, the treatment specified in the PCC action profile in the then clause of the rule is applied. To configure application-aware PCC rules, you can specify one or more of the following parameters: · application--Specifies the name of an application. This can be a Layer 7 protocol (for example, HTTP) or a particular application running on a Layer 7 protocol, such as Facebook and Yahoo Messenger. · application-group--Specifies the name of an application group, which can be used to process a number of applications or subgroups at the same time. NOTE: Application-aware PCC rules that reference specified applications can include wildcard or specific Layer-3 SDF filters, Layer-4 SDF filters, or both. Understanding PCC Action Profiles A PCC rule configuration includes an action profile in the then clause that defines the treatment to apply to a service data flow or to a packet belonging to an application identified in the from clause of the rule. You can configure a PCC action profile that is used in one or more PCC rules to provide the following functionality: · HTTP redirection--Specifies HTTP redirection to a URL. You can use this action only for PCC rules that match only HTTP-based applications and all flows. · HTTP Steering path--Specifies an IPv4 or IPv6 address for steering HTTP packets. You can use this action only for PCC rules that match only HTTP-based applications and all flows. NOTE: A single PCC rule can support either HTTP redirection or HTTP steering path, but not both. 58 · Steering with a routing instance--Specifies a routing instance for steering of packets to a third-party server to apply services or to a local or external service chain. You can configure different routing instances for traffic from the subscriber (uplink) and traffic to the subscriber (downlink). · Keep existing steering--Specifies that steering attributes configured in a PCC action profile that a PCC rule applies to a data flow session when it begins will continue to be applied to the data flow when the PCC rule match conditions are modified, deleted, or added to. · Forwarding class--Specifies the forwarding class that you want assigned to the packet. · Maximum bit rate--Specifies the maximum bit rate for uplink and for downlink traffic. · HCM profile--Specifies the profile that identifies the HTTP header enrichment rules to apply. You can use this action only for PCC rules that match only HTTP-based applications and all flows. · Gating status--Specifies whether to block or to forward IP packets. RELATED DOCUMENTATION Understanding Junos Subscriber Aware Policy and Charging Enforcement Function (PCEF) | 52 Understanding How Subscriber-Aware Policy and Charging Control Rules Are Provisioned Dynamically by a PCRF | 58 Understanding How Subscriber-Aware Policy and Charging Control Rules Are Provisioned Statically | 63 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware | 83 Configuring Service Data Flow Filters | 79 Configuring Policy and Charging Control Rules | 86 Application Identification Overview | 23 Understanding How Subscriber-Aware Policy and Charging Control Rules Are Provisioned Dynamically by a PCRF IN THIS SECTION Policy Decisions | 59 Supported Operations | 59 59 Methods for Provisioning PCC Rules | 60 With dynamic policy control, the policy and charging rules function (PCRF) controls the provisioning of policy and charging control (PCC) rules on the Junos Subscriber Aware PCEF for a subscriber. Dynamic policy control is enabled when a dynamic-policy-control policy and charging enforcement function (PCEF) profile is assigned to a subscriber. Dynamic policy control requires Junos Policy Control. This topic includes the following sections: Policy Decisions The PCRF is central in making policy and charging control decisions and can install, activate, modify, or deactivate a PCC rule on the PCEF at any time. The PCRF can make its policy and charging control decisions based on different sources, including: · Subscription information for the user equipment that is received from the subscription profile repository (SPR) · Operator configuration in the PCRF · Information from the access network about the access technology · Information from the PCEF, such as the name of the application that the subscriber is using The Gx interface is used to send PCC rule provisioning information from the PCRF to the PCEF, and to provide notification of traffic-plane events from the PCEF to the PCRF. Supported Operations Junos Subscriber Aware and Junos Policy Control support the following operations with the PCRF: · Install or modify rules--The PCRF sends the Charging-Rule-Install AVP to install a PCC rule that is not already installed or modify an existing rule on the PCEF. · Remove rules--The PCRF sends the Charging-Rule-Remove AVP to remove a PCC rule that is already installed. · Activate rules--The PCRF sends the Rule-Activation-Time AVP to indicate the time at which to activate the rule, and it is contained within the Charging-Rule-Install AVP. This operation results in a single activation of the rule, not a recurring activation schedule. 60 · Deactivate rules--The PCRF sends the Rule-Deactivation-Time AVP to indicate the time at which to deactivate the rule, and it is contained within the Charging-Rule-Install AVP. This operation results in a single deactivation of the rule, not a recurring deactivation schedule. · PCEF session revalidation--The PCRF sends the Revalidation-Time AVP along with the Event-Trigger AVP with the value REVALIDATION_TIMEOUT to indicate the time at which the PCEF must request PCEF session revalidation from the PCRF. When the specified time is reached, the PCEF sends an event trigger with the value REVALIDATION_TIMEOUT to request PCEF session revalidation. · Report application start or stop--The PCEF sends an event trigger when it detects the start or stop of an application. The containers for the PCC rules are named Charging-Rule-Definition. Multiple Charging-RuleDefinition containers can be sent within a Charging-Rule-Install or Charging-Rule-Remove, each of which is applied per subscriber. If a time zone is configured on the router, the activation and deactivation settings apply to the configured time zone and are adjusted for transitions to and from daylight saving time. Methods for Provisioning PCC Rules The PCRF uses one of the following procedures to specify the PCC rules that the PCEF applies: · Pull mode during TDF subscriber creation--Applies when the MX Series gateway receives a request for a new TDF subscriber. The PCEF sends a credit control request initial (CCR-I) message to the PCRF with information about the subscriber. The PCRF downloads PCC rules to the PCEF in a credit control answer initial (CCA-I) message, which may also include any activation and deactivation times 61 that apply to the rules and the time at which the PCEF must re-request PCC rules from the PCRF. Figure 6 on page 61 shows the message flow for a pull procedure during TDF subscriber creation. Figure 6: Message Flow for Pull Mode During TDF Subscriber Creation · Pull mode after PCEF event trigger--Applies when the PCEF sends an event trigger to the PCRF. This can occur when the MX Series router detects a new application start or stop or when the revalidation time has occurred. The PCEF sends a credit control request update (CCR-U) message along with the appropriate event trigger to the PCRF. The PCRF might download new rules to the PCEF in a credit control answer update (CCA-U) message, which may also include any activation and deactivation times that apply to the rules and the time at which the PCEF must re-request PCC rules 62 from the PCRF. Figure 7 on page 62 shows the message flow for a pull procedure after a PCEF event trigger. Figure 7: Message Flow for Pull Mode After PCEF Event Trigger · Push mode--Applies when the PCRF provisions PCC rules without obtaining a request from the PCEF. The PCRF sends the PCC rules in a re-authorization request (RAR) to the PCEF based on information sent to the PCRF through the Rx interface or in response to a trigger within the PCRF. The RAR may also include any activation and deactivation times that apply to the rules and the time at which the PCEF must re-request PCC rules from the PCRF. The PCRF includes these PCC rules in an RAR message because the PCC rules were not requested by the PCEF, and no credit control request (CCR) or credit control answer (CCA) messages are triggered by the RAR. The PCEF responds 63 with a re-authorization answer (RAA) message. Figure 8 on page 63 shows the message flow for a push procedure. Figure 8: Message Flow for Push Mode RELATED DOCUMENTATION Understanding Junos Subscriber Aware Policy and Charging Enforcement Function (PCEF) | 52 Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment | 56 Configuring Dynamic Policy Control by PCRF | 76 Understanding How Subscriber-Aware Policy and Charging Control Rules Are Provisioned Statically Static policy control is enabled when a static-policy-control policy and charging enforcement function (PCEF) profile is assigned to a subscriber. The policy and charging control (PCC) rules that you configure on the MX Series router and assign to the PCEF profile are active, and are not controlled by the policy and charging rules function (PCRF) or RADIUS server. RELATED DOCUMENTATION Understanding Junos Subscriber Aware Policy and Charging Enforcement Function (PCEF) | 52 64 Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment | 56 Configuring Static Policy Control | 77 Understanding How a RADIUS Server Controls Policy and Charging Control Rules IN THIS SECTION Rule Activation When TDF Session Begins | 64 Rule Activation and Deactivation When RADIUS Server Sends Request | 65 Supported Attributes in RADIUS Messages | 66 Policy control by a RADIUS server takes place when an aaa-policy-control policy and charging enforcement function (PCEF) profile is assigned to a subscriber. A RADIUS server activates and deactivates policy and charging control (PCC) rules that you have configured on the MX Series router and assigned to the PCEF profile. A network element, which is a load-balanced group of RADIUS servers, is assigned to the subscriber. This topic includes the following sections: Rule Activation When TDF Session Begins When the traffic detection function (TDF) subscriber session begins, the Junos Subscriber Aware PCEF sends an access request to the RADIUS server. This is shown in Figure 9 on page 65. This access request includes the subscriber username, IP address, and other relevant AVP information that Subscriber Aware received from the broadband network gateway or Packet Data Network Gateway during the subscriber session setup. The RADIUS server responds to the PCEF with an access-accept message, which contains the names of the rulebases to activate. You can configure the AVP that carries the name of a rulebase to be activated; 65 by default the PCEF looks for a rulebase name in the ERX-Service-Activate Juniper vendor-specific attributes (VSA). Figure 9: RADIUS Server Message Flow When TDF Session Begins Rule Activation and Deactivation When RADIUS Server Sends Request The RADIUS server can initiate the activation or deactivation of rulebases by sending a change of authorization (CoA) request to the PCEF, as shown in Figure 10 on page 66. You can configure the AVP that carries the name of a rulebase to be activated; by default the PCEF looks for a rulebase name in the ERX-Service-Activate Juniper VSA. You can also configure the AVP that carries the name of a rulebase to be deactivated; by default the PCEF looks for a rulebase name in the ERX-Service-Deactivate Juniper VSA. 66 The PCEF responds to the CoA request by sending a CoA Ack to the RADIUS server. Figure 10: Message Flow When RADIUS Server Sends Request Supported Attributes in RADIUS Messages The following tables list the RADIUS attributes, 3GPP VSAs, and Juniper Networks VSAs that are supported in the RADIUS messages between the MX Series router and a RADIUS server. Table 2 on page 67 lists the RADIUS attributes and 3GPP VSAs that are supported in the accessrequest messages sent to the RADIUS server. 67 Table 2: Attributes Supported in Access-Request Messages Attribute Number Attribute Name Description Content 1 User-Name Username for the TDF String subscriber if it is provided in the RADIUS accounting request received from the Packet Data Network Gateway (PGW) or broadband network gateway (BNG). This is a RADIUS IETF attribute. 2 User-Password User password configured in String the subscriber's PCEF profile. This is a RADIUS IETF attribute. 4 NAS-IP-Address IPv4 address of the MX IPv4 address Series router for communication with the RADIUS server. This is a RADIUS IETF attribute. 8 Framed-IP-Address IPv4 address for the TDF IPv4 address subscriber if it is provided in the RADIUS accounting request received from the PGW or BNG. This is a RADIUS IETF attribute. 68 Table 2: Attributes Supported in Access-Request Messages (Continued) Attribute Number Attribute Name Description Content 31 Calling-Station-ID Identifier for the mobile MSISDN in international station of the TDF format, UTF-8 encoded subscriber if it is provided in decimal characters the RADIUS accounting request received from the PGW or BNG. This is a RADIUS IETF attribute. 32 NAS-Identifier Identifier of the NAS String originating the request. This is a RADIUS IETF attribute. 44 Acct-Session-ID User Session identifier UTF-8 encoded string generated by Subscriber Aware for the TDF subscriber. This is a RADIUS IETF attribute. 97 Framed-IPv6-Prefix IPv6 prefix for the TDF Value indicating the prefix, subscriber if it is provided in as specified in RFC 3162 the RADIUS accounting request received from the PGW or BNG. This is a RADIUS IETF attribute. 26/10415/1 (3GPP type 1) 3GPP-IMSI IMSI for the TDF subscriber if it is provided in the RADIUS accounting request received from the PGW or BNG. This is a 3GPP VSA. UTF-8 encoded string Table 3 on page 69 lists the VSAs that are supported in the Access-Accept messages sent from the RADIUS server to the PCEF. 69 Table 3: Attributes Supported in Access-Accept Messages Attribute Number Attribute Name Description Content 26-65 ERX-Service-Activate Specifies a PCC rulebase to activate for the subscriber. Tagged VSA, which supports 8 tags (1-8). This is a Juniper Networks VSA and is the default VSA for carrying rulebase activations; you can also specify a different AVP code and vendor ID. string: rulebase-name Table 4 on page 69 lists the VSAs that are supported in the CoA messages sent from the RADIUS server to the PCEF. Table 4: Attributes Supported in CoA Messages Attribute Number Attribute Name Description Content 26-65 ERX-Service-Activate Specifies a PCC rulebase to activate for the subscriber. Tagged VSA, which supports 8 tags (1-8). This is a Juniper Networks VSA and is the default VSA for carrying rulebase activations; you can also specify a different AVP code and vendor ID. string: rulebase-name 70 Table 4: Attributes Supported in CoA Messages (Continued) Attribute Number Attribute Name Description Content 26-66 ERX-ServiceDeactivate Specifies a PCC rulebase to deactivate for the subscriber. This is a Juniper Networks VSA and is the default VSA for carrying rulebase deactivations; you can also specify a different AVP code and vendor ID. string: rulebase-name RELATED DOCUMENTATION Understanding Junos Subscriber Aware Policy and Charging Enforcement Function (PCEF) | 52 Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment | 56 Configuring Policy Control by RADIUS Servers | 78 Understanding PCEF Profiles A policy and charging enforcement function (PCEF) profile defines whether policy and charging control (PCC) rules for a subscriber are under static control, under dynamic control of the policy and charging rules function, or under activation/deactivation control of a RADIUS server by using the static-policycontrol, dynamic-policy-control, or aaa-policy-control statement, respectively, in the PCEF profile configuration. The PCEF profile also identifies the predefined PCC rules and rulebases that the subscriber can use, and assigns a precedence value to each predefined rule. A subscriber is assigned a PCEF profile during the TDF subscriber session setup. See "Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber" on page 112. A PCEF profile with dynamic policy control requires a Diameter Gx profile, which provides network access information for the Diameter application. A PCEF profile with RADIUS server control requires an AAA profile, which provides the policy control attributes for RADIUS servers. 71 RELATED DOCUMENTATION Understanding Junos Subscriber Aware Policy and Charging Enforcement Function (PCEF) | 52 Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment | 56 Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Dynamic Policies | 98 Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Static Policies | 100 Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Policies That a RADIUS Server Controls | 101 Understanding Static Time-of-Day PCC Rule Activation and Deactivation | 74 Understanding Network Elements IN THIS SECTION Load Balancing Within Network Elements | 71 Server Priority | 72 Dead Server Detection | 72 Maximum Pending Requests for a Network Element | 72 A network element is a load-balanced group of RADIUS servers providing policy management for TDF subscribers. Network elements are specified in the AAA profile that is applied to a policy and charging enforcement function (PCEF) profile. A subscriber is assigned to a PCEF profile. Load Balancing Within Network Elements The Junos Subscriber Aware PCEF distributes requests to RADIUS servers across the servers in the network element. 72 Server Priority Within a network element, a RADIUS server can be assigned a priority of 1 through 16, with 1 being the highest priority. You can have multiple servers with the same priority in a network element. All access requests are load balanced among the highest priority servers. If all the servers with the highest priority in the network element fail, then requests are load balanced among servers with the next highest priority level. Dead Server Detection To determine whether a RADIUS server in a network element has failed, the PCEF keeps track of how often requests sent to a server time out and must be retransmitted. If the number of times that requests need to be retransmitted reaches a configured limit within a configured time interval, PCEF marks the server as dead and starts sending requests to the next available server in the network element with the same priority. At the same time, the PCEF starts a timer for the RADIUS server. After this timer expires, the PCEF marks the dead server as alive again, and includes it in the rotation for sending RADIUS messages. Maximum Pending Requests for a Network Element You can configure the maximum number of requests that can be queued to the network element. When the pending request queue is full, any additional requests are dropped. You can also configure a high and a low watermark that are percentages of the maximum number of requests that can be queued. If the number of pending requests reaches this high watermark, a flow control on message is generated. When the number of pending requests then falls below the low watermark, a flow control off message is generated. RELATED DOCUMENTATION Configuring RADIUS Network Elements | 94 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 73 Understanding AAA Profiles IN THIS SECTION Network Elements | 73 RADIUS Attributes That Carry Rulebase Names for Activation and Deactivation | 73 An AAA profile is a collection of attributes to specify how the Junos Subscriber Aware PCEF interacts with RADIUS servers that control the activation and deactivation of policy and charging control (PCC) rules. An AAA profile is assigned to a subscriber's policy and charging enforcement function (PCEF) profile, which specifies the PCC rulebases for the subscriber. Network Elements In the AAA profile, you specify a network element (load-balanced RADIUS server group) to be used for authorization of policy control. If the RADIUS servers in a Network Element cannot initiate a change of authorization (CoA) request without an accounting record, then the AAA profile must specify the network element for accounting as well as for authorization, and the AAA profile must enable CoA accounting. RADIUS Attributes That Carry Rulebase Names for Activation and Deactivation You can specify the RADIUS AVPs that carry the PCC rulebase names for activation or deactivation. By default, the PCC rulebase name for activations is carried in the ERX-Service-Activate Juniper vendorspecific attributes (VSA). By default, the PCC rulebase name for deactivations is carried in the ERXService-Deactivate Juniper VSA. RELATED DOCUMENTATION Configuring an AAA Profile | 96 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 74 Understanding Static Time-of-Day PCC Rule Activation and Deactivation With static time-of-day policy and charging control (PCC) rules activation and deactivation, you can specify a schedule for activating and deactivating PCC rules or rulebases within a static PCEF profile. The rule or rulebase activation and deactivation settings take effect for subscribers assigned to that static PCEF profile. The activation and deactivation settings can consist of the time of day, the day, and the month of the year. The day can be expressed as a day of the week, as a numbered day of the month, or as the last day of the current month. If a day is not specified, then the rule activation and deactivation occurs daily at the specified times. If you configure a day of the month, you can also configure a month of the year. If a day is not specified and the deactivation time of day setting is earlier than the activation time of day setting, then a rule is deactivated the day after it is activated. If a time zone is configured on the router, the time-of-day settings apply to the configured time zone and are adjusted for transitions to and from daylight saving time. You cannot use static time-of-day settings for dynamic PCC rules. RELATED DOCUMENTATION Configuration of Static Time-of-Day PCC Rule Activation and Deactivation Overview | 102 Configuring the NTP Server | 103 Configuring Static Time-of-Day PCC Rule Activation and Deactivation in a Junos OS Subscriber Aware PCEF Profile | 103 Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment | 56 Understanding Usage Monitoring for TDF Subscribers IN THIS SECTION Tracked Resource Identification | 75 Threshold Configuration | 75 Messages and AVPs That Are Used | 75 75 For TDF subscribers that are assigned to a dynamic policy and charging enforcement function (PCEF) profile, you can monitor the subscriber use during a session as a volume of traffic, an amount of time, or both, and send reports to the policy and charging rules function (PCRF) when a threshold is exceeded or when the PCRF requests a report. Data volume and the amount of time used can be tracked for individual or multiple data flows or applications that appear in specific policy and charging control (PCC) rules, or for the entire subscriber session. This topic includes the following sections: Tracked Resource Identification Data usage for a subscriber session is tracked through an object called a monitoring key, which the PCRF configures. Traffic for a particular data flow, application, or combination of data flows and applications can be tracked as a data set by assigning a monitoring key to the PCC rules that identify those flows or applications. For predefined PCC rules, you specify the monitoring key with the PCC rule's action profile. For dynamic PCC rules, the PCRF specifies the monitoring key for a rule. Data usage can also be tracked for the entire TDF subscriber session by configuring the monitoring key level as SESSION. Threshold Configuration The PCRF specifies a threshold for reporting data usage when it configures a monitoring key. The threshold can be a combination of uplink volume, downlink volume, total volume, and time used. The MX Series router reports the usage information to the PCRF when this limit is exceeded, and resets the volume to zero. Messages and AVPs That Are Used The PCRF must first request usage monitoring by sending the Event-Trigger AVP with the value USAGE_REPORT. This request can be sent to the MX Series router in a CCA-I, CCA-U, or RAR message. The PCRF configures a monitoring key by sending a Usage Monitoring Information (UMI) AVP that includes the following in a CCA-I, CCA-U, or RAR message to the MX Series router: · Monitoring-key AVP, which is the identifier. · Granted-Service-Unit AVP, which specifies the volume threshold, time threshold, or both. · Usage-Monitoring-Level AVP, which indicates whether the monitoring key applies to the entire subscriber session or to particular PCC/ePCC rules. The PCRF requests usage monitoring for traffic that matches a PCC rule's data flows or applications by sending the following in a CCA-I, CCA-U, or RAR message to the MX Series router: 76 · Charging-Rule-Definition AVP, which identifies the rule. · UMI AVP that includes the Monitoring-key AVP, which identifies the monitoring key to which the rule is associated. The MX Series router reports usage to the PCRF by sending a UMI AVP that includes the following in a CCR-U message: · Monitoring-key AVP, which is the identifier. · Used-Service-Unit AVP, which gives a combination of uplink volume, downlink volume, total volume, and time used. The PCRF can request a usage report, regardless of whether the threshold is reached, by sending a UMI AVP that includes the following in a CCA-U or RAR message: · Monitoring-key AVP, which is the identifier. · Usage-Monitoring-Report AVP, which is set to the value USAGE_MONITORING_REPORT_REQUIRED (0). The PCRF requests that usage monitoring be disabled for a monitoring key by sending a UMI AVP that includes the following in a CCA-U or RAR message: · Monitoring-key AVP, which is the identifier. · Usage-Monitoring-Support, which is set to the value USAGE_MONITORING_DISABLED (0). RELATED DOCUMENTATION IP-Based Subscriber Setup Overview | 107 Configuring TDF Subscriber Usage Monitoring for Traffic That Matches Predefined PCC Rules | 105 Understanding How Subscriber-Aware Policy and Charging Control Rules Are Provisioned Dynamically by a PCRF | 58 Configuring Dynamic Policy Control by PCRF You can configure policy management that is dynamically controlled by the policy and charging rules function (PCRF), which can both provision policy and charging control (PCC) rules on the MX Series router and activate PCC rules that are predefined on the MX Series router. To configure policy management that is dynamically controlled by a PCRF: 1. (Optional) Configure any flow identifiers to be used in PCC rules. 77 See "Configuring Service Data Flow Filters" on page 79. 2. (Optional) Configure any custom applications to be used in PCC rules. See "Configuring Custom Application Signatures" on page 26. 3. (Optional) Configure the PCC action profiles to be used in PCC rules. See "Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware" on page 83 4. (Optional) Configure PCC rules. See "Configuring Policy and Charging Control Rules" on page 86. 5. (Optional) Configure PCC rulebases. See "Configuring a Policy and Charging Control Rulebase" on page 89. 6. Configure a Diameter Gx profile. See "Configuring Diameter Profiles" on page 152. 7. Configure a dynamic PCEF profile. See "Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Dynamic Policies" on page 98 8. (Optional) Configure an NTP server if you want the PCRF to send activation, deactivation, or revalidation times. See "Configuring the NTP Server" on page 103. RELATED DOCUMENTATION Understanding Junos Subscriber Aware Policy and Charging Enforcement Function (PCEF) | 52 Understanding How Subscriber-Aware Policy and Charging Control Rules Are Provisioned Dynamically by a PCRF | 58 Configuring Static Policy Control You can configure static policy management that is controlled entirely by predefined policy and charging control (PCC) rules that you have configured on the MX Series router. To configure static policy control: 1. Configure any flow identifiers to be used in PCC rules. See "Configuring Service Data Flow Filters" on page 79. 2. Configure any custom applications to be used in PCC rules. See "Configuring Custom Application Signatures" on page 26. 3. Configure the PCC action profiles to be used in PCC rules. 78 See "Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware" on page 83 4. Configure PCC rules. See "Configuring Policy and Charging Control Rules" on page 86. 5. (Optional) Configure PCC rulebases. See "Configuring a Policy and Charging Control Rulebase" on page 89. 6. Configure a policy and charging enforcement function (PCEF) profile for static policy control. See "Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Static Policies" on page 100 RELATED DOCUMENTATION Understanding Junos Subscriber Aware Policy and Charging Enforcement Function (PCEF) | 52 Understanding How Subscriber-Aware Policy and Charging Control Rules Are Provisioned Statically | 63 Configuring Policy Control by RADIUS Servers You can configure policy management that is controlled by RADIUS servers. A RADIUS server activates and deactivates policy and charging control (PCC) rules that have been configured on the MX Series router. To configure policy management that is controlled by RADIUS servers: 1. Configure any flow identifiers to be used in PCC rules. See "Configuring Service Data Flow Filters" on page 79. 2. Configure any custom applications to be used in PCC rules. See "Configuring Custom Application Signatures" on page 26. 3. Configure the PCC action profiles to be used in PCC rules. See "Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware" on page 83 4. Configure PCC rules. See "Configuring Policy and Charging Control Rules" on page 86. 5. Configure PCC rulebases. See "Configuring a Policy and Charging Control Rulebase" on page 89. 6. Configure RADIUS servers. See "Configuring RADIUS Servers" on page 91. 79 7. Configure RADIUS network elements. See "Configuring RADIUS Network Elements" on page 94. 8. Configure an AAA profile. See "Configuring an AAA Profile" on page 96. 9. Configure a policy and charging enforcement function (PCEF) profile for policy control by a RADIUS server. See "Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Policies That a RADIUS Server Controls" on page 101 RELATED DOCUMENTATION Understanding Junos Subscriber Aware Policy and Charging Enforcement Function (PCEF) | 52 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 Configuring Service Data Flow Filters NOTE: Starting in Junos OS Release 19.3R2, PCC rules are also supported if you have enabled Next Gen Services on the MX240, MX480 or MX960 router with the MX-SPC3 card. A service data flow (SDF) filter is specified as a matching condition in the from clause of a policy and charging control (PCC) rule. Each SDF filter can have one or more flows associated with it; each flow is a five-tuple match. NOTE: If you configure an SDF filter without specifying a remote address, port, port range, or protocol , then the SDF filter matches IP packets that have any value configured for the corresponding attribute. If you configure an SDF filter, you must configure at least one of the following attributes: direction, local port or local port range, protocol, remote address, or remote port or remote port range. You can configure SDF filters for Junos OS Subscriber Aware or for Junos OS Broadband Subscriber Management, but you use a different CLI hierarchy level for each product. · If you are using Junos OS Subscriber Aware, configure SDF filters at the [edit unified-edge pcef] hierarchy level. 80 · If you are using Junos OS Broadband Subscriber Management, configure SDF filters at the [edit services pcef] hierarchy level. To configure Layer 3 and Layer 4 SDF filters: 1. Specify a name for the SDF filter. For Junos OS Subscriber Aware: [edit unified-edge pcef] user@host# set flow-descriptions flow-identifier For Junos OS Broadband Subscriber Management: [edit services pcef] user@host# set flow-descriptions flow-identifier 2. Specify the flow direction for the SDF filter. NOTE: If you do not specify a flow direction, then the SDF filter is applied in both the uplink and downlink directions. For Junos OS Subscriber Aware: [edit unified-edge pcef flow-descriptions flow-identifier] user@host# set direction (uplink | downlink | both) For Junos OS Broadband Subscriber Management: [edit services pcef flow-descriptions flow-identifier] user@host# set direction (uplink | downlink | both) 3. Specify a remote address (IPv4 or IPv6) for the SDF filter: NOTE: You can specify an IPv4 subnet or an IPv6 subnet but not both. · Specify an IPv4 address for the SDF filter. 81 For Junos OS Subscriber Aware: [edit unified-edge pcef flow-descriptions flow-identifier] user@host# set remote-address ipv4-address ipv4-address For Junos OS Broadband Subscriber Management: [edit services pcef flow-descriptions flow-identifier] user@host# set remote-address ipv4-address ipv4-address · Specify an IPv6 address for the SDF filter. For Junos OS Subscriber Aware: [edit unified-edge pcef flow-descriptions flow-identifier] user@host# set remote-address ipv6-address ipv6-address For Junos OS Broadband Subscriber Management: [edit services pcef flow-descriptions flow-identifier] user@host# set remote-address ipv6-address ipv6-address 4. Specify a protocol (using the standard protocol number) for the SDF filter. For Junos OS Subscriber Aware: [edit unified-edge pcef flow-descriptions flow-identifier] user@host# set protocol number For Junos OS Broadband Subscriber Management: [edit services pcef flow-descriptions flow-identifier] user@host# set protocol number 5. Specify a local port or a list of port numbers for the SDF filter. To specify a list of port numbers (up to a maximum of three), enclose the port numbers in square brackets ([]). 82 NOTE: You can configure a local port or local port range but not both in the same SDF filter. For Junos OS Subscriber Aware: edit unified-edge pcef flow-descriptions flow-identifier] user@host# set local-ports number For Junos OS Broadband Subscriber Management: edit services pcef flow-descriptions flow-identifier] user@host# set local-ports number 6. Specify a local port range for the SDF filter. For Junos OS Subscriber Aware: [edit unified-edge pcef flow-descriptions flow-identifier] user@host# set local-port-range low low-value high high-value For Junos OS Broadband Subscriber Management: [edit services pcef flow-descriptions flow-identifier] user@host# set local-port-range low low-value high high-value 7. Specify a remote port or list of remote ports for the SDF filter. To specify a list of port numbers (up to a maximum of three), enclose the port numbers in square brackets ([]). NOTE: You can configure a remote port or remote port range but not both in the same SDF filter. For Junos OS Subscriber Aware: [edit unified-edge pcef flow-descriptions flow-identifier] user@host# set remote-ports number 83 For Junos OS Broadband Subscriber Management: [edit services pcef flow-descriptions flow-identifier] user@host# set remote-ports number 8. Specify a remote port range for the SDF filter. For Junos OS Subscriber Aware: [edit unified-edge pcef flow-descriptions flow-identifier] user@host# set remote-port-range low low-value high high-value For Junos OS Broadband Subscriber Management: [edit services pcef flow-descriptions flow-identifier] user@host# set remote-port-range low low-value high high-value RELATED DOCUMENTATION Configuring Application-Aware Policy Control for Subscriber Management Understanding Application-Aware Policy Control for Subscriber Management Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment Configuring Policy and Charging Control Rules Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware A PCC action profile defines the treatment to be applied to specific service data flows or to packets associated with specific applications. A PCC action profile is specified in the then clause of a PCC rule. NOTE: To make a change to a PCC action profile, you must be in maintenance mode. (See "Changing PCEF Profiles, PCC Rules, PCC Rulebases, Diameter Profiles, Flow Descriptions, and PCC Action Profiles" on page 220). To configure PCC action profiles: 84 1. Specify a name for the PCC action profile. [edit unified-edge pcef] user@host# edit pcc-action-profiles profile-name 2. Configure the maximum bit rate for uplink and downlink subscriber traffic. [edit unified-edge pcef pcc-action-profiles profile-name] user@host# set maximum-bit-rate uplink mbr-uplink-value downlink mbr-downlink-value The range is 0 through 6144000 Kbps. 3. Configure HTTP redirection to a URL. [edit unified-edge pcef pcc-action-profiles profile-name redirect] user@host# set url url-name NOTE: A PCC action profile that includes HTTP redirection can only be used in PCC rules that match only HTTP-based applications and all flows. 4. Configure the steering of traffic to a third-party server for applying services or to a service chain with one of the following methods: · Specify the IP address of the third-party server for HTTP traffic. [edit unified-edge pcef pcc-action-profiles profile-name steering path] user@host# set (ipv4-address ipv4-address | set ipv6-address ipv6-address) NOTE: A PCC action profile that includes a steering path can only be used in PCC rules that match only HTTP-based applications and all flows. · Specify the routing instance to use to reach the third-party server or service chain. [edit unified-edge pcef pcc-action-profiles profile-name steering] user@host# set routing-instance downlink downlink-vrf-name uplink uplink-vrf-name 85 The downlink routing instance is applied to traffic going to the access side, and the uplink routing instance is applied to traffic being sent from the access side. 5. Specify that steering attributes configured in a PCC action profile that a PCC rule applies to a data flow session when it begins will continue to be applied to the data flow when the PCC rule match conditions are modified, deleted, or added to. [edit unified-edge pcef pcc-action-profiles profile-name steering] user@host# set keep-existing-steering 6. Specify the HCM profile that you want to use for determining which HTTP header enrichment rules are applied. [edit unified-edge pcef pcc-action-profiles profile-name] user@host# set hcm-profile hcm-profile-name NOTE: A PCC action profile that includes an HCM profile can only be used in PCC rules that match only HTTP-based applications and all flows. 7. Specify the forwarding class that you want packets to be assigned. [edit unified-edge pcef pcc-action-profiles profile-name] user@host# set forwarding-class class-name 8. Configure the gating status by enabling or disabling the forwarding of packets. [edit unified-edge pcef pcc-action-profiles profile-name] user@host# set gate-status (disable-both | downlink | uplink | uplink-downlink) RELATED DOCUMENTATION Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment | 56 Configuring Policy and Charging Control Rules | 86 Configuring TDF Subscriber Usage Monitoring for Traffic That Matches Predefined PCC Rules | 105 86 Configuring Policy and Charging Control Rules A policy and charging control (PCC) rule defines the treatment to be applied to packets associated with specific applications or to specific service data flows. You can configure PCC rules for Junos OS Subscriber Aware or for Junos OS Broadband Subscriber Management, but you use a different CLI hierarchy level for each product. · If you are using Junos OS Subscriber Aware, configure PCC rules at the [edit unified-edge pcef] hierarchy level. · If you are using Junos OS Broadband Subscriber Management, configure PCC rules at the [edit services pcef] hierarchy level. NOTE: If you are using Junos OS Subscriber Aware, you must be in maintenance mode to make a change to a PCC rule. (See Changing PCEF Profiles, PCC Rules, PCC Rulebases, Diameter Profiles, Flow Descriptions, and PCC Action Profiles). NOTE: If you are using Junos OS Broadband Subscriber Management, you cannot change a PCC rule while it is being used by a subscriber. To modify the rule, you must log off the subscribers that are using the rule. Before you configure PCC rules, you must do the following: · Configure the service data flow (SDF) filters that the PCC rules reference. · Configure the application groups and any custom applications that you want to reference in application-aware PCC rules. · Configure the PCC action profiles that the PCC rules reference. NOTE: When specifying application-aware PCC rules in a PCEF profile, you must also configure a default Layer 3 or Layer 4 wildcard PCC rule to ensure that the default charging characteristics are applied to unmatched subscriber traffic without dropping that traffic. For example, the default Layer 3 or Layer 4 wildcard PCC rule prevents traffic based on DNS queries from being dropped. In addition, the policy (PCEF profile) that includes application-aware PCC rules must also include a wildcard Layer 3 or Layer 4 PCC rule at a lower precedence. To configure PCC rules: 87 1. Specify a name for the PCC rule. For Junos OS Subscriber Aware: [edit unified-edge pcef] user@host# edit pcc-rules rule-name For Junos OS Broadband Subscriber Management: [edit services pcef] user@host# edit pcc-rules rule-name 2. In a from statement, specify an SDF filter to use Layer 3 or Layer 4 match conditions for filtering subscriber traffic. For Junos OS Subscriber Aware: [edit unified-edge pcef pcc-rules rule-name] user@host# set from flows flow-identifier For Junos OS Broadband Subscriber Management: [edit services pcef pcc-rules rule-name] user@host# set from flows flow-identifier If you do not want to filter subscriber traffic based on SDF filters, use the any option. For Junos OS Subscriber Aware: [edit unified-edge pcef pcc-rules rule-name] user@host# set from flows any For Junos OS Broadband Subscriber Management: [edit services pcef pcc-rules rule-name] user@host# set from flows any 3. (Optional) Specify an application as a match condition for filtering subscriber traffic. 88 For Junos OS Subscriber Aware: [edit unified-edge pcef pcc-rules rule-name] user@host# set from applications application-name For Junos OS Broadband Subscriber Management: [edit services pcef pcc-rules rule-name] user@host# set from applications application-name 4. (Optional) Specify multiple applications instead of specifying each application separately by specifying an application group as a match condition for filtering subscriber traffic. For Junos OS Subscriber Aware: [edit unified-edge pcef pcc-rules rule-name] user@host# set from application-groups application-group-name For Junos OS Broadband Subscriber Management: [edit services pcef pcc-rules rule-name] user@host# set from application-groups application-group-name 5. Specify the PCC rules action profile that defines the treatment to be applied to specific service data flows or to packets associated with specific applications. NOTE: You can use PCC action profiles with HTTP redirection or HCM profiles only in PCC rules that match only HTTP-based applications and any flows. For Junos OS Subscriber Aware: [edit unified-edge pcef pcc-rules rule-name] user@host# set then pcc-action-profile profile-name 89 For Junos OS Broadband Subscriber Management: [edit services pcef pcc-rules rule-name] user@host# set then pcc-action-profile profile-name RELATED DOCUMENTATION Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment Understanding Application-Aware Policy Control for Subscriber Management Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware Configuring Policy and Charging Control Action Profiles for Subscriber Management Configuring Service Data Flow Filters Configuring Custom Application Signatures Configuring a Policy and Charging Control Rulebase A policy and charging control (PCC) rulebase contains a set of PCC rules. Each rule specified in the PCC rulebase is assigned a precedence to designate the priority in which PCC rules are evaluated for selection in a policy and charging enforcement function (PCEF) profile. NOTE: Starting in Junos OS Release 19.3R1, application-aware policy control is also supported for Broadband Subscriber Management if you have enabled Next Gen Services on the MX240, MX480 or MX960 router with the MX-SPC3 card. You can configure PCC rulebases for Junos OS Subscriber Aware or for Junos OS Broadband Subscriber Management, but you use a different CLI hierarchy level for each product. · If you are using Junos OS Subscriber Aware, configure PCC rulebases at the [edit unified-edge pcef] hierarchy level. · If you are using Junos OS Broadband Subscriber Management, configure PCC rulebases at the [edit services pcef] hierarchy level. 90 NOTE: If you are using Junos OS Subscriber Aware, you must be in maintenance mode to make a change to a PCC rulebase. (See Changing PCEF Profiles, PCC Rules, PCC Rulebases, Diameter Profiles, Flow Descriptions, and PCC Action Profiles). NOTE: If you are using Junos OS Broadband Subscriber Management, you cannot change a PCC rulebase while it is being used by a subscriber. To modify the rulebase, you must log off the subscribers that are using the rule. Before you configure a PCC rulebase, you must do the following: · Configure service data flow filters. · Configure PCC action profiles. · Configure PCC rules. To configure a PCC rulebase: 1. Specify a name for the rulebase. For Junos OS Subscriber Aware: [edit unified-edge pcef ] user@host# edit pcc-rulebases rulebase-name For Junos OS Broadband Subscriber Management: [edit services pcef ] user@host# edit pcc-rulebases rulebase-name 2. Specify the PCC rules that the rulebase references and a precedence value (1 through 65,535) for each rule. NOTE: · The same rule can be configured in different rulebases and can have a different precedence. 91 · The precedence assigned must be unique among the configured PCC rules. · A lower precedence value indicates a higher precedence. For example, if a PCC rulebase has two PCC rules with precedence 5 and 10 respectively, the PCC rule with precedence 5 is evaluated first. For Junos OS Subscriber Aware: [edit unified-edge pcef pcc-rulebases rulebase-name] user@host# set pcc-rule rule-name precedence number user@host# set pcc-rule rule-name precedence number user@host# set pcc-rule rule-name precedence number For Junos OS Broadband Subscriber Management: [edit services pcef pcc-rulebases rulebase-name] user@host# set pcc-rule rule-name precedence number user@host# set pcc-rule rule-name precedence number user@host# set pcc-rule rule-name precedence number RELATED DOCUMENTATION Configuring Policy and Charging Control Rules Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment Understanding Application-Aware Policy Control for Subscriber Management Understanding Junos Subscriber Aware Policy and Charging Enforcement Function (PCEF) Configuring RADIUS Servers You must configure RADIUS servers before you can configure a RADIUS network element. A network element is a load-balanced group of RADIUS servers providing policy management for TDF subscribers. To configure a RADIUS server: 92 1. Configure a name for the RADIUS server. [edit access radius] user@host# set servers name 2. Specify the IP address of the RADIUS server. [edit access radius servers name] user@host# set address server-address 3. Configure an interface and IPv4 address to specify the source for RADIUS requests. The MX Series router sends RADIUS requests to the RADIUS server using this source address. [edit access radius servers name] user@host# set source-interface interface [ipv4-address address] 4. Configure a shared secret (password) to be used by the MX Series router and the RADIUS server. [edit access radius servers name] user@host# set secret password 5. Configure the port number to which the RADIUS requests are sent. [edit access radius servers name] user@host# set port port-number 6. Specify the RADIUS server port number to which the MX Series router sends RADIUS accountingstart and accounting-stop requests. RADIUS accounting-start and accounting-stop requests are used when the RADIUS server is not able to initiate a change of authorization (CoA) request without an accounting record. [edit access radius servers name] user@host# set accounting-port port-number 7. Configure the secret password to be used when sending accounting-start requests to the RADIUS server if the accounting secret password is different from the authentication secret password. 93 RADIUS accounting-start requests are used when the RADIUS server is not able to initiate a CoA request without an accounting record. [edit access radius servers name] user@host# set accounting-secret password 8. Configure the number of attempts to contact the RADIUS server that the MX Series router is allowed to make when it does not receive a response to its initial request. You can specify from 1 through 10 retries. The default is 3. [edit access radius servers name] user@host# set retry attempts 9. Configure the amount of time that the MX Series router waits to receive a response from a RADIUS server before retrying a request. By default, the MX Series router waits 3 seconds. You can configure the timeout to be from 1 through 90 seconds. [edit access radius servers name] user@host# set timeout seconds 10. Allow dynamic requests from the RADIUS server so that CoA requests can be received. [edit access radius servers name] user@host# set allow-dynamic-requests 11. Configure the secret password to be used for CoA requests from the RADIUS server. [edit access radius servers name] user@host# set dynamic-requests-secret password 12. Configure a limit to the number of request retries within a specified time interval that the MX Series router can send to the RADIUS server. If the number of retries reaches this limit, the RADIUS server is marked as dead, and the MX Series router begins to send requests to other RADIUS servers in the network element. [edit access radius servers name] user@host# set dead-criteria-retries retry-number interval seconds 94 13. Configure the amount of time that must pass after a RADIUS server is first marked dead until it is marked as alive by the MX Series router. When the MX Series router marks the RADIUS server as alive, it can again send requests to the RADIUS server. [edit access radius servers name] user@host# set revert-interval seconds RELATED DOCUMENTATION Understanding Network Elements | 71 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 Configuring RADIUS Network Elements A network element is a load-balanced group of RADIUS servers providing policy management for TDF subscribers. Before you configure a network element, you must do the following: · Configure the RADIUS servers that are to be part of the network element. To configure a network element: 1. Specify a name for the network element. [edit access radius] user@host# set network-elements name 2. Specify the RADIUS servers that make up the network element. [edit access radius network-elements name] user@host# set server name 3. Assign each server in the network element a priority from 1 through 16 (1 is the highest priority). You can have multiple servers with the same priority in a network element. All access requests are load 95 balanced among the highest priority servers. If all the servers with the highest priority in the network element fail, then requests are load balanced among servers with the next highest priority level. [edit access radius network-elements name server name] user@host# set priority priority 4. Configure the maximum number of requests that can be queued to the network element. When the pending-request queue is full, any additional requests are dropped. [edit access radius network-elements name] user@host# set maximum-pending-reqs-limit number 5. Configure the pending-request queue high watermark for the network element. This is a percentage of the maximum number of requests that can be queued to the network element, which is configured in the maximum-pending-reqs-limit number statement. When the queue size reaches the high watermark, a flow control on message is generated. [edit access radius network-elements name] user@host# set pending-queue-watermark watermark 6. Configure the pending-request queue low watermark for the network element. This is a percentage of the maximum size of the pending-request queue, which is configured in the maximum-pendingreqs-limit watermark statement. When the number of pending requests drops below this low watermark value after having exceeded the high watermark, a flow control off message is generated. [edit access radius network-elements name] user@host# set pending-queue-watermark-abate abate-watermark RELATED DOCUMENTATION Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 Understanding Network Elements | 71 Configuring RADIUS Servers | 91 96 Configuring an AAA Profile An AAA profile is a collection of attributes to specify how the MX Series router interacts with RADIUS servers that control the activation and deactivation of policy and charging control (PCC) rules. Before you configure an AAA profile, you must do the following: · Configure the network elements that are to be included in the AAA profile. To configure an AAA profile: 1. Configure a name for the AAA profile. [edit unified-edge aaa] user@host# set profiles aaa-profile-name 2. Specify the network element providing policy management for TDF subscribers. [edit unified-edge aaa profiles aaa-profile-name radius authentication] user@host# set network-element network-element-name 3. If the RADIUS servers in the network element providing policy management for TDF subscribers cannot initiate a change of authorization (CoA) request without an accounting record, specify that the network element is used for accounting. [edit unified-edge aaa profiles aaa-profile-name radius accounting] user@host# set network-element network-element-name 4. If the RADIUS servers in the network element providing policy management for TDF subscribers cannot initiate a CoA request without an accounting record, enable the initiation of a RADIUS accounting start from the MX Series router to the RADIUS servers. [edit unified-edge aaa profiles aaa-profile-name radius policy] user@host# set coa-accounting enable 5. Configure the RADIUS attribute that you want to carry the PCC rulebase name for rulebase activations from the RADIUS policy server to the MX Series router. By default, the rulebase name is carried in the ERX-Service-Activate Juniper vendor-specific attribute (VSA). 97 a. Specify the numeric value for the RADIUS AVP. [edit unified-edge aaa profiles aaa-profile-name radius policy activationattribute] user@host# set code numeric-code b. If the RADIUS AVP is vendor-specific, specify the vendor identification. [edit unified-edge aaa profiles aaa-profile-name radius policy activationattribute] user@host# set vendor-id vendor-id 6. Configure the RADIUS attribute that you want to carry the PCC rulebase name for rulebase deactivations from the RADIUS policy server to the MX Series router. By default, the rulebase name is carried in the ERX-Service-Deactivate Juniper VSA. a. Specify the numeric value for the RADIUS AVP. [edit unified-edge aaa profiles aaa-profile-name radius policy deactivation-attribute] user@host# set code numeric-code b. If the RADIUS AVP is vendor-specific, specify the vendor identification. [edit unified-edge aaa profiles aaa-profile-name radius policy deactivation-attribute] user@host# set vendor-id vendor-id RELATED DOCUMENTATION Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 Understanding AAA Profiles | 73 Configuring RADIUS Network Elements | 94 98 Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Dynamic Policies When a policy and charging enforcement function (PCEF) profile is configured with dynamic policy control, the policy and charging rules function (PCRF) can both provision policy and charging control (PCC) rules and activate PCC rules that are predefined on the Junos Subscriber Aware PCEF. Before you configure a PCEF profile for dynamic policies, you must do the following: · Configure a Diameter Gx profile. · (Optional) Configure service data flow (SDF) filters. · (Optional) Configure a PCC action profile. · (Optional) Configure PCC rules, PCC rulebases, or both. NOTE: You can add PCC rules or PCC rulebases to a dynamic PCEF profile without being in maintenance mode. To make other changes to a dynamic PCEF profile, you must be in maintenance mode. NOTE: When a PCEF profile includes application-aware PCC rules, you must also include a default Layer 3 or Layer 4 wildcard PCC rule to ensure that the default charging characteristics are applied to unmatched subscriber traffic without dropping that traffic. For example, the default Layer 3 or Layer 4 wildcard PCC rule prevents traffic based on DNS queries from being dropped. In addition, the PCEF profile that includes application-aware PCC rules must also include a wildcard Layer 3 or Layer 4 PCC rule at a lower precedence. To configure a PCEF profile for dynamic policies: 1. Specify a name for the PCEF profile. [edit unified-edge pcef] user@host# edit profiles profile-name 99 2. Specify one or more PCC rules and a precedence for each rule for dynamic policy control. A lower precedence value indicates a higher precedence. [edit unified-edge pcef profiles profile-name] user@host# set dynamic-policy-control pcc-rules rule-name precedence number NOTE: If the profile includes application-aware PCC rules, you must also include a wildcard Layer 3 or Layer 4 PCC rule at a lower precedence. 3. Specify one or more PCC rulebases for dynamic policy control. [edit unified-edge pcef profiles profile-name] user@host# set dynamic-policy-control pcc-rulebases rulebase-name NOTE: Make sure that the PCC rules and PCC rulebases configured in a PCEF profile do not overlap. 4. Specify a Diameter Gx profile. [edit unified-edge pcef profiles profile-name dynamic-policy-control] user@host# set diameter-profile gx-profile-name RELATED DOCUMENTATION Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment | 56 Understanding Junos Subscriber Aware Policy and Charging Enforcement Function (PCEF) | 52 Configuring Policy and Charging Control Rules | 86 Configuring a Policy and Charging Control Rulebase | 89 100 Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Static Policies A policy and charging enforcement function (PCEF) profile configured for static policy control specifies that policy and charging control (PCC) rules are provisioned by the Junos Subscriber Aware PCEF with no interaction from the policy and charging rules function (PCRF). NOTE: To make a change to a static PCEF profile, you must be in maintenance mode. (See "Changing PCEF Profiles, PCC Rules, PCC Rulebases, Diameter Profiles, Flow Descriptions, and PCC Action Profiles" on page 220). Before you configure a PCEF profile for static policies, you must do the following: · Configure service data flow filters for PCC rules. · Configure PCC action profiles for PCC rules. · Configure PCC rules. · (Optional) Configure PCC rulebases. To configure a PCEF profile for static policies: 1. Specify a name for the PCEF profile. [edit unified-edge pcef] user@host# edit profiles profile-name 2. Specify one or more PCC rules and a precedence for each rule for static policy control. A lower precedence value indicates a higher precedence. [edit unified-edge pcef profiles profile-name] user@host# set static-policy-control pcc-rules rule-name precedence number 3. Specify one or more PCC rule bases for static policy control. [edit unified-edge pcef profiles profile-name] user@host# set static-policy-control pcc-rulebases rulebase-name 101 RELATED DOCUMENTATION Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment | 56 Understanding Junos Subscriber Aware Policy and Charging Enforcement Function (PCEF) | 52 Configuring Policy and Charging Control Rules | 86 Configuring a Policy and Charging Control Rulebase | 89 Understanding Static Time-of-Day PCC Rule Activation and Deactivation | 74 Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Policies That a RADIUS Server Controls A policy and charging enforcement function (PCEF) profile configured for policy control by a RADIUS server specifies that the RADIUS server activates and deactivates policy and charging control (PCC) rulebases that you have predefined on the MX Series router. Before you configure a PCEF profile for policies controlled by a RADIUS server, you must do the following: · Configure PCC rulebases. · Configure an AAA profile. To configure a PCEF profile for policies controlled by a RADIUS server: 1. Specify a name for the PCEF profile. [edit unified-edge pcef] user@host# edit profiles profile-name 2. Specify one or more PCC rule bases for policy control by a RADIUS server. [edit unified-edge pcef profiles profile-name] user@host# set aaa-policy-control pcc-rulebases rulebase-name 3. Specify the AAA profile that identifies the RADIUS server policy control parameters. [edit unified-edge pcef profiles profile-name] user@host# set aaa-policy-control aaa-profile aaa-profile-name 102 4. Configure the user password for subscribers assigned to this PCEF profile. [edit unified-edge pcef profiles profile-name] user@host# set aaa-policy-control user-password password RELATED DOCUMENTATION Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment | 56 Understanding Junos Subscriber Aware Policy and Charging Enforcement Function (PCEF) | 52 Configuring Policy and Charging Control Rules | 86 Configuring a Policy and Charging Control Rulebase | 89 Configuring an AAA Profile | 96 Configuration of Static Time-of-Day PCC Rule Activation and Deactivation Overview You configure static time-of-day PCC rule activation and deactivation to specify when a rule or rulebase within a static PCEF profile is active. To configure static time-of-day PCC rules activation and deactivation: 1. Configure an NTP server. See "Configuring the NTP Server" on page 103. 2. Configure the activation and deactivation settings and apply them to a rule or rulebase. See "Configuring Static Time-of-Day PCC Rule Activation and Deactivation in a Junos OS Subscriber Aware PCEF Profile" on page 103 RELATED DOCUMENTATION Understanding Static Time-of-Day PCC Rule Activation and Deactivation | 74 103 Configuring the NTP Server Before you use the static or dynamic time-of-day functionality for PCC rules, you must configure an NTP server. To configure the NTP server: 1. Specify the IP address of the NTP server. [edit system] user@host# set ntp server ip-address 2. Enable the NTP process on the router. [edit system] user@host# set processes ntp enable RELATED DOCUMENTATION Configuring Static Time-of-Day PCC Rule Activation and Deactivation in a Junos OS Subscriber Aware PCEF Profile | 103 Understanding Static Time-of-Day PCC Rule Activation and Deactivation | 74 Configuring Static Time-of-Day PCC Rule Activation and Deactivation in a Junos OS Subscriber Aware PCEF Profile You configure static time-of-day PCC rule activation and deactivation to specify when to activate or deactivate a rule or rulebase within a static PCEF profile. Before you configure static time-of-day PCC rule activation and deactivation, configure the NTP server. To configure static time-of-day PCC rule or rulebase activation and deactivation within a PCEF profile: 1. Specify a name for a time-of-day profile. [edit unified-edge pcef] user@host# set pcc-time-of-day-profiles profile-name 104 2. Specify the activation time in the time-of-day profile. [edit unified-edge pcef pcc-time-of-day-profiles profile-name] user@host# set rule-activation-time <day-of-week | day-of-month month> <hour:min> You can specify the time of day, the day, and the month of the year. The day can be expressed as the day of the month (DAY1 through DAY31 or Last-day-of-month) or the day of the week (for example, MONDAY). If you specify the day of the month, you can also specify the month of the year. If a time zone is configured on the router, the time-of-day settings apply to the configured time zone. 3. Specify the deactivation time in the time-of-day profile. Use the same combination of options that you used in Step "2" on page 104. [edit unified-edge pcef pcc-time-of-day-profiles profile-name] user@host# set rule-deactivation-time <day-of-week | day-of-month month> <hour:min> If a day is not specified and the deactivation time of day setting is earlier than the activation time of day setting, then a rule is deactivated the day after it is activated. 4. Within a static PCEF profile, apply the time-of-day profile to individual rules or rulebases. [edit unified-edge pcef profiles profile-name static-policy-control] user@host# set pcc-rules rule-name precedence number time-of-day-profile profile-name user@host# set pcc-rulebases rulebase-name time-of-day-profile profile-name Those rules or rulebases use the activation and deactivation settings for subscribers assigned to the PCEF profile. RELATED DOCUMENTATION Understanding Static Time-of-Day PCC Rule Activation and Deactivation | 74 Configuring the NTP Server | 103 Understanding PCEF Profiles | 70 105 Configuring TDF Subscriber Usage Monitoring for Traffic That Matches Predefined PCC Rules You can configure usage monitoring of TDF subscriber traffic that matches particular data flows or applications that are identified in a predefined PCC rule by identifying the appropriate monitoring key in the pcc-action-profile of the PCC rule. This monitoring key controls usage reporting for all the predefined PCC rules that use this pcc-action-profile. To configure usage monitoring for a predefined PCC rule: · For the pcc-action-profile that is used in the predefined PCC rule, specify the monitoring key that controls reporting: [edit unified-edge pcef pcc-action-profiles profile-name] user@host# set monitoring-key key_string RELATED DOCUMENTATION Understanding Usage Monitoring for TDF Subscribers | 74 Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware | 83 106 CHAPTER 6 Configuring TDF Subscribers IN THIS CHAPTER IP-Based and IFL-Based TDF Subscribers Overview | 107 IP-Based Subscriber Setup Overview | 107 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 Understanding Source IP Filtering with Address Pools in TDF Domains for IP-Based Subscribers | 110 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 Snooping RADIUS Accounting Requests for IP-Based Subscribers Overview | 114 Understanding IFL-Based Subscriber Setup | 115 Understanding the Definition of a Set of IFL-Based Subscriber Properties with a TDF Domain | 116 Configuring IP-Based TDF Subscriber Setup When MX Series Router Is a RADIUS Server | 117 Configuring IP-Based TDF Subscriber Setup When Accounting Requests Are Snooped | 118 Configuring Address Pools for Source-IP Filtering of IP-Based Subscribers | 119 Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Configuring RADIUS Clients That Send Accounting Requests for IP-Based Subscribers | 128 Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Configuring Snooping of RADIUS Accounting Requests for IP-Based Subscribers | 136 Configuring IFL-Based TDF Subscriber Setup | 139 Configuring IFL-Based TDF Subscribers and Properties with a TDF Domain | 140 Configuring a TDF Logical Interface | 143 Configuring TDF Interface to Access Interface Associations in VRFs | 144 107 IP-Based and IFL-Based TDF Subscribers Overview IN THIS SECTION IP-Based Subscribers | 107 IFL-Based Subscribers | 107 Junos Subscriber Aware implements the Third-Generation Partnership Project (3GPP) traffic detection function (TDF), enabling subscriber-aware policy enforcement and traffic steering that is applicationaware. Before a user's data traffic can undergo TDF processing, a TDF subscriber session must be set up. You can configure two types of TDF subscribers: IP-Based Subscribers IP-based subscriber sessions are initiated when Junos Subscriber Aware processes a RADIUS accounting start request for a potential subscriber from a gateway GPRS support node (GGSN), Packet Data Network Gateway (PGW), or broadband network gateway (BNG). An IP-based subscriber session is for one unique user IP address. IFL-Based Subscribers IFL-based subscriber sessions are initiated when you configure the TDF subscriber and assign it a set of interfaces. All traffic that the MX Series router receives on those interfaces shares the same IFL-based subscriber session. RELATED DOCUMENTATION IP-Based Subscriber Setup Overview | 107 Understanding IFL-Based Subscriber Setup | 115 IP-Based Subscriber Setup Overview Junos Subscriber Aware initiates an IP-based subscriber session when it receives a RADIUS accounting request from a gateway GPRS support node (GGSN), Packet Data Network Gateway (PGW), or 108 broadband network gateway (BNG). An individual subscriber session is created for each unique source IP address. The MX Series router can receive a RADIUS accounting request in two ways: · When the MX Series router is identified as a RADIUS server for the GGSN, PGW, or BNG, you configure the GGSN, PGW, or BNG as a RADIUS client of the MX Series router. The RADIUS client sends the accounting request to a designated interface and IP address on the MX Series router, which sends it to the subscriber processing module. · When the GGSN, PGW, or BNG does not treat the MX Series router as a RADIUS server, you configure a filter called a snoop segment. Junos OS examines RADIUS accounting requests that pass through the MX Series router to determine whether they match the filter, which is known as snooping. When an accounting request matches the filter, Junos OS copies the request and sends it to the subscriber processing module. You specify how an IP-based subscriber session is created and how a subscriber's traffic is processed by configuring TDF domains and PCEF profiles, and configuring a selection process for applying them to subscribers. The selection process identifies the attribute-value pair (AVP) values in the RADIUS accounting start request that must be matched to select a particular TDF domain or PCEF profile. RELATED DOCUMENTATION IP-Based and IFL-Based TDF Subscribers Overview | 107 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 Snooping RADIUS Accounting Requests for IP-Based Subscribers Overview | 114 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain A traffic detection function (TDF) domain identifies a set of properties for creating a TDF IP-based subscriber session and specifying how TDF subscriber traffic is processed. You can create several TDF domains if you have multiple categories of subscribers. You configure a selection process to assign IPbased subscribers to a TDF domain. Multiple subscribers can be assigned to the same TDF domain. IP-based TDF domains include the following information: · An IP-based type of subscriber. 109 · The TDF logical interface (mif) that handles the subscriber traffic. A TDF interface is distinct from other types of interfaces and is used to associate a TDF domain's subscribers with an access interface in a virtual routing and forwarding table (VRF). The TDF logical interface also identifies the TDF service set that is applied to the traffic. · (Optional) The PCEF profile that must be applied to the TDF subscriber. The PCEF profile specifies how to apply policy and charging rules to the TDF subscriber traffic. If the TDF domain does not specify a PCEF profile, you must configure a PCEF profile selection process in addtion to the TDF domain selection process. · Source IP addresses for uplink traffic and destination IP addresses for downlink traffic that you do not want to undergo TDF processing. · Idle timeout and maximum number of subscribers for the TDF domain. · Source IP addresses for users who can become TDF subscribers, using address pools. · (Not applicable to snooped messages) The enabling or disabling of an immediate RADIUS response message from the MX Series router to the accounting start message received from a gateway GPRS support node (GGSN), Packet Data Network Gateway (PGW), or broadband network gateway (BNG) RADIUS client. · The method for constructing the Subscription-Id for the Diameter credit control request (CCR) message that is sent from the TDF to the PCRF for a TDF subscriber. · The local policy (drop/forward packets, maximum bit rate, burst size) to apply to the subscriber packets entering the access interface of the TDF domain if a TDF subscriber session does not exist. · One or more interfaces that face the access network and can carry traffic for the TDF subscriber. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 IP-Based Subscriber Setup Overview | 107 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 110 Understanding Source IP Filtering with Address Pools in TDF Domains for IP-Based Subscribers The TDF domain that is assigned to an IP-based subscriber can identify a set of source IP addresses of packets that need to undergo TDF processing. These sets of IP addresses are configured using address pools. Address pools can then be added to a TDF domain. Address pools contain a set of IP addresses specified by network prefixes. You can configure more than one set of addresses in an address pool. You can configure address pools to contain IPv4 addresses or IPv6 addresses, but not both. You can configure an address pool as a default pool, and a TDF domain uses the default address pool when an address pool is not explicitly specified for the TDF domain. RELATED DOCUMENTATION Configuring Address Pools for Source-IP Filtering of IP-Based Subscribers | 119 Understanding Selection of Properties for an IP-Based TDF Subscriber When the MX Series router receives a RADIUS accounting start request from the access network's gateway GPRS support node (GGSN), Packet Data Network Gateway (PGW), or broadband network gateway (BNG) for an IP-based subscriber, it needs to select the properties to apply to a subscriber by selecting a traffic detection function (TDF) domain before setting up a TDF subscriber session. The domain-selection configuration identifies the values that various AVPs (such as the 3GPP IMSI or the IPv4 address) in the RADIUS request must match to select a particular TDF domain. For RADIUS requests that were snooped, the domain-selection configuration can identify the snoop segment that matched the request. The domain-selection configuration includes one or more term statements, each of which includes from statements that must all be matched, and a then statement that identifies the name of the TDF domain. When a term matches, further terms are not evaluated if a PCEF profile is specified in either the selected TDF domain or in the then statement. If a PCEF profile is not specified in either the selected TDF domain or in the then statement, further terms are evaluated to find a PCEF profile for the subscriber. If no TDF domain is selected, then the TDF subscriber session is not set up. Before you can configure the TDF domain selection, you must configure a TDF gateway, the TDF domains, and the RADIUS client. 111 The match conditions for TDF domain selection include: · (Not applicable to snooped messages) The RADIUS client (GGSN, PGW, or BNG) that is sending the accounting start request · Values for called-station-id, calling-station-id, class, framed-ip-address, framed-ipv6-prefix, 3gpp- imsi, nas-ip-address, or user-name AVPs · Values for other AVPs you identify Figure 11 on page 111 shows an overview of the IP-based subscriber setup process. Figure 11: IP-Based Subscriber Setup Process 112 RELATED DOCUMENTATION Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based and IFL-Based TDF Subscribers Overview | 107 IP-Based Subscriber Setup Overview | 107 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber As part of the traffic detection function (TDF) subscriber session creation, the subscriber is assigned a policy and charging enforcement function (PCEF) profile, which specifies how policy and charging control (PCC) rules are defined on the TDF. If every IP-based subscriber assigned to a TDF domain can share the same PCEF profile, then the PCEF profile can be specified within the TDF domain, under the [edit unified-edge gateways tdf gatewayname domains] hierarchy level. (For IFL-based subscribers, the PCEF profile must be specified within the TDF domain.) If all of the IP-based subscribers assigned to the same TDF domain cannot share the same PCEF profile, the TDF domain does not specify a PCEF profile, and the PCEF profile selection must be configured under the [edit unified-edge gateways tdf gateway-name domain-selection term] hierarchy level. The domain-selection term consists of a from and a then statement. The from statement identifies the match conditions for the subscriber. This includes the RADIUS client (GGSN, PGW, or BNG) that is sending the accounting start request for the subscriber and the values for particular AVPs in the message. The then statement identifies the PCEF profile to assign to the subscriber. The then statement can also include the name of the TDF domain to assign to the subscriber. If the then statement only includes the PCEF profile, then another domain-selection term must assign a TDF domain to the subscriber. When both a PCEF profile and a TDF domain are assigned to a subscriber in a domain-selection term statement, that PCEF profile is used even if the TDF domain specifies another PCEF profile. Example: The TDF domain domain1 specifies a PCEF profile. The domain-selection term does not need to specify a PCEF profile. [edit unified-edge gateways tdf tdf1] domain-selection { 113 term 1 { from { client { client1; } user-name matches carrierA } then { domain domain1; } } } Example: The TDF domain domain2 does not specify a PCEF profile. A domain-selection term must specify a PCEF profile. In this example, the PCEF profile is specified in the same term as the TDF domain. [edit unified-edge gateways tdf tdf1] domain-selection { term 1 { from { framed-ip-address equals 192.0.2.1/32 } then { domain domain2; pcef-profile pcef3; } } } Example: The TDF domain domain2 does not specify a PCEF profile. A domain-selection term must specify a PCEF profile. In this example, only the first term selects the TDF domain, so other terms must be added to select the PCEF profile. [edit unified-edge gateways tdf tdf1] domain-selection { term 1 { from { client { client2; } 114 user-name matches carrierB } then { domain domain2; } } term 2 { from { framed-ip-address equals 192.0.2.1/32 } then { pcef-profile pcef3; } } term 3{ from { framed-ip-address equals 198.51.100.2/32 } then { pcef-profile pcef4; } } } RELATED DOCUMENTATION IP-Based and IFL-Based TDF Subscribers Overview | 107 IP-Based Subscriber Setup Overview | 107 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Snooping RADIUS Accounting Requests for IP-Based Subscribers Overview When the gateway GPRS support node (GGSN), Packet Data Network Gateway (PGW), or broadband network gateway (BNG) does not identify the MX Series router as a RADIUS server, RADIUS accounting 115 requests are not sent to a particular MX Series router IP address and interface configured for RADIUS messages. In this situation, you can configure the MX Series router to actively examine RADIUS accounting requests that pass through the MX Series router. This process is known as snooping. Junos OS identifies accounting requests that match a filter you configure, copies those requests, and sends them to the subscriber processing module. To configure snooping, you configure filters called snoop segments. You can include the following conditions in a snoop segment: · Destination IP address of the accounting request · Shared secret between the accounting request sender and the MX Series router · (Optional) Destination port of the accounting request · (Optional) MX Series router interface that receives the accounting request · (Optional) Source IP address of accounting requests from a GGSN, PGW, or BNG You can also configure the length of time to cache the accounting request that was snooped. Any duplicate request that is received by the MX Series router within this time is dropped. You can configure multiple snoop segments. RELATED DOCUMENTATION IP-Based Subscriber Setup Overview | 107 Configuring IP-Based TDF Subscriber Setup When Accounting Requests Are Snooped | 118 Configuring Snooping of RADIUS Accounting Requests for IP-Based Subscribers | 136 Understanding IFL-Based Subscriber Setup You use the CLI to configure an IFL-based subscriber for a particular interface or set of access interfaces. All user traffic that uses these interfaces belongs to the same subscriber session. The IFL-based subscriber session becomes active when at least one of its access interfaces is up. You can specify the following types of interfaces: · Physical Layer 3 Ethernet interface · Layer 3 Aggregated Ethernet interface · Integrated routing and bridging (IRB) interface 116 · IRB that contains Ether-channel and physical interface members · Logical Tunnel interface You specify how an IFL-based subscriber's traffic is processed by configuring the properties of the TDF domain in which the IFL-based subscriber is configured, which includes a pointer to the PCEF profile to assign to the subscriber. When an IFL-based subscriber session is created, it is anchored on a session PIC based on a round-robin selection process. If a stand-alone session PIC goes down and any IFL-based subscribers are anchored on that PIC, Junos OS re-anchors a subscriber onto another session PIC. An IFL-based subscriber session is deleted in the following situations: · All of the subscriber's access interfaces are down. When at least one interface comes back up, the subscriber session is restored. · Subscriber is removed from the configuration with the CLI. · Subscriber is set to deactivate with the CLI. · Subscriber is cleared with the CLI. You can later restore the subscriber by using the revert option with the clear command. (See "clear unified-edge tdf subscribers" on page 798.) RELATED DOCUMENTATION IP-Based and IFL-Based TDF Subscribers Overview | 107 Understanding the Definition of a Set of IFL-Based Subscriber Properties with a TDF Domain | 116 Understanding the Definition of a Set of IFL-Based Subscriber Properties with a TDF Domain A traffic detection function (TDF) domain identifies a set of properties for the IFL-based subscribers configured in the TDF domain. You can create several TDF domains if you have multiple categories of subscribers. Multiple subscribers can be assigned to the same TDF domain. TDF domains include the following information: · Logical interface-based type of subscriber. · Name of each subscriber. · Interfaces that belong to a subscriber. An interface can belong to only one subscriber. 117 · The TDF logical interface (mif) that handles the subscriber traffic. A TDF interface is distinct from other types of interfaces and is used to associate a TDF domain's subscribers with an access interface in a virtual routing and forwarding table (VRF). The TDF logical interface also identifies the TDF service set that is applied to the traffic. · The PCEF profile that must be applied to the TDF subscriber. The PCEF profile specifies how to apply policy and charging rules to the TDF subscriber traffic. · Source IP addresses for uplink traffic and destination IP addresses for downlink traffic you do not want to undergo TDF processing. RELATED DOCUMENTATION Configuring IFL-Based TDF Subscribers and Properties with a TDF Domain | 140 Understanding IFL-Based Subscriber Setup | 115 Configuring IP-Based TDF Subscriber Setup When MX Series Router Is a RADIUS Server This task describes how to configure IP-based TDF subscriber setup when the gateway GPRS support node (GGSN), Packet Data Network Gateway (PGW), or broadband network gateway (BNG) identifies the MX Series router as a RADIUS server. An IP-based TDF subscriber is defined by the AVP values in the RADIUS accounting request received. Before you configure the subscriber setup, you must do the following: · Configure the access interfaces on the MX Series router chassis. · Configure the PCEF profile. · Configure the interface and IP address that you want to receive RADIUS requests on the MX Series router. · Configure a TDF gateway. To configure IP-based subscriber setup when the MX Series router acts as a RADIUS server: 1. Configure the TDF interfaces that can be used by TDF subscribers. See "Configuring a TDF Logical Interface" on page 143. 2. Associate the TDF interface to an access interface in a VRF routing instance. See "Configuring TDF Interface to Access Interface Associations in VRFs" on page 144. 118 3. Configure sets of source IP addresses that TDF domains can use to accept traffic. See "Configuring Address Pools for Source-IP Filtering of IP-Based Subscribers" on page 119. 4. Configure TDF domains that can be assigned to subscribers. See "Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain" on page 121. 5. Configure RADIUS clients that can send the subscriber accounting requests. See "Configuring RADIUS Clients That Send Accounting Requests for IP-Based Subscribers" on page 128. 6. Configure how Junos OS selects TDF domains and PCEF profiles for subscribers. See "Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers" on page 130. RELATED DOCUMENTATION IP-Based Subscriber Setup Overview | 107 Configuring IP-Based TDF Subscriber Setup When Accounting Requests Are Snooped This task describes how to configure IP-based TDF subscriber setup when the gateway GPRS support node (GGSN), Packet Data Network Gateway (PGW), or broadband network gateway (BNG) does not identify the MX Series router as a RADIUS server. Before you configure the subscriber setup, you must do the following: · Configure the PCEF profile. · Configure a TDF gateway. To configure IP-based subscriber setup when the MX Series router does not act as a RADIUS server: 1. Configure the TDF interfaces that can be used by TDF subscribers. See "Configuring a TDF Logical Interface" on page 143. 2. Associate the TDF interface to an access interface. See "Configuring TDF Interface to Access Interface Associations in VRFs" on page 144. 3. Configure sets of source IP addresses that TDF domains can use to accept traffic. See "Configuring Address Pools for Source-IP Filtering of IP-Based Subscribers" on page 119. 4. Configure TDF domains that can be assigned to subscribers. See "Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain" on page 121. 119 5. Configure the snooping filters that examine RADIUS accounting requests. See "Configuring Snooping of RADIUS Accounting Requests for IP-Based Subscribers" on page 136. 6. Configure how Junos OS selects TDF domains and PCEF profiles for subscribers. See "Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers" on page 130. RELATED DOCUMENTATION IP-Based Subscriber Setup Overview | 107 Snooping RADIUS Accounting Requests for IP-Based Subscribers Overview | 114 Configuring Address Pools for Source-IP Filtering of IP-Based Subscribers Address pools identify a set of IP addresses that a TDF domain for IP-based subscribers uses to determine which packets undergo TDF processing. To configure address pools: 1. Specify a name for the address pool. [edit access address-assignment] user@host# set address-pools name The pool name can contain letters, numbers, and hyphens (-) and can be up to 63 characters long. 2. Specify the protocol family (inet for IPv4 addresses and inet6 for IPv6 addresses) for the address pool. [edit access address-assignment] user@host# set address-pools name family (inet | inet6) For example, to configure an address pool named mbg-pool1 with IPv4 addresses: [edit access address-assignment] user@host# set address-pools mbg-pool1 family inet 120 3. Specify the network prefix for the address pool for the configured protocol family. [edit access address-assignment] user@host# set address-pools name family (inet | inet6) network [network-prefix] external-assigned NOTE: A address pool must have at least one network prefix configured. You can configure more than one network prefix by including the network statement multiple times. The external-assigned statement is required. For example, to configure an address pool with network prefixes 10.100.0.0/16 and 192.168.0.0/16: [edit access address-assignment] user@host# set address-pools mbg-pool1 family inet network 10.100.0.0/16 external-assigned user@host# set address-pools mbg-pool1 family inet network 192.168.0.0/16 external-assigned 4. (Optional) Specify that the address pool is the default pool. A TDF domain uses the default address pool to specify the source addresses of packets that undergo TDF processing when an address pool is not specified for the TDF domain. [edit access address-assignment] user@host# set address-pools name default-pool RELATED DOCUMENTATION Understanding Source IP Filtering with Address Pools in TDF Domains for IP-Based Subscribers | 110 Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 IP-Based Subscriber Setup Overview | 107 121 Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain IN THIS SECTION Configuring the TDF Domain Name and AAA Parameters | 121 Configuring Address Filtering | 124 Configuring Subscriber Services and Policies | 125 Configuring Access Interfaces | 125 Configuring Session Controls | 126 Configuring Default Policy | 126 You define a set of properties for processing IP-based subscriber traffic and for setting up the subscriber session by configuring a TDF domain. You can create multiple TDF domains. A potential IP-based subscriber is assigned to a TDF domain through a TDF domain-selection process that you configure in another topic. Before you begin to create a TDF domain for IP-based subscribers, make sure that you have done the following: · Configured the TDF interface (mif-) that the TDF domain uses. · Configured the access-facing interfaces that the TDF domain uses. · Configured a VRF routing instance that includes the TDF interface and the access-facing interfaces. · Configured the PCEF profile if the TDF domain specifies one. · Configured the address pool that contains source IP addresses of packets that are excluded from TDF processing for the TDF domain. To configure a TDF domain for IP-based subscribers: Configuring the TDF Domain Name and AAA Parameters To configure the TDF domain name and the AAA parameters that are used by the TDF domain to create TDF IP-based subscriber sessions: 122 1. Specify a name for the TDF domain. The name can be from 1 through 50 characters long. [edit unified-edge gateways tdf gateway-name] user@host# set domains domain-name 2. (Optional) Configure the TDF domain for IP-based subscribers. [edit unified-edge gateways tdf gateway-name domains domain-name] user@host# set subscriber-type ip You may omit this step because the default subscriber-type for TDF domains is ip. 3. Specify one or more methods for constructing the Subscription-Id for the Diameter credit control request (CCR) message that is sent from the TDF to the PCRF for subscribers belonging to the TDF domain. a. Specify the type of information to use for the Subscription-Id. You can specify multiple types, and the order of preference matches the order in which you enter the types. Table 5 on page 123 describes the types. [edit unified-edge gateways tdf gateway-name domains domain-name ipsubscriber] user@host# set subscription-id subscription-id-options entry-name id-components [use-class | useimsi | use-msisdn | use-nai | use-nas-port | use-nas-port-id | use-realm | use-username] You can specify multiple methods by including the entry-name variable multiple times. b. If you selected use-class in Step a, you can also configure a regular expression to parse the Class attribute contents, specify characters to insert between the resulting regular expression groups, and specify the subscription ID type. [edit unified-edge gateways tdf gateway-name domains domain-name ipsubscriber subscription-id] user@host# set use-class regex "value" user@host# set use-class pattern "pattern" user@host# set use-class subscription-id-type (imsi | msisdn | nai | private | sip-uri) where value is a regular expression and pattern indicates the characters to insert between regular expression groups, which are identified with \n for a group number. 123 For example, the following configuration generates " 000118191129|ALICE:DRAV3:" out of " 000118191129#000118191129#ALICE:DRAV3:#7168#nflat#ADSL##" and sets the type to IMSI: [edit unified-edge gateways tdf TDF1 domains domain1 ip-subscriber subscription-id ] user@host# set use-class regex "[^#]*#\([^#]*\)\#\([^#]*\)" user@host# set use-class pattern "\1|\2" user@host# set use-class subscription-id-type imsi c. Specify a constant string for the Subscription-Id-Data value. This constant value is used if none of the subscription-id-options methods can be used. In such a case, the Subscription-Id-Type is END_USER_PRIVATE. [edit unified-edge gateways tdf gateway-name domains domain-name ipsubscriber] user@host# set subscription-id constant value Table 5: Options for id-components of Subscription-Id Option Subscription-Id Type Subscription-Id Data use-class Configurable Entire Class attribute by default. Class attribute value can be parsed with regex option under the [edit unifiededge gateways tdf gateway-name domains domainname subscription-id use-class] hierarchy. use-imsi END_USER_IMSI 3GPP-IMSI use-msisdn END_USER_E164 Calling-Station-Id use-nai END_USER_NAI User-Name use-nas-port END_USER_PRIVATE NAS-Port 124 Table 5: Options for id-components of Subscription-Id (Continued) Option Subscription-Id Type Subscription-Id Data use-nas-port-id END_USER_PRIVATE NAS-Port-Id use-realm END_USER_PRIVATE Realm portion of the User-Name in NAI format use-username END_USER_PRIVATE Username portion of the User-Name in NAI format 4. (Not applicable to snooped messages) Enable or disable the sending of an immediate RADIUS response message to the accounting start message received from a gateway GPRS support node (GGSN), Packet Data Network Gateway (PGW), or broadband network gateway (BNG) RADIUS client (disabled is the default). If the option is disabled, the response is sent after the TDF subscriber session creation is complete. [edit unified-edge gateways tdf gateway-name domains domain-name ipsubscriber] user@host# set immediate-accounting-response (enabled | disabled) Configuring Address Filtering To restrict the traffic that undergoes TDF processing for the TDF domain by identifying source IP addresses for uplink traffic and destination IP addresses for downlink traffic: 1. Identify the network prefix of source and destination IP addresses for packets that do not undergo TDF processing. Specify inet for IPv4 prefixes and inet6 for IPv6 prefixes. [edit unified-edge gateways tdf gateway-name domains domain-name] user@host# set subscriber-exclude-prefix family (inet | inet6) network address net-mask 2. Identify the address pool that contains source and destination IP addresses of packets that undergo TDF processing. Specify inet for IPv4 prefixes and inet6 for IPv6 prefixes. [edit unified-edge gateways tdf gateway-name domains domain-name ipsubscriber ] user@host# set subscriber-address (inet | inet6) pool pool-name 125 NOTE: The address pool must be configured at the [edit access address-assignment] hierarchy level. Configuring Subscriber Services and Policies To configure the services and policies for IP-based subscribers that belong to the TDF domain: 1. Identify the TDF interface for the TDF domain. The TDF domain uses the service set that is applied to this TDF interface. [edit unified-edge gateways tdf gateway-name domains domain-name] user@host# set tdf-interface mif.number NOTE: The TDF interface (mif) must have been previously configured at the [edit interfaces] hierarchy level. 2. (Optional) Identify the PCEF profile that the TDF domain uses to apply policies. If you do not identify a PCEF profile, then the PCEF profile must be assigned under the [edit unifiededge gateways tdf gateway-name domain-selection term] hierarchy. [edit unified-edge gateways tdf gateway-name domains domain-name] user@host# set pcef-profile name NOTE: The PCEF profile must have been previously configured at the [unified-edge pcef] hierarchy level. Configuring Access Interfaces To configure the interfaces that face the access network and carry traffic to and from the IP-based subscribers that belong to the TDF domain: Specify at least one interface. You can specify multiple interfaces. [edit unified-edge gateways tdf gateway-name domains domain-name ip-subscriber] user@host# set access-interfaces interface-name 126 Configuring Session Controls To configure the TDF session controls for subscribers that belong to the TDF domain: 1. Configure the idle timeout (in minutes) for the TDF subscriber session. The range is 0 through 300. [edit unified-edge gateways tdf gateway-name domains domain-name ipsubscriber] user@host# set idle-timeout idle-timeout 2. Configure the default TDF subscriber maximum bit rate (MBR) for uplink and downlink traffic. Uplink traffic originates from the subscriber towards the public data network (PDN), and downlink traffic comes from the PDN and is destined for the subscriber. The range is 0 through 6,144,000 Kbps. [edit unified-edge gateways tdf gateway-name domains domain-name] user@host# set maximum-bit-rate uplink mbr-uplink-value downlink mbr-downlink-value 3. Configure the default TDF subscriber allowed burst size for uplink and downlink traffic. Uplink traffic originates from the subscriber towards the public data network (PDN), and downlink traffic comes from the PDN and is destined for the subscriber. The range is 1500 through 1,500,000,000 bytes. [edit unified-edge gateways tdf gateway-name domains domain-name] user@host# set burst-size uplink uplink-burst-size downlink downlink-burst-size 4. Configure the maximum number of subscriber sessions allowed (in thousands) for the TDF domain. The range is 100 thousands through 5000 thousands. [edit unified-edge gateways tdf gateway-name domains domain-name ipsubscriber] user@host# set maximum-subscribers number Configuring Default Policy To configure the default local policy for handling subscriber traffic entering the access interface of the TDF domain if a TDF subscriber session does not exist: 127 1. Configure the flow action to take on the subscriber's traffic. [edit unified-edge gateways tdf gateway-name domains domain-name ipsubscriber] user@host# set default-local-policy flow-action (drop | forward) 2. Configure the maximum bit rate for the subscriber's traffic. [edit unified-edge gateways tdf gateway-name domains domain-name ipsubscriber] user@host# set default-local-policy maximum-bit-rate uplink mbr-uplink-value downlink mbr-downlinkvalue Uplink traffic originates from the subscriber towards the public data network (PDN); downlink traffic comes from the PDN and is destined for the subscriber. The range is 0 through 6144000 Kbps. 3. Configure the allowed burst size for the subscriber's traffic. [edit unified-edge gateways tdf gateway-name domains domain-name ipsubscriber] user@host# set default-local-policy burst-size uplink uplink-burst-size downlink downlink-burst-size Uplink traffic originates from the subscriber towards the public data network (PDN); downlink traffic comes from the PDN and is destined for the subscriber. The range is 1500 through 1,500,000,000 bytes. RELATED DOCUMENTATION IP-Based and IFL-Based TDF Subscribers Overview | 107 IP-Based Subscriber Setup Overview | 107 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 Configuring Address Pools for Source-IP Filtering of IP-Based Subscribers | 119 Understanding PCEF Profiles | 70 Configuring a Services Interface for a Session PIC or Service PIC | 15 128 Configuring RADIUS Clients That Send Accounting Requests for IP-Based Subscribers You specify an MX Series router RADIUS client for each gateway GPRS support node (GGSN), Packet Data Network Gateway (PGW), or broadband network gateway (BNG) that sends IP-based subscriber session requests and identifies the MX Series router as a RADIUS server. This task is not used for snooped accounting requests. Before you begin to configure a RADIUS client, make sure that you have configured the interface and IP address that you want to receive RADIUS requests on the MX Series router. To configure the RADIUS clients: 1. Configure the name of the RADIUS client. [edit access radius] user@host# set clients client-name 2. Specify the IP address from which the RADIUS client sends the RADIUS requests. [edit access radius] user@host# set clients client-name address client-address 3. Specify the MX Series router interface and IPv4 address that receive RADIUS requests from the GGSN, PGW, or BNG. [edit access radius] user@host# set clients client-name source-interface interface ipv4-address address 4. Configure a shared secret to be used by the MX Series router and the RADIUS client for accounting. [edit access radius] user@host# set clients client-name accounting secret password 129 5. (Optional) Specify that the framed-ip-address is used for subscriber creation when both the framedroute and framed-ip-address attributes are in the RADIUS accounting request from the RADIUS client. The framed-ip-netmask is also used for subscriber creation if it is in the request. [edit access radius] user@host# set clients client-name prefer-framed-ip-address By default, the framed-route attribute is used for subscriber creation when both the framed-route and framed-ip-address attributes are in the RADIUS accounting request. 6. (Optional) Specify that the framed-ipv6-prefix is used for subscriber creation when both the delegated-ipv6-prefix and framed-ipv6-prefix attributes are in the RADIUS accounting request from the RADIUS client. [edit access radius] user@host# set clients client-name prefer-framed-ipv6-prefix By default, the delegated-ipv6-prefix attribute is used for subscriber creation when both the delegated-ipv6-prefix and framed-ipv6-prefix attributes are in the RADIUS accounting request. 7. Configure the duration, in seconds, that the RADIUS response messages (sent for request messages) are stored in the MX Series router response cache before they time out. [edit access radius] user@host# set clients client-name accounting response-cache-timeout seconds 8. Enable the RADIUS client for a specific TDF gateway. [edit unified-edge gateways tdf gateway-name] user@host# set aaa clients client-name Use the client-name that you configured in Step "1" on page 128. RELATED DOCUMENTATION IP-Based Subscriber Setup Overview | 107 130 Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers IN THIS SECTION Configuring the Term Name | 130 Configuring Match Conditions for the RADIUS Client | 131 Configuring Match Conditions for Snoop Segments | 131 Configuring Match Conditions for Predefined AVPs | 131 Configuring Match Conditions for Custom AVP Attributes | 133 Configuring the TDF Domain to Select | 135 Configuring the PCEF Profile to Select | 135 You must configure the criteria that Junos OS uses to select a TDF domain for an IP-based subscriber, which determines how the subscriber session is set up and how the subscriber traffic is treated. (The domain-selection process does not apply to IFL-based subscribers, who are automatically assigned to the TDF domain in which they are configured.) You configure a term to identify conditions that must be matched in the incoming RADIUS request in order to select a particular TDF domain. You configure the selection of the policy-control properties by selecting a PCEF profile. The PCEF profile can be identified in the selected TDF domain, or you can independently configure the criteria for the selection of a PCEF profile. Before you begin to configure TDF domain or PCEF profile selection, make sure that you have done the following: · Configured a TDF gateway. · Configured the TDF domains. · Configured the PCEF profiles. · Configured the RADIUS client. To configure a term for TDF domain or PCEF profile selection, perform the following tasks and repeat this process for each term you want to configure: Configuring the Term Name To configure the name for the term that contains the from statements and the then statement: 131 · Configure a term name that is 1 through 50 characters in length. [edit unified-edge gateways tdf gateway-name domain-selection] user@host# set term term-name Configuring Match Conditions for the RADIUS Client Before you begin to configure a match condition for a RADIUS client, you must ensure that you have configured the RADIUS client at the [edit access radius clients] hierarchy level, and specified it as the aaa-client at the [edit unified-edge gateways tdf gateway-name] hierarchy level. To configure a match condition for the RADIUS client that sent the incoming RADIUS request: · Specify the client. [edit unified-edge gateways tdf gateway-name domain-selection term term-name] user@host# set from client client-name Configuring Match Conditions for Snoop Segments For RADIUS requests that were snooped, the domain-selection configuration can identify the snoop segment that matched the request. To configure a match condition for the snoop segment: · Specify the snoop segment. [edit unified-edge gateways tdf gateway-name domain-selection term term-name] user@host# set from snoop-segment snoop-segment-name Configuring Match Conditions for Predefined AVPs To configure match conditions for the called-station-id, calling-station-id, class, framed-ip-address, framed-ipv6-prefix, 3gpp-imsi, nas-ip-address, or user-name AVP in the incoming RADIUS request from the subscriber: 1. Configure any called-station-id match condition. [edit unified-edge gateways tdf gateway-name domain-selection term term-name] user@host# set from called-station-id (equals | matches) value 132 Use equals to specify a value the called-station-id must equal or use matches to specify a regular expression the called-station-id must match. 2. Configure any calling-station-id match condition. [edit unified-edge gateways tdf gateway-name domain-selection term term-name] user@host# set from calling-station-id equals value or [edit unified-edge gateways tdf gateway-name domain-selection term term-name] user@host# set from calling-station-id matches value Use equals to specify a value the calling-station-id must equal or use matches to specify a regular expression the calling-station-id must match. 3. Configure any class match condition. [edit unified-edge gateways tdf gateway-name domain-selection term term-name] user@host# set from class (equals | has-prefix | has-suffix | matches) value Use equals to specify a value the class must equal, use has-prefix to specify the prefix that the class must have, use has-suffix to specify the suffix that the class must have, or use matches to specify a regular expression the class must match. 4. Configure any framed-ip-address match condition. [edit unified-edge gateways tdf gateway-name domain-selection term term-name] user@host# set from framed-ip-address equals value 5. Configure any framed-ipv6-prefix match condition. [edit unified-edge gateways tdf gateway-name domain-selection term term-name] user@host# set from framed-ipv6-prefix equals value 6. Configure any 3gpp-imsi match condition. [edit unified-edge gateways tdf gateway-name domain-selection term term-name] user@host# set from 3gpp-imsi (equals | has-prefix | has-suffix | matches) value 133 Use equals to specify a value the 3gpp-imsi must equal, use has-prefix to specify the prefix that the 3gpp-imsi must have, use has-suffix to specify the suffix that the 3gpp-imsi must have, or use matches to specify a regular expression the 3gpp-imsi must match. 7. Configure any nas-ip-address match condition. [edit unified-edge gateways tdf gateway-name domain-selection term term-name] user@host# set from nas-ip-address equals value 8. Configure any user-name match condition. [edit unified-edge gateways tdf gateway-name domain-selection term term-name] user@host# set from user-name (equals | has-prefix | has-suffix | matches) value Use equals to specify a value the user-name must equal, use has-prefix to specify the prefix that the user-name must have, use has-suffix to specify the suffix that the user-name must have, or use matches to specify a regular expression the user-name must match. Configuring Match Conditions for Custom AVP Attributes To configure match conditions for up to five custom AVP attributes (other than the called-station-id, calling-station-id, class, framed-ip-address, framed-ipv6-prefix, 3gpp-imsi, nas-ip-address, or user-name) in the incoming RADIUS request from the subscriber: 1. Configure an attribute name that is 1 through 50 characters in length. [edit unified-edge gateways tdf gateway-name domain-selection term term-name] user@host# set from attribute name 2. Configure any match condition for the custom attribute's AVP code. [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name] user@host# set code numeric-code 3. Configure any match condition for the custom attribute's vendor-id. [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name] user@host# set vendor-id vendor-id 134 4. Configure any match condition for custom attribute data in integer format. [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name] user@host# set format integer (equals | greater-than | less-than) value 5. Configure any match condition for custom attribute data in string format. [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name] user@host# set format string (equals | has-prefix | has-suffix | matches) value Use equals to specify a value the string must equal, use has-prefix to specify the prefix that the string must have, use has-suffix to specify the suffix that the string must have, or use matches to specify a regular expression the string must match. 6. Configure any match condition for custom attribute data in time format. [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name] user@host# set format time (equals | greater-than | less-than) value 7. Configure any match condition for custom attribute data in IPv4 address format. [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name] user@host# set format v4address equals value 8. Configure any match condition for custom attribute data in IPv6 address format. [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name] user@host# set format v6address equals value 9. Configure any match condition for custom attribute data in IPv6 address prefix format. [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name] user@host# set format v6prefix equals value 135 Configuring the TDF Domain to Select To specify the TDF domain to select when the from conditions in the term have been matched: · Specify the TDF domain name. [edit unified-edge gateways tdf gateway-name domain-selection term term-name] user@host# set then domain tdf-domain-name Configuring the PCEF Profile to Select If a particular TDF domain does not specify a PCEF profile or you want different members of the same TDF domain to have different PCEF profiles, you must specify the PCEF profile under the [edit unifiededge gateways tdf gateway-name domain-selection] hierarchy level. To specify the PCEF profile to select when the from conditions in the term have been matched, use one of the following methods: · Specify the PCEF profile name in the same term statement that specifies the TDF domain. [edit unified-edge gateways tdf gateway-name domain-selection term term-name] user@host# set from {...} user@host# set then domain tdf-domain-name user@host# set then pcef-profile pcef-profile-name · Specify the PCEF profile name in a different term statement. [edit unified-edge gateways tdf gateway-name domain-selection term term-name] user@host# set from {...} user@host# set then pcef-profile pcef-profile-name RELATED DOCUMENTATION IP-Based and IFL-Based TDF Subscribers Overview | 107 IP-Based Subscriber Setup Overview | 107 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 136 Configuring a TDF Gateway | 16 Configuring RADIUS Clients That Send Accounting Requests for IP-Based Subscribers | 128 Configuring Snooping of RADIUS Accounting Requests for IP-Based Subscribers If a gateway GPRS support node (GGSN), Packet Data Network Gateway (PGW), or broadband network gateway (BNG) does not treat the MX Series router as a RADIUS server, Junos OS must actively snoop RADIUS accounting requests from that gateway to set up TDF subscriber sessions. Snooping uses a filter called a snoop segment to identify the requests to send to the subscriber management module. To configure snooping of RADIUS accounting requests: 1. Configure a name for the snoop segment. [edit access radius] user@host# set snoop-segments snoop-segment-name For example: [edit access radius] user@host# set snoop-segments 123 2. Specify the destination IP address of accounting requests to snoop. [edit access radius snoop-segments snoop-segment-name] user@host# set destination-ip-address destination-address For example: [edit access radius snoop-segments 123] user@host# set destination-ip-address 10.102.30.102 137 3. (Optional) Specify the destination port of accounting requests to snoop. [edit access radius snoop-segments snoop-segment-name] user@host# set destination-port destination-port For example: [edit access radius snoop-segments 123] user@host# set destination-port 52000 If this statement is not included, the destination port is set to 1813. 4. (Optional) Specify the source IP address of accounting requests from a GGSN, PGW, or BNG to snoop. [edit access radius snoop-segments snoop-segment-name] user@host# set source-ip-address source-address For example: [edit access radius snoop-segments 123] user@host# set source-ip-address 10.11.11.11 If the source IP address is not included, snooping of accounting requests is not restricted by their source. 5. Specify the MX Series router interface on which the accounting requests to be snooped are received. [edit access radius snoop-segments snoop-segment-name] user@host# set source-interface source-interface For example: [edit access radius snoop-segments 123] user@host# set source-interface ge-0/0/0.0 If the source interface is not included, snooping of accounting requests is not restricted by the interface that receives the request. 138 6. Specify the shared secret for the MX Series router and the accounting request sender. [edit access radius snoop-segments snoop-segment-name] user@host# set shared-secret secret For example: [edit access radius snoop-segments 123] user@host# set shared-secret juniper If the shared secrets do not match, the subscriber session is not set up. 7. (Optional) Configure the number of seconds to cache the accounting request that was snooped. If the same request is received by the MX Series router within this time, it is considered a duplicate request and is dropped. [edit access radius snoop-segments snoop-segment-name] user@host# set request-cache-timeout timeout For example: [edit access radius snoop-segments 123] user@host# set request-cache-timeout 4 8. Repeat Steps "1" on page 136 through "7" on page 138 to configure additional snoop segments. 9. Assign one or more snoop segments to the TDF gateway. [edit unified-edge gateways tdf gateway-name aaa] user@host# set snoop-segments [snoop-segment-name] For example, the following configures gateway1 to snoop accounting requests destined for the RADIUS server 10.102.30.102 on port 52000 that originate from IP address 10.11.11.11 and are received on interface ge-0/0/0.0: [edit unified-edge gateways tdf gateway1 aaa] user@host# set snoop-segments 123 139 RELATED DOCUMENTATION Snooping RADIUS Accounting Requests for IP-Based Subscribers Overview | 114 Configuring IP-Based TDF Subscriber Setup When Accounting Requests Are Snooped | 118 IP-Based Subscriber Setup Overview | 107 Configuring IFL-Based TDF Subscriber Setup This task describes how to configure IFL-based TDF subscriber setup. Before you configure the subscriber setup, you must do the following: · Configure the interfaces on the MX Series router chassis. · Configure the PCEF profile. · Configure a TDF gateway. To configure IFL-based subscriber setup: 1. Configure the TDF interfaces that TDF subscribers can use. See "Configuring a TDF Logical Interface" on page 143. 2. Associate the TDF interface to an access interface in a VRF routing instance. See "Configuring TDF Interface to Access Interface Associations in VRFs" on page 144. 3. Configure the IFL-based subscribers. See "Configuring IFL-Based TDF Subscribers and Properties with a TDF Domain" on page 140. RELATED DOCUMENTATION Understanding IFL-Based Subscriber Setup | 115 140 Configuring IFL-Based TDF Subscribers and Properties with a TDF Domain IN THIS SECTION Configuring the TDF Domain Name and Type | 140 Configuring IFL-Based Subscribers | 141 Configuring Address Filtering | 142 Configuring Subscriber Services and Policies | 142 Configuring Session Controls | 142 You configure one or more IFL-based TDF subscribers and a set of properties for processing the traffic for those subscribers by configuring a TDF domain. You can create multiple TDF domains. Before you begin to create a TDF domain for IFL-based subscribers, make sure that you have done the following tasks: · Configured the TDF interface (mif-) that the TDF domain uses. · Configured the interfaces that the TDF domain uses. · Configured a VRF routing instance that includes the TDF interface and the interfaces that the TDF domain uses. · Configured the PCEF profile that the TDF domain uses. To configure a TDF domain for IFL-based subscribers, perform the following: Configuring the TDF Domain Name and Type To configure the TDF domain name and type: 1. Specify a name for the TDF domain. The name can be from 1 through 50 characters long. [edit unified-edge gateways tdf gateway-name] user@host# set domains domain-name 141 For example: [edit unified-edge gateways tdf TDF1] user@host# set domains ifl-1 2. Configure the subscriber type for IFL-based subscribers. [edit unified-edge gateways tdf gateway-name domains domain-name] user@host# set subscriber-type ifl Configuring IFL-Based Subscribers To configure IFL-based subscribers: 1. Configure the name for a subscriber. [edit unified-edge gateways tdf gateway-name domains domain-name] user@host# set ifl-subscriber subscriber-name For example: [edit unified-edge gateways tdf TDF1 domains ifl-1] user@host# set ifl-subscriber ifl-sub1 2. Configure one or more interfaces for the subscriber. [edit unified-edge gateways tdf gateway-name domains domain-name subscriber subscriber-name] user@host# set access-interfaces [interface-name] ifl- For example: [edit unified-edge gateways tdf TDF1 domains ifl-1 ifl-subscriber ifl-sub1] user@host# set access-interfaces ae0.736 You can assign only one IFL-based subscriber to an interface. 3. Repeat Step "1" on page 141 and Step "2" on page 141 for each IFL-based subscriber you want to configure in the TDF domain. 142 Configuring Address Filtering To restrict the traffic that undergoes TDF processing for the TDF domain by identifying source IP addresses for uplink traffic and destination IP addresses for downlink traffic: · Identify the network prefix of source and destination IP addresses for packets that do not undergo TDF processing. Specify inet for IPv4 prefixes and inet6 for IPv6 prefixes. [edit unified-edge gateways tdf gateway-name domains domain-name] user@host# set subscriber-exclude-prefix family (inet | inet6) network address net-mask Configuring Subscriber Services and Policies To configure the services and policies for IFL-based subscribers that belong to the TDF domain: 1. Identify the TDF interface for the TDF domain. The TDF domain uses the service set that is applied to this TDF interface. [edit unified-edge gateways tdf gateway-name domains domain-name] user@host# set tdf-interface mif.number NOTE: The TDF interface (mif) must have been previously configured at the [edit interfaces] hierarchy level. 2. Identify the PCEF profile that the TDF domain uses to apply policies. [edit unified-edge gateways tdf gateway-name domains domain-name] user@host# set pcef-profile name NOTE: The PCEF profile must have been previously configured at the [unified-edge pcef] hierarchy level. Configuring Session Controls To configure the TDF session controls for subscribers that belong to the TDF domain: 1. Configure the default TDF subscriber maximum bit rate (MBR) for uplink and downlink traffic. 143 Uplink traffic originates from the subscriber towards the public data network (PDN), and downlink traffic comes from the PDN and is destined for the subscriber. The range is 0 through 6,144,000 Kbps. [edit unified-edge gateways tdf gateway-name domains domain-name] user@host# set maximum-bit-rate uplink mbr-uplink-value downlink mbr-downlink-value 2. Configure the default TDF subscriber allowed burst size for uplink and downlink traffic. Uplink traffic originates from the subscriber towards the public data network (PDN), and downlink traffic comes from the PDN and is destined for the subscriber. The range is 1500 through 1,500,000,000 bytes. [edit unified-edge gateways tdf gateway-name domains domain-name] user@host# set burst-size uplink uplink-burst-size downlink downlink-burst-size RELATED DOCUMENTATION Understanding IFL-Based Subscriber Setup | 115 Understanding the Definition of a Set of IFL-Based Subscriber Properties with a TDF Domain | 116 Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Dynamic Policies | 98 Configuring a Services Interface for a Session PIC or Service PIC | 15 Configuring a TDF Logical Interface A TDF logical interface is distinct from other types of interfaces and is used to associate a TDF domain's subscribers with an access interface in a virtual routing and forwarding (VRF) table and with a TDF service set. You need to configure one TDF interface logical interface (unit) for every TDF domain. To configure a TDF interface, you configure one or more logical interfaces (units) for the interface: 1. Configure a TDF logical interface. Repeat this step for each TDF domain. [edit interfaces] user@host# set mif unit interface-unit-number family family-name 144 2. (Optional) Configure the maximum transmission unit (MTU) size for the TDF logical interface. [edit interfaces] user@host# set mtu mtu-size RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Configuring IFL-Based TDF Subscribers and Properties with a TDF Domain | 140 Configuring TDF Interface to Access Interface Associations in VRFs | 144 Applying Services to Subscriber-Aware Traffic with a Service Set | 146 Configuring TDF Interface to Access Interface Associations in VRFs Junos associates TDF interfaces (mif) with access interfaces. You must configure a virtual routing and forwarding (VRF) table for each TDF domain. The VRF must include the TDF interface and one or more access interfaces for the TDF domain. Before you begin, make sure that you have done the following: · Configured the access interfaces on the MX Series router chassis. · Configured the TDF interfaces. To configure a TDF interface-to-access port mapping in a VRF, specify the VRF and place both the TDF interface (unit) and the physical access interface unit in the same VRF. · Configure the VRF routing instance. [edit routing-instances] user@host# set routing-instance interface mif.n user@host# set routing-instance interface interface-name RELATED DOCUMENTATION Configuring a TDF Logical Interface | 143 Applying Services to Subscriber-Aware Traffic with a Service Set | 146 145 CHAPTER 7 Configuring Services IN THIS CHAPTER Overview of Applying Services to Subscribers | 145 Applying Services to Subscriber-Aware Traffic with a Service Set | 146 Overview of Applying Services to Subscribers Subscriber-aware services are enabled for the subscribers belonging to a specific TDF domain by creating a subscriber-aware service set. This service set is applied to the TDF domain's TDF interface (mif). These services are carried out on the service PIC that is identified by the service interface in the service set. Subscriber-aware services are applied to a subscriber's traffic based on policy and control (PCC) rules. The PCC rules are either under local control, under PCRF dynamic control, or under activation and deactivation control by a RADIUS server, depending on the PCEF profile for the TDF domain. You may also apply network address translation (NAT) services independently of the PCC rules by specifying NAT rules in the service set. 146 Figure 12 on page 146 shows the relationships among subscriber-aware service sets and other configured objects. Figure 12: Subscriber-Aware Service Set Relationships RELATED DOCUMENTATION Applying Services to Subscriber-Aware Traffic with a Service Set | 146 Understanding Junos Subscriber Aware Policy and Charging Enforcement Function (PCEF) | 52 Applying Services to Subscriber-Aware Traffic with a Service Set Junos OS supports subscriber-aware services for the subscribers belonging to a particular TDF domain through the configuration of a subscriber-aware service set. The service set is assigned to the TDF domain's TDF interface (mif). Before you configure the service set, complete the following tasks: · Configure the service PIC for the service set. · Configure the TDF interface (mif). · Configure the PCEF profile at the [edit unified-edge pcef] hierarchy level. · Configure any NAT rules or rule sets that you want to apply. To configure the subscriber-aware services for a TDF domain's subscribers: 147 1. Configure a PCEF profile at the [services] hierarchy level by specifying a name for the PCEF profile. This profile is a placeholder profile with no configuration options, but it must be created. [edit services] user@host# set pcef profile pcef-profile-name 2. Configure an application identification profile by specifying a name for the profile. This profile is a placeholder profile with no configuration options, but it must be created. [edit services application-identification] user@host# set profile app-id-profile-name 3. Configure an HTTP header enrichment profile by specifying a name for the profile. This profile is a placeholder profile with no configuration options, but it must be created. [edit services hcm] user@host# set profile hcm-profile-name 4. Define a subscriber-aware service set. [edit services] user@host# set service-set service-set-name service-set-options subscriber-awareness 5. Enable PCEF services for the service set. Use the profile name that you configured in Step "1" on page 147. [edit services service-set service-set-name] user@host# set pcef-profile pcef-profile-name 6. Enable application identification for the service set. Use the profile name that you configured in Step "2" on page 147. [edit services service-set service-set-name] user@host# set application-identification-profile app-id-profile-name 148 7. Enable HTTP header enrichment for the service set. Use the profile name that you configured in Step "3" on page 147. [edit services service-set service-set-name] user@host# set hcm-profile hcm-profile-name 8. Specify NAT rules or rule-sets for the service set. [edit services service-set service-set-name] user@host# set ([nat-rules rule-name] | nat-rule-sets rule-set-name) 9. Specify the services PIC interface on which the services are performed. [edit services service-set service-set-name] user@host# set interface-service service-interface interface-name The interface-name is amsn if you have redundancy configured and is ms-fpc/pci/0 if you do not have redundancy configured. 10. Apply the service set to the TDF interface (mif) that is part of the TDF domain. [edit interfaces mif unit number family family service] user@host# set input service-set service-set-name user@host# set output service-set service-set-name NOTE: The output service set for the mif is not used by the MX Series router, but it must be configured so that the configuration commit does not fail. RELATED DOCUMENTATION Configuring Service PICs | 18 Configuring a TDF Logical Interface | 143 Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Dynamic Policies | 98 Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Static Policies | 100 149 CHAPTER 8 Configuring Diameter IN THIS CHAPTER Diameter Profiles Overview | 149 Juniper Networks Diameter AVPs for Subscriber Aware Policy Control | 150 Configuring Diameter Overview | 152 Configuring Diameter Profiles | 152 Configuring Diameter Bindings | 154 Configuring Diameter Network Elements | 155 Configuring Diameter AVPs for Gx Applications | 156 Configuring Diameter Peers | 158 Configuring the Diameter Transport | 161 Configuring Advertisements in Diameter Messages | 162 Configuring Parameters for Diameter Applications | 162 Configuring the Origin Attributes of the Diameter Instance | 163 Diameter Profiles Overview The Diameter profile provides network access information for the Diameter application. The Diameter profile specifies prioritized targets, or endpoints, for particular applications. The target specifies the destination realm, network element, and priority associated with the target. Target selection is based on priority. A lower number has a higher priority. For load balancing, targets have the same priority. From the prioritized list of targets for a Diameter profile, the target is selected as follows: · The target with the highest priority (lowest number) is selected. · In the event of a tie, where the priority is the same, target selection alternates among the peers with the same priority. 150 NOTE: Failover handling depends on what enables the policy for the application. Switching between targets based on priority, such as failing over between primary and secondary online charging servers, only occurs if the failover handling policy enables it. After you configure the Diameter profiles, the Diameter applications can reference them. For example, when configuring transport profiles for online charging, you can associate the configured Diameter profile with the transport profile to interact with the online charging server. Similarly, when configuring profiles for provisioning Policy Charging and Control application rules, you can associate the configured Diameter profile with the policy and charging enforcement function (PCEF) profile to interact with the policy and charging rules function (PCRF). RELATED DOCUMENTATION Configuring Diameter Profiles | 152 Juniper Networks Diameter AVPs for Subscriber Aware Policy Control Diameter conveys information by including various attribute-value pairs (AVPs) in Diameter messages. Table 6 on page 150 lists the AVPs for subscriber policy control. Table 6: Juniper Networks Diameter AVPs for Subscriber Policy Control Attribute Number Diameter AVP Description Type 1100 TDF-ApplicationInstance-IdentifierBase Identifies the application-group. UTF8String 1101 Service-ChainingInformation Provides service chaining information for dynamic steering of packets. UTF8String 1102 LRF-Profile-Name Provides the name of the logging and reporting framework (LRF) profile. UTF8String 151 Table 6: Juniper Networks Diameter AVPs for Subscriber Policy Control (Continued) Attribute Number Diameter AVP Description Type 1103 HCM-Profile-Name Provides the name of the HTTP content module. UTF8String 1104 Forwarding-ClassName Provides the forwarding class name on the router. UTF8String 1105 Redirect-VRF Specifies whether redirection is supported. If the application flows support redirection, Redirect-VRF specifies the redirect address and address type. UTF8String 1106 Requested-BurstsizeUL Provides the uplink burst size specified in a QoS policy. Integer32 1107 Requested-BurstsizeDL Provides the downlink burst size specified in Integer32 a QoS policy. 1108 Steering-Information Specifies an optional grouped AVP that contains Steering-Uplink-VRF, SteeringDownlink-VRF, and Steering-IP-Address. Grouped 1109 Steering-Uplink-VRF Provides the address of uplink destination UTF8String for packets if dynamic steering is supported. 1110 Steering-DownlinkVRF Provides the address of downlink destination for packets if dynamic steering is supported. UTF8String 1111 Steering-IP-Address Identifies the IP address for HTTP redirect. Address 152 Configuring Diameter Overview If you are using a PCRF to dynamically control subscriber-aware policies, you must configure Diameter. To configure Diameter for PCRF-controlled subscriber-aware policies: 1. Configure the remote peer to which the MX Series router sends Diameter messages. See "Configuring Diameter Peers" on page 158. 2. Identify the session PIC and PIC interfaces for a Diameter network element. See "Configuring Diameter Bindings" on page 154. 3. Configure the peers in a Diameter network element. See "Configuring Diameter Network Elements" on page 155. 4. Configure network access information in a Diameter profile. See "Configuring Diameter Profiles" on page 152. 5. (Optional) Specify the Diameter attribute-value pairs (AVPs) to include and exclude in the credit control request (CCR) messages. See "Configuring Diameter AVPs for Gx Applications" on page 156. 6. Configure the Diameter transport. See "Configuring the Diameter Transport" on page 161. 7. Configure the information to be advertised in Diameter messages. See "Configuring Advertisements in Diameter Messages" on page 162. 8. Configure the maximum number of pending requests for a Diameter application. See "Configuring Parameters for Diameter Applications" on page 162. 9. Configure the endpoint node that originates Diameter messages. See "Configuring the Origin Attributes of the Diameter Instance" on page 163. RELATED DOCUMENTATION Diameter Profiles Overview | 149 Configuring Diameter Profiles The Diameter profile provides network access information for the Diameter application. 153 NOTE: To make a change to a Diameter profile, you must be in maintenance mode. (See "Changing PCEF Profiles, PCC Rules, PCC Rulebases, Diameter Profiles, Flow Descriptions, and PCC Action Profiles" on page 220). To configure the Diameter profile: 1. Create the Diameter profile for the Gx application (gx-profile). [edit] user@host# set unified-edge diameter-profiles gx-profile profile-name 2. Set up the target for the profile. [edit unified-edge diameter-profiles gx-profile profile-name] user@host# set targets target-name 3. Specify the destination realm associated with the target. [edit unified-edge diameter-profiles gx-profile profile-name targets targetname] user@host# set destination-realm realm-name 4. Specify the priority associated with the target. The prioritization determines failover or load-balancing behavior. For load balancing, configure the targets with the same priority. [edit unified-edge diameter-profiles gx-profile profile-name targets targetname] user@host# set priority priority-value 5. Specify the network element associated with the target. [edit unified-edge diameter-profiles gx-profile profile-name targets targetname] user@host# set network-element element-name 154 6. (Optional) Specify the destination host associated with the target. [edit unified-edge diameter-profiles gx-profile profile-name targets targetname] user@host# set destination-host hostname RELATED DOCUMENTATION Diameter Profiles Overview | 149 Configuring Diameter Bindings | 154 Configuring Diameter Network Elements | 155 Configuring Diameter AVPs for Gx Applications | 156 Configuring Diameter Peers | 158 Configuring the Diameter Transport | 161 Configuring Advertisements in Diameter Messages | 162 Configuring Parameters for Diameter Applications | 162 Configuring the Origin Attributes of the Diameter Instance | 163 gx-profile | 429 diameter (TDF Gateway) | 370 diameter (Subscriber Aware Policy Control) | 368 Configuring Diameter Bindings You can configure a Diameter network element to run on a specific session PIC. You can organize other session PICs in a group around the selected session PIC on which the configured network element runs. When organized in a group, the selected session PIC can send and receive messages for other session PICs in the group. By default, every Diameter network element runs on every session PIC. NOTE: If you want to set up Diameter bindings for session PICs on the broadband gateway, contact Juniper Networks Professional Services for assistance. To configure the Diameter binding for network elements: 155 1. Configure the network element used for the Diameter binding on the broadband gateway. [edit] user@host# set unified-edge tdf gateway gateway-name diameter network-element element-name 2. Specify the session PICs group that serves the network element. [edit unified-edge tdf gateway gateway-name diameter network-element elementname] user@host# set session-pics group group-name 3. Specify the session PIC interfaces in this group that serve the network element. The interface must be a multiservices interface. [edit unified-edge tdf gateway gateway-name diameter network-element elementname session-pics group group-name] user@host# set session-pic ams number user@host# set session-pic ms-fpc/pic/port RELATED DOCUMENTATION Configuring Diameter Profiles | 152 Configuring Diameter Network Elements A Diameter network element consists of associated functions and a list of prioritized peers. The functions associate a Diameter application with the network element. The prioritization determines failover or load-balancing behavior for peer selection. Before you configure Diameter network elements, perform the following task: · Define the Diameter peers. See "Configuring Diameter Peers" on page 158. To configure a Diameter network element: 156 1. Specify the name of the network element. [edit access diameter] user@host# set network-element element-name 2. Associate one or more functions with the network element. All functions are associated by default. [edit access diameter network-element element-name] user@host# set function function-name 3. Associate a Diameter peer with the network element and set the priority for the peer. Peers with the lower priority number have the higher priority for peer selection. Peers with the same priority are load-balancing peers so the peer selection alternates between the two peers. [edit access diameter network-element element-name] user@host# set peer peer-name priority priority-value 4. (Optional) Associate a Diameter peer with the network element and set the amount of time to wait for a response from this peer before retransmitting the request to another peer. The default is 4 seconds. [edit access diameter network-element element-name] user@host# set peer peer-name timeout seconds RELATED DOCUMENTATION Configuring Diameter Profiles | 152 Configuring Diameter AVPs for Gx Applications You can exclude Diameter attribute-value pairs (AVPs) from or include in the credit control request (CCR) messages between the MX Series router and the policy and charging rules function (PCRF) server. 157 NOTE: The configuration of the Diameter AVPs for dynamic PCEF policies is optional. To configure Diameter AVPs for Gx applications: 1. Specify the name of the Diameter Gx profile for which you are configuring the Diameter AVPs. [edit] user@host# edit unified-edge diameter-profiles gx-profile profile-name The Diameter Gx profile name can contain letters, numbers, and hyphens (-) and can be up to 128 characters long. 2. Specify the optional AVPs to be excluded from the CCR messages between the MX Series router and the PCRF. By default, all AVPs are included in the CCR messages. [edit unified-edge diameter-profiles gx-profile profile-name] user@host# set attributes exclude [attribute] You can specify more than one AVP in a single line. Table 7 on page 157 describes the AVPs that you can exclude from CCR messages. Table 7: Diameter AVP Exclusions for Gx Applications AVP Information in AVP an-gw-address AN-GW-Address AVP, which contains the IP addresses of the access node gateway. default-eps-bearer-qos Default-EPS-Bearer-QoS AVP. packet-filter-information Packet-Filter-Information AVP. packet-filter-operation Packet-Filter-Operation AVP. rat-type RAT-Type AVP. 158 3. Specify the optional AVPs to be included in the CCR messages between the MX Series router and the PCRF. By default, all AVPs are included in the CCR messages. [edit unified-edge diameter-profiles gx-profile profile-name] user@host# set attributes include [attribute] You can specify more than one AVP in a single line. Table 8 on page 158 describes the AVPs that you can included in CCR messages. Table 8: Diameter AVP Inclusions for Gx Applications AVP Information in AVP gx-capability-list Gx-capability-list AVP. rule-suggestion Rule-suggestion AVP. RELATED DOCUMENTATION Configuring Diameter Profiles | 152 Configuring Diameter Peers You can configure the remote peers to which Diameter sends messages. Port 3868 is used for active connections to peers by default. To configure a remote peer for a Diameter instance: 1. Specify the name of the Diameter peer. [edit access diameter] user@host# set peer peer-name 159 2. Specify the address of the Diameter peer. [edit access diameter peer peer-name] user@host# set address ip-address 3. Specify the transport that Diameter uses for active connections to the peer. [edit access diameter peer peer-name] user@host# set connect-actively transport transport-name 4. (Optional) Specify the port that Diameter uses for active connections to the peer. The default is port 3868. [edit access diameter peer peer-name] user@host# set connect-actively port port-number 5. (Optional) Specify the time to wait for connection acknowledgment from the peer. The default is 10 seconds. [edit access diameter peer peer-name] user@host# set connect-actively timeout seconds 6. (Optional) Specify the time to wait before trying to reconnect to a peer after receiving a Disconnect-Peer-Request message with the DO_NOT_WANT_TO_TALK_TO_YOU value for the Disconnect-Cause AVP. If you do not set a value, no reconnection attempt is made. [edit access diameter peer peer-name] user@host# set connect-actively repeat-timeout seconds 7. (Optional) Specify the time to wait for a Capabilities-Exchange-Answer message from the peer. The default is 10 seconds. [edit access diameter peer peer-name] user@host# set connect-actively capabilities-exchange-timeout seconds 160 8. (Optional) Specify the time to wait between connection attempts for this peer. The default is 30 seconds. [edit access diameter peer peer-name] user@host# set connect-actively retry-timeout seconds 9. (Optional) Specify the time to wait for a Device-Watchdog-Answer message from the peer. The default is 30 seconds. [edit access diameter peer peer-name] user@host# set watchdog-timeout seconds 10. (Optional) Specify the time to wait in the Closing state while disconnecting this peer. The default is 10 seconds. [edit access diameter peer peer-name] user@host# set disconnect-peer-timeout seconds 11. (Optional) Specify the size of the incoming queue for the peer. The default is 6000. You can specify a smaller value if you want to throttle the peer. [edit access diameter peer peer-name] user@host# set incoming-queue size size 12. (Optional) Specify the size of the outgoing queue for the peer. The default is 6000. You can specify a smaller value if you want to throttle the peer. [edit access diameter peer peer-name] user@host# set outgoing-queue size size 13. (Optional) Specify the high watermark of the outgoing queue for the peer. The default is 80 percent. If the queue size reaches the high watermark, the peer is marked unavailable, any new messages to the Diameter network element are not sent to this peer, and the SNMP trap Diameter_PeerOutQHiWMarkNotif is generated. [edit access diameter peer peer-name] user@host# set outgoing-queue high-watermark high-watermark 14. (Optional) Specify the low watermark of the outgoing queue for the peer. 161 The default is 60 percent. If the queue size descends to the low watermark after reaching the high watermark, the peer becomes available and the SNMP trap Diameter_PeerLowQHiWMarkNotif is generated. [edit access diameter peer peer-name] user@host# set outgoing-queue low-watermark low-watermark RELATED DOCUMENTATION Configuring Diameter Profiles | 152 Configuring the Diameter Transport You can configure one or more transports for a Diameter instance to set the source IP address for the local connection, and optionally configure a routing instance context. The routing instance for the transport connection must match that for the peer, or a configuration error is reported. Multiple peers can share the same transport. To configure a transport for a Diameter instance: 1. Configure the transport name. [edit access diameter] user@host# set transport transport-name 2. Configure the source IP address for the Diameter local transport connection. [edit access diameter transport transport-name] user@host# set address ip-address 3. (Optional) Configure a routing instance, to which the address is bound, for the transport. [edit access diameter transport transport-name] user@host# set routing-instance routing-instance 162 RELATED DOCUMENTATION Configuring Diameter Profiles | 152 Configuring Advertisements in Diameter Messages You can configure information advertised in the Capabilities-Exchange-Request or CapabilitiesExchange-Answer messages. This information includes firmware revision, product name, and vendor identification. To configure the advertisements: 1. (Optional) Specify the value for the Firmware-Revision AVP that is advertised. 0 is the default. [edit access diameter] user@host# set firmware-revision firmware-revision 2. (Optional) Specify the value of the Product-Name AVP that is advertised. Juniper Diameter Client is the default. [edit access diameter] user@host# set product-name name 3. (Optional) Specify the value of the Vendor-Id AVP that is advertised. 2636 is the default. [edit access diameter] user@host# set vendor-id vendor-id RELATED DOCUMENTATION Configuring Diameter Profiles | 152 Configuring Parameters for Diameter Applications You can configure parameters for Diameter applications, including the maximum number of pending requests. 163 To configure the parameters for the Diameter application: 1. Specify the Gx application (pcc-gx), for which you want to configure parameters. [edit access diameter] user@host# set applications pcc-gx 2. (Optional) Specify the maximum number of pending requests for the Diameter application. The default is 20,000. [edit access diameter applications pcc-gx] user@host# set maximum-pending-requests requests RELATED DOCUMENTATION Configuring Diameter Profiles | 152 Configuring the Origin Attributes of the Diameter Instance You can configure the identifying characteristics of the endpoint node that originates Diameter messages for the Diameter instance. The hostname is supplied as the value for the Origin-Host prefix. The realm is supplied as the value for the Origin-Realm attribute-value pair (AVP). To configure the origin attributes: 1. Specify the Origin-Host prefix that originates the Diameter message. [edit access diameter origin] user@host# set host hostname 2. Specify the realm of the host that originates the Diameter message. [edit access diameter origin] user@host# set realm realm-name 164 RELATED DOCUMENTATION Configuring Diameter Profiles | 152 3 PART Configuring Reporting for SubscriberAware Data Sessions Configuring Reporting | 166 166 CHAPTER 9 Configuring Reporting IN THIS CHAPTER Logging and Reporting Function for Subscribers | 166 Log Dictionary for Template Types | 174 Configuring Logging and Reporting for Junos OS Subscriber Aware | 186 Configuring an LRF Profile for Subscribers | 187 Assigning an LRF Profile to Subscribers | 194 Configuring the Activation of an LRF Rule by a PCC Rule | 196 Logging and Reporting Function for Subscribers IN THIS SECTION Log and Report Control | 167 Templates | 167 HTTP Transaction Logging | 172 The logging and reporting function (LRF) enables you to log data for subscriber application-aware policy control sessions and send that data in an IPFIX format to an external log collector using UDP-based transport. These data session logs can include subscriber information, application information, HTTP metadata, data volume, time-of-day information, and source and destination details. Starting in Junos OS Release 16.1R4 and in Junos OS Release 17.2R1, LRF is available in Junos OS Broadband Subscriber Management. Starting in Junos OS Release 19.3R2, LRF is available in Junos OS Broadband Subscriber Management if you have enabled Next Gen Services on the MX240, MX480 or MX960 router with the MX-SPC3 card.. 167 The external collector, which is not a Juniper Networks product, can then use this data to perform analytics that provide you with insights about subscriber and application usage, allowing you to create packages and policies that increase revenue. Log and Report Control A subscriber's data sessions are logged and sent to collectors based on an LRF profile that you configure and associate with the subscriber. The LRF profile includes: · Templates--Specify the type of data that you want sent and the trigger that causes data to be sent. You can configure a maximum of 16 templates in an LRF profile. · Collectors--Identify the destination to send data to. You can configure a maximum of eight collectors in an LRF profile. · LRF rules--Specify the template and collector to use and, if applicable, a data volume limit that triggers the sending of data. An LRF rule's actions are performed when the matching conditions in a static PCC rule that references the LRF rule are met. You can configure a maximum of 32 LRF rules in an LRF profile. To associate the LRF profile with a subscriber: · For Junos OS Subscriber Aware, assign the LRF profile to the subscriber-aware TDF service set that belongs to the TDF interface (mif) in the subscriber's TDF domain. · For Junos OS Broadband Subscriber Management, assign the LRF profile to the service set that is configured for application-aware policy control. Templates NOTE: If you have enabled Next Gen Services with the MX-SPC3 services card, then the DNS, IPv4 extended, IPv6 extended, mobile subscriber, video, and wireline subscriber templates are not supported. You specify the data fields in a template by configuring one or more types for the template; for example, HTTP and IPv4. Each type represents a set of fields, and the template you configure includes fields from all the types you configure. The template is sent to the collector when you configure it, and is re-sent at a configurable interval. The template types that you can select and the fields that are included by each type are: · Device Data--Contains data fields specific to the device collecting the logging feed: 168 · DPI Engine Version · IP address of TDF gateway (in IPv4 format) · DNS--(Not available if Next Gen Services is enabled with the MX-SPC3 services card) Contains the DNS response time data field. · Flow ID--Contains the Flow ID data field. When HTTP multiple transaction logging is enabled, FlowID is an implicit type that gets included with the HTTP template. When the consolidated session log is generated at the time of SESSION_CLOSE, LRF includes the FlowID that can be used to correlate with the HTTP transaction log records. · HTTP--Contains data fields for the HTTP metadata from header fields: · User Agent · Content Length - Request · HTTP Response Code · Language · Host · Location · Http Method · Referer (HTTP) · MIME type · Time to First Byte · IFL subscriber-- Contains data fields specific to IFL-based subscribers: · Subscriber Name--Not applicable for BNG subscribers, hence this value is not be honored (is filled with zero). · IFL Name--Filled with default IFL name (filled with values Next Gen Services IFL) · IPFlow--Contains data fields for the uplink and downlink octets and bytes. When a data record for volume limit is exported, these IPFlow statistics in the record are the actual data received after the last volume limit was reported in that data session and not cumulative data. · Uplink Octets · Downlink Octets 169 · Uplink Packets · Downlink Packets · Ip Protocol--Protocol ID from IP header; for example, 17 (UDP), 6 (TCP). · Record Reason--A value of 1 for the session close and a value of 2 for volume-limit. · IPFlow Extended--Contains data fields for the service set name, routing instance, and payload timestamps. The initiator of the very first packet of a session is the client and the responder is the server. · Service-Set-Name--Filled with active service-set-name (16 byte value is filled active service-set- name. For example, if service-set-name is: bng-service-set-1, the template has a value of: bngservice-set-(16bytes) · Routing-Instance--Not applicable for BNG subscribers, hence this value is not be honored (is filled with zero). · IPFlow TCP--Contains data fields for TCP-related timestamps: · Retransmitted TCP packets uplink · Retransmitted TCP packets downlink · TCP flow creation timestamp · IPFlow TCP Timestamp--Contains IBM-specific data fields for TCP-related timestamps: · Smooth RTT uplink · Smooth RTT downlink · Client setup time · Server Setup time · First Client Payload timestamp · Upload time · First Server Payload timestamp · Download time · Acknowledged volumes uplink · Acknowledged volumes downlink 170 To use the IPFlow TCP Timestamp template when configuring an LRF profile, identify the template as vendor specific to avoid a commit warning. See Configuring an LRF Profile for Subscribers. · IPFlow Timestamp--Contains data fields for the flow start and end timestamps: · Flow Start Time--For TCP, the flow start time is when the SYN packet is received. For UDP, it is when the first packet is sent. · Flow End Time · IPv4--Contains data fields for the basic source and destination IPv4 information: · Source IPv4 Address · Destination IPv4 Address · IPv4 Extended--(Not available if Next Gen Services with the MX-SPC3 services card are enabled) Contains data fields for the elements of IPv4 extended fields: · IPv4 TOS / Class of Service · IPv4 Source Mask · IPv4 Destination Mask · IPv4 Next Hop · IPv6--Contains data fields for the basic source and destination IPv6 information: · Source IPv6 Address · Destination IPv6 Address · IPv6 Extended--(Not available if Next Gen Services are enabled with the MX-SPC3 services card) Contains data fields for the elements of IPv6 extended fields: · IPv6 Source Mask · IPv6 Destination Mask · IPv6 Next Hop · Traffic Class · L7 Application--Contains data fields for the Layer 7 application: · Application Protocol--Application data protocol below the classified application name; for example, http or ssl. · Application Name--Application name; for example, junos:facebook or junos:Netflix. 171 · Host--HTTP header host when application protocol is http, SSL common name when application protocol is ssl, DNS name when application protocol is dns. · Mobile Subscriber--(Not available if Next Gen Services with the MX-SPC3 services card are enabled) Contains data fields specific to mobile subscribers: · IMSI · MSISDN · IMEI · RAT-type · ULI · RADIUS Called Station ID · PCC--Contains the PCC rule name data field.Not applicable if Next Gen Services are enabled. · Status Code Distribution--Contains data fields for the HTTP or DNS status codes: · Status code 1 · Status code 2 · Status code 3 · Status code 4 · Status code 5 · Num Instances 1 · Num Instances 2 · Num Instances 3 · Num Instances 4 · Num Instances 5 · Subscriber Data--Contains data fields for Generic Subscriber information that can be included with wireless (mobile) subscribers or wireline subscribers: · NAS_IP_ADDR--Not applicable for BNG subscribers, hence this value is not be honored (is filled with zero). · Subscriber Type--1 for IP-based subscriber, 2 for IFL-based subscriber. · Subscriber IP Address 172 · Subscriber VRF--Not applicable for BNG subscribers, hence this value is not be honored (is filled with zero). · NAS Port ID--Not applicable for BNG subscribers, hence this value is not be honored (is filled with zero). · Accounting-Session-Id--Not applicable for BNG subscribers, hence this value is not be honored (is filled with zero). · Class--Not applicable for BNG subscribers, hence this value is not be honored (is filled with zero). · NAS Port Type--Not applicable for BNG subscribers, hence this value is not be honored (is filled with zero). · Transport Layer--Contains data fields for the transport layer: · Source Transport Port · Destination Transport Port · Video--(Not available if Next Gen Services with the MX-SPC3 services card are enabled) Contains data fields for video traffic: · Bitrate · Duration · Wireline Subscriber--(Not available if Next Gen Services with the MX-SPC3 serices card are enabled) Contains the UserName data field for wireline subscribers. This is the same as RADIUS Called Station ID. The template that is specified in an LRF rule determines the set of data fields that are included when data is sent to a collector. The data message includes a pointer to the template ID so that the collector can correlate the data contents with the data field lengths and types. In a template, you also specify the type of trigger that determines when to send data to the collector. This trigger type can be a data volume limit, a time limit, or the closing of a data session (UDP sessions are considered closed after 60 seconds of inactivity; TCP sessions are considered closed when a FIN, FIN-ACK, or RST is received). HTTP Transaction Logging You may enable HTTP transaction logging in an LRF profile. This causes each HTTP transaction in a TCP session to be separately logged and sent to the collector, as shown in Figure 13 on page 173. This option is only relevant when the template being used includes HTTP in the template type. 173 By default, HTTP transaction logging is disabled, and the HTTP transaction records for a TCP session are sent together as one group of records. Figure 13: HTTP Transaction Logging Release History Table Release Description 19.3R1 Starting in Junos OS Release 19.3R2, LRF is available in Junos OS Broadband Subscriber Management if you have enabled Next Gen Services on the MX240, MX480 or MX960 router with the MX-SPC3 card.. 16.1R4 Starting in Junos OS Release 16.1R4 and in Junos OS Release 17.2R1, LRF is available in Junos OS Broadband Subscriber Management. RELATED DOCUMENTATION Log Dictionary for Template Types Configuring Logging and Reporting for Junos OS Subscriber Aware Configuring Logging and Reporting for Subscriber Management 174 Log Dictionary for Template Types Table 9 on page 174 shows the logging dictionary of the template types that LRF supports. The log fields are a mix of IETF standard fields and fields that Juniper Networks defined. The IPFIX convention for vendor-defined fields is an enterprise bit set to 1 and an enterprise ID set to the vendor-ID. (The Juniper Networks vendor-ID is 2636.) An IETF standard field has an enterprise bit set to 0 and no value for the enterprise ID. NOTE: If you have enabled Next Gen Services with the MX-SPC3 services card, then the DNS, IPv4 extended, IPv6 extended, mobile subscriber, video, and wireline subscriber templates are not supported. Table 9: Logging Dictionary for Template Types Template Type Field Name Enterprise Bit/ID Information Element Identifier Data Type Device Data DPI Engine 1/2636 503 Version string Data Length (bytes) 32 IP address of 1/2636 502 TDF gateway. ipv4Address 4 DNS (Not DNS response 1/2636 876 available if time Next Gen Services with the MX-SPC3 services card are enabled) dateTimeMillisec 8 onds Flow ID Flow ID 1/2636 107 unsigned32 4 HTTP User Agent 1/2636 152 string 32 175 Table 9: Logging Dictionary for Template Types (Continued) Template Type Field Name Enterprise Bit/ID Information Element Identifier Data Type Data Length (bytes) Content 1/2636 154 Length - Request unsigned32 4 HTTP 1/2636 155 Response Code unsigned16 2 Language 1/2636 156 string 16 Host 1/2636 157 string 64 Location 1/2636 158 string 64 Http Method 1/2636 159 string 8 Referer(HTTP) 1/2636 160 string 64 MIME type 1/2636 161 string 32 Http URI 1/2636 163 string 255 Time to First 1/2636 181 Byte dateTimeMillisec 8 onds 176 Table 9: Logging Dictionary for Template Types (Continued) Template Type Field Name Enterprise Bit/ID Information Element Identifier Data Type Data Length (bytes) IFL Subscriber Subscriber 1/2636 511 Name string 16 Not applicable for BNG subscribers, hence this value is not be honored (is filled with zero). IFL Name 1/2636 512 string 16 Filled with default IFL name (filled with values Next Gen Services IFL) IPFlow Uplink Octets 1/2636 103 unsigned32 4 Downlink 1/2636 104 Octets unsigned32 4 Uplink 1/2636 105 Packets unsigned32 4 Downlink 1/2636 106 Packets unsigned32 4 Ip Protocol 0 4 unsigned8 1 177 Table 9: Logging Dictionary for Template Types (Continued) Template Type Field Name Enterprise Bit/ID Information Element Identifier Data Type Data Length (bytes) Record 1/2636 112 Reason unsigned8 1 IPFlow Service-Set- 1/2636 520 Extended Name string 16 Contains data fields for the service-setname, routinginstance, and payload timestamps. The initiator of the very first packet of a session is the client and the responder is the server. Filled with active service-setname (16 byte value is filled active serviceset-name. For example, if service-setname is: bngservice-set-1, the template has a value of: bngserviceset-(16bytes) 178 Table 9: Logging Dictionary for Template Types (Continued) Template Type Field Name Enterprise Bit/ID Information Element Identifier Data Type Data Length (bytes) Routing- 1/2636 521 Instance string 16 Not applicable for BNG subscribers, hence this value is not be honored (is filled with zero). IPFlow TCP Retransmitted 1/2636 115 Timestamp TCP packets uplink unsigned32 4 Retransmitted 1/2636 116 TCP packets downlink unsigned32 4 Smooth RTT 1/2636 117 uplink dateTimeMillisec 8 onds Smooth RTT 1/2636 118 downlink dateTimeMillisec 8 onds Client setup 1/2636 119 Time dateTimeMillisec 8 onds Server Setup 1/2636 120 time dateTimeMillisec 8 onds 179 Table 9: Logging Dictionary for Template Types (Continued) Template Type Field Name Enterprise Bit/ID Information Element Identifier Data Type Data Length (bytes) TCP flow 1/2636 121 creation timestamp dateTimeMillisec 8 onds First Client 1/2636 108 Payload TS dateTimeMillisec 8 onds Upload time 1/2636 113 dateTimeMillisec 8 onds First Server 1/2636 110 Payload TS dateTimeMillisec 8 onds Download 1/2636 114 time dateTimeMillisec 8 onds Acknowledge 1/2636 122 d volumes uplink unsigned64 8 Acknowledge 1/2636 123 d volumes downlink unsigned64 8 IPFlow Flow Start 1/2636 101 Timestamp Time dateTimeMillisec 8 onds Flow End 1/2636 102 Time dateTimeMillisec 8 onds 180 Table 9: Logging Dictionary for Template Types (Continued) Template Type Field Name Enterprise Bit/ID Information Element Identifier Data Type IPv4 Source IPv4 0 Address Destination 0 IPv4 Address IPv4 Extended IPv4 TOS/ 0 (Not available Class of if Next Gen Service Services with the MX-SPC3 services card are enabled) IPv4 Source Mask 0 IPv4 0 Destination Mask IPv4 Next 0 Hop IPv6 Source IPv6 0 Address Destination 0 IPv6 Address IPv6 Extended IPv6 Source 0 (Not available Mask if Next Gen Services are 8 ipv4Address 12 ipv4Address 5 unsigned8 9 unsigned8 13 unsigned8 15 ipv4Address 27 ipv6Address 28 ipv6Address 29 unsigned8 Data Length (bytes) 4 4 1 1 1 4 16 16 1 181 Table 9: Logging Dictionary for Template Types (Continued) Template Type Field Name Enterprise Bit/ID Information Element Identifier Data Type enabled on the IPv6 0 30 MX-SPC3 Destination services card) Mask IPv6 Next hop 0 62 Traffic Class 1/2636 126 L7 Application Application 1/2636 151 Protocol Application 1/2636 170 Name Host 1/2636 157 Mobile IMSI 1/2636 504 Subscriber (Not available if Next Gen MSISDN 1/2636 505 Services are enabled on the IMEI 1/2636 506 MX-SPC3 services card) RAT-type 1/2636 507 ULI 1/2636 508 unsigned8 ipv6Address unsigned8 string string string string string string unsigned8 string Data Length (bytes) 1 16 1 32 32 64 16 16 16 1 13 182 Table 9: Logging Dictionary for Template Types (Continued) Template Type Field Name Enterprise Bit/ID Information Element Identifier Data Type Data Length (bytes) RADIUS 1/2636 509 string 32 Called Station ID PCC PCC rule 1/2636 901 name string 64 Not applicable if Next Gen Services are enabled. Status Code Status code 1 1/2636 171 Distribution Status code 2 1/2636 172 unsigned16 2 unsigned16 2 Status code 3 1/2636 173 unsigned16 2 Status code 4 1/2636 174 unsigned16 2 Status code 5 1/2636 175 unsigned16 2 Num 1/2636 176 Instances 1 unsigned16 2 Num 1/2636 177 Instances 2 unsigned16 2 Num 1/2636 178 Instances 3 unsigned16 2 183 Table 9: Logging Dictionary for Template Types (Continued) Template Type Field Name Enterprise Bit/ID Information Element Identifier Data Type Data Length (bytes) Num 1/2636 179 Instances 4 unsigned16 2 Num 1/2636 180 Instances 5 unsigned16 2 Subscriber NAS_IP_ADD 1/2636 519 Data R ipv4Address 4 Not applicable for BNG subscribers, hence this value is not be honored (is filled with zero). Subscriber 1/2636 515 Type unsigned8 1 1 for IP-based subscriber, 2 for IFL-based subscriber Subscriber IP 1/2636 516 address ipv4Address 4 184 Table 9: Logging Dictionary for Template Types (Continued) Template Type Field Name Enterprise Bit/ID Information Element Identifier Data Type Data Length (bytes) Subscriber 1/2636 517 VRF unsigned32 4 Not applicable for BNG subscribers, hence this value is not be honored (is filled with zero). NAS Port ID 1/2636 518 string 32 Not applicable for BNG subscribers, hence this value is not be honored (is filled with zero). Accounting- 1/2636 514 Session-Id string 32 Not applicable for BNG subscribers, hence this value is not be honored (is filled with zero). 185 Table 9: Logging Dictionary for Template Types (Continued) Template Type Field Name Enterprise Bit/ID Information Element Identifier Data Type Data Length (bytes) Class 1/2636 522 String 32 Not applicable for BNG subscribers, hence this value is not be honored (is filled with zero). NAS Port 1/2636 523 Type unsigned32 4 Not applicable for BNG subscribers, hence this value is not be honored (is filled with zero). Transport Source 0 7 unsigned16 2 Layer Transport Port Destination 0 Transport Port 11 unsigned16 2 Video (Not Bitrate 1/2636 851 available if Next Gen Services are enabled on the MX-SPC3 services card) unsigned32 2 186 Table 9: Logging Dictionary for Template Types (Continued) Template Type Field Name Enterprise Bit/ID Information Element Identifier Data Type Duration 1/2636 852 Wireline UserName 1/2636 513 Subscriber (Not available if Next Gen Services are enabled on the MX-SPC3 services card) unsigned32 string Data Length (bytes) 4 32 Configuring Logging and Reporting for Junos OS Subscriber Aware To configure logging and reporting for traffic belonging to a set of subscribers, you configure LRF rules, collectors, and templates in an LRF profile; assign that LRF profile to the TDF service set associated with the subscribers' TDF domain; and assign each LRF rule to a PCC rule to activate it. Before you begin to configure logging and reporting, you must: · Configure the TDF domain for the subscriber. · Configure the subscriber-aware service set for those subscribers. To configure logging and reporting: 1. Configure an LRF profile to specify a set of logging and reporting parameters, which includes data templates, collectors, and LRF rules. See "Configuring an LRF Profile for Subscribers" on page 187. 2. Assign the LRF profile to a set of subscribers. See "Assigning an LRF Profile to Subscribers" on page 194. 3. Configure activation of an LRF rule with a static PCC rule. See "Configuring the Activation of an LRF Rule by a PCC Rule" on page 196. 187 RELATED DOCUMENTATION Logging and Reporting Function for Subscribers | 166 Configuring an LRF Profile for Subscribers IN THIS SECTION Configuring the LRF Profile Name | 187 Configuring Policy-Based Logging | 188 (Optional) Configuring HTTP Transaction Logging | 188 Configuring Collectors | 188 Configuring Templates | 190 Configuring Logging and Reporting Rules | 192 NOTE: Starting in Junos OS Release 19.3R1, LRF profiles are also supported for Broadband Subscriber Management if Next Gen Services are enabled on the MX-SPC3 services card. Configure an LRF profile to specify a set of logging and reporting parameters, which includes data templates, collectors, and LRF rules. To configure an LRF profile: Configuring the LRF Profile Name An LRF profile is identified by a name, which you later specify in the service set for the subscribers. · Configure a name for the LRF profile. [edit services lrf] user@host# set profile profile-name 188 For example: [edit services lrf] user@host# set profile lrf_profile1 Configuring Policy-Based Logging Policy-based logging causes the LRF rules to be activated by PCC rules in a static PCEF profile. · Configure policy-based logging in the LRF profile. [edit services lrf profile profile-name] user@host# set policy-based-logging For example: [edit services lrf profile lrf_profile1] user@host# set policy-based-logging (Optional) Configuring HTTP Transaction Logging Configure HTTP transaction logging if you want the HTTP metadata generated and sent separately for each transaction of a data session. This option is only relevant if the template specified in an LRF rule includes http in the template-type. · Configure HTTP transaction logging in the LRF profile. [edit services lrf profile profile-name] user@host# set http-log-multiple-transactions For example: [edit services lrf profile lrf_profile1] user@host# set http-log-multiple-transactions Configuring Collectors Configure one or more collectors that you want to receive logging and reporting data when an LRF rule is activated. You can configure up to eight collectors for an LRF profile. For each collector: 189 1. Configure a name for the collector. [edit services lrf profile profile-name] user@host# set collector collector-name For example: [edit services lrf profile lrf_profile1] user@host# set collector collector1 2. Specify the destination IP address of the collector. [edit services lrf profile profile-name collector collector-name destination] user@host# set address collector-address For example: [edit services lrf profile lrf_profile1 collector collector1 destination] user@host# set address 192.0.2.5 3. Specify the destination port of the collector. [edit services lrf profile profile-name collector collector-name destination] user@host# set port collector-port-number For example: [edit services lrf profile lrf_profile1 collector collector1 destination] user@host# set port 4739 4. Configure the source address to be used when exporting data to the collector. [edit services lrf profile profile-name collector collector-name] user@host# set source-address source-address 190 For example: [edit services lrf profile lrf_profile1 collector collector1] user@host# set source-address 10.1.1.1 Configuring Templates Configure one or more templates, each of which specifies a set of data to be transmitted when an LRF rule is activated. You can configure up to 16 templates for an LRF profile. For each template: 1. Configure a name for the template. [edit services lrf profile profile-name] user@host# set template template-name For example: [edit services lrf profile lrf_profile1] user@host# set template template1 2. Configure a format for the template. Only the IPFIX format is supported for this release. [edit services lrf profile profile-name template template-name] user@host# set format ipfix For example: [edit services lrf profile lrf_profile1 template template1] user@host# set format ipfix 3. Configure the template types, which specify the data fields to include. You must configure at least one type, and you can configure multiple types. [edit services lrf profile profile-name template template-name] user@host# set template-type template-type 191 For example: [edit services lrf profile lrf_profile1 template template1] user@host# set template-type http ipv4 This example results in a template that includes fields from both the HTTP and IPv4 templates. NOTE: If you have enabled Next Gen Services on the MX-SPC3 services card, then the DNS, IFL subscriber, IPv4 extended, IPv6 extended, mobile subscriber, video, and wireline subscriber templates are not supported. 4. If you used the ipflow-tcp-ts template type, identify it as an IBM template to avoid a commit warning. [edit services lrf profile profile-name] user@host# set vendor-support ibm 5. Configure the interval, in seconds, at which you want the template to be retransmitted to the collector. The interval can be from 10 through 600, and the default is 60. [edit services lrf profile profile-name template template-name] user@host# set template-tx-interval tx-time For example: [edit services lrf profile lrf_profile1 template template1] user@host# set template-tx-interval 100 6. Configure the type of trigger that causes the generation of data records and transmission to the collector. You can specify the trigger type as either the closing of the data session (default) or a data volume limit. The data volume limit value is specified within an LRF rule. [edit services lrf profile profile-name template template-name] user@host# set trigger-type (session-close | volume) 192 For example: [edit services lrf profile lrf_profile1 template template1] user@host# set trigger-type volume Configuring Logging and Reporting Rules Configure one or more LRF rules, which control how data sessions are logged and reported. You can configure up to 32 LRF rules for an LRF profile. For each LRF rule: 1. Configure a name for the LRF rule. [edit services lrf profile profile-name] user@host# set rule lrf-rule-name For example: [edit services lrf profile lrf_profile1] user@host# set rule rule1 You cannot use the same LRF rule name in multiple LRF profiles. 2. Specify the collector that you want to receive the data if this rule is matched. [edit services lrf profile profile-name rule lrf-rule-name ] user@host# set then report collector collector-name For example: [edit services lrf profile lrf_profile1 rule rule1] user@host# set then report collector collector1 3. Specify the template that identifies the type of data to report if this rule is matched. [edit services lrf profile profile-name rule lrf-rule-name] user@host# set then report template template-name 193 For example: [edit services lrf profile lrf_profile1 rule rule1] user@host# set then report template template1 4. If you specified volume for the template's trigger type in Step "6" on page 191 of "Configuring Templates" on page 190, configure the data volume limit to be used for reporting by this rule. [edit services lrf profile profile-name rule lrf-rule-name] user@host# set then report volume-limit volume The data volume, in megabytes, can be from 1 through 1024. For example: [edit services lrf profile lrf_profile1 rule rule1] user@host# set then report volume-limit 4 5. If you specified time for the template's trigger type in Step "6" on page 191 of "Configuring Templates" on page 190, configure the time limit to be used for reporting by this rule. [edit services lrf profile profile-name rule lrf-rule-name] user@host# set then report time-limit time-interval The time limit, in seconds, can be from 60 through 1800. The default is 300. For example: [edit services lrf profile lrf_profile1 rule rule1] user@host# set then report time-limit 360 RELATED DOCUMENTATION Logging and Reporting Function for Subscribers Applying Logging and Reporting Configuration to a Subscriber Management Service Set Configuring the Activation of an LRF Rule by a PCC Rule Configuring Custom Application Signatures 194 Assigning an LRF Profile to Subscribers Before you can assign an LRF profile to a set of subscribers, you must: · Configure the LRF profile. · Configure the TDF interface (mif). · Configure the TDF domain for the set of subscribers. · Configure the service set for the TDF domain's TDF interface (mif). Assign the LRF profile to a set of subscribers to apply the profile's logging and reporting configuration to the subscribers' traffic. You accomplish this by assigning the LRF profile to the subscriber-aware TDF service set associated with the TDF interface (mif) in the subscribers' TDF domain. To assign an LRF profile to subscribers: 1. Identify the mif interface in the subscribers' TDF domain. [edit unified-edge gateways tdf] user@host# show domains domain-name For example: [edit unified-edge gateways tdf] user@host# show domains domain1 pcef-profile pcef-prof-static; tdf-interface mif.0; access-interfaces { ge-1/0/1.0; } ... 2. Identify the service set or sets assigned to the mif interface. [edit interfaces] user@host# show mif.number 195 For example: [edit interfaces] user@host# show mif.0 family inet { service { input { service-set sset1; } output { service-set sset1; } } } 3. Assign the LRF profile to the service set or sets. [edit services service-set service-set-name] user@host# set lrf-profile profile-name For example: [edit services service-set sset1] user@host# set lrf-profile lrf_profile1 RELATED DOCUMENTATION Logging and Reporting Function for Subscribers | 166 Configuring an LRF Profile for Subscribers | 187 Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Applying Services to Subscriber-Aware Traffic with a Service Set | 146 Configuring a TDF Logical Interface | 143 196 Configuring the Activation of an LRF Rule by a PCC Rule NOTE: Starting in Junos OS Release 19.3R1, LRF rules are also supported for Broadband Subscriber Management if Next Gen Services are enabled on the MX-SPC3 services card. NOTE: If you are using Junos OS Subscriber Aware, you must be in maintenance mode to make a change to a PCC action profile. (See Changing PCEF Profiles, PCC Rules, PCC Rulebases, Diameter Profiles, Flow Descriptions, and PCC Action Profiles). NOTE: If you are using Junos OS Broadband Subscriber Management, you cannot make a change to a PCC action profile that is being used by subscribers. To modify the PCC action profile, you must first log off the subscribers that are using the PCC action profile. Before you configure activation of an LRF rule by a PCC rule, you must: · Configure the LRF rule in an LRF profile. · Configure policy-based logging in the LRF profile. · Configure the PCC rule. You use a PCC rule's matching conditions to activate an LRF rule, which controls how data sessions are logged and reported. You identify the LRF rule in the PCC rule's action profile. You can configure a PCC rule to activate an LRF rule for Junos OS Subscriber Aware or for Junos OS Broadband Subscriber Management, but you use a different CLI hierarchy level for each product. · If you are using Junos OS Subscriber Aware, configure PCC rules at the [edit unified-edge pcef] hierarchy level. · If you are using Junos OS Broadband Subscriber Management, configure PCC rules at the [edit services pcef] hierarchy level. To configure a PCC rule to activate an LRF rule: 1. Identify the PCC action profile that is used in the PCC rule. 197 For Junos OS Subscriber Aware: [edit unified-edge pcef] user@host# show pcc-rules rule-name For Junos OS Broadband Subscriber Management: [edit services pcef] user@host# show pcc-rules rule-name For example: For Junos OS Subscriber Aware: [edit unified-edge pcef] user@host# show pcc-rules all-traffic from { flows { all; } } then { pcc-action-profile all-traffic-action; } For Junos OS Broadband Subscriber Management: NOTE: The from statement is not applicable for Next Gen Services MX-SPC3 services card. [edit services pcef] user@host# show pcc-rules all-traffic from { flows { all; 198 } } then { pcc-action-profile all-traffic-action; } 2. Assign the LRF rule to the PCC action profile. For Junos OS Subscriber Aware: [edit unified-edge pcef pcc-action-profiles profile-name] user@host# set logging-rule lrf-rule-name For Junos OS Broadband Subscriber Management: [edit services pcef pcc-action-profiles profile-name] user@host# set logging-rule lrf-rule-name For example: For Junos OS Subscriber Aware: [edit unified-edge pcef pcc-action-profiles all-traffic-action] user@host# set logging-rule rule1 For Junos OS Broadband Subscriber Management: [edit services pcef pcc-action-profiles all-traffic-action] user@host# set logging-rule rule1 RELATED DOCUMENTATION Logging and Reporting Function for Subscribers Configuring an LRF Profile for Subscribers Configuring Policy and Charging Control Rules 4 PART Modifying Subscriber-Aware Configuration Modifying Subscriber-Aware Configuration in Maintenance Mode | 200 200 CHAPTER 10 Modifying Subscriber-Aware Configuration in Maintenance Mode IN THIS CHAPTER Maintenance Mode Overview for Subscriber Aware Policy Enforcement | 200 Changing Address Attributes in the Address Pool | 202 Deleting an Address Pool | 203 Changing AMS Interface Parameters on a TDF Gateway | 205 Modifying a TDF Domain | 208 Modifying the TDF Interface of a TDF Domain | 210 Deleting a TDF Domain | 212 Changing a TDF Interface | 214 Deleting a TDF Interface | 216 Changing TDF Gateway Parameters with Maintenance Mode | 218 Changing PCEF Profiles, PCC Rules, PCC Rulebases, Diameter Profiles, Flow Descriptions, and PCC Action Profiles | 220 Deleting a PCEF Profile | 225 Changing Static Time-of-Day Settings for PCC Rules | 231 Deleting a Services PIC | 232 Deleting a Session PIC | 234 Maintenance Mode Overview for Subscriber Aware Policy Enforcement With Junos OS maintenance mode, you can take certain network functionality offline to perform specific maintenance tasks without disrupting service. When the traffic detection function (TDF) domains, TDF gateways, TDF subscribers, TDF interfaces, subscriber polices, or service PICs need maintenance, entering maintenance mode prevents these subscriber services elements from accepting new requests. You have the option of allowing all existing services to complete, or clear them. When ready, you can proceed with critical maintenance functions with a minimum of service disruption. 201 Subscribers who attempt to access a gateway that is in maintenance mode receive a message that the service is not supported. If you want to perform any of the following operations, you must do so in maintenance mode: · Delete or modify the addresses of certain TDF (mif) interfaces · Delete or change the type of a TDF domain · Change TDF interface configuration parameters · Change a TDF interface for a TDF domain · Change a static time-of-day profile · Delete or modify a policy and charging enforcement function (PCEF) profile (However, maintenance mode is not required to add PCC rules or rulebases to a dynamic PCEF profile.) · Delete or modify a PCC rule · Delete or modify a PCC rulebase · Delete or modify a Diameter profile · Delete or modify a flow description · Delete an address pool or modify its parameters You can perform all other maintenance tasks outside of maintenance mode. The maintenance mode procedures listed do not include adding elements. New elements carry no traffic and thus do not need to be gracefully halted. However, you can create new network elements in maintenance mode as an environment in which to test configurations before deploying them. RELATED DOCUMENTATION Changing a TDF Interface | 214 Deleting a TDF Interface | 216 Changing Address Attributes in the Address Pool | 202 Modifying a TDF Domain | 208 Deleting a TDF Domain | 212 Deleting a Session PIC | 234 Deleting a Services PIC | 232 Changing AMS Interface Parameters on a TDF Gateway | 205 202 Changing TDF Gateway Parameters with Maintenance Mode | 218 Changing Address Attributes in the Address Pool This procedure describes how to place an address pool of a virtual routing and forwarding (VRF) instance in maintenance mode, allow all existing sessions using this pool to gracefully terminate, and then delete or modify pool attributes (for example, change address ranges in a pool). To change address attributes in the address pool: 1. From configuration mode, activate maintenance mode for an address pool. [edit] user@host# set routing-instance vrf-name access address-assignment address-pools juniper-pool service-mode maintenance user@host# commit 2. Verify that all subscriber sessions have ended. user@host# run show unified-edge tdf address-assignment pool brief The service mode shows Maintenance Active Phase if all the sessions are cleared. The service mode shows Maintenance In Phase if some sessions are active. The service mode shows Maintenance Out Phase if maintenance mode is not configured (that is, it is in operational mode). 3. (Optional) Terminate existing sessions using the clear command. [edit] user@host# run clear unified-edge tdf subscribers routing-instance juniper-vrf When the subscriber count is zero and all sessions have terminated, the service mode status indicates Maintenance Active phase. In this state, you can modify address pool attributes and commit changes. 4. Make changes to the pool. 203 5. Verify that changes were properly saved. [edit] user@host# run show configuration routing-instance access address-assignment address-pools poolname detail NOTE: These modifications, if made outside of active maintenance mode, fail. 6. Exit maintenance mode to return to normal operational mode. [edit] user@host# delete routing-instance juniper-vrf access address-assignment address-pools pool-name service-mode 7. Return the gateway to operational state. [edit] user@host# run show unified-edge tdf gateway service-mode RELATED DOCUMENTATION Maintenance Mode Overview for Subscriber Aware Policy Enforcement | 200 Deleting an Address Pool | 203 Deleting an Address Pool This procedure describes how to delete an address pool. You must first halt new sessions from being started and verify that no active sessions remain. The steps are similar to those described in "Changing Address Attributes in the Address Pool" on page 202. To delete an address from an address pool: 204 1. From configuration mode, activate maintenance mode for an address pool. [edit] user@host# set routing-instance juniper-vrf access address-assignment address-pools pool-name service-mode maintenance user@host# commit 2. Verify that all subscriber sessions have ended. [edit] user@host# run show unified-edge tdf address-assignment pool brief The service mode shows Maintenance Active Phase if all the sessions are cleared. The service mode shows Maintenance In Phase if some sessions are active. The service mode shows Maintenance Out Phase if maintenance mode is not configured (that is, it is in operational mode). 3. (Optional) Terminate sessions that are using an address pool using the clear command. [edit] user@host# run clear unified-edge tdf subscribers routing-instance juniper-vrf When the subscriber count is zero and all sessions have terminated, the service mode status indicates Maintenance Active phase. In this state, you can modify pool attributes and commit changes. 4. When the subscriber count is zero and all sessions have ended, modify address pool attributes and commit changes. NOTE: These modifications, if made outside of active maintenance mode, fail. 5. Delete the address pool and commit the change. [edit] user@host# delete routing-instance juniper-vrf access address-assignment address-pools juniper-pool user@host# commit 205 6. Verify that the address pool has been deleted (that is, it is not listed in the output). [edit] user@host# run show configuration routing-instance juniper-vrf access address-assignment addresspools juniper-pool RELATED DOCUMENTATION Maintenance Mode Overview for Subscriber Aware Policy Enforcement | 200 Changing Address Attributes in the Address Pool | 202 Changing AMS Interface Parameters on a TDF Gateway This procedure shows how to change the parameters for an aggregated multiservices (AMS) interface on a TDF gateway using maintenance mode at the [edit interfaces] hierarchy level. If an AMS interface is configured under a gateway's session PICs or services PICs, and you change any load-balancing options such as membership of AMS interfaces (mams), then the AMS interface must be in maintenance mode. Before you change AMS parameters using maintenance mode: · Make sure that this change has been coordinated with affected groups and users. To configure maintenance mode and AMS parameter change: 1. Verify the current status of maintenance mode for the AMS. [edit] user@host> show unified-edge tdf gateway-name system interfaces service-mode The service-mode option displays the information details about maintenance mode as well as status. Maintenance Mode MM Active Phase - System is ready to accept configuration changes for all attributes of this object and its sub-hierarchies. MM In/Out Phase - System is ready to accept configuration changes only for non-maintenance mode attributes of this object and its sub-hierarchies. 206 Interface Name ms-1/0/0 ms-1/1/0 ms-2/0/0 ms-2/1/0 pfe-0/0/0 pfe-0/1/0 pfe-0/2/0 pfe-0/3/0 ams1 Gateway Name SCG1 SCG1 SCG1 SCG1 SCG1 SCG1 SCG1 SCG1 SCG1 Service Mode Operational Operational Operational Operational Operational Operational Operational Operational Operational 2. From configuration mode, show the current configuration for the AMS interface. user@host# show interfaces interface-name load-balancing-options { member-interface mams-4/1/0; member-interface mams-5/1/0; member-failure-options { redistribute-all-traffic { enable-rejoin; } } high-availability-options { many-to-one { preferred-backup mams-5/1/0; } } } unit 1 { family inet; } unit 2 { family inet; } 3. On the gateway, place the interface in maintenance mode. [edit] user@host# set unified-edge tdf gateway-name system interface interface-name service-mode 207 maintenance user@host# commit 4. Verify that the AMS interface is in active maintenance mode where configuration changes are accepted for this object and all of its subhierarchies, after you commit the configuration. user@host> show unified-edge tdf gateway-name system interfaces service-mode Maintenance Mode MM Active Phase - System is ready to accept configuration changes for all attributes of this object and its sub-hierarchies. MM In/Out Phase - System is ready to accept configuration changes only for non-maintenance mode attributes of this object and its sub-hierarchies. Interface Name ms-1/0/0 ms-1/1/0 ms-2/0/0 ms-2/1/0 pfe-0/0/0 pfe-0/1/0 pfe-0/2/0 pfe-0/3/0 ams1 Gateway Name SCG1 SCG1 SCG1 SCG1 SCG1 SCG1 SCG1 SCG1 SCG1 Service Mode Operational Operational Operational Operational Operational Operational Operational Operational Maintenance - Active Phase NOTE: All subscribers serviced by the AMS interface must go to zero. You can wait for these conditions to be met, or use the clear command for the interface (or gateway) to force these conditions. 5. Delete or change AMS member interfaces and parameters. user@host> show unified-edge tdf gateway-name system interfaces service-mode [edit unified-edge] user@host# delete unified-edge tdf gateway-name system interface interface-name load-balancingoptions member-interface mams-interface-name [edit interfaces] 208 user@host# set interfaces interface-name load-balancing-options member-interface mams-interfacename user@host# delete interfaces interface-name load-balancing-options high-availability-options many-toone preferred-backup mams-interface-name user@host# set interfaces interface-name load-balancing-options high-availability-options many-to-one preferred-backup mams-interface-name 6. Exit maintenance mode and commit the changes. user@host# delete unified-edge tdf gateway-name system interface interface-name service-mode maintenance user@host# commit RELATED DOCUMENTATION Maintenance Mode Overview for Subscriber Aware Policy Enforcement | 200 Deleting a Session PIC | 234 Deleting a Services PIC | 232 Changing TDF Gateway Parameters with Maintenance Mode | 218 Modifying a TDF Domain This procedure describes how to use maintenance mode to modify a TDF domain. Options include modifying such parameters as TDF domain, mobile-interface, address filtering, AAA parameters, session characteristics, and access interfaces. You must first halt new sessions from being started and verify that there are no active sessions remaining. To change a TDF domain for a group of subscribers that belong to that domain: 1. From configuration mode, activate maintenance mode for an TDF domain. [edit] user@host# set unified-edge gateways tdf gateway-name domains domain-name service-mode maintenance user@host# commit 209 2. Verify that the TDF domain is in maintenance mode. [edit] user@host# run show unified-edge tdf domains service-mode This command displays the service-mode status for all the TDF domains. You can verify the status for the specific TDF domain and take action accordingly. The service mode for the TDF domain shows Maintenance Active Phase if all the sessions using this TDF domain are cleared. The service mode for the TDF domain shows Maintenance - In Phase if some sessions are actively using this TDF domain. 3. Verify that no subscribers are active on the TDF domain. [edit] user@host# run show unified-edge tdf subscribers | match domain-name 4. (Optional) Terminate sessions on a TDF domain using the clear command. [edit] user@host# run clear unified-edge tdf subscribers domain domain-name gateway gateway-name 5. When the subscriber count is zero and all sessions have ended, make and commit changes to the TDF domain in active maintenance mode. NOTE: These modifications must be made in active maintenance mode or they fail. 6. Modify the TDF domain and commit the changes. 7. Exit maintenance mode and commit the changes. [edit] user@host# delete unified-edge gateways tdf gateway-name domains domain-name service-mode user@host# commit 8. Verify that changes were properly committed. [edit] user@host# run show configuration unified-edge gateways tdf gateway-name tdf-services domains domain-name 210 The command output displays the configuration changes you made to the TDF domain. 9. Return the gateway to operational state. [edit] user@host# run show unified-edge tdf gateway service-mode NOTE: Although maintenance mode does not explicitly include AAA options, certain AAA changes require you to place affected TDF domains in maintenance mode first. These changes include changing an AAA profile name and changing authorization or accounting elements. If you attempt to make AAA changes that affect a TDF domain that is not in maintenance mode, you are prompted to place the appropriate TDF domain into maintenance mode before proceeding with AAA profile name or element changes. RELATED DOCUMENTATION Maintenance Mode Overview for Subscriber Aware Policy Enforcement | 200 Modifying the TDF Interface of a TDF Domain | 210 Deleting a TDF Domain | 212 Changing TDF Gateway Parameters with Maintenance Mode | 218 Modifying the TDF Interface of a TDF Domain This procedure describes how to use maintenance mode to modify attributes of the TDF interface for a TDF domain. You must first halt new sessions from being started and verify that no active sessions remain. To configure the mobile interface of a TDF domain: 1. From configuration mode, activate maintenance mode for the TDF domain using the mobile interface to be modified. [edit] user@host# set unified-edge gateways tdf gateway-name domains domain-name service-mode maintenance user@host# commit 211 2. Verify that the TDF domain of this mobile interface is in maintenance mode. [edit] user@host# run show unified-edge tdf domain service-mode From the gateway hierarchy, the service mode for the gateway shows Maintenance Active Phase if all the sessions using this TDF domain are cleared. The service mode for the gateway shows Maintenance In Phase if some sessions are actively using this TDF domain. The service mode for the TDF domain shows Maintenance Out Phase if maintenance mode is not configured (that is, it is in operational mode). You cannot make and commit changes to a mobile interface unless the TDF domain to which it is attached is in maintenance mode. 3. Verify that no subscribers are active on the TDF domain. [edit] user@host# run show unified-edge tdf subscribers | match domain-name 4. (Optional) Terminate sessions that are using an address pool using the clear command. [edit] user@host# run clear unified-edge tdf subscribers domain domain-name gateway gateway-name 5. When the subscriber count is zero and all sessions have ended, make and commit changes to the TDF domain interface in active maintenance mode. NOTE: These modifications must be made in active maintenance mode or they fail. 6. Modify the interface. 7. Exit maintenance mode and commit the changes. [edit] user@host# delete unified-edge gateways tdf gateway-name domain domain-name service-mode user@host# commit 212 8. Verify that changes were properly committed. [edit] user@host# run show configuration unified-edge gateways tdf gateway-name domain domain-name 9. Return the gateway to operational state. [edit] user@host# run show unified-edge tdf service-mode RELATED DOCUMENTATION Maintenance Mode Overview for Subscriber Aware Policy Enforcement | 200 Deleting a TDF Domain | 212 Changing TDF Gateway Parameters with Maintenance Mode | 218 Deleting a TDF Domain This procedure describes how to use maintenance mode to delete a TDF domain. You must first halt new sessions from being started and verify that there no active sessions remain. To delete a TDF domain name: 1. From configuration mode, activate maintenance mode for a TDF domain. [edit] user@host# set unified-edge gateways tdf gateway-name domains domain-name service-mode maintenance user@host# commit 2. Verify that the TDF domain is in maintenance mode. [edit] user@host# run show unified-edge tdf domains service-mode 213 The service mode shows Maintenance Active Phase if all the sessions are cleared. The service mode shows Maintenance In Phase if some sessions are active. The service mode shows Maintenance Out Phase if maintenance mode is not configured (that is, it is in operational mode). 3. Verify that no subscribers are active on the TDF domain. user@host# run show unified-edge tdf domain domain-name gateway gateway-name 4. (Optional) Terminate sessions that are using a TDF domain using the clear command. user@host# run clear unified-edge tdf subscribers domain domain-name gateway gateway-name 5. When the subscriber count is zero and all sessions have ended, delete the TDF domain in active maintenance mode. NOTE: These modifications must be made in active maintenance mode or they fail. 6. Delete the TDF domain and commit the changes. user@host# delete unified-edge gateways tdf gateway-name tdf-services domains domain-name user@host# commit 7. Verify that changes were properly committed by showing the configuration for the entire unified edge to make sure the TDF domain is deleted. [edit] user@host# run show configuration unified-edge gateways tdf gateway-name domain domain-name 8. Return the gateway to the operational state. [edit] user@host# run show unified-edge tdf gateway service-mode RELATED DOCUMENTATION Maintenance Mode Overview for Subscriber Aware Policy Enforcement | 200 Modifying the TDF Interface of a TDF Domain | 210 214 Changing TDF Gateway Parameters with Maintenance Mode | 218 Changing a TDF Interface This procedure describes how to use maintenance mode to halt new sessions from being started and to verify that no active sessions remain before making changes to a TDF interface address. 1. From configuration mode, activate maintenance mode for a gateway. [edit] user@host# set unified-edge gateways tdf gateway-name service-mode maintenance user@host# commit 2. Verify that the TDF gateway is in maintenance mode. [edit] user@host# run show unified-edge tdf gateway service-mode From the gateway hierarchy, the service mode for the TDF gateway shows Maintenance Active Phase if all the sessions using this pool are cleared. The service mode for the gateway shows Maintenance In Phase if some sessions are actively using this pool. 3. Verify that no subscribers are active on this gateway. [edit] user@host# run show unified-edge tdf subscribers gateway gateway-name NOTE: If a large number of subscribers use this gateway, the preceding command can be process intensive, in which case you can use the following command to show the active contexts across all of the gateway instances: [edit] user@host# run show unified-edge tdf status 215 4. (Optional) Terminate sessions that are using the gateway using the following clear command: [edit] user@host# run clear unified-edge tdf subscribers gateway gateway-name CAUTION: This clear command deletes all of the existing subscribers on the gateway. Only issue these commands if you intend to disconnect service to all these subscribers. 5. When the subscriber count is zero, and all sessions have ended, modify the TDF interface in active maintenance mode. [edit] user@host# set unified-edge gateways tdf gateway-name domains domain-name user@host# commit NOTE: These modifications must be made in active maintenance mode or they fail. 6. Verify that changes were properly committed. [edit] user@host# run show configuration unified-edge tdf gateway gateway-name 7. Exit maintenance mode and commit the changes. [edit] user@host# delete unified-edge gateways tdf gateway-name gateway gateway-name service-mode user@host# commit 8. Return the gateway to operational state. [edit] user@host# run show unified-edge tdf gateway service-mode 216 RELATED DOCUMENTATION Maintenance Mode Overview for Subscriber Aware Policy Enforcement | 200 Changing TDF Gateway Parameters with Maintenance Mode | 218 Deleting a TDF Interface | 216 Deleting a TDF Interface This procedure describes how to use maintenance mode to delete a TDF interface. You must first halt new sessions from being started and verify that no active sessions are remaining. You can use maintenance mode to remove any of the TDF interfaces. You can also enter maintenance mode to delete control and data portions of these interface configurations. 1. From configuration mode, activate maintenance mode for a gateway. [edit] user@host# set unified-edge gateways tdf gateway-name service-mode maintenance user@host# commit 2. Verify that the TDF gateway is in maintenance mode. [edit] user@host# run show unified-edge tdf gateway service-mode From the gateway hierarchy, the service mode for the gateway shows Maintenance Active Phase if all the sessions using this pool are cleared. The service mode for the gateway shows Maintenance In Phase if some sessions are actively using this pool. The service mode for the gateway shows Maintenance Out Phase if maintenance mode is not configured (that is, the gateway is in operational mode). 3. Verify that no subscribers are active on this gateway. [edit] user@host# run show unified-edge tdf subscriber gateway gateway-name 217 4. (Optional) Terminate sessions that are using the gateway and clear CDRs using the following clear command. [edit] user@host# run clear unified-edge tdf subscribers gateway gateway-name 5. When the subscriber count is zero, and all sessions have ended, delete the TDF interface in active maintenance mode. NOTE: These modifications must be made in active maintenance mode or they fail. 6. Delete the TDF interface. [edit] user@host# delete unified-edge gateways tdf gateway-name domains domain-name tdf-interface mif interface-name 7. Exit maintenance mode and commit the changes. user@host# delete unified-edge gateways tdf gateway-name gateway gateway-name service-mode user@host# commit 8. Verify that changes were properly committed. user@host# run show configuration unified-edge tdf gateway gateway-name RELATED DOCUMENTATION Maintenance Mode Overview for Subscriber Aware Policy Enforcement | 200 Changing TDF Gateway Parameters with Maintenance Mode | 218 Changing a TDF Interface | 214 218 Changing TDF Gateway Parameters with Maintenance Mode This procedure shows how to change the parameters for a TDF gateway using maintenance mode at the [edit unified-edge gateways tdf gateway-name] hierarchy level. The gateway must be in maintenance mode to change: · Maximum number of sessions · Maximum amount of memory and CPU utilization. Before you change these gateway parameters using maintenance mode: · Make sure that this change has been coordinated with affected groups and users. · Make sure that this change is applied to the correct gateway type and name. To configure maintenance mode for a gateway parameter change: 1. Verify the current status of maintenance mode for the gateway. Under normal operating conditions, the service mode is Operational (that is, not in maintenance mode). user@host> show unified-edge tdf gateway-name service-mode The service-mode option displays the information details about maintenance mode as well as status. Maintenance Mode MM Active Phase - System is ready to accept configuration changes for all attributes of this object and its sub-hierarchies. MM In/Out Phase - System is ready to accept configuration changes only for non-maintenance mode attributes of this object and its sub-hierarchies. Gateway Name Service Mode <gateway-name> Operational 219 2. From configuration mode, place the gateway in maintenance mode. [edit] user@host# set unified-edge tdf gateway-name service-mode maintenance user@host# commit 3. Verify that the gateway is in active maintenance mode where configuration changes are accepted for this object. [edit] user@host> show unified-edge tdf gateway-name service-mode The service-mode option displays the information details about maintenance mode as well as status. Maintenance Mode MM Active Phase - System is ready to accept configuration changes for all attributes of this object and its sub-hierarchies. MM In/Out Phase - System is ready to accept configuration changes only for non-maintenance mode attributes of this object and its sub-hierarchies. Gateway Name Service Mode <gateway-name> Maintenance - Active Phase NOTE: All subscribers serviced by the gateway must go to zero. You can wait for these conditions to be met, or use the clear command for the gateway to force these conditions. 4. Configure the threshold for the maximum amount of CPU that the TDF gateway can use as a percentage from 1 through 90. [edit unified-edge gateways tdf gateway-name] user@host# set cac cpu cpu-pct 220 5. Configure the maximum number of TDF subscriber sessions that may be running, expressed in thousands of sessions. [edit unified-edge gateways tdf gateway-name] user@host# set cac maximum-sessions max-sessions 6. Configure the threshold for the maximum amount of memory that the TDF gateway can use as a percentage from 1 through 90. [edit unified-edge gateways tdf gateway-name] user@host# set cac memory memory-pct 7. Exit maintenance mode and commit the changes. [edit] user@host# delete unified-edge tdf gateway-name service-mode maintenance user@host# commit RELATED DOCUMENTATION Maintenance Mode Overview for Subscriber Aware Policy Enforcement | 200 Changing AMS Interface Parameters on a TDF Gateway | 205 Deleting a Session PIC | 234 Deleting a Services PIC | 232 Changing PCEF Profiles, PCC Rules, PCC Rulebases, Diameter Profiles, Flow Descriptions, and PCC Action Profiles IN THIS SECTION Changing PCEF Profiles, PCC Rules, PCC Rulebases, Diameter Profiles, Flow Descriptions, and PCC Action Profiles with the TDF Domain in Maintenance Mode | 221 221 Changing PCEF Profiles, PCC Rules, PCC Rulebases, Diameter Profiles, Flow Descriptions, and PCC Action Profiles with the TDF Gateway in Maintenance Mode | 223 These procedures show how to enter maintenance mode to halt new sessions from being started and verify that no sessions remain on either the gateway or TDF domain before making changes to the following: · PCEF profiles (However, maintenance mode is not required to add PCC rules or rulebases to a dynamic PCEF profile.) · PCC rules · PCC rulebases · Diameter profiles · Flow descriptions · PCC action profiles NOTE: Even when a PCEF profile is not associated with a TDF domain or a TDF domainselection term, configuration changes or deletion of the PCEF profile and any referenced objects of the profile require you to activate maintenance mode for the TDF gateway. Changing PCEF Profiles, PCC Rules, PCC Rulebases, Diameter Profiles, Flow Descriptions, and PCC Action Profiles with the TDF Domain in Maintenance Mode This procedure shows operators how to enter maintenance mode to halt new sessions from being started and to verify that no sessions remain on the TDF domain before making changes to PCEF profiles, PCC rules, PCC rulebases, Diameter profiles, flow descriptions, and PCC action profiles for a TDF domain. To activate maintenance mode for the TDF domain and make changes: 1. From configuration mode, activate maintenance mode for the TDF domain. [edit] user@host# set unified-edge gateways tdf gateway-name domain domain-name service-mode 222 maintenance user@host# commit 2. Verify that the TDF domain is in maintenance mode. [edit] user@host# run show unified-edge tdf domain service-mode The service mode for the TDF domain shows MaintenanceActive Phase if all the sessions using this TDF domain are cleared. The service mode for the TDF domain shows Maintenance - In Phase if some sessions are actively using this TDF domain. 3. Verify that no subscribers are active on the TDF domain. [edit] user@host# run show unified-edge tdf subscribers | match domain-name 4. (Optional) Terminate any remaining sessions on the TDF domain by using the clear command. [edit] user@host# run clear unified-edge tdf subscribers | match domain-name 5. Verify that the TDF domain is in Active Phase. [edit] user@host# run show unified-edge tdf domain service-mode 6. Make the configuration changes and commit the changes. 7. Exit maintenance mode. [edit] user@host# delete unified-edge gateways tdf gateway-name domain domain-name service-mode user@host# commit 8. Verify that changes were properly committed. 223 · To view a PCEF profile configuration: [edit] user@host# run show configuration unified-edge pcef profiles profile-name · To view a PCC rulebase configuration: [edit] user@host# run show configuration unified-edge pcef pcc-rulebases rulebase-name · To view a PCC rules configuration: [edit] user@host# run show configuration unified-edge pcef pcc-rules rule-name · To view a flow description configuration: [edit] user@host# run show configuration unified-edge pcef flow-description flow-identifier · To view a PCC action profile configuration: [edit] user@host# run show configuration unified-edge pcef pcc-action-profiles profile-name 9. Return the gateway to operational state. [edit] user@host# run show unified-edge tdf gateway service-mode Changing PCEF Profiles, PCC Rules, PCC Rulebases, Diameter Profiles, Flow Descriptions, and PCC Action Profiles with the TDF Gateway in Maintenance Mode This procedure shows how to enter maintenance mode to halt new sessions from being started and to verify that no sessions remain on the TDF gateway before making changes to PCEF profiles, PCC rules, PCC rulebases, Diameter profiles, flow descriptions, and PCC action profiles across multiple TDF domains on the gateway. 224 To activate maintenance mode for the gateway and make changes: 1. From configuration mode, activate maintenance mode for the gateway. [edit] user@host# set unified-edge gateways tdf gateway-name service-mode maintenance user@host# commit 2. Verify that the TDF gateway is in maintenance mode. [edit] user@host# run show unified-edge tdf service-mode From the gateway hierarchy, the service mode shows Maintenance--Active Phase if all the sessions are cleared. The service mode shows Maintenance--In Phase if some sessions are active. The service mode shows Maintenance--Out Phase if maintenance mode is not configured, and the gateway is in operational mode. 3. Make the configuration changes. You can modify a PCEF profile by making changes to the PCC rules, PCC rulebases, or flow identifiers that the PCEF profile references or by specifying a different PCC rule, rule precedence, PCC rulebase, or Diameter profile in the PCEF profile. 4. Exit maintenance mode and commit the changes. [edit] user@host# delete unified-edge gateways tdf gateway-name service-mode user@host# commit 5. Verify that changes were properly committed. · To view a PCEF profile configuration: [edit] user@host# run show configuration unified-edge pcef profiles profile-name · To view a PCC rulebase configuration: [edit] user@host# run show configuration unified-edge pcef pcc-rulebases rulebase-name 225 · To view a PCC rules configuration: [edit] user@host# run show configuration unified-edge pcef pcc-rules rule-name · To view a flow description configuration: [edit] user@host# run show configuration unified-edge pcef flow-description flow-identifier · To view a PCC action profile configuration: [edit] user@host# run show configuration unified-edge pcef pcc-action-profiles profile-name 6. Return the gateway to operational state. [edit] user@host# run show unified-edge tdf gateway service-mode SEE ALSO Maintenance Mode Overview for Subscriber Aware Policy Enforcement | 200 Deleting a PCEF Profile | 225 Changing PCEF Profiles, PCC Rules, PCC Rulebases, Diameter Profiles, Flow Descriptions, and PCC Action Profiles | 220 Deleting a PCEF Profile IN THIS SECTION Deleting a PCEF Profile with the TDF Domain in Maintenance Mode | 226 Deleting a PCEF Profile with the Gateway in Maintenance Mode | 228 226 These procedures show how to enter maintenance mode to halt new sessions from being started and verify that no sessions remain on the TDF domain or gateway before removing a policy and charging enforcement function (PCEF) profile from the TDF domain or service-selection profile configurations. NOTE: Regardless of whether a PCEF profile is associated within a TDF domain or not, or whether a PCEF profile is associated with a TDF domain-selection term or not, configuration changes and deletion of a PCEF profile (and other referenced objects of the profile) require that the TDF gateway be placed in maintenance mode. However, you need not activate maintenance mode for the gateway if you are adding a new PCEF profile. Deleting a PCEF Profile with the TDF Domain in Maintenance Mode This procedure shows how to enter maintenance mode to halt new sessions from being started and to verify that there are no sessions remaining on the TDF domain before removing a PCEF profile configuration that a TDF domain or service-selection profile references. To activate maintenance mode for the TDF domain and make changes to a PCEF profile: 1. From configuration mode, activate maintenance mode for the TDF domain that references the PCEF profile. [edit] user@host# set unified-edge gateways tdf gateway-name domains domain-name service-mode maintenance user@host# commit 2. Verify that the TDF domain is in maintenance mode. [edit] user@host# run show unified-edge tdf domain service-mode The service mode for the TDF domain shows Maintenance--Active Phase if all the sessions using this TDF domain are cleared. The service mode for the TDF domain shows Maintenance--In Phase if some sessions are actively using this TDF domain. 3. Verify that no subscribers are active on the TDF domain. [edit] user@host# run show unified-edge tdf subscribers | match domain-name 227 4. (Optional) Terminate any remaining sessions on the TDF domain. [edit] user@host# run clear unified-edge tdf subscribers domain domain-name 5. Verify that the TDF domain is in an active phase. [edit] user@host# run show unified-edge tdf domain service-mode 6. In the TDF domain or service-selection profile configuration, remove the referenced PCEF profile and commit the changes. user@host# delete unified-edge gateways tdf gateway-name domains domain-name pcef-profile pcefprofile-name user@host# delete unified-edge gateways tdf gateway-name domain-selection term term-name then pcef-profile pcef-profile-name 7. Verify that the changes were properly committed by showing the configuration for the entire TDF domain or service-selection profile to make sure the PCEF profile is deleted. · To view a PCEF profile configuration: [edit] user@host# run show configuration unified-edge pcef profiles profile-name · To view a PCC rulebase configuration: [edit] user@host# run show configuration unified-edge pcef pcc-rulebases rulebase-name · To view a PCC rules configuration: [edit] user@host# run show configuration unified-edge pcef pcc-rules rule-name 228 · To view a flow description configuration: [edit] user@host# run show configuration unified-edge pcef flow-description flow-identifier · To view a PCC action profile configuration: [edit] user@host# run show configuration unified-edge pcef pcc-action-profiles profile-name 8. (Optional) If the PCEF profile is not used in other TDF domain or service-selection profile configurations, you can delete the PCEF profile configuration and commit the changes. [edit] user@host# delete unified-edge gateways tdf gateway-name domains domain-name service-mode user@host# commit 9. Exit maintenance mode. [edit] user@host# delete unified-edge gateways tdf gateway-name service-mode user@host# commit 10. Return the gateway to operational state. user@host# run show unified-edge tdf gateway service-mode Deleting a PCEF Profile with the Gateway in Maintenance Mode This procedure shows how to enter maintenance mode to halt new sessions from being started and to verify that no sessions remain on the TDF gateway before deleting PCEF profiles that are referenced by one or more TDF domains on a gateway. To activate maintenance mode for the gateway and make changes to a PCEF profile: 229 1. From configuration mode, activate maintenance mode for the gateway. [edit] user@host# set unified-edge gateways tdf gateway-name service-mode maintenance user@host# commit 2. Verify that the TDF gateway is in maintenance mode. [edit] user@host# run show unified-edge tdf service-mode From the gateway hierarchy, the service mode shows Maintenance--Active Phase if all the sessions are cleared. The service mode shows Maintenance--In Phase if some sessions are active. The service mode shows Maintenance--Out Phase if maintenance mode is not configured, and the gateway is in operational mode. 3. Verify that no subscribers are active on the gateway. [edit] user@host# run show unified-edge tdf subscribers gateway gateway-name 4. (Optional) Terminate any remaining sessions on the gateway. [edit] user@host# run clear unified-edge tdf subscribers gateway gateway-name 5. Verify that the gateway is in an active phase. [edit] user@host# run show unified-edge tdf gateway service-mode 6. For each applicable TDF domain, delete the PCEF profile from the TDF domain configuration and commit the changes. user@host# delete unified-edge gateways tdf gateway-name domains domain-name pcef-profile pcefprofile-name user@host# commit 7. Verify that the changes were properly committed by showing the configuration for each TDF domain to make sure the PCEF profile is deleted. 230 · To view a PCEF profile configuration: [edit] user@host# run show configuration unified-edge pcef profiles profile-name · To view a PCC rulebase configuration: [edit] user@host# run show configuration unified-edge pcef pcc-rulebases rulebase-name · To view a PCC rules configuration: [edit] user@host# run show configuration unified-edge pcef pcc-rules rule-name · To view a flow description configuration: [edit] user@host# run show configuration unified-edge pcef flow-description flow-identifier · To view a PCC action profile configuration: [edit] user@host# run show configuration unified-edge pcef pcc-action-profiles profile-name 8. Exit maintenance mode. [edit] user@host# delete unified-edge gateways tdf gateway-name service-mode user@host# commit 9. Return the gateway to operational state. [edit] user@host# run show unified-edge tdf gateway service-mode 231 SEE ALSO Maintenance Mode Overview for Subscriber Aware Policy Enforcement | 200 Changing PCEF Profiles, PCC Rules, PCC Rulebases, Diameter Profiles, Flow Descriptions, and PCC Action Profiles | 220 Changing Static Time-of-Day Settings for PCC Rules This procedure shows how to enter maintenance mode to make changes to static time-of-day activation and deactivation settings or to apply those settings to PCC rules and rulebases. To make changes to the static time-of-day activation and deactivation configuration: 1. From configuration mode, activate maintenance mode for the gateway. [edit unified-edge gateways] user@host# set tdf gateway-name service-mode maintenance user@host# commit 2. Verify that the gateway is in maintenance mode. [edit unified-edge gateways] user@host# run show unified-edge tdf service-mode The service mode shows Maintenance--Active Phase if all the sessions are cleared. The service mode shows Maintenance--In Phase if some sessions are active. The service mode shows Maintenance--Out Phase if maintenance mode is not configured, and the gateway is in operational mode. 3. Modify the time-of-day profile settings, the assignment of time-of-day profiles to rules and rulebases within a PCEF profile, or both, and commit the changes. See "Configuring Static Time-of-Day PCC Rule Activation and Deactivation in a Junos OS Subscriber Aware PCEF Profile" on page 103. 4. Exit maintenance mode. [edit unified-edge gateways] user@host# delete tdf gateway-name service-mode user@host# commit 5. Verify that changes were properly committed. 232 · To view a PCEF profile configuration: [edit] user@host# run show configuration unified-edge pcef profiles profile-name · To view a time-of-day profile configuration: [edit] user@host# run show configuration unified-edge pcef pcc-time-of-day-profiles profile-name RELATED DOCUMENTATION Maintenance Mode Overview for Subscriber Aware Policy Enforcement | 200 Deleting a Services PIC This procedure shows how to delete a services PIC using maintenance mode at the [edit unified-edge gateways tdf gateway-name system session-pics interface] hierarchy level. The services PIC can be an aggregated multiservices (AMS) interface. Services PICs perform packet-related services on a broadband gateway. Before you delete a services PIC using maintenance mode: · Make sure that this change has been coordinated with affected groups and users. To configure maintenance mode and services PIC deletion: 1. Verify the current status of maintenance mode for this services PIC. user@host> show unified-edge tdf gateway-name system interfaces service-mode The service-mode option displays the information details about maintenance mode as well as status. Maintenance Mode MM Active Phase - System is ready to accept configuration changes for all attributes of this object and its sub-hierarchies. 233 MM In/Out Phase - System is ready to accept configuration changes only for non-maintenance mode attributes of this object and its sub-hierarchies. Interface Name ms-1/0/0 ms-1/1/0 ms-2/0/0 ms-2/1/0 pfe-0/0/0 pfe-0/1/0 pfe-0/2/0 pfe-0/3/0 ams1 Gateway Name SCG1 SCG1 SCG1 SCG1 SCG1 SCG1 SCG1 SCG1 SCG1 Service Mode Operational Operational Operational Operational Operational Operational Operational Operational Operational 2. From configuration mode, place the interface in maintenance mode. [edit] user@host# set unified-edge gateways tdf gateway-name system session-pics interface interface-name service-mode maintenance user@host# commit 3. Verify that the services PIC is in active maintenance mode where configuration changes are accepted for this object and all of its subhierarchies. [edit] user@host> show unified-edge tdf gateway-name system interfaces service-mode Maintenance Mode MM Active Phase - System is ready to accept configuration changes for all attributes of this object and its sub-hierarchies. MM In/Out Phase - System is ready to accept configuration changes only for non-maintenance mode attributes of this object and its sub-hierarchies. Interface Name ms-1/0/0 ms-1/1/0 ms-2/0/0 Gateway Name SCG1 SCG1 SCG1 Service Mode Operational Operational Maintenance - Active Phase 234 ms-2/1/0 pfe-0/0/0 pfe-0/1/0 pfe-0/2/0 pfe-0/3/0 ams1 SCG1 SCG1 SCG1 SCG1 SCG1 SCG1 Operational Operational Operational Operational Operational Operational NOTE: All subscribers serviced by the services PIC must go to zero. You can wait for these conditions to be met, or use the clear command for the interface (or gateway) to force these conditions. 4. Delete the services PIC, exit maintenance mode, and commit the changes. NOTE: Deletion of a services PIC automatically exits maintenance mode for the deleted PIC. [edit] user@host# delete unified-edge gateways tdf gateway-name system interface interface-name user@host# commit RELATED DOCUMENTATION Maintenance Mode Overview for Subscriber Aware Policy Enforcement | 200 Deleting a Session PIC | 234 Changing AMS Interface Parameters on a TDF Gateway | 205 Changing TDF Gateway Parameters with Maintenance Mode | 218 Deleting a Session PIC This procedure shows how to delete a session PIC using maintenance mode at the [edit unified-edge gateways tdf gateway-name system session-pics interface] hierarchy level. The session PIC can be an aggregated multiservices (AMS) interface. Session PICs process control plane messages on a broadband gateway. Before you delete a session PIC using maintenance mode: 235 · Make sure that this change has been coordinated with affected groups and users. To configure maintenance mode and session PIC deletion: 1. Verify the current status of maintenance mode for this session PIC. user@host> show unified-edge tdf gateway-name system interfaces service-mode The service-mode option displays the information details about maintenance mode as well as status. Maintenance Mode MM Active Phase - System is ready to accept configuration changes for all attributes of this object and its sub-hierarchies. MM In/Out Phase - System is ready to accept configuration changes only for non-maintenance mode attributes of this object and its sub-hierarchies. Interface Name ms-1/0/0 ms-1/1/0 ms-2/0/0 ms-2/1/0 pfe-0/0/0 pfe-0/1/0 pfe-0/2/0 pfe-0/3/0 ams1 Gateway Name SCG1 SCG1 SCG1 SCG1 SCG1 SCG1 SCG1 SCG1 SCG1 Service Mode Operational Operational Operational Operational Operational Operational Operational Operational Operational 2. From configuration mode on the TDF gateway, place the interface in maintenance mode. [edit] user@host# set unified-edge gateways tdf gateway-name system session-pics interface interface-name service-mode maintenance user@host# commit 236 3. Verify that the session PIC is in active maintenance mode where configuration changes are accepted for this object and all of its subhierarchies. user@host> show unified-edge tdf gateway-name system interfaces service-mode Maintenance Mode MM Active Phase - System is ready to accept configuration changes for all attributes of this object and its sub-hierarchies. MM In/Out Phase - System is ready to accept configuration changes only for non-maintenance mode attributes of this object and its sub-hierarchies. Interface Name ms-1/0/0 ms-1/1/0 ms-2/0/0 ms-2/1/0 pfe-0/0/0 pfe-0/1/0 pfe-0/2/0 pfe-0/3/0 ams1 Gateway Name SCG1 SCG1 SCG1 SCG1 SCG1 SCG1 SCG1 SCG1 SCG1 Service Mode Operational Maintenance - Active Phase Operational Operational Operational Operational Operational Operational Operational NOTE: All subscribers serviced by the session PIC must go to zero. You can wait for these conditions to be met, or use the clear command for the interface (or gateway) to force these conditions. 4. Delete the session PIC. [edit] user@host# delete unified-edge gateways tdf gateway-name system interface interface-name 5. Exit maintenance mode after committing the changes. 237 NOTE: Deletion of a session PIC automatically exits maintenance mode for the deleted PIC. [edit] user@host# commit RELATED DOCUMENTATION Maintenance Mode Overview for Subscriber Aware Policy Enforcement | 200 Deleting a Services PIC | 232 Changing AMS Interface Parameters on a TDF Gateway | 205 Changing TDF Gateway Parameters with Maintenance Mode | 218 5 PART Monitoring and Troubleshooting Monitoring and Troubleshooting | 239 239 CHAPTER 11 Monitoring and Troubleshooting IN THIS CHAPTER Configuring Tracing for PCEF Operations | 239 Configuring Call-Rate Statistics Collection | 241 Using the Enterprise-Specific Utility MIB | 242 Configuring Tracing for PCEF Operations To configure tracing operations for the policy and charging enforcement function (PCEF): 1. Specify that you want to configure tracing options for PCEF. [edit unified-edge pcef] user@host# edit traceoptions 2. (Optional) Configure the name of the file used for the trace output. [edit unified-edge pcef traceoptions] user@host# set file file-name 3. (Optional) Configure the maximum size of each trace file. [edit unified-edge pcef traceoptions] user@host# set file size size 4. (Optional) Configure the maximum number of trace files. [edit unified-edge pcef traceoptions] user@host# set file files number 240 5. (Optional) Configure the read permissions for the log file. [edit unified-edge pcef traceoptions] user@host# set file (no-world-readable | world-readable) 6. (Optional) Configure flags to filter the operations to be logged. [edit unified-edge pcef traceoptions] user@host# set flag flag Table 10 on page 240 describes the flags that you can include. Table 10: Trace Flags Flag Description all Trace all operations. config Trace configuration events. debug Trace the debug internal events. fsm Trace finite state machine events. general Trace general events that do not fit in any specific traces. high-availability Trace high availability events. init Trace initialization events. tftmgr Trace traffic flow manager events. 241 7. (Optional) Configure the level of tracing. [edit unified-edge pcef traceoptions] user@host# set level (all | critical | error | info | notice | verbose | warning) RELATED DOCUMENTATION traceoptions (PCEF) | 732 Configuring Call-Rate Statistics Collection You can configure the collection of statistics for the rate of calls for a TDF gateway and for a TDF domain. You configure the length of the interval for statistics collection and the number of call-records to keep. To configure call-rate statistics collection for the TDF gateway or TDF domain: 1. Configure the length of the interval for statistics collection: · For a TDF gateway: [edit unified-edge gateways tdf gateway-name] user@host# set call-rate-statistics interval minutes · For a TDF domain: [edit unified-edge gateways tdf gateway-name domains domain-name] user@host# set call-rate-statistics interval minutes 2. Configure the number of call-rate records to save. · For a TDF gateway: [edit unified-edge gateways tdf gateway-name] user@host# set call-rate-statistics history records 242 · For a TDF domain: [edit unified-edge gateways tdf gateway-name domains domain-name] user@host# set call-rate-statistics history records When the number of call-rate records equals the history value and a new record is received, the oldest record is replaced by the new record. RELATED DOCUMENTATION show unified-edge tdf call-rate statistics | 974 Using the Enterprise-Specific Utility MIB IN THIS SECTION Using the Enterprise-Specific Utility MIB | 242 Populating the Enterprise-Specific Utility MIB with Information | 243 Stopping the SLAX Script with the CLI | 251 Clearing the Utility MIB | 251 Recovering from an Abnormal SLAX Script Exit or a SLAX Script Exit with the CLI | 251 Using the Enterprise-Specific Utility MIB The enterprise-specific Utility MIB enables you to add SNMP-compliant applications information to the enterprise-specific Utility MIB. The application information includes: · NAT mappings · Carrier-grade NAT (CGNAT) pools · Service set CPU utilization · Service set memory usage · Service set summary information 243 · Service set packet drop information · Service set memory zone information · Multiservices PIC CPU and memory utilization · Stateful firewall flow counters · Session application connection information · Session analysis information · Subscriber analysis information · Traffic Load Balancer information You use a delivered Stylesheet Language Alternative Syntax (SLAX) script to place applications information into the enterprise-specific Utility MIB. The script is invoked based on event policies (such as reboot of the router or switchover of Routing Engines) defined in an event script. The script can also be invoked from the command line as an op script. The script only runs on the primary Routing Engine. After the script is invoked, it polls data from the specified components at regular intervals using the XML-RPC API and writes the converted data to the Utility MIB as SNMP variables. The script automatically restarts after a configured polling cycle elapses. Populating the Enterprise-Specific Utility MIB with Information To use a SLAX script to populate the enterprise-specific Utility MIB with information: 1. Enable the services-oids-slax script. user@host# set system scripts op file services-oids.slax 2. Configure the maximum amount of memory for the data segment during the execution of the script. user@host# set event-options event-script max-database 512m 3. Enable the script. user@host# set event-options event-script file services-oids-ev-policy.slax 4. (Optional) Enable the log-stats argument to allow sys logging of stateful firewall rate statistics when the event-script is run. 244 a. Display the event policies and the arguments that can be used. user@host> show event-options event-scripts polices event-options { policy services-oids-done { events system; attributes-match { system.message matches "Completed polling cycle normally. Exiting"; } then { event-script services-oids.slax { arguments { max-polls 30; interval 120; } } } } policy system-started { events system; attributes-match { system.message matches "Starting of initial processes complete"; } then { event-script services-oids.slax { arguments { max-polls 30; interval 120; } } } } } event-options { policy services-oids-done { events system; attributes-match { system.message matches "Completed polling cycle normally. 245 Exiting"; } then { event-script services-oids.slax { arguments { max-polls 30; interval 120; } } } } policy system-started { events system; attributes-match { system.message matches "Starting of initial processes complete"; } then { event-script services-oids.slax { arguments { max-polls 30; interval 120; } } } } } The log-stats argument does not appear, so you must enable it. b. Start the Linux shell. user@host> start shell % c. Open the /var/db/scripts/event/services-oids-eve-policy.slax file for editing. <event-options> { /* 246 * This policy detects when the services-oids.slax script ends, then restarts it. */ <policy> { <name> "services-oids-done"; <events> "system"; <attributes-match> { <from-event-attribute> "system.message"; <condition> "matches"; <to-event-attribute-value> "Completed polling cycle normally. Exiting"; } <then> { <event-script> { <name> "services-oids.slax"; <arguments> { <name>"max-polls"; <value>"30"; } <arguments> { <name>"interval"; <value>"120"; } /* <arguments> { <name>"log-stats"; <value>"yes"; } */ } } } /* * This policy detects when the system has booted and kicks off the services-oids.slax script. * This policy hooks the 'system started' event */ <policy> { <name> "system-started"; <events> "system"; <attributes-match> { <from-event-attribute> "system.message"; 247 complete"; } <condition> "matches"; <to-event-attribute-value> "Starting of initial processes } <then> { <event-script> { <name> "services-oids.slax"; <arguments> { <name>"max-polls"; <value>"30"; } <arguments> { <name>"interval"; <value>"120"; } /* <arguments> { <name>"log-stats"; <value>"yes"; } */ } } } d. Remove the comment enclosures (/* and */) surrounding the <arguments> tags containing "logstats". e. Exit the Linux shell and return to the CLI. % exit f. Load the changes you made to the event script file. user@host>request system scripts event-scripts reload The log-stats argument is available the next time the event script restarts. 248 5. Set up the script logging file services-oids.log. user@host# set system syslog file services-oids.log any info user@host# set system syslog file services-oids.log match cscript 6. Synchronize scripts between Routing Engines so that when a switchover of Routing Engine occurs, the event policy starts on the new primary. · To synchronize on a per-commit basis: user@host# commit synchronize scripts · To synchronize scripts every time you execute a commit synchronize: [edit system scripts] user@host# set synchronize user@host# commit synchronize 7. The script starts automatically at system boot, but you can manually start it with the CLI. user@host> op services-oids arguments Table 11 on page 248 describes the arguments that you can use. Table 11: Arguments for services-oids.slax Script Argument Description clean A value of 1 clears all Utility MIB OIDs. Use this only to clean OID tables. clear-semaphore A value of 1 resets the semaphore in the Utility MIB to recover from an abnormal script exit or from a manual script exit. debug Prints debug messages on console. 249 Table 11: Arguments for services-oids.slax Script (Continued) Argument Description detail Displays detailed output. interval Sets the number of seconds between poll cycles (default is 120). invoke-debugger Invokes script in debugger mode. log-stats Yes value enables sys logging of stateful firewall rate statistics (default is no). max-polls Sets the number of poll cycles before exiting the script (default is 30). one-cycle-only Value of 1 quits after one cycle of polling. Event policy does not restart the script. Use this option for testing only. The default is 0. signal-stop A value of 1 stops the script and sets the semaphore, which causes the next iteration to exit. silent Prints trace messages on console if it is unset. Set it to zero-length string (" ") to unset it. Default is 1. | Pipes through a command. 8. Check the status of the script from the log file. router> show /var/log/services-oids.log | no-more Jun 27 19:51:47 wf-cheesypoofs cscript: services-oids.slax(v0.14):[info] Beginning polling cycle. Jun 27 19:51:47 wf-cheesypoofs cscript: services-oids.slax(v0.14):[info] processing traffic load-balance statistics Jun 27 19:51:48 wf-cheesypoofs cscript: services-oids.slax(v0.14):[info] processing cgnat pool detail 250 Jun 27 19:51:48 wf-cheesypoofs cscript: services-oids.slax(v0.14):[info] processing cgnat mappings summary Jun 27 19:51:48 wf-cheesypoofs cscript: services-oids.slax(v0.14):[info] processing service-sets summary Jun 27 19:51:48 wf-cheesypoofs cscript: services-oids.slax(v0.14):[info] processing service-sets cpu-usage Jun 27 19:51:48 wf-cheesypoofs cscript: services-oids.slax(v0.14):[info] processing service-sets mem-usage Jun 27 19:51:49 wf-cheesypoofs cscript: services-oids.slax(v0.14):[info] processing stateful firewall statistics Jun 27 19:51:49 wf-cheesypoofs cscript: services-oids.slax(v0.14):[info] processing stateful firewall flow-analysis Jun 27 19:51:49 wf-cheesypoofs cscript: services-oids.slax(v0.14):[info] processing stateful firewall flows counts Jun 27 19:51:49 wf-cheesypoofs cscript: services-oids.slax(v0.14):[info] processing FW policy connections/second Jun 27 19:51:49 wf-cheesypoofs cscript: services-oids.slax(v0.14):[info] processing FW/NAT app connections Jun 27 19:51:51 wf-cheesypoofs cscript: services-oids.slax(v0.14):[info] processing service-set packet-drops Jun 27 19:51:51 wf-cheesypoofs cscript: services-oids.slax(v0.14):[info] processing service-set memory-usage zone Jun 27 19:51:51 wf-cheesypoofs cscript: services-oids.slax(v0.14):[info] processing service-set policy throughput stats Jun 27 19:51:52 wf-cheesypoofs cscript: services-oids.slax(v0.14):[info] processing ms-pic CPU amd Memory utilization stats Jun 27 19:51:52 wf-cheesypoofs cscript: services-oids.slax(v0.14):[info] 1/30 Sleeping for 110 seconds. 9. Verify that you are getting Utility MIB OID updates. router> show snmp mib walk jnxUtil ascii . . . jnxUtilCounter64Value."services10tcp-errors09CGN-SET-1" = 0 jnxUtilCounter64Value."services10tcp-errors09CGN-SET-2" = 0 jnxUtilCounter64Value."services10tcp-errors09CGN-SET-3" = 0 jnxUtilCounter64Value."services10udp-errors09CGN-SET-1" = 1119 jnxUtilCounter64Value."services10udp-errors09CGN-SET-2" = 0 . . . 251 To exclude the timestamp information, use router> show snmp mib walk jnxUtil ascii | match Value Stopping the SLAX Script with the CLI To stop the SLAX script from the CLI: · Issue the stop argument. user@host> op services-oids signal-stop 1 Clearing the Utility MIB To clear all the utility MIB OIDs: · Issue the clean argument. user@host> op services-oids clean 1 Recovering from an Abnormal SLAX Script Exit or a SLAX Script Exit with the CLI To recover from an abnormal SLAX script exit or an SLAX script exit with the CLI: · Issue the clear semaphore argument. user@host> op services-oids clear-semaphore 1 RELATED DOCUMENTATION SLAX Overview 6 PART Configuration Statements and Operational Commands Configuration Statements | 253 Operational Commands | 763 253 CHAPTER 12 Configuration Statements IN THIS CHAPTER 3gpp-imsi | 262 aaa clients (TDF) | 264 aaa-policy-control (PCEF Profile) | 265 aaa-profile (PCEF Profile) | 267 access-interfaces (IFL Subscriber) | 268 access-interfaces (IP Subscriber) | 270 accounting (AAA Profile) | 271 accounting (RADIUS Client) | 273 accounting-port (RADIUS Server) | 274 accounting-secret (RADIUS Server) | 275 activation-attribute (AAA Profile) | 277 address (Diameter Peer) | 278 address (LRF Profile) | 279 address (RADIUS Clients) | 281 address (RADIUS Server) | 282 address-mapping (Application Identification) | 283 address-pools | 285 allow-dynamic-requests (RADIUS Server) | 287 alt-name (Application Identification) | 288 application (Application Identification) | 289 application-group | 292 application-groups (PCC Rules) | 293 application-identification (Application Identification) | 295 application-identification-profile (Service Set) | 299 applications (Services Application Identification) | 300 applications (Diameter) | 301 254 applications (PCC Rules) | 303 attribute | 305 attributes (Diameter Gx Profiles) | 308 authentication (AAA Profile) | 309 burst-size (Default Local Policy) | 311 burst-size (TDF Domain) | 312 cac (TDF Gateway) | 314 cacheable (Application Identification) | 315 call-rate-statistics | 316 called-station-id | 318 calling-station-id | 319 chain-order (Application Identification) | 321 check-bytes (Application Identification) | 322 class | 323 client | 325 clients | 327 coa-accounting (AAA Profile) | 328 code | 330 code (AAA Profile) | 331 code (Application Identification) | 333 collector (LRF Profile) | 334 collector (LRF Rule) | 336 compatibility (Application Identification) | 337 connect-actively | 338 constant | 341 context (Application Identification) | 342 count (HTTP Header Enrichment) | 344 cpu (TDF Gateway) | 346 deactivation-attribute (AAA Profile) | 347 dead-criteria-retries (RADIUS Server) | 348 default-local-policy | 350 default-pool (Address Pools) | 351 255 description (Application Identification) | 353 destination (Application Identification) | 354 destination (LRF Profile) | 355 destination-address (HTTP Header Enrichment) | 357 destination-address-range (HTTP Header Enrichment) | 359 destination-ip-address (RADIUS Snoop Segment) | 360 destination-port (RADIUS Snoop Segment) | 362 destination-port-range (HTTP Header Enrichment) | 363 destination-ports (HTTP Header Enrichment) | 365 destination-prefix-list (HTTP Header Enrichment) | 366 diameter (Subscriber Aware Policy Control) | 368 diameter (TDF Gateway) | 370 diameter-profile (PCEF Profile) | 372 direction (Application Identification) | 373 direction (Service Data Flow Filters) | 375 disconnect-peer-timeout | 377 domain (TDF Domain Selection) | 378 domain-selection | 380 domains | 384 dynamic-policy-control | 387 dynamic-requests-secret (RADIUS Server) | 389 encrypt (HTTP Header Enrichment) | 390 equals | 392 exclude (Diameter Gx Profiles) | 394 external-assigned (Address Pools) | 395 family (Address Pools) | 397 family (Exclude Prefix) | 398 family (TDF Interface) | 400 flow-action | 401 flow-descriptions | 403 flows (PCC Rules) | 405 format (Unified Edge Gateways) | 407 256 format (LRF Profile) | 409 forwarding-class (PCC Action Profiles) | 410 firmware-revision | 412 framed-ip-address | 414 framed-ipv6-prefix | 415 from (HTTP Header Enrichment) | 417 from (PCC Rules) | 418 from (TDF Domain Selection) | 420 function (Diameter Network Element) | 424 gate-status | 425 greater-than | 427 gx-profile | 429 has-prefix (Unified Edge Gateways) | 431 has-suffix | 432 hcm (HTTP Header Enrichment) | 434 hcm-profile (HTTP Header Enrichment) | 436 hcm-profile (PCC Action Profiles) | 438 host (Diameter Origin) | 439 http-log-multiple-transactions (LRF Profile) | 441 icmp-mapping (Application Identification) | 442 id-components | 443 idle-timeout | 446 ifl-subscriber | 447 immediate-accounting-response | 449 include (Diameter Gx Profiles) | 450 incoming-queue | 452 inet (TDF Subscriber Address) | 453 inet (TDF Subscriber Exclude Prefix) | 455 inet6 (TDF Subscriber Address) | 456 inet6 (TDF Subscriber Exclude Prefix) | 457 integer | 459 interface (Services PIC) | 460 257 interface (Session PICs) | 462 interface-service (Services Interfaces) | 464 ip-protocol-mapping (Application Identification) | 465 ip-subscriber | 467 ipv4-address (Steering Path) | 469 ipv4-mask (HTTP Header Enrichment) | 471 ipv4-or-value (HTTP Header Enrichment) | 472 ipv6-address (Steering Path) | 474 ipv6-mask (HTTP Header Enrichment) | 475 ipv6-or-value (HTTP Header Enrichment) | 477 keep-existing-steering | 478 less-than | 480 local-port-range | 481 local-ports | 483 logging-rule (PCC Action Profile) | 485 lrf-profile (Service Set) | 487 matches | 489 maximum-bit-rate (Default Local Policy) | 492 maximum-bit-rate (PCC Action Profiles) | 493 maximum-bit-rate (TDF Domain) | 495 maximum-pending-reqs-limit | 497 maximum-pending-requests (Diameter) | 498 maximum-sessions (TDF Gateway) | 500 maximum-subscribers | 501 maximum-sessions-trap-percentage (TDF Gateway) | 502 member (Application Identification) | 504 memory (TDF Gateway) | 505 mif (TDF Interface) | 507 monitoring-key (PCC Action Profile) | 508 mtu (TDF Interface) | 509 nas-ip-address | 511 nat-rule-sets (Service Set) | 512 258 nat-rules | 514 network-element (AAA Profile) | 515 network-element (Diameter Base Protocol) | 516 network-element (Subscriber Aware Policy Control) | 518 network-elements (RADIUS) | 520 network (Address Pools) | 521 network (TDF Domain) | 523 no-application-system-cache | 525 no-send-to-ue | 526 order (Application Identification) | 527 order-priority (Application Identification) | 529 origin (Diameter Base Protocol) | 531 outgoing-queue | 532 over (Application Identification) | 534 packet-capture (Next Gen Services) | 536 path (Steering) | 539 pattern (Application Identification) | 540 pattern (Class Attribute) | 542 pcc-action-profile (PCC Rules) | 543 pcc-action-profiles | 545 pcc-rule | 548 pcc-rulebases (PCEF) | 550 pcc-rulebases (PCEF Profile) | 551 pcc-rules (PCEF) | 554 pcc-rules (PCEF Profile) | 556 pcc-time-of-day-profiles | 558 pcef | 560 pcef-profile (Service Set) | 563 pcef-profile (TDF Domain) | 564 pcef-profile (TDF Domain Selection) | 566 peer (Diameter Base Protocol) | 568 peer (Diameter Network Element) | 569 259 pending-queue-watermark | 571 pending-queue-watermark-abate | 572 policy-based-logging (LRF Profile) | 574 pool (TDF Domain) | 575 port (LRF Profile) | 577 port (RADIUS Server) | 578 port-range (Application Identification) | 579 prefer-framed-ip-address (RADIUS Clients) | 581 prefer-framed-ipv6-prefix (RADIUS Clients) | 582 priority (Diameter Network Element) | 583 priority (RADIUS Network Elements) | 585 product-name | 586 profile | 587 profile (HTTP Header Enrichment) | 589 profile (LRF) | 590 profile (Services Application Identification) | 593 profile (Services PCEF) | 594 profiles (AAA) | 595 profiles (PCEF) | 597 protocol (Application Identification) | 600 protocol (Flow Descriptions) | 602 realm (Diameter Origin) | 604 redirect (PCC Action Profiles) | 605 regex (Class Attribute) | 607 remote-address | 608 remote-port-range | 610 remote-ports | 612 report (LRF Rule) | 614 request-cache-timeout (RADIUS Snoop Segment) | 616 request-timeout | 617 response-cache-timeout (RADIUS Client) | 618 retry (RADIUS Server) | 620 260 revert-interval (RADIUS Server) | 621 routing-instance (PCC Action Profiles) | 623 rule (HTTP Header Enrichment for Tag Rule Set) | 625 rule (LRF) | 626 rule-activation-time | 628 rule-deactivation-time | 630 secret (RADIUS Client) | 632 secret (RADIUS Server) | 633 server (RADIUS Network Elements) | 634 servers (RADIUS) | 636 service-mode | 638 service-pics | 640 service-set (Subscriber-Aware) | 641 service-set (TDF Interface) | 643 session-pics | 644 session-pics (Diameter) | 645 shared-secret (RADIUS Snoop Segment) | 647 snoop-segment (TDF Domain Selection) | 649 snoop-segments (RADIUS) | 650 snoop-segments (TDF Gateway) | 652 source (Application Identification) | 653 source-address (LRF Profile) | 655 source-interface | 656 source-interface (RADIUS Server) | 657 source-interface (RADIUS Snoop Segment) | 659 source-ip-address (RADIUS Snoop Segment) | 660 static-policy-control | 661 steering | 663 string | 665 subscriber-address | 667 subscriber-awareness (Service Set Options) | 668 subscriber-aware-services | 669 261 subscriber-exclude-prefix | 670 subscriber-type (TDF Domain) | 672 subscription-id | 674 subscription-id-options | 675 subscription-id-type (Class Attribute) | 677 tag (HTTP Header Enrichment) | 679 tag-attribute (HTTP Header Enrichment) | 680 tag-attribute (HTTP Header Enrichment Tag Rule) | 682 tag-header (HTTP Header Enrichment) | 683 tag-operation (HTTP Header Enrichment) | 685 tag-rule (Profiles for HTTP Header Enrichment) | 686 tag-rule (HTTP Header Enrichment) | 688 tag-rules (Service Set) | 690 tag-rule-set (HTTP Header Enrichment) | 692 tag-rule-sets (Service Set) | 693 tag-separator (HTTP Header Enrichment) | 695 tag-value (HTTP Header Enrichment) | 696 tags (Application Identification) | 697 targets | 699 tdf (Unified Edge) | 701 tdf-interface | 702 template (LRF Profile) | 704 template (LRF Rule) | 705 template-tx-interval (LRF Profile) | 707 template-type (LRF Profile) | 708 term (HTTP Header Enrichment) | 711 term (TDF Domain Selection) | 713 then (HTTP Header Enrichment) | 717 then (LRF rule) | 719 then (PCC Rules) | 720 then (TDF Domain Selection) | 722 time | 724 262 time-limit (LRF Rule) | 725 timeout (Diameter Network Element) | 727 timeout (RADIUS Server) | 728 traceoptions (Diameter Base Protocol) | 730 traceoptions (PCEF) | 732 traceoptions (TDF Gateway) | 735 trigger-type (LRF Profile) | 738 type (Application Identification) | 740 type (ICMP Mapping for Application Identification) | 741 unit (TDF Interface) | 743 url | 744 use-class (Class Attribute) | 746 user-name | 747 user-password (PCEF Profile) | 749 v4address | 750 v6address | 752 v6prefix | 753 vendor-id | 755 vendor-id (AAA Profile) | 756 vendor-support | 758 volume-limit (LRF Rule) | 759 watchdog-timeout | 760 3gpp-imsi IN THIS SECTION Syntax | 263 Hierarchy Level | 263 Description | 263 263 Required Privilege Level | 263 Release Information | 263 Syntax 3gpp-imsi { equals value; has-prefix value; has-suffix value; matches value; } Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from] Description Specify the RADIUS AVP 3GPP-IMSI for the incoming RADIUS request from the subscriber. After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. 264 RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 aaa clients (TDF) IN THIS SECTION Syntax | 264 Hierarchy Level | 264 Description | 265 Options | 265 Required Privilege Level | 265 Release Information | 265 Syntax aaa { clients client-name; apply-groups [group-names]; apply-groups-except [group-names]; } Hierarchy Level [edit unified-edge gateways tdf gateway-name] 265 Description Specify the GGSN, PGW, or BNG RADIUS clients that can send RADIUS requests to a TDF gateway. Options client-name RADIUS client name that was previously configured at the [edit access radius clients] hierarchy level. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring RADIUS Clients That Send Accounting Requests for IP-Based Subscribers | 128 Configuring a TDF Gateway | 16 aaa-policy-control (PCEF Profile) IN THIS SECTION Syntax | 266 Hierarchy Level | 266 Description | 266 Required Privilege Level | 266 Release Information | 266 266 Syntax aaa-policy-control { aaa-profile aaa-profile-name; pcc-rulebases [rulebase-name]; user-password password; } Hierarchy Level [edit unified-edge pcef profiles profile-name] Description Configure RADIUS-server-controlled policy management for a policy and charging enforcement function (PCEF) profile. The remaining statements are explained separately. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Policies That a RADIUS Server Controls | 101 Configuring an AAA Profile | 96 267 aaa-profile (PCEF Profile) IN THIS SECTION Syntax | 267 Hierarchy Level | 267 Description | 267 Options | 267 Required Privilege Level | 267 Release Information | 268 Syntax aaa-profile aaa-profile-name; Hierarchy Level [edit unified-edge pcef profiles profile-name aaa-policy-control] Description Specify the AAA profile that identifies the RADIUS server policy control parameters for the policy and charging enforcement function (PCEF) profile. The AAA profile must already be defined at the [edit unified-edge aaa] hierarchy level. Options aaa-profile-name Name of the AAA profile. Required Privilege Level unified-edge--To view this statement in the configuration. 268 unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Policies That a RADIUS Server Controls | 101 Configuring an AAA Profile | 96 access-interfaces (IFL Subscriber) IN THIS SECTION Syntax | 268 Hierarchy Level | 268 Description | 269 Options | 269 Required Privilege Level | 269 Release Information | 269 Syntax access-interfaces [interface-name]; Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name ifl-subscriber subscriber-name] 269 Description Specify one or more interfaces that carry traffic for the subscriber. Options interfacename Name of the interface. You can assign only one IFL-based subscriber to an interface. You can specify the following types of interfaces: · Physical Layer 3 Ethernet interface · Layer 3 Aggregated Ethernet interface · IRB interface · IRB that contains Ether-channel and physical interface members · Logical Tunnel interface NOTE: The interfaces and the TDF interface (mif) in the TDF domain must be included in the same VRF routing instance. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring IFL-Based TDF Subscribers and Properties with a TDF Domain | 140 Understanding the Definition of a Set of IFL-Based Subscriber Properties with a TDF Domain | 116 270 access-interfaces (IP Subscriber) IN THIS SECTION Syntax | 270 Hierarchy Level | 270 Description | 270 Options | 270 Required Privilege Level | 271 Release Information | 271 Syntax access-interfaces [interface-name]; Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name ip-subscriber] Description Specify at least one interface that faces the access network and that carries traffic for the TDF domain for IP-based subscribers. You can specify multiple interfaces by including the access-interfaces statement multiple times. Options interface-name Name of the interface. 271 NOTE: The access-facing interface and the TDF interface (mif) in the TDF domain must be included in the same VRF routing instance. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based Subscriber Setup Overview | 107 accounting (AAA Profile) IN THIS SECTION Syntax | 272 Hierarchy Level | 272 Description | 272 Required Privilege Level | 272 Release Information | 272 272 Syntax accounting { network-element network-element-name; } Hierarchy Level [edit unified-edge aaa profiles aaa-profile-name radius] Description Specify the network element providing policy management for TDF subscribers. The network element must already be defined at the [edit access radius] hierarchy level. This statement is required if the RADIUS servers cannot initiate a CoA request without an accounting record. The remaining statement is explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring an AAA Profile | 96 Understanding AAA Profiles | 73 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 273 accounting (RADIUS Client) IN THIS SECTION Syntax | 273 Hierarchy Level | 273 Description | 273 Required Privilege Level | 273 Release Information | 274 Syntax accounting { secret password; response-cache-timeout seconds; } Hierarchy Level [edit access radius clients client-name] Description Specify a shared secret and response cache timeout to be used by the MX Series router and the RADIUS client for accounting. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. 274 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring RADIUS Clients That Send Accounting Requests for IP-Based Subscribers | 128 accounting-port (RADIUS Server) IN THIS SECTION Syntax | 274 Hierarchy Level | 274 Description | 274 Options | 275 Required Privilege Level | 275 Release Information | 275 Syntax accounting-port port-number; Hierarchy Level [edit access radius servers name] Description Specify the RADIUS server port number to which the MX Series router sends RADIUS accounting-start and accounting-stop requests. RADIUS accounting-start and accounting-stop requests are used when 275 the RADIUS server is not able to initiate a change of authorization request without an accounting record. Options port-number Port number to which the RADIUS requests are sent. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring RADIUS Servers | 91 Understanding Network Elements | 71 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 accounting-secret (RADIUS Server) IN THIS SECTION Syntax | 276 Hierarchy Level | 276 Description | 276 Default | 276 Options | 276 Required Privilege Level | 276 Release Information | 276 276 Syntax accounting-secret password; Hierarchy Level [edit access radius servers name] Description Configure the secret password to be used when sending accounting-start requests to the RADIUS server if the accounting secret password is different from the authentication secret password. RADIUS accounting-start requests are used when the RADIUS server is not able to initiate a change of authorization request without an accounting record. Default Use the same password that is used for authentication requests. Options password Password for accounting requests. · Range: 1 through 64 characters Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 277 RELATED DOCUMENTATION Configuring RADIUS Servers | 91 Understanding Network Elements | 71 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 activation-attribute (AAA Profile) IN THIS SECTION Syntax | 277 Hierarchy Level | 277 Description | 277 Required Privilege Level | 278 Release Information | 278 Syntax activation-attribute { <code numeric-code;> <vendor-id vendor-id;> } Hierarchy Level [edit unified-edge aaa profiles aaa-profile-name radius policy] Description Configure the RADIUS attribute that you want to carry the PCC rulebase name for rulebase activations from the RADIUS policy server to the MX Series router. By default, the rulebase name is carried in the ERX-Service-Activate Juniper vendor-specific attribute. 278 The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring an AAA Profile | 96 Understanding AAA Profiles | 73 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 address (Diameter Peer) IN THIS SECTION Syntax | 278 Hierarchy Level | 279 Description | 279 Options | 279 Required Privilege Level | 279 Release Information | 279 Syntax address ip-address; 279 Hierarchy Level [edit access diameter peer peer-name] Description Configure the IP address for the Diameter remote peer. Options address--IP address for the Diameter peer. Required Privilege Level admin--To view this statement in the configuration. admin-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION diameter (Subscriber Aware Policy Control) | 368 address (LRF Profile) IN THIS SECTION Syntax | 280 Hierarchy Level | 280 Description | 280 Options | 280 280 Required Privilege Level | 280 Release Information | 280 Syntax address collector-address; Hierarchy Level [edit services lrf profile profile-name collector collector-name destination] Description Specify the destination IP address of the collector. Options collector-address IP address of the collector. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Release 19.3R1 on MX Series. RELATED DOCUMENTATION Configuring an LRF Profile for Subscribers 281 Configuring Logging and Reporting for Junos OS Subscriber Aware address (RADIUS Clients) IN THIS SECTION Syntax | 281 Hierarchy Level | 281 Description | 281 Options | 281 Required Privilege Level | 282 Release Information | 282 Syntax address client-address; Hierarchy Level [edit access radius clients client-name] Description Specify the address from which the GGSN, PGW, or BNG RADIUS client sends the RADIUS requests. Options client-address IP address of the PGW client. 282 Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring RADIUS Clients That Send Accounting Requests for IP-Based Subscribers | 128 address (RADIUS Server) IN THIS SECTION Syntax | 282 Hierarchy Level | 282 Description | 283 Options | 283 Required Privilege Level | 283 Release Information | 283 Syntax address server-address; Hierarchy Level [edit access radius servers name] 283 Description Configure the address of the RADIUS server. Options server-address IP address for the RADIUS server. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring RADIUS Servers | 91 Understanding Network Elements | 71 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 address-mapping (Application Identification) IN THIS SECTION Syntax | 284 Hierarchy Level | 284 Description | 284 Options | 284 Required Privilege Level | 284 Release Information | 284 284 Syntax address-mapping name { destination { ip ip-address-prefix; } source { ip ip-address-prefix; } order order; order-priority (high | low); } } Hierarchy Level [edit services application-identification application application-name] Description Define an application signature based on the source or destination IP address. The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details. Options name Name given to the application associated with the source or destination IP address. Required Privilege Level view-level--To view this statement in the configuration. control-level--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 285 RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures address-pools IN THIS SECTION Syntax | 285 Hierarchy Level | 286 Description | 286 Options | 286 Required Privilege Level | 286 Release Information | 286 Syntax address-pools { name { default-pool; family (inet | inet6) { network { [network-prefix] { external-assigned; } } } service-mode service-mode-options; } } 286 Hierarchy Level [edit access address-assignment] Description Configure the address pools that the TDF domains use to specify the source IP addresses of packets to undergo TDF processing. Options name Name of the address pool. · Range: 1 through 63 alphanumeric characters The remaining statements are explained separately. See CLI Explorer. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Understanding Source IP Filtering with Address Pools in TDF Domains for IP-Based Subscribers | 110 Configuring Address Pools for Source-IP Filtering of IP-Based Subscribers | 119 Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 287 allow-dynamic-requests (RADIUS Server) IN THIS SECTION Syntax | 287 Hierarchy Level | 287 Description | 287 Required Privilege Level | 287 Release Information | 287 Syntax allow-dynamic-requests; Hierarchy Level [edit access radius servers name] Description Allow dynamic requests from the RADIUS server so that change of authorization requests can be received. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 288 RELATED DOCUMENTATION Configuring RADIUS Servers | 91 Understanding Network Elements | 71 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 alt-name (Application Identification) IN THIS SECTION Syntax | 288 Hierarchy Level | 288 Description | 288 Options | 288 Required Privilege Level | 289 Release Information | 289 Syntax alt-name alt-name Hierarchy Level [edit services application-identification application application-name] Description Provide an alternate name for the application. Options alt-name Alternate name for the application. 289 · Range: 1 through 255 characters Required Privilege Level view-level--To view this statement in the configuration. control-level--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures application (Application Identification) IN THIS SECTION Syntax | 289 Hierarchy Level | 291 Description | 291 Options | 291 Required Privilege Level | 291 Release Information | 291 Syntax application application-name <description description> { address-mapping name { destination { 290 ip ip-address-prefix; } source { ip ip-address-prefix; } order order; order-priority (high | low); } } alt-name alt-name; cacheable; compatibility junos-compatibility-version; description description; icmp-mapping { code icmp-code; order order; order-priority (high | low); type icmp-type; } ip-protocol-mapping { order order; order-priority (high | low); protocol protocol-number } order order; over protocol-type { signature l4-l7-signature-name { chain-order member member-name { check-bytes max-bytes-to-check; context context; pattern pattern; direction direction; } order order; order-priority (high | low); port-range { tcp [port-range]; udp [port-range]; } protocol (http | ssl | tcp | udp); ] priority; 291 tags tag-value; type type; } Hierarchy Level [edit services application-identification] Description Configure identification of an application for which one or more custom signatures are defined. Options application-name Name of the application for which one or more custom signatures has been defined. description (Optional) Textual description of the application for which mappings are provided. The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details. Required Privilege Level view-level--To view this statement in the configuration. control-level--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Release 19.3R2 and 19.4R1 on MX Series MX240, MX480 and MX960. RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures 292 application-group IN THIS SECTION Syntax | 292 Hierarchy Level | 292 Description | 292 Options | 293 Required Privilege Level | 293 Release Information | 293 Syntax application-group group-name { disable; application-groups { application-group-name; } applications { application-name; } index number; } Hierarchy Level [edit services application-identification] Description Define the properties and contents of the application group. 293 Options group-name--Unique identifier for the group. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 9.5. Support added in Junos OS release 19.3R2 and 19.4r1 for Next Gen Services on MX240, MX480, and MX960. NOTE: The disable and index options are not supported for Next Gen Services. RELATED DOCUMENTATION Configuring Application Groups application-groups (PCC Rules) IN THIS SECTION Syntax | 294 Hierarchy Level | 294 Description | 294 Options | 294 Required Privilege Level | 294 Release Information | 295 294 Syntax application-groups [application-group-name]; Hierarchy Level [edit unified-edge pcef pcc-rules rule-name from], [edit services pcef pcc-rules rule-name from] Description Specify one or more application groups to define the match criteria for the policy and charging control (PCC) rule. You can specify a maximum of 10 application groups in a PCC rule. NOTE: You must also include the flows statement. If you do not want to filter subscriber traffic based on service data flow filters, use flows any. If you are using Junos OS Subscriber Aware, specify the name of the application group at the [edit unified-edge pcef pcc-rules rule-name from] hierarchy level. If you are using Junos OS Broadband Subscriber Management, specify the name of the application group at the [edit services pcef pcc-rules rule-name from] hierarchy level. Options application-group-name Name of an application group that is used to detect IP packet flows. · Range: 1 through 63 characters. NOTE: The referenced application groups must have been previously configured in the [edit services application-identification] hierarchy level. Required Privilege Level For Junos OS Subscriber Aware: 295 unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef pcc-rules rule-name from] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. Support for Next Gen Services for Junos OS Broadband Subscriber Management introduced in Junos OS Release 19.3R2 on MX Series. RELATED DOCUMENTATION Configuring Policy and Charging Control Rules application-identification (Application Identification) IN THIS SECTION Syntax | 296 Hierarchy Level | 298 Description | 298 Required Privilege Level | 298 Release Information | 298 296 Syntax application-identification { application application-name <description description> { address-mapping name { destination { ip ip-address-prefix; } source { ip ip-address-prefix; } order order; order-priority (high | low); } } alt-name alt-name; cacheable; compatibility junos-compatibility-version; description description; icmp-mapping { code icmp-code; order order; order-priority (high | low); type icmp-type; } ip-protocol-mapping { order order; order-priority (high | low); protocol protocol-number } order over protocol-type { signature l4-l7-signature-name { chain-order member member-name { check-bytes max-bytes-to-check; context context; pattern pattern; direction direction; } order order; order-priority (high | low); 297 port-range { tcp [port-range]; udp [port-range]; } protocol (http | ssl | tcp | udp); ] } priority; tags tag-value; type type; } application-group group-name { disable; application-groups { application-group-name; } applications { application-name; } index number; } application-system-cache-timeout; download { } inspection-limit { tcp { byte-limit byte-limit-number; packet-limit packet-limit-number; } udp { byte-limit byte-limit-number; packet-limit packet-limit-number; } } micro-apps; no-application-system-cache; statistics { interval minutes; } traceoptions { file { filename ; files number; 298 match regular-expression; size maximum-file-size; (world-readable | no-world-readable); } flag flag; level [all | error | info | notice | verbose | warning] no-remote-trace; } no-application-system-cache; packet-capture profile profile-name } Hierarchy Level [edit services] Description Configure application identification options to identify the application as it passes through the device. The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details. Required Privilege Level system--To view this statement in the configuration. system-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Release 19.3R2 and 19.4R1 on MX Series routers MX240, MX480 and MX960. RELATED DOCUMENTATION Application Identification Overview 299 Configuring Custom Application Signatures application-identification-profile (Service Set) IN THIS SECTION Syntax | 299 Hierarchy Level | 299 Description | 299 Options | 299 Required Privilege Level | 300 Release Information | 300 Syntax application-identification-profile app-id-profile-name; Hierarchy Level [edit services service-set service-set-name] Description Specify the dummy application identification profile that you configured at the [edit services application-identification profile] hierarchy level. This profile is a placeholder profile with no configuration options, but it must be specified to enable application identification functionality on the services plane. Options app-id-profile-name Name of the application identification profile. 300 Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Applying Services to Subscriber-Aware Traffic with a Service Set Identifying the Service Interface That Handles Subscriber Management Application-Aware Policy Control applications (Services Application Identification) IN THIS SECTION Syntax | 300 Hierarchy Level | 301 Description | 301 Options | 301 Required Privilege Level | 301 Release Information | 301 Syntax applications { application-name; } 301 Hierarchy Level [edit services application-identification application-group group-name] Description Identify the list of applications for inclusion in the application group. Options application-name--Identifier for the application. Maximum length is 32 characters. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 9.5. Support added in Junos OS release 19.3R2 and 19.4r1 for Next Gen Services on MX240, MX480, and MX960. RELATED DOCUMENTATION Configuring Application Groups applications (Diameter) IN THIS SECTION Syntax | 302 Hierarchy Level | 302 302 Description | 302 Options | 302 Required Privilege Level | 302 Release Information | 303 Syntax applications { pcc-gx { maximum-pending-requests requests; } } Hierarchy Level [edit access diameter] Description Configure the parameters for Diameter applications. Specify the Diameter application for which you are configuring the parameters. The Gx application (pcc-gx) is currently supported. Options pcc-gx Use the parameters for the Gx application. The remaining statement is explained separately. See CLI Explorer. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. 303 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION diameter (Subscriber Aware Policy Control) | 368 applications (PCC Rules) IN THIS SECTION Syntax | 303 Hierarchy Level | 303 Description | 304 Options | 304 Required Privilege Level | 304 Release Information | 304 Syntax applications [application-name]; Hierarchy Level [edit unified-edge pcef pcc-rules rule-name from], [edit services pcef pcc-rules rule-name from] 304 Description Specify one or more applications to define the match criteria for the policy and charging control (PCC) rule. You can specify a maximum of 10 applications in a PCC rule. NOTE: You must also include the flows statement. If you do not want to filter subscriber traffic based on service data flow filters, use flows any. If you are using Junos OS Subscriber Aware, specify the name of the applications at the [edit unifiededge pcef pcc-rules rule-name from] hierarchy level. If you are using Junos OS Broadband Subscriber Management, specify the name of the applications at the [edit services pcef pcc-rules rule-name from] hierarchy level. Options application-name Name of one or more applications that is used to detect IP packet flows. · Range: 1 through 63 characters. NOTE: The referenced application must have been previously configured in the [edit services application-identification] hierarchy level. Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 305 Support at the [edit services pcef pcc-rules rule-name from] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. Support for Next Gen Services for Junos OS Broadband Subscriber Management introduced in Junos OS Release 19.3R2 on MX Series. RELATED DOCUMENTATION Configuring Policy and Charging Control Rules attribute IN THIS SECTION Syntax | 305 Hierarchy Level | 307 Description | 307 Options | 307 Required Privilege Level | 307 Release Information | 307 Syntax attribute name { code numeric-code; vendor-id vendor-id; format { integer { equals { value; } greater-than value; less-than value; } 306 string { equals { value; } has-prefix{ value; } has-suffix { value; } matches { value; } } time { equals { value; } greater-than value; less-than value; } v4address { equals { value; } } v6address { equals { value; } } v6prefix { equals { value; } } } } 307 Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from] Description Specify a custom RADIUS attribute for the incoming RADIUS request from the subscriber. You can configure up to five attributes. After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. Options name Name for the attribute. · Range: 1 through 50 alphanumeric characters. Allowed characters are [a-z, A-Z, 0-9] The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 308 attributes (Diameter Gx Profiles) IN THIS SECTION Syntax | 308 Hierarchy Level | 308 Description | 309 Required Privilege Level | 309 Release Information | 309 Syntax attributes { exclude { an-gw-address; default-eps-bearer-qos; packet-filter-information; packet-filter-operation; rat-type; } include { gx-capability-list; rule-suggestion; } } Hierarchy Level [edit unified-edge diameter-profiles gx-profile profile-name] 309 Description Configure attribute-value pairs (AVPs) that are excluded from or included in the credit control request (CCR) messages between the MX Series router and the policy and charging enforcement function (PCEF). The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION gx-profile | 429 authentication (AAA Profile) IN THIS SECTION Syntax | 310 Hierarchy Level | 310 Description | 310 Required Privilege Level | 310 Release Information | 310 310 Syntax authentication { network-element network-element-name; } Hierarchy Level [edit unified-edge aaa profiles aaa-profile-name radius] Description Specify the network element providing policy management for TDF subscribers. The network element must already be defined at the [edit access radius] hierarchy level. The remaining statement is explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring an AAA Profile | 96 Understanding AAA Profiles | 73 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 311 burst-size (Default Local Policy) IN THIS SECTION Syntax | 311 Hierarchy Level | 311 Description | 311 Options | 311 Required Privilege Level | 312 Release Information | 312 Syntax burst-size uplink uplink-burst-size downlink downlink-burst-size; Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name ip-subscriber default-local-policy] Description Specify the allowed burst size for a subscriber's uplink and downlink traffic during the TDF IP-based subscriber creation process. Uplink traffic originates from the subscriber towards the public data network (PDN), and downlink traffic comes from the PDN and is destined for the subscriber. Options uplink-burst-size downlink-burst-size Burst size value for the uplink direction. · Range: 1500 through 1,500,000,000 bytes. Burst size value for the downlink direction. 312 · Range: 1500 through 1,500,000,000 bytes Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based Subscriber Setup Overview | 107 burst-size (TDF Domain) IN THIS SECTION Syntax | 313 Hierarchy Level | 313 Description | 313 Options | 313 Required Privilege Level | 313 Release Information | 313 313 Syntax burst-size { apply-groups [group-names]; apply-groups-except [group-names]; downlink downlink-burst-size; uplink uplink-burst-size ; } Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name] Description Configure the TDF domain's default TDF subscriber allowed burst size for uplink and downlink traffic. Uplink traffic originates from the subscriber towards the public data network (PDN), and downlink traffic comes from the PDN and is destined for the subscriber. Options downlink-burst-size uplink-burst-size Burst size value for the downlink direction. · Range: 1500 through 1,500,000,000 bytes. Burst size value for the uplink direction. · Range: 1500 through 1,500,000,000 bytes. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 314 RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Configuring IFL-Based TDF Subscribers and Properties with a TDF Domain | 140 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based and IFL-Based TDF Subscribers Overview | 107 IP-Based Subscriber Setup Overview | 107 cac (TDF Gateway) IN THIS SECTION Syntax | 314 Hierarchy Level | 314 Description | 315 Required Privilege Level | 315 Release Information | 315 Syntax cac { cpu cpu-pct; maximum-sessions max-sessions; maximum-sessions-trap-percentage max-sessions-pct; memory memory-pct; } Hierarchy Level [edit unified-edge gateways tdf gateway-name] 315 Description Configure the call admissions control (CAC) parameters for the TDF gateway. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring a TDF Gateway | 16 cacheable (Application Identification) IN THIS SECTION Syntax | 315 Hierarchy Level | 316 Description | 316 Required Privilege Level | 316 Release Information | 316 Syntax cacheable; 316 Hierarchy Level [edit services application-identification application application-name] Description Enable the application system cache (ASC), which saves the mapping between an application type and the corresponding destination IP address, destination port, protocol type, and service. The ASC is disabled by default. Required Privilege Level system--To view this statement in the configuration. system-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures call-rate-statistics IN THIS SECTION Syntax | 317 Hierarchy Level | 317 Description | 317 Options | 317 Required Privilege Level | 317 317 Release Information | 317 Syntax call-rate-statistics { history records; interval minutes; } Hierarchy Level [edit unified-edge gateways tdf gateway-name], [edit unified-edge gateways tdf gateway-name domains domain-name] Description Configure call rate statistics for a TDF gateway or a TDF domain. Options records Number of call-rate statistics records to save. When the number of call-rate records equals this value and a new record is received, the oldest record is replaced by the new record. minutes Length of statistics collection interval. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 318 RELATED DOCUMENTATION Configuring Call-Rate Statistics Collection | 241 called-station-id IN THIS SECTION Syntax | 318 Hierarchy Level | 318 Description | 318 Required Privilege Level | 319 Release Information | 319 Syntax called-station-id { equals value; matches value; } Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from] Description Specify the RADIUS AVP called station ID for the incoming RADIUS request from the IP-based subscriber. After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. 319 The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 calling-station-id IN THIS SECTION Syntax | 319 Hierarchy Level | 320 Description | 320 Required Privilege Level | 320 Release Information | 320 Syntax calling-station-id { equals value; 320 matches value; } Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from] Description Specify the RADIUS AVP calling station ID for the incoming RADIUS request from the IP-based subscriber. After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 321 chain-order (Application Identification) IN THIS SECTION Syntax | 321 Hierarchy Level | 321 Description | 321 Required Privilege Level | 321 Release Information | 321 Syntax chain-order; Hierarchy Level [edit services application-identification application application-name over protocol-type signature l4-l7-signature-name] Description Read members in order. By default, chain ordering is turned off. If there is only one member, this option is ignored. Required Privilege Level system--To view this statement in the configuration. system-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 322 Support for Next Gen Services introduced in Junos OS Releases 19.3R2 and 19.4R1 on MX Series MX240, MX480 and MX960 using the MX-SPC3 services card. RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures check-bytes (Application Identification) IN THIS SECTION Syntax | 322 Hierarchy Level | 322 Description | 323 Options | 323 Required Privilege Level | 323 Release Information | 323 Syntax check-bytes max-bytes-to-check; Hierarchy Level [edit services application-identification application application-name over protocol-type signature l4-l7-signature-name member member-name] 323 Description Specify the maximum number of bytes to be inspected. This statement applies to TCP and UDP protocols for stream context. It is not considered for other protocols and contexts. Options max-bytes-to-check Number of bytes to be inspected. Range: 1 through 5000 Default: Not configured Required Privilege Level system--To view this statement in the configuration. system-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Releases 19.3R2 and 19.4R1 on MX Series MX240, MX480 and MX960 using the MX-SPC3 services card. RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures class IN THIS SECTION Syntax | 324 Hierarchy Level | 324 324 Description | 324 Required Privilege Level | 324 Release Information | 324 Syntax class { equals value; has-prefix value; has-suffix value; matches value; } Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from] Description Specify the RADIUS AVP class for the incoming RADIUS request from the IP-based subscriber. After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. 325 RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 client IN THIS SECTION Syntax | 325 Hierarchy Level | 325 Description | 325 Options | 326 Required Privilege Level | 326 Release Information | 326 Syntax client client-name; Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from] Description Specify the RADIUS client for the incoming RADIUS request from an IP-based subscriber. 326 After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. Options client-name Name of the RADIUS client. NOTE: The RADIUS client must have been previously configured at the [edit access radius] hierarchy level, and specified as the aaa-client at the [edit unified-edge gateways tdf gatewayname] hierarchy level. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 Configuring RADIUS Clients That Send Accounting Requests for IP-Based Subscribers | 128 327 clients IN THIS SECTION Syntax | 327 Hierarchy Level | 327 Description | 327 Options | 328 Required Privilege Level | 328 Release Information | 328 Syntax clients client-name { accounting { secret password; response-cache-timeout seconds; } address client-address; <prefer-framed-ip-address> <prefer-framed-ipv6-prefix> source-interface interface ipv4-address address; } Hierarchy Level [edit access radius] Description Configure a RADIUS client for each GGSN, PGW, or BNG that sends subscriber session requests to the MX Series router and identifies it as a RADIUS server. 328 Options client-name Name for the client. · Range: 1 through 50 alphanumeric characters. Allowed characters are a-z, A-Z, 0-9. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring RADIUS Clients That Send Accounting Requests for IP-Based Subscribers | 128 coa-accounting (AAA Profile) IN THIS SECTION Syntax | 329 Hierarchy Level | 329 Description | 329 Options | 329 Required Privilege Level | 329 Release Information | 329 329 Syntax coa-accounting (enable | disable); Hierarchy Level [edit unified-edge aaa profiles aaa-profile-name radius policy] Description Enable or disable the initiation of a RADIUS accounting start from the MX Series router to the RADIUS server. Enabling this feature is required if the RADIUS server cannot initiate a change of authorization request without an accounting record. Specifying enable does not cause the MX Series router to report any billing information. Options enable Initiate a RADIUS accounting start from the MX Series Router to the RADIUS server. disable Do not initiate a RADIUS accounting start from the MX Series Router to the RADIUS server. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring an AAA Profile | 96 Understanding AAA Profiles | 73 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 330 code IN THIS SECTION Syntax | 330 Hierarchy Level | 330 Description | 330 Options | 330 Required Privilege Level | 331 Release Information | 331 Syntax code numeric-code; Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name] Description Specify the custom attribute's AVP code for the incoming RADIUS request from the subscriber. After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. Options numeric-code Numeric value for the code. · Range: 0 through 255. 331 Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 code (AAA Profile) IN THIS SECTION Syntax | 331 Hierarchy Level | 332 Description | 332 Options | 332 Required Privilege Level | 332 Release Information | 332 Syntax code numeric-code; 332 Hierarchy Level [edit unified-edge aaa profiles aaa-profile-name radius policy activationattribute], [edit unified-edge aaa profiles aaa-profile-name radius policy deactivationattribute] Description Configure the RADIUS attributes that you want to carry the PCC rulebase name for rulebase activations and deactivations from the RADIUS policy server to the MX Series router. By default, the rulebase name is carried in the ERX-Service-Activate Juniper vendor-specific attribute (VSA) for activations and in the ERX-Service-Deactivate Juniper VSA for deactivations. Options numeric-code Numeric value for the RADIUS AVP. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring an AAA Profile | 96 Understanding AAA Profiles | 73 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 333 code (Application Identification) IN THIS SECTION Syntax | 333 Hierarchy Level | 333 Description | 333 Options | 333 Required Privilege Level | 333 Release Information | 334 Syntax code icmp-code; Hierarchy Level [edit services application-identification application application-name icmpmapping] Description Match the specified ICMP code to create a custom application signature. Options value Numeric value for the ICMP code. · Range: 0 through 254 Required Privilege Level system--To view this statement in the configuration. 334 system-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures collector (LRF Profile) IN THIS SECTION Syntax | 334 Hierarchy Level | 335 Description | 335 Options | 335 Required Privilege Level | 335 Release Information | 335 Syntax collector collector-name { destination { address collector-address; port collector-port-number; } source-address source-address; } 335 Hierarchy Level [edit services lrf profile profile-name] Description Configure a collector that receives logging and reporting data. This collector can be specified in LRF rules. Options collector-name Name for the collector. · Range: Up to 32 characters. The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Release 19.3R1 on MX Series. RELATED DOCUMENTATION Configuring an LRF Profile for Subscribers Configuring Logging and Reporting for Junos OS Subscriber Aware Configuring Logging and Reporting for Subscriber Management 336 collector (LRF Rule) IN THIS SECTION Syntax | 336 Hierarchy Level | 336 Description | 336 Options | 336 Required Privilege Level | 336 Release Information | 337 Syntax collector collector-name; Hierarchy Level [edit services lrf profile profile-name rule lrf-rule-name then report] Description Specify the collector that receives the data if the LRF rule is matched. Options collector-name Name of the collector that receives the data. The referenced collector must already be defined at the [edit services lrf profile profile-name] hierarchy level. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. 337 Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Release 19.3R1 on MX Series. RELATED DOCUMENTATION Configuring an LRF Profile for Subscribers Configuring Logging and Reporting for Junos OS Subscriber Aware Configuring Logging and Reporting for Subscriber Management compatibility (Application Identification) IN THIS SECTION Syntax | 337 Hierarchy Level | 337 Description | 338 Options | 338 Required Privilege Level | 338 Release Information | 338 Syntax compatibility junos-compatibility-version; Hierarchy Level [edit services application-identification application application-name] 338 Description Specify the Junos OS release for compatibility. Options junos-compatibility-version Name of the Junos OS software release compatibility version, such as 17.1. Required Privilege Level system--To view this statement in the configuration. system-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures connect-actively IN THIS SECTION Syntax | 339 Hierarchy Level | 339 Description | 339 Options | 339 Required Privilege Level | 340 Release Information | 340 339 Syntax connect-actively { <capabilities-exchange-timeout seconds>; <port port-number>; <repeat-timeout seconds>; <retry-timeout seconds>; <timeout seconds>; transport transport-name; } Hierarchy Level [edit access diameter peer peer-name] Description Define the destination port and transport connection used to establish active connections to the Diameter peer. Options capabilitiesexchangetimeout seconds (Optional) Use the specified amount of time to wait for a Capabilities-ExchangeAnswer message. · Range: 1 through 65,535 seconds · Default: 10 seconds port portnumber (Optional) Use the specified destination TCP port. · Default: 3868 repeat-timeout seconds (Optional) Use the specified amount of time to wait before attempting to reconnect to this peer after receiving the DO_NOT_WANT_TO_TALK_TO_YOU value for the Disconnect-Cause AVP in the Disconnect-Peer-Request message. A value of zero means that there is no attempt to reconnect to the peer. · Range: 0 through 65,535 seconds 340 · Default: 0 retry-timeout seconds (Optional) Use the specified amount of time to wait between connection attempts for this peer. · Range: 1 through 65,535 seconds · Default: 30 seconds timeout seconds (Optional) Use the specified amount of time to wait for connection acknowledgement for this peer. · Range: 1 through 65,535 seconds · Default: 10 seconds transport Use the specified name of the transport layer connection. transport-name NOTE: The specified transport must already be configured at the [edit access diameter transport] hierarchy level. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION diameter (Subscriber Aware Policy Control) | 368 341 constant IN THIS SECTION Syntax | 341 Hierarchy Level | 341 Description | 341 Options | 341 Required Privilege Level | 341 Release Information | 342 Syntax constant value; Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name ip-subscriber subscription-id] Description Specify a constant string for the Subscription-Id-Data value for IP-based subscribers. This constant value is used if none of the subscription-id-options methods can be used. In such a case, the Subscription-IdType is END_USER_PRIVATE. Options value String that is used for the Subscription-Id-Data value. Required Privilege Level unified-edge--To view this statement in the configuration. 342 unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based Subscriber Setup Overview | 107 context (Application Identification) IN THIS SECTION Syntax | 342 Hierarchy Level | 342 Description | 343 Options | 343 Required Privilege Level | 344 Release Information | 344 Syntax context context; Hierarchy Level [edit services application-identification application application-name over protocol-type signature l4-l7-signature-name member member-name] 343 Description Define a predefined service-specific context as an additional matching criterion for application identification. Options context One of the following predefined contexts: NOTE: If the MX Series router is running Next Gen Services, then the following restrictions apply: · Only the http-header context types are available at the [edit services application- identification application application-name over http signature l4-l7-signaturename member member-name] hierarchy level. · Only the ssl-server context type is available at the [edit services applicationidentification application application-name over ssl signature l4-l7-signature-name member member-name] hierarchy level. · Only the stream context type is available at the [edit services applicationidentification application application-name over (tcp | udp) signature l4-l7signature-name member member-name] hierarchy level. · http-get-url-parsed-param-parsed--Decoded, normalized GET URL in an HTTP request and the decoded CGI parameters, if any. · http-header-content-type--Content-Type header in an HTTP transaction. · http-header-cookie--Cookie header in an HTTP transaction. · http-header-host--Host header in an HTTP request. · http-header-user-agent--User-agent header in an HTTP transaction. · http-post-url-parsed-param-parsed--Decoded, normalized POST URL in an HTTP request and the decoded CGI parameters, if any. · http-post-variable-parsed--Decoded POST URL or form data variables. · http-url-parsed--Decoded, normalized URL in an HTTP request. 344 · http-url-parsed-param-parsed--Decoded, normalized URL in an HTTP request and the decoded CGI parameters, if any. · ssl-server-name--Server name in the TLS server name extension or in the SSL server certificate. · stream-- TCP or UDP stream data. Required Privilege Level system--To view this statement in the configuration. system-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Releases 19.3R2 and 19.4R1 on MX Series MX240, MX480 and MX960 using the MX-SPC3 services card. RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures count (HTTP Header Enrichment) IN THIS SECTION Syntax | 345 Hierarchy Level | 345 Description | 345 Required Privilege Level | 345 Release Information | 345 345 Syntax count; Hierarchy Level [edit services hcm tag-rule rule-name term term-number then] Description Enable the collection of statistics for HTTP header enrichment for the tag rule term. The collection of statistics for a term is disabled by default. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 Configuring Tag Rules | 42 Configuring HCM Profiles and Assigning Tag Rules | 49 Junos Web Aware HTTP Header Enrichment Overview | 34 show services hcm statistics | 885 346 cpu (TDF Gateway) IN THIS SECTION Syntax | 346 Hierarchy Level | 346 Description | 346 Options | 346 Required Privilege Level | 347 Release Information | 347 Syntax cpu cpu-pct; Hierarchy Level [edit unified-edge gateways tdf gateway-name cac] Description Configure the threshold for the maximum amount of CPU that the TDF gateway can use. If the amount of CPU that the TDF gateway uses reaches the threshold, the SNMP trap jnxScgSMCPUThreshHigh is generated. Options cpu-pct Maximum percentage of CPU. · Range: 1 through 90. 347 Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring a TDF Gateway | 16 deactivation-attribute (AAA Profile) IN THIS SECTION Syntax | 347 Hierarchy Level | 348 Description | 348 Required Privilege Level | 348 Release Information | 348 Syntax deactivation-attribute { <code numeric-code;> <vendor-id vendor-id;> } 348 Hierarchy Level [edit unified-edge aaa profiles aaa-profile-name radius policy] Description Configure the RADIUS attribute that you want to carry the PCC rulebase name for rulebase deactivations from the RADIUS policy server to the MX Series router. By default, the rulebase name is carried in the ERX-Service-Deactivate Juniper vendor-specific attribute. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring an AAA Profile | 96 Understanding AAA Profiles | 73 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 dead-criteria-retries (RADIUS Server) IN THIS SECTION Syntax | 349 Hierarchy Level | 349 Description | 349 349 Default | 349 Options | 349 Required Privilege Level | 350 Release Information | 350 Syntax dead-criteria-retries retry-number interval seconds; Hierarchy Level [edit access radius servers name] Description Configure a limit to the number of times the MX Series router can resend a request to the RADIUS server when no response from the RADIUS server is received. If the number of retries reaches this limit, the RADIUS server is marked as dead, and the MX Series router begins to send requests to other RADIUS servers in the network element. Default The dead server detection function is disabled. Options retry-number seconds Number of retries. · Range: 10 through 65535 Time interval in seconds. · Range: 5 through 300 350 Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring RADIUS Servers | 91 Understanding Network Elements | 71 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 default-local-policy IN THIS SECTION Syntax | 350 Hierarchy Level | 351 Description | 351 Required Privilege Level | 351 Release Information | 351 Syntax default-local-policy { flow-action (drop | forward); maximum-bit-rate uplink mbr-uplink-value downlink mbr-downlink-value; burst-size uplink uplink-burst-size downlink downlink-burst-size; } 351 Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name ip-subscriber] Description Specify the default local policy, which is applied to the IP-based subscriber's data packets entering the access interface of the TDF domain when a TDF subscriber session does not exist. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based Subscriber Setup Overview | 107 default-pool (Address Pools) IN THIS SECTION Syntax | 352 Hierarchy Level | 352 Description | 352 352 Required Privilege Level | 352 Release Information | 352 Syntax default-pool; Hierarchy Level [edit access address-assignment address-pools name] Description Configure the address pool as a default pool. A TDF domain uses the default address pool to specify the source IP addresses of packets that undergo TDF processing when an address pool is not specified for the TDF domain. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Understanding Source IP Filtering with Address Pools in TDF Domains for IP-Based Subscribers | 110 Configuring Address Pools for Source-IP Filtering of IP-Based Subscribers | 119 Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 353 description (Application Identification) IN THIS SECTION Syntax | 353 Hierarchy Level | 353 Description | 353 Options | 353 Required Privilege Level | 353 Release Information | 354 Syntax description description Hierarchy Level [edit services application-identification application application-name] Description Provide a description of the application. Options description Textual description of the application. · Range: 1 through 255 characters Required Privilege Level system--To view this statement in the configuration. 354 system-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures destination (Application Identification) IN THIS SECTION Syntax | 354 Hierarchy Level | 354 Description | 355 Options | 355 Required Privilege Level | 355 Release Information | 355 Syntax destination ip ip-address-prefix; Hierarchy Level [edit services application-identification application application-name addressmapping] 355 Description Specify the destination IP address for address mapping-based application identification. Options ip-address-prefix IP address and prefix for matching. Required Privilege Level system--To view this statement in the configuration. system-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures destination (LRF Profile) IN THIS SECTION Syntax | 356 Hierarchy Level | 356 Description | 356 Required Privilege Level | 356 Release Information | 356 356 Syntax destination { address collector-address; port collector-port-number; } Hierarchy Level [edit services lrf profile profile-name collector collector-name] Description Specify the destination IP address and port number of the collector. The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Release 19.3R1 on MX Series. RELATED DOCUMENTATION Configuring an LRF Profile for Subscribers Configuring Logging and Reporting for Junos OS Subscriber Aware Configuring Logging and Reporting for Subscriber Management 357 destination-address (HTTP Header Enrichment) IN THIS SECTION Syntax | 357 Hierarchy Level | 357 Description | 357 Options | 358 Required Privilege Level | 358 Release Information | 358 Syntax destination-address { (any-ipv4 | any-ipv4 except); (any-ipv6 | any-ipv6 except); (any-unicast | any-unicast except); (prefix | prefix except); } Hierarchy Level [edit services hcm tag-rule rule-name term term-number from] Description Specify the prefix or address type that the HTTP request destination IP address must match. You can specify multiple prefixes or address types by including the destination-address statement multiple times. After this criterion and the other match criteria specified for the term are matched, the HTTP header enrichment actions specified for the term are applied to the HTTP traffic. 358 Options any-ipv4 Match any IPv4 address. any-ipv4 except Exclude IPv4 addresses from addresses that are in a destination-address, destinationaddress-range, or destination-prefix-list statement configured at the [edit services hcm tag-rule rule-name term term-number from] hierarchy level. You cannot use except without also configuring addresses that do match. any-ipv6 Match any IPv6 address. any-ipv6 except Exclude IPv6 addresses from addresses that are in a destination-address, destinationaddress-range, or destination-prefix-list statement configured at the [edit services hcm tag-rule rule-name term term-number from] hierarchy level. You cannot use except without also configuring addresses that do match. any-unicast Match any IPv4 unicast address. This option does not match any IPv6 addresses. any-unicast except Exclude IPv4 unicast addresses from addresses that are in a destination-address, destination-address-range, or destination-prefix-list statement configured at the [edit services hcm tag-rule rule-name term term-number from] hierarchy level. You cannot use except without also configuring IPv4 addresses that do match. prefix IP prefix for the addresses that are matched. prefix except Exclude the specified IP prefixes from addresses that are in a destination-address, destination-address-range, or destination-prefix-list statement configured at the [edit services hcm tag-rule rule-name term term-number from] hierarchy level. You cannot use except without also configuring addresses that do match. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 359 RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 hcm (HTTP Header Enrichment) | 434 destination-address-range (HTTP Header Enrichment) IN THIS SECTION Syntax | 359 Hierarchy Level | 359 Description | 359 Options | 360 Required Privilege Level | 360 Release Information | 360 Syntax destination-address-range { high address low address <except>; } Hierarchy Level [edit services hcm tag-rule rule-name term term-number from] Description Specify an IP address range that the HTTP request destination IP address must match. You can specify multiple address ranges by including the destination-address-range statement multiple times. After this criterion and the other match criteria specified for the term are matched, the HTTP header enrichment actions specified for the term are applied to the HTTP traffic. 360 Options except (Optional) Exclude addresses in the specified address range from addresses that are in a destination-address, destination-address-range, or destination-prefix-list statement configured at the [edit services hcm tag-rule rule-name term term-number from] hierarchy level. You cannot use except without also configuring addresses that do match. high address Upper limit of the address range. low address Lower limit of the address range. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 hcm (HTTP Header Enrichment) | 434 destination-ip-address (RADIUS Snoop Segment) IN THIS SECTION Syntax | 361 Hierarchy Level | 361 Description | 361 Options | 361 Required Privilege Level | 361 361 Release Information | 361 Syntax destination-ip-address destination-address; Hierarchy Level [edit access radius snoop-segments segment-name] Description Specify the destination IP address for accounting messages to snoop. Options destination-address Destination IPv4 address of accounting messages. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring Snooping of RADIUS Accounting Requests for IP-Based Subscribers | 136 Snooping RADIUS Accounting Requests for IP-Based Subscribers Overview | 114 IP-Based Subscriber Setup Overview | 107 362 destination-port (RADIUS Snoop Segment) IN THIS SECTION Syntax | 362 Hierarchy Level | 362 Description | 362 Options | 362 Required Privilege Level | 363 Release Information | 363 Syntax destination-port destination-port; Hierarchy Level [edit access radius snoop-segments segment-name] Description Specify the destination port for accounting messages to snoop. Options destination-port Destination port of accounting messages. · Default: 1813 · Range: 1 through 65,535 363 Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring Snooping of RADIUS Accounting Requests for IP-Based Subscribers | 136 Snooping RADIUS Accounting Requests for IP-Based Subscribers Overview | 114 IP-Based Subscriber Setup Overview | 107 destination-port-range (HTTP Header Enrichment) IN THIS SECTION Syntax | 363 Hierarchy Level | 364 Description | 364 Options | 364 Required Privilege Level | 364 Release Information | 364 Syntax destination-port-range { high port-number low port-number; } 364 Hierarchy Level [edit services hcm tag-rule rule-name term term-number from] Description Specify a port range that the HTTP request destination port number must match. You can specify multiple port ranges by including the destination-port-range statement multiple times. After this criterion and the other match criteria specified for the term are matched, the HTTP header enrichment actions specified for the term are applied to the HTTP traffic. Options high port-number low port-number Upper limit of the port range. Lower limit of the port range. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 hcm (HTTP Header Enrichment) | 434 365 destination-ports (HTTP Header Enrichment) IN THIS SECTION Syntax | 365 Hierarchy Level | 365 Description | 365 Options | 365 Required Privilege Level | 366 Release Information | 366 Syntax destination-ports value; Hierarchy Level [edit services hcm tag-rule rule-name term term-number from] Description Specify the HTTP request destination port number that must be matched. You can specify multiple ports by including the destination-ports statement multiple times. After this criterion and the other match criteria specified for the term are matched, the HTTP header enrichment actions specified for the term are applied to the HTTP traffic. Options value--Port number. · Range: 0 through 65,535 366 Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 hcm (HTTP Header Enrichment) | 434 destination-prefix-list (HTTP Header Enrichment) IN THIS SECTION Syntax | 366 Hierarchy Level | 367 Description | 367 Options | 367 Required Privilege Level | 367 Release Information | 367 Syntax destination-prefix-list { (prefix-name | prefix-name except); } 367 Hierarchy Level [edit services hcm tag-rule rule-name term term-number from] Description Specify the destination prefix list that the HTTP request destination IP address must match. You can specify multiple prefix lists by including the destination-prefix-list statement multiple times. After this criterion and the other match criteria specified for the term are matched, the HTTP header enrichment actions specified for the term are applied to the HTTP traffic. Options prefixname Name of the prefix list. NOTE: The prefix list must already be defined at the [edit policy-options prefixlist] hierarchy level. prefixname except Exclude addresses that are in the specified prefix list from addresses that are in the destination-address or destination-address-range statement configured at the [edit services hcm tag-rule rule-name term term-number from] hierarchy level. You cannot use except without also configuring addresses that do match. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 368 hcm (HTTP Header Enrichment) | 434 diameter (Subscriber Aware Policy Control) IN THIS SECTION Syntax | 368 Hierarchy Level | 369 Description | 369 Required Privilege Level | 370 Release Information | 370 Syntax diameter { applications { pcc-gx { <maximum-pending-requests requests>; } } <firmware-revision version>; network-element element-name { function function-name; peer peer-name { priority priority-value; <timeout seconds>; } } origin { host hostname; realm realm-name; } peer peer-name { address ip-address; connect-actively { 369 <capabilities-exchange-timeout seconds>; <port port-number>; <repeat-timeout seconds>; <retry-timeout seconds>; <timeout seconds>; transport transport-name; } <disconnect-peer-timeout seconds>; <incoming-queue> { size size; } <outgoing-queue> { <high-watermark high-watermark>; <low-watermark low-watermark>; size size; } <watchdog-timeout seconds>; } <product-name product-name>; traceoptions { file diameter; flag flag; level all; peer { peer-name; } } Hierarchy Level [edit access] Description Configure the Diameter base protocol parameters for subscriber-aware dynamic policy control, so that Diameter applications can connect to remote peers. The Diameter base protocol configuration includes configuration of the endpoint origin, the transport layer connection, the remote peers, and the network elements. The remaining statements are explained separately. See CLI Explorer. 370 Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring Diameter Profiles | 152 diameter (TDF Gateway) IN THIS SECTION Syntax | 370 Hierarchy Level | 371 Description | 371 Required Privilege Level | 371 Release Information | 371 Syntax diameter { network-element { element-name { session-pics { group { group-name { [session-pic interface-name]; } 371 } } } } } Hierarchy Level [edit unified-edge tdf gateway-name] Description Configure the Diameter protocol parameters associated with Diameter bindings for this TDF gateway. NOTE: If you want to set up Diameter bindings for session PICs on the TDF gateway, contact Juniper Networks Professional Services for assistance. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring Diameter Profiles | 152 372 diameter-profile (PCEF Profile) IN THIS SECTION Syntax | 372 Hierarchy Level | 372 Description | 372 Options | 372 Required Privilege Level | 373 Release Information | 373 Syntax diameter-profile gx-profile-name; Hierarchy Level [edit unified-edge pcef profiles profile-name dynamic-policy-control], [edit services pcef profiles profile-name dynamic-policy-control] Description Specify the Diameter Gx profile to use for the PCEF dynamic policy control profile. A PCEF profile with dynamic policy control must reference a defined Diameter Gx profile. If you are using Junos OS Broadband Subscriber Management, specify the Diameter Gx profile at the [edit services pcef profiles profile-name dynamic-policy-control] hierarchy level. If you are using Junos OS Subscriber Aware, specify the Diameter Gx profile at the [edit unified-edge pcef profiles profile-name dynamic-policy-control] hierarchy level. Options gx-profile-name Name of the Diameter Gx profile to use with this dynamic policy control profile. 373 Required Privilege Level For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef profiles profile-name dynamic-policy-control] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 18.2R1 on MX Series. RELATED DOCUMENTATION Configuring a Policy and Charging Enforcement Function Profile for Subscriber Management Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Dynamic Policies | 98 direction (Application Identification) IN THIS SECTION Syntax | 374 Hierarchy Level | 374 Description | 374 Options | 374 Required Privilege Level | 374 Release Information | 374 374 Syntax direction (any | client-to-server | server-to-client); Hierarchy Level [edit services application-identification application application-name over protocol-type signature l4-l7-signature-name member member-name] Description Specify the connection direction of the packets to which to apply pattern matching. Options any client-to-server server-to-client Apply pattern matching to packets flowing in any direction. Apply pattern matching only to packets flowing from client to server. Apply pattern matching only to packets flowing from server to client. Required Privilege Level system--To view this statement in the configuration. system-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Releases 19.3R2 and 19.4R1 on MX Series MX240, MX480 and MX960 using the MX-SPC3 services card. RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures 375 direction (Service Data Flow Filters) IN THIS SECTION Syntax | 375 Hierarchy Level | 375 Description | 375 Default | 375 Options | 376 Required Privilege Level | 376 Release Information | 376 Syntax direction (uplink | downlink | both); Hierarchy Level [edit unified-edge pcef flow-descriptions flow-identifier], [edit services pcef flow-descriptions flow-identifier] Description Specify the direction in which service data flow (SDF) filters will detect service flow IP packets. If you are using Junos OS Subscriber Aware, specify the direction at the [edit unified-edge pcef flowdescriptions flow-identifier] hierarchy level. If you are using Junos OS Broadband Subscriber Management, specify the direction at the [edit services pcef flow-descriptions flow-identifier] hierarchy level. Default If you do not configure the direction statement, the default direction is both. 376 Options uplink downlink both SDF filters are applied in the uplink direction. SDF filters are applied in the downlink direction. SDF filters are applied in both the uplink and downlink directions. Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef flow-descriptions flow-identifier] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. RELATED DOCUMENTATION Configuring Service Data Flow Filters Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment Understanding Application-Aware Policy Control for Subscriber Management 377 disconnect-peer-timeout IN THIS SECTION Syntax | 377 Hierarchy Level | 377 Description | 377 Options | 377 Required Privilege Level | 378 Release Information | 378 Syntax disconnect-peer-timeout seconds; Hierarchy Level [edit access diameter peer peer-name] Description Configure the amount of time to wait in the Closing state while disconnecting this peer. Options seconds Amount of time to wait in the Closing state. · Range: 1 through 65,535 seconds · Default: 10 seconds 378 Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION diameter (Subscriber Aware Policy Control) | 368 domain (TDF Domain Selection) IN THIS SECTION Syntax | 378 Hierarchy Level | 379 Description | 379 Options | 379 Required Privilege Level | 379 Release Information | 379 Syntax domain tdf-domain-name; 379 Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name then] Description Specify the TDF domain to be selected when the criteria specified in the domain selection statement are matched. NOTE: This statement is required even if you have not specified any match criteria. Options tdf-domain-name Name of the TDF domain to use. NOTE: The TDF domain must have been previously configured at the [edit unified-edge gateways tdf gateway-name domains] hierarchy level. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 380 IP-Based Subscriber Setup Overview | 107 domain-selection IN THIS SECTION Syntax | 380 Hierarchy Level | 382 Description | 383 Required Privilege Level | 383 Release Information | 383 Syntax domain-selection { term term-name { from { 3gpp-imsi { equals value; has-prefix value; has-suffix value; matches value; } attribute name { code numeric-code; vendor-id vendor-id; format { integer { equals { value; } greater-than value; less-than value; } string { 381 equals { value; } has-prefix { value; } has-suffix { value; } matches { value; } } time { equals { value; } greater-than value; less-than value; } v4address { equals { value; } } v6address { equals { value; } } v6prefix { equals { value; } } } } called-station-id { equals value; matches value; } calling-station-id { equals value; 382 matches value; } class { equals value; has-prefix value; has-suffix value; matches value; } client client-name; framed-ip-address { equals value; } framed-ipv6-prefix { equals value; } nas-ip-address { equals value; } snoop-segment snoop-segment-name; user-name { equals value; has-prefix value; has-suffix value; matches value; } } then { domain tdf-domain-name; pcef-profile pcef-profile-name; } } } Hierarchy Level [edit unified-edge gateways tdf gateway-name] 383 Description Specify the TDF domain to be used for an IP-based subscriber. You can configure multiple terms under domain-selection, and each term is applied in the order in which it is configured. You can specify multiple match conditions within a term and all of the conditions have to match. If the incoming RADIUS request from the subscriber matches the criteria in a term, then the TDF domain specified in the then statement of the term is used to create the TDF subscriber. You can also specify a PCEF profile for an IP-based subscriber. This is required if the TDF domain selected for a subscriber does not specify a PCEF profile or you want to allow different members of the same TDF domain to have different PCEF profiles. After a term matches and a TDF domain is selected, further terms are not evaluated if the PCEF profile is specified in either the then statement or in the selected TDF domain. If a PCEF profile is not specified in either the then statement or in the selected TDF domain, further terms are evaluated to find a PCEF profile for the subscriber. If no TDF domain is selected for a subscriber, then a TDF subscriber session is not created. NOTE: The TDF domain must have been previously configured at the [edit unified-edge gateways tdf gateway-name domains] hierarchy level. The PCEF profile must have been previously configured at the [edit unified-edge pcef] hierarchy level. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 384 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 domains IN THIS SECTION Syntax | 384 Hierarchy Level | 386 Description | 386 Options | 387 Required Privilege Level | 387 Release Information | 387 Syntax domains domain-name { apply-groups [group-names]; apply-groups-except [group-names]; burst-size { apply-groups [group-names]; apply-groups-except [group-names]; downlink downlink-burst-size; uplink uplink-burst-size ; } ifl-subscriber [subscriber-name] { access-interfaces [interface-name]; apply-groups [group-names]; apply-groups-except [group-names]; } ip-subscriber { access-interfaces [interface-name]; apply-groups [group-names]; apply-groups-except [group-names]; default-local-policy { flow-action (drop | forward); 385 maximum-bit-rate { uplink mbr-uplink-value ; downlink mbr-downlink-value; } burst-size { uplink uplink-burst-size; downlink downlink-burst-size; } } idle-timeout idle-timout; immediate-accounting-response (enabled | disabled); maximum-subscribers number; subscriber-address { apply-groups [group-names]; apply-groups-except [group-names]; inet { apply-groups [group-names]; apply-groups-except [group-names]; pool pool-name; } inet6 { apply-groups [group-names]; apply-groups-except [group-names]; pool pool-name; } } subscription-id { apply-groups [group-names]; apply-groups-except [group-names]; constant ; subscription-id-options { entry-name { id-components { use-imsi; use-msisdn; use-nai; use-username; use-realm; use-nas-port; use-nas-port-id; } } } 386 } } maximum-bit-rate { apply-groups [group-names]; apply-groups-except [group-names]; downlink mbr-downlink-value; uplink mbr-uplink-value; } pcef-profile name; service-mode service-mode-options; subscriber-exclude-prefix { apply-groups [group-names]; apply-groups-except [group-names]; family { inet { apply-groups [group-names]; apply-groups-except [group-names]; network address net-mask; } inet6 { apply-groups [group-names]; apply-groups-except [group-names]; network address net-mask; } } } subscriber-type (ip | ifl); tdf-interface mif.number; } Hierarchy Level [edit unified-edge gateways tdf gateway-name] Description Configure a TDF domain, which specifies a set of properties for creating TDF subscriber sessions and for handling subscriber traffic. 387 Options domain-name Name of the TDF domain. · Range: 1 through 50 alphanumeric characters. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Configuring IFL-Based TDF Subscribers and Properties with a TDF Domain | 140 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 Understanding the Definition of a Set of IFL-Based Subscriber Properties with a TDF Domain | 116 dynamic-policy-control IN THIS SECTION Syntax | 388 Hierarchy Level | 388 Description | 388 Required Privilege Level | 388 Release Information | 388 388 Syntax dynamic-policy-control { pcc-rules { [rule-name number]; } pcc-rulebases { [rulebase-name]; } diameter-profile gx-profile-name; } Hierarchy Level [edit unified-edge pcef profiles profile-name] Description Configure the dynamic policy control for the PCC rules, PCC rulebases, or both in a PCEF profile. You can configure a maximum of 32 PCC rules in a PCEF profile. There is no limit to the number of PCC rulebases you can configure in a PCEF profile. NOTE: If you configure the dynamic-policy-control statement for a PCEF profile, you cannot configure the static-policy-control statement in the same profile. The remaining statements are explained separately. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 389 RELATED DOCUMENTATION Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Dynamic Policies | 98 Understanding How Subscriber-Aware Policy and Charging Control Rules Are Provisioned Dynamically by a PCRF | 58 dynamic-requests-secret (RADIUS Server) IN THIS SECTION Syntax | 389 Hierarchy Level | 389 Description | 389 Default | 390 Options | 390 Required Privilege Level | 390 Release Information | 390 Syntax dynamic-requests-secret password; Hierarchy Level [edit access radius servers name] Description Configure the secret password to be used for change of authorization requests from the RADIUS server. 390 Default Use the same password that is used for authentication requests. Options password Password for dynamic requests. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring RADIUS Servers | 91 Understanding Network Elements | 71 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 encrypt (HTTP Header Enrichment) IN THIS SECTION Syntax | 391 Hierarchy Level | 391 Description | 391 Options | 391 Required Privilege Level | 391 Release Information | 391 391 Syntax encrypt { hash algorithm; prefix hash-prefix; } Hierarchy Level [edit services hcm tag-rule rule-name term term-number then tag tag-name] Description Specify the transform to be applied to the header for the HTTP header enrichment so that you can add subscriber attributes in a way that is obscured from the user. NOTE: If you include this statement, then you also must configure hash and prefix statements. Options hash algorithm prefix hashprefix Use the specified hashing algorithm. Currently, only md5 is supported. Use the specified prefix key (up to 63 alphanumeric characters). The prefix key is concatenated with the specified tag attribute and hashed. The resulting hash value is then inserted into the HTTP header. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 392 RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 Configuring Tag Rules | 42 Configuring HCM Profiles and Assigning Tag Rules | 49 Junos Web Aware HTTP Header Enrichment Overview | 34 equals IN THIS SECTION Syntax | 392 Hierarchy Level | 392 Description | 393 Options | 393 Required Privilege Level | 393 Release Information | 393 Syntax equals { value; } Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from called-station-id], [edit unified-edge gateways tdf gateway-name domain-selection term term-name from calling-station-id], [edit unified-edge gateways tdf gateway-name domain-selection term term-name from class], [edit unified-edge gateways tdf gateway-name domain-selection term term-name 393 from framed-ip-address], [edit unified-edge gateways tdf gateway-name domain-selection term term-name from framed-ipv6-prefix], [edit unified-edge gateways tdf gateway-name domain-selection term term-name from 3gpp-imsi], [edit unified-edge gateways tdf gateway-name domain-selection term term-name from nas-ip-address], [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name format integer], [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name format string], [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name format time], [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name format v4address], [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name format v6address], [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name format v6prefix] Description Specify the value that the RADIUS attribute must equal. After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. Options value Value that the RADIUS attribute must equal. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. 394 RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 exclude (Diameter Gx Profiles) IN THIS SECTION Syntax | 394 Hierarchy Level | 394 Description | 395 Options | 395 Required Privilege Level | 395 Release Information | 395 Syntax exclude { an-gw-address; default-eps-bearer-qos; packet-filter-information; packet-filter-operation; rat-type; } Hierarchy Level [edit unified-edge diameter-profiles gx-profile profile-name attributes] 395 Description Configure the attribute-value pairs (AVPs) to be excluded from the credit control request (CCR) messages between the MX Series router and the policy and charging enforcement function (PCEF). Options an-gw-address--Exclude the AN-GW-Address AVP. default-eps-bearer-qos--Exclude the Default-EPS-Bearer-QoS AVP. packet-filter-information--Exclude the Packet-Filter-Information AVP. packet-filter-operation--Exclude the Packet-Filter-Operation AVP. rat-type--Exclude the RAT-Type AVP. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION gx-profile | 429 external-assigned (Address Pools) IN THIS SECTION Syntax | 396 Hierarchy Level | 396 Description | 396 396 Required Privilege Level | 396 Release Information | 396 Syntax external-assigned; Hierarchy Level [edit access address-assignment address-pools name family inet network networkprefix], [edit access address-assignment address-pools name family inet6 network networkprefix] Description Assign addresses in network prefixes statically. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Understanding Source IP Filtering with Address Pools in TDF Domains for IP-Based Subscribers | 110 Configuring Address Pools for Source-IP Filtering of IP-Based Subscribers | 119 397 family (Address Pools) IN THIS SECTION Syntax | 397 Hierarchy Level | 397 Description | 397 Options | 398 Required Privilege Level | 398 Release Information | 398 Syntax family (inet | inet6) { network { [network-prefix] { external-assigned; } } } Hierarchy Level [edit access address-assignment address-pools name] Description Specify the protocol family information for the address pool. Address pools must have either inet (IPv4) or inet6 (IPv6) configured. NOTE: A address pool can have either inet (IPv4) or inet6 (IPv6) configured, but not both. 398 Options inet inet6 IP version 4 (IPv4) suite. IP version 6 (IPv6) suite. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Understanding Source IP Filtering with Address Pools in TDF Domains for IP-Based Subscribers | 110 Configuring Address Pools for Source-IP Filtering of IP-Based Subscribers | 119 family (Exclude Prefix) IN THIS SECTION Syntax | 399 Hierarchy Level | 399 Description | 399 Required Privilege Level | 399 Release Information | 399 399 Syntax family { inet { apply-groups [group-names]; apply-groups-except [group-names]; network address net-mask; } inet6 { apply-groups [group-names]; apply-groups-except [group-names]; network address net-mask; } } Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name subscriberexclude-prefix] Description Specify the IP version for the network prefix of source IP addresses for uplink packets and destination IP addresses for downlink packets that must not undergo TDF processing. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. 400 RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Configuring IFL-Based TDF Subscribers and Properties with a TDF Domain | 140 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based and IFL-Based TDF Subscribers Overview | 107 IP-Based Subscriber Setup Overview | 107 family (TDF Interface) IN THIS SECTION Syntax | 400 Hierarchy Level | 400 Description | 400 Options | 401 Required Privilege Level | 401 Release Information | 401 Syntax family family-name; Hierarchy Level [edit interfaces mif unit interface-unit-number] Description Configure the protocol family information for the TDF logical interface. 401 Options family-name Protocol family. The following options are supported: · inet--IP version 4 suite. · inet6--IP version 6 suite. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring a TDF Logical Interface | 143 flow-action IN THIS SECTION Syntax | 402 Hierarchy Level | 402 Description | 402 Options | 402 Required Privilege Level | 402 Release Information | 402 402 Syntax flow-action (drop | forward) Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name ip-subscriber default-local-policy] Description Specify the action to take on a subscriber's data packets entering the access interface of the TDF domain when a TDF IP-based subscriber session does not exist. Options drop forward Drop the subscriber's packets. Forward the subscriber's packets. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based Subscriber Setup Overview | 107 403 flow-descriptions IN THIS SECTION Syntax | 403 Hierarchy Level | 403 Description | 404 Options | 404 Required Privilege Level | 404 Release Information | 404 Syntax flow-descriptions flow-identifier { direction (uplink | downlink | both); local-port-range { low lower-boundary high upper-boundary; } local-ports number; no-send-to-ue; protocol protocol-number; remote-address (ipv4-address ipv4-address | ipv6-address ipv6-address); remote-port-range { low lower-boundary high upper-boundary; } remote-ports number; } Hierarchy Level [edit unified-edge pcef], [edit services pcef] 404 Description Specify a service data flow (SDF) filter (flow identifier) that includes one or more filtering parameters (address, protocol, and port) to identify the subscriber traffic that you want the SDF filter to detect. SDF filters are specified in a PCC rule to identify the Layer 3 or Layer 4 IP packet flows that you want to receive a particular treatment. NOTE: A PCC rule must include at least one SDF filter and can include a maximum of 15 SDF filters. If you are using Junos OS Subscriber Aware, specify the name of the SDF filter at the [edit unified-edge pcef] hierarchy level. If you are using Junos OS Broadband Subscriber Management, specify the name of the SDF filter at the [edit services pcef] hierarchy level. Options flow-identifier Name of the SDF filter. · Range: 1 through 63 characters. The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details. Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 405 Support at the [edit services pcef] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. RELATED DOCUMENTATION Configuring Service Data Flow Filters Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment Understanding Application-Aware Policy Control for Subscriber Management flows (PCC Rules) IN THIS SECTION Syntax | 405 Hierarchy Level | 405 Description | 406 Options | 406 Required Privilege Level | 406 Release Information | 406 Syntax flows ([flow-identifier] | any); Hierarchy Level [edit unified-edge pcef pcc-rules rule-name from], [edit services pcef pcc-rules rule-name from] 406 Description Specify the service data flow (SDF) filters (flow identifiers) that define the match criteria for the policy and charging control (PCC) rule. You can configure a maximum of 15 SDF filters. You must include the flows statement in a PCC rule. If you do not want to filter subscriber traffic based on SDF filters, use the any option. If you are using Junos OS Subscriber Aware, specify the name of the SDF filter at the [edit unified-edge pcef pcc-rules rule-name from] hierarchy level. If you are using Junos OS Broadband Subscriber Management, specify the name of the SDF filter at the [edit services pcef pcc-rules rule-name from] hierarchy level. Options flow-identifier Name of an SDF filter that is used to detect IP packet flows. You can configure a maximum of 15 SDF filters. The referenced SDF filters must be configured. · Range: 1 through 63 characters. any All IP packet flows. Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef pcc-rules rule-name from] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. Support for Next Gen Services for Junos OS Broadband Subscriber Management introduced in Junos OS Release 19.3R2 on MX Series. 407 RELATED DOCUMENTATION Configuring Policy and Charging Control Rules Configuring Service Data Flow Filters format (Unified Edge Gateways) IN THIS SECTION Syntax | 407 Hierarchy Level | 408 Description | 408 Required Privilege Level | 409 Release Information | 409 Syntax format { integer { equals { value; } greater-than value; less-than value; } string { equals { value; } has-prefix{ value; } has-suffix { value; } matches { 408 value; } } time { equals { value; } greater-than value; less-than value; } v4address { equals { value; } } v6address { equals { value; } } v6prefix { equals { value; } } } Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name] Description Specify the custom AVP attribute's format and value to match for the incoming RADIUS request from the IP-based subscriber. After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. The remaining statements are explained separately. See CLI Explorer. 409 Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based Subscriber Setup Overview | 107 format (LRF Profile) IN THIS SECTION Syntax | 409 Hierarchy Level | 410 Description | 410 Required Privilege Level | 410 Release Information | 410 Syntax format ipfix; 410 Hierarchy Level [edit services lrf profile profile-name template template-name] Description Configure a format for the template. Only the IPFIX format is supported for this release. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Release 19.3R1 on MX Series. RELATED DOCUMENTATION Configuring an LRF Profile for Subscribers Configuring Logging and Reporting for Junos OS Subscriber Aware Configuring Logging and Reporting for Subscriber Management forwarding-class (PCC Action Profiles) IN THIS SECTION Syntax | 411 Hierarchy Level | 411 Description | 411 Options | 411 411 Required Privilege Level | 411 Release Information | 412 Syntax forwarding-class class-name; Hierarchy Level [edit unified-edge pcef pcc-action-profiles profile-name], [edit services pcef pcc-action-profiles profile-name] Description Specify the forwarding class to which packets must be assigned. If you are using Junos OS Subscriber Aware, specify the forwarding class at the [edit unified-edge pcef pcc-action-profiles profile-name] hierarchy level. If you are using Junos OS Broadband Subscriber Management, specify the forwarding class at the [edit services pcef pcc-action-profiles profile-name] hierarchy level. Options class-name Name of the forwarding class. Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. 412 servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef pcc-action-profiles profile-name] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. Support for Next Gen Services for Junos OS Broadband Subscriber Management introduced in Junos OS Release 19.3R2 on MX Series. RELATED DOCUMENTATION Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment Understanding Application-Aware Policy Control for Subscriber Management Configuring Policy and Charging Control Action Profiles for Subscriber Management firmware-revision IN THIS SECTION Syntax | 412 Hierarchy Level | 413 Description | 413 Options | 413 Required Privilege Level | 413 Release Information | 413 Syntax firmware-revision firmware-revision; 413 Hierarchy Level [edit access diameter] Description Configure the firmware revision that is advertised in the Capabilities-Exchange-Request or CapabilitiesExchange-Answer message. Options firmware-revision Number of the firmware revision that is the advertised value of the FirmwareRevision AVP. · Default: 0 · Range: 0 through 4294967295 Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION diameter (Subscriber Aware Policy Control) | 368 414 framed-ip-address IN THIS SECTION Syntax | 414 Hierarchy Level | 414 Description | 414 Required Privilege Level | 414 Release Information | 415 Syntax framed-ip-address { equals value; } Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from] Description Specify the RADIUS AVP Framed-IP-Address (IPv4) for the incoming RADIUS request from the subscriber. After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. The remaining statement is explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. 415 unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 framed-ipv6-prefix IN THIS SECTION Syntax | 415 Hierarchy Level | 416 Description | 416 Required Privilege Level | 416 Release Information | 416 Syntax framed-ipv6-prefix { equals value; } 416 Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from] Description Specify the RADIUS AVP Framed-IPv6-Prefix for the incoming RADIUS request from the subscriber. After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. The remaining statement is explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 417 from (HTTP Header Enrichment) IN THIS SECTION Syntax | 417 Hierarchy Level | 417 Description | 418 Required Privilege Level | 418 Release Information | 418 Syntax from { destination-address { (any-ipv4 | any-ipv4 except); (any-ipv6 | any-ipv6 except); (any-unicast | any-unicast except); (prefix | prefix except); } destination-address-range { high address low address <except>; } destination-port-range { high port-number low port-number; } destination-ports value; destination-prefix-list { (prefix-name | prefix-name except); } } Hierarchy Level [edit services hcm tag-rule rule-name term term-number] 418 Description Specify the match criteria for the term in the tag rule. If all the conditions specified in the match criteria are met, then the HTTP header enrichment actions specified in the then statement are applied. If you want the HTTP header enrichment actions specified in the then statement to be applied to all HTTP requests, do not include any matching conditions with the from statement. NOTE: You must include a from statement in a tag rule. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 hcm (HTTP Header Enrichment) | 434 from (PCC Rules) IN THIS SECTION Syntax | 419 Hierarchy Level | 419 Description | 419 Required Privilege Level | 419 419 Release Information | 420 Syntax from { <application-groups [application-group-name]>; <applications [application-name]>; flows ([flow-identifier] | any); } Hierarchy Level [edit unified-edge pcef pcc-rules rule-name], [edit services pcef pcc-rules rule-name] Description Specify the match criteria for the policy and charging control (PCC) rules. Any referenced SDF filter, application, or application group in the from statement must be configured. If you are using Junos OS Subscriber Aware, specify the match criteria at the [edit unified-edge pcef pcc-rules rule-name] hierarchy level. If you are using Junos OS Broadband Subscriber Management, specify the match criteria at the [edit services pcef pcc-rules rule-name] hierarchy level. NOTE: You must include the flows statement. If you do not want to filter subscriber traffic based on service data flow (SDF) filters, use flows any. The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details. Required Privilege Level For Junos OS Subscriber Aware: 420 unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef pcc-rules rule-name] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. Support for Next Gen Services for Junos OS Broadband Subscriber Management introduced in Junos OS Release 19.3R2 on MX Series. RELATED DOCUMENTATION Configuring Policy and Charging Control Rules from (TDF Domain Selection) IN THIS SECTION Syntax | 421 Hierarchy Level | 423 Description | 423 Required Privilege Level | 423 Release Information | 423 421 Syntax from { 3gpp-imsi { equals value; has-prefix value; has-suffix value; matches value; } attribute name { code numeric-code; vendor-id vendor-id; format { integer { equals { value; } greater-than value; less-than value; } string { equals { value; } has-prefix{ value; } has-suffix { value; } matches { value; } } time { equals { value; } greater-than value; less-than value; } v4address { 422 equals { value; } } v6address { equals { value; } } v6prefix { equals { value; } } } } called-station-id { equals value; matches value; } calling-station-id { equals value; matches value; } class { equals value; has-prefix value; has-suffix value; matches value; } client client-name; framed-ip-address { equals value; } framed-ipv6-prefix { equals value; } nas-ip-address { equals value; } snoop-segment snoop-segment-name; user-name { equals value; 423 has-prefix value; has-suffix value; matches value; } } Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name] Description Specify the match criteria for the TDF domain selection or PCEF profile selection term. NOTE: For any term, the subscriber must match all the match conditions specified in a from statement. If you do not configure the from statement, then all subscribers are considered a match. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 424 function (Diameter Network Element) IN THIS SECTION Syntax | 424 Hierarchy Level | 424 Description | 424 Options | 424 Required Privilege Level | 425 Release Information | 425 Syntax function function-name; Hierarchy Level [edit access diameter network-element element-name] Description Specify the function associated with a Diameter network element. Options function-name--Function associated with the network element. Functions currently supported: · Policy charging and control (pcc-gx). · Diameter credit-control application are the functions currently supported. 425 Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION diameter (Subscriber Aware Policy Control) | 368 gate-status IN THIS SECTION Syntax | 425 Hierarchy Level | 426 Description | 426 Default | 426 Options | 426 Required Privilege Level | 426 Release Information | 427 Syntax gate-status (uplink | downlink | uplink-downlink | disable-both); 426 Hierarchy Level [edit unified-edge pcef pcc-action-profiles profile-name], [edit services pcef pcc-action-profiles profile-name] Description Configure the gate status in a PCC action profile to enable or disable the forwarding of service flow packets. The gate status determines whether the uplink and downlink gates are opened or closed. If you are using Junos OS Subscriber Aware, configure the gate status at the [edit unified-edge pcef pccaction-profiles profile-name] hierarchy level. If you are using Junos OS Broadband Subscriber Management, configure the gate status at the [edit services pcef pcc-action-profiles profile-name] hierarchy level. Default By default, if this statement is not configured, forwarding of service data flow packets is enabled in both the uplink and downlink directions. Options disable-both Disable forwarding of service data flow packets in the uplink and downlink directions. downlink Enable forwarding of service data flow packets in the downlink direction. uplink-downlink Enable forwarding of service data flow packets in the uplink and downlink directions. uplink Enable forwarding of service data flow packets in the uplink direction. Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. 427 servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef pcc-action-profiles profile-name] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. Support for Next Gen Services for Junos OS Broadband Subscriber Management introduced in Junos OS Release 19.3R2 on MX Series. RELATED DOCUMENTATION Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment Configuring Policy and Charging Control Action Profiles for Subscriber Management Understanding Application-Aware Policy Control for Subscriber Management greater-than IN THIS SECTION Syntax | 427 Hierarchy Level | 428 Description | 428 Options | 428 Required Privilege Level | 428 Release Information | 428 Syntax greater-than value; 428 Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name format integer], [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name format time] Description Specify a value for the custom AVP attribute above which the incoming RADIUS request from the subscriber must match. After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. Options value Value that the attribute must be greater than. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 429 gx-profile IN THIS SECTION Syntax | 429 Hierarchy Level | 430 Description | 430 Options | 430 Required Privilege Level | 430 Release Information | 430 Syntax gx-profile profile-name { <attributes> { exclude { an-gw-address; default-eps-bearer-qos; packet-filter-information; packet-filter-operation; rat-type; } include { gx-capability-list; rule-suggestion; } } <request-timeout seconds>; targets { target-name { <destination-host hostname>; destination-realm realm-name; network-element element-name; priority priority-value; } 430 } } Hierarchy Level [edit unified-edge diameter-profiles] Description Configure the Diameter profile used for Gx applications. Options profile-name Name of the Diameter profile. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Diameter Profiles Overview | 149 431 has-prefix (Unified Edge Gateways) IN THIS SECTION Syntax | 431 Hierarchy Level | 431 Description | 431 Options | 432 Required Privilege Level | 432 Release Information | 432 Syntax has-prefix { value; } Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from class], [edit unified-edge gateways tdf gateway-name domain-selection term term-name from 3gpp-imsi], [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name format string] Description Specify the prefix that the attribute must have. After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. 432 Options value Prefix string. · Range: 1 through 254 alphanumeric characters. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 has-suffix IN THIS SECTION Syntax | 433 Hierarchy Level | 433 Description | 433 Options | 433 Required Privilege Level | 433 433 Release Information | 434 Syntax has-suffix { value; } Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from class], [edit unified-edge gateways tdf gateway-name domain-selection term term-name from 3gpp-imsi], [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name format string] Description Specify the suffix that the attribute must have. After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. Options value Suffix string. · Range: 1 through 254 alphanumeric characters. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. 434 unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 hcm (HTTP Header Enrichment) IN THIS SECTION Syntax | 434 Hierarchy Level | 436 Description | 436 Required Privilege Level | 436 Release Information | 436 Syntax hcm { tag-attribute [tag-attr-name]; tag-rule rule-name { term term-number { from { destination-address { (any-ipv4 | any-ipv4 except); 435 (any-ipv6 | any-ipv6 except); (any-unicast | any-unicast except); (prefix | prefix except); } destination-address-range { high address low address <except>; } destination-port-range { high port-number low port-number; } destination-ports value; } then { count; tag tag-name { encrypt { hash algorithm; prefix hash-prefix; } ipv4-mask ipv4-mask; ipv6-mask ipv6-mask; ipv4-or-value ipv4-or-value; ipv6-or-value ipv6-or-value; tag-attribute tag-attr-name; tag-header header; tag-separator separator; } } } } tag-rule-set rule-set-name { [rule rule-name]; } profile profile-name { tag rule rule-name; } } 436 Hierarchy Level [edit services] Description Configure the parameters required to support subscriber-aware HTTP header enrichment. You can add content to the HTTP headers sent back and forth as part of the client-server exchange for subscribers accessing Web-based services. You configure HTTP header enrichment as a service for a subscriber. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. Support for Next Gen Services introduced in Junos OS Release 20.2R1 on MX Series routers MX240, MX480 and MX960. RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 hcm-profile (HTTP Header Enrichment) IN THIS SECTION Syntax | 437 437 Hierarchy Level | 437 Description | 437 Options | 437 Required Privilege Level | 437 Release Information | 437 Syntax hcm-profile hcm-profile-name; Hierarchy Level [edit services service-set] Description Specify the HTTP header enrichment profile that was configured at the [edit services hcm] hierarchy level. This placeholder profile has no configuration options, but it must be specified to enable HTTP header enrichment functionality on the services plane. Options hcm-profile-name Name of the HCM profile. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 438 Support for Next Gen Services introduced in Junos OS Release 20.2R1 on MX Series routers MX240, MX480 and MX960. RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 hcm (HTTP Header Enrichment) | 434 hcm-profile (PCC Action Profiles) IN THIS SECTION Syntax | 438 Hierarchy Level | 438 Description | 438 Options | 439 Required Privilege Level | 439 Release Information | 439 Syntax hcm-profile hcm-profile-name; Hierarchy Level [edit unified-edge pcef pcc-action-profiles profile-name] Description Specify the HCM profile that you want a PCC action profile to use for determining which HTTP header enrichment rules to apply. 439 NOTE: This PCC action profile can be used in a PCC rule that only includes applications or application-groups statements in the from statement, and these statements must identify HTTPbased applications. The HCM profile must have been previously configured at the [edit services hcm] hierarchy level. Options hcm-profile-name Name of the HCM profile. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. Support added in Junos 20.2R1 for Next Gen Services on MX240, MX480, and MX960 routers. RELATED DOCUMENTATION Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware | 83 Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment | 56 host (Diameter Origin) IN THIS SECTION Syntax | 440 Hierarchy Level | 440 440 Description | 440 Options | 440 Required Privilege Level | 440 Release Information | 440 Syntax host hostname; Hierarchy Level [edit access diameter origin] Description Specify the name of the host that originates the Diameter message. Options hostname Name of the message origin host. Supplied as the value of the Origin-Host AVP for all messages sent by the Diameter instance. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 441 RELATED DOCUMENTATION diameter (Subscriber Aware Policy Control) | 368 http-log-multiple-transactions (LRF Profile) IN THIS SECTION Syntax | 441 Hierarchy Level | 441 Description | 441 Required Privilege Level | 442 Release Information | 442 Syntax http-log-multiple-transactions; Hierarchy Level [edit services lrf profile profile-name] Description Configure HTTP transaction logging to generate and send HTTP metadata for each transaction of a data session. This option is only relevant if the template specified in an LRF rule includes http in the template-type. By default, HTTP transaction logging is disabled, and the HTTP transaction records for a TCP session are sent together as one group of records. 442 Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Release 19.3R1 on MX Series. RELATED DOCUMENTATION Configuring an LRF Profile for Subscribers Configuring Logging and Reporting for Junos OS Subscriber Aware Configuring Logging and Reporting for Subscriber Management icmp-mapping (Application Identification) IN THIS SECTION Syntax | 442 Hierarchy Level | 443 Description | 443 Required Privilege Level | 443 Release Information | 443 Syntax icmp-mapping { code icmp-code; order order; order-priority (high | low); 443 type icmp-type; } Hierarchy Level [edit services application-identification application application-name] Description Match Internet Control Message Protocol (ICMP) messages identified by unique code and type. This classification is intended to identify and differentiate various types of ICMP messages. The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details. Required Privilege Level view-level--To view this statement in the configuration. control-level--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures id-components IN THIS SECTION Syntax | 444 444 Hierarchy Level | 444 Description | 444 Options | 445 Required Privilege Level | 445 Release Information | 445 Syntax id-components { use-class; use-imsi; use-msisdn; use-nai; use-nas-port; use-nas-port-id; use-realm; use-username; } Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name ip-subscriber subscription-id subscription-id-options entry-name] Description Specify a method for constructing the Subscription-Id for the Diameter credit control request (CCR) message that is sent from the TDF to the PCRF for IP-based subscribers belonging to the TDF domain. You may specify more than one option, and the order of preference matches the order in which the options appear. 445 Options use-class Subscription-Id-Type is configurable and the Subscription-Id-Data is the entire Class attribute value by default. You can configure a regular expression to parse the Class attribute contents, specify characters to insert between the resulting regular expression groups, and specify the subscription ID type with the use-class options under the [edit unified-edge gateways tdf gateway-name domains domain-name subscription-id] hierarchy. use-imsi Subscription-Id-Type is END_USER_IMSI and the Subscription-Id-Data is the 3GPPIMSI. use-msisdn Subscription-Id-Type is END_USER_E164 and the Subscription-Id-Data is the CallingStation-Id. use-nai Subscription-Id-Type is END_USER_NAI and the Subscription-Id-Data is the entire User-Name. use-nas-port Subscription-Id-Type is END_USER_PRIVATE and the Subscription-Id-Data is the NAS-Port. use-nas-port-id Subscription-Id-Type is END_USER_PRIVATE and the Subscription-Id-Data is the NAS-Port-Id. use-realm Subscription-Id-Type is END_USER_PRIVATE and the Subscription-Id-Data is the realm portion of User-Name in NAI format. use-username Subscription-Id-Type is END_USER_PRIVATE and the Subscription-Id-Data is the user name portion of User-Name in NAI format. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 446 RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 idle-timeout IN THIS SECTION Syntax | 446 Hierarchy Level | 446 Description | 446 Options | 447 Required Privilege Level | 447 Release Information | 447 Syntax idle-timeout idle-timeout; Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name ip-subscriber] Description Configure the idle timeout for the TDF IP-based subscriber session. The idle timeout is the duration that the subscriber session waits to receive a data packet before timing out. After the idle timeout expires, the TDF takes down the session. Setting the idle timeout ensures that if no data is being sent for the duration specified, then the session can be taken down, and the TDF's resources can be freed. 447 Options idle-timeout Number of minutes after which the TDF subscriber session times out. · Range: 0 through 300. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based Subscriber Setup Overview | 107 ifl-subscriber IN THIS SECTION Syntax | 448 Hierarchy Level | 448 Description | 448 Options | 448 Required Privilege Level | 448 Release Information | 448 448 Syntax ifl-subscriber [subscriber-name] { access-interfaces [interface-name]; apply-groups [group-names]; apply-groups-except [group-names]; } Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name] Description Specify the name of the IFL-based subscriber for traffic that is carried on a particular interface or interfaces. You can configure up to 32 IFL-based subscribers in a TDF domain. To configure a subscriber name, you must have set the subscriber-type to ifl at the [edit unified-edge gateway tdf gateway-name domains domain-name] hierarchy. Options subscriber-name Name of the subscriber. You can configure up to 32 IFL-based subscribers in a TDF domain. · Range: Up to 63 bytes. The remaining statements are described separately. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 449 RELATED DOCUMENTATION Configuring IFL-Based TDF Subscribers and Properties with a TDF Domain | 140 Understanding the Definition of a Set of IFL-Based Subscriber Properties with a TDF Domain | 116 immediate-accounting-response IN THIS SECTION Syntax | 449 Hierarchy Level | 449 Description | 449 Default | 450 Options | 450 Required Privilege Level | 450 Release Information | 450 Syntax immediate-accounting-response (enabled | disabled); Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name ip-subscriber] Description Enable or disable the sending of an immediate RADIUS response message to the accounting start message received from a GGSN, PGW, or BNG RADIUS client. 450 Default If you do not specify an option, disabled is the default. Options enabled Enable immediate response. disabled Disable immediate response. The response is sent after TDF subscriber creation is complete. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based Subscriber Setup Overview | 107 include (Diameter Gx Profiles) IN THIS SECTION Syntax | 451 Hierarchy Level | 451 Description | 451 Options | 451 Required Privilege Level | 451 451 Release Information | 451 Syntax include { gx-capability-list; rule-suggestion; } Hierarchy Level [edit unified-edge diameter-profiles gx-profile profile-name attributes] Description Configure the attribute-value pairs (AVPs) to be included in the credit control request (CCR) messages between the MX Series router and the policy and charging enforcement function (PCEF). Options gx-capability-list--Include the Gx-Capability list AVP. rule-suggestion--Include the Rule-suggestion AVP. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 452 RELATED DOCUMENTATION gx-profile | 429 incoming-queue IN THIS SECTION Syntax | 452 Hierarchy Level | 452 Description | 452 Options | 452 Required Privilege Level | 453 Release Information | 453 Syntax incoming-queue { size size; } Hierarchy Level [edit access diameter peer peer-name] Description Configure the incoming queue properties of this peer. Options size size Size of the queue. The default is 6000. 453 · Range: 1 through 65,535 packets Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION diameter (Subscriber Aware Policy Control) | 368 inet (TDF Subscriber Address) IN THIS SECTION Syntax | 453 Hierarchy Level | 454 Description | 454 Required Privilege Level | 454 Release Information | 454 Syntax inet { apply-groups [group-names]; apply-groups-except [group-names]; 454 pool pool-name; } Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name ip-subscriber subscriber-address] Description Specify IP version 4 (IPv4) for the address pool that contains the source IP addresses for IP-based subscriber packets that undergo TDF processing. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based Subscriber Setup Overview | 107 455 inet (TDF Subscriber Exclude Prefix) IN THIS SECTION Syntax | 455 Hierarchy Level | 455 Description | 455 Required Privilege Level | 455 Release Information | 456 Syntax inet { network address mask; } Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name subscriberexclude-prefix family] Description Specify IP version 4 (IPv4) for the network prefix of source IP addresses for uplink packets and destination IP addresses for downlink packets that do not undergo TDF processing. The remaining statement is explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. 456 Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Configuring IFL-Based TDF Subscribers and Properties with a TDF Domain | 140 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based and IFL-Based TDF Subscribers Overview | 107 IP-Based Subscriber Setup Overview | 107 inet6 (TDF Subscriber Address) IN THIS SECTION Syntax | 456 Hierarchy Level | 457 Description | 457 Required Privilege Level | 457 Release Information | 457 Syntax inet6 { pool pool-name; } 457 Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name ip-subscriber subscriber-address] Description Specify IP version 6 (IPv6) for the address pool that contains the source IP addresses for IP-based subscriber packets that undergo TDF processing. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based Subscriber Setup Overview | 107 inet6 (TDF Subscriber Exclude Prefix) IN THIS SECTION Syntax | 458 Hierarchy Level | 458 Description | 458 458 Required Privilege Level | 458 Release Information | 458 Syntax inet6 { network address mask; } Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name subscriberexclude-prefix family] Description Specify IP version 6 (IPv6) for the network prefix of source IP addresses for uplink packets and destination IP addresses for downlink packets that do not undergo TDF processing. The remaining statement is explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Configuring IFL-Based TDF Subscribers and Properties with a TDF Domain | 140 459 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based and IFL-Based TDF Subscribers Overview | 107 IP-Based Subscriber Setup Overview | 107 integer IN THIS SECTION Syntax | 459 Hierarchy Level | 459 Description | 459 Required Privilege Level | 460 Release Information | 460 Syntax integer { equals value; greater-than value; less-than value; } Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name format] Description Specify the custom AVP attribute's format as an integer and the value to match for the incoming RADIUS request from the IP-based subscriber. 460 After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 interface (Services PIC) IN THIS SECTION Syntax | 461 Hierarchy Level | 461 Description | 461 Options | 462 Required Privilege Level | 462 Release Information | 462 461 Syntax [interface interface-name]; Hierarchy Level [edit unified-edge gateways tdf gateway-name system service-pics] Description Specify one or more of the MS-MPC service interfaces that represent the service PICs used for anchoring subscriber-aware services in the MX Series router. The following conditions are applicable to the services PIC interfaces configured here: · If an aggregated multiservices interface (ams) is specified in this statement, the ams must already be defined at the [edit interfaces] hierarchy level. · The PIC must have the jservices-hcm, jservices-mss, jservices-jdpi, jservices-pcef, and jservices- crypto-base packages configured at the [edit chassis fpc slot-number pic pic-number adaptiveservices service-package extension-provider] hierarchy level. · The appropriate services group configuration must be applied to the PIC: · For each service PIC that requires application identification but not HTTP header enrichment, apply the tdf-services-xlp-dpi group. · For each service PIC that requires both application identification and HTTP header enrichment, configure the tdf-services-xlp-dpi-with-hcm group. · If an MS-MPC service interface is a member of an AMS, then that member interface cannot be specified here. For example, if mams-2/0/0 is a member interface of ams0, then ms-2/0/0/ cannot be directly specified here. NOTE: If an AMS (for example ams0) is used for the services PIC, then load balancing is performed to distribute subscriber-aware services among the member interfaces. Otherwise, load balancing is not performed. 462 Options interfacename Name of the interface representing the services PIC. · Syntax: The interface must be a valid multiservices interface (amsn or ms-a/b/0, where n is the ams number, a is the Flexible PIC Concentrator [FPC] slot number, and b is the PIC slot number); for example, ams0 or ms-1/0/0. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring Service PICs | 18 TDF Gateway Service PICs and Session PICs for Subscriber-Aware Traffic Treatment | 9 interface (Session PICs) IN THIS SECTION Syntax | 463 Hierarchy Level | 463 Description | 463 Options | 463 Required Privilege Level | 463 Release Information | 464 463 Syntax [interface interface-name]; Hierarchy Level [edit unified-edge gateways tdf gateway-name system session-pics] Description Specify one or more of the MS-MPC service interfaces that represent the session PICs used for the control plane in the TDF gateway. The following conditions are applicable to the session PIC interfaces configured here: · If an aggregated multiservices interface (ams) is specified in this statement, the ams must already be defined at the [edit interfaces] hierarchy level. · The tdf-session-xlp group configuration must be applied to the PIC. · The session PIC must have the jservices-mobile package configured at the [edit chassis fpc slotnumber pic pic-number adaptive-services service-package extension-provider] hierarchy level. · If a session PIC interface is a member of an AMS, then that member interface cannot be specified here. For example, if mams-2/0/0 is a member interface of ams0, then ms-2/0/0/ cannot be directly specified here. Options interfacename Name of the interface representing the services PIC. · Syntax: The interface must be a valid multiservices interface (amsn or ms-a/b/0, where n is the ams number, a is the Flexible PIC Concentrator [FPC] slot number, and b is the PIC slot number); for example, ams0 or ms-1/0/0. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. 464 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring Session PICs | 19 TDF Gateway Service PICs and Session PICs for Subscriber-Aware Traffic Treatment | 9 interface-service (Services Interfaces) IN THIS SECTION Syntax | 464 Hierarchy Level | 465 Description | 465 Options | 465 Required Privilege Level | 465 Release Information | 465 Syntax interface-service { load-balancing-options { hash-keys { egress-key (destination-ip | source-ip); ingress-key (destination-ip | source-ip); } } service-interface name; } 465 Hierarchy Level [edit services service-set service-set-name] Description Specify the device name for the interface service Physical Interface Card (PIC). Options service-interface name--Name of the service device associated with the interface-wide service set. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced before Junos OS Release 7.4. RELATED DOCUMENTATION Configuring Service Sets to be Applied to Services Interfaces ip-protocol-mapping (Application Identification) IN THIS SECTION Syntax | 466 Hierarchy Level | 466 Description | 466 Options | 466 466 Required Privilege Level | 466 Release Information | 467 Syntax ip-protocol-mapping { order order; order-priority (high | low); protocol (http | ssl | tcp | udp) } Hierarchy Level [edit services application-identification application application-name] Description For IP traffic, identify an application by matching the IP protocol. This parameter is used to identify an application based on IP and is intended only for IP traffic. Options protocol-number Industry-standard numeric protocol value. · Range: 0 through 254 You can find a complete list of industry standard protocol numbers at the IANA website. The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details. Required Privilege Level view-level--To view this statement in the configuration. control-level--To add this statement to the configuration. 467 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures ip-subscriber IN THIS SECTION Syntax | 467 Hierarchy Level | 468 Description | 468 Required Privilege Level | 469 Release Information | 469 Syntax ip-subscriber { access-interfaces interface-name [interface-name]; default-local-policy { flow-action (drop | forward); maximum-bit-rate { uplink mbr-uplink-value ; downlink mbr-downlink-value; } burst-size { uplink uplink-burst-size; downlink downlink-burst-size; } } 468 idle-timeout idle-timout; immediate-accounting-response (enabled | disabled); maximum-subscribers number; subscriber-address { inet { pool pool-name; } inet6 { pool pool-name; } } subscription-id { constant ; subscription-id-options { entry-name { id-components { use-imsi; use-msisdn; use-nai; use-username; use-realm; use-nas-port; use-nas-port-id; } } } } } Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name] Description Configure TDF domain features that are unique to IP-based subscribers. The remaining statements are described separately. 469 Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based Subscriber Setup Overview | 107 ipv4-address (Steering Path) IN THIS SECTION Syntax | 469 Hierarchy Level | 470 Description | 470 Options | 470 Required Privilege Level | 470 Release Information | 470 Syntax ipv4-address ipv4-address; 470 Hierarchy Level [edit unified-edge pcef pcc-action-profiles profile-name steering path] [edit services pcef pcc-action-profiles profile-name] Description Specify the IPv4 address of a third-party server to which the PCC action profile steers HTTP traffic for applying services. If you configure this, the PCC action profile can only be used in PCC rules that match only HTTP-based applications and all flows. Options ipv4-address ipv4-address Use the specified IPv4 address of the server. Required Privilege Level For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef pcc-action-profiles profile-name] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. Support for Next Gen Services for Junos OS Broadband Subscriber Management introduced in Junos OS Release 19.3R2 on MX Series. 471 RELATED DOCUMENTATION Understanding Application-Aware Policy Control for Subscriber Management Configuring Policy and Charging Control Action Profiles for Subscriber Management Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware ipv4-mask (HTTP Header Enrichment) IN THIS SECTION Syntax | 471 Hierarchy Level | 471 Description | 471 Options | 472 Required Privilege Level | 472 Release Information | 472 Syntax ipv4-mask ipv4-mask; Hierarchy Level [edit services hcm tag-rule rule-name term term-number then tag tag-name] Description Configure the IPv4 mask to identify a byte of the IPv4 subscriber address that you want to modify in the HTTP header. You must also set the ipv4-or-value statement at the [edit services hcm tag-rule rulename term term-number then tag tag-name] hierarchy level to specify the new value you want to put in the byte. 472 Options ipv4-mask IPv4 mask. Specify 255 in the byte you want to modify and specify 0 in the bytes that you do not want to modify. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION ipv4-or-value (HTTP Header Enrichment) | 472 Configuring HTTP Header Enrichment Overview | 41 Configuring Tag Rules | 42 Configuring HCM Profiles and Assigning Tag Rules | 49 Junos Web Aware HTTP Header Enrichment Overview | 34 ipv4-or-value (HTTP Header Enrichment) IN THIS SECTION Syntax | 473 Hierarchy Level | 473 Description | 473 Options | 473 Required Privilege Level | 473 Release Information | 473 473 Syntax ipv4-or-value ipv4-or-value; Hierarchy Level [edit services hcm tag-rule rule-name term term-number then tag tag-name] Description Configure the new IPv4 value for the byte you want to modify in the IPv4 subscriber address in the HTTP header. You must also set the ipv4-mask statement at the [edit services hcm tag-rule rule-name term term-number then tag tag-name] hierarchy level to clear the existing byte value. Options ipv4-or-value IPv4 value. Specify the new value in the byte you are modifying and specify 0 in all other bytes. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION ipv4-mask (HTTP Header Enrichment) | 471 Configuring HTTP Header Enrichment Overview | 41 Configuring Tag Rules | 42 Configuring HCM Profiles and Assigning Tag Rules | 49 Junos Web Aware HTTP Header Enrichment Overview | 34 474 ipv6-address (Steering Path) IN THIS SECTION Syntax | 474 Hierarchy Level | 474 Description | 474 Options | 474 Required Privilege Level | 474 Release Information | 475 Syntax ipv6-address ipv6-address; Hierarchy Level [edit unified-edge pcef pcc-action-profiles profile-name steering path] [edit services pcef pcc-action-profiles profile-name] Description Specify the IPv6 address of a third-party server to which the PCC action profile steers HTTP traffic for applying services. If you configure this, the PCC action profile can only be used in PCC rules that match only HTTP-based applications and all flows. Options ipv6-address ipv6-address Use the specified IPv6 address of the server. Required Privilege Level For Junos OS Broadband Subscriber Management: 475 services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef pcc-action-profiles profile-name] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. Support for Next Gen Services for Junos OS Broadband Subscriber Management introduced in Junos OS Release 19.3R2 on MX Series. RELATED DOCUMENTATION Understanding Application-Aware Policy Control for Subscriber Management Configuring Policy and Charging Control Action Profiles for Subscriber Management Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware ipv6-mask (HTTP Header Enrichment) IN THIS SECTION Syntax | 476 Hierarchy Level | 476 Description | 476 Options | 476 Required Privilege Level | 476 Release Information | 476 476 Syntax ipv6-mask ipv6-mask; Hierarchy Level [edit services hcm tag-rule rule-name term term-number then tag tag-name] Description Configure the IPv6 mask to identify a byte of the IPv6 subscriber address that you want to modify in the HTTP header. You must also set the ipv6-or-value statement at the [edit services hcm tag-rule rulename term term-number then tag tag-name] hierarchy level to specify the new value you want to put in the byte. Options ipv6-mask IPv6 mask. Specify ff in the byte you want to modify and specify 0 in the bytes that you do not want to modify. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION ipv6-or-value (HTTP Header Enrichment) | 477 Configuring HTTP Header Enrichment Overview | 41 Configuring Tag Rules | 42 Configuring HCM Profiles and Assigning Tag Rules | 49 477 Junos Web Aware HTTP Header Enrichment Overview | 34 ipv6-or-value (HTTP Header Enrichment) IN THIS SECTION Syntax | 477 Hierarchy Level | 477 Description | 477 Options | 477 Required Privilege Level | 478 Release Information | 478 Syntax ipv6-or-value ipv6-or-value; Hierarchy Level [edit services hcm tag-rule rule-name term term-number then tag tag-name] Description Configure the new IPv6 value for the byte you want to modify in the IPv6 subscriber address in the HTTP header. You must also set the ipv6-mask statement at the [edit services hcm tag-rule rule-name term term-number then tag tag-name] hierarchy level to clear the existing byte value. Options ipv6-or-value IPv6 value. Specify the new value in the byte you are modifying and specify 0 in all other bytes. 478 Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION ipv6-mask (HTTP Header Enrichment) | 475 Configuring HTTP Header Enrichment Overview | 41 Configuring Tag Rules | 42 Configuring HCM Profiles and Assigning Tag Rules | 49 Junos Web Aware HTTP Header Enrichment Overview | 34 keep-existing-steering IN THIS SECTION Syntax | 478 Hierarchy Level | 479 Description | 479 Required Privilege Level | 479 Release Information | 479 Syntax keep-existing-steering; 479 Hierarchy Level [edit unified-edge pcef pcc-action-profiles profile-name steering], [edit services pcef pcc-action-profiles profile-name] Description Specify that the PCC action profile steering attributes that a PCC rule applies at the start of a data flow will continue to be applied to that data flow when the PCC rule match conditions are modified, deleted, or added to. Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef pcc-action-profiles profile-name] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. Support for Next Gen Services for Junos OS Broadband Subscriber Management introduced in Junos OS Release 19.3R2 on MX Series. RELATED DOCUMENTATION Understanding Application-Aware Policy Control for Subscriber Management Configuring Policy and Charging Control Action Profiles for Subscriber Management Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware 480 less-than IN THIS SECTION Syntax | 480 Hierarchy Level | 480 Description | 480 Options | 480 Required Privilege Level | 481 Release Information | 481 Syntax less-than value; Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name format integer], [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name format time] Description Specify a value for the custom AVP attribute below which the incoming RADIUS request from the subscriber must match. After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. Options value Value that the attribute must be less than. 481 Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 local-port-range IN THIS SECTION Syntax | 482 Hierarchy Level | 482 Description | 482 Default | 482 Options | 482 Required Privilege Level | 483 Release Information | 483 482 Syntax local-port-range { low low-value; high high-value; } Hierarchy Level [edit unified-edge pcef flow-descriptions flow-identifier], [edit services pcef flow-descriptions flow-identifier] Description Specify the port range to identify the subscriber traffic that you want the service data flow (SDF) filter to detect. NOTE: You can specify either local-port-range or a list of ports with local-ports, but not both. If you are using Junos OS Subscriber Aware, specify the port range at the [edit unified-edge pcef flowdescriptions flow-identifier] hierarchy level. If you are using Junos OS Broadband Subscriber Management, specify the port range at the [edit services pcef flow-descriptions flow-identifier] hierarchy level. Default If the local-port-range statement is not configured, the default is any range of local ports. Options low-value high-value Lower boundary for the port range. · Range: 1 through 65,535 Upper boundary for the port range. · Range: 1 through 65,535 483 Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef flow-descriptions flow-identifier] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. RELATED DOCUMENTATION Configuring Service Data Flow Filters Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment Understanding Application-Aware Policy Control for Subscriber Management local-ports IN THIS SECTION Syntax | 484 Hierarchy Level | 484 Description | 484 Default | 484 Options | 484 Required Privilege Level | 485 484 Release Information | 485 Syntax local-ports [number]; Hierarchy Level [edit unified-edge pcef flow-description flow-identifier], [edit services pcef flow-description flow-identifier] Description Specify a port number or list of port numbers to identify the subscriber traffic that you want the service data flow (SDF) filter to detect. NOTE: You can specify either a list of ports or a port range, but not both. If you are using Junos OS Subscriber Aware, specify the port numbers at the [edit unified-edge pcef flow-description flow-identifier] hierarchy level. If you are using Junos OS Broadband Subscriber Management, specify the port numbers at the [edit services pcef flow-description flow-identifier] hierarchy level. Default If the local-ports statement is not configured, the default is any local ports. Options number Number of a port or list of port numbers. You can specify a maximum of three port numbers (separated by a space) in a list. · Range: 1 through 65,535 485 Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef flow-description flow-identifier] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. RELATED DOCUMENTATION Configuring Service Data Flow Filters Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment Understanding Application-Aware Policy Control for Subscriber Management logging-rule (PCC Action Profile) IN THIS SECTION Syntax | 486 Hierarchy Level | 486 Description | 486 Options | 486 Required Privilege Level | 486 Release Information | 487 486 Syntax logging-rule lrf-rule-name; Hierarchy Level [edit unified-edge pcef pcc-action-profiles profile-name], [edit services pcef pcc-action-profiles profile-name] Description Assign the LRF rule to the PCC action profile of a static PCC rule. When the matching conditions in the PCC rule are met, the LRF rule is activated. If you are using Junos OS Subscriber Aware, specify the name of the LRF rule at the [edit unified-edge pcef pcc-action-profiles profile-name] hierarchy level. If you are using Junos OS Broadband Subscriber Management, specify the name of the LRF rule at the [edit services pcef pcc-action-profiles profile-name] hierarchy level. Options lrf-rule-name LRF rule name. The referenced LRF rule must be configured in an LRF profile. Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. 487 Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef pcc-action-profiles profile-name] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. Support for Next Gen Services for Junos OS Broadband Subscriber Management introduced in Junos OS Release 19.3R2 on MX Series. RELATED DOCUMENTATION Configuring the Activation of an LRF Rule by a PCC Rule Configuring Logging and Reporting for Junos OS Subscriber Aware Configuring Logging and Reporting for Subscriber Management Configuring an LRF Profile for Subscribers lrf-profile (Service Set) IN THIS SECTION Syntax | 487 Hierarchy Level | 488 Description | 488 Options | 488 Required Privilege Level | 488 Release Information | 488 Syntax lrf-profile profile-name; 488 Hierarchy Level [edit services service-set service-set-name] Description Assign the LRF profile to the service set that is that is configured for application-aware policy control. Options profile-name LRF profile name. The referenced LRF profile must be configured. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Assigning an LRF Profile to Subscribers | 194 Configuring an LRF Profile for Subscribers Configuring Logging and Reporting for Junos OS Subscriber Aware | 186 Applying Logging and Reporting Configuration to a Subscriber Management Service Set Configuring Logging and Reporting for Subscriber Management 489 matches IN THIS SECTION Syntax | 489 Hierarchy Level | 489 Description | 490 Options | 491 Required Privilege Level | 491 Release Information | 491 Syntax matches { apply-groups [group-names]; apply-groups-except [group-names]; value; } Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from called-station-id], [edit unified-edge gateways tdf gateway-name domain-selection term term-name from calling-station-id], [edit unified-edge gateways tdf gateway-name domain-selection term term-name from class], [edit unified-edge gateways tdf gateway-name domain-selection term term-name from 3gpp-imsi], [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name format string] 490 Description Specify the regular expression that the attribute must match. After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. Table 12: Regular Expression Operators for the matches Statement Operator Matches . (period) One instance of any character except the space. * (asterisk) Zero or more instances of the immediately preceding term. + (plus sign) One or more instances of the immediately preceding term. ? (question mark) Zero or one instance of the immediately preceding term. | (pipe) One of the terms that appears on either side of the pipe operator. ! (exclamation point) Any string except the one specified by the expression when the exclamation point appears at the start of the expression. Use of the exclamation point is specific to Junos OS. ^ (caret) Start of a line when the caret appears outside square brackets. One instance of any character that does not follow it within square brackets when the caret is the first character inside square brackets. $ (dollar sign) End of a line. [ ] (paired square brackets) One instance of one of the enclosed alphanumeric characters. To indicate a range of characters, use a hyphen ( - ) to separate the beginning and ending characters of the range. For example, [a-z0-9] matches any letter or number. 491 Table 12: Regular Expression Operators for the matches Statement (Continued) Operator Matches ( ) (paired parentheses) One instance of the evaluated value of the enclosed term. Parentheses are used to indicate the order of evaluation in the regular expression. Options value Regular expression to match. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 492 maximum-bit-rate (Default Local Policy) IN THIS SECTION Syntax | 492 Hierarchy Level | 492 Description | 492 Options | 492 Required Privilege Level | 493 Release Information | 493 Syntax maximum-bit-rate uplink mbr-uplink-value downlink mbr-downlink-value; Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name ip-subscriber default-local-policy] Description Configure the maximum bit rate (MBR) for a subscriber's uplink and downlink traffic entering or exiting the access interface of the TDF domain when a TDF IP-based subscriber session does not exist. Uplink traffic originates from the subscriber towards the public data network (PDN), and downlink traffic comes from the PDN and is destined for the subscriber. Options mbr-uplink-value mbr-downlink-value MBR value for the uplink direction. · Range: 0 through 6144000 Kbps. MBR value for the downlink direction. 493 · Range: 0 through 6144000 Kbps. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based Subscriber Setup Overview | 107 maximum-bit-rate (PCC Action Profiles) IN THIS SECTION Syntax | 494 Hierarchy Level | 494 Description | 494 Default | 494 Options | 494 Required Privilege Level | 494 Release Information | 495 494 Syntax maximum-bit-rate uplink mbr-uplink-value downlink mbr-downlink-value; Hierarchy Level [edit unified-edge pcef pcc-action-profiles profile-name], [edit services pcef pcc-action-profiles profile-name] Description Specify the maximum bit rate (MBR) that you want a PCC action profile to use for uplink and downlink traffic. If you are using Junos OS Subscriber Aware, specify the MBR at the [edit unified-edge pcef pcc-actionprofiles profile-name hierarchy level. If you are using Junos OS Broadband Subscriber Management, specify the MBR at the [edit services pcef pcc-action-profiles profile-name hierarchy level. Default If you configure the maximum-bit-rate statement but do not specify MBR values for uplink and downlink, the default value is 0. Options mbr-uplink-value mbr-downlink-value MBR value for the uplink direction. · Range: 1 through 6144000 Kbps. MBR value for the downlink direction. · Range: 1 through 6144000 Kbps. Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. 495 unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef pcc-action-profiles profile-name hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. Support for Next Gen Services for Junos OS Broadband Subscriber Management introduced in Junos OS Release 19.3R2 on MX Series. RELATED DOCUMENTATION Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment Configuring Policy and Charging Control Action Profiles for Subscriber Management Understanding Application-Aware Policy Control for Subscriber Management maximum-bit-rate (TDF Domain) IN THIS SECTION Syntax | 496 Hierarchy Level | 496 Description | 496 Options | 496 Required Privilege Level | 496 Release Information | 496 496 Syntax maximum-bit-rate { apply-groups [group-names]; apply-groups-except [group-names]; downlink mbr-downlink-value; uplink mbr-uplink-value; } Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name] Description Configure the TDF domain's default TDF subscriber maximum bit rate (MBR) for uplink and downlink traffic. Uplink traffic originates from the subscriber towards the public data network (PDN), and downlink traffic comes from the PDN and is destined for the subscriber. Options mbr-downlink-value mbr-uplink-value MBR value for the downlink direction. · Range: 0 through 1,048,000 Kbps. MBR value for the uplink direction. · Range: 0 through 6,144,000 Kbps. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. 497 RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Configuring IFL-Based TDF Subscribers and Properties with a TDF Domain | 140 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based and IFL-Based TDF Subscribers Overview | 107 IP-Based Subscriber Setup Overview | 107 maximum-pending-reqs-limit IN THIS SECTION Syntax | 497 Hierarchy Level | 497 Description | 497 Options | 498 Required Privilege Level | 498 Release Information | 498 Syntax maximum-pending-reqs-limit number; Hierarchy Level [edit access radius network-element name] Description Configure the maximum number of requests that can be queued to the network element. When the pending-request queue is full, any additional requests are dropped. 498 Options number Maximum number of pending requests. · Range: 512 through 8192 Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring RADIUS Network Elements | 94 Understanding Network Elements | 71 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 maximum-pending-requests (Diameter) IN THIS SECTION Syntax | 499 Hierarchy Level | 499 Description | 499 Options | 499 Required Privilege Level | 499 Release Information | 499 499 Syntax maximum-pending-requests requests; Hierarchy Level [edit access diameter applications pcc-gx] Description Configure the maximum number of pending requests parameter for the Diameter application. Options requests Maximum number of pending requests. · Range: 1000 through 65,535 · Default: 20,000 Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION diameter (Subscriber Aware Policy Control) | 368 500 maximum-sessions (TDF Gateway) IN THIS SECTION Syntax | 500 Hierarchy Level | 500 Description | 500 Options | 500 Required Privilege Level | 500 Release Information | 501 Syntax maximum-sessions max-sessions; Hierarchy Level [edit unified-edge gateways tdf gateway-name cac] Description Configure the maximum number of TDF subscriber sessions that may be running. Options max-sessions Maximum number of TDF subscriber sessions, expressed in thousands. · Range: 10 thousands through 5000 thousands Required Privilege Level unified-edge--To view this statement in the configuration. 501 unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring a TDF Gateway | 16 maximum-subscribers IN THIS SECTION Syntax | 501 Hierarchy Level | 501 Description | 502 Options | 502 Required Privilege Level | 502 Release Information | 502 Syntax maximum-subscribers number; Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name ip-subscriber] 502 Description Specify the maximum number of IP-based subscriber sessions that the TDF domain can support. Options number Maximum number of subscriber sessions allowed. · Range: 100 thousands through 5000 thousands. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based Subscriber Setup Overview | 107 maximum-sessions-trap-percentage (TDF Gateway) IN THIS SECTION Syntax | 503 Hierarchy Level | 503 Description | 503 Options | 503 Required Privilege Level | 503 503 Release Information | 503 Syntax maximum-sessions-trap-percentage max-sessions-pct; Hierarchy Level [edit unified-edge gateways tdf gateway-name cac] Description Configure the trap threshold for the number of TDF subscriber sessions as a percentage of the maximum number of sessions (maximum-sessions) that was configured at the [edit unified-edge gateways tdf gateway-name cac] hierarchy level. If the number of subscriber sessions reaches the threshold, the SNMP trap jnxScgSMSessionThreshHigh is generated. Options max-sessions-pct Percentage of the maximum number of TDF subscriber sessions. · Range: 1 through 90 Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 504 RELATED DOCUMENTATION Configuring a TDF Gateway | 16 member (Application Identification) IN THIS SECTION Syntax | 504 Hierarchy Level | 504 Description | 504 Options | 505 Required Privilege Level | 505 Release Information | 505 Syntax [member member-name]; Hierarchy Level [edit services application-identification application application-name over protocol-type signature l4-l7-signature-name] Description Define a member name for a custom application definition. Custom definitions can contain multiple members that define attributes for an application. You can define a maximum of four member names. 505 Options member-name Name of a member for a custom application definition. You can define a maximum of four member names. Required Privilege Level view-level--To view this statement in the configuration. control-level--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Releases 19.3R2 and 19.4R1 on MX Series MX240, MX480 and MX960 using the MX-SPC3 services card. RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures Application Identification Overview Application Identification Overview memory (TDF Gateway) IN THIS SECTION Syntax | 506 Hierarchy Level | 506 Description | 506 Options | 506 Required Privilege Level | 506 Release Information | 506 506 Syntax memory memory-pct; Hierarchy Level [edit unified-edge gateways tdf gateway-name cac] Description Configure the threshold for the maximum amount of memory that the TDF gateway may use. If the amount of memory that the TDF gateway uses reaches the threshold, the SNMP trap jnxScgSMMemoryThreshHigh is generated. Options memory-pct Maximum percentage of memory that can be used. · Range: 1 through 90. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring a TDF Gateway | 16 507 mif (TDF Interface) IN THIS SECTION Syntax | 507 Hierarchy Level | 507 Description | 507 Required Privilege Level | 508 Release Information | 508 Syntax mif { mtu; unit interface-unit-number { family family-name { service { input service-set; output service-set; } } } } Hierarchy Level [edit interfaces] Description Configure the TDF interfaces for the TDF domains. A TDF interface is distinct from other types of interfaces and is used to associate a TDF domain's subscribers with an access interface in a virtual routing and forwarding table (VRF). You need to configure one TDF interface logical interface (unit) for every TDF domain. 508 The remaining statements are explained separately. See CLI Explorer. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring a TDF Logical Interface | 143 monitoring-key (PCC Action Profile) IN THIS SECTION Syntax | 508 Hierarchy Level | 509 Description | 509 Options | 509 Required Privilege Level | 509 Release Information | 509 Syntax monitoring-key key_string 509 Hierarchy Level [edit unified-edge pcef pcc-action-profiles profile-name] Description Specify the monitoring key that controls TDF subscriber usage monitoring for traffic that matches the data flows or applications identified in the predefined PCC rules containing the PCC action profile. The monitoring key is defined by the PCRF. Options key_string Identifier for the monitoring key. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring TDF Subscriber Usage Monitoring for Traffic That Matches Predefined PCC Rules | 105 Understanding Usage Monitoring for TDF Subscribers | 74 mtu (TDF Interface) IN THIS SECTION Syntax | 510 510 Hierarchy Level | 510 Description | 510 Options | 510 Required Privilege Level | 510 Release Information | 511 Syntax mtu mtu-size; Hierarchy Level [edit interfaces mif] Description Configure the maximum transmission unit (MTU) size for the TDF interface. Options mtu-size MTU size. · Range: 256 through 9192 bytes · Default: 500 bytes (inet, inet6, and ISO families), 1448 bytes (MPLS) Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. 511 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring a TDF Logical Interface | 143 nas-ip-address IN THIS SECTION Syntax | 511 Hierarchy Level | 511 Description | 511 Required Privilege Level | 512 Release Information | 512 Syntax nas-ip-address { equals value; } Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from] Description Specify the RADIUS AVP NAS-IP-Address for the incoming RADIUS request from the subscriber. 512 After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. The remaining statement is explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 nat-rule-sets (Service Set) IN THIS SECTION Syntax | 513 Hierarchy Level | 513 Description | 513 Options | 513 Required Privilege Level | 513 Release Information | 513 513 Syntax nat-rule-sets rule-set-name; Hierarchy Level [edit services service-set service-set-name] Description Specify the Network Address Translation (NAT) rule set included in the service set. You can configure only one NAT rule set. If you specify a NAT rule set, you cannot specify a NAT rule. Options rule-set-name Name of the NAT rule set. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced before Junos OS Release 7.4. RELATED DOCUMENTATION Applying Services to Subscriber-Aware Traffic with a Service Set | 146 514 nat-rules IN THIS SECTION Syntax | 514 Hierarchy Level | 514 Description | 514 Options | 514 Required Privilege Level | 514 Release Information | 515 Syntax (nat-rules rule-name | nat-rule-sets rule-set-name); Hierarchy Level [edit services service-set service-set-name] Description Specify the Network Address Translation (NAT) rules or rule set included in this service set. You can configure multiple rules, but only one rule set for each service. Options rule-name--Identifier for the collection of terms that constitute this rule. rule-set-name--Identifier for the set of rules to be included. Required Privilege Level interface--To view this statement in the configuration. 515 interface-control--To add this statement to the configuration. Release Information Statement introduced before Junos OS Release 7.4. RELATED DOCUMENTATION Configuring Service Rules Applying Services to Subscriber-Aware Traffic with a Service Set | 146 network-element (AAA Profile) IN THIS SECTION Syntax | 515 Hierarchy Level | 515 Description | 516 Options | 516 Required Privilege Level | 516 Release Information | 516 Syntax network-element network-element-name; Hierarchy Level [edit unified-edge aaa profiles aaa-profile-name radius authentication], [edit unified-edge aaa profiles aaa-profile-name radius accounting] 516 Description Specify the network element providing policy management for TDF subscribers. The network element must already be defined at the [edit access radius] hierarchy level. Options network-element-name Name of the network element. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring an AAA Profile | 96 Understanding AAA Profiles | 73 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 Configuring RADIUS Network Elements | 94 network-element (Diameter Base Protocol) IN THIS SECTION Syntax | 517 Hierarchy Level | 517 Description | 517 Default | 517 517 Options | 517 Required Privilege Level | 518 Release Information | 518 Syntax network-element element-name { function function-name; peer peer-name { priority priority-value; <timeout seconds>; } } Hierarchy Level [edit access diameter] Description Configure the Diameter network element, which is similar to a peer group that provides functionspecific features including failover and load balancing. Specify the associated function that the network element supports. You can prioritize the peers to support failover or load balancing. Default By default, all network elements are available on every session PIC unless Diameter bindings are configured. Options element-name--Name of the network element. · Range: Up to 32 alphanumeric characters The remaining statements are explained separately. See CLI Explorer. 518 Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION diameter (Subscriber Aware Policy Control) | 368 network-element (Subscriber Aware Policy Control) IN THIS SECTION Syntax | 518 Hierarchy Level | 519 Description | 519 Options | 519 Required Privilege Level | 519 Release Information | 519 Syntax network-element { element-name { session-pics { group { group-name { [session-pic interface-name]; } 519 } } } } Hierarchy Level [edit unified-edge tdf gateway-name diameter] Description Configure the Diameter network element associated with Diameter bindings for this TDF gateway. NOTE: If you want to set up Diameter bindings for session PICs on the TDF gateway, contact Juniper Networks Professional Services for assistance. Options elementname Name of the network element. · Range: Up to 32 alphanumeric characters NOTE: The specified network element must already be configured on the TDF gateway at the [edit access diameter network-element] hierarchy level. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 520 RELATED DOCUMENTATION diameter (TDF Gateway) | 370 network-elements (RADIUS) IN THIS SECTION Syntax | 520 Hierarchy Level | 520 Description | 521 Options | 521 Required Privilege Level | 521 Release Information | 521 Syntax network-elements name { server name { priority priority; } maximum-pending-reqs-limit number; pending-queue-watermark watermark; pending-queue-watermark-abate abate-watermark; } Hierarchy Level [edit access radius] 521 Description Configure a network element, which is a load-balanced group of RADIUS servers providing policy management for TDF subscribers. Options name Name of the network element. · Range: Up to 31 alphanumeric characters. The remaining statements are described separately. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring RADIUS Network Elements | 94 Understanding Network Elements | 71 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 network (Address Pools) IN THIS SECTION Syntax | 522 Hierarchy Level | 522 Description | 522 522 Options | 522 Required Privilege Level | 522 Release Information | 523 Syntax network { [network-prefix] { external-assigned; } } Hierarchy Level [edit access address-assignment address-pools name family inet], [edit access address-assignment address-pools name family inet6] Description Specify the network prefix for the address pool for IPv4 or IPv6 addresses. NOTE: At least one network prefix must be configured but you can configure more than one prefix. Options network-prefix Network prefix (IPv4 or IPv6). The remaining statement is explained separately. See CLI Explorer. Required Privilege Level access--To view this statement in the configuration. 523 access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Understanding Source IP Filtering with Address Pools in TDF Domains for IP-Based Subscribers | 110 Configuring Address Pools for Source-IP Filtering of IP-Based Subscribers | 119 network (TDF Domain) IN THIS SECTION Syntax | 523 Hierarchy Level | 523 Description | 524 Options | 524 Required Privilege Level | 524 Release Information | 524 Syntax network address net-mask; Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name subscriberexclude-prefix family inet], 524 [edit unified-edge gateways tdf gateway-name domains domain-name subscriberexclude-prefix family inet6] Description Specify the network prefix of source IP addresses for uplink packets and destination IP addresses for downlink packets that do not undergo TDF processing. Options address net-mask Network address for the network prefix to exclude. Netmask for the network prefix. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Configuring IFL-Based TDF Subscribers and Properties with a TDF Domain | 140 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based and IFL-Based TDF Subscribers Overview | 107 IP-Based Subscriber Setup Overview | 107 525 no-application-system-cache IN THIS SECTION Syntax | 525 Hierarchy Level | 525 Description | 525 Required Privilege Level | 525 Release Information | 526 Syntax no-application-system-cache; Hierarchy Level [edit services application-identification], [edit services application-identification nested-application-settings] Description Application identification information is saved in the application system cache to improve performance. This cache is updated when a different application is identified. This caching is turned on by default. Use the no-application-system-cache statement to turn it off. ASC is enabled by default when a session is created. You can manually turn this caching off using the set services application-identification no-application-system-cache command. You can re-enable the ASC by using the set services application-identification application-system-cache command. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. 526 Release Information Statement introduced in Junos OS Release 9.5. Support for Next Gen Services introduced in Junos OS Release 19.3R2 and 19.4R1 on MX Series routers MX240, MX480 and MX960. RELATED DOCUMENTATION Configuring Global APPID Properties Application Identification for Nested Applications no-send-to-ue IN THIS SECTION Syntax | 526 Hierarchy Level | 526 Description | 527 Default | 527 Required Privilege Level | 527 Release Information | 527 Syntax no-send-to-ue; Hierarchy Level [edit unified-edge pcef flow-description flow-identifier] 527 Description Specify that signaling information about the service data flow (SDF) filter is not sent to the user equipment. Default By default, if this statement is not configured, signaling information about the SDF filter is sent to the user equipment. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring Service Data Flow Filters | 79 Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment | 56 order (Application Identification) IN THIS SECTION Syntax | 528 Hierarchy Level | 528 Description | 528 Options | 528 Required Privilege Level | 528 528 Release Information | 529 Syntax order order; Hierarchy Level [edit services application-identification application name address-mapping name], [edit services application-identification application application-name icmpmapping], [edit services application-identification application application-name ipprotocol-mapping], [edit services application-identification application application-name over protocol-type signature l4-l7-signature-name], [edit services application-identification application application-name Description Define application matching priority. For address configurations, the order number resolves the conflict when multiple address entries are matched for a specific session. The lower number has a higher priority. Options order Order sequence number. This value is mandatory and must be unique. · Default: 0 · Range: 0 through 65,535 Required Privilege Level system--To view this statement in the configuration. system-control--To add this statement to the configuration. 529 Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Release 19.3R1 on MX Series. Support at the [edit services application-identification application application-name] hierarchy level introduced in Junos OS Releases 19.3R2 and 19.4R1 on MX Series MX240, MX480 and MX960 using the MX-SPC3 services card. RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures Application Identification Overview Application Identification Overview order-priority (Application Identification) IN THIS SECTION Syntax | 529 Hierarchy Level | 530 Description | 530 Options | 530 Required Privilege Level | 530 Release Information | 530 Syntax order-priority (high | low); 530 Hierarchy Level [edit services application-identification application application-name addressmapping name], [edit services application-identification application application-name icmpmapping], [edit services application-identification application application-name ipprotocol-mapping], [edit services application-identification application application-name over protocol-type signature l4-l7-signature-name] Description Define the priority of signatures when both a custom signature and predefined signature apply to a protocol bundle. Options high Custom signatures have priority over predefined signatures. low Predefined signatures have priority over custom signatures. · Default: high Required Privilege Level system--To view this statement in the configuration. system-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Releases 19.3R2 and 19.4R1 on MX Series MX240, MX480 and MX960 using the MX-SPC3 services card. RELATED DOCUMENTATION Application Identification Overview 531 Configuring Custom Application Signatures Application Identification Overview Application Identification Overview origin (Diameter Base Protocol) IN THIS SECTION Syntax | 531 Hierarchy Level | 531 Description | 531 Required Privilege Level | 532 Release Information | 532 Syntax origin { host hostname; realm realm-name; } Hierarchy Level [edit access diameter] Description Specify values of the Origin-Realm AVP and the Origin-Host AVP used in all messages sent by the Diameter instance. These values must be unique for each session PIC. The remaining statements are explained separately. See CLI Explorer. 532 Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION diameter (Subscriber Aware Policy Control) | 368 outgoing-queue IN THIS SECTION Syntax | 532 Hierarchy Level | 533 Description | 533 Options | 533 Required Privilege Level | 533 Release Information | 533 Syntax outgoing-queue { <high-watermark high-watermark>; <low-watermark low-watermark>; size size; } 533 Hierarchy Level [edit access diameter peer peer-name] Description Configure the outgoing queue properties for this peer. When the queue size reaches the high watermark, the peer is marked unavailable, any new messages to the Diameter network element are not sent to this peer, and the SNMP trap Diameter_PeerOutQHiWMarkNotif is generated. When the queue size descends below the low watermark after reaching the high watermark, the peer becomes available and the SNMP trap Diameter_PeerLowQHiWMarkNotif is generated. Options high-watermark high-watermark low-watermark low-watermark size size (Optional) Use the specified high watermark for this peer. · Range: 1 through 100 percent · Default: 80 (Optional) Use the specified low watermark for this peer. · Range: 1 through 100 percent · Default: 60 Use the specified size of the queue. The default is 6000. · Range: 1 through 65,535 packets Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 534 RELATED DOCUMENTATION Configuring Diameter Peers | 158 diameter (Subscriber Aware Policy Control) | 368 over (Application Identification) IN THIS SECTION Syntax | 534 Hierarchy Level | 535 Description | 535 Options | 535 Required Privilege Level | 535 Release Information | 535 Syntax over protocol-type { signature l4-l7-signature-name { chain-order member member-name { check-bytes max-bytes-to-check; context context; pattern pattern; direction direction; } order order; order-priority (high | low); port-range { tcp [port-range]; udp [port-range]; } protocol (http | ssl | tcp | udp); 535 ] } Hierarchy Level [edit services application-identification application application-name] Description Configure a custom signature based on Layer 7 custom signatures that are further differentiated by the Layer 4 protocol type. Users can define their own signatures for deep packet inspection (DPI) that do not exist in the predefined signature database. Options l4-l7-signature-name Name of the signature used for DPI. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level system--To view this statement in the configuration. system-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Releases 19.3R2 and 19.4R1 on MX Series MX240, MX480 and MX960 using the MX-SPC3 services card. RELATED DOCUMENTATION Application Identification Overview | 23 Configuring Custom Application Signatures | 26 Application Identification Overview | 23 Application Identification Overview | 23 536 packet-capture (Next Gen Services) IN THIS SECTION Syntax | 536 Hierarchy Level | 536 Description | 536 Options | 537 Required Privilege Level | 538 Release Information | 538 Syntax packet-capture { buffer-packets-limit bytes; capture-interval capture-interval; capture-limit capture-limit; global; max-bytes bytes; max-files max-files; max-packets max-packets; no-decryption; no-inconclusive; storage-limit bytes; } Hierarchy Level [edit services application-identification] Description Specify packet capture options to capture the unknown application traffic. You can use the packet capture details to gather more context related to the unknown application or use the information to 537 analyze the traffic for potential threats. When you enable packet capture for the unknown application traffic, the system captures the entire packet details and stores information in a packet capture file at /var/log/pcap/ location. Options buffer-packets- Maximum memory to buffer packets (bytes). Use this option to limit the maximum disk limit available in the Packet Forwarding Engine for packet capture files. · Default: 1% of available data in shared memory · Range: 0 through 5% of available data in shared memory · Default: 1 MB (for cSRX) · Range: 0 through 5 MB captureinterval Timeout value in minutes to avoid repetitive capture of the same traffic. Use this option to set the maximum amount of time the current log file remains open, and receives new statistics before it is closed. The file remains open till it has reached the maximum possible size. · Default: 1440 minutes (24 Hours). · Range: 1 through 525600 capture-limit Number of repetitive captures of the same traffic. Use this option to limit the number of times the same traffic can be repeatedly captured before the cache entry times out. · Default: 4 · Range: 1 through 1000 global Enable global capturing of the application traffic. use this option to configure the packet capture globally to capture all unknown traffic. Another option is to enable capturing of unknown application traffic specific to a security policy. max-bytes Maximum number of TCP bytes per session (bytes). For TCP sessions, the count includes the actual payload data length and excludes IP/TCP headers for the maximum bytes limit. If you are setting the packet capture at security policy level, the packet capture concludes only after the final policy is applied even if the configured limit is reached. Limitation--Jumbo frames can have up to 1500 bytes of the payload saved in the capture file. 538 · Default: 6000 bytes · Range: 40 through 1073741824 max-files Maximum number of unique packet capture files to create before the oldest file is overwritten by a new file created. · Range: 1 through 2500 max-packets Maximum number of UDP packets per session. · Default: 10 packets · Range: 1 through 1000 no-decryption Disable capturing of the decrypted traffic. noinconclusive Disable packet capturing of the inconclusive traffic. This option disables the packet capture for the following sessions: · Sessions that are closed before the application identification/classification completes. · Sessions that ar not getting classified even on reaching the maximum packet capture limit. If you do not configure this option, by default, the system captures packets for the inconclusive sessions. storage-limit Maximum disk space (bytes) that can be used in the Routing Engine for packet capture files. · Default: 50 MB · Range: 1048576 through 4294967295 bytes Required Privilege Level system--To view this statement in the configuration. system-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 20.2R1. 539 RELATED DOCUMENTATION show services application-identification packet-capture counters path (Steering) IN THIS SECTION Syntax | 539 Hierarchy Level | 539 Description | 539 Required Privilege Level | 540 Release Information | 540 Syntax path { ipv4-address ipv4-address; ipv6-address ipv6-address; } Hierarchy Level [edit unified-edge pcef pcc-action-profiles profile-name steering], [edit services pcef pcc-action-profiles profile-name] Description Specify the IP address of a third-party server to which the PCC action profile steers HTTP traffic for applying services. If you configure this, the PCC action profile can only be used in PCC rules that match only HTTP-based applications and all flows. The remaining statements are explained separately. 540 Required Privilege Level For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef pcc-action-profiles profile-name] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. Support for Next Gen Services for Junos OS Broadband Subscriber Management introduced in Junos OS Release 19.3R2 on MX Series. RELATED DOCUMENTATION Understanding Application-Aware Policy Control for Subscriber Management Configuring Policy and Charging Control Action Profiles for Subscriber Management Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware pattern (Application Identification) IN THIS SECTION Syntax | 541 Hierarchy Level | 541 Description | 541 541 Options | 541 Required Privilege Level | 541 Release Information | 541 Syntax pattern pattern; Hierarchy Level [edit services application-identification application application-name over protocol-type signature l4-l7-signature-name member member-name] Description Define an attack pattern to be detected. Options pattern User-defined pattern of attack to match, using a regular expression. Required Privilege Level system--To view this statement in the configuration. system-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Releases 19.3R2 and 19.4R1 on MX Series MX240, MX480 and MX960 using the MX-SPC3 services card. 542 RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures pattern (Class Attribute) IN THIS SECTION Syntax | 542 Hierarchy Level | 542 Description | 542 Options | 543 Required Privilege Level | 543 Release Information | 543 Syntax pattern "pattern"; Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name subscription-id use-class] Description Configure characters to insert between the resulting regular expression groups that are generated from parsing the Class attribute contents of the accounting request from the BNG, PGW, or GGSN. Regular expression groups are identified with \n for a group number. 543 Options pattern Characters to insert between regular expression groups. A regular expression group number "n" is identified as \n. For example, the following configuration generates " 000118191129|ALICE:DRAV3:" out of " 000118191129#000118191129#ALICE:DRAV3:#7168#nflat#ADSL##": [edit unified-edge gateways tdf TDF1 domains domain1 subscription-id] user@host# set use-class regex "[^#]*#\([^#]*\)\#\([^#]*\)" user@host# set use-class pattern "\1|\2" Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 pcc-action-profile (PCC Rules) IN THIS SECTION Syntax | 544 Hierarchy Level | 544 Description | 544 Options | 544 544 Required Privilege Level | 544 Release Information | 545 Syntax pcc-action-profile profile-name; Hierarchy Level [edit unified-edge pcef pcc-rules rules-name then], [edit services pcef pcc-rules rules-name then] Description Specify the name of the action profile to include in a policy and charging control (PCC) rule configuration. The action profile defines the treatment to be applied to specific service data flows or to packets associated with specific applications. If you are using Junos OS Subscriber Aware, specify the name of the action profile at the [edit unifiededge pcef pcc-rules rules-name then] hierarchy level. If you are using Junos OS Broadband Subscriber Management, specify the name of the action profile at the [edit services pcef pcc-rules rules-name then] hierarchy level. Options profile-name Name of the PCC action profile that the PCC rule references. The referenced action profile must be configured. · Range: 1 through 63 characters. Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. 545 unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef pcc-rules rules-name then] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. Support for Next Gen Services for Junos OS Broadband Subscriber Management introduced in Junos OS Release 19.3R2 on MX Series. RELATED DOCUMENTATION Configuring Policy and Charging Control Rules Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment Configuring Policy and Charging Control Action Profiles for Subscriber Management Understanding Application-Aware Policy Control for Subscriber Management pcc-action-profiles IN THIS SECTION Syntax | 546 Hierarchy Level | 546 Description | 546 Options | 547 Required Privilege Level | 547 Release Information | 547 546 Syntax pcc-action-profiles profile-name { forwarding-class class-name; gate-status (uplink | downlink | uplink-downlink | disable-both); hcm-profile hcm-profile-name; logging-rule lrf-rule-name; maximum-bit-rate uplink mbr-uplink-value downlink mbr-downlink-value; monitoring-key key_string; redirect { url url-name; } steering { keep-existing-steering; path { ipv4-address ipv4-address; ipv6-address ipv6-address; } routing-instance { downlink downlink-vrf-name; uplink uplink-vrf-name; } } } Hierarchy Level [edit unified-edge pcef], [edit services pcef] Description Configure a PCC action profile. A PCC action profile defines the treatment to be applied to specific service data flows or to packets associated with specific applications. A PCC action profile is specified in the then clause of a PCC rule. If you are using Junos OS Subscriber Aware, configure the PCC action profile at the [edit unified-edge pcef] hierarchy level. 547 If you are using Junos OS Broadband Subscriber Management, configure the PCC action profile at the [edit services pcef] hierarchy level. The following options are not applicable to subscriber management: · hcm-profile · monitoring-key Options profile-name Name of the PCC action profile. · Range: 1 through 63 characters. The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details. Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. Support for Next Gen Services for Junos OS Broadband Subscriber Management introduced in Junos OS Release 19.3R2 on MX Series. RELATED DOCUMENTATION Understanding Application-Aware Policy Control for Subscriber Management Configuring Policy and Charging Control Action Profiles for Subscriber Management 548 Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment Configuring TDF Subscriber Usage Monitoring for Traffic That Matches Predefined PCC Rules Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware pcc-rule IN THIS SECTION Syntax | 548 Hierarchy Level | 548 Description | 548 Options | 549 Required Privilege Level | 549 Release Information | 549 Syntax [pcc-rule rule-name precedence number]; Hierarchy Level [edit unified-edge pcef pcc-rule-bases rulebase-name], [edit services pcef pcc-rule-bases rulebase-name] Description Specify one or more policy and charging control (PCC) rules and the rules precedence in a PCC rulebase. If you are using Junos OS Subscriber Aware, configure the PCC rules at the [edit unified-edge pcef pccrule-bases rulebase-name] hierarchy level. If you are using Junos OS Broadband Subscriber Management, configure the PCC rules at the [edit services pcef pcc-rule-bases rulebase-name] hierarchy level. 549 Options rule-name Name of the PCC rule. The referenced PCC rule must be configured. · Range: 1 through 63 characters. number Precedence value assigned to the PCC rule. The precedence assigned must be unique among the configured PCC rules. · Range: 1 through 65,535 Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef pcc-rule-bases rulebase-name] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. RELATED DOCUMENTATION Configuring a Policy and Charging Control Rulebase Configuring Policy and Charging Control Rules 550 pcc-rulebases (PCEF) IN THIS SECTION Syntax | 550 Hierarchy Level | 550 Description | 550 Options | 551 Required Privilege Level | 551 Release Information | 551 Syntax pcc-rulebases rulebase-name { [pcc-rule rule-name precedence number]; } Hierarchy Level [edit unified-edge pcef], [edit services pcef] Description Configure a policy and charging control (PCC) rulebase. You can specify from 1 through 4000 rules in a rulebase. If you are using Junos OS Subscriber Aware, configure the PCC rulebase at the [edit unified-edge pcef] hierarchy level. If you are using Junos OS Broadband Subscriber Management, configure the PCC rulebase at the [edit services pcef] hierarchy level. 551 Options rulebase-name Name of the PCC rulebase. · Range: 1 through 63 characters. The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details. Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. RELATED DOCUMENTATION Configuring a Policy and Charging Control Rulebase pcc-rulebases (PCEF Profile) IN THIS SECTION Syntax | 552 552 Hierarchy Level | 552 Description | 552 Options | 552 Required Privilege Level | 553 Release Information | 553 Syntax [pcc-rulebases rulebase-name <time-of-day-profile profile-name>]; Hierarchy Level [edit unified-edge pcef profiles profile-name aaa-policy-control], [edit unified-edge pcef profiles profile-name dynamic-policy-control], [edit unified-edge pcef profiles profile-name static-policy-control], [edit services pcef profiles profile-name static-policy-control], [edit services pcef profiles profile-name dynamic-policy-control] Description Specify a policy and charging control (PCC) rulebase for a policy control profile. If you are using Junos OS Subscriber Aware, specify the PCC rulebase at the [edit unified-edge pcef profiles profile-name (aaa-policy-control | dynamic-policy-control | static-policy-control) hierarchy level. If you are using Junos OS Broadband Subscriber Management, specify the PCC rulebase at the [edit services pcef profiles profile-name (static-policy-control | dynamic-policy-control)] hierarchy level. Options rulebase-name Name of the PCC rulebase. The referenced PCC rulebase must be configured. time-of-dayprofile profilename (Optional; only applies to rulebases in static PCEF profiles for Junos OS Subscriber Aware) Use the specified name of the time-of-day profile to apply to the PCC rulebase. 553 The referenced profile must already be defined at the [edit unified-edge pcef] hierarchy level. The time-of-day profile specifies the time of day, day of the week, or day of the month to activate or deactivate the PCC rulebase for subscribers assigned to the PCEF profile. Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef profiles profile-name static-policy-control] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. Support at the [edit services pcef profiles profile-name dynamic-policy-control] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 18.2R1 on MX Series. RELATED DOCUMENTATION Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Dynamic Policies Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Static Policies Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Policies That a RADIUS Server Controls Configuring Static Time-of-Day PCC Rule Activation and Deactivation in a Junos OS Subscriber Aware PCEF Profile Configuring a Policy and Charging Control Rulebase Configuring a Policy and Charging Enforcement Function Profile for Subscriber Management 554 pcc-rules (PCEF) IN THIS SECTION Syntax | 554 Hierarchy Level | 554 Description | 554 Options | 555 Required Privilege Level | 555 Release Information | 555 Syntax pcc-rules rule-name { from { <application-groups [application-group-name]>; <applications [application-name]>; flows ([flow-identifier | any)]; } then { pcc-action-profile profile-name; } } Hierarchy Level [edit unified-edge pcef], [edit services pcef] Description Configure the PCC rules. A PCC rule identifies the subscriber IP packets that are associated with a service data flow (SDF) or application and defines the treatment to be applied to the packets. 555 If you are using Junos OS Subscriber Aware, configure the PCC rule at the [edit unified-edge pcef] hierarchy level. If you are using Junos OS Broadband Subscriber Management, configure the PCC rule at the [edit services pcef] hierarchy level. Options rule-name Name of the PCC rule. · Range: 1 through 63 characters. The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details. Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. Support for Next Gen Services for Junos OS Broadband Subscriber Management introduced in Junos OS Release 19.3R2 on MX Series. RELATED DOCUMENTATION Configuring Policy and Charging Control Rules Configuring TDF Subscriber Usage Monitoring for Traffic That Matches Predefined PCC Rules 556 pcc-rules (PCEF Profile) IN THIS SECTION Syntax | 556 Hierarchy Level | 556 Description | 556 Options | 557 Required Privilege Level | 557 Release Information | 557 Syntax pcc-rules [rule-name precedence number <time-of-day-profile profile-name>]; Hierarchy Level [edit unified-edge pcef profiles profile-name aaa-policy-control], [edit unified-edge pcef profiles profile-name dynamic-policy-control], [edit unified-edge pcef profiles profile-name static-policy-control], [edit services pcef profiles profile-name static-policy-control], [edit services pcef profiles profile-name dynamic-policy-control] Description Specify the policy and charging control (PCC) rules for a policy and charging enforcement function (PCEF) profile and assign a precedence to each PCC rule. You can configure up to 32 PCC rules in a PCEF profile. If you are using Junos OS Subscriber Aware, specify the PCC rules at the [edit unified-edge pcef profiles profile-name (aaa-policy-control | dynamic-policy-control | static-policy-control) hierarchy level. If you are using Junos OS Broadband Subscriber Management, specify the PCC rules at the [edit services pcef profiles profile-name (static-policy-control | dynamic-policy-control)] hierarchy level. 557 Options rule-name precedence number time-of-dayprofile profilename Name of the PCC rule. The referenced PCC rule must be configured. Use the specified precedence value assigned to a PCC rule. A lower precedence value indicates a higher precedence. · Range: 1 through 65,535 (Optional; only applies to rules in static PCEF profiles for Junos OS Subscriber Aware) Use the specified name of the time-of-day profile to apply to the PCC rule. The referenced profile must already be defined at the [edit unified-edge pcef] hierarchy level. The time-of-day profile specifies the time of day, day of the week, or day of the month to activate or deactivate the PCC rule for subscribers assigned to the PCEF profile. Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef profiles profile-name static-policy-control] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. Support at the [edit services pcef profiles profile-name dynamic-policy-control] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 18.2R1 on MX Series. RELATED DOCUMENTATION Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Dynamic Policies 558 Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Static Policies Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Policies That a RADIUS Server Controls Configuring Static Time-of-Day PCC Rule Activation and Deactivation in a Junos OS Subscriber Aware PCEF Profile Configuring a Policy and Charging Enforcement Function Profile for Subscriber Management Configuring Policy and Charging Control Rules pcc-time-of-day-profiles IN THIS SECTION Syntax | 558 Hierarchy Level | 559 Description | 559 Options | 559 Required Privilege Level | 559 Release Information | 559 Syntax pcc-time-of-day-profiles profile-name { rule-activation-time { <day-of-week | day-of-month month>; <hour:min>; } rule-deactivation-time { <day-of-week | day-of-month month>; <hour:min>; } } 559 Hierarchy Level [edit unified-edge pcef] Description Configure a PCC time-of-day profile to specify the time of day, day of the week, or day of the month to activate and deactivate a PCC rule or rulebase. A PCC time-of-day profile is applied to a PCC rule or PCC rulebase within a static PCEF profile. If a time zone is configured on the router, the time-of-day settings apply to the configured time zone. Options profile-name Name of the PCC time-of-day profile. · Range: 1 through 63 characters. The remaining statements are explained separately. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring Static Time-of-Day PCC Rule Activation and Deactivation in a Junos OS Subscriber Aware PCEF Profile | 103 Understanding Static Time-of-Day PCC Rule Activation and Deactivation | 74 560 pcef IN THIS SECTION Syntax | 560 Hierarchy Level | 562 Description | 562 Required Privilege Level | 562 Release Information | 562 Syntax pcef { flow-descriptions flow-identifier { direction (uplink | downlink | both); local-port-range { low low-value high high-value; } local-ports number; no-send-to-ue; protocol number; remote-address (ipv4-address ipv4-address | ipv6-address ipv6-address); remote-port-range { low low-value high high-value; } remote-ports number; } pcc-action-profiles profile-name { forwarding-class class-name; gate-status (uplink | downlink | uplink-downlink | disable-both); hcm-profile hcm-profile-name; logging-rule lrf-rule-name; maximum-bit-rate uplink mbr-uplink-value downlink mbr-downlink-value; monitoring-key key_string; redirect { url url-name; } 561 steering { keep-existing-steering; path { ipv4-address ipv4-address; ipv6-address ipv6-address; } routing-instance { downlink downlink-vrf-name; uplink uplink-vrf-name; } } } pcc-rulebases rulebase-name { [pcc-rule rule-name precedence number]; } pcc-rules rule-name { from { <application-groups [application-group-name]>; <applications [application-name]>; flows ([flow-identifier ] | any); } then { pcc-action-profile profile-name; } } pcc-time-of-day-profiles profile-name { rule-activation-time { <day-of-week | day-of-month month>; <hour:min>; } rule-deactivation-time { <day-of-week | day-of-month month>; <hour:min>; } } profiles profile-name { aaa-policy-control { aaa-profile aaa-profile-name; pcc-rulebases [rulebase-name]; user-password password; } dynamic-policy-control { pcc-rules { 562 [rule-name number]; } pcc-rulebases { [rulebase-name]; } diameter-profile gx-profile-name; } static-policy-control { pcc-rules { [rule-name precedence number <time-of-day-profile profile-name>]; } pcc-rulebases { [rulebase-name <time-of-day-profile profile-name>]; } } } } Hierarchy Level [edit unified-edge] Description Set up the overall policy and control enforcement function (PCEF) configuration. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 563 RELATED DOCUMENTATION Understanding Junos Subscriber Aware Policy and Charging Enforcement Function (PCEF) | 52 Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment | 56 pcef-profile (Service Set) IN THIS SECTION Syntax | 563 Hierarchy Level | 563 Description | 563 Options | 564 Required Privilege Level | 564 Release Information | 564 Syntax pcef-profile pcef-profile-name; Hierarchy Level [edit services service-set service-set-name] Description Specify the dummy PCEF profile that you configured at the [edit services pcef] hierarchy level. This profile is a placeholder profile with no configuration options, but it must be specified to enable PCEF functionality on the services plane. 564 Options pcef-profile-name Name of the PCEF profile. Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Applying Services to Subscriber-Aware Traffic with a Service Set Identifying the Service Interface That Handles Subscriber Management Application-Aware Policy Control Configuring a Policy and Charging Enforcement Function Profile for Subscriber Management pcef-profile (TDF Domain) IN THIS SECTION Syntax | 565 Hierarchy Level | 565 Description | 565 Options | 565 565 Required Privilege Level | 565 Release Information | 566 Syntax pcef-profile name; Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name] Description Specify the policy and charging enforcement function (PCEF) profile to be applied to subscribers in the TDF domain. This is required for IFL-based subscribers, and optional for IP-based subscribers. If you do not identify a PCEF profile, then the PCEF profile must be assigned under the [edit unified-edge gateways tdf gateway-name domain-selection term] hierarchy level. Options name Name of the PCEF profile. NOTE: The PCEF profile must have been previously configured at the [edit unified-edge pcef] hierarchy level. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. 566 Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Configuring IFL-Based TDF Subscribers and Properties with a TDF Domain | 140 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based and IFL-Based TDF Subscribers Overview | 107 IP-Based Subscriber Setup Overview | 107 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 Understanding PCEF Profiles | 70 pcef-profile (TDF Domain Selection) IN THIS SECTION Syntax | 566 Hierarchy Level | 567 Description | 567 Options | 567 Required Privilege Level | 567 Release Information | 567 Syntax pcef-profile pcef-profile-name; 567 Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name then] Description Specify the policy and charging enforcement function (PCEF) profile to be selected for the IP-based TDF subscriber when the criteria specified in the domain-selection term term-name from statement are matched. This PCEF profile is required if the TDF domain selected for a subscriber does not specify a PCEF profile or you want to allow different members of the same TDF domain to have different PCEF profiles. Options pcef-profilename Name of the PCEF profile. NOTE: The PCEF profile must have been previously configured at the [edit unified-edge pcef] hierarchy level. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 568 peer (Diameter Base Protocol) IN THIS SECTION Syntax | 568 Hierarchy Level | 569 Description | 569 Options | 569 Required Privilege Level | 569 Release Information | 569 Syntax peer peer-name { address ip-address; connect-actively { <capabilities-exchange-timeout seconds>; <port port-number>; <repeat-timeout seconds>; <retry-timeout seconds>; <timeout seconds>; transport transport-name; } <disconnect-peer-timeout seconds>; <incoming-queue> { size size; } <outgoing-queue> { <high-watermark high-watermark>; <low-watermark low-watermark>; size size; } <watchdog-timeout seconds>; } 569 Hierarchy Level [edit access diameter] Description Configure a remote peer for the Diameter instance. You can configure up to 31 peers. Options peer-name--Name of the peer. · Range: 1 through 32 alphanumeric characters The remaining statements are explained separately. See CLI Explorer. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION diameter (Subscriber Aware Policy Control) | 368 peer (Diameter Network Element) IN THIS SECTION Syntax | 570 Hierarchy Level | 570 570 Description | 570 Options | 570 Required Privilege Level | 571 Release Information | 571 Syntax peer peer-name { priority priority-value; <timeout seconds>; } Hierarchy Level [edit access diameter network-element element-name] Description Define and prioritize a peer associated with a Diameter network element. You must prioritize the associated peer by including the priority statement. Options peer-name--Name of the peer. · Range: 1 through 32 alphanumeric characters NOTE: The specified peer must already be configured at the [edit access diameter peer] hierarchy level. The remaining statements are explained separately. See CLI Explorer. 571 Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION diameter (Subscriber Aware Policy Control) | 368 pending-queue-watermark IN THIS SECTION Syntax | 571 Hierarchy Level | 571 Description | 572 Options | 572 Required Privilege Level | 572 Release Information | 572 Syntax pending-queue-watermark watermark; Hierarchy Level [edit access radius network-element name] 572 Description Configure the pending-request queue high watermark for the network element. This is a percentage of the maximum number of requests that can be queued to the network element, which is configured in the maximum-pending-reqs-limit number statement at the [edit access radius network-element name] hierarchy level. When the queue size reaches the high watermark, a flow control on message is generated. Options watermark High watermark for the network element pending request queue. · Range: 1 through 100 percent. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring RADIUS Network Elements | 94 Understanding Network Elements | 71 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 pending-queue-watermark-abate IN THIS SECTION Syntax | 573 Hierarchy Level | 573 573 Description | 573 Options | 573 Required Privilege Level | 573 Release Information | 574 Syntax pending-queue-watermark-abate abate-watermark; Hierarchy Level [edit access radius network-element name] Description Configure the low watermark of the pending-request queue for the network element. This is a percentage of the maximum size of the pending-request queue, which is configured in the maximumpending-reqs-limit watermark statement at the [edit access radius network-element name] hierarchy level. When the number of pending requests drops below this low watermark value after having exceeded the high watermark configured in the pending-queue-watermark watermark statement, a flow control off message is generated. Options abate-watermark Low watermark for the network element pending request queue. · Range: 1 through 100 percent. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. 574 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring RADIUS Network Elements | 94 Understanding Network Elements | 71 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 policy-based-logging (LRF Profile) IN THIS SECTION Syntax | 574 Hierarchy Level | 574 Description | 574 Required Privilege Level | 575 Release Information | 575 Syntax policy-based-logging; Hierarchy Level [edit services lrf profile profile-name] Description Configure policy-based logging, which causes the LRF rules to be activated by PCC rules. 575 Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Release 19.3R1 on MX Series. RELATED DOCUMENTATION Configuring an LRF Profile for Subscribers Configuring Logging and Reporting for Junos OS Subscriber Aware Configuring Logging and Reporting for Subscriber Management pool (TDF Domain) IN THIS SECTION Syntax | 575 Hierarchy Level | 576 Description | 576 Options | 576 Required Privilege Level | 576 Release Information | 576 Syntax pool pool-name; 576 Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name ip-subscriber subscriber-address (inet | inet6)] Description Specify the address pool that contains the source IP addresses for IP-based subscriber packets that undergo TDF processing. You can specify only one address pool. Options pool-name Name of the address pool. NOTE: The address pool must have been previously configured at the [edit access addressassignment] hierarchy level. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Address Pools for Source-IP Filtering of IP-Based Subscribers | 119 Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Understanding Source IP Filtering with Address Pools in TDF Domains for IP-Based Subscribers | 110 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 577 port (LRF Profile) IN THIS SECTION Syntax | 577 Hierarchy Level | 577 Description | 577 Options | 577 Required Privilege Level | 577 Release Information | 578 Syntax port collector-port-number; Hierarchy Level [edit services lrf profile profile-name collector collector-name destination] Description Specify the destination port of the collector. Options collector-port-number Port number for the destination address of the collector. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. 578 Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Release 19.3R1 on MX Series. RELATED DOCUMENTATION Configuring an LRF Profile for Subscribers Configuring Logging and Reporting for Junos OS Subscriber Aware Configuring Logging and Reporting for Subscriber Management port (RADIUS Server) IN THIS SECTION Syntax | 578 Hierarchy Level | 578 Description | 579 Options | 579 Required Privilege Level | 579 Release Information | 579 Syntax port port-number; Hierarchy Level [edit access radius servers name] 579 Description Configure the port number to which the RADIUS requests are sent. Options port-number Port number to which the RADIUS requests are sent. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring RADIUS Servers | 91 Understanding Network Elements | 71 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 port-range (Application Identification) IN THIS SECTION Syntax | 580 Hierarchy Level | 580 Description | 580 Options | 580 Required Privilege Level | 580 Release Information | 580 580 Syntax port-range { tcp [port-range]; udp [port-range]; } Hierarchy Level [edit services application-identification application application-name over protocol-type signature l4-l7-signature-name] Description Define TCP or UDP port number range. Options port-range Numeric port ranges. The format for numeric port ranges is in the format minimum-value maximum-value. Required Privilege Level view-level--To view this statement in the configuration. control-level--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Releases 19.3R2 and 19.4R1 on MX Series MX240, MX480 and MX960 using the MX-SPC3 services card. RELATED DOCUMENTATION Application Identification Overview 581 Configuring Custom Application Signatures prefer-framed-ip-address (RADIUS Clients) IN THIS SECTION Syntax | 581 Hierarchy Level | 581 Description | 581 Required Privilege Level | 581 Release Information | 582 Syntax prefer-framed-ip-address; Hierarchy Level [edit access radius clients client-name] Description Specify that the framed-ip-address is used for subscriber creation when both the framed-route and framed-ip-address attributes are in the RADIUS accounting request from the RADIUS client. The framed-ip-netmask is also used for subscriber creation if it is in the request. By default, the framed-route attribute is used for subscriber creation when both the framed-route and framed-ip-address attributes are in the RADIUS accounting request. Required Privilege Level access--To view this statement in the configuration. 582 access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring RADIUS Clients That Send Accounting Requests for IP-Based Subscribers | 128 prefer-framed-ipv6-prefix (RADIUS Clients) IN THIS SECTION Syntax | 582 Hierarchy Level | 582 Description | 583 Required Privilege Level | 583 Release Information | 583 Syntax prefer-framed-ipv6-prefix; Hierarchy Level [edit access radius clients client-name] 583 Description Specify that the framed-ipv6-prefix is used for subscriber creation when both the delegated-ipv6-prefix and framed-ipv6-prefix attributes are in the RADIUS accounting request from the RADIUS client. By default, the delegated-ipv6-prefix attribute is used for subscriber creation when both the delegatedipv6-prefix and framed-ipv6-prefix attributes are in the RADIUS accounting request. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring RADIUS Clients That Send Accounting Requests for IP-Based Subscribers | 128 priority (Diameter Network Element) IN THIS SECTION Syntax | 584 Hierarchy Level | 584 Description | 584 Options | 584 Required Privilege Level | 584 Release Information | 584 584 Syntax priority priority-value; Hierarchy Level [edit access diameter network-element element-name peer peer-name] Description Set the priority for a peer within a Diameter network element. A peer with a lower number has a higher priority. For load balancing, configure the peers with the same priority. Options priority-value Priority for the peer within the network element. · Range: 1 through 65,535 Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION diameter (Subscriber Aware Policy Control) | 368 585 priority (RADIUS Network Elements) IN THIS SECTION Syntax | 585 Hierarchy Level | 585 Description | 585 Options | 585 Required Privilege Level | 586 Release Information | 586 Syntax priority priority; Hierarchy Level [edit access radius network-element name server name] Description Configure a priority for each RADIUS server in the network element. You can have multiple servers with the same priority in a network element. All access requests are load balanced among the highest priority servers. If all the servers with the highest priority in the network element fail, then requests are load balanced among servers with the next highest priority level. Options priority Relative priority for a RADIUS server. · Range: 1 through 16. 586 Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring RADIUS Network Elements | 94 Understanding Network Elements | 71 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 product-name IN THIS SECTION Syntax | 586 Hierarchy Level | 587 Description | 587 Options | 587 Required Privilege Level | 587 Release Information | 587 Syntax product-name name; 587 Hierarchy Level [edit access diameter] Description Configure the product name that is advertised in the Capabilities-Exchange-Request or CapabilitiesExchange-Answer message. Options name Name of product that is the advertised value of the Product-Name AVP. · Default: Juniper Diameter Client Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION diameter (Subscriber Aware Policy Control) | 368 profile IN THIS SECTION Syntax | 588 Hierarchy Level | 588 588 Description | 588 Options | 588 Required Privilege Level | 588 Release Information | 588 Syntax profile profile-name { rule-set rule-set-name; } Hierarchy Level [edit services application-identification] Description Define members of the application profile, which consists of one or more rule sets. Options profile-name--Identifier for the application profile. The remaining statement is explained separately. See CLI Explorer. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 9.5. 589 Support added in Junos OS release 19.3R2 and 19.4R1 for Next Gen Services on MX240, MX480, and MX960. RELATED DOCUMENTATION Configuring Application Profiles profile (HTTP Header Enrichment) IN THIS SECTION Syntax | 589 Hierarchy Level | 589 Description | 590 Options | 590 Required Privilege Level | 590 Release Information | 590 Syntax profile profile-name { tag rule rule-name; } Hierarchy Level [edit services hcm] 590 Description Configure an HCM profile, which points to one or more tag rules that Junos OS uses to enrich HTTP headers with the appropriate tags. You can configure a maximum of 100 HCM profiles. For subscriber traffic under static policy control, a tag rule is used if it is included in the HCM profile specified in a PCC rule that the traffic matches. For subscribers under dynamic policy control, a message from the PCRF identifies the configured HCM profile and tag rules to use for HTTP header enrichment. Options profile-name Name of the HCM profile. The remaining statement is explained separately. See CLI Explorer. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 Configuring HCM Profiles and Assigning Tag Rules | 49 profile (LRF) IN THIS SECTION Syntax | 591 Hierarchy Level | 592 591 Description | 592 Options | 592 Required Privilege Level | 592 Release Information | 592 Syntax profile profile-name { collector collector-name { destination { address collector-address; port collector-port-number; } source-address source-address; } http-log-multiple-transactions; policy-based-logging; rule lrf-rule-name { then { report { collector collector-name; template template-name; time-limit time-interval; volume-limit volume; } } } template template-name { format ipfix; template-tx-interval tx-time; template-type template-type; trigger-type (session-close | time | volume); } vendor-support ibm; } 592 Hierarchy Level [edit services lrf] Description Configure an LRF profile to specify a set of logging and reporting parameters, which includes data templates, collectors, and LRF rules. For Junos OS Subscriber Aware, you can then assign an LRF profile to a subscriber by assigning the profile to the TDF service set associated with the subscriber's TDF domain. For Junos OS Broadband Subscriber Management, you can then assign the LRF profile to the service set that is configured for application-aware policy control. Options profile-name Name of the LRF profile. · Range: Up to 63 characters. The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. vendor-support option introduced in Junos OS Release 17.2. Support for Next Gen Services introduced in Junos OS Release 19.3R1 on MX Series. RELATED DOCUMENTATION Configuring an LRF Profile for Subscribers 593 Configuring Logging and Reporting for Junos OS Subscriber Aware Configuring Logging and Reporting for Subscriber Management Logging and Reporting Function for Subscribers profile (Services Application Identification) IN THIS SECTION Syntax | 593 Hierarchy Level | 593 Description | 593 Options | 593 Required Privilege Level | 594 Release Information | 594 Syntax profile app-id-profile-name; Hierarchy Level [edit services application-identification] Description Configure an application identification profile. This profile is a placeholder profile with no configuration options, but it must be created to enable application identification functionality on the services plane. Options app-id-profile-name Name of the application identification profile. 594 Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Applying Services to Subscriber-Aware Traffic with a Service Set | 146 profile (Services PCEF) IN THIS SECTION Syntax | 594 Hierarchy Level | 594 Description | 595 Options | 595 Required Privilege Level | 595 Release Information | 595 Syntax profile pcef-profile-name; Hierarchy Level [edit services pcef] 595 Description Configure a policy and charging enforcement function (PCEF) profile that is a placeholder profile with no configuration options. This profile must be created to enable PCEF functionality on the services plane. You apply this placeholder profile to the subscriber-aware service set. Options pcef-profile-name Name of the PCEF profile. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Applying Services to Subscriber-Aware Traffic with a Service Set Identifying the Service Interface That Handles Subscriber Management Application-Aware Policy Control profiles (AAA) IN THIS SECTION Syntax | 596 Hierarchy Level | 596 Description | 596 Options | 597 Required Privilege Level | 597 596 Release Information | 597 Syntax profiles aaa-profile-name { radius { accounting { network-element network-element-name; } authentication { network-element network-element-name; } policy { activation-attribute { <code numeric-code;> <vendor-id vendor-id;> } deactivation-attribute { <code numeric-code;> <vendor-id vendor-id;> } coa-accounting (enable | disable); } } } Hierarchy Level [edit unified-edge aaa] Description Configure a profile of the policy control attributes for RADIUS servers. This profile is used by the policy and charging enforcement function (PCEF) profile. 597 Options aaa-profile-name Name of the AAA profile. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring an AAA Profile | 96 Understanding AAA Profiles | 73 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 profiles (PCEF) IN THIS SECTION Syntax | 598 Hierarchy Level | 598 Description | 598 Options | 599 Required Privilege Level | 599 Release Information | 599 598 Syntax profiles profile-name { aaa-policy-control { aaa-profile aaa-profile-name; pcc-rulebases [rulebase-name <time-of-day-profile profile-name>]; user-password password; } dynamic-policy-control { pcc-rules { [rule-name precedence number <time-of-day-profile profile-name>]; } pcc-rulebases { [rulebase-name <time-of-day-profile profile-name>]; } diameter-profile gx-profile-name; } static-policy-control { pcc-rules { [rule-name precedence number <time-of-day-profile profile-name>]; } pcc-rulebases { [rulebase-name <time-of-day-profile profile-name>]; } } Hierarchy Level [edit unified-edge pcef], [edit services pcef] Description Set up the overall policy and charging enforcement function (PCEF) configuration that can be applied to subscribers. 599 NOTE: You can configure only one of the following statements in a PCEF profile: aaa-policycontrol, static-policy-control, or dynamic-policy-control. You can configure a maximum of 32 policy and charging control (PCC) rules in a PCEF profile. There is no limit to the number of PCC rulebases you can configure in a PCEF profile. If you are using Junos OS Subscriber Aware, configure the PCEF profile at the [edit unified-edge pcef] hierarchy level. You then assign this profile to the subscriber's TDF domain or to the domain selection configuration. If you are using Junos OS Broadband Subscriber Management, configure the PCEF profile at the [edit services pcef] hierarchy level. The static-policy-control option is applicable to PCC rule activation through a dynamic profile, and you assign the PCEF profile to the dynamic profile. Starting in Junos OS Release 18.2R1, the dynamic-policy-control option is also available and is applicable to direct rule activation by a policy and charging rules function (PCRF) server; you assign the PCEF profile to the access profile. The aaa-policy-control option is not applicable to subscriber management. Options profile-name Name of the PCEF profile. · Range: 1 through 63 characters. The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details. Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 600 Support at the [edit services pcef] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. RELATED DOCUMENTATION Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Dynamic Policies Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Static Policies Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Policies That a RADIUS Server Controls Configuring a Policy and Charging Enforcement Function Profile for Subscriber Management protocol (Application Identification) IN THIS SECTION Syntax | 600 Hierarchy Level | 601 Description | 601 Options | 601 Required Privilege Level | 601 Release Information | 601 Syntax protocol (http | ssl | tcp | udp); 601 Hierarchy Level [edit services application-identification application application-name over protocol-type signature l4-l7-signature-name] Description Identify the protocol bundles to be monitored to classify applications. This statement is not available if the MX Series router is running Next Gen Services. Options http Use the HTTP protocol . ssl Use the SSL protocol. tcp Use the TCP protocol. udp Use the UDP protocol. Required Privilege Level system--To view this statement in the configuration. system-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures 602 protocol (Flow Descriptions) IN THIS SECTION Syntax | 602 Hierarchy Level | 602 Description | 602 Default | 603 Options | 603 Required Privilege Level | 603 Release Information | 603 Syntax protocol number; Hierarchy Level [edit unified-edge pcef flow-description flow-identifier], [edit services pcef flow-description flow-identifier] Description Specify a protocol type to identify the subscriber traffic that you want the service data flow (SDF) filter to detect. If you specify the protocol statement, you must specify a protocol number. If you are using Junos OS Subscriber Aware, specify the protocol type at the [edit unified-edge pcef flow-description flow-identifier] hierarchy level. If you are using Junos OS Broadband Subscriber Management, specify the protocol type at the [edit services pcef flow-description flow-identifier] hierarchy level. 603 Default If you do not specify the protocol statement, the default is any protocol. Options number Number that specifies the IP protocol type. · Range: 1 through 255 Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef flow-description flow-identifier] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. RELATED DOCUMENTATION Configuring Service Data Flow Filters Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment Understanding Application-Aware Policy Control for Subscriber Management 604 realm (Diameter Origin) IN THIS SECTION Syntax | 604 Hierarchy Level | 604 Description | 604 Options | 604 Required Privilege Level | 604 Release Information | 605 Syntax realm realm-name; Hierarchy Level [edit access diameter origin] Description Specify the realm of the host that originates the Diameter message. Options realm-name Name of the message origin realm. Supplied as the value of Origin-Realm AVP for all messages sent by the Diameter instance. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. 605 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION diameter (Subscriber Aware Policy Control) | 368 redirect (PCC Action Profiles) IN THIS SECTION Syntax | 605 Hierarchy Level | 605 Description | 606 Required Privilege Level | 606 Release Information | 606 Syntax redirect { url url-name; } Hierarchy Level [edit unified-edge pcef pcc-action-profiles profile-name], [edit services pcef pcc-action-profiles profile-name] 606 Description Specify HTTP redirection to a URL. If you configure this, the PCC action profile can only be used in PCC rules that match only HTTP-based applications and all flows. If you are using Junos OS Subscriber Aware, specify the redirection at the [edit unified-edge pcef pccaction-profiles profile-name] hierarchy level. If you are using Junos OS Broadband Subscriber Management, specify the redirection at the [edit services pcef pcc-action-profiles profile-name] hierarchy level. The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details. Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef pcc-action-profiles profile-name] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. Support for Next Gen Services for Junos OS Broadband Subscriber Management introduced in Junos OS Release 19.3R2 on MX Series. RELATED DOCUMENTATION Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware Configuring Policy and Charging Control Action Profiles for Subscriber Management 607 regex (Class Attribute) IN THIS SECTION Syntax | 607 Hierarchy Level | 607 Description | 607 Options | 607 Required Privilege Level | 608 Release Information | 608 Syntax regex "value"; Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name subscription-id use-class] Description Configure a regular expression to parse the Class attribute contents of the accounting request from the BNG, PGW, or GGSN. Options value Regular expression that parses the contents of the Class attribute. 608 For example, the following configuration generates " 000118191129ALICE:DRAV3:" out of " 000118191129#000118191129#ALICE:DRAV3:#7168#nflat#ADSL##": [edit unified-edge gateways tdf TDF1 domains domain1 subscription-id ] user@host# set use-class regex "[^#]*#\([^#]*\)\#\([^#]*\)" Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 remote-address IN THIS SECTION Syntax | 609 Hierarchy Level | 609 Description | 609 Options | 609 Required Privilege Level | 609 Release Information | 610 609 Syntax remote-address (ipv4-address ipv4-address | ipv6-address ipv6-address); Hierarchy Level [edit unified-edge pcef flow-descriptions flow-identifier], [edit services pcef flow-descriptions flow-identifier] Description Specify a remote IP address for the service data flow (SDF) filter. If you are using Junos OS Subscriber Aware, specify the remote IP address at the [edit unified-edge pcef flow-descriptions flow-identifier] hierarchy level. If you are using Junos OS Broadband Subscriber Management, specify the remote IP address at the [edit services pcef flow-descriptions flow-identifier] hierarchy level. Options ipv4-address ipv6-address IPv4 address. IPv6 address. Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. 610 Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef flow-descriptions flow-identifier] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. RELATED DOCUMENTATION Configuring Service Data Flow Filters Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment Understanding Application-Aware Policy Control for Subscriber Management remote-port-range IN THIS SECTION Syntax | 610 Hierarchy Level | 611 Description | 611 Default | 611 Options | 611 Required Privilege Level | 611 Release Information | 612 Syntax remote-port-range { low low-value; high high-value; } 611 Hierarchy Level [edit unified-edge pcef flow-descriptions flow-identifier], [edit services pcef flow-descriptions flow-identifier] Description Specify the remote port range to identify the subscriber traffic that you want the service data flow (SDF) filter to detect. If you are using Junos OS Subscriber Aware, specify the remote port range at the [edit unified-edge pcef flow-descriptions flow-identifier] hierarchy level. If you are using Junos OS Broadband Subscriber Management, specify the remote port range at the [edit services pcef flow-descriptions flow-identifier] hierarchy level. NOTE: You can specify either a remote port range or a list of remote ports, but not both. Default If you configure neither the remote-port-range nor the remote-ports statement, the default is any remote port. Options high-value low-value Upper boundary for the remote port range. · Range: 1 through 65,535 Lower boundary for the remote port range. · Range: 1 through 65,535 Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. 612 For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef flow-descriptions flow-identifier] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. RELATED DOCUMENTATION Configuring Service Data Flow Filters Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment Understanding Application-Aware Policy Control for Subscriber Management remote-ports IN THIS SECTION Syntax | 613 Hierarchy Level | 613 Description | 613 Default | 613 Options | 613 Required Privilege Level | 613 Release Information | 614 613 Syntax remote-ports [number]; Hierarchy Level [edit unified-edge pcef flow-description flow-identifier], [edit services pcef flow-description flow-identifier] Description Specify a remote port or list of remote ports to identify the subscriber traffic that you want the service data flow (SDF) filter to detect. If you are using Junos OS Subscriber Aware, specify the remote ports at the [edit unified-edge pcef flow-descriptions flow-identifier] hierarchy level. If you are using Junos OS Broadband Subscriber Management, specify the remote ports at the [edit services pcef flow-descriptions flow-identifier] hierarchy level. NOTE: You can specify either a list of remote ports or a remote port range, but not both. Default If you configure neither the remote-ports nor the remote-port-range statement, the default is any remote port. Options number Port number or list of port numbers. You can specify a maximum of three port numbers in a list. · Range: 1 through 65,535 Required Privilege Level For Junos OS Subscriber Aware: 614 unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef flow-descriptions flow-identifier] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. RELATED DOCUMENTATION Configuring Service Data Flow Filters Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment Understanding Application-Aware Policy Control for Subscriber Management report (LRF Rule) IN THIS SECTION Syntax | 615 Hierarchy Level | 615 Description | 615 Required Privilege Level | 615 Release Information | 615 615 Syntax report { collector collector-name; template template-name; time-limit time-interval; volume-limit volume; } Hierarchy Level [edit services lrf profile profile-name rule lrf-rule-name then] Description Configure the actions to take if the LRF rule is matched. The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Release 19.3R1 on MX Series. RELATED DOCUMENTATION Configuring an LRF Profile for Subscribers Configuring Logging and Reporting for Junos OS Subscriber Aware Configuring Logging and Reporting for Subscriber Management 616 request-cache-timeout (RADIUS Snoop Segment) IN THIS SECTION Syntax | 616 Hierarchy Level | 616 Description | 616 Options | 616 Required Privilege Level | 616 Release Information | 617 Syntax request-cache-timeout timeout; Hierarchy Level [edit access radius snoop-segments segment-name] Description Configure the length of time to cache the accounting request that was snooped. If the same request is received by the MX Series router within this time, the duplicate request is dropped. Options timeout Length of time, in seconds. · Range: 1 through 30 Required Privilege Level access--To view this statement in the configuration. 617 access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring Snooping of RADIUS Accounting Requests for IP-Based Subscribers | 136 Snooping RADIUS Accounting Requests for IP-Based Subscribers Overview | 114 IP-Based Subscriber Setup Overview | 107 request-timeout IN THIS SECTION Syntax | 617 Hierarchy Level | 617 Description | 618 Options | 618 Required Privilege Level | 618 Release Information | 618 Syntax request-timeout seconds; Hierarchy Level [edit unified-edge diameter-profiles gx-profile profile-name] 618 Description Configure the time to wait for a response from the server. Options seconds Length of timeout interval. · Range: 0 through 65,535 seconds. NOTE: 0 seconds indicates that the request timeout is not be enabled. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION gx-profile | 429 response-cache-timeout (RADIUS Client) IN THIS SECTION Syntax | 619 Hierarchy Level | 619 Description | 619 Options | 619 619 Required Privilege Level | 619 Release Information | 619 Syntax response-cache-timeout seconds; Hierarchy Level [edit access radius clients client-name accounting] Description Configure the timeout for the RADIUS response cache. This timeout indicates how long to store the RADIUS response messages (sent for request messages) in the MX Series router response cache. Options seconds Length of timeout interval. · Range: 5 through 20 seconds · Default: 15 seconds Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 620 RELATED DOCUMENTATION Configuring RADIUS Clients That Send Accounting Requests for IP-Based Subscribers | 128 retry (RADIUS Server) IN THIS SECTION Syntax | 620 Hierarchy Level | 620 Description | 620 Options | 621 Required Privilege Level | 621 Release Information | 621 Syntax retry attempts; Hierarchy Level [edit access radius servers name] Description Configure a limit to the number of times the MX Series router can resend a request to the RADIUS server when no response from the RADIUS server is received. If the number of retries reaches this limit, the RADIUS server is marked as dead, and the MX Series router begins to send requests to other RADIUS servers in the network element. 621 Options attempts Number of attempts allowed. · Range: 1 through 10 · Default: 3 Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring RADIUS Servers | 91 Understanding Network Elements | 71 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 revert-interval (RADIUS Server) IN THIS SECTION Syntax | 622 Hierarchy Level | 622 Description | 622 Options | 622 Required Privilege Level | 622 Release Information | 622 622 Syntax revert-interval seconds; Hierarchy Level [edit access radius servers name] Description Configure the amount of time that must pass after a RADIUS server is first marked dead until it is marked as alive by Junos OS. When Junos OS marks the RADIUS server as alive, it can again send requests to the RADIUS server. Options seconds Number of seconds after which a dead server is marked active. · Range: 0 through 4,294,967,295 · Default: 300 seconds Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring RADIUS Servers | 91 Understanding Network Elements | 71 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 623 routing-instance (PCC Action Profiles) IN THIS SECTION Syntax | 623 Hierarchy Level | 623 Description | 623 Options | 623 Required Privilege Level | 624 Release Information | 624 Syntax routing-instance { downlink downlink-vrf-name; uplink uplink-vrf-name; } Hierarchy Level [edit unified-edge pcef pcc-action-profiles profile-name steering], [edit services pcef pcc-action-profiles profile-name steering] Description Specify the routing instance that a PCC action profile uses for steering traffic. Options downlink downlinkvrf-name Use the specified name of the routing instance for downlink traffic (to the access side) or the predefined dynamic interface variable . 624 uplink uplink-vrf-name Use the specified name of the routing instance for uplink traffic (from the access side). NOTE: The routing instances must have been previously configured. Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. Support at the [edit services pcef pcc-action-profiles profile-name steering] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. Support for Next Gen Services for Junos OS Broadband Subscriber Management introduced in Junos OS Release 19.3R2 on MX Series. RELATED DOCUMENTATION Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment Configuring Policy and Charging Control Action Profiles for Subscriber Management Understanding Application-Aware Policy Control for Subscriber Management 625 rule (HTTP Header Enrichment for Tag Rule Set) IN THIS SECTION Syntax | 625 Hierarchy Level | 625 Description | 625 Options | 625 Required Privilege Level | 626 Release Information | 626 Syntax rule rule-name; Hierarchy Level [edit services hcm tag-rule-set] Description Specify the tag rule that you want to be a part of the tag rule set. NOTE: The tag rule must already be defined at the [edit services hcm] hierarchy level. Options rule-name Name of the tag rule. To specify multiple tag rules, include the rule statement multiple times. 626 Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 hcm (HTTP Header Enrichment) | 434 rule (LRF) IN THIS SECTION Syntax | 626 Hierarchy Level | 627 Description | 627 Options | 627 Required Privilege Level | 627 Release Information | 627 Syntax rule lrf-rule-name { then { report { collector collector-name; template template-name; time-limit time-interval; 627 volume-limit volume; } } } Hierarchy Level [edit services lrf profile profile-name] Description Configure an LRF rule, which controls how data sessions are logged and reported. In this release, the matching conditions for an LRF rule are identified in a static PCC rule, not in the LRF rule. Options lrf-rule-name Name of the LRF rule. · Range: Up to 63 characters. The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Release 19.3R1 on MX Series. RELATED DOCUMENTATION Configuring an LRF Profile for Subscribers Configuring Logging and Reporting for Junos OS Subscriber Aware 628 Configuring Logging and Reporting for Subscriber Management rule-activation-time IN THIS SECTION Syntax | 628 Hierarchy Level | 628 Description | 628 Options | 629 Required Privilege Level | 629 Release Information | 629 Syntax rule-activation-time { <day-of-week | day-of-month month>; <hour:min>; } Hierarchy Level [edit unified-edge pcef pcc-time-of-day-profiles profile-name] Description Specify the time of day, day of the week or day of the month, or month of the year to activate a PCC rule or rulebase. You can specify the time of day, the day, or both. If you specify the day of the month, you can also specify the month of the year, which results in the yearly activation of the rule or rulebase. Use the same combination of options in the rule-deactivation-time statement. If a time zone is configured on the router, the time-of-day settings apply to the configured time zone. 629 If a day is not specified and the activation time of day setting is later than the deactivation time of day setting, then a rule is deactivated the day after it is activated. Options day-of-week (Optional) Day of the week on which to activate a PCC rule or rulebase. day-ofmonth (Optional) Day of the month on which to activate a PCC rule or rulebase. · Syntax: DAYn, where n can be from 1 through 31, or Last-day-of-month, which depends on the current month. month (Optional) Month of the year in which to activate a PCC rule or rulebase. hour (Optional) Hour at which to activate a PCC rule or rulebase as a two-digit number from 00 through 23. min (Optional) Minute at which to activate a PCC rule or rulebase as a two-digit number from 00 through 59. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring Static Time-of-Day PCC Rule Activation and Deactivation in a Junos OS Subscriber Aware PCEF Profile | 103 Understanding Static Time-of-Day PCC Rule Activation and Deactivation | 74 630 rule-deactivation-time IN THIS SECTION Syntax | 630 Hierarchy Level | 630 Description | 630 Options | 631 Required Privilege Level | 631 Release Information | 631 Syntax rule-deactivation-time { <day-of-week | day-of-month month>; <hour:min>; } Hierarchy Level [edit unified-edge pcef pcc-time-of-day-profiles profile-name] Description Specify the time of day, day of the week or day of the month, or month of the year to deactivate a PCC rule or rulebase. You can specify the time of day, the day, or both. If you specify the day of the month, you can also specify the month of the year, which results in the yearly deactivation of the rule or rulebase. Use the same combination of options as in the rule-activation-time statement. If a time zone is configured on the router, the time-of-day settings apply to the configured time zone. If a day is not specified and the deactivation time of day setting is earlier than the activation time of day setting, then a rule is deactivated the day after it is activated. 631 Options day-of-week (Optional) Day of the week on which to deactivate a PCC rule or rulebase. day-ofmonth (Optional) Day of the month on which to deactivate a PCC rule or rulebase. · Syntax: DAYn, where n can be from 1 through 31, or Last-day-of-month, which depends on the current month. month (Optional) Month of the year in which to deactivate a PCC rule or rulebase. hour (Optional) Hour at which to deactivate a PCC rule or rulebase as a two-digit number from 00 through 23. min (Optional) Minute at which to deactivate a PCC rule or rulebase as a two-digit number from 00 through 59. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring Static Time-of-Day PCC Rule Activation and Deactivation in a Junos OS Subscriber Aware PCEF Profile | 103 Understanding Static Time-of-Day PCC Rule Activation and Deactivation | 74 632 secret (RADIUS Client) IN THIS SECTION Syntax | 632 Hierarchy Level | 632 Description | 632 Options | 632 Required Privilege Level | 632 Release Information | 633 Syntax secret password; Hierarchy Level [edit access radius clients client-name accounting] Description Specify a shared secret to be used by the MX Series router and the RADIUS client for accounting. Options password Shared secret to use ; it can include spaces if the character string is enclosed in quotation marks. Maximum length is 256 characters. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. 633 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring RADIUS Clients That Send Accounting Requests for IP-Based Subscribers | 128 secret (RADIUS Server) IN THIS SECTION Syntax | 633 Hierarchy Level | 633 Description | 633 Options | 634 Required Privilege Level | 634 Release Information | 634 Syntax secret password; Hierarchy Level [edit access radius servers name] Description Configure a shared secret to be used by the MX Series router and the RADIUS server. 634 Options password Shared secret to use. · Range: 1 through 64 characters Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring RADIUS Servers | 91 Understanding Network Elements | 71 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 server (RADIUS Network Elements) IN THIS SECTION Syntax | 635 Hierarchy Level | 635 Description | 635 Options | 635 Required Privilege Level | 635 Release Information | 635 635 Syntax server name { priority priority; } Hierarchy Level [edit access radius network-element name] Description Configure a RADIUS server for the network element, which is a load-balanced group of RADIUS servers providing policy management for TDF subscribers. The RADIUS server must already be defined at the [edit access radius] hierarchy level. You can configure multiple RADIUS servers under a network element. Options name Name of the RADIUS server. The remaining statement is described separately. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring RADIUS Network Elements | 94 Understanding Network Elements | 71 636 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 Configuring RADIUS Servers | 91 servers (RADIUS) IN THIS SECTION Syntax | 636 Hierarchy Level | 637 Description | 637 Options | 637 Required Privilege Level | 637 Release Information | 637 Syntax servers name { accounting-port port-number; accounting-secret password; address server-address; allow-dynamic-requests; dead-criteria-retries retry-number interval seconds; dynamic-requests-secret password; port port-number; retry attempts; revert-interval seconds; secret password; source-interface interface [ipv4-address address]; timeout seconds; } 637 Hierarchy Level [edit access radius] Description Configure a RADIUS server that provides policy management for TDF subscribers. Options name Name of the RADIUS server. · Range: 1 through 32 characters The remaining statements are explained separately. See CLI Explorer. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring RADIUS Servers | 91 Understanding Network Elements | 71 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 638 service-mode IN THIS SECTION Syntax | 638 Hierarchy Level | 638 Description | 638 Options | 639 Required Privilege Level | 639 Release Information | 639 Syntax service-mode service-mode-options; Hierarchy Level [edit routing-instance vrf-name access address-assignment address-pools juniperpool], [edit unified-edge gateways tdf gateway-name], [edit unified-edge gateways tdf gateway-name domains domain-name], [edit unified-edge tdf gateway-name system interface interface-name], [unified-edge gateways tdf gateway-name system session-pics interface interfacename] Description Set maintenance mode for a network element so that you can carry out maintenance tasks such as deleting or modifying the element, for example, an address pool. When in the maintenance mode active phase, you can modify all the valid attributes on the network element. In other cases, you can modify only the non-maintenance mode attributes. The following network elements must be in maintenance mode before you can modify or delete them: 639 · Address pools · AMS interfaces · PCEF profiles · Session PICs · Service PICs · Static time-of-day settings · TDF domains · TDF interfaces · TDF gateways Options service-mode-options Type of the service mode. Currently, only maintenance mode is supported. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Maintenance Mode Overview for Subscriber Aware Policy Enforcement | 200 640 service-pics IN THIS SECTION Syntax | 640 Hierarchy Level | 640 Description | 640 Required Privilege Level | 640 Release Information | 641 Syntax service-pics { [interface interface-name]; } Hierarchy Level [edit unified-edge gateways tdf gateway-name system] Description Specify the service interfaces that represent the service PICs used for anchoring subscriber-aware services in the TDF Gateway. The remaining statement is explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. 641 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring Service PICs | 18 TDF Gateway Service PICs and Session PICs for Subscriber-Aware Traffic Treatment | 9 service-set (Subscriber-Aware) IN THIS SECTION Syntax | 641 Hierarchy Level | 642 Description | 642 Options | 642 Required Privilege Level | 642 Release Information | 642 Syntax service-set service-set-name { service-set-options { subscriber-awareness; } lrf-profile profile-name; pcef-profile pcef-profile-name; application-identification-profile app-id-profile-name; hcm profilehcm-profile--name; nat-rules rule-name; nat-rule-sets rule-set-name; disable-replication-capability; } 642 interface-service { service-interface interface-name; } } Hierarchy Level [edit services] Description Configure subscriber-aware services by creating a subscriber-aware service set to be applied to a TDF interface. Options service-set-name Name of the service set. The remaining statements are explained separately. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Applying Services to Subscriber-Aware Traffic with a Service Set | 146 Configuring Logging and Reporting for Junos OS Subscriber Aware | 186 643 service-set (TDF Interface) IN THIS SECTION Syntax | 643 Hierarchy Level | 643 Description | 643 Options | 643 Required Privilege Level | 644 Release Information | 644 Syntax service-set service-set-name; Hierarchy Level [edit interfaces mif unit number family inet service input], [edit interfaces mif unit number family inet service output] Description Apply the service set to the service input and output of the TDF interface (mif) that is part of a TDF domain. The output service set for the mif is not used by the MX Series router, but it must be configured so that the configuration commit does not fail. Options service-set-name Name of the service set that is being applied to the TDF interface. 644 Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Applying Services to Subscriber-Aware Traffic with a Service Set | 146 session-pics IN THIS SECTION Syntax | 644 Hierarchy Level | 645 Description | 645 Required Privilege Level | 645 Release Information | 645 Syntax session-pics { [interface interface-name]; } 645 Hierarchy Level [edit unified-edge gateways tdf gateway-name system] Description Specify the service interfaces that represent the session PICs used for the control plane in the TDF gateway. The remaining statement is explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring Session PICs | 19 TDF Gateway Service PICs and Session PICs for Subscriber-Aware Traffic Treatment | 9 session-pics (Diameter) IN THIS SECTION Syntax | 646 Hierarchy Level | 646 Description | 646 Options | 646 646 Required Privilege Level | 647 Release Information | 647 Syntax session-pics { group { group-name { [session-pic interface-name]; } } } Hierarchy Level [edit unified-edge tdf gateway-name diameter network-element element-name] Description Configure the session PICs that are serving this Diameter network element for Diameter bindings on this TDF gateway. NOTE: If you want to set up Diameter bindings for session PICs on the TDF gateway, contact Juniper Networks Professional Services for assistance. Options group-name Name of the session PIC group that is serving the Diameter network element. interfacename Name of interface representing session PIC. 647 · Syntax: The interface must be a valid multiservices interface (ams or ms-a/b/0, where a is the Flexible PIC Concentrator [FPC] slot number and b is the PIC slot number); for example, ams0, ams1, or ms-1/0/0. NOTE: The specified interface for the session PIC must already be configured for this TDF gateway. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION diameter (TDF Gateway) | 370 shared-secret (RADIUS Snoop Segment) IN THIS SECTION Syntax | 648 Hierarchy Level | 648 Description | 648 Options | 648 Required Privilege Level | 648 Release Information | 648 648 Syntax shared-secret secret; Hierarchy Level [edit access radius snoop-segments segment-name] Description Configure a shared secret to be used by the MX Series router and the RADIUS client. If the shared secrets do not match, the subscriber session is not set up. Options secret Shared secret. The maximum length is 64 characters. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring Snooping of RADIUS Accounting Requests for IP-Based Subscribers | 136 Snooping RADIUS Accounting Requests for IP-Based Subscribers Overview | 114 IP-Based Subscriber Setup Overview | 107 649 snoop-segment (TDF Domain Selection) IN THIS SECTION Syntax | 649 Hierarchy Level | 649 Description | 649 Options | 649 Required Privilege Level | 650 Release Information | 650 Syntax snoop-segment snoop-segment-name; Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from] Description Specify the snoop segment that matches the RADIUS request. After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. Options snoop-segment-name Name of the snoop segment. 650 Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 Configuring Snooping of RADIUS Accounting Requests for IP-Based Subscribers | 136 snoop-segments (RADIUS) IN THIS SECTION Syntax | 651 Hierarchy Level | 651 Description | 651 Options | 651 Required Privilege Level | 651 Release Information | 651 651 Syntax snoop-segments snoop-segment-name { destination-ip-address destination-address; <destination-port destination-port;> <request-cache-timeout timeout;> shared-secret secret; source-interface source-interface; <source-ip-address source-address;> } Hierarchy Level [edit access radius] Description Specify which accounting messages to snoop. You must specify at least the destination IP address for the accounting messages, the shared secret, and the source interface. Options snoop-segment-name Name for the snoop segment. The maximum length is 32 characters. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 652 RELATED DOCUMENTATION Configuring Snooping of RADIUS Accounting Requests for IP-Based Subscribers | 136 Snooping RADIUS Accounting Requests for IP-Based Subscribers Overview | 114 IP-Based Subscriber Setup Overview | 107 snoop-segments (TDF Gateway) IN THIS SECTION Syntax | 652 Hierarchy Level | 652 Description | 652 Options | 653 Required Privilege Level | 653 Release Information | 653 Syntax snoop-segments [snoop-segment-name]; Hierarchy Level [edit unified-edge gateways tdf gateway-name aaa] Description Specify one or more snoop segments that control RADIUS accounting request snooping for the TDF gateway. The snoop segments must already be configured at the [edit access radius] hierarchy level. 653 Options snoop-segment-name Name of a snoop segment. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring Snooping of RADIUS Accounting Requests for IP-Based Subscribers | 136 Snooping RADIUS Accounting Requests for IP-Based Subscribers Overview | 114 IP-Based Subscriber Setup Overview | 107 source (Application Identification) IN THIS SECTION Syntax | 654 Hierarchy Level | 654 Description | 654 Options | 654 Required Privilege Level | 654 Release Information | 654 654 Syntax source ip ip-address-prefix; Hierarchy Level [edit services application-identification application application-name addressmapping] Description Specify the source IP address for address mapping-based application identification. Options ip-address-prefix IP address and prefix for matching. Required Privilege Level view-level--To view this statement in the configuration. control-level--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures Application Identification Overview 655 source-address (LRF Profile) IN THIS SECTION Syntax | 655 Hierarchy Level | 655 Description | 655 Options | 655 Required Privilege Level | 655 Release Information | 656 Syntax source-address source-address; Hierarchy Level [edit services lrf profile profile-name collector collector-name] Description Configure the source address to be used when exporting data to the collector. Options source-address IP address to be used as the source address. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. 656 Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Release 19.3R1 on MX Series. RELATED DOCUMENTATION Configuring an LRF Profile for Subscribers Configuring Logging and Reporting for Junos OS Subscriber Aware Configuring Logging and Reporting for Subscriber Management source-interface IN THIS SECTION Syntax | 656 Hierarchy Level | 656 Description | 657 Options | 657 Required Privilege Level | 657 Release Information | 657 Syntax source-interface interface ipv4-address address; Hierarchy Level [edit access radius clients client-name] 657 Description Configure the MX Series router interface and IPv4 address that receive RADIUS requests from the GGSN, PGW, or BNG RADIUS client. Options interface address Name of the interface. IPv4 address on the MX Series router. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring RADIUS Clients That Send Accounting Requests for IP-Based Subscribers | 128 source-interface (RADIUS Server) IN THIS SECTION Syntax | 658 Hierarchy Level | 658 Description | 658 Options | 658 Required Privilege Level | 658 Release Information | 658 658 Syntax source-interface interface [ipv4-address address]; Hierarchy Level [edit access radius servers name] Description Specify the source interface and one or more IPv4 addresses on the MX Series router that receive RADIUS requests from which the RADIUS requests are sent to the RADIUS server. Options interface Source interface that sends the RADIUS requests. address Source IPv4 address that sends the RADIUS requests. You can specify multiple source IPv4 addresses. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring RADIUS Servers | 91 Understanding Network Elements | 71 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 659 source-interface (RADIUS Snoop Segment) IN THIS SECTION Syntax | 659 Hierarchy Level | 659 Description | 659 Options | 659 Required Privilege Level | 659 Release Information | 660 Syntax source-interface source-interface; Hierarchy Level [edit access radius snoop-segments segment-name] Description Specify the interface of the MX Series router that receives accounting packets from the access network to be snooped. Options source-interface Name of the interface. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. 660 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring Snooping of RADIUS Accounting Requests for IP-Based Subscribers | 136 Snooping RADIUS Accounting Requests for IP-Based Subscribers Overview | 114 IP-Based Subscriber Setup Overview | 107 source-ip-address (RADIUS Snoop Segment) IN THIS SECTION Syntax | 660 Hierarchy Level | 660 Description | 661 Options | 661 Required Privilege Level | 661 Release Information | 661 Syntax source-ip-address source-address; Hierarchy Level [edit access radius snoop-segments segment-name] 661 Description Specify the source IP address of accounting requests from a GGSN, PGW, or BNG to snoop. If you do not enter a source IP address, accounting requests from any IP address can be snooped. Options source-address Source IPv4 address. Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring Snooping of RADIUS Accounting Requests for IP-Based Subscribers | 136 Snooping RADIUS Accounting Requests for IP-Based Subscribers Overview | 114 IP-Based Subscriber Setup Overview | 107 static-policy-control IN THIS SECTION Syntax | 662 Hierarchy Level | 662 Description | 662 Required Privilege Level | 662 Release Information | 663 662 Syntax static-policy-control { pcc-rules { [rule-name precedence number <time-of-day-profile profile-name>]; } pcc-rulebases { [rulebase-name <time-of-day-profile profile-name>]; } } Hierarchy Level [edit unified-edge pcef profiles profile-name], [edit services pcef profiles profile-name] Description Configure static policy control for the policy and charging control (PCC) rules or PCC rulebase in a policy and charging enforcement function (PCEF) profile. You can configure a maximum of 32 PCC rules in a PCEF profile. There is no limit to the number of PCC rulebases you can configure in a PCEF profile. NOTE: For Junos OS Subscriber Aware, you can configure only one of the following statements in a PCEF profile: aaa-policy-control, static-policy-control, or dynamic-policy-control. For Junos OS Subscriber Management, you can configure only static-policy-control. If you are using Junos OS Subscriber Aware, configure static policy control at the [edit unified-edge pcef profiles profile-name] hierarchy level. If you are using Junos OS Broadband Subscriber Management, configure static policy control at the [edit services pcef profiles profile-name] hierarchy level. The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details. Required Privilege Level For Junos OS Subscriber Aware: 663 unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef profiles profile-name] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. RELATED DOCUMENTATION Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Static Policies Configuring a Policy and Charging Enforcement Function Profile for Subscriber Management steering IN THIS SECTION Syntax | 664 Hierarchy Level | 664 Description | 664 Required Privilege Level | 664 Release Information | 665 664 Syntax steering { keep-existing-steering; path { ipv4-address ipv4-address; ipv6-address ipv6-address; } routing-instance { downlink downlink-vrf-name; uplink uplink-vrf-name; } } Hierarchy Level [edit unified-edge pcef pcc-action-profiles profile-name], [edit services pcef pcc-action-profiles profile-name] Description Specify the method that a PCC action profile uses for steering traffic If you are using Junos OS Subscriber Aware, configure steering at the [edit unified-edge pcef pccaction-profiles profile-name] hierarchy level. If you are using Junos OS Broadband Subscriber Management, configure the PCC action profile at the [edit services pcef pcc-action-profiles profile-name] hierarchy level. The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details. Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: 665 services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef pcc-action-profiles profile-name] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. Support for Next Gen Services for Junos OS Broadband Subscriber Management introduced in Junos OS Release 19.3R2 on MX Series. RELATED DOCUMENTATION Understanding Application-Aware Policy Control for Subscriber Management Configuring Policy and Charging Control Action Profiles for Subscriber Management Understanding Predefined Policy and Charging Control Rules for Subscriber-Aware Traffic Treatment Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware string IN THIS SECTION Syntax | 666 Hierarchy Level | 666 Description | 666 Required Privilege Level | 666 Release Information | 666 666 Syntax string { equals; has-prefix; has-suffix; matches; } Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name format] Description Specify the custom AVP attribute's format as a string and the value to match for the incoming RADIUS request from the IP-based subscriber. After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 667 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 subscriber-address IN THIS SECTION Syntax | 667 Hierarchy Level | 667 Description | 667 Required Privilege Level | 668 Release Information | 668 Syntax subscriber-address { inet { pool pool-name; } inet6 { pool pool-name; } } Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name ip-subscriber] Description Specify the address pool that contains the source IP addresses for IP-based subscriber packets that can undergo TDF processing. 668 The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based Subscriber Setup Overview | 107 subscriber-awareness (Service Set Options) IN THIS SECTION Syntax | 668 Hierarchy Level | 669 Description | 669 Default | 669 Required Privilege Level | 669 Release Information | 669 Syntax subscriber-awareness; 669 Hierarchy Level [edit services service-set service-set-name service-set-options] Description Enable subscriber awareness on the service set. Default If you do not include the subscriber-awareness statement, then subscriber-aware services cannot be provided. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Applying Services to Subscriber-Aware Traffic with a Service Set | 146 subscriber-aware-services IN THIS SECTION Syntax | 670 Hierarchy Level | 670 Description | 670 670 Required Privilege Level | 670 Release Information | 670 Syntax subscriber-aware-services; Hierarchy Level [edit chassis fpc name pic name] Description Enable subscriber-aware services. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS 20.2R1 for Next Gen Services on MX240, MX480 and MX960. subscriber-exclude-prefix IN THIS SECTION Syntax | 671 Hierarchy Level | 671 671 Description | 671 Required Privilege Level | 672 Release Information | 672 Syntax subscriber-exclude-prefix { apply-groups [group-names]; apply-groups-except [group-names]; family { inet { apply-groups [group-names]; apply-groups-except [group-names]; network address net-mask; } inet6 { apply-groups [group-names]; apply-groups-except [group-names]; network address net-mask; } } } Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name] Description Specify the network prefix of source IP addresses for uplink packets and destination IP addresses for downlink packets that do not undergo TDF processing. The remaining statements are explained separately. See CLI Explorer. 672 Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Configuring IFL-Based TDF Subscribers and Properties with a TDF Domain | 140 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based and IFL-Based TDF Subscribers Overview | 107 IP-Based Subscriber Setup Overview | 107 subscriber-type (TDF Domain) IN THIS SECTION Syntax | 672 Hierarchy Level | 673 Description | 673 Options | 673 Required Privilege Level | 673 Release Information | 673 Syntax subscriber-type (ip | ifl); 673 Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name] Description Configure the type of subscriber that this domain is applied to -- an IP-based subscriber or an IFL-based (interface-based) subscriber. If you do not include this statement, subscriber-type ip is used. Options ip (Default) Apply the TDF domain to IP-based subscribers, for which a RADIUS accounting request is sent to the MX Series router. An individual subscriber session is created for each unique source IP address. ifl Apply the TDF domain to IFL-based subscribers, which are defined by a set of interfaces. One subscriber session is created for all traffic that is received on those interfaces. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Configuring IFL-Based TDF Subscribers and Properties with a TDF Domain | 140 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 Understanding the Definition of a Set of IFL-Based Subscriber Properties with a TDF Domain | 116 674 subscription-id IN THIS SECTION Syntax | 674 Hierarchy Level | 675 Description | 675 Required Privilege Level | 675 Release Information | 675 Syntax subscription-id { constant value; subscription-id-options { entry-name { id-components { use-class; use-imsi; use-msisdn; use-nai; use-nas-port; use-nas-port-id; use-realm; use-username; } } } use-class { regex "value"; pattern "pattern"; subscription-id-type (imsi | msisdn | nai | private | sip-uri); } } 675 Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name ip-subscriber] Description Specify how the Subscription-Id is constructed for the Diameter credit control request (CCR) message that is sent from the TDF to the PCRF for IP-based subscribers belonging to the TDF domain. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based Subscriber Setup Overview | 107 subscription-id-options IN THIS SECTION Syntax | 676 Hierarchy Level | 676 Description | 676 676 Options | 677 Required Privilege Level | 677 Release Information | 677 Syntax subscription-id-options { [entry-name] { id-components { use-class; use-imsi; use-msisdn; use-nai; use-nas-port; use-nas-port-id; use-realm; use-username; } } } Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name ip-subscriber subscription-id] Description Specify a method for constructing the Subscription-Id for the RADIUS credit control request (CCR) message that is sent from the TDF to the PCRF for IP-based subscribers belonging to the TDF domain. To specify multiple methods, include the entry-name option multiple times. 677 Options entry-name Identifier for the Subscription-Id construction method. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based Subscriber Setup Overview | 107 subscription-id-type (Class Attribute) IN THIS SECTION Syntax | 678 Hierarchy Level | 678 Description | 678 Options | 678 Required Privilege Level | 678 Release Information | 678 678 Syntax subscription-id-type (imsi | msisdn | nai | private | sip-uri); Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name subscription-id use-class] Description Configure the subscription ID type when the Class attribute is used for the subscription ID. Options imsi msisdn nai private sip-uri Use the IMSI subscriber type. Use the MSISDN (E164) subscriber type. Use the NAI subscriber type. Use the Private subscriber type. Use the SIP URI name subscriber type. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 679 tag (HTTP Header Enrichment) IN THIS SECTION Syntax | 679 Hierarchy Level | 679 Description | 680 Options | 680 Required Privilege Level | 680 Release Information | 680 Syntax tag tag-name { encrypt { hash algorithm; prefix hash-prefix; } ipv4-mask ipv4-mask; ipv6-mask ipv6-mask; ipv4-or-value ipv4-or-value; ipv6-or-value ipv6-or-value; tag-attribute tag-attr-name; tag-header header; tag-separator separator; } Hierarchy Level [edit services hcm tag-rule rule-name term term-number then] 680 Description Configure the tags to be applied to the HTTP headers. If you configure a tag, you must include the tagheader statement. Options tag-name Name of the tag. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 Configuring Tag Rules | 42 Configuring HCM Profiles and Assigning Tag Rules | 49 Junos Web Aware HTTP Header Enrichment Overview | 34 tag-attribute (HTTP Header Enrichment) IN THIS SECTION Syntax | 681 Hierarchy Level | 681 Description | 681 681 Options | 681 Required Privilege Level | 681 Release Information | 682 Syntax tag-attribute [tag-attr-name]; Hierarchy Level [edit services hcm] Description Specify one or more tag attributes that can be used in tag rules for HTTP header enrichment. These attributes are stored in the subscriber database for subscribers. After these attributes are configured, they can be used in the tag rules. HTTP tag rules can be configured to choose one or more of these attributes to insert in the HTTP header. Options tag-attr-name--Tag attribute. To specify multiple attributes at one time, include the attributes in square brackets ([]). The supported attributes are apn, ggsnipv4, ggsnipv6, imei, imsi, ipv4addr, ipv6addr, and msisdn. · Range: 1 through 63 alphanumeric characters Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. 682 Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 Configuring Tag Rules | 42 Junos Web Aware HTTP Header Enrichment Overview | 34 tag-attribute (HTTP Header Enrichment Tag Rule) IN THIS SECTION Syntax | 682 Hierarchy Level | 682 Description | 683 Options | 683 Required Privilege Level | 683 Release Information | 683 Syntax tag-attribute [tag-attr-name]; Hierarchy Level [edit services hcm tag-rule rule-name term term-number then tag tag-name] 683 Description Specify one or more tag attributes (for the tag header and separator) to insert into the HTTP header. NOTE: The tag attribute specified here must already be defined at the [edit services hcm] hierarchy level. Options tag-attr-name--Tag attribute. To specify multiple attributes at one time, include the attributes in square brackets ([]). The supported attributes are apn, ggsnipv4, ggsnipv6, imei, imsi, ipv4addr, ipv6addr, and msisdn. · Range: 1 through 63 alphanumeric characters Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 Configuring Tag Rules | 42 tag-header (HTTP Header Enrichment) IN THIS SECTION Syntax | 684 684 Hierarchy Level | 684 Description | 684 Options | 684 Required Privilege Level | 684 Release Information | 685 Syntax tag-header header; Hierarchy Level [edit services hcm tag-rule rule-name term term-number then tag tag-name] Description Specify the tag header for the tag to be inserted into the HTTP header. This is a required configuration. You can configure a total of 16 unique tag headers for all the tag rules you configure. Options header--Tag header. · Values: You cannot use the following values: accept, accept-charset, accept-encoding, accept- language, authorization, expect, host, if-match, if-modified-since, if-none-match, if-range, ifunmodified-since, max-forwards, proxy-authorization, referer, user-agent, or x-moz. These header values are reserved; you cannot configure them. · Range: 1 through 63 alphanumeric characters Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. 685 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 Configuring Tag Rules | 42 Configuring HCM Profiles and Assigning Tag Rules | 49 Junos Web Aware HTTP Header Enrichment Overview | 34 tag-operation (HTTP Header Enrichment) IN THIS SECTION Syntax | 685 Hierarchy Level | 685 Description | 686 Options | 686 Required Privilege Level | 686 Release Information | 686 Syntax tag-operation (add | delete | modify); Hierarchy Level [edit services hcm tag-rule rule-name term term-name then tag tag-name] 686 Description Specify the operation to be performed on the specified tag of the tag rule set. NOTE: The tag rule must already be defined at the [edit services hcm] hierarchy level. Options add delete modify Add the specified tag with previously existing tag in the tag rule set. Delete the specified tag from the tag rule set. Modify the existing tag in the tag rule set. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 hcm (HTTP Header Enrichment) | 434 tag-rule (Profiles for HTTP Header Enrichment) IN THIS SECTION Syntax | 687 687 Hierarchy Level | 687 Description | 687 Options | 687 Required Privilege Level | 687 Release Information | 688 Syntax tag-rule rule-name; Hierarchy Level [edit services hcm profile profile-name] Description Specify the tag rule to be associated with the HCM profile. NOTE: The tag rule specified here must already be defined at the [edit services hcm] hierarchy level. Options rule-name Name of the tag rule. · Range: 1 through 63 alphanumeric characters Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. 688 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 Configuring HCM Profiles and Assigning Tag Rules | 49 tag-rule (HTTP Header Enrichment) IN THIS SECTION Syntax | 688 Hierarchy Level | 689 Description | 689 Options | 690 Required Privilege Level | 690 Release Information | 690 Syntax tag-rule rule-name { term term-number { from { destination-address { (any-ipv4 | any-ipv4 except); (any-ipv6 | any-ipv6 except); (any-unicast | any-unicast except); (prefix | prefix except); } destination-address-range { high address low address <except>; } 689 destination-port-range { high port-number low port-number; } destination-ports value; destination-prefix-list { (prefix-name | prefix-name except); } } then { count; tag tag-name { encrypt { hash algorithm; prefix hash-prefix; } ipv4-mask ipv4-mask; ipv6-mask ipv6-mask; ipv4-or-value ipv4-or-value; ipv6-or-value ipv6-or-value; tag-attribute tag-attr-name; tag-header header; tag-separator separator; } } } } Hierarchy Level [edit services hcm] Description Configure the tag rules that enrich HTTP headers with the appropriate tags. You must configure at least one term for a tag rule, but you can configure multiple terms. Terms are evaluated in the order they are configured. If a data packet matches all the criteria in the from statement in any of the terms, then the actions specified in the then statement are applied. If the from statement does not identify any criteria, then all traffic matches. After a term matches a data packet, further terms are not evaluated. If no terms match, then the HTTP header is not enriched. 690 For subscriber traffic under static policy control, a tag rule is used if it is included in the HCM profile specified in a PCC rule that the traffic matches. For subscribers under dynamic policy control, a message from the PCRF identifies the configured HCM profile and tag rules to use for HTTP header enrichment. Options rule-name--Name of the tag rule. · Range: 1 through 63 alphanumeric characters The remaining statements are explained separately. See CLI Explorer. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 Configuring Tag Rules | 42 Configuring HCM Profiles and Assigning Tag Rules | 49 Junos Web Aware HTTP Header Enrichment Overview | 34 tag-rules (Service Set) IN THIS SECTION Syntax | 691 Hierarchy Level | 691 Description | 691 691 Options | 691 Required Privilege Level | 691 Release Information | 691 Syntax [tag-rules rule-name;] Hierarchy Level [edit services service-set service-set-name] Description Specify one or more HTTP header enrichment tag rules to include in the service set. You can configure multiple tag rules. If you specify any tag rules, you cannot specify a tag rule set. Options rule-name Name of the tag rule. · Range: 1 through 63 alphanumeric characters Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 692 RELATED DOCUMENTATION Applying Services to Subscriber-Aware Traffic with a Service Set | 146 Configuring HTTP Header Enrichment Overview | 41 tag-rule-set (HTTP Header Enrichment) IN THIS SECTION Syntax | 692 Hierarchy Level | 692 Description | 692 Options | 693 Required Privilege Level | 693 Release Information | 693 Syntax tag-rule-set rule-set-name { [rule rule-name]; } Hierarchy Level [edit services hcm] Description Configure the tag rule set for HTTP header enrichment so that you can group multiple configured tag rules into one tag rule set. 693 Options rule-set-name Name of the tag rule set. The remaining statement is explained separately. See CLI Explorer. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 hcm (HTTP Header Enrichment) | 434 tag-rule-sets (Service Set) IN THIS SECTION Syntax | 694 Hierarchy Level | 694 Description | 694 Options | 694 Required Privilege Level | 694 Release Information | 694 694 Syntax tag-rule-sets rule-set-name; Hierarchy Level [edit services service-set service-set-name] Description Specify the HTTP header enrichment tag rule set included in the service set. You can configure only one tag rule set. If you specify a tag rule set, you cannot specify a tag rule. Options rule-set-name Name of the tag rule set. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Applying Services to Subscriber-Aware Traffic with a Service Set | 146 Configuring HTTP Header Enrichment Overview | 41 695 tag-separator (HTTP Header Enrichment) IN THIS SECTION Syntax | 695 Hierarchy Level | 695 Description | 695 Options | 695 Required Privilege Level | 695 Release Information | 696 Syntax tag-separator separator; Hierarchy Level [edit services hcm tag-rule rule-name term term-number then tag tag-name] Description Specify the tag separator for the tag to be inserted into the HTTP header. Options separator Tag separator. You may use a forward slash (/) or pipe ( | ). · Default: / (forward slash) Required Privilege Level interface--To view this statement in the configuration. 696 interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 Configuring Tag Rules | 42 Configuring HCM Profiles and Assigning Tag Rules | 49 Junos Web Aware HTTP Header Enrichment Overview | 34 tag-value (HTTP Header Enrichment) IN THIS SECTION Syntax | 696 Hierarchy Level | 696 Description | 697 Options | 697 Required Privilege Level | 697 Release Information | 697 Syntax tag-value value; Hierarchy Level [edit services hcm tag-rule then tag] 697 Description Specify the tag value for the specified tag name. NOTE: The tag rule must already be defined at the [edit services hcm] hierarchy level. Options value String of up to 16 alphanumeric characters Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 hcm (HTTP Header Enrichment) | 434 tags (Application Identification) IN THIS SECTION Syntax | 698 Hierarchy Level | 698 Description | 698 Options | 698 698 Required Privilege Level | 698 Release Information | 698 Syntax tags tag-name tag-value; Hierarchy Level [edit services application-identification application application-name] Description Specify an application tag that provides general information about the application, such as associated risk factors, technology, and the type of traffic. The tag consists of a user-defined name and value. Options tag-name tag-value Name for the tag, which is a textual string. Value for the tag. Required Privilege Level view-level--To view this statement in the configuration. control-level--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 699 RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures Application Identification Overview Application Identification Overview targets IN THIS SECTION Syntax | 699 Hierarchy Level | 699 Description | 700 Options | 700 Required Privilege Level | 700 Release Information | 700 Syntax targets { target-name { <destination-host hostname>; destination-realm realm-name; network-element element-name; priority priority-value; } } Hierarchy Level [edit unified-edge diameter-profiles gx-profile profile-name] 700 Description Configure the targets for this Diameter profile. Options target-name Name of the target. destination-host hostname destination-realm realm-name network-element element-name (Optional) Use the name of the destination host associated with this target. Use the name of the destination realm associated with this target. Use the name of the network element. NOTE: The Diameter network element must be previously configured at the [edit access diameter network-element] hierarchy level. priority priorityvalue · Range: 1 through 32 characters Use the specified priority for the target within the Diameter profile. A value with a lower number has a higher priority. For load balancing, configure the targets with the same priority. NOTE: Failover handling depends on how the policy for the application is configured. For example, switching between the primary and secondary online charging servers set with the appropriate priority can occur only when the failover handling policy is configured to do so. · Range: 1 through 65,535 Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 701 RELATED DOCUMENTATION gx-profile | 429 tdf (Unified Edge) IN THIS SECTION Syntax | 701 Hierarchy Level | 701 Description | 701 Options | 701 Required Privilege Level | 702 Release Information | 702 Syntax tdf gateway-name; Hierarchy Level [edit unified-edge gateways] Description Specify the name to be used for the traffic detection function (TDF) gateway. Options gateway-name Name of the gateway. · Range: 1 through 16 characters. 702 Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION TDF Gateway Service PICs and Session PICs for Subscriber-Aware Traffic Treatment | 9 tdf-interface IN THIS SECTION Syntax | 702 Hierarchy Level | 702 Description | 703 Options | 703 Required Privilege Level | 703 Release Information | 703 Syntax tdf-interface mif.number; Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name] 703 Description Specify the TDF interface that the TDF domain uses. A TDF interface is different from other types of interfaces, and is associated with the TDF service set that is used for the TDF subscriber. NOTE: The TDF interface must have been previously configured at the [edit interfaces] hierarchy level. The TDF interface and the access-facing interfaces in the TDF domain must be included in the same VRF routing instance. Options mif.number Use the specified TDF interface unit number. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 Understanding the Definition of a Set of IP-Based Subscriber Properties with a TDF Domain | 108 IP-Based Subscriber Setup Overview | 107 Configuring TDF Interface to Access Interface Associations in VRFs | 144 Configuring TDF Interface to Access Interface Associations in VRFs | 144 Configuring a TDF Logical Interface | 143 704 template (LRF Profile) IN THIS SECTION Syntax | 704 Hierarchy Level | 704 Description | 704 Options | 704 Required Privilege Level | 705 Release Information | 705 Syntax template template-name { format ipfix; template-tx-interval tx-time; template-type template-type; trigger-type (session-close | volume); } Hierarchy Level [edit services lrf profile profile-name] Description Configure a template, which specifies a set of data to be transmitted. This template can be specified in LRF rules. Options template-name Name for the template. 705 · Range: Up to 32 characters. The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Release 19.3R1 on MX Series. RELATED DOCUMENTATION Configuring an LRF Profile for Subscribers Configuring Logging and Reporting for Junos OS Subscriber Aware Configuring Logging and Reporting for Subscriber Management template (LRF Rule) IN THIS SECTION Syntax | 706 Hierarchy Level | 706 Description | 706 Options | 706 Required Privilege Level | 706 Release Information | 706 706 Syntax template template-name; Hierarchy Level [edit services lrf profile profile-name rule lrf-rule-name then report] Description Specify the template that identifies the type of data to report if the LRF rule is matched. Options template-name Name of the template that is used. The referenced template must be configured. · Range: Up to 32 characters. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Release 19.3R1 on MX Series. RELATED DOCUMENTATION Configuring an LRF Profile for Subscribers Configuring Logging and Reporting for Junos OS Subscriber Aware Configuring Logging and Reporting for Subscriber Management 707 template-tx-interval (LRF Profile) IN THIS SECTION Syntax | 707 Hierarchy Level | 707 Description | 707 Options | 707 Required Privilege Level | 708 Release Information | 708 Syntax template-tx-interval tx-time; Hierarchy Level [edit services lrf profile profile-name template template-name] Description Configure the interval at which to retransmit the template to the collector. Options tx-time Time interval in seconds. · Default: 60 · Range: 10 through 600 708 Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Release 19.3R1 on MX Series. RELATED DOCUMENTATION Configuring an LRF Profile for Subscribers Configuring Logging and Reporting for Junos OS Subscriber Aware Configuring Logging and Reporting for Subscriber Management template-type (LRF Profile) IN THIS SECTION Syntax | 708 Hierarchy Level | 709 Description | 709 Options | 709 Required Privilege Level | 710 Release Information | 710 Syntax template-type template-type; 709 Hierarchy Level [edit services lrf profile profile-name template template-name] Description Configure the template types for the template, which specify the data fields to include. You must configure at least one type, and you can configure multiple types. If Next Gen Services is enabled, then the template types dns, ifl-subscriber, ipv4-extended, ipv6extended, mobile-subscriber, video, and wireline-subscriber are not available. Options templatetype Template type. You must configure at least one of the following types, and you can configure multiple types: · device-data--Use data fields specific to the device collecting the logging feed. · dns--(Not available if Next Gen Services is enabled) Use the DNS response time data field. · flow-id--Use the Flow ID data field. · http--Use data fields for the HTTP metadata from header fields. · ifl-subscriber--(Not available if Next Gen Services is enabled) Use data fields specific to interface-based subscribers. · ipflow--Use data fields for the uplink and downlink octets and bytes. · ipflow-extended--Use data fields for the service set name, routing instance, and payload timestamps. · ipflow-tcp--Use data fields for TCP-related timestamps. · ipflow-tcp-ts--Use IBM-specific data fields for TCP-related timestamps.When configuring a ipflow-tcp-ts template, configure vendor-support ibm at the [edit services lrf profile profile-name] hierarchy level to avoid a commit warning. · ipflow-ts--Use data fields for the flow start and end timestamps. · ipv4--Use data fields for the basic source and destination IPv4 information. 710 · ipv4-extended--(Not available if Next Gen Services is enabled) Use data fields for the elements of IPv4 extended fields. · ipv6--Use data fields for the basic source and destination IPv6 information. · ipv6-extended--(Not available if Next Gen Services is enabled) Use data fields for the elements of IPv6 extended fields. · l7-app--Use data fields for the Layer 7 application. · mobile-subscriber--(Not available if Next Gen Services is enabled) Use data fields specific to mobile subscribers. · pcc--Use the PCC rule name data field. · status-code-dist--Use data fields for the HTTP or DNS status codes. · subscriber-data--Use data fields for Generic Subscriber information that can be included with wireless (mobile) subscribers or wireline subscribers. · transport-layer--Use data fields for the transport layer. · video--(Not available if Next Gen Services is enabled) Use data fields for video traffic. · wireline-subscriber--(Not available if Next Gen Services is enabled) Use the UserName data field for wireline subscribers. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Release 19.3R1 on MX Series. RELATED DOCUMENTATION Configuring an LRF Profile for Subscribers Configuring Logging and Reporting for Junos OS Subscriber Aware Configuring Logging and Reporting for Subscriber Management 711 term (HTTP Header Enrichment) IN THIS SECTION Syntax | 711 Hierarchy Level | 712 Description | 712 Options | 712 Required Privilege Level | 713 Release Information | 713 Syntax term term-number { from { destination-address { (any-ipv4 | any-ipv4 except); (any-ipv6 | any-ipv6 except); (any-unicast | any-unicast except); (prefix | prefix except); } destination-address-range { high address low address <except>; } destination-port-range { high port-number low port-number; } destination-ports value; destination-prefix-list { (prefix-name | prefix-name except); } } then { count; tag tag-name { encrypt { hash algorithm; 712 prefix hash-prefix; } ipv4-mask ipv4-mask; ipv6-mask ipv6-mask; ipv4-or-value ipv4-or-value; ipv6-or-value ipv6-or-value; tag-attribute tag-attr-name; tag-header header; tag-separator separator; } } } Hierarchy Level [edit services hcm tag-rule rule-name] Description Configure a term in a tag rule, which is used to enrich HTTP headers with the appropriate tags. You must configure at least one term for a tag rule, but you can configure multiple terms. Terms are evaluated in the order they are configured. If a data packet matches all the criteria in the from statement in any of the terms, then the actions specified in the then statement are applied. If the from statement does not identify any criteria, then all traffic matches. After a term matches a data packet, further terms are not evaluated. If no terms match, then the HTTP header is not enriched. For subscriber traffic under static policy control, a tag rule is used if it is included in the HCM profile specified in a PCC rule that the traffic matches. For subscribers under dynamic policy control, a message from the PCRF identifies the configured HCM profile and tag rules to use for HTTP header enrichment. Options term-number Number for the term. · Range: 1 through 32,767 The remaining statements are explained separately. See CLI Explorer. 713 Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 Configuring Tag Rules | 42 Configuring HCM Profiles and Assigning Tag Rules | 49 Junos Web Aware HTTP Header Enrichment Overview | 34 term (TDF Domain Selection) IN THIS SECTION Syntax | 713 Hierarchy Level | 716 Description | 716 Options | 716 Required Privilege Level | 717 Release Information | 717 Syntax term term-name { from { 3gpp-imsi { 714 equals value; has-prefix value; has-suffix value; matches value; } attribute name { code numeric-code; vendor-id vendor-id; format { integer { equals { value; } greater-than value; less-than value; } string { equals { value; } has-prefix{ value; } has-suffix { value; } matches { value; } } time { equals { value; } greater-than value; less-than value; } v4address { equals { value; } } v6address { 715 equals { value; } } v6prefix { equals { value; } } } } called-station-id { equals value; matches value; } calling-station-id { equals value; matches value; } class { equals value; has-prefix value; has-suffix value; matches value; } client client-name; framed-ip-address { equals value; } framed-ipv6-prefix { equals value; } nas-ip-address { equals value; } snoop-segment snoop-segment-name; user-name { equals value; has-prefix value; has-suffix value; matches value; } } 716 then { domain tdf-domain-name; pcef-profile pcef-profile-name; } } Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection] Description Configure a term that can be used to select the TDF domain for an IP-based subscriber. You can configure multiple terms (up to 10 terms) for the TDF domain selection, and each term is applied in the order in which it is configured. You can specify multiple match conditions within the from statement of a term, and all of the conditions have to match. If the incoming RADIUS request from the subscriber matches the criteria in a term, then the TDF domain specified in the then statement of the term is used to create the TDF subscriber session. A term can also be used to select a PCEF profile for a an IP-based subscriber. Setting up a term so that it is used to select a profile is required if the TDF domain selected for a subscriber does not specify a PCEF profile or you want to allow different members of the same TDF domain to have different PCEF profiles. After a term matches and a TDF domain is selected, further terms are not evaluated when the PCEF profile is specified in either the then statement or in the selected TDF domain. If a PCEF profile is not specified in either the then statement or in the selected TDF domain, further terms are evaluated to find a PCEF profile for the subscriber. If no TDF domain is selected for a subscriber, then a TDF subscriber session is not created. NOTE: The TDF domain must have been previously configured at the [edit unified-edge gateways tdf gateway-name domains] hierarchy level. The PCEF profile must have been previously configured at the [edit unified-edge pcef] hierarchy level. Options term-name Identifier for the term. 717 · Range: 1 through 50 alphanumeric characters. The remaining statements are explained separately. See CLI Explorer. NOTE: You must configure at least one term. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 then (HTTP Header Enrichment) IN THIS SECTION Syntax | 718 Hierarchy Level | 718 Description | 718 Required Privilege Level | 718 Release Information | 719 718 Syntax then { count; tag tag-name { encrypt { hash algorithm; prefix hash-prefix; } ipv4-mask ipv4-mask; ipv6-mask ipv6-mask; ipv4-or-value ipv4-or-value; ipv6-or-value ipv6-or-value; tag-attribute tag-attr-name; tag-header header; tag-separator separator; } } Hierarchy Level [edit services hcm tag-rule rule-name term term-number] Description Specify the actions to be taken if the criteria for the tag rule are matched. For subscribers under static policy control, the matching conditions for a tag rule are determined by the PCC rule that uses the HCM profile specifying the tag rule. For subscribers under dynamic policy control, a message from the PCRF identifies the configured HCM profile to use for HTTP header enrichment. NOTE: You must configure this statement and include at least one action to be taken for the tag rule term. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level interface--To view this statement in the configuration. 719 interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring HTTP Header Enrichment Overview | 41 Configuring Tag Rules | 42 Configuring HCM Profiles and Assigning Tag Rules | 49 Junos Web Aware HTTP Header Enrichment Overview | 34 then (LRF rule) IN THIS SECTION Syntax | 719 Hierarchy Level | 720 Description | 720 Required Privilege Level | 720 Release Information | 720 Syntax then { report { collector collector-name; template template-name; time-limit time-interval; volume-limit volume; } } 720 Hierarchy Level [edit services lrf profile profile-name rule lrf-rule-name] Description Configure the actions to take if the LRF rule is matched. The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Release 19.3R1 on MX Series. RELATED DOCUMENTATION Configuring an LRF Profile for Subscribers Configuring Logging and Reporting for Junos OS Subscriber Aware Configuring Logging and Reporting for Subscriber Management then (PCC Rules) IN THIS SECTION Syntax | 721 Hierarchy Level | 721 721 Description | 721 Required Privilege Level | 721 Release Information | 722 Syntax then { pcc-action-profile } profile-name; Hierarchy Level [edit unified-edge pcef pcc-rules rule-name], [edit services pcef pcc-rules rule-name] Description Specify the policy and charging control (PCC) action profile for a PCC rule. The PCC action profile specifies the actions to apply to subscriber traffic that matches any of the from statements in the PCC rule. A PCC rule configuration must include the then statement and a PCC action profile. The referenced PCC action profile must be configured. If you are using Junos OS Subscriber Aware, specify the name of the PCC action profile at the [edit unified-edge pcef pcc-rules rule-name] hierarchy level. If you are using Junos OS Broadband Subscriber Management, specify the name of the PCC action profile at the [edit services pcef pcc-rules rule-name] hierarchy level. The remaining statements are explained separately. Search for a statement in CLI Explorer or click a linked statement in the Syntax section for details. Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. 722 unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef pcc-rules rule-name] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. Support for Next Gen Services for Junos OS Broadband Subscriber Management introduced in Junos OS Release 19.3R2 on MX Series. RELATED DOCUMENTATION Configuring Policy and Charging Control Rules Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware Configuring Policy and Charging Control Action Profiles for Subscriber Management then (TDF Domain Selection) IN THIS SECTION Syntax | 723 Hierarchy Level | 723 Description | 723 Required Privilege Level | 723 Release Information | 723 723 Syntax then { domain tdf-domain-name; pcef-profile pcef-profile-name; } Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name] Description Specify the TDF domain or the PCEF profile to be selected when the criteria specified in the domain selection statement match. NOTE: This statement is required even if you have not specified any match criteria. The TDF domain must have been previously configured at the [edit unified-edge gateways tdf gatewayname domains] hierarchy level. The PCEF profile must have been previously configured at the [edit unified-edge pcef] hierarchy level. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. 724 RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 time IN THIS SECTION Syntax | 724 Hierarchy Level | 724 Description | 725 Required Privilege Level | 725 Release Information | 725 Syntax time { equals { value; } greater-than value; less-than value; } Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name format] 725 Description Specify the custom AVP attribute's format as time and the value to match for the incoming RADIUS request from the IP-based subscriber. After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 time-limit (LRF Rule) IN THIS SECTION Syntax | 726 Hierarchy Level | 726 Description | 726 Options | 726 726 Required Privilege Level | 726 Release Information | 726 Syntax time-limit time-interval; Hierarchy Level [edit services lrf profile profile-name rule lrf-rule-name then report] Description Configure the time limit to be used for reporting. The template that the LRF rule is using must have trigger-type time configured. Options time-interval The time limit in seconds. · Range: 60 through 1800 · Default: 300 Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Release 19.3R1 on MX Series. 727 RELATED DOCUMENTATION Configuring an LRF Profile for Subscribers Configuring Logging and Reporting for Subscriber Management Configuring Logging and Reporting for Junos OS Subscriber Aware timeout (Diameter Network Element) IN THIS SECTION Syntax | 727 Hierarchy Level | 727 Description | 727 Options | 728 Required Privilege Level | 728 Release Information | 728 Syntax timeout seconds; Hierarchy Level [edit access diameter network-element element-name peer peer-name] Description Configure the amount of time to wait for a response from this peer before transmitting the request to another peer. 728 Options seconds Amount of time to wait before transmitting the request. · Range: 1 through 100 seconds · Default: 4 seconds Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION diameter (Subscriber Aware Policy Control) | 368 timeout (RADIUS Server) IN THIS SECTION Syntax | 729 Hierarchy Level | 729 Description | 729 Options | 729 Required Privilege Level | 729 Release Information | 729 729 Syntax timeout seconds; Hierarchy Level [edit access radius servers name] Description Configure the amount of time that the MX Series router waits to receive a response from a RADIUS server before retrying the request. Options seconds Number of seconds to wait. · Range: 1 through 90 · Default: 3 Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring RADIUS Servers | 91 Understanding Network Elements | 71 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 730 traceoptions (Diameter Base Protocol) IN THIS SECTION Syntax | 730 Hierarchy Level | 730 Description | 730 Options | 731 Required Privilege Level | 732 Release Information | 732 Syntax traceoptions { file filename <files number> <match regular-expression > <size maximum-file- size> <world-readable | no-world-readable>; flag flag; level (all | error | info | notice | verbose | warning); no-remote-trace; <peer peer-name>; } Hierarchy Level [edit access diameter] Description Define tracing options for Diameter peers. 731 Options file filename Use the specified file to receive the output of the tracing operation. Enclose the filename within quotation marks. All files are placed in the directory /var/log. files number (Optional) Create the specified maximum number of trace files before overwriting the oldest one. If you specify a maximum number of files, you also must specify a maximum file size with the size option. · Range: 2 through 1000 · Default: 3 files flag flag Use the specified tracing operation. To specify more than one tracing operation, include multiple flag statements. You can include the following flags: · all--Trace all operations. · receive--Trace received packets. · receive-detail--Trace received packets in detail. · send--Trace transmitted packets. · send-detail--Trace transmitted packets in detail. · state--Trace Diameter peer state changes. · timeout--Trace timeout events. level Use the specified level of tracing. You can specify any of the following levels: · all--Match all levels. · error--Match error conditions. · info--Match informational messages. · notice--Match notice messages about conditions requiring special handling. · verbose--Match verbose messages. · warning--Match warning messages. match regular- (Optional) Refine the output to include lines that contain the specified regular expression expression. no-remotetrace Disable remote tracing. 732 no-worldreadable peer peername (Optional) Disable unrestricted file access. (Optional) Trace packets sent to or received from the specified peer. The specified peer must be defined at the [edit access diameter peer] hierarchy level. size maximumfile-size (Optional) Use the specified maximum size of each trace file. By default, the number entered is treated as bytes. Alternatively, you can include a suffix to the number to indicate kilobytes (KB), megabytes (MB), or gigabytes (GB). If you specify a maximum file size, you also must specify a maximum number of trace files with the files option. · Syntax: sizek to specify KB, sizem to specify MB, or sizeg to specify GB · Range: 10240 through 1073741824 · Default: 128 KB world-readable (Optional) Enable unrestricted file access. Required Privilege Level trace--To view this statement in the configuration. trace-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION diameter (Subscriber Aware Policy Control) | 368 traceoptions (PCEF) IN THIS SECTION Syntax | 733 Hierarchy Level | 733 733 Description | 733 Options | 733 Required Privilege Level | 735 Release Information | 735 Syntax traceoptions { file file-name <files number> <no-word-readable | world-readable> <size size>; flag flag; level (all | critical | error | info | notice | verbose | warning); no-remote-trace; } Hierarchy Level [edit unified-edge pcef] Description Specify tracing options for policy and charging enforcement functions (PCEF). Options file filename files number Use the specified name of the file to receive the output of the tracing operation. (Optional) Use the specified maximum number of trace files. When a trace file named trace-file reaches its maximum size, it is renamed trace-file.0, then trace-file.1, and so on, until the maximum number of trace files is reached. Then the oldest trace file is overwritten. · Range: 2 through 1000 · Default: 3 files 734 flag flag Specify which operations are to be traced. To specify more than one operation, include multiple flag statements. BEST PRACTICE: You might want to enable traceoptions only when you want to debug specific charging operations. Enabling the traceoption flags might have an impact on the system performance. · all--Trace all operations. · config--Trace configuration events. · debug--Trace debug internal events. · fsm--Trace finite state machine events. · general--Trace general events that do not fit in any specific traces. · high-availability--Trace high-availability events. · init--Trace initialization events. · tftmgr--Trace tftmgr events. level Use the specified level of tracing. You can specify any of the following levels: · all--Match all levels. · critical--Match critical conditions. · error--Match error conditions. · info--Match informational messages · notice--Match conditions that must be handled specially. · verbose--Match verbose messages. · warning--Match warning messages. no-remotetrace no-worldreadable size size (Optional) Disable remote tracing. (Optional) Disable unrestricted file access. (Optional) Use the specified maximum size of each trace file, in kilobytes (KB) or megabytes (MB). When a trace file named trace-file reaches this size, it is renamed trace- 735 wordreadable file.0. When the trace-file again reaches its maximum size, trace-file.0 is renamed tracefile.1 and trace-file is renamed trace-file.0. This renaming scheme continues until the maximum number of trace files is reached. Then, the oldest trace file is overwritten. If you specify a maximum number of files, you must also specify a maximum file size with the size option. · Syntax: xk to specify KB, xm to specify MB, or xg to specify GB. · Range: 10,240 through 1,073,741,824 bytes · Default: 128 KB (Optional) Enable unrestricted file access. Required Privilege Level trace and unified-edge--To view this statement in the configuration. trace-control and unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring Tracing for PCEF Operations | 239 traceoptions (TDF Gateway) IN THIS SECTION Syntax | 736 Hierarchy Level | 736 Description | 736 Options | 736 736 Required Privilege Level | 738 Release Information | 738 Syntax traceoptions { file file-name <files number> <no-word-readable | world-readable> <size size>; flag flag; level (all | critical | error | info | notice | verbose | warning); no-remote-trace; } Hierarchy Level [edit unified-edge gateways tdf gateway-name] Description Specify tracing options for the TDF gateway. Options file filename files number flag flag Use the specified name of the file to receive the output of the tracing operation. (Optional) Use the specified maximum number of trace files. When a trace file named trace-file reaches its maximum size, it is renamed trace-file.0, then trace-file.1, and so on, until the maximum number of trace files is reached. Then the oldest trace file is overwritten. · Range: 2 through 1000 files · Default: 3 files Specify which operations are to be traced. To specify more than one operation, include multiple flag statements. 737 · all--Trace everything. · bulkjob--Trace events that are handled by bulk jobs in order to prevent system overload. · config--Trace configuration events. · cos-cac--Trace class of service (CoS) and call admission control (CAC) events. · ctxt--Trace user equipment, Packet Data Network (PDN), or bearer context events. · fsm--Trace mobile subscriber finite state machine (FSM) events. · gtpu--Trace GPRS tunneling protocol, user plane (GTP-U) events. · ha--Trace high availability events. · init--Trace initialization events. · pfem--Trace Packet Forwarding Engine Manager events. · stats--Trace stats events. This flag is used internally by Juniper Networks engineers. · waitq--Trace waitq events. This flag is used internally by Juniper Networks engineers. level Use the specified level of tracing. You can specify any of the following levels: · all--Match all levels. · critical--Match critical conditions. · error--Match error conditions. · info--Match informational messages · notice--Match conditions that must be handled specially. · verbose--Match verbose messages. · warning--Match warning messages. no-remotetrace no-worldreadable size size (Optional) Disable remote tracing. (Optional) Disable unrestricted file access. (Optional) Use the specified maximum size of each trace file, in kilobytes (KB) or megabytes (MB). When a trace file named trace-file reaches this size, it is renamed tracefile.0. When the trace-file again reaches its maximum size, trace-file.0 is renamed trace- 738 wordreadable file.1 and trace-file is renamed trace-file.0. This renaming scheme continues until the maximum number of trace files is reached. Then, the oldest trace file is overwritten. If you specify a maximum number of files, you must also specify a maximum file size with the size option. · Syntax: xk to specify KB, xm to specify MB, or xg to specify GB. · Range: 10,240 through 1,073,741,824 bytes. · Default: 128 KB (Optional) Enable unrestricted file access. Required Privilege Level trace and unified-edge--To view this statement in the configuration. trace-control and unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring Tracing for TDF Gateway | 20 trigger-type (LRF Profile) IN THIS SECTION Syntax | 739 Hierarchy Level | 739 Description | 739 Default | 739 Options | 739 739 Required Privilege Level | 739 Release Information | 740 Syntax trigger-type (session-close | volume); Hierarchy Level [edit services lrf profile profile-name template template-name] Description Configure the type of trigger that causes the generation of data records and transmission to the collector. You can only configure one type of trigger. Default If you do not include the trigger-type statement, the default trigger is session-close. Options sessionclose volume Use the closing of the data session to cause the generation of data records and transmission to the collector. Use a data volume limit to cause the generation of data records and transmission to the collector. The data volume limit value is configured in the LRF rule. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. 740 Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Release 19.3R1 on MX Series. RELATED DOCUMENTATION Configuring an LRF Profile for Subscribers Configuring Logging and Reporting for Junos OS Subscriber Aware Configuring Logging and Reporting for Subscriber Management type (Application Identification) IN THIS SECTION Syntax | 740 Hierarchy Level | 740 Description | 741 Options | 741 Required Privilege Level | 741 Release Information | 741 Syntax type type; Hierarchy Level [edit services application-identification application application-name] 741 Description Specify the type of application, such as FTP or HTTP. Options type Type of application such as FTP or HTTP. Required Privilege Level system--To view this statement in the configuration. system-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures type (ICMP Mapping for Application Identification) IN THIS SECTION Syntax | 742 Hierarchy Level | 742 Description | 742 Options | 742 Required Privilege Level | 742 Release Information | 742 742 Syntax type icmp-type; Hierarchy Level [edit services application-identification application application-name icmpmapping] Description Match an ICMP type value to create a custom application signature. Options value ICMP code value. · Range: 0 through 254 Required Privilege Level view-level--To view this statement in the configuration. control-level--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures 743 unit (TDF Interface) IN THIS SECTION Syntax | 743 Hierarchy Level | 743 Description | 743 Options | 743 Required Privilege Level | 744 Release Information | 744 Syntax unit interface-unit-number { family family-name; } Hierarchy Level [edit interfaces mif] Description Configure the logical interface on the TDF interface. You must configure a logical interface to be able to use the TDF interface. Options interface-unit-number Number of the logical unit. · Range: 0 through 16,384 The remaining statement is explained separately. See CLI Explorer. 744 Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring a TDF Logical Interface | 143 url IN THIS SECTION Syntax | 744 Hierarchy Level | 745 Description | 745 Options | 745 Required Privilege Level | 745 Release Information | 745 Syntax url url-name; 745 Hierarchy Level [edit unified-edge pcef pcc-action-profiles profile-name redirect], [edit services pcef pcc-action-profiles profile-name redirect] Description Specify the URL name that you want a PCC action profile to use for performing HTTP redirection. If you configure this, the PCC action profile can only be used in PCC rules that match only HTTP-based applications and all flows. If you are using Junos OS Subscriber Aware, specify the URL name at the [edit unified-edge pcef pccaction-profiles profile-name redirect] hierarchy level. If you are using Junos OS Broadband Subscriber Management, specify the URL name at the [edit services pcef pcc-action-profiles profile-name redirect] hierarchy level. Options url-name URL for the HTTP redirect. Required Privilege Level For Junos OS Subscriber Aware: unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. For Junos OS Broadband Subscriber Management: services--To view this statement in the configuration. servicescontrol--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support at the [edit services pcef pcc-action-profiles profile-name redirect] hierarchy level introduced for Junos OS Broadband Subscriber Management in Junos OS Release 17.2 on MX Series. 746 Support for Next Gen Services for Junos OS Broadband Subscriber Management introduced in Junos OS Release 19.3R2 on MX Series. RELATED DOCUMENTATION Configuring Policy and Charging Control Action Profiles For Junos OS Subscriber Aware Configuring Policy and Charging Control Action Profiles for Subscriber Management use-class (Class Attribute) IN THIS SECTION Syntax | 746 Hierarchy Level | 746 Description | 747 Required Privilege Level | 747 Release Information | 747 Syntax use-class { regex "value"; pattern "pattern"; subscription-id-type (imsi | msisdn | nai | private | sip-uri); } Hierarchy Level [edit unified-edge gateways tdf gateway-name domains domain-name subscription-id] 747 Description Configure a regular expression to parse the Class attribute contents, specify characters to insert between the resulting regular expression groups, and specify the subscription ID type if you configured subscription-id-options entry-name use-class under [edit unified-edge gateways tdf gateway-name domains domain-name subscription-id]. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring a Set of IP-Based TDF Subscriber Properties with a TDF Domain | 121 user-name IN THIS SECTION Syntax | 748 Hierarchy Level | 748 Description | 748 Required Privilege Level | 748 Release Information | 748 748 Syntax user-name { equals value; has-prefix value; has-suffix value; matches value; } Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from] Description Specify the RADIUS AVP User-Name for the incoming RADIUS request from the subscriber. After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 749 IP-Based Subscriber Setup Overview | 107 user-password (PCEF Profile) IN THIS SECTION Syntax | 749 Hierarchy Level | 749 Description | 749 Options | 749 Required Privilege Level | 750 Release Information | 750 Syntax user-password password; Hierarchy Level [edit unified-edge pcef profiles profile-name aaa-policy-control] Description Configure the user password for subscribers assigned to the parent PCEF profile. Options password Password for access requests to the RADIUS server. · Range: 1 through 32 characters 750 Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring a Policy and Charging Enforcement Function Profile for Junos OS Subscriber Aware Policies That a RADIUS Server Controls | 101 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 v4address IN THIS SECTION Syntax | 750 Hierarchy Level | 751 Description | 751 Required Privilege Level | 751 Release Information | 751 Syntax v4address { equals; } 751 Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name format] Description Specify the custom AVP attribute's format as an IPv4 address and the value to match for the incoming RADIUS request from the IP-based subscriber. After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 752 v6address IN THIS SECTION Syntax | 752 Hierarchy Level | 752 Description | 752 Required Privilege Level | 752 Release Information | 753 Syntax v6address { equals; } Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name format] Description Specify the custom AVP attribute's format as an IPv6 address and the value to match for the incoming RADIUS request from the IP-based subscriber. After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. 753 unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 v6prefix IN THIS SECTION Syntax | 753 Hierarchy Level | 754 Description | 754 Required Privilege Level | 754 Release Information | 754 Syntax v6prefix { apply-groups [group-names]; apply-groups-except [group-names]; equals; } 754 Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name format] Description Specify the custom AVP attribute's format as an IPv6 address prefix and the value to match for the incoming RADIUS request from the IP-based subscriber. After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. The remaining statements are explained separately. See CLI Explorer. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 755 vendor-id IN THIS SECTION Syntax | 755 Hierarchy Level | 755 Description | 755 Options | 755 Required Privilege Level | 756 Release Information | 756 Syntax vendor-id vendor-id; Hierarchy Level [edit unified-edge gateways tdf gateway-name domain-selection term term-name from attribute name] Description Specify the custom attribute's AVP vendor identification number for the incoming RADIUS request from the subscriber. After this criterion and the other match criteria specified for the TDF domain or PCEF profile selection term are matched, the specified TDF domain or PCEF profile is selected. Options vendor-id AVP vendor identification number. · Range: 0 through 65,534. 756 Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Configuring Assignment of TDF Subscriber Properties and Policy-Control Properties to IP-Based Subscribers | 130 Understanding Selection of Properties for an IP-Based TDF Subscriber | 110 Understanding Selection of Policy-Control Properties for an IP-based TDF Subscriber | 112 IP-Based Subscriber Setup Overview | 107 vendor-id (AAA Profile) IN THIS SECTION Syntax | 756 Hierarchy Level | 757 Description | 757 Options | 757 Required Privilege Level | 757 Release Information | 757 Syntax vendor-id vendor-id; 757 Hierarchy Level [edit unified-edge aaa profiles aaa-profile-name radius policy activationattribute], [edit unified-edge aaa profiles aaa-profile-name radius policy deactivationattribute] Description Configure the vendor identification when a vendor-specific RADIUS attribute is used to carry the policy and charging control (PCC) rulebase name for rulebase activations or deactivations. By default, the rulebase name is carried in the ERX-Service-Activate Juniper vendor-specific attribute (VSA) for activations and in the ERX-Service-Deactivate Juniper VSA for deactivations. Options vendor-id Vendor identification number for the RADIUS AVP. Required Privilege Level unified-edge--To view this statement in the configuration. unified-edge-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring an AAA Profile | 96 Understanding AAA Profiles | 73 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 758 vendor-support IN THIS SECTION Syntax | 758 Hierarchy Level | 758 Description | 758 Required Privilege Level | 758 Release Information | 758 Syntax vendor-support ibm; Hierarchy Level [edit services lrf profile profile-name] Description Configure support for any vendor-specific template types. Currently, the only vendor-specific template type is ipflow-tcp-ts, for which you configure vendor-specific ibm. If you do not configure vendor-specific ibm, a warning appears when you commit the configuration. Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.2. 759 Support for Next Gen Services introduced in Junos OS Release 19.3R1 on MX Series. RELATED DOCUMENTATION Configuring an LRF Profile for Subscribers Configuring Logging and Reporting for Junos OS Subscriber Aware Configuring Logging and Reporting for Subscriber Management Logging and Reporting Function for Subscribers volume-limit (LRF Rule) IN THIS SECTION Syntax | 759 Hierarchy Level | 759 Description | 760 Options | 760 Required Privilege Level | 760 Release Information | 760 Syntax volume-limit volume; Hierarchy Level [edit services lrf profile profile-name rule lrf-rule-name then report] 760 Description Configure the data volume limit to be used for reporting. The template that the LRF rule is using must have trigger-type volume configured. Options volume Data volume, in megabytes. · Range: 1 through 1024 Required Privilege Level interface--To view this statement in the configuration. interface-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Release 19.3R1 on MX Series. RELATED DOCUMENTATION Configuring an LRF Profile for Subscribers Configuring Logging and Reporting for Junos OS Subscriber Aware Configuring Logging and Reporting for Subscriber Management watchdog-timeout IN THIS SECTION Syntax | 761 Hierarchy Level | 761 Description | 761 761 Options | 761 Required Privilege Level | 761 Release Information | 761 Syntax watchdog-timeout seconds; Hierarchy Level [edit access diameter peer peer-name] Description Configure the amount of time to wait for a Device-Watchdog-Answer message. Options seconds Amount of time to wait. · Range: 1 through 65,535 seconds · Default: 30 seconds Required Privilege Level access--To view this statement in the configuration. access-control--To add this statement to the configuration. Release Information Statement introduced in Junos OS Release 17.1. 762 RELATED DOCUMENTATION diameter (Subscriber Aware Policy Control) | 368 763 CHAPTER 13 Operational Commands IN THIS CHAPTER clear services application-identification application-system-cache | 765 clear services application-identification statistics | 767 clear services lrf collector statistics | 769 clear services lrf statistics | 771 clear services sessions | 772 clear unified-edge tdf aaa radius client statistics | 777 clear unified-edge tdf aaa radius network-element statistics | 779 clear unified-edge tdf aaa radius server statistics | 781 clear unified-edge tdf aaa radius snoop-segment statistics | 782 clear unified-edge tdf aaa statistics | 784 clear unified-edge tdf address-assignment pool | 786 clear unified-edge tdf address-assignment statistics | 788 clear unified-edge tdf call-admission-control statistics | 790 clear unified-edge tdf diameter network-element statistics | 791 clear unified-edge tdf diameter pcc-gx statistics | 793 clear unified-edge tdf diameter peer statistics | 795 clear unified-edge tdf statistics | 797 clear unified-edge tdf subscribers | 798 clear unified-edge tdf subscribers peer | 800 request interface load-balancing revert (Aggregated Multiservices) | 802 request interface load-balancing switchover (Aggregated Multiservices) | 804 request services application-identification application | 806 request services application-identification download | 808 request services application-identification download status | 809 request services application-identification group | 811 request services application-identification install | 813 764 request services application-identification install status | 814 request services application-identification proto-bundle-status | 816 request services application-identification uninstall | 817 request services application-identification uninstall status | 819 request unified-edge tdf call-trace clear | 820 request unified-edge tdf call-trace show | 822 request unified-edge tdf call-trace start | 826 request unified-edge tdf call-trace stop | 829 show interfaces anchor-group (Aggregated Packet Forwarding Engine) | 831 show interfaces load-balancing (Aggregated Multiservices) | 836 show services application-identification application | 841 show services application-identification application-system-cache | 850 show services application-identification counter | 856 show services application-identification group | 860 show services application-identification statistics application-groups | 865 show services application-identification statistics applications | 868 show services application-identification status | 870 show services application-identification version | 873 show services ha detail | 874 show services ha statistics | 877 show services hcm statistics | 885 show services hcm pic-statistics | 888 show services lrf collector statistics | 896 show services lrf rule statistics | 898 show services lrf statistics | 901 show services lrf template | 903 show services traffic-detection-function hcm statistics | 906 show services traffic-detection-function sessions | 911 show unified-edge tdf aaa radius client statistics | 915 show unified-edge tdf aaa radius client status | 923 show unified-edge tdf aaa radius network-element statistics | 925 show unified-edge tdf aaa radius server statistics | 930 765 show unified-edge tdf aaa radius server status | 936 show unified-edge tdf aaa radius snoop-segment statistics | 940 show unified-edge tdf aaa statistics | 945 show unified-edge tdf address-assignment pool | 958 show unified-edge tdf address-assignment service-mode | 964 show unified-edge tdf address-assignment statistics | 967 show unified-edge tdf call-admission-control statistics | 970 show unified-edge tdf call-rate statistics | 974 show unified-edge tdf diameter network-element statistics | 978 show unified-edge tdf diameter network-element status | 981 show unified-edge tdf diameter pcc-gx statistics | 984 show unified-edge tdf diameter peer statistics | 992 show unified-edge tdf diameter peer status | 999 show unified-edge tdf domain service-mode | 1004 show unified-edge tdf domain statistics | 1007 show unified-edge tdf resource-manager clients | 1014 show unified-edge tdf service-mode | 1017 show unified-edge tdf statistics | 1020 show unified-edge tdf status | 1032 show unified-edge tdf subscribers | 1038 show unified-edge tdf system interfaces | 1059 show unified-edge tdf system interfaces service-mode | 1061 clear services application-identification application-system-cache IN THIS SECTION Syntax | 766 Description | 766 Options | 766 766 Required Privilege Level | 766 Output Fields | 766 Sample Output | 766 Release Information | 766 Syntax clear services application-identification application-system-cache Description Clear entries from the application system cache. Options This command has no options. Required Privilege Level clear Output Fields When you enter this command, you are provided no feedback on the status of your request. Sample Output clear services application-identification application-system-cache user@host> clear services application-identification application-system-cache Release Information Statement introduced in Junos OS Release 17.1. 767 RELATED DOCUMENTATION show services application-identification application-system-cache clear services application-identification statistics IN THIS SECTION Syntax | 767 Description | 767 Options | 767 Required Privilege Level | 768 Output Fields | 768 Sample Output | 768 Release Information | 769 Syntax clear services application-identification statistics <cumulative> <interval> <logical-system (logical-system-name | all | root-logical-system)> <tenant (tenant-name | all)> Description Clears all Junos OS application statistics such as cumulative, interval, applications, and application groups. Options cumulative (Optional) Clears the cumulative application statistics. 768 interval (Optional) Clears the application interval statistics. Interval statistics are displayed in Top-N format, such that the first application group displayed has the largest byte count. If this parameter is not specified, then the default is 1, which is the current interval. logical-system (Optional) Clears application identification statistics of the specified logical logical-system-name system. logical-system all (Optional) Clears application identification statistics of all the logical systems. root-logical-system (Optional) Clears application identification statistics of the root logical system. tenant tenant-name (Optional) Clears application identification statistics of the specified tenant system. tenant all (Optional) Clears application identification statistics of all the tenant systems. Required Privilege Level clear Output Fields When you enter this command, you are provided no feedback on the status of your request. Sample Output clear services application-identification statistics user@host> clear services application-identification statistics appid statistics cleared clear services application-identification statistics logical-system all user@host> clear services application-identification statistics logical-system all appid statistics cleared 769 clear services application-identification statistics cumulative tenant TSYS1 user@host> clear services application-identification statistics cumulative tenant TSYS1 appid statistics cleared clear services application-identification statistics cumulative tenant all user@host> clear services application-identification statistics cumulative tenant all appid statistics cleared clear services application-identification statistics cumulative user@host:TSYS1> clear services application-identification statistics cumulative appid statistics cleared Release Information Statement introduced in Junos OS Release 17.1 on MX Series. logical-system option introduced in Junos OS Release 18.3R1 on SRX Series. tenant option introduced in Junos OS Release 19.4R1 on SRX Series. RELATED DOCUMENTATION show services application-identification statistics applications show services application-identification statistics application-groups clear services lrf collector statistics IN THIS SECTION Syntax | 770 770 Description | 770 Options | 770 Required Privilege Level | 770 Output Fields | 770 Sample Output | 771 Release Information | 771 Syntax clear services lrf collector statistics <collector-name> Description Clear all the LRF statistics for the specified collector. If a collector is not specified, statistics are cleared for all collectors. Options none collector-name Clear LRF statistics for all collectors. (Optional) Clear LRF statistics for the specified collector. Required Privilege Level clear Output Fields A message is displayed on successful execution of this command; otherwise an error message is displayed. 771 Sample Output clear services lrf collector statistics user@host> clear services lrf collector statistics coll1 Interface: ms-0/1/0, Status: LRF collector statistics successfully cleared Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show services lrf collector statistics clear services lrf statistics IN THIS SECTION Syntax | 771 Description | 772 Required Privilege Level | 772 Output Fields | 772 Sample Output | 772 Release Information | 772 Syntax clear services lrf statistics 772 Description Clear all the LRF statistics. Required Privilege Level clear Output Fields A message is displayed on successful execution of this command; otherwise an error message is displayed. Sample Output clear services lrf statistics user@host> clear services lrf statistics Interface: ms-0/1/0, Status: LRF statistics successfully cleared Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show services lrf statistics clear services sessions IN THIS SECTION Syntax | 773 Description | 773 773 Options | 773 Required Privilege Level | 776 Output Fields | 776 Sample Output | 776 Release Information | 777 Syntax clear services sessions <application-protocol protocol> <destination-port destination-port> <destination-prefix destination-prefix> <interface interface-name> <ip-action> <protocol protocol> <service-set service-set> <source-port source-port> <source-prefix source-prefix> Description Clear services sessions currently active on the embedded PIC or MIC. When you enter this command, the sessions are marked for deletion and are cleared thereafter. The time that is taken to clear the currently active sessions varies, depending on the scaled nature of the environment. Options none Clear all sessions. applicationprotocol protocol (Optional) Clear sessions for one of the following application protocols: · bootp--Bootstrap protocol · dce-rpc--Distributed Computing Environment-Remote Procedure Call protocols 774 · dce-rpc-portmap--Distributed Computing Environment-Remote Procedure Call protocols portmap service · dns--Domain Name System protocol · exec--Exec · ftp--File Transfer Protocol · h323--H.323 standards · icmp--Internet Control Message Protocol · iiop--Internet Inter-ORB Protocol · ip--IP · login--Login · netbios--NetBIOS · netshow--NetShow · pptp--Point-to-Point Tunneling Protocol · realaudio--RealAudio · rpc--Remote Procedure Call protocol · rpc-portmap--Remote Procedure Call protocol portmap service · rtsp--Real-Time Streaming Protocol · shell--Shell · sip--Session Initiation Protocol · snmp--Simple Network Management Protocol · sqlnet--SQLNet · talk--Talk Program · tftp--Trivial File Transfer Protocol · traceroute--Traceroute · winframe--WinFrame 775 destination-port destination-port (Optional) Clear sessions for the specified destination port. The range of values is from 0 to 65535. destination-prefix destination-prefix interface interface-name (Optional) Clear sessions for the specified destination prefix. (Optional) Clear sessions for the specified interface. On M Series and T Series routers, the interface-name can be ms-fpc/ pic/ port or rspnumber. ip-action (Optional) Clear ip-action entries generated by the router to log, drop, or block traffic based on previous matches. The IP action options and targets are configured at the {edit security idp idp-policy policy-name rulebase-ips rule rule-name then] hierarchy level. protocol protocol (Optional) Clear sessions for one of the following IP types: · number--Numeric protocol value from 0 to 255 · ah--IPsec Authentication Header protocol · egp--An exterior gateway protocol · esp--IPsec Encapsulating Security Payload protocol · gre--A generic routing encapsulation protocol · icmp--Internet Control Message Protocol · icmp6--Internet Control Message Protocol version 6 · igmp--Internet Group Management Protocol · ipip--IP-over-IP Encapsulation Protocol · ospf--Open Shortest Path First protocol · pim--Protocol Independent Multicast protocol · rsvp--Resource Reservation Protocol · sctp--Stream Control Transmission Protocol · tcp--Transmission Control Protocol · udp--User Datagram Protocol service-set service-set (Optional) Clear sessions for the specified service set. 776 source-port source-port source-prefix source-prefix (Optional) Clear sessions for the specified source port. The range of values is from 0 through 65535. (Optional) Clear sessions for the specified source prefix. Required Privilege Level clear Output Fields Table 13 on page 776 lists the output fields for the clear services sessions command. Output fields are listed in the approximate order in which they appear. Table 13: clear services sessions Output Fields Field Name Field Description Interface Name of an interface. Service set Name of the service set from which sessions are being cleared. Sessions marked for deletion Number of sessions that are marked for deletion and are subsequently cleared. Sample Output clear services sessions user@host>clear services sessions Interface Service set ms-0/0/0 sset Sessions marked for deletion 10 777 Release Information Command introduced in Junos OS Release 13.1. RELATED DOCUMENTATION show services sessions clear unified-edge tdf aaa radius client statistics IN THIS SECTION Syntax | 777 Description | 778 Options | 778 Required Privilege Level | 778 Output Fields | 778 Sample Output | 778 Release Information | 779 Syntax clear unified-edge tdf aaa radius client statistics <all> <client name> <fpc-slot fpc-slot> <gateway gateway> <pic-slot pic-slot> 778 Description Clear statistics for the accounting requests and responses transmitted and received by the RADIUS client for one or more TDF gateways. If a TDF gateway is not specified, then information for all TDF gateways is cleared. Options none (Same as all) Clear statistics for all clients on all TDF gateways. all (Optional) Clear statistics for all the clients. client name (Optional) Clear statistics for the specified client. fpc-slot fpc-slot (Optional) Clear statistics for the specified Flexible PIC Concentrator (FPC). gateway gateway (Optional) Clear statistics for the specified TDF gateway. pic-slot pic-slot (Optional) Clear statistics for the specified PIC slot number. You must first specify an FPC slot number before specifying the PIC slot number. Required Privilege Level clear, unified-edge Output Fields When you enter this command, you are provided feedback on the status of your request. Sample Output clear unified-edge tdf aaa radius client statistics all user@host> clear unified-edge tdf aaa radius client statistics all Cleared all RADIUS statistics 779 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show unified-edge tdf aaa radius client statistics | 915 clear unified-edge tdf aaa radius network-element statistics IN THIS SECTION Syntax | 779 Description | 779 Options | 780 Required Privilege Level | 780 Output Fields | 780 Sample Output | 780 Release Information | 780 Syntax clear unified-edge tdf aaa radius network-element statistics <fpc-slot fpc-slot> <gateway gateway> <pic-slot pic-slot> <name name> Description Clear all the statistics for the specified network element. 780 Options none Clear statistics for all network elements for all TDF gateways. fpc-slot fpc-slot (Optional) Clear statistics for the specified Flexible PIC Concentrator (FPC). gateway gateway (Optional) Clear statistics for the specified TDF gateway. pic-slot pic-slot (Optional) Clear statistics for the specified PIC slot number. You must first specify an FPC slot number before specifying the PIC slot number. name name (Optional) Clear statistics for the specified network element. Required Privilege Level clear, unified-edge Output Fields No message is displayed on successful execution of this command; otherwise, an error message is displayed. Sample Output clear unified-edge tdf aaa radius network-element statistics user@host> clear unified-edge tdf aaa radius network-element statistics Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show unified-edge tdf aaa radius network-element statistics | 925 Understanding Network Elements | 71 781 clear unified-edge tdf aaa radius server statistics IN THIS SECTION Syntax | 781 Description | 781 Options | 781 Required Privilege Level | 782 Output Fields | 782 Sample Output | 782 Release Information | 782 Syntax clear unified-edge tdf aaa radius server statistics <fpc-slot fpc-slot> <gateway gateway> <pic-slot pic-slot> <name name> Description Clear all the statistics for the specified RADIUS server. Options none Clear statistics for all RADIUS servers for all TDF gateways. fpc-slot fpc-slot (Optional) Clear statistics for the specified Flexible PIC Concentrator (FPC). gateway gateway (Optional) Clear statistics for the specified TDF gateway. pic-slot pic-slot (Optional) Clear statistics for the specified PIC slot number. You must first specify an FPC slot number before specifying the PIC slot number. 782 name name (Optional) Clear statistics for the specified RADIUS server. Required Privilege Level clear, unified-edge Output Fields No message is displayed on successful execution of this command; otherwise, an error message is displayed. Sample Output clear unified-edge tdf aaa radius server statistics user@host> clear unified-edge tdf aaa radius server statistics Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show unified-edge tdf aaa radius server statistics | 930 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 clear unified-edge tdf aaa radius snoop-segment statistics IN THIS SECTION Syntax | 783 Description | 783 Options | 783 783 Required Privilege Level | 783 Output Fields | 784 Sample Output | 784 Release Information | 784 Syntax clear unified-edge tdf aaa radius snoop-segment <fpc-slot fpc-slot> <gateway gateway> <pic-slot pic-slot> <segment snoop-segment-name> statistics Description Clear all snoop segment statistics for FPCs, PICs, TDF gateways, or snoop segments that you specify. Options none fpc-slot fpc-slot gateway gateway pic-slot pic-slot segment snoopsegment-name Clear all snoop-segment statistics for all TDF gateways. (Optional) Clear statistics for the specified Flexible PIC Concentrator (FPC). (Optional) Clear statistics for the specified TDF gateway. (Optional) Clear statistics for the specified PIC slot number. You must first specify an FPC slot number before specifying the PIC slot number. (Optional) Clear statistics for the specified snoop segment. Required Privilege Level clear, unified-edge 784 Output Fields A message is displayed on successful execution of this command; otherwise an error message is displayed. Sample Output clear unified-edge tdf aaa radius snoop-segment statistics user@host> clear unified-edge tdf aaa radius snoop-segment statistics Cleared Radius snoop-segment Statistics Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show unified-edge tdf aaa radius snoop-segment statistics | 940 Snooping RADIUS Accounting Requests for IP-Based Subscribers Overview | 114 clear unified-edge tdf aaa statistics IN THIS SECTION Syntax | 785 Description | 785 Options | 785 Required Privilege Level | 785 Output Fields | 785 Sample Output | 786 Release Information | 786 785 Syntax clear unified-edge tdf aaa statistics <all> <fpc-slot fpc-slot> <gateway gateway> <pic-slot pic-slot> Description Clear global authentication, authorization, and accounting (AAA) statistics for one or more TDF gateways. If a TDF gateway is not specified, then information for all TDF gateways is cleared. Options none (Same as all) Clear AAA statistics for all TDF gateways. all (Optional) Clear AAA statistics for all the TDF gateways. fpc-slot fpc-slot (Optional) Clear AAA statistics for the specified Flexible PIC Concentrator (FPC). gateway gateway (Optional) Clear AAA statistics for the specified TDF gateway. pic-slot pic-slot (Optional) Clear AAA statistics for the specified PIC slot number. You must first specify an FPC slot number before specifying the PIC slot number. Required Privilege Level clear, unified-edge Output Fields When you enter this command, you are provided feedback on the status of your request. 786 Sample Output clear unified-edge tdf aaa statistics all user@host> clear unified-edge tdf aaa statistics all Cleared all AAA statistics Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show unified-edge tdf aaa statistics | 945 clear unified-edge tdf address-assignment pool IN THIS SECTION Syntax | 787 Description | 787 Options | 787 Required Privilege Level | 787 Output Fields | 787 Sample Output | 787 Release Information | 788 787 Syntax clear unified-edge tdf address-assignment pool name pool-name <gateway gateway> <routing-instance routing-instance> Description Clear the sessions that have been assigned addresses from the specified mobile pool for one or more TDF gateways. If a TDF gateway is not specified, then the sessions for all TDF gateways are cleared. Options none name pool-name gateway gateway routing-instance routing-instance Clear the sessions for all TDF gateways associated with the specified mobile pool. Clear the sessions for the specified mobile pool. (Optional) Clear the sessions on the specified TDF gateway. (Optional) Clear the sessions on the specified routing instance. Required Privilege Level clear, unified-edge Output Fields When you enter this command, you are provided feedback on the status of your request. Sample Output clear unified-edge tdf address-assignment pool name user@host> clear unified-edge tdf address-assignment pool name pool-1 Initiated clearing of sessions in the pool 788 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show unified-edge tdf address-assignment pool | 958 clear unified-edge tdf address-assignment statistics IN THIS SECTION Syntax | 788 Description | 788 Options | 789 Required Privilege Level | 789 Output Fields | 789 Sample Output | 789 Release Information | 789 Syntax clear unified-edge tdf address-assignment statistics <fpc-slot fpc-slot> <gateway gateway> <pic-slot pic-slot> Description Clear the global address assignment statistics for one or more TDF gateways. If a TDF gateway is not specified, then the statistics for all TDF gateways are cleared. 789 Options none Clear statistics for all TDF gateways. fpc-slot fpc-slot (Optional) Clear the statistics for the session PIC in the specified FPC slot. gateway gateway (Optional) Clear the statistics for the specified TDF gateway. pic-slot pic-slot (Optional) Clear information about the session PIC in this particular PIC slot. For routers, replace pic-slot with a value from 0 through 3. Required Privilege Level clear, unified-edge Output Fields When you enter this command, you are provided feedback on the status of your request. Sample Output clear unified-edge tdf address-assignment statistics user@host> clear unified-edge tdf address-assignment statistics Cleared address-assignment statistics Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show unified-edge tdf address-assignment statistics | 967 790 clear unified-edge tdf call-admission-control statistics IN THIS SECTION Syntax | 790 Description | 790 Options | 790 Required Privilege Level | 790 Output Fields | 791 Sample Output | 791 Release Information | 791 Syntax clear unified-edge tdf call-admission-control statistics gateway gateway-name <fpc-slot fpc-slot> <pic-slot pic-slot> Description Clear call admission control (CAC) statistics for the specified TDF gateway. Options fpc-slot fpc-slot gateway gateway-name pic-slot pic-slot (Optional) Clear statistics for the session PIC in the specified FPC slot. Clear CAC statistics for the specified TDF gateway. (Optional) Clear statistics for the session PIC in the specified PIC slot. Required Privilege Level clear, unified-edge 791 Output Fields No message is displayed on successful execution of this command; otherwise an error message is displayed. Sample Output clear unified-edge tdf call-admission-control statistics gateway user@host> clear unified-edge tdf call-admission-control statistics gateway TDF Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show unified-edge tdf call-admission-control statistics | 970 clear unified-edge tdf diameter network-element statistics IN THIS SECTION Syntax | 792 Description | 792 Options | 792 Required Privilege Level | 792 Output Fields | 792 Sample Output | 793 Release Information | 793 792 Syntax clear unified-edge tdf diameter network-element statistics <fpc-slot fpc-slot> <gateway gateway-name> <network-element-name network-element-name> <pic-slot pic-slot> Description Clear the statistics for network elements for one or more TDF gateways. If a network element is not specified, then statistics for all network elements are cleared. If a TDF gateway is not specified, then statistics for all TDF gateways are cleared. Options none fpc-slot fpc-slot gateway gateway-name network-element-name network-element-name pic-slot pic-slot Clear statistics for all network elements and TDF gateways. (Optional) Clear statistics for the specified Flexible PIC Concentrator (FPC). (Optional) Clear statistics for the specified TDF gateway. (Optional) Clear statistics for the specified network element. (Optional) Clear statistics for the specified PIC slot number. You must first specify an FPC slot number before specifying the PIC slot number. Required Privilege Level clear, unified-edge Output Fields No message is displayed on successful execution of this command; otherwise an error message is displayed. 793 Sample Output clear unified-edge tdf diameter network-element statistics user@host> clear unified-edge tdf diameter network-element statistics Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show unified-edge tdf diameter network-element statistics | 978 clear unified-edge tdf diameter pcc-gx statistics IN THIS SECTION Syntax | 793 Description | 794 Options | 794 Required Privilege Level | 794 Output Fields | 794 Sample Output | 794 Release Information | 794 Syntax clear unified-edge tdf diameter pcc-gx statistics <fpc-slot fpc-slot> 794 <gateway gateway-name> <pic-slot pic-slot> Description Clear all statistics for the Gx application for one or more TDF gateways. If a TDF gateway is not specified, then statistics for all TDF gateways are cleared. Options none fpc-slot fpc-slot gateway gatewayname pic-slot pic-slot Clear Gx application statistics for all TDF gateways. (Optional) Clear statistics for the specified Flexible PIC Concentrator (FPC). (Optional) Clear statistics for the specified TDF gateway. (Optional) Clear statistics for the specified PIC slot number. You must first specify an FPC slot number before specifying the PIC slot number. Required Privilege Level clear, unified-edge Output Fields No message is displayed on successful execution of this command; otherwise an error message is displayed. Sample Output clear unified-edge tdf diameter pcc-gx statistics user@host> clear unified-edge tdf diameter pcc-gx statistics Release Information Statement introduced in Junos OS Release 17.1. 795 RELATED DOCUMENTATION clear unified-edge tdf diameter pcc-gx statistics | 793 clear unified-edge tdf diameter peer statistics IN THIS SECTION Syntax | 795 Description | 795 Options | 795 Required Privilege Level | 796 Output Fields | 796 Sample Output | 796 Release Information | 796 Syntax clear unified-edge tdf diameter peer statistics <fpc-slot fpc-slot> <gateway gateway-name> <peer-name peer-name> <pic-slot pic-slot> Description Clear statistics for Diameter peers for one or more TDF gateways. If a peer is not specified, then statistics for all peers are cleared. If a TDF gateway is not specified, then statistics for all TDF gateways are cleared. Options none Clear Diameter peer statistics for all TDF gateways. 796 fpc-slot fpc-slot (Optional) Clear statistics for the specified Flexible PIC Concentrator (FPC). gateway gateway-name (Optional) Clear statistics for the specified TDF gateway. peer-name peer-name (Optional) Clear statistics for the specified peer. pic-slot pic-slot (Optional) Clear statistics for the specified PIC slot number. You must first specify an FPC slot number before specifying the PIC slot number. Required Privilege Level clear, unified-edge Output Fields No message is displayed on successful execution of this command; otherwise an error message is displayed. Sample Output clear unified-edge tdf diameter peer statistics user@host> clear unified-edge tdf diameter peer statistics Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show unified-edge tdf diameter peer statistics | 992 797 clear unified-edge tdf statistics IN THIS SECTION Syntax | 797 Description | 797 Options | 797 Required Privilege Level | 798 Output Fields | 798 Sample Output | 798 Release Information | 798 Syntax clear unified-edge tdf statistics <data-plane> <gateway gateway-name> <domain domain-name Description Clear all the statistics for the specified TDF gateway, domain, or control plane. Options none data-plane domain domain-name gateway gateway-name Clear statistics for all TDF control planes, domains, and gateways. (Optional) Clear statistics for the data plane. (Optional) Clear statistics for the specified TDF domain. (Optional) Clear statistics for the specified TDF gateway. 798 Required Privilege Level clear, unified-edge Output Fields No message is displayed on successful execution of this command; otherwise an error message is displayed. Sample Output clear unified-edge tdf statistics gateway user@host> clear unified-edge tdf statistics gateway TDF Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show unified-edge tdf statistics | 1020 clear unified-edge tdf subscribers IN THIS SECTION Syntax | 799 Description | 799 Options | 799 Required Privilege Level | 800 Output Fields | 800 799 Sample Output | 800 Release Information | 800 Syntax clear unified-edge tdf subscribers [option] Description Clear the subscribers identified by the option values. You must include at least one option. For IFL-based subscribers, use the revert option to re-create the cleared subscribers identified by the option values. Options option One or more of the following options: · domain domain-name--Clear the subscribers for the specified TDF domain. · gateway gateway-name--Clear the subscribers for the specified TDF gateway. · interface interface-name--Clear the subscribers on the specified multiservices interface, aggregated multiservices interface, Packet Forwarding Engine interface, or aggregated Packet Forwarding Engine interface names. · peer peer-name--Clear the subscriber matching GPRS tunneling protocol (GTP) peer on the specified TDF gateway. · revert--For an IFL-based subscriber, recreate an IFL-subscriber that was cleared. · routing-instance routing-instance--Clear the subscriber information for the specified routing instance. · subscriber-name subscriber-name--Clear the specified IFL-based subscriber. · v4-addr v4-addr--Clear the subscriber information for the specified IPv4 address of the IPbased subscriber's user equipment (UE). · v6-addr v6-addr--Clear the subscriber information for the specified IPv6 address of the IPbased subscriber's user equipment. 800 Required Privilege Level clear, unified-edge Output Fields No message is displayed on successful execution of this command; otherwise an error message is displayed. Sample Output clear unified-edge tdf subscribers gateway tdf user@host> clear unified-edge tdf subscribers gateway tdf Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION clear unified-edge tdf statistics | 797 clear unified-edge tdf subscribers peer | 800 show unified-edge tdf subscribers | 1038 IP-Based and IFL-Based TDF Subscribers Overview | 107 Understanding IFL-Based Subscriber Setup | 115 clear unified-edge tdf subscribers peer IN THIS SECTION Syntax | 801 801 Description | 801 Options | 801 Required Privilege Level | 802 Output Fields | 802 Sample Output | 802 Release Information | 802 Syntax clear unified-edge tdf subscribers peer <gateway gateway> <remote-addr remote-addr> <nas-id nas-id <routing-instance routing-instance> Description Clear the information for IP-based subscribers anchored on the specified RADIUS client, TDF gateway, or both, or for IP-based subscribers matching the specified routing instance. Options none gateway gateway nas-id nas-id remote-addr remoteaddr routing-instance routing-instance Clear information for all IP-based subscribers. (Optional) Clear IP-based subscriber information for the TDF gateway. (Optional) Clear IP-based subscriber information for the specified NAS identifier of the RADIUS client. (Optional) Clear IP-based subscriber information for the specified IPv4 address of the RADIUS client. (Optional) Clear IP-based subscriber information for the specified routing instance. 802 Required Privilege Level clear, unified-edge Output Fields No message is displayed on successful execution of this command; otherwise an error message is displayed. Sample Output clear unified-edge tdf subscribers peer gateway remote-addr user@host> clear unified-edge tdf subscribers peer gateway TDF remote-addr 198.0.2.2 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION clear unified-edge tdf subscribers | 798 show unified-edge tdf subscribers | 1038 request interface load-balancing revert (Aggregated Multiservices) IN THIS SECTION Syntax | 803 Description | 803 Options | 803 Required Privilege Level | 803 803 Output Fields | 803 Sample Output | 803 Release Information | 804 Syntax request interface load-balancing revert interface-name Description Revert the aggregated multiservices member interface (mams-) from the inactive state to the active or backup state based on the configuration and the operational state of the aggregated multiservices interface. Options interfacename Name of the member interface. The member interface format is mams-a/b/0, where a is the FPC slot number and b is the PIC slot number. Required Privilege Level view Output Fields When you enter this command, you are provided feedback on the status of your request. Sample Output request interface load-balancing revert user@host> request interface load-balancing revert mams-4/0/0 request succeeded 804 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION request interface load-balancing switchover (Aggregated Multiservices) | 804 request interface load-balancing switchover (Aggregated Multiservices) IN THIS SECTION Syntax | 804 Description | 804 Options | 805 Required Privilege Level | 805 Output Fields | 805 Sample Output | 805 Release Information | 805 Syntax request interface load-balancing switchover interface-name <force> Description Switch the active member interface to the backup state. In the case of mobile control plane redundancy, the behavior depends on the replication state of the member interface: 805 · If the sync state is in-sync, then the active member is rebooted and the backup member becomes the new active member. · If the sync-state is in-progress, then the force option must be used to force the switchover. CAUTION: In this case, there is a risk of losing subscriber information because the synchronization has not yet been completed. Options interface-name Name of the member interface. The member interface format is mams-a/b/0, where a is the FPC slot number and b is the PIC slot number. force (Optional) Force the switchover from the active member to the backup member. Required Privilege Level view Output Fields When you enter this command, you are provided feedback on the status of your request. Sample Output request interface load-balancing switchover force user@host> request interface load-balancing switchover force mams-4/0/0 Switchover Initiated Release Information Statement introduced in Junos OS Release 17.1. 806 RELATED DOCUMENTATION request interface load-balancing revert (Aggregated Multiservices) | 802 request services application-identification application IN THIS SECTION Syntax | 806 Description | 806 Options | 806 Required Privilege Level | 807 Output Fields | 807 Sample Output | 807 Release Information | 807 Syntax request services application-identification application <disable | enable> predefined-application-name Description Disable or enable a predefined application signature. Options predefined-application-name--Application name; a maximum of up to 31 characters. Predefined applications have the prefix junos- to avoid conflict with user-defined ones. Do not name your custom application signature with the junos prefix; this prefix is reserved for predefined application signatures. disable-- (Optional) Disable a predefined application signature, initiate signature recompilation, and commit all pending uncompiled signatures to the configuration. The following conditions apply: 807 · You cannot disable a predefined application signature that is referenced by an active security policy or custom application signature. First modify or deactivate the policy or custom application signature. · If you disable an application signature, for example, junos:HTTP, that has nested applications, the nested applications are not recognized. enable--(Optional) Enable a predefined application signature, initiate signature recompilation, and commit all pending uncompiled signatures to the configuration. Include the no-commit keyword to defer signature recompilation. Required Privilege Level maintenance Output Fields When you enter this command, the system provides feedback on the status of your request. Sample Output request services application-identification application disable user@host> request services application-identification application disable junos:163 Please wait while we are re-compiling signatures .. Please wait while we are re-compiling signatures .. Please wait while we are re-compiling signatures .. Please wait while we are re-compiling signatures .. Disable application junos:163 succeed. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show services application-identification application 808 request services application-identification download IN THIS SECTION Syntax | 808 Description | 808 Options | 808 Required Privilege Level | 808 Output Fields | 808 Sample Output | 809 Release Information | 809 Syntax request services application-identification download <version version-number>; Description Manually download the application package for Junos OS application identification. The application package is extracted from the IDP signature database and contains signature definitions for known applications, such as DNS, Facebook, FTP, Skype, and SNMP. Options version version-number--(Optional) Download the specified version of the application package from the Juniper Networks website. If you do not enter a version, the most recent version is downloaded. Required Privilege Level maintenance Output Fields When you enter this command, you are shown the command to use to check the status of your download. 809 Sample Output request services application-identification download user@host> request services application-identification download Please use command "request services application-identification download status" to check status Release Information Statement introduced in Junos OS Release 17.1 on MX Series. RELATED DOCUMENTATION request services application-identification install request services application-identification download status request services application-identification download status IN THIS SECTION Syntax | 810 Description | 810 Required Privilege Level | 810 Output Fields | 810 Sample Output | 810 Release Information | 810 810 Syntax request services application-identification download status Description Check the download status of the application signature package. The downloaded application package is saved under /var/db/appid/sec-download/. Required Privilege Level maintenance Output Fields When you enter this command, the system provides feedback on the status of your request. Sample Output request services application-identification download status user@host> request services application-identifications download status Application package 1608 is downloaded successfully. Release Information Statement introduced in Junos OS Release 17.1 on MX Series. RELATED DOCUMENTATION request services application-identification download 811 request services application-identification group IN THIS SECTION Syntax | 811 Description | 811 Options | 811 Required Privilege Level | 812 Output Fields | 812 Sample Output | 812 Release Information | 812 Syntax request services application-identification group (copy | disable | enable) predefined-application-group-name Description Copy, disable, or enable a predefined application signature group. Options predefined-application-group-name--Identifier for the application group. Maximum length is 32 characters. copy--Copy the specified predefined application signature group from the database to the configuration and change the name (for example, my:FTP). The ID and order are generated automatically. You can copy the same predefined application signature group only once. You cannot copy duplicate custom signature groups. NOTE: In configuration mode, if an uncommitted action is pending, the request services application-identification group copy command fails. 812 disable--Disable the specified predefined application signature group. NOTE: You cannot disable a predefined application signature group that is referenced by an active security policy or custom application signature group. First modify or deactivate the policy or custom application signature group. enable--Enable the specified predefined application signature group. Required Privilege Level maintenance Output Fields When you enter this command, the system provides feedback on the status of your request. Sample Output request services application-identification group copy user@host> request services application-identification group copy junos:SYBASE group 1040 copied successfully. Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show services application-identification group 813 request services application-identification install IN THIS SECTION Syntax | 813 Description | 813 Required Privilege Level | 813 Output Fields | 813 Sample Output | 814 Release Information | 814 Syntax request services application-identification install Description Install the downloaded predefined application signature package. The install operation fails if any custom application signatures or custom application signature groups have been manually inserted before any predefined application signatures or predefined application signature groups in the Junos OS configuration. Remove any insert-before signatures, then retry the install operation. This command does not display the installation status and only provides an informational message on the types of commands to use to verify the installation status of the application signature package and the protocol bundle. Required Privilege Level maintenance Output Fields When you enter this command, you are shown the command to use to check the status of your installation request. 814 Sample Output request services application-identification install user@host> request services application-identification install Please use command "request services application-identification install status" to check status and use command "request services application-identification proto-bundle-status" to check protocol bundle status Release Information Statement introduced in Junos OS Release 17.1 on MX Series. RELATED DOCUMENTATION request services application-identification download request services application-identification install status request services application-identification install status IN THIS SECTION Syntax | 815 Description | 815 Required Privilege Level | 815 Output Fields | 815 Sample Output | 815 Release Information | 815 815 Syntax request services application-identification install status Description Display the status of the install operation. Required Privilege Level maintenance Output Fields When you enter this command, the system provides feedback on whether your request succeeded or failed. Sample Output request services application-identification install status user@host> request services application-identification install status Install application package version (1776) succeed. Release Information Statement introduced in Junos OS Release 17.1 on MX Series. RELATED DOCUMENTATION request services application-identification install 816 request services application-identification proto-bundle-status IN THIS SECTION Syntax | 816 Description | 816 Required Privilege Level | 816 Output Fields | 816 Sample Output | 817 Release Information | 817 Syntax request services application-identification proto-bundle-status Description Display the status of the install operation of the protocol bundle. This command provides feedback on whether your request succeeded or failed. Required Privilege Level maintenance Output Fields When you enter this command, the system provides feedback on whether your request succeeded or failed. 817 Sample Output request services application-identification proto-bundle-status user@host> request services application-identification proto-bundle-status Protocol Bundle Version (1.30.4-22.005 (build date Jan 17 2014)) and application secpack version (2345) is loaded and activated. Release Information Statement introduced in Junos OS Release 17.1 on MX Series. RELATED DOCUMENTATION request services application-identification install request services application-identification uninstall IN THIS SECTION Syntax | 817 Description | 818 Required Privilege Level | 818 Output Fields | 818 Sample Output | 818 Release Information | 818 Syntax request services application-identification uninstall 818 Description Uninstall the predefined application package. The uninstall operation fails if any active security policies, custom application signatures, or custom application signature groups reference predefined application signatures or predefined application signature groups in the Junos OS configuration. This command does not display the uninstallation status and only provides an informational message on the types of commands to use to verify the uninstallation status of the application signature package and the protocol bundle. Required Privilege Level maintenance Output Fields When you enter this command, you are shown the command to use to check the status of your uninstall request. Sample Output request services application-identification uninstall user@host> request services application-identification uninstall Please use command "request services application-identification uninstall status" to check status and use command "request services applicationidentification proto-bundle-status" to check protocol bundle status Release Information Statement introduced in Junos OS Release 17.1 on MX Series. RELATED DOCUMENTATION request services application-identification install 819 request services application-identification uninstall status IN THIS SECTION Syntax | 819 Description | 819 Required Privilege Level | 819 Output Fields | 819 Sample Output | 820 Release Information | 820 Syntax request services application-identification uninstall status Description Display the status of the uninstall operation. This command provides information on whether the uninstall operation succeeded or failed. Required Privilege Level maintenance Output Fields When you enter this command, the system provides feedback on whether the request succeeded or failed.. 820 Sample Output request services application-identification uninstall status user@host> request services application-identification uninstall status Uninstall application package version (1776) succeed. Release Information Statement introduced in Junos OS Release 17.1 on MX Series. RELATED DOCUMENTATION request services application-identification uninstall request unified-edge tdf call-trace clear IN THIS SECTION Syntax | 820 Description | 821 Options | 821 Required Privilege Level | 821 Output Fields | 821 Sample Output | 821 Release Information | 821 Syntax request unified-edge tdf call-trace clear 821 Description Clear the completed or duplicate subscriber call traces on one or more TDF gateways. Options This command has no options. Required Privilege Level unified-edge Output Fields No message is displayed on successful execution of this command; otherwise an error message is displayed. Sample Output request unified-edge tdf call-trace clear user@host> request unified-edge tdf call-trace clear Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION request unified-edge tdf call-trace show | 822 request unified-edge tdf call-trace start | 826 request unified-edge tdf call-trace stop | 829 822 request unified-edge tdf call-trace show IN THIS SECTION Syntax | 822 Description | 822 Options | 822 Required Privilege Level | 823 Output Fields | 823 Sample Output | 824 Release Information | 825 Syntax request unified-edge tdf call-trace show <all | completed | current> <brief | detail> Description Display the information related to subscriber call tracing on one or more TDF gateways. Options none (Same as brief) Display information related to subscriber call tracing in brief. all | completed | current (Optional) Display call trace information for the following: · all--All calls. · completed--Completed calls only. · current--Call traces that are currently active. brief | detail (Optional) Display the specified level of output. 823 Required Privilege Level unified-edge Output Fields Table 14 on page 823 lists the output fields for the request unified-edge tdf call-trace show command. Output fields are listed in the approximate order in which they appear. Table 14: request unified-edge tdf call-trace show Output Fields Field Name Field Description Level of Output Identifier Identifier for the call trace. All levels File name Name of the call trace file. none brief Trace file Name of the call trace file. detail Status Status of the call trace: All levels · done--Call trace complete. · not-done--Call trace in progress. · duplicate--Another call trace record is present that has the same attributes. SPIC Mask create Internal mask of the services PIC where this call trace was enabled. none brief Create Mask Internal mask of the services PIC where this call trace was enabled. detail SPIC Mask complete Internal mask of the services PIC where this call trace was completed. none brief 824 Table 14: request unified-edge tdf call-trace show Output Fields (Continued) Field Name Field Description Level of Output Complete Mask Internal mask of the services PIC where this call trace was completed. detail IMSI International Mobile Subscriber Identity (IMSI) of the subscriber's user equipment (UE). detail MSISDN Mobile station ISDN of the subscriber's user equipment. Calls Traced Number of calls traced. detail Next Call Number of next calls to be traced. For example, a value of 10 detail indicates that the next 10 calls are traced. TDF domain TDF domain pertaining to the subscriber's call. detail FPC FPC slot on which the call trace was enabled. This field is detail displayed only if the call trace is enabled on the FPC slot. PIC PIC slot on which the call trace was enabled. This field is detail displayed only if the call trace is enabled on the PIC slot. Sample Output request unified-edge tdf call-trace show brief user@host> request unified-edge tdf call-trace show brief Identifier File name Status call_trace_id_2 call_trace_id_2_02112012_060450 call_trace_id_3 call_trace_id_3_02112012_070614 call_trace_id_4 call_trace_id_4_02112012_071342 call_trace_id_5 call_trace_id_5_02112012_201317 SPIC Mask create done 0x10 done 0x10 duplicate 0x0 duplicate 0x0 SPIC Mask complete 0x10 0x10 0x0 0x0 825 call_trace_id_6 call_trace_id_6_02112012_201649 duplicate 0x0 0x0 call_trace_id_7 call_trace_id_7_02112012_202501 done 0x0 0x0 call_trace_id_8 call_trace_id_8_02112012_204718 duplicate 0x0 0x0 call_trace_id_9 call_trace_id_9_02112012_204759 not-done 0x10 0x0 request unified-edge tdf call-trace show detail user@host> request unified-edge tdf call-trace show detail Call trace information : Identifier : call_trace_id_13 Trace file : call_trace_id_13_02292012_001343 Status : not-done Create Mask : 0x200 Complete Mask : 0x0 IMSI : 29299 Calls Traced : 0 Identifier : call_trace_id_14 Trace file : call_trace_id_14_02292012_001348 Status : not-done Create Mask : 0x200 Complete Mask : 0x0 MS-ISDN: 2929910000000000 Calls Traced : 0 Identifier : call_trace_id_15 Trace file : call_trace_id_15_02292012_001408 Status : not-done Create Mask : 0x200 Complete Mask : 0x0 Next Call : 1 TDF domain : jnpr-sunnyvale Calls Traced : 0 Identifier : call_trace_id_16 Trace file : call_trace_id_16_02292012_001416 Status : not-done Create Mask : 0x200 Complete Mask : 0x0 Calls Traced : 0 FPC : 3 PIC : 1 Identifier : call_trace_id_17 Trace file : call_trace_id_17_02292012_001424 Status : done Create Mask : 0x200 Complete Mask : 0x200 Next Call : 2 Calls Traced : 2 Release Information Statement introduced in Junos OS Release 17.1. 826 RELATED DOCUMENTATION request unified-edge tdf call-trace clear | 820 request unified-edge tdf call-trace start | 826 request unified-edge tdf call-trace stop | 829 request unified-edge tdf call-trace start IN THIS SECTION Syntax | 826 Description | 826 Options | 827 Required Privilege Level | 827 Output Fields | 827 Sample Output | 828 Release Information | 828 Syntax request unified-edge tdf call-trace start <imsi imsi> <msisdn msisdn> <next-call next-call> <routing-instance routing-instance> <subscriber-name string> <user-name string> <v4-addr v4-addr> <v6-addr v6-addr> Description Start TDF subscriber call tracing. 827 Options none imsi imsi msisdn msisdn next-call next-call Start call tracing for all TDF subscribers. (Optional) Start the call tracing for subscribers with the specified International Mobile Subscriber Identity (IMSI) number. (Optional) Start call tracing for subscribers with the specified Mobile station ISDN (MSIDSN) number. (Optional) Start call tracing for the specified number of next call events (1 through 50). For example, if you specify 10, then the next 10 calls are traced. NOTE: If you do not include the next-call keyword while tracing subscribers on a domain, the default value of 1 is used. routing-instance routing-instance subscriber-name string user-name string v4-addr v4-addr v6-addr v6-addr (Optional) Start call tracing for subscribers for the specified routing instance. (Optional) Start call tracing for the specified IFL-based subscriber. (Optional) Start call tracing for the specified IP-based subscriber. (Optional) Start call tracing for subscribers for the specified IPv4 address of the subscriber's user equipment (UE). (Optional) Start call tracing for subscribers for the specified IPv6 address of the subscriber's user equipment. Required Privilege Level unified-edge Output Fields Table 15 on page 828 lists the output fields for the request unified-edge tdf call-trace start command. Output fields are listed in the approximate order in which they appear. 828 Table 15: request unified-edge tdf call-trace start Output Fields Field Name Field Description Session PIC Identifier of the session PIC for which the call trace status is displayed. Status Status of the call trace: · duplicate--Another call trace record is present that has the same attributes. · success--Call trace started successfully. · fail--Call tracing cannot be started. Sample Output request unified-edge tdf call-trace start next-call user@host> request unified-edge tdf call-trace start next-call 10 Session PIC Status ms-0/1/0 success ms-1/1/0 success Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION request unified-edge tdf call-trace clear | 820 request unified-edge tdf call-trace show | 822 request unified-edge tdf call-trace stop | 829 829 request unified-edge tdf call-trace stop IN THIS SECTION Syntax | 829 Description | 829 Options | 829 Required Privilege Level | 829 Output Fields | 830 Sample Output | 830 Release Information | 830 Syntax request unified-edge tdf call-trace stop <all> <identifier call-trace-identifier> Description Stop the previously configured subscriber call tracing on one or more TDF gateways. Options none all identifier call-trace-identifier (Same as all) Stop all subscriber call tracing. (Optional) Stop all subscriber call tracing. (Optional) Stop call tracing for the specified call trace identifier. Required Privilege Level unified-edge 830 Output Fields Table 16 on page 830 lists the output fields for the request unified-edge tdf call-trace stop command. Output fields are listed in the approximate order in which they appear. Table 16: request unified-edge tdf call-trace stop Output Fields Field Name Field Description Session PIC Identifier of session PIC for which the call trace status is displayed. Status Status of the call trace: · success--Call trace stopped successfully. · fail--Call tracing cannot be stopped. Sample Output request unified-edge tdf call-trace stop user@host> request unified-edge tdf call-trace stop Session PIC Status ms-0/1/0 success ms-1/1/0 success Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION request unified-edge tdf call-trace clear | 820 request unified-edge tdf call-trace show | 822 request unified-edge tdf call-trace start | 826 831 show interfaces anchor-group (Aggregated Packet Forwarding Engine) IN THIS SECTION Syntax | 831 Description | 831 Options | 831 Required Privilege Level | 832 Output Fields | 832 Sample Output | 834 Release Information | 835 Syntax show interfaces anchor-group <brief | detail> interface-name Description Display interface information for the aggregated Packet Forwarding Engine group. Options none (Same as brief) Display a summary of the aggregated Packet Forwarding Engine interface information. brief | detail (Optional) Display the specified level of output. interface-name Name of the interface within the anchor Packet Forwarding Engine group. NOTE: The interface must be an aggregated Packet Forwarding Engine interface (apfe-). 832 Required Privilege Level view Output Fields Table 17 on page 832 lists the output fields for the show interfaces anchor-group command. Output fields are listed in the approximate order in which they appear. Table 17: show interfaces anchor-group Output Fields Field Name Field Description Level of Output Active Anchor Packet Forwarding Engine is operational. All levels Inactive Anchor Packet Forwarding Engine is not operational. All levels PF Primary Packet Forwarding Engine anchor has failed. All levels MS Primary Packet Forwarding Engine is protected by a secondary All levels Packet Forwarding Engine in manually switched mode for primary role change. HS Primary Packet Forwarding Engine is protected by a secondary All levels Packet Forwarding Engine in hot standby mode. WS Primary Packet Forwarding Engine is protected by a secondary All levels Packet Forwarding Engine in warm standby mode. Group Name of the aggregated Packet Forwarding Engine group. brief none Mode Redundancy mode in which the aggregated Packet Forwarding Engine group operates. Currently, only warm standby mode is supported. brief none 833 Table 17: show interfaces anchor-group Output Fields (Continued) Field Name Field Description Level of Output Sub-group ID Redundancy subgroups within the anchor Packet Forwarding Engine group configuration that has FPCs as members. This is derived out of the Packet Forwarding Engines on a given FPC. For example, if the first Packet Forwarding Engine is assigned the number 0, then all the other Packet Forwarding Engines with sub-group ID 0 form the N:1 redundancy group. brief none Interface Anchor Packet Forwarding Engine interface (pfe-). All levels Configured State State in which the anchor Packet Forwarding Engine was configured. All levels · Primary--Anchor Packet Forwarding Engine is in the pool of primary members. · Secondary--Anchor Packet Forwarding Engine is a backup to all the primary members. Operational State Indication whether the anchor Packet Forwarding Engine is operational (Active) or not operational (Inactive). All levels Redundancy State Redundancy state (primary or secondary) in which the anchor Packet Forwarding Engine was configured. All levels Group Name Name of the aggregated Packet Forwarding Engine group. detail Group Mode Redundancy mode in which the aggregated Packet Forwarding Engine group operates. Currently, only warm standby mode is supported. detail Group Id Internal ID generated for the group. detail 834 Table 17: show interfaces anchor-group Output Fields (Continued) Field Name Field Description Level of Output Switchover information Switchover details, if any. detail Subgroup identifier Number of redundancy subgroups within the anchor Packet Forwarding Engine group configuration that has FPCs as members. This is derived out of the Packet Forwarding Engines on a given FPC. For example, if the first Packet Forwarding Engine is assigned the number 0, then all the other Packet Forwarding Engines with subgroup ID 0 form the N:1 redundancy group. detail Sample Output show interfaces anchor-group brief user@host> show interfaces anchor-group brief Redundancy Status Legend: Active: Operational MS: Manually switched HS: Hot standby Inactive: Non-operational PF: Primary failed WS: Warm standby Group Mode Sub-group Interface Configured Operational ID State State Redundancy State apfe0 WS 0 pfe-4/0/0 Primary Active pfe-5/0/0 Secondary Active 2 pfe-4/2/0 Primary Active pfe-5/2/0 Secondary Active Primary Secondary Primary Secondary 835 show interfaces anchor-group detail user@host> show interfaces anchor-group detail Active: Operational Inactive: Non-operational MS: Manually switched PF: Primary failed HS: Hot standby WS: Warm standby Group Name: apfe0 Group Mode: WS Switchover information: None Interface pfe-4/2/0 Configured state: Primary Redundancy state: Primary Subgroup identifier: 2 Interface pfe-4/0/0 Configured state: Primary Redundancy state: Primary Subgroup identifier: 0 Interface pfe-5/0/0 Configured state: Secondary Redundancy state: Secondary Subgroup identifier: 0 Interface pfe-5/2/0 Configured state: Secondary Redundancy state: Secondary Subgroup identifier: 2 Group Id: 65 Operational state: Active Operational state: Active Operational state: Active Operational state: Active Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show unified-edge tdf system interfaces | 1059 836 show interfaces load-balancing (Aggregated Multiservices) IN THIS SECTION Syntax | 836 Description | 836 Options | 836 Required Privilege Level | 837 Output Fields | 837 Sample Output | 839 Release Information | 841 Syntax show interfaces load-balancing <detail> <interface-name> Description Display information about the aggregated multiservices interface (AMS) as well as its individual member interfaces and the status of the replication state. Options none Display standard information about status of all AMS interfaces. detail (Optional) Display detailed status of all AMS interfaces. interface-name (Optional) Name of the aggregated multiservices interface (ams). If this is omitted, then the information for all the aggregated multiservices interfaces, including those used in control plane redundancy and high availability (HA) for service applications, is displayed. 837 Required Privilege Level view Output Fields Table 18 on page 837 lists the output fields for the show interfaces load-balancing (aggregated multiservices interfaces) command. Output fields are listed in the approximate order in which they appear. Table 18: Aggregated Multiservices show interfaces load-balancing Output Fields Field Name Field Description Level of Output Interface Name of the aggregated multiservices (AMS) interface. detail none State Status of AMS interfaces: · Coming Up--Interface is becoming operational. · Members Seen--Member interfaces (mams) are available. · Up--Interface is configured and operational. · Wait for Members--Member interfaces (mams) are not available. · Wait Timer--Interface is waiting for member interfaces (mams) to come online. detail none Last change Time (in hh:mm:ss [hours:minutes:seconds] format) when the state last changed. detail none Members Number of member interfaces (mams-). none specified Member count Number of member PICs (mams) that are part of the aggregated detail none interface. 838 Table 18: Aggregated Multiservices show interfaces load-balancing Output Fields (Continued) Field Name Field Description Level of Output HA Model High availability (HA) model supported on the interface. · Many-to-One--The preferred backup Multiservices PIC, in hot standby mode, backs up one or more (N) active Multiservices PICs. · One-to-One--The preferred backup Multiservices PIC, in hot standby mode, backs up only one active Multiservices PIC. NOTE: One-to-One is not supported on MX-SPC3 cards. detail none Members Information about the member interfaces: detail · Interface--Name of the member interface. · Weight--Not applicable for the current release. · State--State of the member interface (mams-). · Active--Member is an active member. · Backup--Member is a backup. · Discard--Member has not yet rejoined the ams interface after failure. · Down--Member has not yet powered on. · Inactive--Member has failed to rejoin the ams interface within the configured rejoin-timeout. · Invalid--Multiservices PIC corresponding to the member interface has been configured but is not physically present in the chassis. 839 Table 18: Aggregated Multiservices show interfaces load-balancing Output Fields (Continued) Field Name Field Description Level of Output Sync-state Synchronization (sync) status of the control plane redundancy. The sync state is displayed only when the ams interface is Up. detail · Interface--Name of the member interface. · Status--Synchronization status of the member interfaces. · In progress--The active member is currently synchronizing its state information with the backup member. · In sync--The active member has finished synchronizing its state information with the backup and the backup is ready to take over if the active member fails. · NA (Not applicable)--The backup member is not yet ready to synchronize with the active (primary) member. This condition may occur if the backup is still powered off or still booting. · Unknown--The daemons are still initializing and the state information is unavailable. Sample Output show interfaces load-balancing user@host> show interfaces load-balancing Interface State Last change ams0 Up 00:10:02 Members 4 HA Model Many-to-One show interfaces load-balancing detail user@host> show interfaces load-balancing detail Load-balancing interfaces detail Interface : ams0 840 State : Up Last change : 00:10:23 Member count : 4 HA Model : Many-to-One Members : Interface Weight State mams-4/0/0 10 Active mams-4/1/0 10 Active mams-5/0/0 10 Active mams-5/1/0 10 Backup Sync-state : Interface Status mams-4/0/0 Unknown mams-4/1/0 Unknown mams-5/0/0 Unknown show interfaces load-balancing detail (Specific Interface) user@host> show interfaces load-balancing ams0 detail Load-balancing interfaces detail Interface : ams0 State : Up Last change : 00:11:28 Member count : 4 HA Model : Many-to-One Members : Interface Weight State mams-4/0/0 10 Active mams-4/1/0 10 Active mams-5/0/0 10 Active mams-5/1/0 10 Backup Sync-state : Interface Status mams-4/0/0 Unknown mams-4/1/0 Unknown mams-5/0/0 Unknown 841 Release Information Command introduced in Junos OS Release 11.4. interface-name option added in Junos OS Release 16.1. Support added in Junos OS Release 19.3R2 for Next Gen Services on MX Series routers MX240, MX480 and MX960 with the MX-SPC3 services card. RELATED DOCUMENTATION Understanding Aggregated Multiservices Interfaces Understanding Aggregated Multiservices Interfaces for Next Gen Services Example: Configuring an Aggregated Multiservices Interface (AMS) show services application-identification application IN THIS SECTION Syntax | 841 Description | 842 Options | 842 Required Privilege Level | 842 Output Fields | 842 Sample Output | 844 Release Information | 850 Syntax show services application-identification application <detail <application-name> | summary > 842 Description Display detailed information about a specified application signature, all application signatures, or a summary of the existing application signatures and nested application signatures. Both custom and predefined application signatures and nested application signatures can be displayed. Options none detail <applicationname> | summary application-name (Same as summary) Display a summary of the application identification application information. (Optional) Display the specified level of output. (Optional) Display detailed information for the specified application name; maximum 31 characters. Predefined applications have the prefix junos- to avoid conflict with user-defined ones. Required Privilege Level view Output Fields Table 19 on page 842 lists the output fields for the show services application-identification application command. Output fields are listed in the approximate order in which they appear. Table 19: show services application-identification application Output Fields Field Name Field Description Level of Output Application(s) Number of applications present. none summary Application Name of the predefined application. none summary 843 Table 19: show services application-identification application Output Fields (Continued) Field Name Field Description Level of Output Disabled Status (Yes or No) of the application and whether the mapping method is currently used to identify this application. none summary Application ID Unique ID number of an application. ID numbers 1 through 32,767 are automatically generated for predefined applications; these IDs do not change. none summary Order Unique number used to specify priority when multiple applications match the traffic. The lowest order number takes the highest priority. The order attribute is applicable only for custom signatures. none summary Application Name Name of the predefined application. detail Application type Basic application type, such as HTTP. detail Description Description of the predefined application. detail Number of Number of parent groups associated Parent Group(s) with this application. detail 844 Table 19: show services application-identification application Output Fields (Continued) Field Name Field Description Level of Output Application Tags Category specifying one or more following attributes of the application: detail characteristic: One or more characteristics of the application. risk: Level of risk of the application. subcategory: Subcategory of the application. category: Technology of the application. Layer-7 Protocol(s) Layer 7 protocols associated with the application. detail Port Mapping Default port Ports associated with the application. detail Signature Signature mapping criteria for application identification: Port range, Client-to-server, and Order. detail Sample Output show services application-identification application summary user@host> show services application-identification application summary Application(s): 2564 Applications Disabled junos:DOT-NET No junos:ICMP-PHOTURIS-NEED-AUTHOR No junos:MYSPACE-TAG-ME No junos:SLACKER No junos:ICMP-TYPE-55 No ID 10182 11377 10683 1179 11392 Order 2564 2563 2562 2561 2560 845 junos:FLIPDRIVE-SSL junos:ICMP-MOBILE-HOST-REDIR junos:TWITPIC junos:ICMP-TYPE-245 No 10939 2559 No 11363 2558 No 864 2557 No 11582 2556 show services application-identification application detail user@host> show services application-identification application detail re0: -------------------------------------------------------------------------Application Name: junos:dot-net Application type: DOT-NET Description: .Net Remoting Application ID: 10182 Disabled: No Number of Parent Group(s): 1 Application Groups: junos:infrastructure:rpc Port Mapping: Default ports: N/A Signature: Port range: N/A Client-to-server Order: 1 Application Name: junos:icmp-photuris-need-author Application type: ICMP-PHOTURIS-NEED-AUTHOR Description: ICMP Type 40 Code 5 - Photuris (Need Authorization) Application ID: 11377 Disabled: No Number of Parent Group(s): 1 Application Groups: junos:infrastructure:networking Port Mapping: Default ports: N/A Signature: Port range: N/A Client-to-server Order: 5 Application Name: junos:myspace-tag-me Application type: MYSPACE-TAG-ME Description: This signature detects Tag Me by BitRhymes on MySpace Apps. Tag 846 Me by BitRhymes on MySpace Apps is a Web-based entertainment application on the popular social network MySpace. Application ID: 10683 Disabled: No Number of Parent Group(s): 1 Application Groups: junos:web:social-networking Port Mapping: Default ports: N/A Signature: Port range: N/A Client-to-server Order: 4 Application Name: junos:slacker Application type: SLACKER Description: This protocol plug-in classifies the http traffic to the host .slacker.com. Application ID: 1179 Disabled: No Number of Parent Group(s): 2 Application Groups: junos:multimedia:divers junos:multimedia Port Mapping: Default ports: N/A Signature: Port range: N/A Client-to-server Order: 3 Application Name: junos:icmp-type-55 Application type: ICMP-TYPE-55 Description: ICMP Type 55 - Unassigned Application ID: 11392 Disabled: No Number of Parent Group(s): 1 Application Groups: junos:infrastructure:networking Port Mapping: Default ports: N/A Signature: Port range: N/A Client-to-server Order: 2 847 Application Name: junos:flipdrive-ssl Application type: FLIPDRIVE-SSL Description: This signature detects logins to FlipDrive, a cloud-based file-sharing and backup service. Application ID: 10939 Disabled: No Number of Parent Group(s): 1 Application Groups: junos:web:file-sharing Port Mapping: Default ports: N/A Signature: Port range: N/A Client-to-server Order: 1 Application Name: junos:icmp-mobile-host-redir Application type: ICMP-MOBILE-HOST-REDIR Description: ICMP Type 32 - Mobile Host Redirect Application ID: 11363 Disabled: No Number of Parent Group(s): 1 Application Groups: junos:infrastructure:networking Port Mapping: Default ports: N/A Signature: Port range: N/A Client-to-server Order: 5 Application Name: junos:twitpic Application type: TWITPIC Description: This signature detects Twitpic, a Web site that allows users to easily post pictures to the Twitter microblogging and social media service. Application ID: 864 Disabled: No Number of Parent Group(s): 1 Application Groups: junos:web:social-networking Port Mapping: Default ports: N/A Signature: Port range: N/A 848 Client-to-server Order: 4 Application Name: junos:icmp-type-245 Application type: ICMP-TYPE-245 Description: ICMP Type 245 - Unassigned Application ID: 11582 Disabled: No Number of Parent Group(s): 1 Application Groups: junos:infrastructure:networking Port Mapping: Default ports: N/A Signature: Port range: N/A Client-to-server Order: 3 ----(more)- show services application-identification application detail (Specific Application) user@host> show services application-identification application detail junos:SKYPE Application Name: junos:SKYPE Application type: SKYPE Description: This signature detects Skype, which is a proprietary P2P VOIP network. It is a "complete black box" for both users and analyzers. It uses security through obscurity to make itself troublesome to analyze or reverse-engineer without a significant amount of work, or use of emulation. It uses AES block cipher, the RSA public key cryptosystem, the ISO 9796-2 signature padding scheme, the SHA-1 hash function, and the RC4 stream cipher through the communications between the client to client, client to supernodes and supernode to supernode. Application ID: 183 Disabled: No Number of Parent Group(s): 1 Application Groups: junos:web:infrastructure:voip Application Tags: characteristic : Supports File Transfer characteristic : Evasive 849 characteristic : Bandwidth Consumer risk : 4 subcategory : VOIP category : Infrastructure Layer-7 Protocol(s): UDP / 216 TCP / 205 SSL / 199 HTTPS / 68 HTTP / 67 Port Mapping: Default ports: N/A Signature: Port range: N/A Client-to-server Order: 20 show services application-identification application detail (Specific Application) user@host> show services application-identification detail junos:http re0: -------------------------------------------------------------------------Application Name: junos:http Application type: HTTP Description: This signature detects HyperText Transfer Protocol (HTTP), which is a protocol used by the World Wide Web. It defines how messages are formatted and transmitted and what actions Web servers and browsers should take in response to various commands. HTTP usually runs on TCP port 80. Application ID: 67 Disabled: No Number of Parent Group(s): 1 Application Groups: junos:web Port Mapping: Default ports: TCP/80,3128,8000,8080 Signature: Port range: N/A Client-to-server Order: 3 850 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION request services application-identification install request services application-identification application show services application-identification application-system-cache IN THIS SECTION Syntax | 850 Description | 850 Options | 851 Required Privilege Level | 851 Output Fields | 851 Sample Output | 854 Release Information | 856 Syntax show services application-identification application-system-cache <interface interface-name> Description Display the database of cached values stored by the application identification system. 851 NOTE: The show services application-identification application-system-cache command gives the information only when the application identifier (AI) is matched with the signature. Options none interface interfacename Display the database of cached values for the all services interfaces. (Optional) Display the database of cached values for the specified services interface. Required Privilege Level view Output Fields Table 20 on page 851 lists the output fields for the show services application-identification application-system-cache command. Output fields are listed in the approximate order in which they appear. Table 20: show services application-identification application-system-cache Output Fields Field Name Field Description applicationcache Status (on or off) of the application cache. cache-entrytimeout Number of seconds the mapping information is saved. pic PIC number of the accumulated statistics. IP address IP address of the traffic flow for which application-identification is enabled. Port Port number of the traffic flow for which application-identification is enabled. 852 Table 20: show services application-identification application-system-cache Output Fields (Continued) Field Name Field Description Protocol Protocol name of the flow for which application-identification is enabled. Application Application number, which is a unique identifier that denotes the application or service for which identification of traffic flows is enabled. Classification Path Protocols or nested applications that denote the paths traversed for classified packets. PIC PIC number of the accumulated statistics. For the interface on which deep packet inspection (DPI) application is not running, that detail is also displayed for the corresponding interface. Unknown applications Number of unknown applications. Cache hits Number of sessions that matched the application in the application identification cache. Cache misses Number of sessions that did not find the application in the application identification cache. Client-toserver packets processed Number of client-to-server packets processed. Server-toclient packets processed Number of server-to-client packets processed. Client-toserver bytes processed Number of client-to-server payload bytes processed. 853 Table 20: show services application-identification application-system-cache Output Fields (Continued) Field Name Field Description Server-toclient layer bytes processed Number of server-to-client payload bytes processed. Client-toserver packets processed Number of client-to-server packets processed. Server-toclient packets processed Number of server-to-client packets processed. Client-toserver bytes processed Number of client-to-server payload bytes processed. Server-toclient layer bytes processed Number of server-to-client payload bytes processed. Sessions bypassed due to resource allocation failure Number of sessions bypassed due to resource allocation failure. Segment case 1 - New segment to left Number of TCP segments contained before the previous segment. 854 Table 20: show services application-identification application-system-cache Output Fields (Continued) Field Name Field Description Segment case 2 - New segment overlap right Number of TCP segments that start before the previous segment and are contained in it. Segment case 3 - Old segment overlapped Number of TCP segments that start before the previous segment and extend beyond it. Segment case 4 - New segment overlapped Number of TCP segments that start and end within the previous segment. Segment case 5 - New segment overlap left Number of TCP segments that start within the previous segments and extend beyond it. Segment case 6 - New segment to right Number of TCP segments that start after the previous segment. This is the normal case. Sample Output show services application-identification application-system-cache user@host> show services application-identification application-system-cache Application System Cache Configurations: application-cache: on cache-entry-timeout: 3600 seconds 855 pic: ams0 pic: ms-0/3/0 ms-0/3/0 is not running DPI engine pic: ams1 pic: ms-0/0/0 IP address: 192.0.2.2 Application: HTTP:YOUTUBE Classification Path: IP:TCP:HTTP:YOUTUBE Port: 80 Protocol: TCP show services application-identification application-system-cache interface user@host> show services application-identification application-system-cache interface ms-1/0/0 Application System Cache Configurations: application-cache: on cache-entry-timeout: 3600 seconds pic: ms-0/0/0 IP address: 192.0.2.2 Port: 80 Protocol: TCP Application: HTTP:YOUTUBE Classification Path: IP:TCP:HTTP:YOUTUBE user@host> show services application-identification counter pic: ams0 ms-0/3/0 is not running DPI engine pic: ams1 Counter type Unknown applications Cache hits Cache misses Client-to-server packets processed Server-to-client packets processed Client-to-server bytes processed Server-to-client bytes processed Sessions bypassed due to resource allocation failure Segment case 1 - New segment to left Segment case 2 - New segment overlap right Segment case 3 - Old segment overlapped Segment case 4 - New segment overlapped Segment case 5 - New segment overlap left Value 32682 323504 400 2034 1982 258786 1314722 0 0 0 0 0 0 Segment case 6 - New segment to right Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION request services application-identification application show services application-identification counter IN THIS SECTION Syntax | 856 Description | 856 Options | 857 Required Privilege Level | 857 Output Fields | 857 Sample Output | 858 Release Information | 859 Syntax show services application-identification counter <interface interface-name> Description Display application identification counter statistics. 856 0 857 Options none Display counter statistics for all services interfaces. interface interface-name (Optional) Display counter statistics for the specified services interface. Required Privilege Level view Output Fields Table 21 on page 857 lists the output fields for the show services application-identification counter command. Output fields are listed in an approximate order in which they appear. Table 21: show services application-identification counter Output Fields Field Name Field Description PIC PIC number of the accumulated statistics. Unknown applications Number of unknown applications. Cache hits Number of sessions that matched the application in the application identification cache. Cache misses Number of sessions that did not find the application in the application identification cache. Client-to-server packets processed Number of client-to-server packets processed. Server-to-client packets processed Number of server-to-client packets processed. Client-to-server bytes processed Number of client-to-server payload bytes processed. 858 Table 21: show services application-identification counter Output Fields (Continued) Field Name Field Description Server-to-client layer bytes Number of server-to-client payload bytes processed. processed Sessions bypassed due to resource allocation failure Number of sessions bypassed due to resource allocation failure. Segment case 1 - New segment to left Number of TCP segments contained before the previous segment. Segment case 2 - New segment overlap right Number of TCP segments that start before the previous segment and are contained in it. Segment case 3 - Old segment overlapped Number of TCP segments that start before the previous segment and extend beyond it. Segment case 4 - New segment overlapped Number of TCP segments that start and end within the previous segment. Segment case 5 - New segment overlap left Number of TCP segments that start within the previous segments and extend beyond it. Segment case 6 - New segment to right Number of TCP segments that start after the previous segment. This is the normal case. Sample Output show services application-identification counter user@host> show services application-identification counter pic: 5/0 Counter type Unknown applications Cache hits Cache misses Client-to-server packets processed Server-to-client packets processed Client-to-server bytes processed Server-to-client bytes processed Sessions bypassed due to resource allocation failure Segment case 1 - New segment to left Segment case 2 - New segment overlap right Segment case 3 - Old segment overlapped Segment case 4 - New segment overlapped Segment case 5 - New segment overlap left Segment case 6 - New segment to right pic: 5/1 Counter type Unknown applications Cache hits Cache misses Client-to-server packets processed Server-to-client packets processed Client-to-server bytes processed Server-to-client bytes processed Sessions bypassed due to resource allocation failure Segment case 1 - New segment to left Segment case 2 - New segment overlap right Segment case 3 - Old segment overlapped Segment case 4 - New segment overlapped Segment case 5 - New segment overlap left Segment case 6 - New segment to right Release Information Statement introduced in Junos OS Release 17.1. 859 Value 0 0 36 16 101 3494 112493 0 11 8 0 0 0 7 Value 0 0 0 0 0 0 0 0 0 0 0 0 0 0 860 RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures show services application-identification group IN THIS SECTION Syntax | 860 Description | 860 Options | 860 Required Privilege Level | 861 Output Fields | 861 Sample Output | 862 Release Information | 865 Syntax show services application-identification group [detail application-group name | summary] Description Display detailed or summary information about a specified application signature group or all application signature groups. Both custom and predefined application signature groups can be displayed. Options none Display summary information for all application signature groups. detail | summary Display the specified level of output. 861 application-name Application name; maximum 31 characters. Predefined applications have the prefix junos- to avoid conflict with user-defined ones. Required Privilege Level view Output Fields Table 22 on page 861 lists the output fields for the show services application-identification group command. Output fields are listed in the approximate order in which they appear. Table 22: show services application-identification group Output Fields Field Name Field Description Level of Output Group ID Unique ID number of an application signature group. ID numbers 1 through 32,767 are automatically generated for predefined application signatures and application signature groups; these IDs do not change. ID numbers for custom application signatures and application signature groups use ID numbers 32,768 through 65,534. none detail summary Disabled Status of the application signature group and whether the signature method is currently used to identify this application. The default is No. none summary Application Group(s) Number of application signature groups present. none summary 862 Table 22: show services application-identification group Output Fields (Continued) Field Name Field Description Level of Output Applications Names of application signatures associated with this application signature group. none detail summary Group Name Name of an application signature or application signature group. detail Description Description of the specified application in the detailed display. If a description is not previously specified, N/A is displayed for this field. detail Number of Applications Total number of applications contained in the group. detail Number of Sub-Groups Total number of sub-groups associated with this application signature group. detail Number of Total number of parent groups in this Parent-Groups application signature group or cluster. detail Sub-Group(s) Application signature sub-groups present. detail Sample Output show services application-identification group summary user@host> show services application-identification group summary Application Group(s): 66 863 Application Groups junos:web:social-networking:facebook junos:web:reference junos:infrastructure:legacy junos:web:cdn junos:infrastructure:scada junos:web:real-estate junos:web:finance junos:multimedia:audio-streaming junos:web:remote-access junos:web:p2p junos:remote-access:backdoors junos:infrastructure:authentication junos:web:forums junos:remote-access:command junos:infrastructure:scm junos:web:portal junos:web:shopping junos:infrastructure:rpc junos:messaging:mail junos:web:search junos:infrastructure:encryption junos:gaming:divers junos:p2p:file-sharing junos:infrastructure:backup junos:multimedia:transport junos:gaming:protocols junos:web:advertisements junos:infrastructure:monitoring junos:infrastructure:mobile junos:infrastructure:file-servers junos:web:infrastructure junos:web:wiki junos:web:image-sharing junos:infrastructure:directory junos:infrastructure:database junos:remote-access:tunneling junos:remote-access:interactive-desktop junos:web:gaming junos:web:anonymizer junos:web:blogging junos:remote-access:divers junos:remote-access Disabled ID No 68 No 67 No 66 No 65 No 64 No 63 No 62 No 61 No 60 No 59 No 58 No 57 No 56 No 55 No 54 No 53 No 52 No 51 No 50 No 49 No 48 No 47 No 46 No 45 No 44 No 43 No 42 No 41 No 40 No 39 No 38 No 37 No 36 No 35 No 34 No 33 No 32 No 31 No 30 No 29 No 28 No 27 864 junos:p2p:divers junos:p2p junos:web:news junos:gaming:web-based junos:gaming junos:web:messaging junos:multimedia:web-based junos:web:file-sharing junos:web:travel junos:multimedia:video-streaming junos:messaging:instant-messaging junos:web:multimedia junos:infrastructure:voip junos:messaging:divers junos:messaging junos:web:applications junos:multimedia:divers junos:multimedia junos:web:divers junos:web:social-networking junos:web junos:infrastructure:networking junos:infrastructure:divers junos:infrastructure No 26 No 25 No 24 No 23 No 22 No 21 No 20 No 19 No 18 No 17 No 16 No 15 No 14 No 13 No 12 No 11 No 10 No 9 No 8 No 7 No 6 No 5 No 4 No 3 show services application-identification group detail user@host> show services application-identification group detail junos:social-networking Group Name: junos:web Group ID: 15 Description: N/A Disabled: No Number of Applications: 1 Number of Sub-Groups: 21 Number of Parent-Groups: 1 Applications: junos:http Sub Groups: junos:web:forums junos:web:travel junos:web:reference 865 junos:web:portal junos:web:blogging junos:web:shopping junos:web:search junos:web:anonymizer junos:web:image-sharing junos:web:file-sharing junos:web:remote-access junos:web:real-estate junos:web:news junos:web:gaming junos:web:p2p junos:web:applications junos:web:multimedia junos:web:divers junos:web:messaging junos:web:social-networking junos:web:infrastructure Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures request services application-identification group show services application-identification statistics application-groups IN THIS SECTION Syntax | 866 Description | 866 866 Options | 866 Required Privilege Level | 866 Output Fields | 866 Sample Output | 867 Release Information | 867 Syntax show services application-identification statistics application-groups Description Display cumulative session and byte statistics per application group. Statistics are displayed in alphabetical order. Options This command has no options. Required Privilege Level view Output Fields Table 23 on page 867 lists the output fields for the show services application-identification statistics application-groups command. Output fields are listed in the approximate order in which they appear. 867 Table 23: show services application-identification statistics application-groups Output Fields Field Name Field Description Last Reset Date, time, and how long ago the statistics for the sessions were cleared. The format None specified is year-month-day hour:minute:second timezone. If you did not clear the statistics previously at any point, Never is displayed. Application Group Name of the application group. Sessions Number of sessions for the application group. Kilo Bytes Size of the application group in kilobytes. Sample Output show services application-identification statistics application-groups user@host> show services application-identification statistics application-groups Last Reset: 2014-02-19 00:38:01 PST Application Group junos:infrastructure junos:infrastructure:monitoring Sessions 2 2 Kilo Bytes 18 18 Release Information Statement introduced in Junos OS Release 17.1 on MX Series. RELATED DOCUMENTATION clear services application-identification statistics 868 show services application-identification statistics applications IN THIS SECTION Syntax | 868 Description | 868 Options | 868 Required Privilege Level | 868 Output Fields | 868 Sample Output | 869 Release Information | 869 Syntax show services application-identification statistics applications Description Display cumulative session and byte statistics per application. Statistics are displayed in alphabetical order. Options This command has no options. Required Privilege Level view Output Fields Table 24 on page 869 lists the output fields for the show services application-identification statistics applications command. Output fields are listed in the approximate order in which they appear. 869 Table 24: show services application-identification statistics applications Output Fields Field Name Field Description Last Reset Date, time, and how long ago the statistics for the sessions were cleared in the format year-month-day hour:minute:second timezone . If you did not clear the statistics previously at any point, Never is displayed. Application Name of the application. Sessions Number of sessions for the application. Bytes Size of the application in bytes. Sample Output show services application-identification statistics applications user@host> show services application-identification statistics applications Last Reset: 2014-01-26 18:32:36 PST Application Sessions junos:http 4 junos:https 1 junos:hulu 1 junos:linkedin 1 junos:netflix 2 Bytes 24009 101823 48329 2650 32747 Release Information Statement introduced in Junos OS Release 17.1 on MX Series. 870 RELATED DOCUMENTATION clear services application-identification statistics show services application-identification status IN THIS SECTION Syntax | 870 Description | 870 Required Privilege Level | 870 Output Fields | 870 Sample Output | 872 Release Information | 873 Syntax show services application-identification status Description Display detailed information about application identification status. Required Privilege Level view Output Fields Table 25 on page 871 lists the output fields for the show services application-identification status command. Output fields are listed in the approximate order in which they appear. 871 Table 25: show services application-identification status Output Fields Field Name Field Description Application Identification Details of the application-identification engine and the processing details of sessions. Status Status of application identification: Enabled or Disabled. Sessions under app detection Number of sessions undergoing application identification detection. Engine Version Application identification detector engine version. Max TCP session packet memory Maximum number of TCP sessions that application identification maintains. Force packet plugin Force packet plugin status: Enabled or Disabled. Force stream plugin Force stream plugin status: Enabled or Disabled. Statistics collection interval Frequency (in minutes) for collecting statistics. Application System Cache Details of entries in the application system cache. Status Status of application system cache: Enabled or Disabled. Max Number of entries in cache Maximum number of cache entries. Cache timeout Number of seconds after which the cache entries expires. Protocol Bundle Information regarding application package downloads. 872 Table 25: show services application-identification status Output Fields (Continued) Field Name Field Description Download Server CGI URL of the server from where protocol bundle was downloaded. Auto Update Status of auto update to receive protocol bundle updates from the server: Enabled or Disabled. Slot Number of the slot pertaining to the packets for which application- identification is associated. Status Status of protocol bundle: Active or Free. Version Version of protocol bundle. Session Number of active sessions. Sample Output show services application-identification status user@host> show services application-identification status pic: 5/0 Application Identification Status Sessions under app detection Engine Version Max TCP session packet memory Force packet plugin Force stream plugin Statistics collection interval Enabled 0 4.18.1-20 (build date Feb 15 2014) 30000 Disabled Disabled 1 (in minutes) Application System Cache Status Max Number of entries in cache Enabled 131072 873 Cache timeout Protocol Bundle Download Server index.cgi AutoUpdate Slot 1: Status Version Sessions Slot 2 Status 3600 (in seconds) https://services.netscreen.com/cgi-bin/ Disabled Active 1.30.4-22.005 (build date Jan 17 2014) 0 Free Release Information Statement introduced in Junos OS Release 17.1 on MX Series. RELATED DOCUMENTATION Application Identification Overview Configuring Custom Application Signatures request services application-identification application show services application-identification version IN THIS SECTION Syntax | 874 Description | 874 Required Privilege Level | 874 Sample Output | 874 Release Information | 874 874 Syntax show services application-identification version Description Display the Junos OS application package version. Required Privilege Level view Sample Output show services application-identification version user@host> show services application-identification version Application package version: 1608 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION request services application-identification download show services ha detail IN THIS SECTION Syntax | 875 Description | 875 875 Options | 875 Required Privilege Level | 875 Output Fields | 875 Sample Output | 877 Release Information | 877 Syntax show services ha detail <interface interface-name> Description Display detailed information for stateful sync processing for a specified interface or for all interfaces. Options none interface-name Display detailed information for stateful sync processing for all interfaces. (Optional) Name of a specific interface. Required Privilege Level view Output Fields Table 26 on page 876 lists the output fields for the show services ha detail command. Output fields are listed in the approximate order in which they appear. 876 Table 26: show services ha detail Output Fields Field Name Field Description Interface Name of the interface for which information is reported. Inter-chassis Role Connection Synchronization Peers Role of the interface. · active--Active interface. · backupBackup interface. Status of the peer connection. · Up · Down Synchronization state of peers. · OffPeers are not currently engaged in synchronization.. · ColdPeers are in a pre-synchronization state. · Hot--Peers are ready for synchronization. Local Port Remote Port Local peer IP address. Local peer port number. Remote peer IP address. Remote peer port number. 877 Sample Output show services ha detail user@host> show services ha detail Interface: ms-7/0/0 Inter-chassis: Role: active, Connection: Up, Synchronization: Hot Peers: Local: 192.0.2.1 Port: 4001, Remote: 192.0.2.2 Port: 4001 Interface: Inter-chassis: Peers: ms-7/1/0 Role: active, Connection: Down, Synchronization: Off Local: 198.51.100.1 Port: 4001, Remote: 198.51.100.2 Port: 4001 Interface: Inter-chassis: Peers: ms-8/0/0 Role: active, Connection: Up, Synchronization: Cold Local: 203.0.113.1 Port: 4001, Remote: 203.0.113.2 Port: 4001 Interface: Inter-chassis: Peers: ms-8/1/0 Role: active, Connection: Up, Synchronization: Hot Local: 10.10.10.1 Port: 4001, Remote: 10.10.10.2 Port: 4001 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Inter-Chassis Stateful Synchronization for Long Lived NAT and Stateful Firewall Flows (MS-MPC, MSMIC) Overview (Release 16.1 and later) show services ha statistics IN THIS SECTION Syntax | 878 878 Description | 878 Options | 878 Required Privilege Level | 878 Output Fields | 878 Sample Output | 884 Release Information | 885 Syntax show services ha statistics <interface interface-name> Description Display detailed statistics for stateful sync processing for a specified interface or for all interfaces. Options none interface-name Display detailed statistics for stateful sync processing for all interfaces. (Optional) Name of a specific interface. Required Privilege Level view Output Fields Table 27 on page 879 lists the output fields for the show services ha statistics command. Output fields are listed in the approximate order in which they appear. 879 Table 27: show services ha statistics Output Fields Field Name Field Description Interface Interface name. Inter-chassis Role Role of the interface. · active--Active interface. · backupBackup interface. Connection Status of the peer connection. · Up · Down Synchronization Synchronization state of peers. · OffPeers are not currently engaged in synchronization. · ColdPeers are in a pre-synchronization state. · Hot--Peers are ready for synchronization. Peers Local Local peer IP address. Port Local peer port number. Remote Remote peer IP address. Port Remote peer port number. Connection Status 880 Table 27: show services ha statistics Output Fields (Continued) Field Name Field Description TCP connection establish Number of times a TCP connection is established. TCP connection teardown Number of times a TCP connection is torn down. UDP address exchange sent Number of times a UDP address is sent. Stateful sync start sent Number of stateful sync start messages sent by the backup PIC, indicating the start of the cold sync phase. Stateful sync start received Number of stateful sync start messages received by active PIC, indicating the start of the cold sync phase. Cold sync completed count Number of times the PIC has successfully completed the cold sync phase. Session Add Statistics Sent Number of session add statistics sent by the active PIC. Received Number of session add statistics received by the backup PIC. Completed Number of session adds completed on the active and backup PICs. rate Number of sessions currently added per second. Nack sent Number of times that a session add failed on the backup PIC, resulting in the sending of a Nack message to the active PIC. Nack received Number of Nack messages received from backup PIC due to session add failure. 881 Table 27: show services ha statistics Output Fields (Continued) Field Name Field Description Add pending Number of sessions eligible for synchronization, but not yet synchronized. Session Delete Statistics Sent Number of session deletes sent by the active PIC. Received Number of session deletes received by the backup PIC. Completed Number of session deletes completed on the active and backup PICs. rate Number of sessions currently deleted per second. Nack sent Number of times that a session add failed on the backup PIC, resulting in the sending of a Nack message to the active PIC. Nack received Number of Nack messages received from backup PIC due to session add failure. Session not found Number of sessions not found when session delete was attempted. Session Error Statistics Session attach failures Number of high-availability extension creation failures on the active PIC. Session detach failures Number of high-availability extension deletion failures on the active PIC. 882 Table 27: show services ha statistics Output Fields (Continued) Field Name Field Description Session extension get failures Number of times that the high-availability extension is not available when requested. Session nullify Number of times the high-availability session creation failed on the active PIC. Lookup fail Number of times session lookup failed because the session has already been released by the infrastructure. Initiate fail Number of times session creation failed on the backup PIC. Activate fail Number of times session activation failed on the backup PIC. Illegal flow type Number of times an illegal flow type occurred on the active and backup PICs. Illegal service set Number of times service set extraction failed on backup and active PICs. Unsupported protocol Number of times that a session was not backed up because the protocol was neither TCP or UDP. Send overflow Number of times buffer overflowed when the high-availability session was created on the active PIC. Send discard Number of sessions that not synchronized to the backup, even though they were eligible for synchronization. This occurs whe at least one plugin in the service set indicates that a session should not be synchronized. 883 Table 27: show services ha statistics Output Fields (Continued) Field Name Field Description Spurious Number of packets received on the backup PIC for which there are no existing sessions Process incoming failed Number of times JMUX header processing failed. Session ignored Number of sessions that were eligible for synchronization, but are ignored because stateful sync is not supported for them, such as ALG sessions JMUX Error Statistics Synchronization statistics related to the JMUX library. JMUX begin fail Number of times that JMUX key verification or header creation failed. JMUX commit fail Number of times addition of JMUX data failed. JMUX flush fail Number of times a send of JMUX data failed. Invalid plugin header Number of times stateful sync messages were rejected due to an invalid plugin header (internal error). Invalid plugin name Number of times stateful sync messages were rejected due to an invalid plugin name (internal error). Invalid plugin length Number of times stateful sync messages were rejected due to invalid plugin length (internal error). Plugin receive error Number of times installation of plugin information failed on the backup. Plugin send error Number of times the plugin failed to pack the extension. 884 Table 27: show services ha statistics Output Fields (Continued) Field Name Field Description IDL Error Statistics Statistics concerning encode or decode errors at the backup. IDL encode fail Number of times IDL encoding failed on the active and backup PICs. IDL decode fail Number of times IDL decoding failed on the active and backup PICs. Sample Output show services ha statistics user@host> show services ha statistics Interface: ms-5/0/0 Inter-chassis: Role: active, Connection: Up, Synchronization: Hot Peers: Local: 192.0.2.2 Port: 4001, Remote: 192.0.2.1 Port: 4001 Connection Status: TCP connection establish: 8, Teardown: 8 UDP address exchange sent: 8, Received: 8 Stateful sync start sent: 0, Received: 8 Cold sync completed count: 0 Session Add Statistics: Sent: 255, Received: 0 Completed: 255, Rate: 0 Nack sent: 0, Nack received: 0 Add pending: 0 Session Delete Statistics: Sent: 255, Received: 0 Completed: 255, Rate: 0 Nack sent: 0, Nack received: 0 Session not found: 0 Session Error Statistics: Session attach failures: 0, Session detach failures: 0 Session extension get failures: 0, Session nullify: 0 885 Lookup fail: 0, Initiate fail: 0, Activate fail: 0 Illegal flow type: 0, Illegal service set: 0 Unsupported protocol: 0, Send overflow: 0, Send discard: 0 Spurious: 0, Process incoming failed: 0, Session ignored: 0 JMUX Error Statistics: JMUX begin fail: 0, JMUX commit fail: 0, JMUX flush fail: 0 Invalid plugin header: 0, Invalid plugin name: 0 Invalid plugin length: 0, Plugin receive error: 0, Plugin send error: 0 IDL Error Statistics: IDL encode fail: 0, IDL decode fail: 0 Release Information Statement introduced in Junos OS Release 16.1. RELATED DOCUMENTATION Inter-Chassis Stateful Synchronization for Long Lived NAT and Stateful Firewall Flows (MS-MPC, MSMIC) Overview (Release 16.1 and later) show services hcm statistics IN THIS SECTION Syntax | 886 Description | 886 Options | 886 Required Privilege Level | 886 Output Fields | 886 Sample Output | 887 Release Information | 887 886 Syntax show services hcm statistics rule rule-name Description Display the statistics collected for HTTP header enrichment for a specified tag rule. NOTE: This command displays output only if the count statement is configured for the term in a tag rule at the [edit services hcm tag-rule rule-name term term-name then] hierarchy level. If you change the configuration of tag rules during an existing subscriber data session and commit the change, the tag rule statistics are reset to 0 and stop incrementing for the existing TCP sessions. Options none rule rule-name Display detailed statistics about stateful sync processing for all interfaces. Display statistics for the specified tag rule. Required Privilege Level view Output Fields Table 28 on page 886 lists the output fields for the show services hcm statistics command. Output fields are listed in the approximate order in which they appear. Table 28: show services hcm statistics Output Fields Field Name Field Description Interface Name of the interface for which the statistics are displayed. 887 Table 28: show services hcm statistics Output Fields (Continued) Field Name Field Description Term id Identifier for the term (in the tag rule) for which the statistics are displayed. Hits Number of times that the term was matched. This field displays the aggregate number of occurrences in service sets that include the term. Sample Output show services hcm statistics rule user@host> show services hcm statistics rule rule1 Interface: mams-3/1/0 Term id Hits 1 58 Interface: mams-4/1/0 Term id Hits 1 144 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION count (HTTP Header Enrichment) | 344 Configuring HTTP Header Enrichment Overview | 41 show services hcm pic-statistics | 888 888 show services hcm pic-statistics IN THIS SECTION Syntax | 888 Description | 888 Options | 888 Required Privilege Level | 888 Output Fields | 889 Sample Output | 893 Sample Output | 894 Release Information | 896 Syntax show services hcm pic-statistics <interface interface-name> Description Display the statistics collected (from the services PICs) for HTTP header enrichment. Options none interface interface-name Display the statistics for all the services PICs. (Optional) Display the statistics for the specified services PIC. Required Privilege Level view 889 Output Fields Table 29 on page 889 lists the output fields for the show services hcm pic-statistics command. Output fields are listed in the approximate order in which they appear. Table 29: show services hcm pic-statistics Output Fields Field Name Field Description Interface Name of the services PIC interface for which statistics are displayed. Session statistics--For each services PIC. Number of Session Interest events Number of Session Interest events. Number of Session Create events Number of Session Create events. Number of Session Close events Number of Session Close events. Number of Session Destroy events Number of Session Destroy events. Number of Session Data events Number of Session Data events. Number of Session Handle failures Number of Session Handle failures. Number of Session Extension allocations Number of Session Extension allocations that were successful. Number of Session Extension alloc failures Number of Session Extension allocations that failed. Number of Session Extension frees Number of Session Extension frees (memory releases). TCP Proxy statistics 890 Table 29: show services hcm pic-statistics Output Fields (Continued) Field Name Field Description Number of missing stbuf Number of missing stream buffers. Number of stbuf initializations Number of stream buffer initializations that were successful. Number of stbuf initialization failures Number of stream buffer initializations that failed. Number of stbuf store failures Number of stream buffer store failures. Number of stbuf frees Number of stream buffer frees (memory releases) that were successful. Number of stbuf free failures Number of stream buffer frees that failed. Number of stbuf sends Number of stream buffer sends that were successful. Number of stbuf send failures Number of stream buffer sends that failed. Number of stbuf receives Number of stream buffer receives that were successful. Number of stbuf throttles Number of stream buffer throttles. Throttles are done when the stream buffer queue is full. Number of invalid stbuf Number of invalid stream buffers. THR statistics Number of THR creates Number of successful TCP Header Rewriter (THR) Create Requests. 891 Table 29: show services hcm pic-statistics Output Fields (Continued) Field Name Field Description Number of missing THR handles Number of missing THR handles. Number of THR create failures Number of THR Create Requests that failed. Number of THR store failures Number of THR store failures. Number of THR short circuit failures Number of THR short circuit (packet bypass) failures. Number of THR update failures Number of THR updates that failed. Number of THR state updates Number of THR state updates. Number of THR destroy failures Number of THR destroys that failed. Number of THR destroys Number of THR Cleanup Requests that were successful. JCPP statistics Number of JCPP handle allocations Number of Juniper Content and Protocol Parsers (JCPP) handle allocations that were successful. Number of JCPP handle allocation failures Number of JCPP handle allocations that failed. Header Insertion statistics Number of HCM Header Insertions Number of times that tags were successfully inserted into HTTP headers. 892 Table 29: show services hcm pic-statistics Output Fields (Continued) Field Name Field Description Number of HCM Header Insertion failures Number of times that the insertion of tags into HTTP headers failed. Number of HCM Header Renamed Number of times that HTTP headers were successfully renamed. Number of HCM Header Rename failures Number of times that HTTP header rename attempts failed. Number of HCM IPV4 Mask modifications Number of times IPv4 address mask was inserted. Number of HCM IPV6 Mask modifications Number of times IPv6 address mask was inserted. Number of HCM Tags too large Number of tags that were not inserted into HTTP headers because the tag size was larger than the maximum allowed size. Number of HCM Tag encryption failures Number of times that the encryption of HTTP tags used for header insertion failed. Number of HCM requests Number of HTTP header enrichment requests. Number of missing Subscribers in HCM Number of times that tags were not inserted because subscriber was missing. Number of HCM missing subscriber attributes Number of times that tags were not inserted because subscriber attributes were missing. 893 Table 29: show services hcm pic-statistics Output Fields (Continued) Field Name Field Description Number of HCM missing IPV4 attributes Number of times that tags were not inserted because subscriber IPv4 user address attributes were missing. Number of HCM missing IPV6 attributes Number of times that tags were not inserted because subscriber IPv6 user address attributes were missing. Number of HCM IPV4 / IPV6 tag insertions Number of times that an IPv4 or an IPv6 user address tag was successfully inserted into HTTP headers when the tag rule included both IPv4 and IPv6 user address tags. Sample Output show services hcm pic-statistics (mams interface) user@host> show services hcm pic-statistics Interface: mams-3/0/0 Session statistics Number of Session Interest events Number of Session Create events Number of Session Close events Number of Session Destroy events Number of Session Data events Number of Session Handle failures Number of Session Extension allocations Number of Session Extension alloc failures Number of Session Extension frees TCP Proxy statistics Number of missing stbuf Number of stbuf initializations Number of stbuf initialization failures Number of stbuf store failures Number of stbuf frees Number of stbuf free failures Number of stbuf sends :224590 :224590 :224590 :224590 :224589 :0 :224590 :0 :224590 :0 :0 :0 :0 :0 :0 :0 894 Number of stbuf send failures Number of stbuf receives Number of stbuf throttles Number of invalid stbuf THR statistics Number of THR creates Number of missing THR handles Number of THR create failures Number of THR store failures Number of THR short circuit failures Number of THR update failures Number of THR state updates Number of THR destroy failures Number of THR destroys JCPP statistics Number of JCPP handle allocations Number of JCPP handle allocation failures Header Insertion statistics Number of HCM Header Insertions Number of HCM Header Insertion failures Number of HCM Header Renamed Number of HCM Header Rename failures Number of HCM IPV4 Mask modifications Number of HCM IPV6 Mask modifications Number of HCM Tags too large Number of HCM Tag encryption failures Number of HCM requests Number of missing Subscribers in HCM Number of HCM missing subscriber attributes Number of HCM missing IPV4 attributes Number of HCM missing IPV6 attributes Number of HCM IPV4 / IPV6 tag insertions :0 :0 :0 :0 :224590 :0 :0 :0 :0 :0 :449180 :0 :0 :0 :0 :224589 :0 :0 :0 :0 :0 :0 :0 :224589 :0 :0 :0 :0 :0 Sample Output show services hcm pic-statistics (vms- interface) user@host> show services hcm pic-statistics Interface: vms-5/2/0 Session statistics 895 Number of Session Interest events Number of Session Create events Number of Session Close events Number of Session Destroy events Number of Session Data events Number of Session Handle failures Number of Session Extension allocations Number of Session Extension alloc failures Number of Session Extension frees TCP Proxy statistics Number of missing stbuf Number of stbuf initializations Number of stbuf initialization failures Number of stbuf store failures Number of stbuf frees Number of stbuf free failures Number of stbuf sends Number of stbuf send failures Number of stbuf receives Number of stbuf throttles Number of invalid stbuf THR statistics Number of THR creates Number of missing THR handles Number of THR create failures Number of THR store failures Number of THR short circuit failures Number of THR update failures Number of THR state updates Number of THR destroy failures Number of THR destroys JCPP statistics Number of JCPP handle allocations Number of JCPP handle allocation failures Header Insertion statistics Number of HCM Header Insertions Number of HCM IP Mask modifications Number of HCM Header Insertion failures Number of HCM Tags too large Number of HCM Tag encryption failures Number of HCM requests Number of missing Subscribers in HCM :90064 :90064 :90064 :90064 :90064 :0 :90064 :0 :90064 :0 :0 :0 :0 :0 :0 :0 :0 :0 :0 :0 :90064 :0 :0 :0 :0 :0 :180128 :0 :0 :0 :0 :90061 :90061 :0 :0 :0 :90061 :90061 896 Release Information Statement introduced in Junos OS Release 17.1. Support for Next Gen Services introduced in Junos OS Release 19.3R2 and 19.4R1 on MX Series routers MX240, MX480 and MX960. RELATED DOCUMENTATION show services hcm statistics | 885 show services lrf collector statistics IN THIS SECTION Syntax | 896 Description | 896 Options | 897 Required Privilege Level | 897 Output Fields | 897 Sample Output | 898 Release Information | 898 Syntax show services lrf collector statistics <collector-name> Description Display LRF statistics for one or more collectors. If a collector is not specified, statistics are displayed for all collectors. 897 Options none collector-name Display LRF statistics for all collectors. (Optional) Display LRF statistics for the specified collector. Required Privilege Level view Output Fields Table 30 on page 897 lists the output fields for the show services lrf collector statistics command. Output fields are listed in the approximate order in which they appear. Table 30: show services lrf collector statistics Output Fields Field Name Field Description Interface Name of the interface from which data records are sent to the collector. Templates registered Number of templates registered with the collector. Template registration failures Number of template registration failures. Templates active Number of active templates. Sessions received Number of data sessions received for logging of data. Sessions ignored Number of data sessions received for logging of data that were ignored. Records logged Number of logs sent to the collector. Records exported Number of data records exported to the collector. 898 Table 30: show services lrf collector statistics Output Fields (Continued) Field Name Field Description Record export failures Number of data record export attempts that failed. Sample Output show services lrf collector statistics user@host> show services lrf collector statistics LRF Collector Statistics Interface: ms-2/1/0 Templates registered: 0, Template registration failures: 0, Templates active: 1 Sessions received: 0, Sessions ignored: 0, Records logged: 0 Records exported: 0, Record export failures: 0 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Logging and Reporting Function for Subscribers show services lrf rule statistics IN THIS SECTION Syntax | 899 Description | 899 899 Options | 899 Required Privilege Level | 899 Output Fields | 899 Sample Output | 901 Release Information | 901 Syntax show services lrf rule statistics <rule-name> Description Display LRF statistics for one or more LRF rules. If an LRF rule is not specified, statistics are displayed for all LRF rules. Options none rule-name Display LRF statistics for all LRF rules. (Optional) Display LRF statistics for the specified LRF rule. Required Privilege Level view Output Fields Table 31 on page 900 lists the output fields for the show services lrf rule statistics command. Output fields are listed in the approximate order in which they appear. 900 Table 31: show services lrf rule statistics Output Fields Field Name Field Description Interface Name of the interface from which data records are sent to the collector. Rule Name of the LRF rule that caused data records to be exported to the collector. Template Name of the template that was used to export data records to the collector. Templates registered Number of templates registered with the collector. Template registration failures Number of template registration failures. Collector Name of the collector to which data records were sent. Sessions received Number of data sessions received for logging of data. Sessions ignored Number of data sessions received for logging of data that were ignored. Sessions logged Number of data sessions that had data records exported to the collector. Records exported Number of data records exported to the collector. Record export failures Number of data record export attempts that failed. 901 Sample Output show services lrf rule statistics user@host> show services lrf rule statistics LRF Rule Statistics Interface: ms-3/1/0 Rule: r1 Template: temp1 Templates registered: 2, Template registration failures: 0 Collector: coll1 Sessions received: 115, Sessions ignored: 0, Sessions logged: 134 Records exported: 134, Record export failures: 0 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Logging and Reporting Function for Subscribers show services lrf statistics IN THIS SECTION Syntax | 902 Description | 902 Required Privilege Level | 902 Output Fields | 902 Sample Output | 903 Release Information | 903 902 Syntax show services lrf statistics Description Display number of bytes, packets, and flows for carrying data records to the collector. Required Privilege Level view Output Fields Table 32 on page 902 lists the output fields for the show services lrf statistics command. Output fields are listed in the approximate order in which they appear. Table 32: show services lrf statistics Output Fields Field Name Field Description Interface Name of the interface from which data records are sent to the collector. Flow packets Number of packets carrying data records to the collector. Flow bytes Number of bytes carrying data records to the collector. Active flows Number of active flows carrying data records to the collector. Total flows Total number of flows for carrying data records to the collector. 903 Sample Output show services lrf statistics user@host> show services lrf statistics LRF Statistics Interface: ms-3/1/0 Flow packets: 31125, Flow bytes: 15335751 Active flows: 0, Total flows: 1887 Interface: ms-3/2/0 Flow packets: 0, Flow bytes: 0 Active flows: 0, Total flows: 0 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Logging and Reporting Function for Subscribers show services lrf template IN THIS SECTION Syntax | 904 Description | 904 Options | 904 Required Privilege Level | 905 Sample Output | 905 Release Information | 906 904 Syntax show services lrf template option Description Display the fields for a template type. You must specify a template type. Options option Specify one of the following template types: · device-data--Display the fields for the Device Data template type. · flow-id--Display the fields for the Flow ID template type. · http--Display the fields for the HTTP template type. · ifl-subscriber--Display the fields for the IFL Subscriber template type. · ipflow--Display the fields for the IPFlow template type. · ipflow-extended--Display the fields for the IPFlow Extended template type. · ipflow-tcp--Displays the fields for the IPFlow TCP template type. · ipflow-tcp-ts--Displays the fields for the IPFlow TCP Timestamp template type. · ipflow-ts--Display the fields for the IPFlow Timestamp template type. · ipv4--Display the fields for the IPv4 template type. · ipv4-extended--Display the fields for the IPv4 Extended template type. · ipv6--Display the fields for the IPv6 template type. · ipv6-extended--Display the fields for the IPv6 Extended template type. · l7-app--Display the fields for the L7 Application template type. · mobile-subscriber--Display the fields for the Mobile Subscriber template type. · pcc--Display the fields for the PCC template type. · subscriber-data--Display the fields for the Subscriber Data template type. 905 · wireline-subscriber--Display the fields for the Wireline Subscriber template type. Required Privilege Level view Sample Output show services lrf template ipv4 user@host> show services lrf template ipv4 LRF Template fields Ipv4 source address Ipv4 destination address TCP/UDP source port TCP/UDP destination port show services lrf template ipflow-extended user@host> show services lrf template ipflow-extended Field Element Id Length(bytes) Service set name 520 16 Routing-instance 521 16 Vendor Juniper Juniper show services lrf template ipflow-tcp-ts user@host> show services lrf template ipflow-tcp-ts Field Element Id Smooth RTT uplink 10000 Smooth RTT downlink 10001 Client setup Time 10002 Server Setup time 10003 Client first payload timestamp 10004 Upload time 10005 Server first payload timestamp 10006 Download time 10007 Length(bytes) 4 4 4 4 8 4 8 4 Vendor Juniper Juniper Juniper Juniper Juniper Juniper Juniper Juniper 906 Acknowledged volumes uplink 10008 8 Acknowledged volumes downlink 10009 8 Juniper Juniper show services lrf template ipflow-tcp user@host> show services lrf template ipflow-tcp Field Element Id Retransmitted TCP packets uplink 115 Retransmitted TCP packets downlink 116 TCP flow creation timestamp 121 Length(bytes) 4 4 8 Vendor Juniper Juniper Juniper Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Logging and Reporting Function for Subscribers show services traffic-detection-function hcm statistics IN THIS SECTION Syntax | 907 Description | 907 Options | 907 Required Privilege Level | 907 Output Fields | 907 Sample Output | 910 Sample Output | 910 Release Information | 911 907 Syntax show services traffic-detection-function hcm statistics <ipv4-address v4-addr> <ipv6-address v6-addr> <routing-instance routing-instance> Description Display the statistics related to HTTP header enrichment for all the active HTTP sessions for the TDF subscriber. Options none Display HTTP header enrichment statistics for all active HTTP sessions. ipv4-address v4-addr (Optional) Display HCM statistics for the specified IPv4 address of the subscriber's user equipment (UE). ipv6-address v6-addr (Optional) Display HCM statistics for the specified IPv6 address of the subscriber's user equipment. routing-instance routing-instance (Optional) Display HCM statistics for the specified routing instance of the subscriber's user equipment. Required Privilege Level view Output Fields Table 33 on page 908 lists the output fields for the show services traffic-detection-function hcm statistics command. Output fields are listed in the approximate order in which they appear. 908 Table 33: show services traffic-detection-function hcm statistics Output Fields Field Name Field Description Interface Name Name of the services PIC on which data sessions are being serviced. The HTTP header enrichment statistics sessions are displayed per services PIC. Session id Identifier for the session. Subscriber-type Type of subscriber: · ip--IP-based subscriber. · ifl--Interface-based subscriber. IMSI International Mobile Subscriber Identity (IMSI) of the subscriber's user detail equipment (UE). MSISDN Mobile station ISDN of the subscriber's user equipment. Header inserted Number of times that tags were successfully inserted into HTTP headers for the data session. Header insert failed Number of times that the insertion of tags into HTTP headers failed for the data session. Header renamed Number of times an HTTP header was renamed. Header rename fail Number of times an attempt to rename an HTTP header failed. IPV4 mask modification Number of times IPv4 address mask was inserted. IPV6 mask modification Number of times IPv6 address mask was inserted. 909 Table 33: show services traffic-detection-function hcm statistics Output Fields (Continued) Field Name Field Description Tag too large Number of tags that cannot be inserted into HTTP headers because the tag size was larger than the maximum configured size for the data session. Tag encryption failed Number of times that the encryption of HTTP tags used for header insertion failed for the data session. Total Get request Total number of HTTP Get Requests received for the data session. Subscriber info unavailable Number of times that subscriber attributes were missing during attempted header insertions for the data session. Subscriber attribute missing Number of times that tags were not inserted because subscriber attributes were missing. IPV4 attribute missing Number of times that tags were not inserted because subscriber IPv4 user address attributes were missing. IPV6 attribute missing Number of times that tags were not inserted because subscriber IPv6 user address attributes were missing. IPV4 / IPV6 attribute Number of times that IPv4 and IPv6 user address tags were successfully inserted into HTTP headers. 910 Sample Output show services traffic-detection-function hcm statistics routing-instance user@host> show services traffic-detection-function hcm statistics routing-instance r1 Interface Name: mams-2/3/0 (ams1) Session id: 134217730, Subscriber-type: ip Header inserted : 6 Header insert failed : 0 Header renamed : 36 Header rename fail : 0 IPV4 mask modification : 3 IPV6 mask modification : 0 Tag too large : 0 Tag encryption failed : 0 Total Get request : 3 Subscriber info unavailable : 9 Subscriber attribute missing : 9 IPV4 attribute missing : 0 IPV6 attribute missing : 3 IPV4 / IPV6 attributes : 0 Sample Output show services traffic-detection-function hcm statistics ipv4-address routing-instance user@host> show services traffic-detection-function hcm statistics ipv4-address 192.0.2.1 routing- instance default Interface Name: mams-2/0/0 (ams1) Session id: 67108865, Subscriber Type: IP, IMSI: 324234324, MSISDN: 0 Header inserted : 0 Header insert failed : 0 Header renamed : 0 Header rename fail : 0 IPV4 mask modification : 0 IPV6 mask modification : 0 Tag too large : 0 Tag encryption failed : 0 Total Get request : 0 911 Subscriber info unavailable : 0 Subscriber attribute missing : 0 IPV4 attribute missing : 0 IPV6 attribute missing : 0 IPV4 / IPV6 attributes : 0 Release Information Statement introduced in Junos OS Release 17.1. This statement is not supported for Next Gen Services. RELATED DOCUMENTATION show services traffic-detection-function sessions | 911 show services traffic-detection-function sessions IN THIS SECTION Syntax | 911 Description | 912 Options | 912 Required Privilege Level | 912 Output Fields | 912 Sample Output | 914 Sample Output | 914 Release Information | 914 Syntax show services traffic-detection-function sessions <ipv4-address v4-addr> 912 <ipv6-address v6-addr> <routing-instance routing-instance> Description Display the active data sessions (TCP or UDP flows) that are being serviced (passing through a services PIC) for a specified TDF subscriber. Options none No output is displayed. ipv4-address v4-addr (Optional) Display subscriber sessions for the specified IPv4 address of the subscriber's user equipment (UE). ipv6-address v6-addr (Optional) Display subscriber sessions for the specified IPv6 address of the subscriber's user equipment. routing-instance routing- (Optional) Display subscriber sessions for the specified routing instance. instance Required Privilege Level view Output Fields Table 34 on page 912 lists the output fields for the show services traffic-detection-function sessions command. Output fields are listed in the approximate order in which they appear. Table 34: show services traffic-detection-function sessions Output Fields Field Name Field Description Interface Name Name of the service PIC on which data sessions are being serviced. The data sessions are displayed per services PIC. 913 Table 34: show services traffic-detection-function sessions Output Fields (Continued) Field Name Field Description Service Set Name of the service set on which the data session is being serviced. Session Identifier for the data session. ALG Identifier for the application-level gateway (ALG). Subscriber-type Type of subscriber: · ip--IP-based subscriber. · ifl--Interface-based subscriber. IMSI International Mobile Subscriber Identity (IMSI) of the subscriber's user detail equipment (UE). MSISDN Mobile station ISDN of the subscriber's user equipment. For each session, the following information, pertaining to the flow, is displayed: · Flow protocol: TCP, UDP, or ICMP · Flow source IP address and source port address · Flow destination IP address and destination port address · Flow state: Forward or Drop · Flow direction: input (I) or output (O) · Number of packets transmitted 914 Sample Output show services traffic-detection-function sessions routing-instance user@host> show services traffic-detection-function sessions routing-instance r1 Interface Name: mams-5/1/0 (ams1) Service Set: set-hcm, Session: 67258263, ALG: none, Subscriber-type: ip TCP 192.0.2.8:17751 -> 198.51.100.5:80 Forward I 31 TCP 198.51.100.5:80 -> 192.0.2.8:17751 Forward O 53 Service Set: set-hcm, Session: 67269654, ALG: none, Subscriber-type: ifl TCP 192.0.2.8:18572 -> 198.51.100.5:80 Forward I 31 TCP 198.51.100.5:80 -> 192.0.2.8:18572 Forward O 54 Service Set: set-hcm, Session: 83939629, ALG: none, Subscriber-type: ifl TCP 192.0.2.8:20826 -> 198.51.100.5:80 Forward I 31 TCP 198.51.100.5:80 -> 192.0.2.8:20826 Forward O 53 Sample Output show services traffic-detection-function sessions ipv4-address routing-instance user@host> show services traffic-detection-function sessions ipv4-address 203.0.113.1 routing-instance default Interface Name: mams-2/0/0 (ams1) Service Set: tdf-service-set, Session: 33554433, ALG: none, Subscriber Type: IP, IMSI: 324234324, MSISDN: 0 ICMP 203.0.113.1 -> 10.11.0.1 Forward I 81 ICMP 10.11.0.1 -> 203.0.113.1 Forward O 0 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show unified-edge tdf subscribers | 1038 915 show unified-edge tdf aaa radius client statistics IN THIS SECTION Syntax | 915 Description | 915 Options | 915 Required Privilege Level | 916 Output Fields | 916 Sample Output | 918 Release Information | 923 Syntax show unified-edge tdf aaa radius client statistics <brief | detail> <fpc-slot fpc-slot> <gateway gateway> <client name> <pic-slot pic-slot> Description Display the statistics for the accounting packets transmitted and received from the RADIUS client for one or more TDF gateways. If a TDF gateway is not specified, then information for all TDF gateways is displayed. Options none brief | detail client name Display statistics for all TDF gateways. (Optional) Display the specified level of output. (Optional) Display statistics for the specified RADIUS client. 916 fpc-slot fpc-slot (Optional) Display statistics for the specified Flexible PIC Concentrator (FPC). gateway gateway (Optional) Display statistics for the specified TDF gateway. pic-slot pic-slot (Optional) Display statistics for the specified PIC slot number. You must first specify an FPC slot number before specifying the PIC slot number. Required Privilege Level view Output Fields Table 35 on page 916 lists the output fields for the show unified-edge tdf aaa radius client statistics command. Output fields are listed in the approximate order in which they appear. Table 35: show unified-edge tdf aaa radius client statistics Output Fields Field Name Field Description Level of Output Client Name of the RADIUS client. All levels Gateway Name Name of the TDF gateway. All levels FPC/PIC FPC and PIC slot numbers for which the statistics are displayed. detail 917 Table 35: show unified-edge tdf aaa radius client statistics Output Fields (Continued) Field Name Field Description Level of Output Accounting Requests Number of accounting requests sent to the RADIUS server from the FPC slot and PIC slot. The following information is displayed about each request type: All levels · Start--Number of Accounting Start requests sent. · Stop--Number of Accounting Stop requests sent. · Interim--Number of Accounting Interim-Update requests sent. · On--Number of Accounting On requests sent. · Off--Number of Accounting Off requests sent. Accounting Responses Number of accounting responses sent to the RADIUS server from the FPC slot and PIC slot. The following information is displayed about each request type: All levels · Start--Number of Accounting Start responses sent. · Stop--Number of Accounting Stop responses sent. · Interim--Number of Accounting Interim-Update responses sent. · On--Number of Accounting On responses sent. · Off--Number of Accounting Off responses sent. Duplicate Requests Number of duplicate accounting requests sent to the RADIUS All levels server. Malformed Requests Number of malformed accounting requests sent to the RADIUS server. All levels 918 Table 35: show unified-edge tdf aaa radius client statistics Output Fields (Continued) Field Name Field Description Level of Output Bad Authenticators Number of responses received from the RADIUS server with All levels bad authenticators. Unknown Types Number of unknown type responses (that the TDF gateway does not recognize) received from the RADIUS server. All levels Dropped Packets Number of packets dropped. All levels Sample Output show unified-edge tdf aaa radius client statistics brief user@host> show unified-edge tdf aaa radius client statistics brief Client: pgwclient Gateway Name: TDF Accounting Requests: 8 Start: 8 Stop: 0 Interim: 0 On: 0 Off: 0 Accounting Responses: 8 Start: 8 Stop: 0 Interim: 0 On: 0 Off: 0 Duplicate Requests: 0 Malformed Requests: 0 Bad Authenticators: 0 Unknown Types: 0 Dropped Packets: 0 919 Client: pgwclient_jrad Gateway Name: TDF Accounting Requests: 0 Start: 0 Stop: 0 Interim: 0 On: 0 Off: 0 Accounting Responses: 0 Start: 0 Stop: 0 Interim: 0 On: 0 Off: 0 Duplicate Requests: 0 Malformed Requests: 0 Bad Authenticators: 0 Unknown Types: 0 Dropped Packets: 0 Client: pgwclient_jrad1 Gateway Name: TDF Accounting Requests: 0 Start: 0 Stop: 0 Interim: 0 On: 0 Off: 0 Accounting Responses: 0 Start: 0 Stop: 0 Interim: 0 On: 0 Off: 0 Duplicate Requests: 0 Malformed Requests: 0 Bad Authenticators: 0 Unknown Types: 0 Dropped Packets: 0 920 show unified-edge tdf aaa radius client statistics detail user@host> show unified-edge tdf aaa radius client statistics detail Client: pgwclient Gateway Name: TDF FPC/PIC: 2/0 Accounting Requests: 8 Start: 8 Stop: 0 Interim: 0 On: 0 Off: 0 Accounting Responses: 8 Start: 8 Stop: 0 Interim: 0 On: 0 Off: 0 Duplicate Requests: 0 Malformed Requests: 0 Bad Authenticators: 0 Unknown Types: 0 Dropped Packets: 0 Client: pgwclient Gateway Name: TDF FPC/PIC: 2/1 Accounting Requests: 0 Start: 0 Stop: 0 Interim: 0 On: 0 Off: 0 Accounting Responses: 0 Start: 0 Stop: 0 Interim: 0 On: 0 Off: 0 Duplicate Requests: 0 Malformed Requests: 0 Bad Authenticators: 0 921 Unknown Types: 0 Dropped Packets: 0 Client: pgwclient_jrad Gateway Name: TDF FPC/PIC: 2/0 Accounting Requests: 0 Start: 0 Stop: 0 Interim: 0 On: 0 Off: 0 Accounting Responses: 0 Start: 0 Stop: 0 Interim: 0 On: 0 Off: 0 Duplicate Requests: 0 Malformed Requests: 0 Bad Authenticators: 0 Unknown Types: 0 Dropped Packets: 0 Client: pgwclient_jrad Gateway Name: TDF FPC/PIC: 2/1 Accounting Requests: 0 Start: 0 Stop: 0 Interim: 0 On: 0 Off: 0 Accounting Responses: 0 Start: 0 Stop: 0 Interim: 0 On: 0 Off: 0 Duplicate Requests: 0 Malformed Requests: 0 Bad Authenticators: 0 Unknown Types: 0 922 Dropped Packets: 0 Client: pgwclient_jrad1 Gateway Name: TDF FPC/PIC: 2/0 Accounting Requests: 0 Start: 0 Stop: 0 Interim: 0 On: 0 Off: 0 Accounting Responses: 0 Start: 0 Stop: 0 Interim: 0 On: 0 Off: 0 Duplicate Requests: 0 Malformed Requests: 0 Bad Authenticators: 0 Unknown Types: 0 Dropped Packets: 0 Client: pgwclient_jrad1 Gateway Name: TDF FPC/PIC: 2/1 Accounting Requests: 0 Start: 0 Stop: 0 Interim: 0 On: 0 Off: 0 Accounting Responses: 0 Start: 0 Stop: 0 Interim: 0 On: 0 Off: 0 Duplicate Requests: 0 Malformed Requests: 0 Bad Authenticators: 0 923 Unknown Types: 0 Dropped Packets: 0 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION clear unified-edge tdf aaa radius client statistics | 777 show unified-edge tdf aaa statistics | 945 show unified-edge tdf aaa radius client status IN THIS SECTION Syntax | 923 Description | 924 Options | 924 Required Privilege Level | 924 Output Fields | 924 Sample Output | 925 Release Information | 925 Syntax show unified-edge tdf aaa radius client status <fpc-slot fpc-slot> <gateway gateway> <client name> <pic-slot pic-slot> 924 Description Display the status of the RADIUS client for one or more TDF gateways. If a TDF gateway is not specified, then information for all TDF gateways is displayed. Options none Display RADIUS client status for all TDF gateways. client name (Optional) Display the status for the specified RADIUS client. fpc-slot fpc-slot (Optional) Display the status for the specified Flexible PIC Concentrator (FPC). gateway gateway (Optional) Display the status for the specified TDF gateway. pic-slot pic-slot (Optional) Display the status for the specified PIC slot number. You must first specify an FPC slot number before specifying the PIC slot number. Required Privilege Level view Output Fields Table 36 on page 924 lists the output fields for the show unified-edge tdf aaa radius client status command. Output fields are listed in the approximate order in which they appear. Table 36: show unified-edge tdf aaa radius client status Output Fields Field Name Field Description Client Name of the RADIUS client. FPC/PIC FPC and PIC slot numbers for which the statistics are displayed. Address IP address of the RADIUS client. 925 Table 36: show unified-edge tdf aaa radius client status Output Fields (Continued) Field Name Field Description Last activity Day of the week, month, date, time, and year when the last operation occurred on the RADIUS client. The term No activity is displayed if no communication occurred between the RADIUS client and the TDF gateway. Sample Output show unified-edge tdf aaa radius client status user@host> show unified-edge tdf aaa radius statistics accounting brief Client FPC/PIC Address Last activity ------------------------------------------------------------------- pgwclient 2/0 192.0.2.3 Mon Jul 21 11:00:16 2014 pgwclient_j 2/0 198.51.100.2 No activity pgwclient_j 2/0 203.0.113.1 No activity Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION clear unified-edge tdf aaa radius client statistics | 777 show unified-edge tdf aaa statistics | 945 show unified-edge tdf aaa radius network-element statistics IN THIS SECTION Syntax | 926 926 Description | 926 Options | 926 Required Privilege Level | 927 Output Fields | 927 Sample Output | 928 Release Information | 929 Syntax show unified-edge tdf aaa radius network-element statistics <brief | detail> <fpc-slot fpc-slot> <gateway gateway> <name name> <pic-slot pic-slot> Description Display RADIUS network element statistics. If a TDF gateway is not specified, then statistics for all TDF gateways are displayed. Options none Display statistics for all TDF gateways. brief | detail (Optional) Display the specified level of output. The brief option is the default and displays the consolidated statistics for all TDF gateways, and the detail option displays the statistics for each Services PIC on the configured TDF gateways. fpc-slot fpc-slot (Optional) Display statistics for the specified Flexible PIC Concentrator (FPC). gateway gateway (Optional) Display statistics for the specified TDF gateway. name name (Optional) Display statistics for the specified network element. 927 pic-slot pic-slot (Optional) Display statistics for the specified PIC slot number. You must first specify an FPC slot number before specifying the PIC slot number. Required Privilege Level view Output Fields Table 37 on page 927 lists the output fields for the show unified-edge tdf aaa radius network-element statistics command. Output fields are listed in the approximate order in which they appear. Table 37: show unified-edge tdf aaa radius network-element statistics Output Fields Field Name Field Description Level of Output Network-element Name of the network element to which the statistics belong. All levels FPC/PIC FPC and PIC slot numbers for which statistics are displayed. detail Requests Attempted Number of access and accounting requests that were attempted. All levels Access Requests Sent Number of access requests sent. All levels Accounting Requests Sent Number of accounting requests All levels sent. Responses Received Number of access and accounting response messages received. All levels 928 Table 37: show unified-edge tdf aaa radius network-element statistics Output Fields (Continued) Field Name Field Description Level of Output Request Timeouts Number of access and accounting requests to the RADIUS server that timed out. All levels Memory Failures Number of internal memory allocation failures. All levels Invalid State Errors Number of access requests and accounting requests that were attempted in non-operational state. All levels No Radius Server Found Number of access requests and accounting requests that failed because no more RADIUS servers were available. All levels Source Port allocation Errors Number of access and accounting requests that failed because of source port allocation failure for outgoing RADIUS messages. All levels Send Failures Total number of failed attempts to send access requests and accounting requests. All levels Sample Output show unified-edge tdf aaa radius network-element statistics detail user@host> show unified-edge tdf aaa radius network-element statistics detail Network-element: ne1 929 FPC/PIC: 5/2 Requests Attempted: 0 Access Requests Sent: 0 Accounting Requests Sent: 0 Responses Received: 0 Request Timeouts: 0 Memory Failures: 0 Invalid State Errors: 0 No Radius Server Found: 0 Source Port allocation Errors: 0 Send Failures: 0 Network-element: ne2 FPC/PIC: 5/2 Requests Attempted: 0 Access Requests Sent: 0 Accounting Requests Sent: 0 Responses Received: 0 Request Timeouts: 0 Memory Failures: 0 Invalid State Errors: 0 No Radius Server Found: 0 Source Port allocation Errors: 0 Send Failures: 0 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION clear unified-edge tdf aaa radius network-element statistics | 779 Understanding Network Elements | 71 930 show unified-edge tdf aaa radius server statistics IN THIS SECTION Syntax | 930 Description | 930 Options | 930 Required Privilege Level | 931 Output Fields | 931 Sample Output | 935 Release Information | 936 Syntax show unified-edge tdf aaa radius server statistics <brief | detail> <fpc-slot fpc-slot> <gateway gateway> <name name> <pic-slot pic-slot> Description Display RADIUS server statistics. If a TDF gateway is not specified, then statistics for all TDF gateways are displayed. Options none brief | detail Display the same output as the brief option. (Optional) Display the specified level of output. The brief option is the default and displays the consolidated statistics for all TDF gateways, and the detail option displays the statistics for each Services PIC on the configured TDF gateways. 931 fpc-slot fpc-slot (Optional) Display statistics for the specified Flexible PIC Concentrator (FPC). gateway gateway (Optional) Display statistics for the specified TDF gateway. name name (Optional) Display statistics for the specified RADIUS server. pic-slot pic-slot (Optional) Display statistics for the specified PIC slot number. You must first specify an FPC slot number before specifying the PIC slot number. Required Privilege Level view Output Fields Table 38 on page 931 lists the output fields for the show unified-edge tdf aaa radius server statistics command. Output fields are listed in the approximate order in which they appear. Table 38: show unified-edge tdf aaa radius server statistics Output Fields Field Name Field Description Level of Output RADIUS server Name of the RADIUS server. All levels Address IP address of the RADIUS server. All levels Routing-instance Routing-instance of RADIUS server's source address. detail Authentication Statistics Port FPC/PIC RADIUS server port number to which access requests are sent. All levels FPC and PIC slot numbers for which the statistics are displayed. detail 932 Table 38: show unified-edge tdf aaa radius server statistics Output Fields (Continued) Field Name Field Description Level of Output Access requests Number of access requests sent to the RADIUS server. All levels Access req retransmissions Number of access requests retransmitted to the RADIUS server. All levels Access accepts Number of access accepts sent by the RADIUS server. All levels Access rejects Number of access requests rejected by the RADIUS server. All levels Malformed responses Number of malformed access responses received from the RADIUS server. All levels Bad authenticators Number of bad authentication responses received for access-requests. All levels Timeouts Number of access requests to the RADIUS server that timed out. All levels Unknown types Number of unknown type responses received from the All levels RADIUS server for access requests. Packets dropped Number of packets dropped for access requests and responses. All levels Accounting Statistics Port RADIUS server port number to which accounting All levels requests are sent. 933 Table 38: show unified-edge tdf aaa radius server statistics Output Fields (Continued) Field Name Field Description Level of Output Accounting requests Number of accounting requests sent to the RADIUS server. The following information is displayed about each request type for the detail level: · Start--Number of accounting start requests sent. · Stop--Number of accounting stop requests sent. · Interim--Number of accounting interim-update requests sent. · On--Number of accounting on requests sent. · Off--Number of accounting off requests sent. All levels Accounting req retransmissions Number of accounting requests retransmitted to the RADIUS server. All levels Accounting responses Number of accounting responses received from the RADIUS server. All levels Malformed responses Number of malformed accounting responses received from the RADIUS server. All levels Bad authenticators Number of bad accounting responses received for accounting requests. All levels Timeouts Number of accounting requests to the RADIUS server that timed out. All levels Unknown types Number of unknown type responses (that the TDF gateway does not recognize) received from the RADIUS server for accounting requests. All levels 934 Table 38: show unified-edge tdf aaa radius server statistics Output Fields (Continued) Field Name Field Description Level of Output Packets dropped Number of packets dropped for accounting requests and responses. All levels Dynamic Authorization Request Statistics CoA requests received Number of change of authorization (CoA) requests received from the RADIUS server. All levels DM requests received Number of Disconnect Message (DM) requests received from the RADIUS server. All levels CoA Acks sent Number of CoA acknowledgements sent to the RADIUS server. All levels CoA Nacks sent Number of CoA negative acknowledgements sent to the RADIUS server. All levels DM Acks sent Number of DM acknowledgements sent to the RADIUS All levels server. DM Nacks sent Number of DM negative acknowledgements sent to the All levels RADIUS server. Dropped Number of dynamic authorization requests dropped. All levels 935 Sample Output show unified-edge tdf aaa radius server statistics detail user@host> show unified-edge tdf aaa radius server statistics detail RADIUS server: radius1 (FPC/PIC: 5/2) Address: 192.0.2.2 Routing-instance: default Authentication Statistics: Port: 1812 Access requests: 0 Access req retransmissions: 0 Access accepts: 0 Access rejects: 0 Malformed responses: 0 Bad authenticators: 0 Timeouts: 0 Unknown types: 0 Packets dropped: 0 Accounting Statistics: Port: 1813 Accounting requests: 0 Start: 0 Stop: 0 Interim: 0 On: 0 Accounting req retransmissions: 0 Accounting responses: 0 Malformed responses: 0 Bad authenticators: 0 Timeouts: 0 Unknown types: 0 Packets dropped: 0 Dynamic Authorization Request Statistics: CoA requests received: 0 DM requests received: 0 CoA Acks sent: 0 CoA Nacks sent: 0 DM Acks sent: 0 DM Nacks sent: 0 Dropped: 0 Off: 0 936 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION clear unified-edge tdf aaa radius server statistics | 781 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 show unified-edge tdf aaa radius server status IN THIS SECTION Syntax | 936 Description | 937 Options | 937 Required Privilege Level | 937 Output Fields | 937 Sample Output | 939 Release Information | 940 Syntax show unified-edge tdf aaa radius server status <brief | detail> <fpc-slot fpc-slot> <gateway gateway> <name name> <pic-slot pic-slot> 937 Description Display RADIUS server status. If a TDF gateway is not specified, then statistics for all TDF gateways are displayed. Options none (Same as brief) Display consolidated statistics for all TDF gateways. brief | detail (Optional) Display the specified level of output. The brief option is the default. fpc-slot fpc-slot (Optional) Display statistics for the specified Flexible PIC Concentrator (FPC). gateway gateway (Optional) Display statistics for the specified TDF gateway. pic-slot pic-slot (Optional) Display statistics for the specified PIC slot number. You must first specify an FPC slot number before specifying the PIC slot number. Required Privilege Level view Output Fields Table 39 on page 937 lists the output fields for the show unified-edge tdf aaa radius server status command. Output fields are listed in the approximate order in which they appear. Table 39: show unified-edge tdf aaa radius server status Output Fields Field Name Field Description Level of Output Server Name of the RADIUS server. brief RADIUS Server Name of the RADIUS server. detail FPC/PIC FPC and PIC slot numbers for which the statistics are displayed. All levels 938 Table 39: show unified-edge tdf aaa radius server status Output Fields (Continued) Field Name Field Description Level of Output Address IP address of the RADIUS server. All levels State State of the RADIUS server: Active or Inactive (dead). All levels Duration Duration, in weeks:days:MM:SS format, for which the RADIUS server has been in the current state. All levels Previous duration Duration, in HH:MM:SS format, for which the RADIUS server was in the previous state. All levels Flaps Number of times that the RADIUS server transitioned from the active to inactive state. All levels Authentication Information Pending requests Round trip time (ms) Accounting Information Number of access requests waiting for responses from the RADIUS server. detail Time taken to receive the response from the RADIUS server for access requests. The minimum, maximum, and average round-trip times are also displayed. detail 939 Table 39: show unified-edge tdf aaa radius server status Output Fields (Continued) Field Name Field Description Level of Output Pending requests Number of accounting requests waiting for detail responses from the RADIUS server. Round trip time (ms) Time taken to receive the response from the RADIUS server for accounting requests. The minimum, maximum, and average round-trip times are also displayed. detail Sample Output show unified-edge tdf aaa radius server status brief user@host> show unified-edge tdf aaa radius server status brief FPC/ Previous Server PIC Address State Duration Duration Flaps ------------------------------------------------------------------------------- radius1 5/2 192.0.2.2 Active 1w5d 23:12 00:00:00 0 radius2 5/2 198.51.100.100 Active 1w5d 23:12 00:00:00 0 radius3 5/2 203.0.113.100 Active 1w5d 23:12 00:00:00 0 radius4 5/2 203.0.113.100 Active 1w5d 23:12 00:00:00 0 show unified-edge tdf aaa radius server status detail user@host> show unified-edge tdf aaa radius server status detail RADIUS server: pgwcl (FPC/PIC: 4/0) Address : 198.51.100.100 State : Active Duration : 1w6d 11:29 Previous Duration : 00:00:00 Flaps : 0 Authentication Information: Pending requests : 0 940 Round trip time (ms) : 1 (Min: 1 Max: 1 Avg: 1) Accounting Information: Pending requests : 0 Round trip time (ms) : 0 (Min: 0 Max: 0 Avg: 0) Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show unified-edge tdf aaa radius server statistics | 930 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 show unified-edge tdf aaa radius snoop-segment statistics IN THIS SECTION Syntax | 940 Description | 941 Options | 941 Required Privilege Level | 941 Output Fields | 941 Sample Output | 943 Release Information | 945 Syntax show unified-edge tdf aaa radius snoop-segment statistics <brief | detail> <fpc-slot fpc-slot> <gateway gateway> 941 <pic-slot pic-slot> <segment snoop-segment-name> Description Display statistics for snoop segments. If a snoop segment is not specified, then statistics for all snoop segments are displayed. Options none brief | detail fpc-slot fpc-slot gateway gateway pic-slot pic-slot segment snoopsegment-name (Same as brief) Display statistics for all snoop segments for all TDF gateways. (Optional) Display the specified level of output. The brief option displays the consolidated statistics for all TDF gateways, and the detail option displays the statistics for each Services PIC on the configured TDF gateways. (Optional) Display statistics for the specified Flexible PIC Concentrator (FPC). (Optional) Display statistics for the specified TDF gateway. (Optional) Display statistics for the specified PIC slot number. You must first specify an FPC slot number before specifying the PIC slot number. (Optional) Display statistics for the specified snoop segment. Required Privilege Level view Output Fields Table 40 on page 942 lists the output fields for the show unified-edge tdf aaa radius snoop-segment statistics command. Output fields are listed in the approximate order in which they appear. 942 Table 40: show unified-edge tdf aaa radius snoop-segment statistics Output Fields Field Name Field Description Level of Output Snoop-segment Name of the snoop-segment for which statistics are displayed. All levels Gateway Name Name of the TDF gateway. If the statistics for all TDF gateways are displayed, then All is displayed. All levels FPC/PIC FPC and PIC slot numbers for which the statistics are displayed. detail Accounting Requests The following information is displayed for each category: · Start--Number of snooped Accounting Start requests. · Interim--Number of snooped Accounting InterimUpdate requests. · Stop--Number of snooped Accounting Stop requests. · On--Number of snooped Accounting On requests. · Off--Number of snooped Accounting Off requests. All levels Duplicate Requests Number of duplicate snooped accounting requests. All levels Malformed Requests Number of snooped malformed accounting requests. All levels Bad Authenticators Number of snooped acccounting requests with bad authenticators. All levels Unknown Types Number of snooped accounting requests of unknown type. All levels Dropped Packets Number of snooped packets dropped. All levels 943 Sample Output show unified-edge tdf aaa radius snoop-segment statistics brief user@host> show unified-edge tdf aaa radius snoop-segment statistics brief Snoop-segment: 123 Gateway Name: TDF Accounting Requests: 0 Start: 0 Stop: 0 Interim: 0 On: 0 Off: 0 Duplicate Requests: 0 Malformed Requests: 0 Bad Authenticators: 0 Unknown Types: 0 Dropped Packets: 0 Snoop-segment: dummy Gateway Name: TDF Accounting Requests: 0 Start: 0 Stop: 0 Interim: 0 On: 0 Off: 0 Duplicate Requests: 0 Malformed Requests: 0 Bad Authenticators: 0 Unknown Types: 0 Dropped Packets: 0 show unified-edge tdf aaa radius snoop-segment statistics detail user@host> show unified-edge tdf aaa radius snoop-segment statistics detail Snoop-segment: 123 Gateway Name: TDF FPC/PIC: 4/0 944 Accounting Requests: 0 Start: 0 Stop: 0 Interim: 0 On: 0 Off: 0 Duplicate Requests: 0 Malformed Requests: 0 Bad Authenticators: 0 Unknown Types: 0 Dropped Packets: 0 Snoop-segment: 123 Gateway Name: TDF FPC/PIC: 4/1 Accounting Requests: 0 Start: 0 Stop: 0 Interim: 0 On: 0 Off: 0 Duplicate Requests: 0 Malformed Requests: 0 Bad Authenticators: 0 Unknown Types: 0 Dropped Packets: 0 Snoop-segment: dummy Gateway Name: TDF FPC/PIC: 4/0 Accounting Requests: 0 Start: 0 Stop: 0 Interim: 0 On: 0 Off: 0 Duplicate Requests: 0 Malformed Requests: 0 Bad Authenticators: 0 Unknown Types: 0 Dropped Packets: 0 Snoop-segment: dummy 945 Gateway Name: TDF FPC/PIC: 4/1 Accounting Requests: 0 Start: 0 Stop: 0 Interim: 0 On: 0 Off: 0 Duplicate Requests: 0 Malformed Requests: 0 Bad Authenticators: 0 Unknown Types: 0 Dropped Packets: 0 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION clear unified-edge tdf aaa radius snoop-segment statistics | 782 Configuring Snooping of RADIUS Accounting Requests for IP-Based Subscribers | 136 Snooping RADIUS Accounting Requests for IP-Based Subscribers Overview | 114 show unified-edge tdf aaa statistics IN THIS SECTION Syntax | 946 Description | 946 Options | 946 Required Privilege Level | 946 Output Fields | 947 Sample Output | 953 946 Release Information | 958 Syntax show unified-edge tdf aaa statistics <brief | detail> <fpc-slot fpc-slot> <gateway gateway> <pic-slot pic-slot> Description Display global statistics for accounting requests and responses for one or more TDF gateways. If a TDF gateway is not specified, then statistics for all TDF gateways are displayed. Options none (Same as brief) Display statistics for all TDF gateways. brief | detail (Optional) Display the specified level of output. The brief option displays the consolidated statistics for all TDF gateways, and the detail option displays the statistics for each Services PIC on the configured TDF gateways. fpc-slot fpc-slot (Optional) Display statistics for the specified Flexible PIC Concentrator (FPC). gateway gateway (Optional) Display statistics for the specified TDF gateway. pic-slot pic-slot (Optional) Display statistics for the specified PIC slot number. You must first specify an FPC slot number before specifying the PIC slot number. Required Privilege Level view 947 Output Fields Table 41 on page 947 lists the output fields for the show unified-edge tdf aaa statistics command. Output fields are listed in the approximate order in which they appear. Table 41: show unified-edge tdf aaa statistics Output Fields Field Name Field Description Level of Output Gateway Name Name of the TDF gateway. If the statistics for all TDF gateways are displayed, then All is displayed. All levels FPC/PIC FPC and PIC slot numbers for which the statistics are displayed. detail Total Messages Total number of all RADIUS requests and responses for the following categories: · Received · Sent · Snooped--Snooped by the MX Series router. · Forwarded In--Forwarded into the interface. · Forwarded Out--Forwarded out of the interface. All levels Forwarded In and Forwarded Out are displayed only with the detail option. Access Requests Number of access requests for the following category: · Sent--Sent to the RADIUS server from the FPC slot and PIC slot. All levels 948 Table 41: show unified-edge tdf aaa statistics Output Fields (Continued) Field Name Field Description Level of Output Access Responses Number of access responses for the following category: All levels · Received--Received from the RADIUS server for the FPC slot and PIC slot. The following information is displayed: · Accept--Number of access accepts sent by the RADIUS server. · Reject--Number of access requests rejected by the RADIUS server. Accounting Requests Number of accounting requests for the following categories: · Received · Sent · Snooped--Snooped by the MX Series router. All levels Forwarded In and Forwarded Out are displayed only with the detail option. · Forwarded In--Forwarded into the interface. · Forwarded Out--Forwarded out of the interface. The following information is displayed for each category: · Start--Number of Accounting Start requests. · Interim--Number of Accounting Interim-Update requests. · Stop--Number of Accounting Stop requests. · On--Number of Accounting On requests. · Off--Number of Accounting Off requests. 949 Table 41: show unified-edge tdf aaa statistics Output Fields (Continued) Field Name Field Description Level of Output Accounting Responses Number of accounting responses for the following categories: · Received · Sent · Snooped--Snooped by the MX Series router. · Forwarded In--Forwarded into the interface. · Forwarded Out--Forwarded out of the interface. All levels detail--Number of responses that are forwarded into the interface and forwarded out of the interface is displayed only with the detail option. The following information is displayed for each category: · Start--Number of Accounting Start responses. · Interim--Number of Accounting Interim-Update responses. · Stop--Number of Accounting Stop responses. · On--Number of Accounting On responses. · Off--Number of Accounting Off responses. Change of Auth Requests Number of change of authorization (CoA) requests for the following categories: · Received--Received from the RADIUS server. · Forwarded In--Forwarded into the interface. · Forwarded Out--Forwarded out of the interface. All levels Forwarded In and Forwarded Out are displayed only with the detail option. 950 Table 41: show unified-edge tdf aaa statistics Output Fields (Continued) Field Name Field Description Level of Output Change of Auth Responses Number of CoA responses for the following category: · Sent--Sent to the RADIUS server from the FPC slot and PIC slot. · Forwarded In--Forwarded into the interface. All levels Forwarded In and Forwarded Out are displayed only with the detail option. · Forwarded Out--Forwarded out of the interface. The following information is displayed: · Ack--Number of CoA acknowledgements sent to the RADIUS server. · Nack--Number of CoA negative acknowledgements sent to the RADIUS server. Disconnect Message Requests Number of Disconnect Message requests for the following categories: · Received--Received from the RADIUS server. · Forwarded In--Forwarded into the interface. · Forwarded Out--Forwarded out of the interface. All levels Forwarded In and Forwarded Out are displayed only with the detail option. 951 Table 41: show unified-edge tdf aaa statistics Output Fields (Continued) Field Name Field Description Level of Output Disconnect Number of Disconnect Message responses for the Message Responses following categories: · Sent--Sent to the RADIUS server. · Forwarded In--Forwarded into the interface. · Forwarded Out--Forwarded out of the interface. The following information is displayed: · Ack--Number of Disconnect Message acknowledgements sent to the RADIUS server. · Nack--Number of Disconnect Message negative acknowledgements sent to the RADIUS server. All levels Forwarded In and Forwarded Out are displayed only with the detail option. Duplicates Number of duplicate requests received from RADIUS clients. All levels Request Processing Number of errors that occurred during the processing of All levels errors accounting requests. Response Processing errors Number of errors that occurred during the processing of access and accounting response packets from the RADIUS server. All levels Request Transmit errors Number of errors that occurred during the transmission All levels of access and accounting requests. Response Transmit errors Number of errors that occurred during the transmission of access and accounting responses to the RADIUS server. All levels Request Enqueue Errors Number of errors that occurred while trying to place an access or accounting request packet in the queue. All levels 952 Table 41: show unified-edge tdf aaa statistics Output Fields (Continued) Field Name Field Description Level of Output Response Enqueue Errors Number of errors that occurred while trying to place an access or accounting response packet in the queue. All levels Request Timeouts Number of access and accounting requests to the RADIUS server that timed out. All levels Request Retransmissions Number of access and accounting requests that were retransmitted to the RADIUS server because they did not receive a response. All levels Dropped Requests Number of accounting requests that were dropped. All levels Dropped Responses Number of access or accounting responses from the RADIUS server that were dropped. All levels Missing TDF Domain Number of accounting requests from the GGSN, PGW, or BNG for which the TDF domain corresponding to the subscriber was not available. All levels Missing PCEF profile Number of accounting requests from the GGSN, PGW, or BNG for which the PCEF profile corresponding to the subscriber was not available. All levels Server Initiated Request Processing Errors Number of processing errors of CoA and Disconnect Message requests from the RADIUS server. All levels Dropped Server Initiated Requests Number of CoA and Disconnect Message requests from All levels the RADIUS server that were dropped. Duplicate Server Initiated Requests Number of duplicate requests received from RADIUS servers. All levels 953 Table 41: show unified-edge tdf aaa statistics Output Fields (Continued) Field Name Field Description Level of Output Cached Reply Sent Number of RADIUS cached responses sent for RADIUS accounting request messages from the GGSN, PGW, or BNG. RADIUS replies are stored in the MX Series router response cache. All levels Sample Output show unified-edge tdf aaa statistics brief user@host> show unified-edge tdf aaa statistics brief Gateway Name: TDF Messages Received Sent Snooped ---------------------------------------------------------------------- Total Messages 15 15 0 Access Requests 0 7 0 Access Responses 7 0 0 Accept 7 0 0 Reject 0 0 0 Accounting Requests 8 0 0 Start 8 0 0 Interim 0 0 0 Stop 0 0 0 On 0 0 0 Off 0 0 0 Accounting Responses 0 8 0 Start 0 8 0 Interim 0 0 0 Stop 0 0 0 On 0 0 0 Off 0 0 0 Change of Auth Requests 0 0 0 Change of Auth Responses 0 0 0 Ack 0 0 0 954 Nak 0 Disconnect Message Requests 0 Disconnect Message Responses 0 Ack 0 Nak 0 0 0 0 0 0 0 0 0 0 0 Duplicates: 0 Request Processing Errors: 0 Response Processing Errors: 0 Request Transmit Errors : 0 Response Transmit Errors: 0 Request Enqueue Errors: 0 Response Enqueue Errors: 0 Request Timeouts: 0 Request Retransmissions: 0 Missing TDF Domain: 0 Missing PCEF profile: 0 Dropped Requests: 0 Dropped Responses: 0 Server Initiated Request Processing Errors: 0 Dropped Server Initiated Requests: 0 Duplicate Server Initiated Requests: 0 Cached Reply Sent: 0 show unified-edge tdf aaa statistics detail user@host> show unified-edge tdf aaa statistics detail Gateway Name: TDF FPC/PIC: 2/0 Messages Received Sent Forwarded In Forwarded Out Snooped --------------------------------------------------------------------------------- ------------- Total Messages 2 0 0 Access Requests 0 0 0 2 0 0 0 955 Access Responses 0 0 0 Accept 0 0 0 Reject 0 0 0 Accounting Requests 2 0 0 Start 2 0 0 Interim 0 0 0 Stop 0 0 0 On 0 0 0 Off 0 0 0 Accounting Responses 0 0 0 Start 0 0 0 Interim 0 0 0 Stop 0 0 0 On 0 0 0 Off 0 0 0 Change of Auth Requests 0 0 0 Change of Auth Responses 0 0 0 Ack 0 0 0 Nak 0 0 0 Disconnect Message Requests 0 0 0 Disconnect Message Responses 0 0 0 Ack 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 956 0 0 Nak 0 0 0 0 0 Duplicates: 0 Request Processing Errors: 0 Response Processing Errors: 0 Request Transmit Errors : 0 Response Transmit Errors: 0 Request Enqueue Errors: 0 Response Enqueue Errors: 0 Request Timeouts: 0 Request Retransmissions: 0 Missing TDF Domain: 0 Missing PCEF profile: 0 Dropped Requests: 0 Dropped Responses: 0 Server Initiated Request Processing Errors: 0 Dropped Server Initiated Requests: 0 Duplicate Server Initiated Requests: 0 Cached Reply Sent: 0 Gateway Name: TDF FPC/PIC: 2/1 Messages Received Sent Forwarded In Forwarded Out Snooped --------------------------------------------------------------------------------- ----------------- Total Messages 0 0 0 0 0 Access Requests 0 0 0 0 0 Access Responses 0 0 0 0 0 Accept 0 0 0 0 0 Reject 0 0 0 0 0 Accounting Requests 0 0 0 0 0 Start 0 0 0 0 0 Interim 0 0 0 957 0 0 Stop 0 0 0 On 0 0 0 Off 0 0 0 Accounting Responses 0 0 0 Start 0 0 0 Interim 0 0 0 Stop 0 0 0 On 0 0 0 Off 0 0 0 Change of Auth Requests 0 0 0 Change of Auth Responses 0 0 0 Ack 0 0 0 Nak 0 0 0 Disconnect Message Requests 0 0 0 Disconnect Message Responses 0 0 0 Ack 0 0 0 Nak 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Duplicates: 0 Request Processing Errors: 0 Response Processing Errors: 0 Request Transmit Errors : 0 Response Transmit Errors: 0 Request Enqueue Errors: 0 Response Enqueue Errors: 0 958 Request Timeouts: 0 Request Retransmissions: 0 Missing TDF Domain: 0 Missing PCEF profile: 0 Number of Dropped Requests: 0 Dropped Responses: 0 Server Initiated Request Processing Errors: 0 Dropped Server Initiated Requests: 0 Duplicate Server Initiated Requests: 0 Cached Reply Sent: 0 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION clear unified-edge tdf aaa statistics | 784 show unified-edge tdf aaa radius client statistics | 915 show unified-edge tdf aaa radius server statistics | 930 Understanding How a RADIUS Server Controls Policy and Charging Control Rules | 64 IP-Based Subscriber Setup Overview | 107 Snooping RADIUS Accounting Requests for IP-Based Subscribers Overview | 114 show unified-edge tdf address-assignment pool IN THIS SECTION Syntax | 959 Description | 959 Options | 959 Required Privilege Level | 960 Output Fields | 960 959 Sample Output | 962 Release Information | 964 Syntax show unified-edge tdf address-assignment pool <brief | detail | summary> <fpc-slot fpc-slot> <gateway gateway-name> <name pool-name> <pic-slot pic-slot> <routing-instance routing-instance> Description Display information about the address pools for one or more TDF gateways. If a TDF gateway is not specified, then information for all TDF gateways is displayed. Options none (Same as brief) Display address information about the address pools in brief for all TDF gateways. brief | detail | summary (Optional) Display the specified level of output. fpc-slot fpc-slot (Optional) Display address pool information for the session PIC in the specified FPC slot. gateway gateway-name (Optional) Display address pool information for the specified TDF gateway. name pool-name (Optional) Display information for the specified address pool. pic-slot pic-slot (Optional) Display address pool information for the session PIC in the specified PIC slot. routing-instance routing- (Optional) Display the address pool information for the specified routing instance instance. 960 Required Privilege Level view Output Fields Table 42 on page 960 lists the output fields for the show unified-edge tdf address-assignment pool command. Output fields are listed in the approximate order in which they appear. Table 42: show unified-edge tdf address-assignment pool Output Fields Field Name Field Description Level of Output Pool or Name Name of the address pool. All levels FPC/PIC FPC and PIC slots of the session PIC for which the address pool information is displayed. detail Total addresses Total number of addresses available in the address pool. brief detail Total Total number of addresses available in summary the address pool. Addresses in use Number of addresses that have been allocated. brief detail In-use Number of addresses that have been allocated. summary Addresses skipped Number of addresses that are excluded from allocation. brief detail 961 Table 42: show unified-edge tdf address-assignment pool Output Fields (Continued) Field Name Field Description Level of Output Address usage (percent) Percentage of the total addresses used. brief detail Util (%) Percentage of the total addresses used. summary Addresses in aging period Number of addresses that are currently being released and that cannot be allocated. brief detail Routing Instance Name of the routing instance to which All levels the address pool belongs. Gateway TDF gateway to which the session PIC detail belongs. Pool Maintenance Service mode of the address pool; for detail Mode example, Operational or Maintenance. Address chunks Number of chunks of IP addresses in the address pool (for the session PIC) that are currently being assigned detail Total address chunk size Total number of addresses in the address chunk (for the session PIC). detail Total allocation failures Total number of addresses that were not allocated. detail 962 Sample Output show unified-edge tdf address-assignment pool brief user@host> show unified-edge tdf address-assignment pool brief Pool: pool1 Total addresses: 16777215 Addresses in use: 1600 Addresses skipped: 416 Address usage (percent): 0 Addresses in aging period: 1600 Routing instance: default Pool: pool2 Total addresses: 256 Addresses in use: 254 Addresses skipped: 2 Address usage (percent): 99 Addresses in aging period: 0 Routing instance: default [...output truncated...] show unified-edge tdf address-assignment pool detail user@host> show unified-edge tdf address-assignment pool detail Pool: pool1 (FPC/PIC: 4/0) Pool Maintenance Mode: Operational Total addresses: 16777215 Addresses in use: 822 Addresses skipped: 208 Address usage (percent): 0 Addresses in aging period: 822 Routing instance: default Gateway: TDF Address chunks: 26 963 Total address chunk size: 26416 Total allocation failures: 0 Pool: pool1 (FPC/PIC: 4/1) Pool Maintenance Mode: Operational Total addresses: 16777215 Addresses in use: 778 Addresses skipped: 208 Address usage (percent): 0 Addresses in aging period: 778 Routing instance: default Gateway: TDF Address chunks: 26 Total address chunk size: 26416 Total allocation failures: 0 Pool: pool2 (FPC/PIC: 4/0) Pool Maintenance Mode: Operational Total addresses: 256 Addresses in use: 0 Addresses skipped: 0 Address usage (percent): 0 Addresses in aging period: 0 Routing instance: default Gateway: TDF Address chunks: 0 Total address chunk size: 0 Total allocation failures: 0 [...output truncated...] show unified-edge tdf address-assignment pool summary user@host> show unified-edge tdf address-assignment pool summary Util Name Total In-use (%) Routing instance pool1 16777215 1600 0 default pool2 256 254 99 default pool3 256 47 18 default v4_pool 16777216 0 0 default v4_pool1 16777215 0 0 default 964 v6_pool v6_pool1 16777215 0 16777215 0 0 default 0 default Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION clear unified-edge tdf address-assignment pool | 786 show unified-edge tdf address-assignment service-mode IN THIS SECTION Syntax | 964 Description | 965 Options | 965 Required Privilege Level | 965 Output Fields | 965 Sample Output | 966 Release Information | 967 Syntax show unified-edge tdf address-assignment service-mode <brief | detail> <pool pool-name> <routing-instance routing-instance-name> 965 Description Display service mode information about address pools. Options none brief | detail pool pool-name routing-instance routing-instance-name (Same as brief) Display service mode information in brief. (Optional) Display the specified level of output. (Optional) Display service mode information for the specified address pool. (Optional) Display service mode information about the address pools that are part of the specified routing instance. Required Privilege Level view Output Fields Table 43 on page 965 lists the output fields for the show unified-edge tdf address-assignment servicemode command. Output fields are listed in the approximate order in which they appear. Table 43: show unified-edge tdf address-assignment service-mode Output Fields Field Name Field Description Level of Output Maintenance Mode Phases applicable when the address pool is in maintenance mode. None specified · MM - Active Phase--All the attributes of the address pool can be modified. · MM - In/Out Phase--Only the non-maintenance mode attributes of the address pool can be modified. Pool Name Name of the address pool. All levels 966 Table 43: show unified-edge tdf address-assignment service-mode Output Fields (Continued) Field Name Field Description Level of Output Routing Instance Routing instance to which the address pool belongs. All levels Service Mode Service mode for the address pool: All levels · Operational--Address pool is in operational mode. · Maintenance--Address pool is in maintenance mode. · Maintenance - Active Phase--All the attributes of the address pool can be modified. · Maintenance - In/Out Phase--Only the non-maintenance mode attributes of the address pool can be modified. Sample Output show unified-edge tdf address-assignment service-mode brief user@host> show unified-edge tdf address-assignment service-mode brief Maintenance Mode MM Active Phase - System is ready to accept configuration changes for all attributes of this object and its sub-hierarchies. MM In/Out Phase - System is ready to accept configuration changes only for non-maintenance mode attributes of this object and its sub-hierarchies. Routing-Instance Pool Name Service Mode default default my_pool v6_pool Operational Operational 967 show unified-edge tdf address-assignment service-mode detail user@host> show unified-edge tdf address-assignment service-mode detail Routing Instance: default Pool Name : my_pool Service Mode : Operational Routing Instance: default Pool Name : v6_pool Service Mode : Operational Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring Address Pools for Source-IP Filtering of IP-Based Subscribers | 119 show unified-edge tdf address-assignment statistics IN THIS SECTION Syntax | 968 Description | 968 Options | 968 Required Privilege Level | 968 Output Fields | 968 Sample Output | 969 Release Information | 970 968 Syntax show unified-edge tdf address-assignment statistics <brief | detail> <fpc-slot fpc-slot> <gateway gateway-name> <pic-slot pic-slot> Description Display address assignment statistics for one or more TDF gateways. If a TDF gateway is not specified, then the consolidated statistics for all TDF gateways are displayed. Options none (Same as brief) Display address assignment statistics in brief for all TDF gateways. brief | detail (Optional) Display the specified level of output. fpc-slot fpc-slot (Optional) Display statistics for the session PIC in the specified FPC slot. gateway gateway-name (Optional) Display consolidated statistics for the specified TDF gateway. pic-slot pic-slot (Optional) Display statistics for the session PIC in the specified PIC slot. Required Privilege Level view Output Fields Table 44 on page 969 lists the output fields for the show unified-edge tdf address-assignment statistics command. Output fields are listed in the approximate order in which they appear. 969 Table 44: show unified-edge tdf address-assignment statistics Output Fields Field Name Field Description Level of Output FPC/PIC FPC and PIC slots for which the statistics are displayed. detail Gateway Name of the TDF gateway. detail Total address allocations Total number of addresses allocated. All levels Total allocation failures Total number of address allocations that failed. All levels Total address releases Total number of addresses that were released. All levels Sample Output show unified-edge tdf address-assignment statistics user@host> show unified-edge tdf address-assignment statistics Address assignment statistics Total address allocations: 1101 Total allocation failures: 0 Total address releases: 800 show unified-edge tdf address-assignment statistics detail user@host> show unified-edge tdf address-assignment statistics detail Address assignment statistics (FPC/PIC: 4/0) Gateway: TDF Total address allocations: 416 Total allocation failures: 0 970 Total address releases: 416 Address assignment statistics (FPC/PIC: 4/1) Gateway: TDF Total address allocations: 685 Total allocation failures: 0 Total address releases: 384 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION clear unified-edge tdf address-assignment statistics | 788 show unified-edge tdf call-admission-control statistics IN THIS SECTION Syntax | 970 Description | 971 Options | 971 Required Privilege Level | 971 Output Fields | 971 Sample Output | 973 Release Information | 974 Syntax show unified-edge tdf call-admission-control statistics <detail> 971 <fpc-slot fpc-slot> <gateway gateway-name> <pic-slot pic-slot> Description Display call admission control (CAC) statistics for one or more TDF gateways. If a TDF gateway is not specified, then statistics for all TDF gateways are displayed. NOTE: CAC statistics are not stored on the Routing Engine. When this command is executed, the Routing Engine fetches the statistics from the active session PICs and displays the consolidated statistics for one or more TDF gateways. Options none detail Display CAC statistics for all TDF gateways. (Optional) Display detailed CAC statistics for the specified FPC and PIC slot numbers. NOTE: The detail option is valid only when you specify an FPC and PIC slot number configured on the TDF gateway. fpc-slot fpc-slot (Optional) Display statistics for the session PIC in the specified FPC slot. pic-slot pic-slot (Optional) Display statistics for the session PIC in the specified PIC slot. gateway gateway- (Optional) Display CAC statistics for the specified TDF gateway. name Required Privilege Level view Output Fields Table 45 on page 972 lists the output fields for the show unified-edge tdf call-admission-control statistics command. Output fields are listed in the approximate order in which they appear. 972 Table 45: show unified-edge tdf call-admission-control statistics Output Fields Field Name Field Description Level of Output Gateway: TDF Output is displayed for TDF gateways. detail none GW CAC Statistics Statistical details are displayed at the TDF gateway level. detail none Memory High Rejects Number of subscribers or PDP contexts that were rejected because the memory load or utilization (at the session PIC level) was high. detail none Memory High Redirects Number of subscribers or PDP contexts that were redirected because the memory load or utilization (at the session PIC level) was high. detail none CPU High Rejects Number of subscribers or PDP contexts that were rejected because the CPU load or utilization (at the session PIC level) was high. detail none CPU High Redirects Number of subscribers or PDP contexts that were redirected because the CPU load or utilization (at the session PIC level) was high. detail none Session Reservation Rejects Number of sessions that were rejected for reservation of TDF subscribers on a particular TDF gateway or domain. detail none Session Reservation Redirects Number of sessions that were redirected to a different TDF gateway or domain for reservation of TDF subscribers. detail none 973 Table 45: show unified-edge tdf call-admission-control statistics Output Fields (Continued) Field Name Field Description Level of Output Gateway Subscriber Count Total number of subscribers that are connected to the TDF gateway. detail none TDF DOMAIN CAC Statistics Statistical details are displayed at the TDF domain level. detail none Session Reservation Rejects Number of sessions that were rejected for reservation of TDF subscribers on a particular TDF gateway or domain. detail none Session Reservation Redirects Number of sessions that were redirected to a different TDF gateway or domain for reservation of TDF subscribers. detail none Sample Output show unified-edge tdf call-admission-control statistics user@host> show unified-edge tdf call-admission-control statistics Gateway: TDF GW CAC Statistics: Memory High Rejects Memory High Redirects CPU High Rejects CPU High Redirects Session Reservation Rejects Session Reservation Redirects Gateway Subscriber Count : 0 : 0 : 0 : 0 : 0 : 0 : 1 Domain CAC Statistics: Session Reservation Rejects Session Reservation Redirects : 0 : 0 974 show unified-edge tdf call-admission-control statistics fpc-slot pic-slot detail user@host> show unified-edge tdf call-admission-control statistics fpc-slot 3 pic-slot 1 detail Gateway: TDF GW CAC Statistics: Memory High Rejects Memory High Redirects CPU High Rejects CPU High Redirects Session Reservation Rejects Session Reservation Redirects Gateway Subscriber Count : 0 : 0 : 0 : 0 : 0 : 0 : 1 Domain CAC Statistics: Session Reservation Rejects Session Reservation Redirects : 0 : 0 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION clear unified-edge tdf call-admission-control statistics | 790 show unified-edge tdf call-rate statistics IN THIS SECTION Syntax | 975 975 Description | 975 Options | 975 Required Privilege Level | 975 Output Fields | 975 Sample Output | 977 Release Information | 977 Syntax show unified-edge tdf call-rate statistics (domain domain-name | gateway gatewayname) Description Display call-rate statistics for the specified TDF domain or specified TDF gateway. Options domain domain-name gateway gateway-name Display call-rate statistics for the specified TDF domain. Display call-rate statistics for the specified TDF gateway. Required Privilege Level view Output Fields Table 46 on page 976 lists the output fields for the show unified-edge tdf call-rate statistics command. Output fields are listed in the approximate order in which they appear. 976 Table 46: show unified-edge tdf call-rate statistics Output Fields Field Name Field Description Gateway Name of the TDF gateway. TDF domain name Name of the TDF domain. This is displayed only when the domain option is used. Record n Displays statistics for the most recent n number of intervals. Number of Activations Number of successful subscriber logins for this record. Number of Deactivations Number of subscriber logouts for this record. Activations processing time (in ms) Average subscriber login activation processing time. Subscriber session duration (in mins) Average subscriber session duration. Statistics collection time Time at which the statistics were collected. Control Plane Standard Deviation Standard deviations for the following: · Number of Activations--Number of subscriber logins · Number of Deactivations--Number of subscriber logouts · Activations processing time--Length of time of subscriber login · Subscriber session duration--Length of time of subscriber logout 977 Sample Output show unified-edge tdf call-rate statistics gateway user@host> show unified-edge tdf call-rate statistics gateway TDF Gateway: TDF Record 1 (Call-rate statistics for the past 1 min): Control Plane: Number of Activations: 0 Number of Deactivations: 0 Activations processing time (in ms): 0 Subscriber session duration (in mins): 0 Statistics collection time: 2014-03-04 11:45:44 UTC (00:03:06 ago) Record 2 (Call-rate statistics for the past 2 min): Control Plane: Number of Activations: 0 Number of Deactivations: 0 Activations processing time (in ms): 0 Subscriber session duration (in mins): 0 Control Plane Standard Deviation: Number of Activations: 0 Number of Deactivations: 0 Activations processing time: 0 Subscriber session duration: 0 Statistics collection time: 2014-03-04 11:44:44 UTC (00:04:06 ago) Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION Configuring Call-Rate Statistics Collection | 241 978 show unified-edge tdf diameter network-element statistics IN THIS SECTION Syntax | 978 Description | 978 Options | 978 Required Privilege Level | 979 Output Fields | 979 Sample Output | 980 Release Information | 981 Syntax show unified-edge tdf diameter network-element statistics <brief | detail> <fpc-slot fpc-slot> <gateway gateway-name> <network-element-name network-element-name> <pic-slot pic-slot> Description Display statistics for network elements for one or more TDF gateways. If a network element is not specified, then statistics for all network elements are displayed. If a TDF gateway is not specified, then statistics for all TDF gateways are displayed. Options none brief | detail fpc-slot fpc-slot Display statistics for network elements for all TDF gateways. (Optional) Display the specified level of output. The brief output is displayed by default. (Optional) Display statistics for the specified Flexible PIC Concentrator (FPC). 979 gateway gateway-name (Optional) Display statistics for the specified TDF gateway. network-element-name network-element-name pic-slot pic-slot (Optional) Display statistics for the specified network element. (Optional) Display the statistics for the specified PIC slot number. You must first specify an FPC slot number before specifying the PIC slot number. Required Privilege Level view Output Fields Table 47 on page 979 lists the output fields for the show unified-edge tdf diameter network-element statistics command. Output fields are listed in the approximate order in which they appear. Table 47: show unified-edge tdf diameter network-element statistics Output Fields Field Name Field Description Level of Output Name Name of the network element. All levels FPC/PIC FPC and PIC slot numbers through which the network element was reached. detail Packets Received Number of incoming packets. All levels Packets Transmitted Number of outgoing packets. All levels Request Timeouts Number of request timeouts. All levels Credit Control Request Transmitted Number of outgoing Credit-Control-Request messages. All levels Credit Control Answer Received Number of incoming Credit-Control-Answer messages. All levels 980 Sample Output show unified-edge tdf diameter network-element statistics user@host> show unified-edge tdf diameter network-element statistics Name: pcrf-dne Packets Received : 0 Packets Transmitted : 0 Request Timeouts : 0 Credit Control Request Transmitted : 0 Credit Control Answer Received : 0 Name: ocs-dne Packets Received : 3 Packets Transmitted : 4 Request Timeouts : 1 Credit Control Request Transmitted : 4 Credit Control Answer Received : 3 show unified-edge tdf diameter network-element statistics detail user@host> show unified-edge tdf diameter network-element statistics detail Name : FPC/PIC : Packets Received : Packets Transmitted : Request Timeouts : Credit Control Request Transmitted : Credit Control Answer Received : pcrf-dne 0/0 0 0 0 0 0 FPC/PIC : 0/1 Packets Received : 0 Packets Transmitted : 0 Request Timeouts : 0 Credit Control Request Transmitted : 0 Credit Control Answer Received : 0 Name : ocs-dne 981 FPC/PIC : 0/0 Packets Received : 0 Packets Transmitted : 0 Request Timeouts : 0 Credit Control Request Transmitted : 0 Credit Control Answer Received : 0 FPC/PIC : 0/1 Packets Received : 3 Packets Transmitted : 4 Request Timeouts : 1 Credit Control Request Transmitted : 4 Credit Control Answer Received : 3 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION clear unified-edge tdf diameter network-element statistics | 791 show unified-edge tdf diameter network-element status | 981 show unified-edge tdf diameter network-element status IN THIS SECTION Syntax | 982 Description | 982 Options | 982 Required Privilege Level | 982 Output Fields | 982 Sample Output | 983 Release Information | 984 982 Syntax show unified-edge tdf diameter network-element status <fpc-slot fpc-slot> <gateway gateway-name> <network-element-name network-element-name> <pic-slot pic-slot> Description Display the status for one or more Diameter network elements. If a network element is not specified, then status for all network elements is displayed. If a TDF gateway is not specified, then status for all TDF gateways is displayed. Options none Display status for all network elements for all TDF gateways. fpc-slot fpc-slot (Optional) Display the status for the specified Flexible PIC Concentrator (FPC). gateway gateway-name (Optional) Display the status for the specified TDF gateway. network-element-name network-element-name pic-slot pic-slot (Optional) Display the status for the specified network element. (Optional) Display the status for the specified PIC slot number. You must first specify an FPC slot number before specifying the PIC slot number. Required Privilege Level view Output Fields Table 48 on page 983 lists the output fields for the show unified-edge tdf diameter network-element status command. Output fields are listed in the approximate order in which they appear. 983 Table 48: show unified-edge tdf diameter network-element status Output Fields Field Name Field Description DNE Name of the network element. PEER Name of the peer. FPC/PIC FPC and PIC slot numbers through which the network element was reached. PEER STATE Current state of the peer. Possible states are: Closed, Closing, I-Open, ROpen, Wait-Conn-Ack, Wait-Conn-Ack/Elect, Wait-I-CEA, and Wait-Returns. WATCHDOG STATE Peer watchdog status. · closed--Connection between Diameter peers is terminated. · initial--Connection between Diameter peers is being initialized. · okay--Connection between Diameter peers is established and active. Sample Output show unified-edge tdf diameter network-element status user@host> show unified-edge tdf diameter network-element status DNE : pcrf-dne PEER : pcrf FPC/PIC PEER STATE WATCHDOG STATE 0/0 Closed initial 0/1 Closed initial DNE : ocs-dne PEER : ocs FPC/PIC PEER STATE WATCHDOG STATE 0/0 I-Open okay 0/1 I-Open okay 984 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show unified-edge tdf diameter network-element statistics | 978 show unified-edge tdf diameter pcc-gx statistics IN THIS SECTION Syntax | 984 Description | 984 Options | 985 Required Privilege Level | 985 Output Fields | 985 Sample Output | 990 Release Information | 991 Syntax show unified-edge tdf diameter pcc-gx statistics <brief | detail> <fpc-slot fpc-slot> <gateway gateway-name> <pic-slot pic-slot> Description Display statistics for the Gx application for one or more TDF gateways. If a TDF gateway is not specified, then statistics for all TDF gateways are displayed. 985 Options none brief | detail fpc-slot fpc-slot gateway gatewayname pic-slot pic-slot Display statistics for the Gx application for all TDF gateways. (Optional) Display the specified level of output. The brief output is displayed by default. (Optional) Display statistics for the specified Flexible PIC Concentrator (FPC). (Optional) Display statistics for the specified TDF gateway. (Optional) Display statistics for the specified PIC slot number. You must first specify an FPC slot number before specifying the PIC slot number. Required Privilege Level view Output Fields Table 49 on page 985 lists the output fields for the show unified-edge tdf diameter pcc-gx statistics command. Output fields are listed in the approximate order in which they appear. Table 49: show unified-edge tdf diameter pcc-gx statistics Output Fields Field Name Field Description Level of Output Gateway Name of the TDF gateway. All levels FPC/PIC FPC and PIC slots for which the statistics are displayed. detail Total Sessions Established Total number of active sessions. All levels Total Sessions Terminated Total number of terminated sessions. All levels 986 Table 49: show unified-edge tdf diameter pcc-gx statistics Output Fields (Continued) Field Name Field Description Level of Output Internal Errors Number of internal errors. detail Total · Requests--Total number of request messages. · Answers--Total number of answer messages. none brief Credit Control Initial · Requests--Number of initial transfer type Credit-ControlRequest (CCR) messages. · Answers--Number of initial transfer type Credit-ControlAnswer (CCA) messages. none brief Credit Control Update · Requests--Number of update transfer type CCR messages. · Answers--Number of update transfer type CCA messages. none brief Credit Control Terminate · Requests--Number of terminate transfer type CCR messages. none · Answers--Number of terminate transfer type CCA messages. brief Re-Auth · Requests--Number of Re-Auth-Request (RAR) messages. · Answers--Number of Re-Auth-Answer (RAA) messages. none brief Dropped · Requests--Number of dropped request messages. · Answers--Number of dropped answer messages. none brief 987 Table 49: show unified-edge tdf diameter pcc-gx statistics Output Fields (Continued) Field Name Field Description Level of Output Requests Transmitted · Initial--Number of initial transfer type CCR messages sent. · Update--Number of update transfer type CCR messages sent. · Terminate--Number of terminate transfer type CCR messages sent. · Total--Number of CCR messages sent. detail Request Timeouts · Initial--Number of initial transfer type CCR messages that timed out. detail · Update--Number of update transfer type CCR messages that timed out. · Terminate--Number of terminate transfer type CCR messages that timed out. · Total--Number of CCR messages that timed out. Request Tx Timeouts · Initial--Number of initial transfer type CCR messages sent that timed out. detail · Update--Number of update transfer type CCR messages sent that timed out. · Terminate--Number of terminate transfer type CCR messages sent that timed out. · Total--Number of CCR messages sent that timed out. 988 Table 49: show unified-edge tdf diameter pcc-gx statistics Output Fields (Continued) Field Name Field Description Level of Output Request Discarded · Initial--Number of initial transfer type CCR messages sent that were discarded. detail · Update--Number of update transfer type CCR messages sent that were discarded. · Terminate--Number of terminate transfer type CCR messages sent that were discarded. · Total--Number of CCR messages sent that were discarded. Answers Received · Initial--Number of initial transfer type CCA messages received. · Update--Number of update transfer type CCA messages received. · Terminate--Number of terminate transfer type CCA messages received. · Total--Number of CCA messages received. detail Answers Dropped · Initial--Number of initial transfer type CCA messages dropped. · Update--Number of update transfer type CCA messages dropped. · Terminate--Number of terminate transfer type CCA messages dropped. · Total--Number of CCA messages dropped. detail 989 Table 49: show unified-edge tdf diameter pcc-gx statistics Output Fields (Continued) Field Name Field Description Level of Output Answers Parse Errors · Initial--Number of initial transfer type CCA messages with parse errors. detail · Update--Number of update transfer type CCA messages with parse errors. · Terminate--Number of terminate transfer type CCA messages with parse errors. · Total--Number of CCA messages with parse errors. Answers with Invalid AVP(s) · Initial--Number of initial transfer type CCA messages with invalid AVPs. detail · Update--Number of update transfer type CCA messages with invalid AVPs. · Terminate--Number of terminate transfer type CCA messages with invalid AVPs. · Total--Number of CCA messages with invalid AVPs. Requests Received Number of RAR messages received. detail Requests Dropped Number of RAR messages dropped. detail Requests Parse Errors Number of RAR messages with parse errors. detail Requests with Invalid AVP(s) Number of RAR messages with invalid AVPs. detail Answers Transmitted Number of RAA messages sent. detail 990 Sample Output show unified-edge tdf diameter pcc-gx statistics user@host> show unified-edge tdf diameter pcc-gx statistics Gateway: TDF Total Sessions Established: 0 Total Sessions Terminated: 0 Requests Answers ------------------------------------------------------- Total 0 0 Credit Control Initial 0 0 Credit Control Update 0 0 Credit Control Terminate 0 0 Re-Auth 0 0 Dropped 0 0 show unified-edge tdf diameter pcc-gx statistics detail user@host> show unified-edge tdf diameter pcc-gx statistics detail Gateway: TDF FPC/PIC: 0/0 Total Sessions Established: 0 Total Sessions Terminated: 0 Internal Errors: 0 Credit Control Initial Update Terminate Total ----------------------------------------------------------------------------- Requests Transmitted 0 0 0 0 Request Timeouts 0 0 0 0 Request Tx Timeouts 0 0 0 0 Request Discarded 0 0 0 0 Answers Received 0 0 0 0 Answers Dropped 0 0 0 0 Answers Parse Errors 0 0 0 0 Answers with Invalid AVP(s) 0 0 0 0 Server Requests Re-Auth --------------------------------------- Requests Received 0 991 Requests Dropped 0 Requests Parse Errors 0 Requests with Invalid AVP(s) 0 Answers Transmitted 0 Gateway: TDF FPC/PIC: 0/1 Total Sessions: 0 Total Sessions Terminated: 0 Internal Errors: 0 Credit Control Initial Update Terminate Total ----------------------------------------------------------------------------- Requests Transmitted 0 0 0 0 Request Timeouts 0 0 0 0 Request Tx Timeouts 0 0 0 0 Request Discarded 0 0 0 0 Answers Received 0 0 0 0 Answers Dropped 0 0 0 0 Answers Parse Errors 0 0 0 0 Answers with Invalid AVP(s) 0 0 0 0 Server Requests Re-Auth --------------------------------------- Requests Received 0 Requests Dropped 0 Requests Parse Errors 0 Requests with Invalid AVP(s) 0 Answers Transmitted 0 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION clear unified-edge tdf diameter pcc-gx statistics | 793 992 show unified-edge tdf diameter peer statistics IN THIS SECTION Syntax | 992 Description | 992 Options | 992 Required Privilege Level | 993 Output Fields | 993 Sample Output | 996 Release Information | 998 Syntax show unified-edge tdf diameter peer statistics <brief | detail> <fpc-slot fpc-slot> <gateway gateway-name> <peer-name peer-name> <pic-slot pic-slot> Description Display statistics for Diameter peers for one or more TDF gateways. If a peer is not specified, then statistics for all Diameter peers are displayed. If a TDF gateway is not specified, then statistics for all TDF gateways are displayed. Options none brief | detail (Same as brief) Display statistics for Diameter peers for all TDF gateways in brief. (Optional) Display the specified level of output. The brief output is displayed by default. 993 fpc-slot fpc-slot (Optional) Display statistics for the specified Flexible PIC Concentrator (FPC). gateway gatewayname peer-name peer-name (Optional) Display statistics for the specified TDF gateway. (Optional) Display statistics for the specified peer. pic-slot pic-slot (Optional) Display statistics for the specified PIC slot number. You must first specify an FPC slot number before specifying the PIC slot number. Required Privilege Level view Output Fields Table 50 on page 993 lists the output fields for the show unified-edge tdf diameter peer statistics command. Output fields are listed in the approximate order in which they appear. Table 50: show unified-edge tdf diameter peer statistics Output Fields Field Name Field Description Level of Output Peer Name of the peer. All levels FPC/PIC FPC and PIC slot numbers through which the peer detail was reached. Request Timeouts Number of request timeouts. All levels Request Retransmissions Number of request retransmissions. All levels Connect Failures Number of connection failures. detail Duplicate Requests Number of duplicate requests. detail Malformed Messages Number of malformed requests. detail 994 Table 50: show unified-edge tdf diameter peer statistics Output Fields (Continued) Field Name Field Description Level of Output Dropped Responses Number of dropped responses. detail Dropped Requests Number of dropped requests. detail Last Disconnect Cause Number of last disconnect cause messages. detail Transport Failures Number of transport failures. detail Unknown Messages Number of unknown type errors. detail High Watermark Hits Number of times the high watermark is reached. detail Low Watermark Hits Number of times the low watermark is reached. detail Device Watchdog Failured Number of device watchdog failures. detail Capabilities Exchange Failures Number of capabilities exchange failures. detail Total Messages Total number of messages transmitted and received. All levels Credit Control Requests Number of Credit-Control-Request messages transmitted and received. All levels Credit Control Answers Number of Credit-Control-Answer messages transmitted and received. All levels Re-Auth Requests Number of Re-Auth-Request messages transmitted All levels and received. 995 Table 50: show unified-edge tdf diameter peer statistics Output Fields (Continued) Field Name Field Description Level of Output Re-Auth Answers Number of Re-Auth-Answer messages transmitted All levels and received. Abort Session Requests Number of Abort-Session-Request messages transmitted and received. All levels Abort Session Answers Number of Abort-Session-Answer messages transmitted and received. All levels Capability Exchange Requests Number of Capabilities-Exchange-Request messages transmitted and received. All levels Capability Exchange Answers Number of Capabilities-Exchange-Answer messages transmitted and received. All levels Device Watchdog Requests Number of Device-Watchdog-Request messages transmitted and received. All levels Device Watchdog Answers Number of Device-Watchdog-Answer messages transmitted and received. All levels Disconnect Peer Requests Number of Disconnect-Peer-Request messages transmitted and received. All levels Disconnect Peer Answers Number of Disconnect-Peer-Answer messages transmitted and received. All levels Permanent Failures Number of permanent failure result codes transmitted and received. detail 996 Table 50: show unified-edge tdf diameter peer statistics Output Fields (Continued) Field Name Field Description Level of Output Protocol Errors Number of protocol error result codes transmitted detail and received. Transient Failures Number of transient failure result codes transmitted and received. detail Sample Output show unified-edge tdf diameter peer statistics user@host> show unified-edge tdf diameter peer statistics Peer: ocs Request Timeouts: 1 Request Retransmissions: 0 Messages Transmitted Received -------------------------------------------------------------- Total Messages 6 5 Credit Control Requests 4 0 Credit Control Answers 0 3 Re-Auth Requests 0 0 Re-Auth Answers 0 0 Abort Session Requests 0 0 Abort Session Answers 0 0 Capability Exchange Requests 2 0 Capability Exchange Answers 0 2 Device Watchdog Requests 0 0 Device Watchdog Answers 0 0 Disconnect Peer Requests 0 0 Disconnect Peer Answers 0 0 997 show unified-edge tdf diameter peer statistics detail user@host> show unified-edge tdf diameter peer statistics detail Peer: ocs FPC/PIC: 0/0 Request Timeouts: 0 Request Retransmissions: 0 Connect Failures: 0 Duplicate Requests: 0 Malformed Messages: 0 Dropped Responses: 0 Dropped Requests: 0 Last Disconnect Cause: 0 Transport Failures: 0 Unknown Messages: 0 High Watermark Hits: 0 Low Watermark Hits: 0 Device Watchdog Failured: 0 Capabilities Exchange Failures: 0 Messages Transmitted Received -------------------------------------------------------------- Total Messages 1 1 Credit Control Requests 0 0 Credit Control Answers 0 0 Re-Auth Requests 0 0 Re-Auth Answers 0 0 Abort Session Requests 0 0 Abort Session Answers 0 0 Capability Exchange Requests 1 0 Capability Exchange Answers 0 1 Device Watchdog Requests 0 0 Device Watchdog Answers 0 0 Disconnect Peer Requests 0 0 Disconnect Peer Answers 0 0 Result-Code Transmitted Received -------------------------------------------------------------- Permanent Failures 0 0 Protocol Errors 0 0 Transient Failures 0 0 998 FPC/PIC: 0/1 Request Timeouts: 1 Request Retransmissions: 0 Connect Failures: 0 Duplicate Requests: 0 Malformed Messages: 0 Dropped Responses: 0 Dropped Requests: 0 Last Disconnect Cause: 0 Transport Failures: 0 Unknown Messages: 0 High Watermark Hits: 0 Low Watermark Hits: 0 Device Watchdog Failured: 0 Capabilities Exchange Failures: 0 Messages Transmitted Received -------------------------------------------------------------- Total Messages 5 4 Credit Control Requests 4 0 Credit Control Answers 0 3 Re-Auth Requests 0 0 Re-Auth Answers 0 0 Abort Session Requests 0 0 Abort Session Answers 0 0 Capability Exchange Requests 1 0 Capability Exchange Answers 0 1 Device Watchdog Requests 0 0 Device Watchdog Answers 0 0 Disconnect Peer Requests 0 0 Disconnect Peer Answers 0 0 Result-Code Transmitted Received -------------------------------------------------------------- Permanent Failures 0 0 Protocol Errors 0 0 Transient Failures 0 0 Release Information Statement introduced in Junos OS Release 17.1. 999 RELATED DOCUMENTATION clear unified-edge tdf diameter peer statistics | 795 show unified-edge tdf diameter peer status | 999 show unified-edge tdf diameter peer status IN THIS SECTION Syntax | 999 Description | 999 Options | 1000 Required Privilege Level | 1000 Output Fields | 1000 Sample Output | 1002 Release Information | 1003 Syntax show unified-edge tdf diameter peer status <brief | detail> <fpc-slot fpc-slot> <gateway gateway-name> <peer-name peer-name> <pic-slot pic-slot> Description Display the status for one or more Diameter peers. If a peer is not specified, then status for all Diameter peers is displayed. If a TDF gateway is not specified, then status for all TDF gateways is displayed. 1000 Options none (Same as brief) Display the status for Diameter peers for all TDF gateways in brief. brief | detail (Optional) Display the specified level of output. The brief output is displayed by default. fpc-slot fpc-slot (Optional) Display the status for the specified Flexible PIC Concentrator (FPC). gateway gatewayname peer-name peer-name (Optional) Display the status for the specified TDF gateway. (Optional) Display the status for the specified peer. pic-slot pic-slot (Optional) Display the status for the specified PIC slot number. You must first specify an FPC slot number before specifying the PIC slot number. Required Privilege Level view Output Fields Table 51 on page 1000 lists the output fields for the show unified-edge tdf diameter peer status command. Output fields are listed in the approximate order in which they appear. Table 51: show unified-edge tdf diameter peer status Output Fields Field Name Field Description Level of Output Name Name of the peer. For the brief output, the name is truncated if it exceeds 11 characters. All levels FPC/PIC FPC and PIC slot numbers through which the peer was reached. All levels Address IP address of the Diameter peer. brief none 1001 Table 51: show unified-edge tdf diameter peer status Output Fields (Continued) Field Name Field Description Level of Output Port Port number of the Diameter peer. brief none State Current state of the Diameter peer. Possible states are: Closed, Closing, I-Open, R-Open, Wait-Conn-Ack, Wait-Conn-Ack/ Elect, Wait-I-CEA, and Wait-Returns. For the brief and none output, the state is truncated if it exceeds 11 characters. All levels Duration Duration for which the Diameter peer has been in the current state in Coordinated Universal Time (UTC) format (HH:MM:SS). none brief State Duration Duration for which the Diameter peer has been in the current state in Coordinated Universal Time (UTC) format (HH:MM:SS). detail Watchdog Peer watchdog status. · closed--Connection between Diameter peers is terminated. · initial--Connection between Diameter peers is being initialized. · okay--Connection between Diameter peers is established and active. none brief Watchdog State Peer watchdog status. · closed--Connection between Diameter peers is terminated. · initial--Connection between Diameter peers is being initialized. · okay--Connection between Diameter peers is established and active. detail 1002 Table 51: show unified-edge tdf diameter peer status Output Fields (Continued) Field Name Field Description Origin Host Diameter Origin-Host. Origin Realm Diameter Origin-Realm. Peer Address IP address of the Diameter peer. Peer port Port number of the Diameter peer. Source Address Local source IP address used to connect to the peer. Source Port Local source port number used to connect to the peer. Level of Output detail detail detail detail detail detail Sample Output show unified-edge tdf diameter peer status user@host> show unified-edge tdf diameter peer status Name FPC/PIC Address Port p_jpkt1 4/0 192.0.2.2 3868 p_jpkt1 4/1 192.0.2.2 3868 p_jpkt1 5/0 192.0.2.2 3868 abcabcabcab 4/0 192.0.2.2 3868 abcabcabcab 4/1 192.0.2.2 3868 abcabcabcab 5/0 192.0.2.2 3868 State Closed Closed Wait-Conn-A Closed Closed Wait-Conn-A Duration 00:00:00 00:00:00 00:00:00 00:00:00 00:00:00 00:00:00 Watchdog initial initial initial initial initial initial show unified-edge tdf diameter peer status detail user@host> show unified-edge tdf diameter peer status detail Diameter Peer Status Name : ocs FPC/PIC : 0/0 State : State Duration : Watchdog State : Origin Host : Origin Realm : Peer Address : Peer port : Source Address : Source Port : Name : ocs FPC/PIC : State : State Duration : Watchdog State : Origin Host : Origin Realm : Peer Address : Peer port : Source Address : Source Port : Name : pcrf FPC/PIC : State : State Duration : Watchdog State : Peer Address : Peer port : Source Address : Source Port : Name : pcrf FPC/PIC : State : State Duration : Watchdog State : Peer Address : Peer port : Source Address : Source Port : I-Open 00:00:00 okay host5 example.com 198.51.100.2 3868 203.0.113.1 30965 0/1 I-Open 00:00:00 okay host5 example.com 198.51.100.2 3868 203.0.113.1 30709 0/0 Closed 00:00:00 initial 192.168.1.2 3868 203.0.113.1 0 0/1 Closed 00:00:00 initial 192.168.1.2 3868 203.0.113.1 0 Release Information Statement introduced in Junos OS Release 17.1. 1003 RELATED DOCUMENTATION show unified-edge tdf diameter peer statistics | 992 show unified-edge tdf domain service-mode IN THIS SECTION Syntax | 1004 Description | 1004 Options | 1004 Required Privilege Level | 1005 Output Fields | 1005 Sample Output | 1006 Release Information | 1007 1004 Syntax show unified-edge tdf domain service-mode <domain-name tdf-domain-name> <brief | detail> <gateway gateway> Description Display service mode information for a TDF domain for one or more TDF gateways. If a TDF domain is not specified, then the information for all domains for one or more TDF gateways is displayed. Options none (Same as brief) Display the TDF domain service mode information in brief for all TDF gateways. 1005 brief | detail domain-name tdfdomain-name gateway gateway (Optional) Display the specified level of output. (Optional) Display service mode information for the specified TDF domain. (Optional) Display service mode information for the specified TDF gateway. Required Privilege Level view Output Fields Table 52 on page 1005 lists the output fields for the show unified-edge tdf domain service-mode command. Output fields are listed in the approximate order in which they appear. Table 52: show unified-edge tdf domain service-mode Output Fields Field Name Field Description Level of Output Maintenance Mode Phases applicable when the address pool is in maintenance mode. · MM - Active Phase--All the attributes of the address pool can be modified. · MM - In/Out Phase--Only the non-maintenance mode attributes of the address pool can be modified. None specified Gateway Name Name of the TDF gateway. Gateway Name of the TDF gateway. TDF domain Name Name of the TDF domain. None specified detail All levels 1006 Table 52: show unified-edge tdf domain service-mode Output Fields (Continued) Field Name Field Description Level of Output Service Mode Service mode for the TDF gateway: · Operational--Gateway is in operational mode. · Maintenance--Gateway is in maintenance mode. All levels Sample Output show unified-edge tdf domain service-mode brief user@host> show unified-edge tdf domain service-mode brief Maintenance Mode MM Active Phase - System is ready to accept configuration changes for all attributes of this object and its sub-hierarchies. MM In/Out Phase - System is ready to accept configuration changes only for non-maintenance mode attributes of this object and its sub-hierarchies. TDF domain Name Gateway Name Service Mode jnpr-sunnyvale jnpr-toxin zoo Active Phase TDF TDF TDF1 Operational Operational Maintenance - show unified-edge tdf domain service-mode detail user@host> show unified-edge tdf domain service-mode detail Gateway: TDF TDF domain Name : jnpr-sunnyvale Service Mode : Operational TDF domain Name : jnpr-toxin Service Mode Gateway: TDF1 : Operational TDF domain Name : zoo Service Mode : Maintenance - Active Phase Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show unified-edge tdf service-mode | 1017 show unified-edge tdf domain statistics IN THIS SECTION Syntax | 1007 Description | 1008 Options | 1008 Required Privilege Level | 1008 Output Fields | 1008 Sample Output | 1012 Release Information | 1014 Syntax show unified-edge tdf domain statistics <domain-name domain-name> <gateway gateway> 1007 1008 Description Display statistics for one or more domains in a TDF gateway. If a TDF gateway is not specified, then statistics for all TDF gateways are displayed. Options none domain-name domain-name gateway gateway Display statistics for all domains for all TDF gateways. (Optional) Display the statistics for the specified TDF domain. The output of the show unified-edge tdf domain statistics command is the same as the output of the show unified-edge tdf statistics command with the tdf-domain option. (Optional) Display the statistics for the specified TDF gateway. Required Privilege Level view Output Fields Table 53 on page 1008 lists the output fields for the show unified-edge tdf domain statistics command. Output fields are listed in the approximate order in which they appear. Table 53: show unified-edge tdf domain statistics Output Fields Field Name Field Description Gateway Name of the TDF gateway. Control Plane Statistics Subscriber attach attempts Number of attempted session establishments and number of successful session establishments (Success). Table 53: show unified-edge tdf domain statistics Output Fields (Continued) Field Name Field Description TDF Time of day initiated update attempts Number of attempted activations of rules based on time of day settings and number of successful activations (Success). TDF initiated subscriber detach attempts Number of attempted subscriber session detachments initiated by the TDF. PCRF initiated subscriber detach attempts Number of attempted subscriber session detachments initiated by the PCRF. Peer initiated subscriber detach attempts Number of attempted subscriber session detachments initiated by the peer. Subscriber attach failures by cause Number of session establishments that failed: · System failure · No resources · Policy denied · Service denied · Others Rejects due to early CAC Number of subscriber sessions rejected due to early call admission control (CAC) for the TDF gateway. Policy statistics 1009 1010 Table 53: show unified-edge tdf domain statistics Output Fields (Continued) Field Name Field Description Subscriber session activation attempts Number of subscriber session activations attempted. In addition, the number of successful subscriber session establishments (Success) is displayed. TDF initiated modification attempts Number of session modifications initiated by TDF gateway. In addition, the number session modifications that were successful (Success) is displayed. PCRF initiated modification attempts Number of session modifications initiated by the policy and charging rules function (PCRF). In addition, the number of modifications that were successful (Success) is displayed. TDF initiated session deactivations Number of subscriber session deactivations initiated by the TDF gateway. PCRF initiated session deactivations Number of subscriber session deactivations initiated by the PCRF. Modification event reason The number of Gx modifications for each event reason: · Application Start · Application Stop 1011 Table 53: show unified-edge tdf domain statistics Output Fields (Continued) Field Name Field Description Failure Statistics · Session terminations due to unreachable PCRF--Number of sessions terminated because the PCRF was unreachable. · Session terminations due to PCRF restart--Number of sessions terminated because the PCRF was restarted. · Rule Validation Failures--Number of sessions terminated because the validation of rules failed. PCC Rule Statistics · Dynamic rule activations--Number of dynamic rule activations and deactivations (Deactivations). · Static rule activations--Number of static rule activations and deactivations (Deactivations). · Dynamic rule modifications--Number of dynamic rule modifications. PCC Rule Failure Statistics · Rule update failure--Number of rules that cannot be updated. ePCC/ADC Rule Statistics · Dynamic rule activations--Number of dynamic rule activations and deactivations (Deactivations). · Static rule activations--Number of static rule activations and deactivations (Deactivations). · Dynamic rule modifications--Number of dynamic rule modifications. ePCC/ADC Rule Failure Statistics · Rule update failure--Number of rules that cannot be updated. Sample Output show unified-edge tdf domain statistics gateway user@host> show unified-edge tdf domain statistics gateway tdf Gateway: TDF Control Plane Statistics: Subscriber attach attempts: 0 Success: 0 TDF Time of day initiated update attempts: 0 Success: 0 TDF initiated subscriber detach attempts: 0 PCRF initiated subscriber detach attempts: 0 Peer initiated subscriber detach attempts: 0 Subscriber attach failures by cause: System failure: 0 No resources: 0 Service denied: 0 Policy denied: 0 Others: 0 Rejects due to early CAC: 0 Policy Statistics: Subscriber session activation attempts: 0 Success: 0 TDF initiated modification attempts: 0 Success: 0 PCRF initiated modification attempts: 0 Success: 0 TDF initiated session deactivations: 0 PCRF initiated session deactivations: 0 Modification Event Reason: Application Start: 0 Application Stop: 0 Failure Statistics: Session terminations due to unreachable PCRF: 0 Session terminations due to PCRF restart: 0 Rule validation failures: 0 PCC Rule Statistics: Dynamic rule activations: 0 Deactivations: 0 Static rules activations: 0 Deactivations: 0 Dynamic rule modifications: 0 PCC Rule Failure Statistics: Rule update failure: 0 ePCC/ADC Rule Statistics: Dynamic rule activations: 0 Deactivations: 0 Static rules activations: 0 Deactivations: 0 Dynamic rule modifications: 0 1012 ePCC/ADC Rule Failure Statistics: Rule update failure: 0 show unified-edge tdf domain statistics domain-name user@host> show unified-edge tdf domain statistics domain-name domain1 domain-name domain1 Gateway: TDF Control Plane Statistics: Subscriber attach attempts: 0 Success: 0 TDF Time of day initiated update attempts: 0 Success: 0 TDF initiated subscriber detach attempts: 0 PCRF initiated subscriber detach attempts: 0 Peer initiated subscriber detach attempts: 0 Subscriber attach failures by cause: System failure: 0 No resources: 0 Service denied: 0 Policy denied: 0 Others: 0 Policy Statistics: Subscriber session activation attempts: 0 Success: 0 TDF initiated modification attempts: 0 Success: 0 PCRF initiated modification attempts: 0 Success: 0 TDF initiated session deactivations: 0 PCRF initiated session deactivations: 0 Modification Event Reason: Application Start: 0 Application Stop: 0 Failure Statistics: Session terminations due to unreachable PCRF: 0 Session terminations due to PCRF restart: 0 Rule validation failures: 0 PCC Rule Statistics: Dynamic rule activations: 0 Deactivations: 0 Static rules activations: 0 Deactivations: 0 Dynamic rule modifications: 0 PCC Rule Failure Statistics: Rule update failure: 0 ePCC/ADC Rule Statistics: 1013 Dynamic rule activations: 0 Static rules activations: 0 Dynamic rule modifications: 0 ePCC/ADC Rule Failure Statistics: Rule update failure: Deactivations: 0 Deactivations: 0 0 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION clear unified-edge tdf statistics | 797 show unified-edge tdf resource-manager clients IN THIS SECTION Syntax | 1014 Description | 1015 Options | 1015 Required Privilege Level | 1015 Output Fields | 1015 Sample Output | 1016 Release Information | 1017 Syntax show unified-edge tdf resource-manager clients <gateway gateway> 1014 1015 Description Display information about the resource management clients (the session Dense Port Concentrators [DPCs] and interface DPCs and Modular Port Concentrators [MPCs]) on one or more TDF gateways. If a TDF gateway is not specified, then information for all TDF gateways is displayed. Options none gateway gateway-name Display information for all TDF gateways. (Optional) Display information for the specified TDF gateway. Required Privilege Level view Output Fields Table 54 on page 1015 lists the output fields for the show unified-edge gateways tdf resource-manager clients command. Output fields are listed in the approximate order in which they appear. Table 54: show unified-edge tdf resource-manager clients Output Fields Field Name Field Description Client Name of the resource manager client slot identified by the FPC and PIC slot numbers; for example, pfe-1/2/0 or ms-/7/0/0. State Resource manager client state. In-Service means that the client can handle session creation requests. Role Role of the resource manager client slot: · Primary--The resource manager client is a primary member. · Secondary--The resource manager client is a secondary or backup member. 1016 Table 54: show unified-edge tdf resource-manager clients Output Fields (Continued) Field Name Field Description Client type Type of resource manager client: · Session PIC--Session PIC client used for the mobile control plane in the TDF gateway. · Service PIC--services PIC used for anchoring services-related subscriber sessions in the TDF gateway. Gateway Name of the TDF gateway to which the resource manager client belongs. Sample Output show unified-edge tdf resource-manager clients user@host> show unified-edge tdf resource-manager clients Client State Redundancy role Client type Gateway ms-2/0/0 In-Service Primary Service-PIC TDF ms-2/1/0 In-Service Secondary Service-PIC TDF ms-3/0/0 In-Service Primary Service-PIC TDF ms-3/1/0 In-Service Primary Service-PIC TDF ms-5/0/0 In-Service Primary Session-PIC TDF ms-5/1/0 In-Service Secondary Session-PIC TDF show unified-edge tdf resource-manager clients gateway user@host> show unified-edge tdf resource-manager clients gateway TDF Client State Redundancy role Client type Gateway ms-3/0/0 In-Service Secondary Session-PIC TDF ms-3/1/0 In-Service Primary Session-PIC TDF ms-3/2/0 In-Service Secondary Service-PIC TDF ms-3/3/0 In-Service Primary Service-PIC TDF Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show unified-edge tdf subscribers | 1038 show unified-edge tdf system interfaces | 1059 show unified-edge tdf service-mode IN THIS SECTION Syntax | 1017 Description | 1017 Options | 1018 Required Privilege Level | 1018 Output Fields | 1018 Sample Output | 1019 Release Information | 1020 1017 Syntax show unified-edge tdf service-mode <brief | detail> <domain-name tdf-domain-name> <gateway gateway-name> Description Display service mode information for one or more TDF gateways. If a TDF gateway is not specified, then service mode information for all the TDF gateways is displayed. 1018 Options none (Same as brief) Display service mode information in brief for all TDF gateways. brief | detail (Optional) Display the specified level of output. tdf-domain domain-name (Optional) Display service mode information for the specified TDF domain. The output of the show unified-edge tdf service-mode command with the tdfdomain option is the same as the output of the show unified-edge tdf domain service-mode command. gateway gateway- (Optional) Display service mode information for the specified TDF gateway. name Required Privilege Level view Output Fields Table 55 on page 1018 lists the output fields for the show unified-edge tdf service-mode command. Output fields are listed in the approximate order in which they appear. Table 55: show unified-edge tdf service-mode Output Fields Field Name Field Description Level of Output Maintenance Mode Phases applicable when the TDF domain is in maintenance mode. · MM - Active Phase--All the attributes of the address pool can be modified. · MM - In/Out Phase--Only the non-maintenance mode attributes of the address pool can be modified. none Gateway Name Name of the TDF gateway. none Table 55: show unified-edge tdf service-mode Output Fields (Continued) Field Name Field Description Service Mode Service mode for the TDF gateway: · Operational--Gateway is in operational mode. · Maintenance--Gateway is in maintenance mode. 1019 Level of Output All levels Sample Output show unified-edge tdf service-mode brief user@host> show unified-edge tdf service-mode brief Maintenance Mode MM Active Phase - System is ready to accept configuration changes for all attributes of this object and its sub-hierarchies. MM In/Out Phase - System is ready to accept configuration changes only for non-maintenance mode attributes of this object and its sub-hierarchies. Gateway Name Service Mode TDF TDF2 Operational Operational show unified-edge tdf service-mode detail user@host> show unified-edge tdf service-mode detail Service Mode Status Gateway Name : PGW Service Mode : Operational Service Mode Status Gateway Name : PGW2 Service Mode : Operational Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show unified-edge tdf domain service-mode | 1004 show unified-edge tdf statistics IN THIS SECTION Syntax | 1020 Description | 1020 Options | 1021 Required Privilege Level | 1021 Output Fields | 1021 Sample Output | 1029 Release Information | 1031 1020 Syntax show unified-edge tdf statistics <domain domain-name> <gateway gateway> Description Display statistics for one or more TDF gateways. If a TDF gateway is not specified, then statistics for all TDF gateways are displayed. 1021 Options none domain domain-name gateway gateway Display statistics for all TDF gateways. (Optional) Display statistics for the specified TDF domain. The output of the show unified-edge tdf statistics command with the domain domain-name option is the same as the output of the show unified-edge tdf domain statistics command. (Optional) Display statistics for the specified TDF gateway. Required Privilege Level view Output Fields Table 56 on page 1021 lists the output fields for the show unified-edge tdf statistics command. Output fields are listed in the approximate order in which they appear. Table 56: show unified-edge tdf statistics Output Fields Field Name Field Description Gateway Name of the TDF gateway. Control Plane Statistics Subscriber attach attempts Number of attempted session establishments and number of successful session establishments for IP-based subscribers (Success). Peer initiated subscriber update attempts Number of RADIUS client attempts to update the subscriber context of an IP-based subscriber. 1022 Table 56: show unified-edge tdf statistics Output Fields (Continued) Field Name Field Description TDF Time of day initiated update attempts Number of attempted activations, deactivations, and revalidations of PCC rules and revalidations of the PCEF session for the time-of-day feature, and number of successful attempts (Success). TDF initiated update attempts Number of TDF gateway attempts to update an IFL-based subscriber context as a result of access interfaces going up or down, or as a result of access interfaces being added to or deleted from the subscriber configuration. TDF initiated subscriber detach attempts Number of attempted subscriber session detachments initiated by the TDF gateway. Policy Server initiated subscriber detach attempts Number of attempted subscriber session detachments initiated by the policy server. Peer initiated subscriber detach attempts Number of attempted IP-based subscriber session detachments initiated by the RADIUS client. For IFL-based subscribers, 0 is displayed. 1023 Table 56: show unified-edge tdf statistics Output Fields (Continued) Field Name Field Description Subscriber attach failures by cause Number of session establishments that failed: · System failure · No resources · Service denied · Policy denied · Service PIC NACK · Others Rejects due to Number of rejects on the TDF gateway caused by early CAC. early CAC Subscriber detach by cause Number of subscriber detachments for the following cause: · service PIC NACK Policy statistics Subscriber session activation attempts Number of subscriber session activations attempted. In addition, the number of successful subscriber session establishments (Success) is displayed. TDF initiated modification attempts Number of session modifications initiated by TDF gateway. In addition, the number of session modifications that were successful (Success) is displayed. 1024 Table 56: show unified-edge tdf statistics Output Fields (Continued) Field Name Field Description Policy Server initiated modification attempts Number of session modifications initiated by the policy server. In addition, the number of modifications that were successful (Success) is displayed. TDF initiated session deactivations Number of subscriber session deactivations initiated by the TDF gateway. Policy Server initiated session deactivations Number of subscriber session deactivations initiated by the policy server. Modification event reason Number of Gx modifications for each event reason: · Application Start · Application Stop · Revalidation--PCEF re-requested PCC rules from the PCRF. Failure Statistics · Session terminations due to unreachable policy server--Number of sessions terminated because the policy server was unreachable. · Session terminations due to PCRF restart--Number of sessions terminated because the PCRF was restarted. · Rule Validation Failures--Number of sessions terminated because the validation of rules failed. 1025 Table 56: show unified-edge tdf statistics Output Fields (Continued) Field Name Field Description PCC Rule Statistics · Dynamic rule activations--Number of dynamic rule activations and deactivations (Deactivations). · Static rules activations--Number of static rule activations and deactivations (Deactivations). · Dynamic rule modifications--Number of dynamic rule modifications. PCC Rule Failure Statistics · Rule update failure--Number of rules that cannot be updated. ePCC/ADC Rule Statistics · Dynamic rule activations--Number of dynamic rule activations and deactivations (Deactivations). · Static rules activations--Number of static rule activations and deactivations (Deactivations). · Dynamic rule modifications--Number of dynamic rule modifications. ePCC/ADC Rule Failure Statistics · Rule update failure--Number of rules that cannot be updated. Usage Monitoring Statistics UMI AVP validation failures Number of times that decoding fails for any of the grouped AVPs that belong to the Usage Monitoring Information, such as the Monitoring key, Monitoring Level, and Granted Service Unit AVPs. 1026 Table 56: show unified-edge tdf statistics Output Fields (Continued) Field Name Field Description Session Level The following information about usage monitoring at the session level is displayed: · UM activations--Number of session-level monitoring keys that the TDF gateway has activated. · UM update quota attempts--Number of times the PCRF has attempted to update the quota for a session-level monitoring key. The number of reports that the TDF gateway sent as a result of the update quota attempts is shown in Stats report sent. · UM implicit deactivations--Number of times that a session-level monitoring key has been implicitly deactivated by the TDF gateway. For example, this happens if a monitoring key does not receive additional quota after a threshold has been reached. · UM explicit deactivations--Number of session-level monitoring key deactivations that the TDF gateway has received from the PCRF. The number of reports that the TDF gateway sent as a result of the deactivations is shown in Stats report sent. · Usage report request received--Number of requests for session-level usage reports that the TDF gateway has received from the PCRF. The number of reports that the TDF gateway sent as a result of the requests is shown in Stats report sent. · UM threshold hit--Number of times that a threshold for a session-level monitoring key has been reached. The number of reports that the TDF gateway sent as a result of the threshold being reached is shown in Stats report sent. 1027 Table 56: show unified-edge tdf statistics Output Fields (Continued) Field Name Field Description Rule Level The following information about usage monitoring at the rule level is displayed: · UM activations--Number of rule-level monitoring keys that the TDF gateway has activated. · UM update quota attempts--Number of times the PCRF has attempted to update the quota for a rule-level monitoring key. The number of reports that the TDF gateway sent as a result of the update quota attempts is shown in Stats report sent. · UM implicit deactivations--Number of times that a rule-level monitoring key has been implicitly deactivated by the TDF gateway. For example, this happens if a monitoring key does not receive additional quota after a threshold has been reached. · UM explicit deactivations--Number of rule-level monitoring key deactivations that the TDF gateway has received from the PCRF. The number of reports that the TDF gateway sent as a result of the deactivations is shown in Stats report sent. · Usage report request received--Number of requests for rule-level usage reports that the TDF gateway has received from the PCRF. The number of reports that the TDF gateway sent as a result of the requests is shown in Stats report sent. · UM threshold hit--Number of times that a threshold for a rule-level monitoring key has been reached. The number of reports that the TDF gateway sent as a result of the threshold being reached is shown in Stats report sent. · UM with no rule reference--Number of rule-level monitoring keys received by the TDF gateway that had no rule referring to it. These keys are not activated. Service plane statistics 1028 Table 56: show unified-edge tdf statistics Output Fields (Continued) Field Name Field Description Subscriber detach attempts (NACK) by cause Number of service PIC messages to session PIC indicating that subscriber creation or modification failed for the following causes: · Memory watermark high threshold hit · Memory watermark critical threshold hit · Memory alloc failure · Subscriber lookup failure · Others Data plane statistics Subscriber Stats The following information about packets processed by the data plane for subscribers connected to the TDF domains in the TDF gateway is displayed: · Uplink--Statistics for traffic in the uplink direction from the TDF gateway to the PDN (Internet). · Downlink--Statistics for traffic in the downlink direction from the PDN (Internet) to the TDF gateway. · Packets--Number of packets forwarded in the uplink direction and in the downlink direction. · Bytes--Number of bytes forwarded in the uplink direction and in the downlink direction. · Dropped Packets--Number of packets dropped in the uplink direction and in the downlink direction. · Dropped Bytes--Number of bytes dropped in the uplink direction and in the downlink direction. 1029 Table 56: show unified-edge tdf statistics Output Fields (Continued) Field Name Field Description Non Subscriber Stats The following information about packets processed by the data plane for traffic that does not belong to subscribers connected to the TDF domains in the TDF gateway is displayed: · Uplink--Statistics for traffic in the uplink direction from the TDF gateway to the PDN (Internet). · Downlink--Statistics for traffic in the downlink direction from the PDN (Internet) to the TDF gateway. · Packets--Number of packets sent in the uplink direction and in the downlink direction. · Bytes--Number of bytes sent in the uplink direction and in the downlink direction. · Dropped Packets--Number of packets dropped in the uplink direction and in the downlink direction. · Dropped Bytes--Number of bytes dropped in the uplink direction and in the downlink direction. Sample Output show unified-edge tdf statistics user@host> show unified-edge tdf statistics Gateway: TDF Control Plane Statistics: Subscriber attach attempts: 0 Success: 0 Peer initiated subscriber update attempts: 0 Success: 0 TDF Time of day initiated update attempts: 0 Success: 0 TDF initiated update attempts: 0 Success: 0 TDF initiated subscriber detach attempts: 0 Policy Server initiated subscriber detach attempts: 0 Peer initiated subscriber detach attempts: 0 Subscriber attach failures by cause: System failure: 0 No resources: 0 Service denied: 0 Policy denied: 0 Service PIC NACK: 0 Others: 0 Rejects due to early CAC: 0 Subscriber detach by cause: service PIC NACK: 0 Policy Statistics: Subscriber session activation attempts: 0 Success: 0 TDF initiated modification attempts: 0 Success: 0 Policy Server initiated modification attempts: 0 Success: 0 TDF initiated session deactivations: 0 Policy Server initiated session deactivations: 0 Modification Event Reason: Application Start: 0 Application Stop: 0 Revalidation: 0 Failure Statistics: Session terminations due to unreachable policy server: 0 Session terminations due to PCRF restart: 0 Rule validation failures: 0 PCC Rule Statistics: Dynamic rule activations: 0 Deactivations: 0 Static rules activations: 0 Deactivations: 0 Dynamic rule modifications: 0 PCC Rule Failure Statistics: Rule update failure: 0 ePCC/ADC Rule Statistics: Dynamic rule activations: 0 Deactivations: 0 Static rules activations: 0 Deactivations: 0 Dynamic rule modifications: 0 ePCC/ADC Rule Failure Statistics: Rule update failure: 0 Usage Monitoring Statistics: UMI AVP validation failures: 0 Session Level: UM activations: 0 UM update quota attempts: 0 Stats report sent: 0 UM implicit deactivations: 0 UM explicit deactivations: 0 Stats report sent: 0 Usage report request received: 0 Stats report sent: 0 UM threshold hit: 0 Stats report sent: 0 1030 Rule Level: UM activations: 0 UM update quota attempts: 0 UM implicit deactivations: 0 UM explicit deactivations: 0 Usage report request received: 0 UM threshold hit: 0 UM with no rule reference: 0 Stats report sent: 0 Stats report sent: 0 Stats report sent: 0 Stats report sent: 0 Service plane statistics: Subscriber detach attempts (NACK) by cause: Memory watermark high threshold hit: 0 Memory watermark critical threshold hit: 0 Memory alloc failure: 0 Subscriber lookup failure: 0 Others: 0 Data plane statistics: Subscriber Stats: Uplink Downlink ---------------------------------------------------------------- Packets :0 :0 Bytes :0 :0 Dropped Packets :0 :0 Dropped Bytes :0 :0 Non Subscriber Stats: Uplink Downlink ---------------------------------------------------------------- Packets :0 :0 Bytes :0 :0 Dropped Packets :0 :0 Dropped Bytes :0 :0 Release Information Statement introduced in Junos OS Release 17.1. 1031 RELATED DOCUMENTATION clear unified-edge tdf statistics | 797 show unified-edge tdf domain statistics | 1007 IP-Based and IFL-Based TDF Subscribers Overview | 107 show unified-edge tdf status IN THIS SECTION Syntax | 1032 Description | 1032 Options | 1033 Required Privilege Level | 1033 Output Fields | 1033 Sample Output | 1036 Release Information | 1038 1032 Syntax show unified-edge tdf status <brief | detail | extensive> <domain domain-name> <fpc-slot fpc-slot> <gateway gateway> <pic-slot pic-slot> <subscriber-state> Description Display status information, such as the number of subscribers, active sessions, and so on, for one or more TDF gateways. If a TDF gateway name is not specified, then the status information for all the TDF gateways is displayed. 1033 Options none (Same as brief) Display the TDF gateway status information in brief for all TDF gateways. brief | detail | extensive (Optional) Display the specified level of output. domain domain-name (Optional) Display the status information for the specified TDF domain. fpc-slot fpc-slot (Optional) Display the status information for the specified FPC slot number. gateway gateway (Optional) Display the status information for the specified TDF gateway name. pic-slot pic-slot (Optional) Display the status information for the specified PIC slot number. You must first specify an FPC slot number before specifying the PIC slot number. subscriber-state (Optional) Display the status of the subscribers. Required Privilege Level view Output Fields Table 57 on page 1033 lists the output fields for the show unified-edge tdf status command. Output fields are listed in the approximate order in which they appear. Table 57: show unified-edge tdf status Output Fields Field Name Field Description Level of Output Gateway Name of the TDF gateway. All levels Established Number of established subscribers. none with the subscriber-state option Deleting Number of subscribers that are being deleted. none with the subscriber-state option Table 57: show unified-edge tdf status Output Fields (Continued) Field Name Field Description Level of Output Control Plane The following is displayed for the control plane: · Active Subscribers--Number of subscribers that are active in each of the following categories: none brief · IP Subscribers · IFL Subscribers Service Plane The following is displayed for the service plane: · Active Subscribers--Number of subscribers that are actively using services in each of the following categories: none brief · IP Subscribers · IFL Subscribers · Active Sessions--Number of active subscriber sessions. CPU Load (%) Percentage of the CPU load. All levels Memory Load (%) Percentage of the memory load. All levels FPC SLOT FPC slot number of the interface for which the status information is displayed. detail extensive 1034 Table 57: show unified-edge tdf status Output Fields (Continued) Field Name Field Description Level of Output PIC SLOT PIC slot number of the FPC for which the status information is displayed. detail extensive Role Role of the Packet Forwarding detail Engine, services PIC, or session PIC on the TDF gateway: extensive · Standalone · Primary--Primary member. · Secondary--Secondary member. Type Indicates whether the PIC is a Packet Forwarding Engine, a session PIC, or a services PIC. detail extensive Active Subscribers Number of logged-in subscribers on the TDF gateway in each of the following categories: brief detail extensive · IP Subscribers · IFL Subscribers Delete Pending Subscribers Number of pending subscribers that are being deleted on the TDF gateway in each of the following categories: detail extensive · IP Subscribers · IFL Subscribers 1035 Table 57: show unified-edge tdf status Output Fields (Continued) Field Name Field Description Level of Output Active Sessions Number of logged-in sessions on the TDF gateway. NOTE: Active Sessions count may not match the output of the show services session count command. This is due to internal asynchronous message queues. detail extensive Sample Output show unified-edge tdf status brief user@host> show unified-edge tdf status brief Gateway: TDF TDF gateway status: Control Plane: Active Subscribers IP Subscribers IFL Subscribers Service Plane: Active Subscribers IP Subscribers IFL Subscribers Active Sessions CPU Load (%) Memory Load (%) show unified-edge tdf status detail user@host> show unified-edge tdf status detail Gateway: TDF FPC SLOT: 0 PIC SLOT: 2 : 0 : 0 : 0 : 0 : 0 : 0 : 0 : 0 : 26 1036 Role Type Active Subscribers IP Subscribers IFL Subscribers CPU Load (%) Memory Load (%) FPC SLOT: 0 PIC SLOT: 3 Role Type Active Subscribers IP Subscribers IFL Subscribers Delete Pending Subscribers IP Subscribers IFL Subscribers Active Sessions CPU Load (%) Memory Load (%) FPC SLOT: 1 PIC SLOT: 1 Role Type Active Subscribers IP Subscribers IFL Subscribers CPU Load (%) Memory Load (%) : Primary : Session-PIC : 0 : 0 : 0 : 0 : 26 : Primary : Service-PIC : 0 : 0 : 0 : 0 : 0 : 0 : 0 : 1 : 12 : Secondary : Session-PIC : 0 : 0 : 0 : 0 : 26 show unified-edge tdf status subscriber-state user@host> show unified-edge tdf status subscriber-state show unified-edge tdf status subscriber-state Gateway: TDF Established : 1 Deleting : 0 1037 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show unified-edge tdf aaa statistics | 945 IP-Based and IFL-Based TDF Subscribers Overview | 107 show unified-edge tdf subscribers IN THIS SECTION Syntax | 1038 Description | 1039 Options | 1039 Required Privilege Level | 1040 Output Fields | 1040 Sample Output | 1053 Release Information | 1058 Syntax show unified-edge tdf subscribers <brief | detail | extensive> <business-subscribers> <data-plane> <domain domain-name> <fpc-slot fpc-slot> <gateway gateway> <pdn-type (ipv4 | ipv4-v6 | ipv6)> <pic-slot pic-slot> <routing-instance routing-instance> 1038 1039 <stuck> <subscriber-name subscriber-name> <v4-addr v4-addr> <v6-addr v6-addr> Description Display the subscriber information for one or more TDF gateways. If a TDF gateway is not specified, then subscriber information for all TDF gateways is displayed. Options none (Same as brief) Display subscriber information in brief for all TDF gateways. brief | detail | extensive (Optional) Display the specified level of output. business-subscribers (Optional) Display subscriber information for only enterprise business subscribers (subscribers whose IPv4 prefix length is less than 32). data-plane (Optional) Display subscriber information for the data plane. domain domain-name (Optional) Display subscriber information for the specified TDF domain. fpc-slot fpc-slot (Optional) Display subscriber information for the specified FPC slot number. gateway gateway (Optional) Display subscriber information for the specified TDF gateway. pdn-type (ipv4 | ipv4-v6 | (Optional) Display subscriber information according to the type of Packet ipv6) Data Network (PDN): IPv4, IPv6, and both IPv4 and IPv6. pic-slot pic-slot (Optional) Display subscriber information for the specified PIC slot number. You must first specify an FPC slot number before specifying the PIC slot number. routing-instance routinginstance stuck (Optional) Display subscriber information for the specified routing instance. (Optional) Display subscribers for the TDF gateway that are not logged in successfully and are in a blocked state. subscriber-name subscriber-name (Optional) Display subscriber information for the specified IFL-based subscriber. 1040 v4-addr v4-addr v6-addr v6-addr (Optional) Display subscriber information for the specified IPv4 address of the subscriber's user equipment. (Optional) Display subscriber information for the specified IPv6 address of the subscriber's user equipment. Required Privilege Level view Output Fields Table 58 on page 1040 lists the output fields for the show unified-edge tdf subscribers command. Output fields are listed in the approximate order in which they appear. Table 58: show unified-edge tdf subscribers Output Fields Field Name Field Description Level of Output Gateway Name of the TDF gateway. All levels none MSISDN/ Name MSISDN number of the IP-based subscriber's user equipment. brief none V4 Address IPv4 address of the IP-based subscriber. brief none V6 Address IPv6 address, if any, of the IP-based subscriber. Otherwise, None is displayed. brief none NAS-IPAddress IP address to be used for the NAS IP address attribute of the IP-based subscriber when sending the requests to the RADIUS server. brief none 1041 Table 58: show unified-edge tdf subscribers Output Fields (Continued) Field Name Field Description Level of Output Domain TDF domain, on the TDF gateway, to which the subscriber is attached. brief none IFLSubscriberName Name of the IFL-based subscriber. brief none Subscriber Information Subscriber Type Type of subscriber: · IFL--Interface-based subscriber. · IP--IP-based subscriber. detail extensive IMSI IMSI of the IP-based subscriber's user equipment. detail extensive none IMEI International Mobile Station Equipment Identity (IMEI) of the IP-based subscriber's user equipment. detail extensive MSISDN/ Username MSISDN number of the IP-based subscriber's user equipment. detail extensive Subscriber Name Name of the IFL-based subscriber. detail extensive 1042 Table 58: show unified-edge tdf subscribers Output Fields (Continued) Field Name Field Description Level of Output State State of the subscriber session on the signaling plane. detail extensive Session Duration Duration of the PDP session. detail extensive Domain Name of the TDF domain that is used to establish the session on the TDF gateway for the subscriber. detail extensive Data VRF Name of the data plane VRF. detail extensive TDF domain Name Unique identifier that denotes the TDF domain to be used for the subscriber's session. This setting is applicable only when the domain specified in the Create Session Request message from the subscriber is virtual. detail extensive NAS-IP-Addr IP address to be used for the NAS IP address attribute of the IP-based subscriber when sending the requests to the RADIUS server. detail extensive APN name Name of the APN for the IP-based subscriber that is denoted by a unique identifier. detail extensive V4 Address IPv4 address of the IP-based subscriber. detail extensive 1043 Table 58: show unified-edge tdf subscribers Output Fields (Continued) Field Name Field Description Level of Output V4 Prefix Length IPv4 prefix length of the IP-based subscriber's IPv4 address. This is displayed only if the length is less than 32. detail extensive data-plane V6 Address IPv6 address of the IP-based subscriber, if any. Otherwise, None is displayed. detail extensive V6 Prefix Length IPv6 prefix length of the IP-based subscriber's IPv6 address. detail Session PIC FPC and PIC slots for the session PIC on which the subscriber control session is present. detail extensive Service PIC FPC and PIC slots for the service PIC on which the subscriber control session is present. detail extensive 1044 Table 58: show unified-edge tdf subscribers Output Fields (Continued) Field Name Field Description Level of Output PCRF Event Triggers Policy and charging rules function (PCRF) event triggers, if any. If no trigger is configured, None is displayed. The notation used for the event triggers displayed in the output and the corresponding event triggers as per the 3GPP specifications are as follows: · SGSN--SGSN CHANGE (0) · QoS--QOS CHANGE (1) · RAT--RAT CHANGE (2) · TFT--TFT CHANGE (3) · PLMN--PLMN CHANGE (4) · BL--subscriber LOSS (5) · BR--subscriber RECOVERY (6) · IPCAN--IPCAN CHANGE (7) · EAUTH--EXCEEDING AUTH (11) · RAI--RAI CHANGE (12) · ULI--ULI CHANGE (13) · NET--NO EVENT TRIGGERS (14) · OOC--OUT OF CREDIT (15) · ROC--REALLOCATION OF CREDIT (16) · REVALIDATION_TIMEOUT--REVALIDATION TIMEOUT (17) · IP ALLOC--UE_IP_ADDRESS_ALLOCATE (18) · IP RELEASE--UE_IP_ADDRESS_RELEASE (19) · DEFAULT QoS--DEFAULT QoS (20) · GW--AN GW CHANGE (21) detail extensive 1045 Table 58: show unified-edge tdf subscribers Output Fields (Continued) Field Name Field Description · RA--RESOURCE_ALLOCATION (22) · RM--RESOURCE_MODIFICATION (23) · TRACE--PGW TRACE CONTROL (24) · TZ --UE_TZ_CHANGE (25) · TAI--TAI CHANGE (26) · ECGI--ECGI CHANGE (27) · CCE--CHARGING CORRELATION EXCHANGE (28) · AMBR--AMBR CHANGE (29) · UCIC--USR CSG INFO CHANGE (30) · QMF--QoS MODIFICATION FAILURE (31) · UR--USAGE REPORT (33) Level of Output Revalidation due in Time remaining in days, hours, minutes, and seconds until PCEF session revalidation takes place if the REVALIDATION_TIMEOUT event trigger is armed. Otherwise N/A is displayed. detail extensive Idle Timeout Idle timeout for the session, in minutes. detail extensive Subscriber MBR TDF subscriber maximum bit rate (MBR) for uplink and downlink traffic. Uplink traffic originates from the subscriber towards the public data network (PDN), and downlink traffic comes from the PDN and is destined for the subscriber. detail extensive 1046 Table 58: show unified-edge tdf subscribers Output Fields (Continued) Field Name Field Description Level of Output Subscriber burst TDF subscriber burst size configured for uplink and downlink traffic. Uplink traffic originates from the subscriber towards the PDN, and downlink traffic comes from the PDN and is destined for the subscriber. detail extensive Access IFL List The following is displayed for each interface assigned to an IFL-based subscriber: · Name--Name of the interface. · Index--Index number of the interface. · State--Operational state of the interface: Active or Inactive. PCC Profile Name Name of the PCEF profile that is assigned to the subscriber. detail extensive 1047 Table 58: show unified-edge tdf subscribers Output Fields (Continued) Field Name Field Description Level of Output Usage Monitoring Information The following is displayed for each monitoring key, which corresponds to a data set that is being monitored for the subscriber: · Monitoring Key--Identifier for the monitoring key. detail extensive · Level--Indication of whether the monitoring key applies to particular PCC rules (Rule) or to the entire TDF subscriber session (Session). · Status--Indication of whether monitoring with the key is active or inactive. · Total Available Quota--Volume and time quota sent from the PCRF to indicate when a report should be sent to the PCRF. A value of zero indicates that the field is not applicable to the key. · Input--Uplink traffic volume quota. · Output--Downlink traffic volume quota. · Total--Uplink and downlink traffic volume quota. · Time--Time quota, in seconds. 1048 Table 58: show unified-edge tdf subscribers Output Fields (Continued) Field Name Field Description Level of Output PCC Rule Information NOTE: Both ePCC rules and PCC rules appear under PCC Rule Information. Fields that apply only to ePCC rules are identified in the description. detail extensive The following information for each PCC or ePCC rule is displayed per subscriber: · Rule Name--Name of the rule. In addition, the following is displayed: · Type--Rrule type: Static or Dynamic. · Associated Rule Base--Rule set with which the rule is associated, if any. · Precedence--Rule precedence, which defines the order in which the policy is applied for incoming or outgoing packets; the lower the number, the higher its precedence. · Activation due in--Day, time, or both at which the rule is scheduled for activation for the subscriber. If activation/ deactivation settings have not been applied to the rule, then N/A appears. · Deactivation due in--Day, time, or both at which the rule is scheduled for deactivation for the subscriber. If activation/ deactivation settings have not been applied to the rule, then N/A appears. · Status--Rule status: Initialized, Active, Inactive, or Removal Pending. · Application Id--(ePCC rules only) Name of the application identification parameter associated with the rule. · Application Id Base(ePCC rules only) Name of the base application that serves as the primary application identification service if a group or cluster are configured. 1049 Table 58: show unified-edge tdf subscribers Output Fields (Continued) Field Name Field Description Level of Output · Mute Notification--(ePCC rules only) Whether the MuteNotification AVP is included in the rule. · QoS Parameters--The following QoS attributes are displayed for each rule per subscriber: · MBR Uplink (kbps)--Maximum bit rate (MBR) in the uplink direction, in kbps. Identifier. · MBR Downlink (kbps)--MBR in the downlink direction, in kbps. · Burst size Uplink (bytes)--TDF domain's default TDF subscriber burst size configured for uplink traffic, in bytes. · Burst size Downlink (bytes)--TDF domain's default TDF subscriber burst size configured for downlink traffic, in bytes. Uplink traffic originates from the subscriber towards the public data network (PDN), and downlink traffic comes from the PDN and is destined for the subscriber. · Charging Attributes--The following charging attributes are displayed for each rule per subscriber: · Rating Group--Rating group for the rule. · Service Id--Service ID for the rule. · Gating Status--Whether the flow is enabled or not. One of the following: · enable-uplink · enable-downlink · enable-both · disable-both · AF Charging Id--Application function record information, which contains an octet string and the charging ID. 1050 Table 58: show unified-edge tdf subscribers Output Fields (Continued) Field Name Field Description Level of Output · Charging Method--Charging method for the rule (none, offline, offline-online, or online). · Metering Method--Charging metering method for the rule: · Time--Time based. · Volume--Volume based. · Volume-Time--Both volume and time based. · None--No metering. · Usage Monitoring Key--Monitoring key that is associated with the rule. · Services Attributes--The following information about resource management and steering is displayed for the subscribers connected to the TDF gateway or the TDF domain: · Steering IP--IPv4 or IPv6 address for HTTP steering of the packets. · Keep existing steering--Whether existing steering is enabled or disabled. · Service Chain VRF--Routing instance for steering of packets. Use this to steer traffic to either a local service chain or external service chain. · Forwarding Class--Forwarding class that needs to be assigned to the packet. · HCM ID--Profile that identifies the HTTP header enrichment rules to apply. This action is restricted to PCC rules that are only matching HTTP-based applications. · LRF ID--Unique ID of the Location Retrieval Function · Filter Attributes--The following filter attributes are displayed per filter in each rule: 1051 Table 58: show unified-edge tdf subscribers Output Fields (Continued) Field Name Field Description Level of Output · Remote IP/Mask--Remote IP address and subnet mask of the filter. · Protocol--Protocol configured for the filter. If all protocols are supported for the filter, Any is displayed. For the explanation of what the numbers represent, refer to the 3GPP specifications. · Direction--Direction in which the filter is applicable (Downlink, Uplink, or Both). · Local Ports--Local ports or port range for the filter. Any indicates that the filter does not restrict the local ports. · Remote Ports--Remote ports or port range for the filter. Any indicates that the filter does not restrict the remote ports. · Application Name--(ePCC rules only) Name of the predefined or custom application signature. 1052 Table 58: show unified-edge tdf subscribers Output Fields (Continued) Field Name Field Description Level of Output Data Plane statistics The following information about packets processed by the data plane for subscribers connected to the TDF domains in the TDF gateway: data-plane option · Subscriber-Name--Name of the IFL-based subscriber. · V4 Address--IPv4 address of the IP-based subscriber. · V6 Address--IPv6 address of the IP-based subscriber. · V6 Prefix Length--IPv6 prefix length of the IP-based subscriber's IPv6 address. · Vrf Id--Name of the data plane VRF. · Subscriber Stats--Total statistics for the subscriber. · Rule--Statistics for traffic that was handled by the specified PCC rule. · Uplink--Statistics for traffic in the uplink direction from the TDF gateway to the PDN (Internet). · Downlink--Statistics for traffic in the downlink direction from the PDN (Internet) to the TDF gateway. · Sessions--Number of sessions in the uplink and downlink direction. · Packets--Number of packets forwarded in the uplink direction and in the downlink direction. · Bytes--Number of bytes forwarded in the uplink direction and in the downlink direction. · Dropped Packets--Number of packets dropped in the uplink direction and in the downlink direction. · Dropped Bytes--Number of bytes dropped in the uplink direction and in the downlink direction. Sample Output show unified-edge tdf subscribers (IP-Based Subscriber) user@host> show unified-edge tdf subscribers Gateway: TDF MSISDN/name V4 Address V6 Address att 192.0.2.11 None NAS-IP-Address Domain 198.51.100.123 domain1 show unified-edge tdf subscribers (IFL-Based Subscriber) user@host> show unified-edge tdf subscribers IFL-Subscriber-Name ifl-sub-radius-001 ifl-sub-static-001 Domain domain-ifl-radius domain-ifl-static 1053 show unified-edge tdf subscribers extensive user@host> show unified-edge tdf subscribers extensive Gateway: TDF Subscriber Information: Subscriber Type : IFL Subscriber Name : IFL1 State : Established 50 mins 15 secs Domain : domain1 Data VRF : default Session PIC: 3 /0 (FPC/PIC) Service PIC: 3 /1 (FPC/PIC) PCRF Event Triggers : None Revalidation due in : N/A Subscriber MBR: Uplink (kbps): 0 Subscriber burst: Uplink (bytes): 0 Access IFL List: Name (Index) ge-1/1/8.0 (362 ) ge-1/1/1.0 (361 ) Session Duration: 000065 hrs Downlink (kbps): 0 Downlink (bytes): 0 State Active Active 1054 ge-1/0/9.0 (360 ) Active PCC Profile Name : pcef-prof-static PCC Rule Information: Rule Name: google-traffic Type : Static Associated Rule Base: None Precedence: 20 Status: Active Activation due in : N/A Deactivation due in: N/A QoS Parameters: MBR Uplink (kbps): 0 MBR Downlink (kbps): 0 Burst size Uplink (bytes): 0 Burst size Downlink (bytes): 0 Charging Attributes: Rating Group: 0 Service ID: 0 Gating Status: enable-both AF Charging Id: None Charging Method: None Metering Method: None Usage Monitoring Key : NULL Logging Rule Name : r1 Services Attributes: Forwarding Class: best-effort Filter Attributes: Remote IP/Mask: any/any Protocol: any Direction: Both Local Ports: any Remote Ports: any Application Name : junos:google Application Name : junos:udp Application Name : junos:http Rule Name: http-traffic Type : Static Associated Rule Base: None Precedence: 30 Status: Active Activation due in : N/A Deactivation due in: N/A QoS Parameters: MBR Uplink (kbps): 0 MBR Downlink (kbps): 0 Burst size Uplink (bytes): 0 Burst size Downlink (bytes): 0 Charging Attributes: Rating Group: 0 Service ID: 0 Gating Status: enable-both AF Charging Id: None Charging Method: None Metering Method: None Usage Monitoring Key : NULL Logging Rule Name : r1 Services Attributes: Forwarding Class: best-effort Filter Attributes: 1055 Remote IP/Mask: any/any Protocol: any Direction: Both Local Ports: any Remote Ports: any Application Name : junos:http Rule Name: all-traffic Type : Static Associated Rule Base: None Precedence: 40 Status: Active Activation due in : N/A Deactivation due in: N/A QoS Parameters: MBR Uplink (kbps): 0 MBR Downlink (kbps): 0 Burst size Uplink (bytes): 0 Burst size Downlink (bytes): 0 Charging Attributes: Rating Group: 0 Service ID: 0 Gating Status: enable-both AF Charging Id: None Charging Method: None Metering Method: None Usage Monitoring Key : NULL Logging Rule Name : r1 Services Attributes: Forwarding Class: best-effort Filter Attributes: Remote IP/Mask: any/any Protocol: any Direction: Both Local Ports: any Remote Ports: any show unified-edge tdf subscribers detail user@host> show unified-edge tdf subscribers detail Gateway: TDF Subscriber Information: Subscriber Type : IP IMSI : 988888888888899 IMEI : None State : Established 41 mins 04 secs Domain : aaa Data VRF : bng_vrf NAS-IP-Addr: 198.51.100.123 NAS-ID : dfssw MSISDN/Username : 9741488201 Session Duration: 000000 hrs APN name : 3242 V4 Address : 192.0.2.11 V6 Address : 2001:db8:: V6 Prefix Length: 64 Session PIC: 3 /3 (FPC/PIC) Service PIC: 3 /0 (FPC/PIC) PCRF Event Triggers : UR Revalidation due in : N/A Idle Timeout: 0 min Subscriber MBR: Uplink (kbps): 0 Downlink (kbps): 0 Subscriber burst: Uplink (bytes): 0 Downlink (bytes): 0 PCC Profile Name : pcef-jpkt-prof-dyn Usage Monitoring Information: Monitoring Key: 302 Level: Session Status: Active Total Available Quota: Input: 0 Output: 0 Total: 20000 Time : 100 Monitoring Key: 301 Level: PCC-Rule Status: Active Total Available Quota: Input: 0 Output: 0 Total: 20000 Time : 0 PCC Rule Information: Rule Name: Dyn_Rule_1 Type : Dynamic Associated Rule Base: None Precedence: 1 Status: Active Activation due in : N/A Deactivation due in: N/A QoS Parameters: MBR Uplink (kbps): 2000 MBR Downlink (kbps): 3000 Burst size Uplink (bytes): 0 Burst size Downlink (bytes): 0 Charging Attributes: Rating Group: 0 Service ID: 0 Gating Status: enable-uplink AF Charging Id: None Charging Method: None Metering Method: None Usage Monitoring Key : 301 Services Attributes: Steering VRF Uplink: changed_vrf Downlink: new_vrf HCM ID: hcmtag1 Filter Attributes: Remote IP/Mask: 203.0.113/32 Protocol: 1 Direction: Both Local Ports: any Remote Ports: any Application Id : None 1056 Application Id Base: None show unified-edge tdf subscribers data-plane user@host> show unified-edge tdf subscribers data-plane Gateway: TDF Data plane statistics : V4 Address:192.0.2.11 V6 Address:2001:db8:: V6 Prefix Length: 64 Subscriber-Type:IP Vrf Id: 11 Subscriber Stats: Uplink Downlink ---------------------------------------------------------------- Packets :0 :0 Bytes :0 :0 Dropped Packets :0 :0 Dropped Bytes :0 :0 Rule: rule_zynga Uplink Downlink ---------------------------------------------------------------- Sessions :0 :0 Packets :0 :0 Bytes :0 :0 Dropped Packets :0 :0 Dropped Bytes :0 :0 Rule: rule_youtube Uplink Downlink ---------------------------------------------------------------- Sessions :0 :0 Packets :0 :0 Bytes :0 :0 Dropped Packets :0 :0 Dropped Bytes :0 :0 1057 Rule: rule_amazon Uplink Downlink ---------------------------------------------------------------- Sessions :0 :0 Packets :0 :0 Bytes :0 :0 Dropped Packets :0 :0 Dropped Bytes :0 :0 Rule: rule_monster Uplink Downlink ---------------------------------------------------------------- Sessions :0 :0 Packets :0 :0 Bytes :0 :0 Dropped Packets :0 :0 Dropped Bytes :0 :0 Rule: all-traffic-s Uplink Downlink ---------------------------------------------------------------- Sessions :0 :0 Packets :0 :0 Bytes :0 :0 Dropped Packets :0 :0 Dropped Bytes :0 :0 Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show unified-edge tdf statistics | 1020 clear unified-edge tdf subscribers | 798 IP-Based and IFL-Based TDF Subscribers Overview | 107 1058 show unified-edge tdf system interfaces IN THIS SECTION Syntax | 1059 Description | 1059 Options | 1059 Required Privilege Level | 1059 Output Fields | 1060 Sample Output | 1061 Release Information | 1061 1059 Syntax show unified-edge tdf system interfaces <gateway gateway-name> Description Display information about the aggregated Packet Forwarding Engine and the aggregated multiservices (AMS) interfaces and their states on one or more TDF gateways. If a TDF gateway is not specified, then information for all TDF gateways is displayed. Options none gateway gateway-name Display information for all TDF gateways. (Optional) Display information for the specified TDF gateway. Required Privilege Level view 1060 Output Fields Table 59 on page 1060 lists the output fields for the show unified-edge tdf system interfaces command. Output fields are listed in the approximate order in which they appear. Table 59: show unified-edge tdf system interfaces Output Fields Field Name Field Description Gateway Name of the TDF gateway. Interfaces Name of the interface: · Aggregated multiservices; for example, ams0 · Aggregated Packet Forwarding Engine; for example, apfe1 · Member of aggregated multiservices; for example, mams-1/0/0 · Multiservices; for example, ms-1/0/0 · Packet Forwarding Engine; for example, pfe-0/1/0 Members For ams and apfe interfaces, the member interfaces that are part of the aggregated interfaces are displayed. Operational State Whether the interface is operational (Active) or not (Inactive). Redundancy Role Redundancy state in which the interface is configured: · Primary--Interface is a primary member. · Secondary--Interface is a backup to all the primary members. · Standalone--Interface has not been configured for redundancy. Sample Output show unified-edge tdf system interfaces user@host> show unified-edge tdf system interfaces Gateway: TDF Interfaces Members Operational State ms-1/0/0 Active ms-1/1/0 Active ms-2/0/0 Active ms-2/1/0 Active Redundancy Role Standalone Standalone Standalone Standalone Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show interfaces anchor-group (Aggregated Packet Forwarding Engine) | 831 show interfaces load-balancing (Aggregated Multiservices) | 836 show unified-edge tdf resource-manager clients | 1014 show unified-edge tdf system interfaces service-mode | 1061 show unified-edge tdf system interfaces service-mode IN THIS SECTION Syntax | 1062 Description | 1062 Options | 1062 Required Privilege Level | 1062 1061 Output Fields | 1062 Sample Output | 1064 Release Information | 1064 1062 Syntax show unified-edge tdf system interfaces service-mode <brief | detail> <gateway gateway-name> Description Display the service mode information for the interfaces on one or more TDF gateways. If a TDF gateway is not specified, then information for all TDF gateways is displayed. Options none brief | detail gateway-name gatewayname (Same as brief) Display service mode information for all TDF gateways. (Optional) Display the specified level of output. (Optional) Display service mode information for the specified TDF gateway. Required Privilege Level view Output Fields Table 60 on page 1063 lists the output fields for the show unified-edge tdf system interfaces servicemode command. Output fields are listed in the approximate order in which they appear. 1063 Table 60: show unified-edge tdf system interfaces service-mode Output Fields Field Name Field Description Level of Output Maintenance Mode Phases applicable when the TDF interface is in maintenance mode. · MM - Active Phase--All the attributes of the address pool can be modified. · MM - In/Out Phase--Only the non-maintenance mode attributes of the address pool can be modified. None brief Interface Name Name of the interface for which the service mode information is All levels displayed: · Aggregated multiservices; for example, ams0 · Aggregated Packet Forwarding Engine; for example, apfe1 · Multiservices; for example, ms-1/0/0 Gateway Name of the TDF gateway. None brief Gateway Name Name of the TDF gateway. detail Service Mode Status Status of service mode for the TDF gateway. detail Service Mode Service mode for the TDF gateway. The following service modes All levels are possible: · Operational--Gateway is in operational mode. · Maintenance--Gateway is in maintenance mode. Sample Output show unified-edge tdf system interfaces service-mode brief user@host> show unified-edge tdf system interfaces service-mode brief Maintenance Mode MM Active Phase - System is ready to accept configuration changes for all attributes of this object and its sub-hierarchies. MM In/Out Phase - System is ready to accept configuration changes only for non-maintenance mode attributes of this object and its sub-hierarchies. Interface Name Gateway Service Mode ms-2/1/0 ams1 TDF TDF Operational Operational 1064 show unified-edge tdf system interfaces service-mode detail user@host> show unified-edge tdf system interfaces service-mode detail Service Mode Status Interface Name : ms-2/1/0 Gateway Name : TDF Service Mode : Operational Service Mode Status Interface Name : ams1 Gateway Name : TDF Service Mode : Operational Release Information Statement introduced in Junos OS Release 17.1. RELATED DOCUMENTATION show unified-edge tdf system interfaces | 1059AH XSL Formatter V6.6 MR1 for Windows (x64) : 6.6.2.35616 (2018/10/15 18:42JST) Antenna House PDF Output Library 6.6.1317 (Windows (x64))