4 IETF M3UA and SUA Configuration Procedures
Chapter 4, IETF M3UA and SUA Configuration Procedures, describes the procedures necessary to configure the components necessary to establish IP connections using M3UA or SUA associations on IPGWx signaling links.
4.1 Adding IETF M3UA and SUA Components
This section describes how to configure the components necessary to establish IP connections using M3UA or SUA associations on IPGWx signaling links. IPGWx signaling links are signaling links assigned to cards running either the SS7IPGW or IPGWI applications. The SS7IPGW application supports point-to-multipoint connectivity for ANSI networks. The IPGWI application supports point-to-multipoint connectivity for ITU networks.
The configuration of these IP connections consists of these items.
- Configure the IPGWx card with the Adding an IPGWx Card procedure. Turn the ISUP-over-IP (
ipisup
) feature with thechg-feat
command.Note:
Before turning on the ISUP-over-IP feature (ipisup
) feature, make sure you have purchased these features. If you are not sure whether you have purchased the ISUP-over-IP feature, contact your Oracle Sales Representative or Account Representative. Once a feature has been turned on with thechg-feat
command, the feature cannot be turned off. - Configure the required destination point codes - see Chapter 2, “Configuring Destination Tables,” in Database Administration - SS7 User's Guide.
- Configure the required IPGWx linksets with the Configuring an IPGWx Linkset procedure. If you wish to add a mate IPGWx linkset to another IPGWx linkset, perform the Adding a Mate IPGWx Linkset to another IPGWx Linkset procedure.
- Configure the IPGWx signaling links with the Adding an IPGWx Signaling Link procedure. If the addition of these signaling links will exceed the current number of signaling links the EAGLE is allowed to have, the Enabling the Large System # Links Controlled Feature procedure will have to be performed to increase the quantity of signaling links.
- Configure the required routes - see Chapter 3, “SS7 Configuration,” in Database Administration - SS7 User's Guide.
- IP addresses must be assigned to the IPGWx card configured in step 1 by performing theConfiguring an IP Link procedure. There are other IP link parameters that are assigned to the IPGWx card when the IPGWx card is configured. Default values are assigned to these parameters when the IPGWx card is configured. These values can be displayed by the
rtrv-ip-lnk
command. These values can be changed by performing theConfiguring an IP Link procedure. - Local IP hosts, assigned to the IP addresses assigned to step 6, must be configured in the database by performing the Adding an IP Host procedure. Verify the hosts with the
rtrv-ip-host
command. This establishes a relationship between the IP card related information and the connection related information. - When the IP cards are added to the database in step 1, there are IP parameters that control the IP stack that are assigned default values. These parameter values can be displayed by the
rtrv-ip-card
command. These values can be changed by performing the Configuring an IP Card procedure. - Static IP routes provide more flexibility in selecting the path to the remote destination and reduces the dependence on default routers. Static IP routes are provisioned by performing theAdding an IP Route procedure.
- Associations specify a connection between a local host/TCP port and a remote host/TCP port. Three types of associations can be provisioned: M2PA, M3UA, and SUA. Associations that are assigned to IPGWx signaling links must be either M3UA or SUA associations. The M3UA and SUA associations are configured by performing the Adding an M3UA or SUA Association procedure. M2PA associations that are assigned to IPLIMx signaling links are provisioned with the Adding an M2PA Association procedure inIETF M2PA Configuration Procedures. Associations can be assigned to IPSG signaling links also. These associations are configured by performing the Adding an IPSG M2PA Association or Adding an IPSG M3UA Association procedures. A number of fields in the association cannot be configured with the Adding an M3UA or SUA Association procedure and are set to default values. The values of these fields can be displayed using the
rtrv-assoc
command after theAdding an M3UA or SUA Association procedure is performed. These values can be changed by performing these procedures: Changing the Attributes of a M3UA or SUA Association, Changing the Buffer Size of a M3UA or SUA Association. Only one signaling link can be assigned to an IPGWx card. A maximum of 50 IP connections can be assigned to an IPGWx card. - When an M3UA or SUA association is added to the database, UA parameter set 10 is assigned to the association. There are 10 UA parameter sets that can be assigned to an association, but the UA parameter set assignment can be changed, using the Changing the Attributes of a M3UA or SUA Association procedure. The values assigned to each UA parameter set can be changed, except for UA parameter set 10, using the Changing a UA Parameter Set procedure.
- The application server contains a set of one to 16 associations, of which one or more is normally actively processing traffic. Application servers are configured by performing on of these procedures:
- Adding a New Association to a New Application Server
- Adding an Existing Association to a New Application Server
- Adding a New Association to an Existing Application Server
- Adding an Existing Association to an Existing Application Server
If the associations assigned to application server are M3UA associations, and the
open
parameter value for these associations isyes
, then the same UA parameter set must be assigned to all of the associations in the application server. - Routing keys specify MSU filters for the IP connection. Configure the routing keys with theAdding a Routing Key Containing an Application Server procedure.
- An internal point code can be provisioned to provide routing to an IP end office node. Configure the internal point codes by performing the Adding an End Node Internal Point Codeprocedure.
- The network appearance field identifies the SS7 network context for the message, for the purpose of logically separating the signaling traffic between the SGP (signaling gateway process) and the application server over a common SCTP (stream control transmission protocol) association. This field is contained in the DATA, DUNA, DAVA, DRST, DAUD, SCON, and DUPU messages. Network appearances are configured by performing the Adding a Network Appearance procedure.
- The EAGLE processes messages with a service information field (SIF) that is 272 bytes or smaller. The Large MSU Support for IP Signaling feature allows the EAGLE to process messages with a service indicator value of 6 to 15 and with a SIF that is larger than 272 bytes. Perform the Activating the Large MSU Support for IP Signaling Feature procedure to enable and turn on the Large MSU Support for IP Signaling feature.
4.2 Adding an IPGWx Card
This procedure is used to add an IPGWx card to the
database using the
ent-card
command. An IPGWx card is a
card that is running either the SS7IPGW or IPGWI applications.
Table 4-1shows
the cards that can be provisioned in this procedure.
Table 4-1 IPGWx Card Types
Card Type | Part Number |
---|---|
E5-ENET | 870-2212-xx |
E5-ENET-B | 870-2971-xx |
The EAGLE can support a combination of E5-ENET and E5-ENET-B cards.
The
ent-card
command uses these parameters.
:loc
– The location of
the card being added to the database.
:type
– The type of card
being added to the database. For this procedure, the value of this parameter is
dcm
.
:appl
– The application
software that is assigned to the card. For this procedure, the value of this
parameter is
ss7ipgw
for ANSI IP network
connections or
ipgwi
for ITU IP network connections.
:force
– If the global
title translation feature is on, the
force=yes
parameter allows the LIM to
be added to the database even if the current SCCP transactions-per-second
threshold is unable to support the additional SCCP transaction-per-second
capacity created by adding the IP card. This parameter is obsolete and is no
longer used.
If you have purchased the ISUP-over-IP (ipisup
)
feature, verify that the ISUP-over-IP feature is turned on (ipisup=on
) using the rtrv-feat
command. If the appropriate feature is off, turn it on with the chg-feat
command. For more information on the
ISUP-over-IP feature, refer to section Point-to-Multipoint Connectivity (SS7IPGW and IPGWI).
Note:
Before turning on the ISUP-over-IP feature (ipisup
), make sure you have purchased this feature. If
you are not sure whether you have purchased the ISUP-over-IP feature, contact
your Oracle Sales Representative or Account Representative. Once a feature has
been turned on with the
chg-feat
command, the feature cannot be
turned off.
Card Slot Selection
The E5-ENET card can be inserted into any card slot, except for card slots that must remain empty to accommodate dual-slot cards, slots 09 and 10 in each shelf, and slots 1113 through 1118.
To provision a E5-ENET card, the shelf containing the
E5-ENET card must have HIPR2 cards installed in slots 9 and 10 in that shelf.
If HIPR2 cards are not installed in the shelf that the E5-ENET card will
occupy, the E5-ENET card will be auto-inhibited when the E5-ENET card is
inserted into the shelf. Enter the
rept-stat-gpl:gpl=hipr2
command to
verify whether or not HIPR2 cards are installed in the same shelf as the
E5-ENET card being provisioned in this procedure.
Figure 4-1 Add an IPGWx Card - Sheet 1 of 3
Note:
Before executing this procedure, make sure you have purchased the ISUP-over-IP feature. If you are not sure whether you have purchased the ISUP-over-IP feature, contact your Sales Representative or Account Representative.Figure 4-2 Add an IPGWx Card - Sheet 2 of 3
Figure 4-3 Add an IPGWx Card - Sheet 3 of 3
4.3 Configuring an IPGWx Linkset
This procedure is used to configure IPGWx linksets in the EAGLE using the ent-ls
or chg-ls
commands with these parameters. An IPGWx linkset is a linkset that contains signaling links running either the SS7IPGW or IPGWI applications.
Note:
This procedure is not used to configure a mate IPGWx linkset, with thematelsn
and action
parameters. To configure a mate IPGWx linkset, perform procedure.
:lsn
– The name of the linkset. The linkset name can contain up to 10 characters, with the first character being a letter. However, the SEAS interface supports only eight characters. If this linkset is displayed on the SEAS interface and the linkset name contains more than eight characters, only the first eight characters in the linkset name are shown. If this linkset name contains more than eight characters, and is specified with the linkset commands on the SEAS interface, only the first eight characters can be specified.
:apc/apca/apci/apcn/apcn24
– Adjacent point code – the point code identifying the node that is next to the EAGLE. The adjacent point code can be one of the following types of point codes:
:apc
/apca
– ANSI point code, ANSI private point code
:apci
– ITU-I point code, ITU-I spare point code, ITU-I private point code, ITU-I private spare point code.
:apcn
– 14-bit ITU-N point code, 14-bit ITU-N spare point code, 14-bit ITU-N private point code, 14-bit ITU-N private spare point code.
:apcn24
– 24-bit ITU-N point code, 24-bit ITU-N private point code.
Note:
See the “Point Code Formats” section in Database Administration - SS7 User's Guide for a definition of the point code types that are used on the EAGLE and for a definition of the different formats that can be used for ITU national point codes.Note:
Theapc/apca/apci/apcn/apcn24
parameter must be specified with the ent-ls
command. Specifying this parameter with the chg-ls
command is required only if the adjacent point code of the linkset is being changed.
:lst
– The linkset type of the specified linkset - The lst
parameter must be specified with the ent-ls
command. Specifying this parameter with the chg-ls
command is required only if the linkset type of the linkset is being changed.
:ipgwapc
– IP Gateway Adjacent Point Code indicator. Specify the ipgwapc=yes
parameter to provide SS7 linkset definition compatibility for gateway connections to IP-SCPs. This parameter can be specified only for, and must be specified for, linksets containing signaling links assigned to either the SS7IPGW or IPGWI applications. The default is ipgwapc=no
.
Note:
Theipgwapc
parameter can be specified only with the ent-ls
command.
To provision ISUP-CIC routing keys, the ipgwapc=yes
parameter and the IP Gateway ISUP routing feature must be turned on. Verify this with the rtrv-feat
command. If the IP Gateway ISUP routing feature is turned on, the ipisup
field should be set to on
. If the IP Gateway ISUP routing feature is not turned on, enter the chg-feat:ipisup=on
command.
Note:
Once the IP Gateway ISUP routing feature is turned on with thechg-feat
command, it cannot be turned off.
Note:
The IP Gateway ISUP routing feature must be purchased before you turn the feature on with thechg-feat
command. If you are not sure if you have purchased the IP Gateway ISUP routing feature, contact your Oracle Sales Representative or Account Representative.
:iptps
– The quantity of IP TPS (transactions per second) that is assigned to the IPGWx linkset, from 100 to 32,000. The total amount of the IP TPS for all IPGWx linksets cannot exceed the total provisioned system TPS value in the rtrv-tps
output..
:lsusealm
– The linkset’s IPTPS alarm threshold, from 10 to 100 percent of the linkset’s IPTPS. When this threshold is reached, a major alarm (UAM 0115) is generated. When the linkset’s IPTPS falls below this threshold, UAM 0115 is automatically cleared and UAM 0118 is generated.
:slkusealm
– The signaling link IPTPS alarm threshold, from 10 to 100 percent of the signaling link’s fair share of the linkset’s IPTPS or from 10 to 100 percent of the IPGWx card’s capacity (4000 TPS). This threshold is reached when the signaling link’s actual usage exceeds the percentage of the signaling link’s fair share of the linkset’s IPTPS or the percentage of the IPGWx card’s capacity.
A signaling link's fair share of linkset’s IPTPS is the linkset’s IPTPS divided by the number of in-service links in the linkset. For example, if the linkset IPTPS is 4000 and there are 4 signaling links in the linkset, all in-service, then the signaling link's fair-share would be 1000 IPTPS (4000/4=1000). Table 4-2 shows this calculation for a linkset with 1, 2, 3 and 4 in-service signaling links.
Table 4-2 Signaling Link Fair Share Example
Number of In-Service Signaling Links | Linkset IPTPS | Signaling Link Fair Share of the Linkset IPTPS |
---|---|---|
4 |
4000 |
1000 |
3 |
4000 |
1333 |
2 |
4000 |
2000 |
1 |
4000 |
4000 |
When this threshold is exceeded, a minor alarm (UAM 0116) is generated. When the amount of traffic on the signaling link falls below this threshold, UAM 0116 is automatically cleared and UAM 0119 is generated.
The signaling link IPTPS alarm shows that the linkset IPTPS is set too low for the linkset or that the IPGWx card's capacity has been exceeded. Setting the signaling link IPTPS alarm threshold lower than the linkset IPTPS alarm threshold can give the user an earlier indication that the linkset IPTPS is inadequate or that traffic is not balanced across the links in the linkset.
:multgc
– specifies whether multiple group codes (for 14-bit ITU-N point codes) are supported for the linkset. When this parameter value is yes
, secondary adjacent point codes whose group codes are different from the adjacent point code of the linkset can be assigned to the linkset. If the parameter value is no
, the group code of the secondary adjacent point code must be the same as the group code of the linkset’s adjacent point code. For more information on secondary adjacent point codes, go to the “Configuring an ITU Linkset with a Secondary Adjacent Point Code (SAPC)” procedure in the Database Administration - SS7 User's Guide.
This parameter only applies to linksets whose adjacent point codes are either ITU international point codes or ITU national point codes. All the signaling links in this linkset must be assigned to cards running the IPGWI application. For more information on assigning signaling links to cards running the IPGWI application, go to the Adding an IPGWx Signaling Link procedure.
The ITU duplicate point code feature must be on before this parameter can be specified. Verify this with the rtrv-feat
command. If the ITU duplicate point code feature is turned on, the ituduppc
field should be set to on
. If the ITU duplicate point code feature is not turned on, enter the chg-feat:ituduppc=on
command.
Note:
Once the ITU duplicate point code feature is turned on with thechg-feat
command, it cannot be turned off.
The ITU duplicate point code feature must be purchased before you turn the feature on with the chg-feat
command. If you are not sure if you have purchased the ITU duplicate point code feature, contact your Oracle Sales Representative or Account Representative.
Adding the IPGWx linkset cannot exceed the maximum total provisioned system TPS shown in the rtrv-tps
output. An IPGWx linkset uses 4000 TPS.
- The IP TPS values of some IPGWx linksets have to be changed.
- The MAXSLKTPS values of some IPSG linksets (and the RSVDSLKTPS values if necessary) have to be changed.
- Some ATM high-speed signaling links have to be removed.
- An IPLIMx card that contains signaling links has to be removed.
The adjacent point code (APC) for the linkset must be defined in the database, must be in the SS7 domain and cannot match the point code or capability point code of the EAGLE. The domain of the point code is shown in the DMN
field in the output of the rtrv-dstn
command. The point code of the EAGLE is shown in the PCA
, PCN
, PCN24
, or PCI
fields and the capability point code of the EAGLE are shown in the CPCA
, CPCN
, CPCN24
, or CPCI
fields in the output of the rtrv-sid
command. An ANSI adjacent point code must be a full point code and cannot be a cluster point code or a network routing point code. The adjacent point code of the linkset cannot be a proxy point code, cannot have a proxy point code assigned to it, and cannot be assigned to another linkset.
If the APC is not in the destination point code table, go to the “Adding a Destination Point Code” procedure in Database Administration - SS7 User's Guide and add the APC to the destination point code table.
For IPGWx linksets, more than one device may be attached to the LAN and have IP connections to the IP card running either the SS7IPGW or IPGWI application. Thus each IPGWx linkset is adjacent to all devices on the LAN (or adjacent to no device on the LAN, depending on your point of view). To provide a scheme allowing this point-to-multipoint connection and maintain consistent SS7 linkset definition rules, a virtual APC is required. This virtual APC is a real SS7 point code that is not used anywhere else in the SS7 network. Virtual APCs assigned to SS7IPGW linksets are ANSI point codes. Virtual APCs assigned to IPGWI linksets are either ITU-I or ITU-N point codes (either 14-bit or 24-bit ITU-N point codes). Virtual point codes can be reused on more than one switch. For example, a mated set of switches, each with two related links, could share two virtual point codes instead of requiring four. DPCs and linksets related to the virtual APC must be defined with the ipgwapc
parameter set to yes
.
For provisioning of ISUP-CIC routing keys, the ipgwapc=yes
parameter and the IP Gateway ISUP routing feature must be turned on. Verify this with the rtrv-feat
command. If the IP Gateway ISUP routing feature is turned on, the ipisup
field should be set to on
. If the IP Gateway ISUP routing feature is not turned on, enter the chg-feat:ipisup=on
command.
Note:
Once the IP Gateway ISUP routing feature is turned on with thechg-feat
command, it cannot be turned off.
The IP Gateway ISUP routing feature must be purchased before you turn the feature on with the chg-feat
command. If you are not sure if you have purchased the IP Gateway ISUP routing feature, contact your Oracle Sales Representative or Account Representative.
Other Optional Parameters
- These procedures in this manual:
- These procedures in Database Administration - SS7 User's Guide
- Adding an SS7 Linkset
- Changing an SS7 Linkset
- Configuring an ITU Linkset with a Secondary Adjacent Point Code (SAPC)
- The "Configuring a Linkset for the GSM MAP Screening Feature" procedure in Database Administration - Features User's Guide.
Note:
Themtprse
, spc/spca/spci/spcn/spcn24
, and ppc/ppca/ppci/ppcn/ppcn24
parameters cannot be specified for an IPGWx linkset.
Canceling the RTRV-LS
and RTRV-DSTN
Commands
Because the rtrv-ls
and rtrv-dstn
commands used in this procedure can output information for a long period of time, the rtrv-ls
and rtrv-dstn
commands can be canceled and the output to the terminal stopped. There are three ways that the rtrv-ls
and rtrv-dstn
commands can be canceled.
- Press the
F9
function key on the keyboard at the terminal where thertrv-ls
orrtrv-dstn
commands were entered. - Enter the
canc-cmd
without thetrm
parameter at the terminal where thertrv-ls
orrtrv-dstn
commands were entered. - Enter the
canc-cmd:trm=<xx>
, where<xx>
is the terminal where thertrv-ls
orrtrv-dstn
commands were entered, from another terminal other that the terminal where thertrv-ls
orrtrv-dstn
commands were entered. To enter thecanc-cmd:trm=<xx>
command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with thertrv-secu-trm
command. The user’s permissions can be verified with thertrv-user
orrtrv-secu-user
commands.
For more information about the canc-cmd
command, go to Commands User's Guide.
Figure 4-4 Configuring an IPGWx Linkset
4.4 Adding a Mate IPGWx Linkset to another IPGWx Linkset
This procedure is used to add a mate IPGWx linkset to an
existing IPGWx linkset
chg-ls
command with these parameters.
:lsn
– The name of the
IPGWx linkset that will contain the mate IPGWx linkset that is being added
shown in the
rept-stat-iptps
or
rtrv-ls
command outputs. is being
added.
:matelsn
– The name of
the mate IPGWx linkset that is being added.
:action=add
– adds the
mate IPGWx linkset to the IPGWx linkset specified by the
lsn
parameter.
An IPGWx linkset is a linkset that contains signaling links assigned to IPGWx cards. IPGWx cards are cards running either the SS7IPGW or IPGWI applications.
The EAGLE allows an IPGWx linkset to contain up to 8 IPGWx signaling links, and as a result, 8 IPGWx cards. This increases the amount of traffic that can be delivered to a single IP node compared to the two-card combined IPGWx linkset deployments used in previous releases. An IPGWx linkset containing up to 8 IPGWx signaling links is the preferred method of configuring IPGWx linksets (see the Configuring an IPGWx Linkset procedure). This method is required if more than two IPGWx signaling links are to be used in the linkset.
To provide backward compatibility with pre-existing
two-card combined
IPGWx linkset deployments,
the
EAGLE also provides for a mate
IPGWx linkset. A mate
IPGWx linkset consists of
one
IPGWx linkset assigned to
another
IPGWx linkset using the
matelsn
parameter of the
chg-ls
command. To assign a mate
IPGWx linkset to another
IPGWx linkset, both
linksets can contain no more than one signaling link. While mate
IPGWx linksets can be
configured using this procedure, the preferred method of configuring two-card
IPGWx deployments is to
configure a two-link non-mated linkset using the
Configuring an IPGWx Linkset
procedure.
Each linkset in the mated pair must either contain no
mate linksets, or can reference the other linkset in the mated pair. For
example, to assign linkset
LSN2
to
IPGWx linkset
LSN1
as a mate linkset, linkset
LSN1
cannot contain any mate linksets.
Linkset
LSN2
can have linkset
LSN1
as a mate, otherwise linkset
LSN2
cannot have any mate linksets
assigned to it.
The mate linkset name is displayed in the
rtrv-ls:lsn=<linkset name>
command output. If either linkset contains more than one signaling link, all
but one of the signaling links must be removed from these linksets or other
linksets must be chosen. Perform the
Removing an IPGWx Signaling Linkprocedure
to remove any signaling links from the linkset. If new linksets must be
configured for this procedure, perform the
Configuring an IPGWx Linkset
procedure.
Before a mate IPGWx linkset can be added to an IPGWx linkset, the card containing the IPGWx signaling link assigned to the linkset being changed, and the signaling link assigned to that card must be placed out of service.
The network type of the adjacent point code of the mate IPGWx linkset must be the same type as the linkset the mate is assigned to. For example, if a mate IPGWx linkset is assigned to an IPGWx linkset with an ITU-I adjacent point code, the mate IPGWx linkset must have an ITU-I adjacent point code.
Other Optional Parameters
- These procedures in this manual:
- These procedures in
Database Administration - SS7 User's Guide
- Adding an SS7 Linkset
- Changing an SS7 Linkset
- Configuring an ITU Linkset with a Secondary Adjacent Point Code (SAPC)
- The "Configuring a Linkset for the GSM MAP Screening Feature" procedure in Database Administration - Features User's Guide.
Figure 4-5 Adding a Mate IPGWx Linkset to another IPGWx Linkset
Sheet 1 of 6
Sheet 2 of 6
Sheet 3 of 6
Sheet 4 of 6
Sheet 5 of 6
Sheet 6 of 6
4.5 Adding an IPGWx Signaling Link
This procedure is used to add an IPGWx signaling link to the database using the ent-slk
command with these parameters:
:loc
– The card location of the IP card that the IP signaling link will be assigned to. The cards specified by this parameter are IP cards running the SS7IPGW or IPGWI applications.
:link
– The signaling link on the card specified in the loc
parameter.
:lsn
– The name of the linkset that will contain the signaling link.
:slc
– The signaling link code. The SLC must be unique within the linkset. It must be the same at both the EAGLE location and the distant node.
ent-slk
command contains other optional parameters that are not used to configure an IPGWx signaling link. These parameters are discussed in more detail in Commands User's Guide or in these sections.
- These procedures in this manual:
- These procedures in Database Administration - SS7 User's Guide
- Adding an SS7 Signaling Link
- Adding an E1 Signaling Link
- Adding a T1 Signaling Link
- Adding an ATM High-Speed Signaling Link
These items must be configured in the database before an IP signaling link can be added:
- Shelf – see "Adding a Shelf" in the Database Administration - System Management User's Guide.
- Card – see Adding an IPGWx Card
- Destination Point Code – see “Adding a Destination Point Code” in the Database Administration - SS7 User's Guide.
- Linkset – see Configuring an IPGWx Linkset.
Verify that the link has been physically installed (all cable connections have been made).
To configure the EAGLE to perform circular routing detection test on the signaling links, “Configuring Circular Route Detection” procedure in Database Administration - SS7 User's Guide.
Note:
Circular route detection is not supported in ITU networks.To provision a EAGLE with more than 1200 signaling links, the EAGLE must have certain levels of hardware installed. See the Requirements for EAGLEs Containing more than 1200 Signaling Links section for more information on these hardware requirements.
The EAGLE can contain a mixture of low-speed, E1, T1, ATM high-speed, and IP signaling links. The Determining the Number of High-Speed and Low-Speed Signaling Links section describes how to determine the quantities of the different types of signaling links the EAGLE can have.
Canceling the REPT-STAT-SLK
, RTRV-LS
, and RTRV-SLK
Commands
Because the rept-stat-slk
, rtrv-ls
, and rtrv-slk
commands used in this procedure can output information for a long period of time, the rept-stat-slk
, rtrv-ls
, and rtrv-slk
commands can be canceled and the output to the terminal stopped. There are three ways that the rept-stat-slk
, rtrv-ls
, and rtrv-slk
commands can be canceled.
- Press the
F9
function key on the keyboard at the terminal where therept-stat-slk
,rtrv-ls
, orrtrv-slk
commands were entered. - Enter the
canc-cmd
without thetrm
parameter at the terminal where therept-stat-slk
,rtrv-ls
, orrtrv-slk
commands were entered. - Enter the
canc-cmd:trm=<xx>
, where<xx>
is the terminal where therept-stat-slk
,rtrv-ls
, orrtrv-slk
commands were entered, from another terminal other that the terminal where therept-stat-slk
,rtrv-ls
, orrtrv-slk
commands was entered. To enter thecanc-cmd:trm=<xx>
command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with thertrv-secu-trm
command. The user’s permissions can be verified with thertrv-user
orrtrv-secu-user
commands.
For more information about the canc-cmd
command, go to Commands User's Guide.
Figure 4-6 Adding an IPGWx Signaling Link
Sheet 1 of 6
Sheet 2 of 6
Sheet 3 of 6
Sheet 4 of 6
Sheet 5 of 6
Sheet 6 of 6
4.6 Configuring an IP Link
This procedure is used to configure the link parameters for IP cards using the chg-ip-lnk
command. These link parameters are used to configure the Ethernet hardware.
The chg-ip-lnk
command uses the following parameters.
:loc
– The card location of the IP card.
:port
– The Ethernet interface on the IP card, A or B.
:ipaddr
– IP address assigned to the Ethernet interface on the IP card. This is an IP address expressed in standard “dot notation.” IP addresses consist of the system’s network number and the machine’s unique host number.
:submask
– The subnet mask of the IP interface. A subnet mask is an IP address with a restricted range of values. The bits in the mask must be a string of one’s followed by a string of zero’s. There must be at least two one’s in the mask, and the mask cannot be all one’s. See Table 4-4 to assign the correct parameter values.
:auto
– Tells hardware whether to automatically detect the duplex
and speed
.
:duplex
– This is the mode of operation of the interface.
:speed
– This is the bandwidth in megabits per second of the interface.
:mactype
– This is the Media Access Control Type of the interface.
:mcast
– The multicast control flag. This parameter enables or disables multicast support for the interface.
The EAGLE can contain a maximum of 2048 IP links.
A zero ipaddr
parameter value (0.0.0.0
) indicates the IP card Ethernet interface to IP link association is disabled. The host to the original IP address must be removed before the ipaddr=0.0.0.0
can be specified.
If the defrouter
parameter of the chg-ip-card
command contains an IP address for the card specified in this procedure, the network portion of one of the IP addresses assigned to the card in this procedure must match the network portion of the IP address specified by the defrouter parameter of the chg-ip-card
command.
The network portion of the IP address is based on the class of the IP address (shown in Table 4-4). If the IP address is a Class A IP address, the first field is the network portion of the IP address. If the IP address is a Class B IP address, the first two fields are the network portion of the IP address. If the IP address is a Class C IP address, the first three fields are the network portion of the IP address. For example, if the IP address is 193.5.207.150, a Class C IP address, the network portion of the IP address is 193.5.207.
If the auto=yes
parameter is specified, then the duplex
and speed
parameters are not allowed.
The loc
parameter value must be shown in the rtrv-ip-card
output.
The IP card must be placed out of service.
If either the ipaddr
or submask
parameters are specified, then both parameters must be specified. If the ipaddr
parameter value is zero (0.0.0.0
), the submask
parameter is not required.
The IP address and subnet mask values cannot be changed to an address representing a different network if:
- If the network interface specified by the
loc
andport
parameters has a default router,dnsa
, ordsnb
parameter values assigned to it, as shown in thertrv-ip-card
output. - Any IP routes, shown in the
rtrv-ip-rte
output, reference the IP address for the network interface specified by theloc
andport
parameters.
The IP link cannot be changed if open associations reference the IP link being changed.
The network portion of the IP addresses assigned to the IP links on an IP card must be unique. For example, if IP links are assigned to IP card 1103, the network portion of the IP address for Ethernet interface A (port=a
) must be different from the IP address for Ethernet interface B (port=b
).
The submask
parameter value is based upon the ipadddr
setting. See Table 4-4 for the valid input values for the submask
and ipaddr
parameter combinations.
Table 4-4 Valid Subnet Mask
Parameter Values
Network Class | IP Network Address Range | Valid Subnet Mask Values |
---|---|---|
A |
1.0.0.0 to 127.0.0.0 |
255.0.0.0 (the default value for a class A IP address) 255.192.0.0 255.224.0.0 255.240.0.0 255.248.0.0 255.252.0.0 255.254.0.0 255.255.128.1 |
A+B |
128.0.0.0 to 191.255.0.0 |
255.255.0.0 (the default value for a class B IP address) 255.255.192.0 255.255.224.0 255.255.240.0 255.255.248.0 255.255.252.0 255.255.254.0 255.255.255.128 |
A+B+C |
192.0.0.0 to 223.255.255.0 |
255.255.255.0 (the default value for a class C IP address) 255.255.255.192 255.255.255.224 255.255.255.240 255.255.255.248 255.255.255.252 |
If a Class B IP address is specified for the ipaddr
parameter of the chg-ip-lnk
command, the subnet address that results from the ipaddr
and submask
parameter values cannot be the same as the subnet address that results from the pvn
and pvnmask
, fcna
and fcnamask
, or fcnb
and fcnbmask
parameter values of the chg-netopts
command. The pvn
and pvnmask
, fcna
and fcnamask
, or fcnb
and fcnbmask
parameter values can be verified by entering the rtrv-netopts
command. Choose ipaddr
and submask
parameter values for the IP link whose resulting subnet address is not be the same as the subnet address resulting from the pvn
and pvnmask
, fcna
and fcnamask
, or fcnb
and fcnbmask
parameter values of the chg-netopts
command.
Canceling the RTRV-ASSOC
Command
Because the rtrv-assoc
command used in this procedure can output information for a long period of time, the rtrv-assoc
command can be canceled and the output to the terminal stopped. There are three ways that the rtrv-assoc
command can be canceled.
- Press the
F9
function key on the keyboard at the terminal where thertrv-assoc
commandwas were entered. - Enter the
canc-cmd
without thetrm
parameter at the terminal where thertrv-assoc
commandwas entered. - Enter the
canc-cmd:trm=<xx>
, where<xx>
is the terminal where thertrv-assoc
commandwas entered, from another terminal other that the terminal where thertrv-assoc
commandwas entered. To enter thecanc-cmd:trm=<xx>
command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with thertrv-secu-trm
command. The user’s permissions can be verified with thertrv-user
orrtrv-secu-user
commands.
For more information about the canc-cmd
command, go to Commands User's Guide.
Figure 4-7 Configuring an IP Link
Sheet 1 of 9
Sheet 2 of 9
Sheet 3 of 9
Sheet 4 of 9
Sheet 5 of 9
Sheet 6 of 9
Sheet 7 of 9
Sheet 8 of 9
Sheet 9 of 9
4.7 Adding an IP Host
This procedure associates hostnames with IP addresses using the ent-ip-host
command.
The ent-ip-host
command uses the following parameters.
:host
– The host name to be associated with the IP address. This parameter identifies the logical name assigned to the device with the IP address indicated. The host name can contain up to 60 characters (using only these characters: a-z, A-Z, 0-9, -, .) and is not case sensitive. The host name must begin with a letter. Host names containing a dash (-) must be enclosed in double quotes.
:ipaddr
– The IP address to be associated with the hostname. The node’s IP address. This is an IP address expressed in standard “dot notation.” IP addresses consist of the system’s network number and the machine’s unique host number.
:type
– Specifies if the host resides on the IP card on the EAGLE 5 (type=local
, the default value), or if the host resides on equipment that is not in the EAGLE 5 (type=remote
). This parameter is optional.
The EAGLE 5 can contain a maximum of 4096 IP hosts.
The IP address for a local host must be shown in the rtrv-ip-lnk
output.
The IP address for a remote host must not be shown in the rtrv-ip-lnk
output.
Figure 4-8 Adding an IP Host
4.8 Configuring an IP Card
This procedure is used to change the IP stack parameters associated with an IP card in the database using the chg-ip-card
command.
The chg-ip-card
command uses the following parameters.
:loc
– The card location of the IP card
:srchordr
– Host Table Search Order
:dnsa
– Domain name server A’s IP address. This is an IP address expressed in standard “dot notation.” IP addresses consist of the system’s network number and the machine’s unique host number.
:dnsb
– Domain name server B’s IP address. This is an IP address expressed in standard “dot notation.” IP addresses consist of the system’s network number and the machine’s unique host number.
:domain
– The domain name is used to construct a fully-qualified DNS name consisting of 120 characters or less. For example, a domain name can be tekelec.com
, the hostname is john.doe
. The fully-qualified DNS name would be john.doe@tekelec.com
.
:defrouter
– Default router IP address. This is an IP address expressed in standard “dot notation.” IP addresses consist of the system’s network number and the machine’s unique host number.
:rstdomain
– Reset Domain name. The parameter is used to reset the domain to a NULL value.
:sctpcsum
– The SCTP checksum algorithm that will be applied to the traffic on the IP card, either adler32
or crc32c
. The sctpcsum
parameter can be specified only if the SCTPCSUM
value in the rtrv-sg-opts
output is percard
.
The chg-ip-card
command contains other parameters that cannot be used in this procedure. Refer to Commands User's Guide for more information about these parameters.
The IP card must be placed out of service.
The rstdomain
parameter cannot be specified if the domain
parameter is specified.
There is only one default router (defrouter
parameter) for each IP card. The default router is used as the primary route unless a static IP routes is defined for the destination IP address. Static IP routes are assigned using the ent-ip-rte
command in the Adding an IP Route procedure.
The network portion of the IP address of the default router must match the network portion of one of the IP addresses assigned to the card.
The network portion of the IP address is based on the class of the IP address (shown in Table 4-4). If the IP address is a Class A IP address, the first field is the network portion of the IP address. If the IP address is a Class B IP address, the first two fields are the network portion of the IP address. If the IP address is a Class C IP address, the first three fields are the network portion of the IP address. For example, if the IP address is 193.5.207.150, a Class C IP address, the network portion of the IP address is 193.5.207.
The default router can be associated with only one IP address assigned to the card if the defrouter parameter is specified. For example, the dnsa
value for card 1101 is 150.1.1.10. The dnsb
value for card 1101 is 160.25.37.1. A default router is provisioned with the IP address 150.1.1.4. The default router is associated with the Ethernet A IP address (the dnsa
parameter value), but not the Ethernet B IP address (the dnsb
parameter value).
If the default router is associated with one of the IP card’s IP addresses, a second gateway router can be assigned to the other IP address on the IP card by provisioning a static IP route for the IP card using the ent-ip-rte
command in the Adding an IP Route procedure. Static IP routes can provide gateway routers associated with the other IP address on the IP card. To provision the gateway router (the gtwy
parameter of the ent-ip-rte
command) for the other IP address assigned to the IP card, the network portion of the gateway router’s IP address must match the network portion of the other IP address assigned to the IP card.
Specifying the IP address 0.0.0.0 for the dnsa
or dnsb
parameters, removes the IP address for Ethernet A (dnsa
) or Ethernet B (dnsb
).
When an IP card is entered into the database with the ent-card
command, the IP stack parameters associated with this card are initially set with these default values:
:srchordr
– SRVR-
:dnsa
– No DNSA IP address is specified :dnsb
– No DNSB IP address is specified:domain
– No domain name is specified:defrouter
– No default router IP address is specified:rstdomain
– No:sctpcsum
– crc32c
The value of any optional parameter not specified with the chg-ip-card
command is not changed.
Figure 4-9 Configuring an IP Card
Sheet 1 of 4
Sheet 2 of 4
Sheet 3 of 4
Sheet 4 of 4
4.9 Adding an IP Route
This procedure is used to add an IP route to the database using the ent-ip-rte
command.
The ent-ip-rte
command uses these parameters.
:loc
– The location of the IP card that the IP route will be assigned to.
:dest
– The IP address of the remote host or network.
:submask
– The subnet mask of the destination IP address.
:gtwy
– The IP address of the gateway or router that will send the IP data to its final destination.
There can be a maximum of 64 IP routes assigned to an IP card.
The EAGLE can contain a maximum of 2048 IP routes.
Ethernet Interfaces A and B on the IP card specified by the loc
parameter can be used.
The network portion of the IP address value of the gtwy
parameter must be the same as the network portion of the IP addresses shown for either the A or B interfaces in the rtrv-ip-card
output.
The value of the dest
and gtwy
parameters cannot be 127.x.x.x (the loopback address), 0.0.0.0, or the IP addresses of the A or B interfaces on the IP card, and cannot be assigned to another IP card.
If the dest
parameter value represents a host IP address, the value for the submask
parameter must be 255.255.255.255. Otherwise, the submask
parameter value is identifies the network/host ID portions that must be entered when the dest parameter value represents a network address.
The submask is applied to the IP address which is being routed to see if it yields a route match. For example, if IP address 192.1.1.2 is being routed and the IP routing table contains these entries.
Table 4-5 Sample IP Routing Table
IP address | Submask | Gateway |
---|---|---|
191.1.0.0 |
255.255.0.0 |
192.168.110.250 |
192.0.0.0 |
255.0.0.0 |
192.168.110.251 |
IP routing occurs as follows:
-
The subnet mask of route 1 (255.255.0.0) is applied to the IP address being routed (192.1.1.2) with the resulting IP address of 192.1.0.0. IP address 192.1.0.0 does not match IP address 191.1.0.0 in the IP routing table, so the next route is chosen.
-
The subnet mask of route 2 (255.0.0.0) is applied to the IP address being routed (192.1.1.2) with the resulting IP address of 192.0.0.0 which matches the second route in the IP routing table, so this route is selected for routing this datagram.
See Table 4-6 for the valid input values for the submask
and dest
parameter combinations.
Table 4-6 Valid Subnet Mask
Parameter Values
Network Class | IP Network Address Range | Valid Subnet Mask Values |
---|---|---|
A |
1.0.0.0 to 127.0.0.0 |
255.0.0.0 (the default value for a class A IP address) 255.192.0.0 255.224.0.0 255.240.0.0 255.248.0.0 255.252.0.0 255.254.0.0 255.255.128.1 |
A+B |
128.1.0.0 to 191.255.0.0 |
255.255.0.0 (the default value for a class B IP address) 255.255.192.0 255.255.224.0 255.255.240.0 255.255.248.0 255.255.252.0 255.255.254.0 255.255.255.128 |
A+B+C |
192.0.0.0 to 223.255.255.0 |
255.255.255.0 (the default value for a class C IP address) 255.255.255.192 255.255.255.224 255.255.255.240 255.255.255.248 255.255.255.252 |
If a Class B IP address is specified for the dest
parameter of the ent-ip-rte
command, the subnet address that results from the dest
and submask
parameter values cannot be the same as the subnet address that results from the pvn
and pvnmask
, fcna
and fcnamask
, or fcnb
and fcnbmask
parameter values of the chg-netopts
command. The pvn
and pvnmask
, fcna
and fcnamask
, or fcnb
and fcnbmask
parameter values can be verified by entering the rtrv-netopts
command. Choose dest
and submask
parameter values for the IP route whose resulting subnet address is not be the same as the subnet address resulting from the pvn
and pvnmask
parameter values of the chg-netopts
command.
Figure 4-10 Adding an IP Route
Sheet 1 of 2
Sheet 2 of 2
4.10 Adding an M3UA or SUA Association
This procedure is used to configure M3UA or SUA associations using the ent-assoc
command. The combination of a local host, local SCTP port, remote host and remote SCTP port defines an association. M3UA and SUA associations are assigned to cards running either the SS7IPGW or IPGWI applications (IPGWx cards).
The ent-assoc
command uses these parameters:
:aname
– The name assigned to the association. Valid association names can contain up to 15 alphanumeric characters where the first character is a letter and the remaining characters are alphanumeric characters. The aname
parameter value is not case-sensitive.
:lhost
– Local Hostname. The logical name assigned to the local host device.
:lport
– The SCTP port number for the local host.
:rhost
– Remote Hostname. The logical name assigned to the remote host device.
:rport
– The SCTP port number for the remote host.
:link
– The signaling link on the IP card. The value for the link parameter for M3UA or SUA associations is A.
Note:
Theport
parameter can be used in place of the link
parameter to specify the signaling link on the card.
:adapter
– The adapter layer for this association, either m3ua
or sua
. The adapter
parameter is optional. The default value for the adapter
parameter is m3ua
.
:alhost
– The alternate local host name.
The adapter=m2pa
and m2patset
parameters can be used only when configuring M2PA associations. Perform the Adding an M2PA Association or Adding an IPSG M2PA Association procedures to configure M2PA associations.
Associations contain fields whose values are not assigned using the ent-assoc
command. When an association is added to the database, these fields receive their default values. If a different value is desired, the chg-assoc
command must be used. To change these values perform the Changing the Attributes of a M3UA or SUA Association procedure.
These fields and their default values are shown in Table 4-7.
Table 4-7 M3UA and SUA Association Fields and Default Values
|
|
|
|
|
|
|
|
|
|
bufsize=16
|
rtxthr=0
|
rhostval=relaxed
|
An M3UA or SUA association can contain an alternate remote host. The alternate remote host is provisioned with the rhost
and rhostype=alternate
parameters of the chg-assoc
command. A primary remote host can be provisioned on this procedure by specifying the rhost
parameter with the ent-assoc
command. To provision an alternate remote host for an M3UA or SUA association, perform Changing the Attributes of a M3UA or SUA Association.
The size of the buffers on the E5-ENET card is shown in the following list.
- E5-ENET Card - 3200 KB
The size of the buffers assigned to each association that is assigned to the IP card cannot exceed the maximum buffer size for the IP card. When a new association is added, the default buffer size for the association is assigned to the association. If adding the new association causes the total buffer size for all the associations on the IP card to exceed the maximum buffer size for that IP card, the ent-assoc
command will be rejected. If the you wish to add the association and the maximum buffer size for the IP card will be exceeded, the buffer size of the other associations assigned to the IP card must be decreased by performing the Changing the Buffer Size of a M3UA or SUA Association procedure. The available size of the buffers on the IP card can be verified by entering this command.
rtrv-assoc:lhost=<local host name assigned to the association being changed>
The alhost
parameter can also be used with the rtrv-assoc
command to display the available size of the buffers on the IP card.
The aname
parameter can be used with the rtrv-assoc
command to display the available size of the buffers on the IP card and the size of the buffer assigned to the association.
The value of the lhost
, rhost
, or alhost
parameters is a text string of up to 60 characters, with the first character being a letter. The command line on the terminal can contain up to 150 characters. If the host names are too long to fit on the ent-assoc
command line, perform the chg-assoc
command with the parameters and values necessary to complete the entry of the M3UA or SUA association.
The EAGLE can contain a maximum of 4000 connections (association to application server assignments).
The B Ethernet interface of the IP card can be used on the E5-ENET card.
If the association is to be activated in this procedure, with the chg-assoc
command, the association must contain values for the lhost
, lport
, rhost
, rport
parameters.
The signaling link being assigned to the association must be in service. This state is shown in the rept-stat-slk
output with the entries IS-NR
in the PST
field and Avail
in the SST
field.
Uni-homed endpoints are associations configured with the lhost
parameter only. The lhost
parameter value represents an IP address that corresponds to either the A or B network interface of the IP card. Multi-homed endpoints are associations configured with both the lhost
and alhost
parameters. The lhost
parameter value represents an IP address corresponding to one of the network interfaces (A or B) of the IP card while the alhost
parameter value represents an IP address corresponding to the other network interface of the same IP card.
An alternate remote host can be configured for multi-homed associations using the rhost
and rhosttype
parameters of the chg-assoc
command. The rhost
parameter value with the rhostype=primary
parameter represents an IP address that corresponds to one of the network interfaces at the remote end while the rhost
parameter value with the rhostype=alternate
parameter represents an IP address that corresponds to the other network interface at the remote end.
Canceling the RTRV-ASSOC
Command
Because the rtrv-assoc
command used in this procedure can output information for a long period of time, the rtrv-assoc
command can be canceled and the output to the terminal stopped. There are three ways that the rtrv-assoc
command can be canceled.
- Press the
F9
function key on the keyboard at the terminal where thertrv-assoc
command was entered. - Enter the
canc-cmd
without thetrm
parameter at the terminal where thertrv-assoc
command was entered. - Enter the
canc-cmd:trm=<xx>
, where<xx>
is the terminal where thertrv-assoc
command was entered, from another terminal other that the terminal where thertrv-assoc
command was entered. To enter thecanc-cmd:trm=<xx>
command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with thertrv-secu-trm
command. The user’s permissions can be verified with thertrv-user
orrtrv-secu-user
commands.
For more information about the canc-cmd
command, go to Commands User's Guide.
Figure 4-11 Adding an IPGWx M3UA or SUA Association
Sheet 1 of 4
Sheet 2 of 4
Sheet 3 of 4
Sheet 4 of 4
4.11 Adding a New Association to a New Application Server
This procedure is used create a new application server and assign a new association to the application server using the ent-as
command.
The ent-as
command uses these parameters:
:asname
– The name of the new application server. The name of the application server can contain up to 15 alphanumeric characters, with the first character being an alphabetic character. Application server names are not case sensitive.
:aname
– The name of the association being assigned to the application server.
The maximum number SCTP association to application server assignments that can be hosted by an IPGWx card (referenced by the lhost
parameter of the association) is 50. For example, the IPGWx card currently contains 38 SCTP association to application server assignments. The SCTP association to application server assignments could be one SCTP association assigned to 38 application servers, two SCTP associations assigned to 19 application servers, or any combination of SCTP associations assigned to application servers that add up to 38. The SCTP association to application server assignments can be verified with the rtrv-assoc:lhost=<local host name>
and rtrv-as:aname=<association name>
commands.
Table 4-8 Examples of IPGWx Card Provisioning Limits
Number of Associations hosted by the IPGWx card | Number of Application Servers each Association is Assigned to * | Total Association - Application Server Assignments maintained by the IPGWx card |
---|---|---|
1 |
50 |
50 |
50 |
1 |
50 |
25 |
1 |
50 |
25 |
2 |
50 |
0 |
0 |
50 |
38 |
1 |
38 |
19 |
2 |
38 |
* The EAGLE can contain a maximum of 250 application servers. |
The open
parameter of the association must be set to no
before the association can be assigned to the application server. This can be verified with the rtrv-assoc
command.
M2PA associations (adapter=m2pa
) cannot be assigned to application servers. Only M3UA (adapter=m3ua
) and SUA (adapter=sua
) associations can be assigned to application servers. This can be verified in the ADAPTER
field in the rtrv-assoc
output.
The application server recovery timer (the tr
parameter of the chg-as
command) for the application server is set by default to 10 milliseconds when an application server is added. The traffic mode (the mode
parameter of the chg-as
command) for the application server is set by default to LOADSHARE
when an application server is added. Perform the Changing an Application Server procedure to change these parameter values.
Canceling the RTRV-AS
and RTRV-ASSOC
Commands
Because the rtrv-as
and rtrv-assoc
commands used in this procedure can output information for a long period of time, the rtrv-as
and rtrv-assoc
commands can be canceled and the output to the terminal stopped. There are three ways that the rtrv-as
and rtrv-assoc
commands can be canceled.
- Press the
F9
function key on the keyboard at the terminal where thertrv-as
orrtrv-assoc
commands were entered. - Enter the
canc-cmd
without thetrm
parameter at the terminal where thertrv-as
orrtrv-assoc
commands were entered. - Enter the
canc-cmd:trm=<xx>
, where<xx>
is the terminal where thertrv-as
orrtrv-assoc
commands were entered, from another terminal other that the terminal where thertrv-as
orrtrv-assoc
commands were entered. To enter thecanc-cmd:trm=<xx>
command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with thertrv-secu-trm
command. The user’s permissions can be verified with thertrv-user
orrtrv-secu-user
commands.
For more information about the canc-cmd
command, go to Commands User's Guide.
Figure 4-12 Adding a New Association to a New Application Server
Sheet 1 of 3
Sheet 2 of 3
Sheet 3 of 3
4.12 Adding an Existing Association to a New Application Server
This procedure is used create a new application server
and assign an existing association to the application server using the
ent-as
command.
The
ent-as
command uses these parameters:
:asname
– The name of
the new application server. The name of the application server can contain up
to 15 alphanumeric characters, with the first character being an alphabetic
character. Application server names are not case sensitive.
:aname
– The name of the
association being assigned to the application server.
The maximum number SCTP association to application
server assignments that can be hosted by an IPGWx card (referenced by the
lhost
parameter of the association) is
50. For example, the IPGWx card currently contains 38 SCTP association to
application server assignments. The SCTP association to application server
assignments could be one SCTP association assigned to 38 application servers,
two SCTP associations assigned to 19 application servers, or any combination of
SCTP associations assigned to application servers that add up to 38. The SCTP
association to application server assignments can be verified with the
rtrv-assoc:lhost=<local host
name>
and
rtrv-as:aname=<association name>
commands.
Table 4-9 Examples of IPGWx Card Provisioning Limits
Number of Associations hosted by the IPGWx card | Number of Application Servers each Association is Assigned to * | Total Association - Application Server Assignments maintained by the IPGWx card |
---|---|---|
1 | 50 | 50 |
50 | 1 | 50 |
25 | 1 | 50 |
25 | 2 | 50 |
0 | 0 | 50 |
38 | 1 | 38 |
19 | 2 | 38 |
* The EAGLE can contain a maximum of 250 application servers. |
The
open
parameter of the association must
be set to
no
before the association can be
assigned to the application server. This can be verified with the
rtrv-assoc
command.
M2PA associations (adapter=m2pa
) cannot be assigned to application servers.
Only M3UA (adapter=m3ua
) and SUA (adapter=sua
) associations can be assigned to application
servers. This can be verified in the
ADAPTER
field in the
rtrv-assoc
output.
The application server recovery timer (the
tr
parameter of the
chg-as
command) for the application
server is set by default to 10 milliseconds when an application server is
added. The traffic mode (the
mode
parameter of the
chg-as
command) for the application
server is set by default to
LOADSHARE
when an application server is
added. Perform the
Changing an Application Server
procedure to change these parameter values.
Canceling the
RTRV-AS
and
RTRV-ASSOC
Commands
Because the
rtrv-as
and
rtrv-assoc
commands used in this
procedure can output information for a long period of time, the
rtrv-as
and
rtrv-assoc
commands can be canceled
and the output to the terminal stopped. There are three ways that the
rtrv-as
and
rtrv-assoc
commands can be canceled.
- Press the
F9
function key on the keyboard at the terminal where thertrv-as
orrtrv-assoc
commands were entered. - Enter the
canc-cmd
without thetrm
parameter at the terminal where thertrv-as
orrtrv-assoc
commands were entered. - Enter the
canc-cmd:trm=<xx>
, where<xx>
is the terminal where thertrv-as
orrtrv-assoc
commands were entered, from another terminal other that the terminal where thertrv-as
orrtrv-assoc
commands were entered. To enter thecanc-cmd:trm=<xx>
command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with thertrv-secu-trm
command. The user’s permissions can be verified with thertrv-user
orrtrv-secu-user
commands.
For more information about the
canc-cmd
command, go to
Commands User's Guide.
Figure 4-13 Add an Existing Association to a New Application Server - Sheet 1 of 4
Figure 4-14 Add an Existing Association to a New Application Server - Sheet 2 of 4
Figure 4-15 Add an Existing Association to a New Application Server - Sheet 3 of 4
Figure 4-16 Add an Existing Association to a New Application Server - Sheet 4 of 4
4.13 Adding a New Association to an Existing Application Server
This procedure is used assign a new association to an existing application server using the ent-as
command.
The ent-as
command uses these parameters:
:asname
– The name of the new application server.
:aname
– The name of the association being assigned to the application server.
The maximum number SCTP association to application server assignments that can be hosted by an IPGWx card (referenced by the lhost
parameter of the association) is 50. For example, the IPGWx card currently contains 38 SCTP association to application server assignments. The SCTP association to application server assignments could be one SCTP association assigned to 38 application servers, two SCTP associations assigned to 19 application servers, or any combination of SCTP associations assigned to application servers that add up to 38. The SCTP association to application server assignments can be verified with the rtrv-assoc:lhost=<local host name>
and rtrv-as:aname=<association name>
commands.
Table 4-10 Examples of IPGWx Card Provisioning Limits
Number of Associations hosted by the IPGWx card | Number of Application Servers each Association is Assigned to * | Total Association - Application Server Assignments maintained by the IPGWx card |
---|---|---|
1 |
50 |
50 |
50 |
1 |
50 |
25 |
1 |
50 |
25 |
2 |
50 |
0 |
0 |
50 |
38 |
1 |
38 |
19 |
2 |
38 |
* The EAGLE can contain a maximum of 250 application servers. |
A maximum of 16 associations can be assigned to an application server.
The open
parameter of the association must be set to no
before the association can be assigned to the application server. This can be verified with the rtrv-assoc
command.
M2PA associations (adapter=m2pa
) cannot be assigned to application servers. Only M3UA (adapter=m3ua
) and SUA (adapter=sua
) associations can be assigned to application servers. This can be verified in the ADAPTER
field in the rtrv-assoc
output.
The application running on the card hosting the association that will be assigned to the application server must be the same as the application running on the cards hosting the other associations assigned to the application server.
Canceling the RTRV-AS
and RTRV-ASSOC
Commands
Because the rtrv-as
and rtrv-assoc
commands used in this procedure can output information for a long period of time, the rtrv-as
and rtrv-assoc
commands can be canceled and the output to the terminal stopped. There are three ways that the rtrv-as
and rtrv-assoc
commands can be canceled.
- Press the
F9
function key on the keyboard at the terminal where thertrv-as
orrtrv-assoc
commands were entered. - Enter the
canc-cmd
without thetrm
parameter at the terminal where thertrv-as
orrtrv-assoc
commands were entered. - Enter the
canc-cmd:trm=<xx>
, where<xx>
is the terminal where thertrv-as
orrtrv-assoc
commands were entered, from another terminal other that the terminal where thertrv-as
orrtrv-assoc
commands were entered. To enter thecanc-cmd:trm=<xx>
command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with thertrv-secu-trm
command. The user’s permissions can be verified with thertrv-user
orrtrv-secu-user
commands.
For more information about the canc-cmd
command, go to Commands User's Guide.
Figure 4-17 Adding a New Association to an Existing Application Server
Sheet 1 of 5
Sheet 2 of 5
Sheet 3 of 5
Sheet 4 of 5
Sheet 5 of 5
4.14 Adding an Existing Association to an Existing Application Server
This procedure is used assign an existing association to
an existing application server using the
ent-as
command.
The
ent-as
command uses these parameters:
:asname
– The name of
the application server.
:aname
– The name of the
association being assigned to the application server.
The maximum number SCTP association to application
server assignments that can be hosted by an IPGWx card (referenced by the
lhost
parameter of the association) is
50. For example, the IPGWx card currently contains 38 SCTP association to
application server assignments. The SCTP association to application server
assignments could be one SCTP association assigned to 38 application servers,
two SCTP associations assigned to 19 application servers, or any combination of
SCTP associations assigned to application servers that add up to 38. The SCTP
association to application server assignments can be verified with the
rtrv-assoc:lhost=<local host
name>
and
rtrv-as:aname=<association name>
commands.
Table 4-11 Examples of IPGWx Card Provisioning Limits
Number of Associations hosted by the IPGWx card | Number of Application Servers each Association is Assigned to * | Total Association - Application Server Assignments maintained by the IPGWx card |
---|---|---|
1 | 50 | 50 |
50 | 1 | 50 |
25 | 1 | 50 |
25 | 2 | 50 |
0 | 0 | 50 |
38 | 1 | 38 |
19 | 2 | 38 |
* The EAGLE can contain a maximum of 250 application servers. |
A maximum of 16 associations can be assigned to an application server.
The
open
parameter of the association must
be set to
no
before the association can be
assigned to the application server. This can be verified with the
rtrv-assoc
command.
M2PA associations (adapter=m2pa
) cannot be assigned to application servers.
Only M3UA (adapter=m3ua
) and SUA (adapter=sua
) associations can be assigned to application
servers. This can be verified in the
ADAPTER
field in the
rtrv-assoc
output.
The application running on the card hosting the association that will be assigned to the application server must be the same as the application running on the cards hosting the other associations assigned to the application server.
Canceling the
RTRV-AS
and
RTRV-ASSOC
Commands
Because the
rtrv-as
and
rtrv-assoc
commands used in this
procedure can output information for a long period of time, the
rtrv-as
and
rtrv-assoc
commands can be canceled
and the output to the terminal stopped. There are three ways that the
rtrv-as
and
rtrv-assoc
commands can be canceled.
- Press the
F9
function key on the keyboard at the terminal where thertrv-as
orrtrv-assoc
commands were entered. - Enter the
canc-cmd
without thetrm
parameter at the terminal where thertrv-as
orrtrv-assoc
commands were entered. - Enter the
canc-cmd:trm=<xx>
, where<xx>
is the terminal where thertrv-as
orrtrv-assoc
commands were entered, from another terminal other that the terminal where thertrv-as
orrtrv-assoc
commands were entered. To enter thecanc-cmd:trm=<xx>
command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with thertrv-secu-trm
command. The user’s permissions can be verified with thertrv-user
orrtrv-secu-user
commands.
For more information about the
canc-cmd
command, go to
Commands User's Guide.
Figure 4-18 Add an Existing Application to an Existing Application Server - Sheet 1 of 5
Figure 4-19 Add an Existing Application to an Existing Application Server - Sheet 2 of 5
Figure 4-20 Add an Existing Application to an Existing Application Server - Sheet 3 of 5
Figure 4-21 Add an Existing Application to an Existing Application Server - Sheet 4 of 5
Figure 4-22 Add an Existing Application to an Existing Application Server - Sheet 5 of 5
4.15 Adding a Routing Key Containing an Application Server
This procedure is used to add a routing key containing an application server to the database using the ent-appl-rtkey
command.
A routing key defines a filter that checks the specified values in an incoming SS7 MSU to determine which, if any, association receives the MSU. For more information about static routing keys, see Understanding Routing for SS7IPGW and IPGWI Applications.
The ent-appl-rtkey
command uses these parameters.
:dpc
/dpca
/dpci
/dpcn
/dpcn24
– The destination point code value that is used to filter incoming MSUs. This parameter must not specify a cluster route. The destination point code of the routing key cannot be the APC of an IPGWx linkset or the SAPC assigned to an IPGWx linkset.
:opc
/opca
/opci
/opcn
/opcn24
– The originating point code value that is used to filter incoming MSUs. This parameter must not specify a cluster route. This parameter is valid only when the si
parameter value is set to 4
, 5
, or 13
. This parameter is required if si=4
, 5
, or 13
and type=full
.
Note:
See the “Point Code Formats” section in Database Administration - SS7 User's Guide for a definition of the point code types that are used on the EAGLE and for a definition of the different formats that can be used for ITU national point codes.:si
– The service indicator value that is used to filter incoming MSUs. The range of values for the service indicator parameter (si
) can be a numerical value from 0 to 15, or for selected service indicator values, a text string can be used instead of numbers. Table 4-12 shows the text strings that can be used in place of numbers for the service indicator values.
Table 4-12 Service Indicator Text String Values
Service Indicator Value | Text String |
---|---|
0 |
snm |
1 |
regtest |
2 |
spltst |
3 |
sccp |
4 |
tup |
5 |
isup |
13 |
qbicc |
:ssn
– The subsystem value that is used to filter incoming MSUs. The ssn
parameter is only valid when the si
parameter value is set to 3
or sccp
.
:cics
– The starting circuit identification code that is used to filter incoming MSUs. When specified with cice
, cics
identifies the start of the range of circuit identification codes. The cics
parameter is valid only when the si
parameter value is set to 4
, 5
, or 13
. The cics
is required if si=4
, 5
, or 13
and type=full
.
:cice
– The ending circuit identification code that is used to filter incoming MSUs. When specified with cics
, cice
identifies the end of the range of circuit identification codes. The cice
parameter is valid only when the si
parameter value is set to 4
, 5
, or 13
. The cice
is required if si=4
, 5
, or 13
and type=full
.
:type
– The routing key type – Identifies the type of routing key that is being entered and used to route message signaling units (MSUs). One of three values, full
/partial
/default
, can be specified for the type parameter (see Table 4-13). If type
is not explicitly specified, type
=
full
is assumed.
:asname
– Application server (AS) name.
:rcontext
– The routing context parameter, which has two functions:
- Provides an index of the application server traffic that the sending application server is configured or registered to receive.
- Identifies the SS7 network context for the message. The routing context parameter implicitly defines the SS7 point code format used, the SS7 network indicator value, and the SCCP protocol type/variant/version used.
Application server names are shown in the rtrv-as
output.
Only one application server can be assigned to a routing key. There is a maximum of 2500 routing keys allowed per EAGLE. The application server names in each routing key must be unique.
The number of static routing keys is limited by the srkq
parameter that was specified on the chg-sg-opts
command.
Routing keys are associated only with the ss7ipgw
or ipgwi
application.
Group codes are required for 14-bit ITU-N point codes (DPCN/OPCN) when the Duplicate Point Code feature is enabled.
The starting circuit identification code must be less than or equal to the ending circuit identification code.
The ISUP routing over IP feature must be on in order to enter a routing key with these parameters: dpc
, si
, opc
, cics
, and cice
. The IPISUP
field in the rtrv-feat
command output shows whether or not this feature is on.
The parameter combinations used by the ent-appl-rtkey
command are based on the type of routing key and the service indicator value in the routing key. The parameter combinations are shown in Table 4-13.
Table 4-13 Routing Key Parameter Combinations for Adding a Routing Key Containing an Application Server
Full Routing Key - SI = 3 (SCCP) | Partial Routing Key - SI = 3 (SCCP) | Full Routing Key - SI=4 (TUP), 5 (ISUP), 13 (QBICC) | Partial Routing Key - SI=4 (TUP), 5 (ISUP), 13 (QBICC) | Full Routing Key - Other SI Values | Partial Routing Key - Other SI Values | Default Routing Key |
---|---|---|---|---|---|---|
dpc (See Notes 1, 2, and 11) |
type=partial |
dpc (See Notes 1 and 2) |
type=partial |
dpc (See Notes 1 and 2) |
type=partial |
type=default |
si=3 (See Notes 4 and 11) |
dpc (See Notes 1, 2, and 3) |
si=4, 5, 13 (See Note 4) |
dpc (See Notes 1, 2, and 3) |
si=value other than 3, 4, 5, 13 (See Note 4) |
dpc (See Notes 1, 2, and 3) |
asname (See Note 10) |
ssn (See Note 11) |
si=3 (See Notes 3 and 4) |
opc (See Notes 1 and 2) |
si=4, 5, 13 (See Notes 3, 4, and 10) |
type=full |
si=value other than 3, 4, 5, 13 (See Notes 3, 4, and 10) |
rcontext (See Note 10) |
type=full |
asname (See Note 10) |
cics (See Notes 5, 6, 7, 8, and 9) |
opc (See Notes 1, 2, and 3) |
asname (See Note 10) |
asname (See Note 10) |
|
asname (See Note 10) |
rcontext (See Note 10) |
cice (See Notes 5, 6, 7, 8, and 9) |
asname (See Note 10) |
rcontext (See Note 10) |
rcontext (See Note 10) |
|
rcontext (See Note 10) |
type=full |
rcontext (See Note 10) |
||||
asname (See Note 10) |
||||||
rcontext (See Note 10) |
||||||
Notes: 1. The
2. If the
ITU National Duplicate
Point Code feature is on, the
values for the
3. These parameters are optional for partial routing keys, but
at least one these parameters must be specified with the
4. Text strings can be used in place of some numerical service indicator values. See Table 4-12 for a list of these text strings. 5. When the service indicator parameter value equals
6. If the service indicator parameter ( 7. If the service indicator parameter ( 8. If the service indicator parameter value is
9. The
CIC range, defined by the
10. The following rules apply to using the
11. To communicate the status changes of remote IP subsystems (defined by the DPC and SSN specified in a full SCCP routing key), the DPC and SSN specified for a full SCCP routing key must be provisioned in the mated application table. Perform one of the mated application procedures in Database Administration - GTT User's Guide to provision a mated application with the DPC and SSN specified for a full SCCP routing key. |
Canceling the RTRV-AS
and RTRV-APPL-RTKEY
Commands
Because the rtrv-as
and rtrv-appl-rtkey
commands used in this procedure can output information for a long period of time, the rtrv-as
and rtrv-appl-rtkey
commands can be canceled and the output to the terminal stopped. There are three ways that the rtrv-as
and rtrv-appl-rtkey
commands can be canceled.
- Press the
F9
function key on the keyboard at the terminal where thertrv-as
orrtrv-appl-rtkey
commands were entered. - Enter the
canc-cmd
without thetrm
parameter at the terminal where thertrv-as
orrtrv-appl-rtkey
commands were entered. - Enter the
canc-cmd:trm=<xx>
, where<xx>
is the terminal where thertrv-as
andrtrv-appl-rtkey
commands were entered, from another terminal other that the terminal where thertrv-as
orrtrv-appl-rtkey
commands were entered. To enter thecanc-cmd:trm=<xx>
command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with thertrv-secu-trm
command. The user’s permissions can be verified with thertrv-user
orrtrv-secu-user
commands.
For more information about the canc-cmd
command, go to Commands User's Guide.
Figure 4-23 Adding a Routing Key Containing an Application Server
Sheet 1 of 5
Sheet 2 of 5
Sheet 3 of 5
Sheet 4 of 5
Sheet 5 of 5
4.16 Adding a Network Appearance
The network appearance field identifies the SS7 network context for the message, for the purpose of logically separating the signaling traffic between the SGP (signaling gateway process) and the ASP (application server process) over a common SCTP (stream control transmission protocol) association. This field is contained in the DATA, DUNA, DAVA, DRST, DAUD, SCON, and DUPU messages.
The network appearance is provisioned in the database using the ent-na
command with these parameters.
:na
– the 32-bit value of the network appearance, from 0 to 4294967295.
:type
– the network type of the network appearance, ansi
(ANSI), itui
(ITU-I), itun
(14-bit ITU-N), itun24
(24-bit ITU-N), ituis
(ITU-I Spare), ituns
(14-bit ITU-N Spare).
:gc
– the specific ITU-N group code associated with the network appearance.
The gc
parameter can be specified only with the type=itun
or type=ituns
parameters.
The gc
parameter must be specified with the type=itun
or type=ituns
parameters if the ITU Duplicate Point Code feature is on. If the ITU Duplicate Point Code feature is off, the gc
parameter cannot be specified.
The gc
parameter value must be shown in the rtrv-spc
or rtrv-sid
outputs.
The ituis
or ituns
parameters can be specified only if the ITU National and International Spare Point Code Support feature is enabled.
Figure 4-24 Adding a Network Appearance
Sheet 1 of 3
Sheet 2 of 3
Sheet 3 of 3
4.17 Activating the Large MSU Support for IP Signaling Feature
This procedure is used to enable and turn on the Large MSU Support for IP Signaling feature using the feature’s part number and a feature access key.
The feature access key for the Large MSU Support for IP Signaling feature is based on the feature’s part number and the serial number of the EAGLE, making the feature access key site-specific.
The enable-ctrl-feat
command enables the controlled feature by inputting the controlled feature’s access key and the controlled feature’s part number with these parameters:
Note:
As of Release 46.3, the fak parameter is no longer required. This parameter is only used for backward compatibility.:fak
– The feature access key provided by Oracle. The feature access key contains 13 alphanumeric characters and is not case sensitive.
:partnum
– The Oracle-issued part number of the Large MSU Support for IP Signaling feature, 893018401.
The enable-ctrl-feat
command requires that the database contain a valid serial number for the EAGLE, and that this serial number is locked. This can be verified with the rtrv-serial-num
command. The EAGLE is shipped with a serial number in the database, but the serial number is not locked. The serial number can be changed, if necessary, and locked once the EAGLE is on-site, by using the ent-serial-num
command. The ent-serial-num
command uses these parameters.
:serial
– The serial number assigned to the EAGLE. The serial number is not case sensitive.
:lock
– Specifies whether or not the serial number is locked. This parameter has only one value, yes
, which locks the serial number. Once the serial number is locked, it cannot be changed.
Note:
To enter and lock the EAGLE’s serial number, theent-serial-num
command must be entered twice, once to add the correct serial number to the database with the serial
parameter, then again with the serial
and the lock=yes
parameters to lock the serial number. You should verify that the serial number in the database is correct before locking the serial number. The serial number can be found on a label affixed to the control shelf (shelf 1100).
This feature cannot be temporarily enabled (with the temporary feature access key).
Once this feature has been enabled, the feature must be turned on with the chg-ctrl-feat
command. The chg-ctrl-feat
command uses these parameters:
:partnum
– The Oracle-issued part number of the Large MSU Support for IP Signaling feature, 893018401.
:status=on
– used to turn the Large MSU Support for IP Signaling feature on.
Once the Large MSU Support for IP Signaling feature has been turned on, it be can be turned off. For more information about turning the Large MSU Support for IP Signaling feature off, go to the Turning Off the Large MSU Support for IP Signaling Feature procedure.
The status of the features in the EAGLE is shown with the rtrv-ctrl-feat
command.
The Large MSU Support for IP Signaling feature allows the EAGLE to process messages with a service indicator value of 6 to 15 and with a service information field (SIF) that is larger than 272 bytes. The large messages are processed only on E5-ENET cards. There are certain software components that if enabled or provisioned, that will not process large messages even if the Large MSU Support for IP Signaling feature is enabled and turned on. UIMs are displayed when most of these circumstances occur. These UIMs are:
- UIM 1333 – Displayed when a large message is received on an M3UA association and the Large MSU Support for IP Signaling feature is not enabled or is enabled and turned off. The large message is discarded.
- UIM 1350 – Displayed when a M2PA IP connection receives message with an SIF greater than 272 bytes and the Large MSU Support for IP Signaling feature is not enabled or is enabled and turned off. The large message is discarded.
- UIM 1352 – Displayed when a message with an SIF greater than 272 bytes is received; the Large MSU Support for IP Signaling feature is enabled and turned on; there are routes available for the destination point code; but the selected outbound card does not support large messages.
- UIM 1353 – Displayed when a large message passes a gateway screening screenset that redirects messages for the Database Transport Access (DTA) feature. Large messages are not redirected for the DTA feature.
For more information on these UIMs, refer to the Unsolicited Alarm and Information Messages Reference.
Note:
Large messages are not monitored by the EAGLE 5 Integrated Monitoring Support feature and are not sent to the IMF. A UIM is not generated.Figure 4-25 Activating the Large MSU Support for IP Signaling Feature
Sheet 1 of 4
Sheet 2 of 4
Sheet 3 of 4
Sheet 4 of 4
4.18 Removing IETF M3UA and SUA Components
This section describes how to remove the following components from the database.
- An IPGWx Card – Perform the Removing an IPGWx Card procedure
- A mate IPGWx linkset from another IPGWx linkset – Perform the Removing a Mate IPGWx Linkset from another IPGWx Linkset procedure
- An IPGWx Signaling Link – Perform the Removing an IPGWx Signaling Link procedure
- An IP Host – Perform the Removing an IP Host Assigned to an IPGWx Card procedure
- An IP Route – Perform the Removing an IP Route procedure
- An M3UA or SUA Association – Perform the Removing a M3UA or SUA Association procedure
- An Association from an Application Server – Perform the Removing an Association from an Application Server procedure
- A Routing Key – Perform the Removing a Routing Key Containing an Application Server procedure
- A Network Appearance – Perform the Removing a Network Appearance procedure
4.19 Removing an IPGWx Card
Use this procedure to remove an IP card, a card running one of these applications: ss7ipgw
or ipgwi
, from the database using the dlt-card
command.
The card cannot be removed if it does not exist in the database. Prior to removing the card from the database, the signaling links assigned to the card must be removed.
Caution:
If the IPGWx card is the last IP card in service, removing this card from the database will cause traffic to be lost.Figure 4-26 Removing an IPGWx Card
4.20 Removing an IPGWx Signaling Link
This procedure is used to remove an IPGWx signaling link from the database using the dlt-slk
command. The dlt-slk
command uses these parameters.
:loc
– The card location of the IP card that the IP signaling link is assigned to.
:link
– The signaling link on the card specified in the loc
parameter.
:force
– This parameter must be used to remove the last link in a linkset without having to remove all of the routes that referenced the linkset.
The tfatcabmlq
parameter (TFA/TCA Broadcast Minimum Link Quantity), assigned to linksets, shows the minimum number of links in the given linkset (or in the combined link set in which it resides) that must be available for traffic. When the number of signaling links in the specified linkset is equal to or greater than the value of the tfatcabmlq
parameter, the status of the routes that use the specified linkset is set to allowed and can carry traffic. Otherwise, these routes are restricted. The value of the tfatcabmlq
parameter cannot exceed the total number of signaling links contained in the linkset.
If the linkset type of the linkset that contains the signaling link that is being removed is either A, B, D, E, or PRX, the signaling link can be removed regardless of the tfatcabmlq
parameter value of the linkset and regardless of the LSRESTRICT
option value. When a signaling link in one of these types of linksets is removed, the tfatcabmlq
parameter value of the linkset is decreased automatically.
- If the
LSRESTRICT
option is off. TheLSRESTRICT
option value is shown in thertrv-ss7opts
output. - If the
LSRESTRICT
option is on and the number of signaling links assigned to the linkset will be equal to or greater than the value of thetfatcabmlq
parameter value of the linkset after the signaling link is removed.The
tfatcabmlq
parameter value of the linkset is shown in theTFATCABMLQ
column of thertrv-ls:lsn=<linkset name>
output. Thetfatcabmlq
parameter value can be a fixed value (1 to 16) or 0. If thetfatcabmlq
parameter value of the linkset is a fixed value, the number of signaling links that are in the linkset after the signaling link is removed must be equal to or greater than thetfatcabmlq
parameter value of the linkset.If the
tfatcabmlq
parameter value is 0, the signaling link can be removed. When thetfatcabmlq
parameter value is 0, the value displayed in theTFATCABMLQ
column of thertrv-ls
output is 1/2 of the number of signaling links contained in the linkset. If the number of signaling links in the linkset is an odd number, thetfatcabmlq
parameter value is rounded up to the next whole number. As the signaling links are removed, thetfatcabmlq
parameter value of the linkset is decreased automatically.
Canceling the RTRV-SLK
Command
Because the rtrv-slk
command used in this procedure can output information for a long period of time, the rtrv-slk
command can be canceled and the output to the terminal stopped. There are three ways that the rtrv-slk
command can be canceled.
- Press the
F9
function key on the keyboard at the terminal where thertrv-slk
command was entered. - Enter the
canc-cmd
without thetrm
parameter at the terminal where thertrv-slk
command was entered. - Enter the
canc-cmd:trm=<xx>
, where<xx>
is the terminal where thertrv-slk
command was entered, from another terminal other that the terminal where thertrv-slk
command was entered. To enter thecanc-cmd:trm=<xx>
command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with thertrv-secu-trm
command. The user’s permissions can be verified with thertrv-user
orrtrv-secu-user
commands.
For more information about the canc-cmd
command, go to Commands User's Guide.
Figure 4-27 Removing an IPGWx Signaling Link
Sheet 1 of 2
Sheet 2 of 2
4.21 Removing a Mate IPGWx Linkset from another IPGWx Linkset
This procedure is used to remove a mate IPGWx linkset from an existing IPGWx linkset chg-ls
command with these parameters.
:lsn – The name of the IPGWx linkset that contains the mate IPGWx Linkset that is being removed, shown in the rept-stat-iptps
or rtrv-ls
command outputs.
:matelsn
– The name of the mate IPGWx linkset that is being removed.
:action=delete
– removes the mate IPGWx linkset from the IPGWx linkset specified by the lsn
parameter.
An IPGWx linkset is a linkset that contains signaling links assigned to IPGWx cards. IPGWx cards are cards running either the SS7IPGW or IPGWI applications.
The mate linkset name is displayed in the rtrv-ls:lsn=<linkset name>
command output.
Before a mate IPGWx linkset can be removed from an IPGWx linkset, the card containing the IPGWx signaling link assigned to the mate linkset, and the signaling link assigned to that card must be placed out of service.
Other Optional Parameters
- These procedures in this manual:
- These procedures in the Database Administration - SS7 User's Guide
- Adding an SS7 Linkset
- Changing an SS7 Linkset
- Configuring an ITU Linkset with a Secondary Adjacent Point Code (SAPC)
- The "Configuring a Linkset for the GSM MAP Screening Feature" procedure in Database Administration - Features User's Guide.
Figure 4-28 Removing a Mate IPGWx Linkset from another IPGWx Linkset
Sheet 1 of 4
Sheet 2 of 4
Sheet 3 of 4
Sheet 4 of 4
4.22 Removing an IP Host Assigned to an IPGWx Card
This procedure removes an IP host that is assigned to an IPGWx card using the dlt-ip-host
command.
The dlt-ip-host
command uses the following parameter.
:host
– Hostname. The hostname to be removed. This parameter identifies the logical name assigned to a device with an IP address.
No associations can reference the host name being removed in this procedure.
The associations referencing the host name can be removed by performing the Removing a M3UA or SUA Association procedure or the host name in these associations can be changed by performing theChanging the Host Values of a M3UA or SUA Association procedure. The host name assigned to associations is displayed in the rtrv-assoc
outputs.
Figure 4-29 Removing an IP Host Assigned to an IPGWx Card
4.23 Removing an IP Route
This procedure is used to remove an IP route from the database using the dlt-ip-rte
command.
The dlt-ip-rte
command uses these parameters.
:loc
– The location of the IP card containing the IP route being removed.
:dest
– The IP address of the remote host or network assigned to the IP route being removed.
:force
– To remove the IP route, the IP card that the route is assigned to must be out of service, or the force=yes
parameter must be specified with the dlt-ip-rte
command. The force=yes
parameter allows the IP route to be removed if the IP card is in service.
Caution:
Removing an IP route while the IP card is still in service can result in losing the ability to route outbound IP traffic on the IP card. This can cause both TCP and SCTP sessions on the IP card to be lost.Figure 4-30 Removing an IP Route
4.24 Removing a M3UA or SUA Association
This procedure is used to remove a SUA association from the database or to remove a M3UA association that is assigned to a card running either the SS7IPGW or IPGWI applications. Perform the Removing an IPSG Association procedure to remove a M3UA association that is assigned to a card running the IPSG application.
The dlt-assoc
command uses one parameter, aname
, the name of the association being removed from the database. The association being removed must be in the database.
The open
parameter must be set to no
before the association can be removed. Use the chg-assoc
command to change the value of the open
parameter.
The association being removed from the database cannot be assigned to an application server. This can be verified with the rtrv-as
command. If the association is assigned to any application servers, go to the Removing an Association from an Application Server procedure and remove the association from the application servers.
Canceling the RTRV-ASSOC
and RTRV-AS
Commands
Because the rtrv-assoc
and rtrv-as
commands used in this procedure can output information for a long period of time, the rtrv-assoc
and rtrv-as
commands can be canceled and the output to the terminal stopped. There are three ways that the rtrv-assoc
and rtrv-as
commands can be canceled.
- Press the
F9
function key on the keyboard at the terminal where thertrv-assoc
orrtrv-as
commands were entered. - Enter the
canc-cmd
without thetrm
parameter at the terminal where thertrv-assoc
orrtrv-as
commands were entered. - Enter the
canc-cmd:trm=<xx>
, where<xx>
is the terminal where thertrv-assoc
orrtrv-as
commands were entered, from another terminal other that the terminal where thertrv-assoc
orrtrv-as
commands were entered. To enter thecanc-cmd:trm=<xx>
command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with thertrv-secu-trm
command. The user’s permissions can be verified with thertrv-user
orrtrv-secu-user
commands.
For more information about the canc-cmd
command, go to Commands User's Guide.
Figure 4-31 Removing a M3UA or SUA Association
4.25 Removing an Association from an Application Server
This procedure is used remove an association from an application server using the dlt-as
command.
The dlt-as
command uses these parameters:
:asname
– The application server name containing the association being removed in this procedure.
:aname
– The name of the association being removed from the application server.
The association name and application server name combination must be in the database.
The open
parameter value in the association assigned to the application server specified in the dlt-as
command must be no
. This can be verified with the rtrv-assoc
command. Use the chg-assoc
command to change the value of the open
parameter.
If the association is the only association assigned to the application server, the application server is removed from the database. The application server cannot be removed from the database if it is assigned to a routing key. This can be verified with the rtrv-appl-rtkey
command.
Canceling the RTRV-AS
, RTRV-ASSOC
, and RTRV-APPL-RTKEY
Commands
Because the rtrv-as
, rtrv-assoc
, and rtrv-appl-rtkey
commands used in this procedure can output information for a long period of time, the rtrv-as
, rtrv-assoc
, and rtrv-appl-rtkey
commands can be canceled and the output to the terminal stopped. There are three ways that the rtrv-as
, rtrv-assoc
, and rtrv-appl-rtkey
commands can be canceled.
- Press the
F9
function key on the keyboard at the terminal where thertrv-as
,rtrv-assoc
, orrtrv-appl-rtkey
commands were entered. - Enter the
canc-cmd
without thetrm
parameter at the terminal where thertrv-as
,rtrv-assoc
, orrtrv-appl-rtkey
commands were entered. - Enter the
canc-cmd:trm=<xx>
, where<xx>
is the terminal where thertrv-as
,rtrv-assoc
, orrtrv-appl-rtkey
commands were entered, from another terminal other that the terminal where thertrv-as
,rtrv-assoc
, orrtrv-appl-rtkey
commands were entered. To enter thecanc-cmd:trm=<xx>
command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with thertrv-secu-trm
command. The user’s permissions can be verified with thertrv-user
orrtrv-secu-user
commands.
For more information about the canc-cmd
command, go to Commands Manual User's Guide.
Figure 4-32 Removing an Association from an Application Server
Sheet 1 of 2
Sheet 2 of 2
4.26 Removing a Routing Key Containing an Application Server
This procedure is used remove a static key from the database using the dlt-appl-rtkey
command. For more information about static and dynamic routing keys, see Understanding Routing for SS7IPGW and IPGWI Applications.
The dlt-appl-rtkey
command uses these parameters.
:dpc
/dpca
/dpci
/dpcn
/dpca24
– The destination point code value that is used to filter incoming MSUs.
:opc
/opca
/opci
/opcn
/opcn24
- The originating point code value that is used to filter incoming MSUs. This parameter must not specify a cluster route. This parameter must not specify a cluster route. This parameter is only valid when the si
parameter value is set to 4
, 5
, or 13
. This parameter is required if si=4
, 5
, or 13
and type=full
.
Note:
See the “Point Code Formats” section in Database Administration - SS7 User's Guide for a definition of the point code types that are used on the EAGLE and for a definition of the different formats that can be used for ITU national point codes.:si
– The service indicator value that is used to filter incoming MSUs. The range of values for the service indicator parameter (si
) can be a numerical value from 0 to 15, or for selected service indicator values, a text string can be used instead of numbers. Table 4-14 shows the text strings that can be used in place of numbers for the service indicator values.
Table 4-14 Service Indicator Text String Values
Service Indicator Value | Text String | Service Indicator Value | Text String |
---|---|---|---|
0 | snm | 4 | tup |
1 | regtest | 5 | isup |
2 | spltst | 13 | qbicc |
3 | sccp |
:ssn
– The subsystem value that is used to filter incoming MSUs. The ssn
parameter is only valid when the si
parameter value is set to 3
or sccp
.
:cics
- The starting circuit identification code that is used to filter incoming MSUs. Specify with cice
to delete routing keys with the circuit identification code or range of circuit identification codes. The cics
parameter is only valid when the si
parameter value is set to 4
, 5
, or 13
. The cics
is required if si=4
, 5
, or 13
and type=full
.
:cice
- The ending circuit identification code that is used to filter incoming MSUs. Specify with cics
to delete routing keys with the circuit identification code or range of circuit identification codes. The cice
parameter is only valid when the si
parameter value is set to 4
, 5
, or 13
. The cics
is required if si=4
, 5
, or 13
and type=full
.
:type
- Identifies the type of routing key that is being deleted. One of three values, type
=
full
/partial
/default
. If type
is not explicitly specified, type
=
full
is assumed.
:asname -
Application server (AS) name.
:rcontext
– The routing context parameter value assigned to the routing key.
The parameter combinations used by the dlt-appl-rtkey
command are based on the type of routing key and the service indicator value in the routing key. The parameter combinations are shown in Table 4-15 .
Table 4-15 Routing Key Parameter Combinations for Removing Routing Keys
Full Routing Key SI=3 (SCCP) (See Notes 1, 3, and 4) | Partial Routing Key SI=3 (SCCP) (See Notes 1, 3, and 4) | Full Routing Key SI=4 (TUP), 5 (ISUP), 13 (QBICC) (See Notes 1, 3, and 4) | Partial Routing Key SI=4 (TUP), 5 (ISUP), 13 (QBICC) (See Notes 1, 3, and 4) | Full Routing Key Other SI Values (See Notes 1, 3, and 4) | Partial Routing Key Other SI Values (See Notes 1, 3, and 4) | Default Routing Key (See Notes 1, 3, and 4) |
---|---|---|---|---|---|---|
dpc |
type=partial |
dpc |
type=partial |
dpc |
type=partial |
type=default |
si=3 (See Note 1) |
dpc (See Note 2) |
si=4, 5, 13 (See Note 1) |
dpc (See Note 2) |
si=value other than 3, 4, 5, 13 (See Note 1) |
dpc (See Note 2) |
asname |
ssn |
si=3 (See Notes 1 and 2) |
opc |
si=4, 5, 13 (See Notes 1 and 2) |
type=full |
si=value other than 3, 4, 5, 13 (See Notes 1 and 2) |
rcontext (See Notes 3 and 4) |
type=full |
asname |
cics |
opc (See Note 2) |
asname |
asname |
|
asname | rcontext (See Notes 3 and 4) |
cice |
asname |
rcontext (See Notes 3 and 4) | rcontext (See Notes 3 and 4) | |
rcontext (See Notes 3 and 4) |
type=full |
rcontext (See Notes 3 and 4) | ||||
asname |
||||||
rcontext (See Notes 3 and 4) | ||||||
Notes: 1. The values for these parameters must be entered exactly as
shown in the
2. These parameters are optional for partial routing keys, but
at least one these parameters must be specified with the
3. If the routing key contains a numerical value in the
4. If the routing key contains dashes in the
|
Canceling the RTRV-APPL-RTKEY
Command
Because the rtrv-appl-rtkey
command used in this procedure can output information for a long period of time, the rtrv-appl-rtkey
command can be canceled and the output to the terminal stopped. There are three ways that the rtrv-appl-rtkey
command can be canceled.
- Press the
F9
function key on the keyboard at the terminal where thertrv-appl-rtkey
command was entered. - Enter the
canc-cmd
without thetrm
parameter at the terminal where thertrv-appl-rtkey
command was entered. - Enter the
canc-cmd:trm=<xx>
, where<xx>
is the terminal where thertrv-appl-rtkey
commands were entered, from another terminal other that the terminal where thertrv-appl-rtkey
command was entered. To enter thecanc-cmd:trm=<xx>
command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with thertrv-secu-trm
command. The user’s permissions can be verified with thertrv-user
orrtrv-secu-user
commands.
For more information about the canc-cmd
command, go to Commands User's Guide.
Figure 4-33 Removing a Routing Key Containing an Application Server
Sheet 1 of 2
Sheet 2 of 2
4.27 Removing a Network Appearance
This procedure removes the network appearance from the database using the dlt-na
command with these parameters.
:na
– the 32-bit value of the network appearance, from 0 to 4294967295.
:type
– the network type of the network appearance, ansi
(ANSI), itui
(ITU-I), itun
(14-bit ITU-N), itun24
(24-bit ITU-N), ituis
(ITU-I Spare), ituns
(14-bit ITU-N Spare).
:gc
– the specific ITU-N group code associated with the network appearance.
Specifying the gc
parameter removes the specific network appearance containing the na
and gc
parameter values.
Specifying the type=itun
or type=ituns
parameter without the gc
parameter removes all 14-bit ITU-N or 14-bit ITU-N spare network appearances containing the specified na
parameter value.
Figure 4-34 Removing a Network Appearance
4.28 Changing IETF M3UA and SUA Components
This section describes how to change the attributes of the following components in the database.
- IP Options – Perform the Changing IP Options procedure.
- An M3UA or SUA Association – Perform these procedures.
- The SCTP Retransmission Parameters – Perform the Changing the SCTP Checksum Algorithm Option for M3UA and SUA Associations procedure.
- An Application Server – Perform the Changing an Application Server procedure.
- CIC Values in a Routing Key – Perform the Changing the CIC Values in an Existing Routing Key Containing an Application Server procedure.
- Routing Context Values in a Routing Key – Perform the Changing the Routing Context Value in an Existing Routing Key procedure.
- The SCTP Checksum Algorithm – Perform the Changing the SCTP Checksum Algorithm Option for M3UA and SUA Associations procedure.
- A UA Parameter Set – Perform the Changing a UA Parameter Set procedure.
- Turn off the Large MSU Support for IP Signaling feature – Perform the Turning Off the Large MSU Support for IP Signaling Featureprocedure.
4.29 Changing IP Options
Use this procedure to change the IP options defined by these parameters: getcomm
, setcomm
, snmpcont
, srkq
, trapcomm
, ipgwabate
, and uameasusedftas
.
chg-sg-opts
command also contains the sctpcsum
parameter. Perform the one of these procedures to change the sctpcsum
parameter value.
:getcomm
– The community name used to validate SNMP Get and GetNext requests. This value applies to each IP card SNMP agent.
:setcomm
– The community name used to validate SNMP Set requests. This value applies to each IP card SNMP agent.
:snmpcont
– The system contact information for each IP card SNMP agent, used to define the sysContact object in the SNMP MIB II System Group.
:srkq
– The static routing key quantity used to specify the maximum number of static routing key entries in the Routing Key table of each ss7ipgw
and ipgwi
card.
:trapcomm
– The community name used when sending SNMP traps. This value applies to each IP card SNMP agent.
:ipgwabate
– enables (ipgwabate=yes
) or disables (ipgwabate=no
) SS7 congestion abatement procedures for IPGWx signaling links (signaling links assigned to cards running the ss7ipgw
or ipgwi
applications). The default value for this parameter is no
.
:uameasusedftas
- specifies whether UA measurements are pegged against the default application server or against the application server shown by the routing context. The values for this parameter are yes
and no
. The system default value for this parameter is yes
.
yes
- UA measurement registers are pegged against the default application server.no
- UA measurements are pegged against the application server shown by the routing context.
The maximum value of the srkq
parameter is 2500.
The value specified for the srkq
parameter cannot be less than the current number of provisioned routing keys. The number of routing keys that are currently provisioned is shown in the rtrv-appl-rtkey
or rtrv-tbl-capacity
command outputs.
The values of the snmpcont
, getcomm
, setcomm
, and trapcomm
parameters are a string of up to 32 characters that is not case sensitive. If the character string contains characters other than alphanumeric characters, the character string must be enclosed in single quotes.
Figure 4-35 Changing IP Options
4.30 Changing the Attributes of a M3UA or SUA Association
This procedure is used to change the values of the attributes of a M3UA or SUA association, assigned to cards that are running the SS7IPGW or IPGWI applications, using the chg-assoc
command and the following parameters.
Table 4-16 Change M3UA and SUA Association Parameters
aname | lport | rhost | rport | open | alw |
rmode | rmin | rmax | rtimes | cwmin | istrms |
ostrms | uaps | rtxthr | rhosttype | rhostval |
If you wish to change the attributes of M3UA associations assigned to cards that are running the IPSG application, perform.
The chg-assoc
command contains other parameters that are not used in this procedure. To change these parameters, perform these procedures.
lhost
andalhost
- Changing the Host Values of a M3UA or SUA Associationbufsize
- Changing the Buffer Size of a M3UA or SUA Association
:aname
– The name assigned to the association, shown in the rtrv-assoc
output.
:lport
– The SCTP port number for the local host.
:rhost
– The host name for the remote host, rhost
can be any string of characters starting with a letter and comprising these characters ['a'..'z', 'A'..'Z', '0'..'9', '-', '.']. Hostnames are not case-sensitive and can contain up to 60 characters. The default value of this optional parameter is empty (null string).
:rport
– The SCTP port number for the remote host.
:adapter
– The adapter layer for this association, either m3ua
or sua
. The adapter
parameter is optional. The default value for the adapter
parameter in this procedure is m3ua
.
:open
– The connection state for this association. Valid values are yes
or no
. When the open=yes
parameter is specified, the connection manager opens the association if the association is operational. When the open=no
parameter is specified, the connection manager will not open the association.
:alw
– The connection state for this association. Valid values are yes
or no
. When the alw=yes
parameter is specified, the connection manager allows the association to carry SS7 traffic. When the alw=no
parameter is specified, the connection manager prohibits the association from carrying SS7 traffic.
:rmode
– The retransmission policy used when packet loss is detected. The values are rfc
or lin
.
rfc
– Standard RFC 2960 algorithm in the retransmission delay doubles after each retransmission. The RFC 2960 standard for congestion control is also used.lin
– Oracle's linear retransmission policy where each retransmission timeout value is the same as the initial transmission timeout and only the slow start algorithm is used for congestion control.
:rmin
– The minimum value of the calculated retransmission timeout in milliseconds, from 10 - 1000.
:rmax
– The maximum value of the calculated retransmission timeout in milliseconds, from 10 - 1000.
:rtimes
– The number of times a data retransmission will occur before closing the association, from 3 - 12.
:cwmin
– The minimum size in bytes of the association's congestion window and the initial size in bytes of the congestion window, from 1500 - 409600. The cwmin
parameter value must be less than or equal to the size of the buffer used by the association, shown by the bufsize
parameter value. If the buffer size for the association needs to be changed, perform Changing the Buffer Size of a M3UA or SUA Association.
The rmode
, rmin
, rmax
, rtimes
, and cwmin
parameters are used to configure the SCTP retransmission controls for an association, in addition to other commands. Perform Configuring SCTP Retransmission Control for a M3UA or SUA Association to configure the SCTP retransmission controls for an association.
:istrms
– The number of inbound streams (1 or 2) advertised by the SCTP layer for the association.
:ostrms
– The number of outbound streams (1 or 2) advertised by the SCTP layer for the association.
:uaps
– The UA parameter set value being assigned to either an M3UA or SUA association.
:rtxthr
– The retransmission threshold for the association. The rtxthr
parameter value indicates the number of retransmissions that can occur on the association that when exceeded will generate UAM 0537, Ethernet Error Threshold Exceeded. The value of this parameter is 0 to 65,535. The value of this parameter is shown in the RTXTHR
field of the rtrv-assoc:aname=<association name>
output. The rtxthr
parameter value can be changed if the open
parameter value is either yes
or no
.
:rhosttype
– The type of remote host assigned to the association, primary
or alternate
. The primary remote host is shown in the RHOST
field of the rtrv-assoc:aname=<association name>
output. The alternate remote host is shown in the ARHOST
field of the rtrv-assoc:aname=<association name>
output.
An alternate remote host can be configured for multi-homed associations using the rhost
and rhosttype
parameters of the chg-assoc
command. The rhost
parameter value with the rhostype=primary
parameter represents an IP address that corresponds to one of the network interfaces at the remote end while the rhost
parameter value with the rhostype=alternate
parameter represents an IP address that corresponds to the other network interface at the remote end.
:rhostval
– The validation mode used for the association when an SCTP INIT/INIT-ACK message is received. The value of this parameter is shown in the RHOSTVAL
field of the rtrv-assoc:aname=<association name>
output. This parameter has two values.
relaxed
- accept the message if the IP address for the primary or alternate remote host matches the IP address, source IP address, or the host name in the message.match
- accept the message if the message contains the primary remote host value and the alternate remote host value (if the alternate remote host is provisioned). If the alternate remote host is not provisioned, then accept the message if the message contains the primary remote host value. Reject the message if it contains any IP address other than that of the primary or alternate remote host.Refer to the
chg-assoc
command description in Commands User's Guide for more information about this parameter.
If the value of the open
parameter is yes
, only the value of the alw
, and rtxthr
parameters can be changed. To change the values of other parameters, the value of the open
parameter must be no
.
To set the open
parameter value to yes
, the association specified by the aname
parameter must contain values for the lhost
, lport
, rhost
, and rport
parameters. The lhost
parameter value must have a signaling link assigned to it.
At least one optional parameter is required.
The command input is limited to 150 characters, including the hostnames.
The adapter
parameter value cannot be changed if the association is assigned to an application server. This can be verified with the rtrv-as
command. If the association is assigned to any application servers, perform Removing an Association from an Application Server to remove the association from the application servers.
The value of the rmin
parameter must be less than or equal to the rmax
parameter value.
If the card’s application is either SS7IPGW or IPGWI, the signaling link being assigned to the association must be in service. This state is shown in the rept-stat-slk
output with the entries IS-NR
in the PST
field and Avail
in the SST
field.
Canceling the RTRV-ASSOC
and RTRV-AS
Commands
Because the rtrv-assoc
and rtrv-as
commands used in this procedure can output information for a long period of time, the rtrv-assoc
and rtrv-as
commands can be canceled and the output to the terminal stopped. There are three ways that the rtrv-assoc
and rtrv-as
commands can be canceled.
- Press the
F9
function key on the keyboard at the terminal where thertrv-assoc
orrtrv-as
commands were entered. - Enter the
canc-cmd
without thetrm
parameter at the terminal where thertrv-assoc
orrtrv-as
commands were entered. - Enter the
canc-cmd:trm=<xx>
, where<xx>
is the terminal where thertrv-assoc
orrtrv-as
commands were entered, from another terminal other that the terminal where thertrv-assoc
orrtrv-as
commands were entered. To enter thecanc-cmd:trm=<xx>
command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with thertrv-secu-trm
command. The user’s permissions can be verified with thertrv-user
orrtrv-secu-user
commands.
For more information about the canc-cmd
command, go to Commands User's Guide.
Figure 4-36 Changing the Attributes of a M3UA or SUA Association
Sheet 1 of 8
Sheet 2 of 8
Sheet 3 of 8
Sheet 4 of 8
Sheet 5 of 8
Sheet 6 of 8
Sheet 7 of 8
Sheet 8 of 8
4.31 Changing the Buffer Size of a M3UA or SUA Association
This procedure is used to change the buffer size of a M3UA or a SUA association, assigned to cards that are running the SS7IPGW or IPGWI applications, using the chg-assoc
command. If you wish to change the attributes of M3UA associations assigned to cards that are running the IPSG application, perform the Changing the Buffer Size of an IPSG Association procedure.
These parameters of the chg-assoc
command are used in this procedure:
:aname
– The name assigned to the association, shown in the rtrv-assoc
output.
:open
– The connection state for this association. Valid values are yes
or no
. When the open=yes
parameter is specified, the connection manager opens the association if the association is operational. When the open=no
parameter is specified, the connection manager will not open the association.
:bufsize
– The size, in kilobytes, of the buffer used by the association. The values for this parameter are 8 kilobytes to 400 kilobytes. The maximum size of the buffers on the IP cards are shown in the following list:
- E5-ENET Card - 3200 KB.
The size of the buffers assigned to each association that is assigned to the IP card cannot exceed the maximum buffer size for that card. If the bufsize
parameter value causes the total buffer size for all the associations on the IP card to exceed the maximum buffer size for that IP card, the chg-assoc
command will be rejected. The available size of the buffers on the IP card can be verified by entering this command.
rtrv-assoc:lhost=<local host name assigned to the association being changed>
The alhost
parameter can also be used with the rtrv-assoc
command to display the available size of the buffers on the IP card.
The aname
parameter can be used with the rtrv-assoc
command to display the available size of the buffers on the IP card and the size of the buffer assigned to the association.
If you wish to increase the buffer size for this association to a value that is greater than available buffer size for the card, the buffer size of the other associations assigned to the card must be decreased.
The chg-assoc
command contains other parameters that are not used this procedure. To change these parameters, perform these procedures.
lhost
andalhost
- Changing the Host Values of a M3UA or SUA Association- Other attributes of the M3UA or SUA Association - Changing the Attributes of a M3UA or SUA Association
Canceling the RTRV-ASSOC
Command
Because the rtrv-assoc
command used in this procedure can output information for a long period of time, the rtrv-assoc
command can be canceled and the output to the terminal stopped. There are three ways that the rtrv-assoc
command can be canceled.
- Press the
F9
function key on the keyboard at the terminal where thertrv-assoc
command was entered. - Enter the
canc-cmd
without thetrm
parameter at the terminal where thertrv-assoc
command was entered. - Enter the
canc-cmd:trm=<xx>
, where<xx>
is the terminal where thertrv-assoc
command was entered, from another terminal other that the terminal where thertrv-assoc
command was entered. To enter thecanc-cmd:trm=<xx>
command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with thertrv-secu-trm
command. The user’s permissions can be verified with thertrv-user
orrtrv-secu-user
commands.
For more information about the canc-cmd
command, go to Commands User's Guide.
Figure 4-37 Changing the Buffer Size of an M3UA or SUA Association
Sheet 1 of 4
Sheet 2 of 4
Sheet 3 of 4
Sheet 4 of 4
4.32 Changing the Host Values of a M3UA or SUA Association
This procedure is used to change the host values of a M3UA or SUA association, assigned to cards that are running the SS7IPGW or IPGWI applications, using the chg-assoc
command. If you wish to change the attributes of M3UA associations assigned to cards that are running the IPSG application, perform the Changing the Host Values of an IPSG Association procedure.
These parameters of the chg-assoc
command are used in this procedure:
:aname
– The name assigned to the association, shown in the rtrv-assoc
output.
:lhost
– The host name for the local host, shown in the rtrv-ip-host
output.
:lport
– The SCTP port number for the local host.
:rhost
– The host name for the remote host, rhost
can be any string of characters starting with a letter and comprising these characters ['a'..'z', 'A'..'Z', '0'..'9', '-', '.']. Hostnames are not case-sensitive and can contain up to 60 characters. The default value of this optional parameter is empty (null string).
:rport
– The SCTP port number for the remote host.
:link
– The signaling link on the IPGWx card. The value for the link
parameter for M3UA or SUA associations is A.
Note:
Theport
parameter can be used in place of the link
parameter to specify the signaling link on the card.
:adapter
– The adapter layer for this association, either m3ua
or sua
. The adapter
parameter is optional. The default value for the adapter
parameter in this procedure is m3ua
.
:alhost
– The alternate local host name, shown in the rtrv-ip-host
output.
:open
– The connection state for this association. Valid values are yes
or no
. When the open=yes
parameter is specified, the connection manager opens the association if the association is operational. When the open=no
parameter is specified, the connection manager will not open the association.
:uaps
– The UA parameter set value being assigned to either an M3UA or SUA association.
At least one optional parameter is required.
The command input is limited to 150 characters, including the hostnames.
The maximum number SCTP association to application server assignments that can be hosted by an IPGWx card (referenced by the lhost
parameter of the association) is 50. For example, the IPGWx card currently contains 38 SCTP association to application server assignments. The SCTP association to application server assignments could be one SCTP association assigned to 38 application servers, two SCTP associations assigned to 19 application servers, or any combination of SCTP associations assigned to application servers that add up to 38. The SCTP association to application server assignments can be verified with the rtrv-assoc:lhost=<local host name>
and rtrv-as:aname=<association name>
commands.
Table 4-17 Examples of IPGWx Card Provisioning Limits
Number of Associations hosted by the IPGWx card | Number of Application Servers each Association is Assigned to * | Total Association - Application Server Assignments maintained by the IPGWx card |
---|---|---|
1 |
50 |
50 |
50 |
1 |
50 |
25 |
1 |
50 |
25 |
2 |
50 |
0 |
0 |
50 |
38 |
1 |
38 |
19 |
2 |
38 |
* The EAGLE can contain a maximum of 250 application servers. |
The EAGLE can contain a maximum of 4000 connections.
The B Ethernet interface of the IP card can be used on the E5-ENET cards.
If the card’s application is either SS7IPGW or IPGWI, the signaling link being assigned to the association must be in service. This state is shown in the rept-stat-slk
output with the entries IS-NR
in the PST
field and Avail
in the SST
field.
Uni-homed endpoints are associations configured with the lhost
parameter only. The lhost
parameter value represents an IP address that corresponds to either the A or B network interface of the IP card. Multi-homed endpoints are associations configured with both the lhost
and alhost
parameters. The lhost
parameter value represents an IP address corresponding to one of the network interfaces (A or B) of the IP card while the alhost
parameter value represents an IP address corresponding to the other network interface of the same IP card.
The alhost=none
parameter removes the alternate local host from the specified association, which also removes the multi-homed endpoint capability.
Canceling the RTRV-ASSOC
and RTRV-AS
Commands
Because the rtrv-assoc
and rtrv-as
commands used in this procedure can output information for a long period of time, the rtrv-assoc
and rtrv-as
commands can be canceled and the output to the terminal stopped. There are three ways that the rtrv-assoc
and rtrv-as
commands can be canceled.
- Press the
F9
function key on the keyboard at the terminal where thertrv-assoc
orrtrv-as
commands were entered. - Enter the
canc-cmd
without thetrm
parameter at the terminal where thertrv-assoc
orrtrv-as
commands were entered. - Enter the
canc-cmd:trm=<xx>
, where<xx>
is the terminal where thertrv-assoc
orrtrv-as
commands were entered, from another terminal other that the terminal where thertrv-assoc
orrtrv-as
commands were entered. To enter thecanc-cmd:trm=<xx>
command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with thertrv-secu-trm
command. The user’s permissions can be verified with thertrv-user
orrtrv-secu-user
commands.
For more information about the canc-cmd
command, go to Commands User's Guide.
Figure 4-38 Changing the Host Values of a M3UA or SUA Association
Sheet 1 of 6
Sheet 2 of 6
Sheet 3 of 6
Sheet 4 of 6
Sheet 5 of 6
Sheet 6 of 6
4.33 Configuring SCTP Retransmission Control for a M3UA or SUA Association
This procedure is used to gather the information required to configure the retransmission parameters for SUA associations and M3UA associations that are assigned to cards running either the SS7IPGW or IPGWI applications. Perform the Configuring an IPSG Association for SCTP Retransmission Control procedure to configure the retransmission parameters for M3UA associations assigned to IPSG cards. If any assistance is needed to configure the retransmission parameters for associations, contact the Customer Care Center. Refer to unresolvable-reference.html#GUID-1825DD07-2A6B-4648-859A-1258A0F9AC40 for the contact information.
The retransmission parameters are configured using the rmode
, rmin
, rmax
, rtimes
, and cwmin
parameters of the chg-assoc
command.
:rmode
– The retransmission mode used when packet loss is detected. The values are rfc
or lin
.
rfc
– Standard RFC 2960 algorithm in the retransmission delay doubles after each retransmission. The RFC 2960 standard for congestion control is also used.lin
– Oracle's linear retransmission mode where each retransmission timeout value is the same as the initial transmission timeout and only the slow start algorithm is used for congestion control.
:rmin
– The minimum value of the calculated retransmission timeout in milliseconds.
:rmax
– The maximum value of the calculated retransmission timeout in milliseconds.
Note:
Thermin
and rmax
parameter values form a range of retransmission values. The value of the rmin
parameter must be less than or equal to the rmax
parameter value.
:rtimes
– The number of times a data retransmission occurs before closing the association.
:cwmin
– The minimum size in bytes of the association's congestion window and the initial size in bytes of the congestion window.
For associations assigned to the ss7ipgw
or ipgwi
applications, the value of the cwmin
parameter must be less than or equal to 16384.
The Changing the Attributes of a M3UA or SUA Association procedure is used to change the values of these parameters. In addition to using the Changing the Attributes of a M3UA or SUA Association procedure, these pass commands are also used in this procedure.
ping
– tests for the presence of hosts on the network.assocrtt
– displays the SCTP round trip times for a specified association. Minimum, maximum, and average times are kept for each open association. The Retransmission Mode (RFC or LIN) and the configured Minimum and Maximum Retransmission Timeout limits are also displayed.sctp
– provides a summary list of all SCTP instances.sctp -a <association name>
– displays the measurements and information for a specific association.Note:
The values for the minimum and maximum retransmission times in the output from this command are shown in microseconds.
For more information on the pass
commands, see Commands User's Guide.
The chg-assoc
command contains other optional parameters that can be used to configure an association. These parameters are not shown here because they are not necessary for configuring the SCTP retransmission parameters. These parameters are explained in more detail in the Changing the Attributes of a M3UA or SUA Association procedure, or in the and chg-assoc
command description in Commands User's Guide.
Canceling the RTRV-ASSOC
Command
Because the rtrv-assoc
command used in this procedure can output information for a long period of time, the rtrv-assoc
command can be canceled and the output to the terminal stopped. There are three ways that the rtrv-assoc
command can be canceled.
- Press the
F9
function key on the keyboard at the terminal where thertrv-assoc
command was entered. - Enter the
canc-cmd
without thetrm
parameter at the terminal where thertrv-assoc
command was entered. - Enter the
canc-cmd:trm=<xx>
, where<xx>
is the terminal where thertrv-assoc
command was entered, from another terminal other that the terminal where thertrv-assoc
command was entered. To enter thecanc-cmd:trm=<xx>
command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with thertrv-secu-trm
command. The user’s permissions can be verified with thertrv-user
orrtrv-secu-user
commands.
For more information about the canc-cmd
command, go to Commands User's Guide.
Figure 4-39 Configuring SCTP Retransmission Control for a M3UA or SUA Association
Sheet 1 of 2
Sheet 2 of 2
4.34 Changing an Application Server
This procedure is used change the characteristics of an existing application server using the chg-as
command.
The chg-as
command uses these parameters:
:asname
– The name of the application server being changed.
:mode
– The traffic mode assigned to the application server, either loadshare
or override
.
:tr
– The application server recovery timer, 10 - 2000 milliseconds.
The mode
parameter value cannot be changed unless the open
parameter value of the all the associations assigned to the application server is set to no
. This can be verified with the rtrv-assoc
command.
The association assignments for an application server cannot be changed with this procedure. To change an association assignment for an application server, go to the Removing an Association from an Application Server procedure and remove the association from the application server, then perform one of these procedures to add another association to the application server:
- Adding a New Association to an Existing Application Server
- Adding an Existing Association to an Existing Application Server.
Canceling the RTRV-AS
and RTRV-ASSOC
Commands
Because the rtrv-as
and rtrv-assoc
commands used in this procedure can output information for a long period of time, the rtrv-as
and rtrv-assoc
commands can be canceled and the output to the terminal stopped. There are three ways that the rtrv-as
and rtrv-assoc
commands can be canceled.
- Press the
F9
function key on the keyboard at the terminal where thertrv-as
orrtrv-assoc
commands were entered. - Enter the
canc-cmd
without thetrm
parameter at the terminal where thertrv-as
orrtrv-assoc
commands were entered. - Enter the
canc-cmd:trm=<xx>
, where<xx>
is the terminal where thertrv-as
orrtrv-assoc
commands were entered, from another terminal other that the terminal where thertrv-as
orrtrv-assoc
commands were entered. To enter thecanc-cmd:trm=<xx>
command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with thertrv-secu-trm
command. The user’s permissions can be verified with thertrv-user
orrtrv-secu-user
commands.
For more information about the canc-cmd
command, go to Commands User's Guide.
Figure 4-40 Changing an Application Server
Sheet 1 of 2
Sheet 2 of 2
4.35 Changing the CIC Values in an Existing Routing Key Containing an Application Server
This procedure is used to change the CIC values in an existing routing key using the chg-appl-rtkey
command. These parameters are used in this procedure.
:dpc
/dpca
/dpci
/dpcn
/dpcn24
– Destination point code value that is used to filter incoming MSUs.
:opc
/opca
/opci
/opcn
/opcn24
- The originating point code value that is used to filter incoming MSUs. This value must not specify a cluster route.
Note:
See the “Point Code Formats” section in the Database Administration - SS7 User's Guide for a definition of the point code types that are used on the EAGLE and for a definition of the different formats that can be used for ITU national point codes.:si
– The service indicator value that is used to filter incoming MSUs. The range of values for the service indicator parameter (si
) can be a numerical value either 4, 5, or 13, or for selected service indicator values, a text string can be used instead of numbers. Table 4-18 shows the text strings that can be used in place of numbers for the service indicator values.
Table 4-18 Service Indicator Text String Values
Service Indicator Value | Text String |
---|---|
4 |
tup |
5 |
isup |
13 |
qbicc |
:cics
- Starting circuit identification code that is used to filter incoming MSUs. Specify with cice
to identify the routing key to be changed.
:cice
- Ending circuit identification code that is used to filter incoming MSUs. Specify with cics
to identify the routing key to be changed.
:ncics
- New starting circuit identification code that is used to filter incoming MSUs. Specify the ncics
parameter and/or the ncice
parameter to change the range of circuit identification codes assigned to the routing key.
:ncice
- New ending circuit identification code that is used to filter incoming MSUs. Specify the ncice
parameter and/or the ncics
parameter to change the range of circuit identification codes assigned to the routing key.
:split
- The circuit identification code value where the specified range of CIC values for the routing key specified by the cics
and cice
values is to be split into two routing keys. The CIC values in one routing key ranges from the cics
value of the original routing key to a value equal to one less than the split
value. The CIC values in the other routing key ranges from the split
value to the cice
value of the original routing key. All other parameters in both routing keys remain the same as in the original routing key. The range of CIC values cannot be split if the routing key contains a routing context parameter value.
:type
- Key type. Identifies the type of routing key that will be changed. One of three values, type
=full
/partial
/default
. If type
is not explicitly specified, type
=full
is assumed. Only the type=full
parameter can be used in this procedure.
:rcontext
– The routing context parameter value assigned to the routing key.
The chg-appl-rtkey
command contains other parameters that are not used in this procedure.
:ssn
– The subsystem number value that is used to filter incoming MSUs. See the Adding a Routing Key Containing an Application Server procedure for more information on using the ssn
parameter with a routing key.
:nrcontext
– The new routing context parameter value.
See the Changing the Routing Context Value in an Existing Routing Key procedure for changing the routing context parameter value in an existing routing key.
Rules for Changing the Range of CIC Values in an Existing Routing Key
The parameter combinations used by the chg-appl-rtkey
command to change the range of CIC values in the routing key are shown in Table 4-19.
Table 4-19 Routing Key Parameter Combinations for Changing the Range of CIC Values in an Existing Routing Key
SI=4 (TUP) | SI=5 (ISUP) | SI=13 (QBICC) | |
---|---|---|---|
dpci/dpcn/dpcn24=<the DPC assigned to the routing key> (See Note 1) |
dpc/dpca=<the DPC assigned to the routing key> (See Note 1) |
dpci/dpcn/dpcn24=<the DPC assigned to the routing key> (See Note 1) |
dpc/dpca/dpci/ dpcn/dpcn24=<the DPC assigned to the routing key> (See Note 1) |
si=4 (See Note 1) |
si=5 (See Note 1) |
si=5 (See Note 1) |
si=13 (See Note 1) |
opci/opcn/opcn24=<the OPC assigned to the routing key> (See Note 1) |
opc/opca=<the OPC assigned to the routing key> (See Note 1) |
opci/opcn/opcn24=<the OPC assigned to the routing key> (See Note 1) |
opc/opca/opci/ opcn/opcn24=<the OPC assigned to the routing key> (See Note 1) |
cics=<the CICS value assigned to the routing key> (See Notes 1 and 2) |
cics=<the CICS value assigned to the routing key>1, 2 |
cics=<the CICS value assigned to the routing key> (See Notes 1 and 2) |
cics=<the CICS value assigned to the routing key> (See Notes 1 and 2) |
cice=<the CICE value assigned to the routing key> (See Notes 1 and 2) |
cice=<the CICE value assigned to the routing key> (See Notes 1 and 2) |
cice=<the CICE value assigned to the routing key> (See Notes 1 and 2) |
cice=<the CICE value assigned to the routing key> (See Notes 1 and 2) |
type=full |
type=full |
type=full |
type=full |
ncics=<0 to 4095> (See Notes 2 and 3) |
ncics=<0 to 16383> (See Notes 2 and 3) |
ncics=<0 to 4095> (See Notes 2 and 3) |
ncics=<0 to 4294967295> (See Notes 2 and 3) |
ncice=<0 to 4095> (See Notes 2 and 3) |
ncice=<0 to 16383> (See Notes 2 and 3) |
ncice=<0 to 4095> (See Notes 2 and 3) |
ncice=<0 to 4294967295> (See Notes 2 and 3) |
rcontext=<the current routing context value assigned to the routing key> (See Notes 4 and 5) |
rcontext=<the current routing context value assigned to the routing key> (See Notes 4 and 5) |
rcontext=<the current routing context value assigned to the routing key> (See Notes 4 and 5) |
rcontext=<the current routing context value assigned to the routing key> (See Notes 4 and 5) |
1. The values for these parameters must be entered exactly as
shown in the
2. The
3. The new CIC range cannot overlap the CIC range in an existing routing key. 4. If the routing key contains a
numerical value in the
5. If the routing key contains dashes
in the
|
Rules for Splitting the Range of CIC Values in an Existing Routing Key
The parameter combinations used by the chg-appl-rtkey
command to split the range of CIC values in the routing key are shown in Table 4-20.
Splitting the range of CIC values creates two routing keys. The CIC values in one routing key ranges from the cics
value of the original routing key to a value equal to one less than the split
value. The CIC values in the other routing key ranges from the split
value to the cice
value of the original routing key. All other parameters in both routing keys remain the same as in the original routing key. The range of CIC values cannot be split if the routing key contains a routing context parameter value.
Table 4-20 Routing Key Parameter Combinations for Splitting the Range of CIC Values in an Existing Routing Key
SI=4 (TUP) | SI=5 (ISUP) | SI=13 (QBICC) | |
---|---|---|---|
dpci/dpcn/dpcn24=<the DPC assigned to the routing key> (See Note 1) |
dpc/dpca=<the DPC assigned to the routing key> (See Note 1) |
dpci/dpcn/dpcn24=<the DPC assigned to the routing key> (See Note 1) |
dpc/dpca/dpci/ dpcn/dpcn24=<the DPC assigned to the routing key> (See Note 1) |
si=4 (See Note 1) |
si=5 (See Note 1) |
si=5 (See Note 1) |
si=13 (See Note 1) |
opci/opcn/opcn24=<the OPC assigned to the routing key> (See Note 1) |
opc/opca=<the OPC assigned to the routing key> (See Note 1) |
opci/opcn/opcn24=<the OPC assigned to the routing key> (See Note 1) |
opc/opca/opci/ opcn/opcn24=<the OPC assigned to the routing key> (See Note 1) |
cics=<the CICS value assigned to the routing key> (See Note 1) |
cics=<the CICS value assigned to the routing key> (See Note 1) |
cics=<the CICS value assigned to the routing key> (See Note 1) |
cics=<the CICS value assigned to the routing key> (See Note 1) |
cice=<the CICE value assigned to the routing key> (See Note 1) |
cice=<the CICE value assigned to the routing key> (See Note 1) |
cice=<the CICE value assigned to the routing key> (See Note 1) |
cice=<the CICE value assigned to the routing key> (See Note 1) |
type=full |
type=full |
type=full |
type=full |
split=<0 to 4095> (See Note 2) |
split=<0 to 16383> (See Note 2) |
split=<0 to 4095> (See Note 2) |
split=<0 to 4294967295> (See Note 2) |
1. The values for these parameters must be entered exactly as
shown in the
2. The
|
Canceling the RTRV-APPL-RTKEY
Command
Because the rtrv-appl-rtkey
command used in this procedure can output information for a long period of time, the rtrv-appl-rtkey
command can be canceled and the output to the terminal stopped. There are three ways that the rtrv-appl-rtkey
command can be canceled.
- Press the
F9
function key on the keyboard at the terminal where thertrv-appl-rtkey
command was entered. - Enter the
canc-cmd
without thetrm
parameter at the terminal where thertrv-appl-rtkey
command was entered. - Enter the
canc-cmd:trm=<xx>
, where<xx>
is the terminal where thertrv-appl-rtkey
command was entered, from another terminal other that the terminal where thertrv-appl-rtkey
command was entered. To enter thecanc-cmd:trm=<xx>
command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with thertrv-secu-trm
command. The user’s permissions can be verified with thertrv-user
orrtrv-secu-user
commands.
For more information about the canc-cmd
command, go to Commands User's Guide.
Figure 4-41 Changing the CIC Values in an Existing Routing Key Containing an Application Server
Sheet 1 of 2
Sheet 2 of 2
4.36 Changing the Routing Context Value in an Existing Routing Key
This procedure is used to change the routing context value in an existing routing key using the chg-appl-rtkey
command.
The routing key being changed in this procedure must contain a number for the routing context value. If the routing context value shown for the routing key contains dashes (-), this routing key cannot be used in this procedure. The dashes shows that the routing key does not have a routing context assigned to it.
To assign a routing context value to an existing M3UA routing key, the routing key must be removed by performing the Removing a Routing Key Containing an Application Server procedure, then re-enter the routing key with the routing context value by performing the Adding a Routing Key Containing an Application Server procedure. A routing context value must always be assigned to an SUA routing key.
These parameters are used in this procedure.
:rcontext
– The current routing context parameter value, which has two functions:
- Provides an index of the application server traffic that the sending ASP is configured or registered to receive.
- Identifies the SS7 network context for the message. The routing context parameter implicitly defines the SS7 point code format used, the SS7 network indicator value, and the SCCP protocol type/variant/version used.
:nrcontext
– The new routing context parameter value, from 0 to 4294967295. The new routing context value cannot be assigned to other routing keys.
The chg-appl-rtkey
command contains other parameters that are not used in this procedure.
:dpc
/dpca
/dpci
/dpcn
/dpcn24
– Destination point code value that is used to filter incoming MSUs.
:opc
/opca
/opci
/opcn
/opcn24
- The originating point code value that is used to filter incoming MSUs. This value must not specify a cluster route.
:si
– The service indicator value that is used to filter incoming MSUs. The range of values for the service indicator parameter (si
) can be a numerical value from 0 to 15, or for selected service indicator values, a text string can be used instead of numbers. Table 4-21 shows the text strings that can be used in place of numbers for the service indicator values.
Table 4-21 Service Indicator Text String Values
Service Indicator Value | Text String | Service Indicator Value | Text String |
---|---|---|---|
0 |
snm |
4 |
tup |
1 |
regtest |
5 |
isup |
2 |
spltst |
13 |
qbicc |
3 |
sccp |
:ssn
– The subsystem number value that is used to filter incoming MSUs.
:cics
- Starting circuit identification code that is used to filter incoming MSUs.
:cice
- Ending circuit identification code that is used to filter incoming MSUs.
:type
- Key type. Identifies the type of routing key that will be changed. One of three values, type
=full
/partial
/default
. If type
is not explicitly specified, type
= full
is assumed.
:ncics
- New starting circuit identification code that is used to filter incoming MSUs.
:ncice
- New ending circuit identification code that is used to filter incoming MSUs.
:split
- The circuit identification code value where the specified range of the routing key specified by the cics
and cice
values is to be split into two entries.
See the Changing the CIC Values in an Existing Routing Key Containing an Application Server procedure for changing a routing key using the ncics
, ncice
, and split
parameters.
Canceling the RTRV-APPL-RTKEY
Command
Because the rtrv-appl-rtkey
command used in this procedure can output information for a long period of time, the rtrv-appl-rtkey
command can be canceled and the output to the terminal stopped. There are three ways that the rtrv-appl-rtkey
command can be canceled.
- Press the
F9
function key on the keyboard at the terminal where thertrv-appl-rtkey
command was entered. - Enter the
canc-cmd
without thetrm
parameter at the terminal where thertrv-appl-rtkey
command was entered. - Enter the
canc-cmd:trm=<xx>
, where<xx>
is the terminal where thertrv-appl-rtkey
command was entered, from another terminal other that the terminal where thertrv-appl-rtkey
command was entered. To enter thecanc-cmd:trm=<xx>
command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with thertrv-secu-trm
command. The user’s permissions can be verified with thertrv-user
orrtrv-secu-user
commands.
For more information about the canc-cmd
command, go to Commands User's Guide.
Figure 4-42 Changing the Routing Context Value in an Existing Routing Key
Sheet 1 of 2
Sheet 2 of 2
4.37 Changing the SCTP Checksum Algorithm Option for M3UA and SUA Associations
sctpcsum
parameter of the chg-sg-opts
command is used to change this option. The Adler-32 and CRC-32c checksum algorithms specified in this procedure applies to all the associations that are assigned to all the IP cards running the SS7IPGW or IPGWI applications. This option is a system-wide option. To apply this option to associations assigned to cards running the IPLIM, IPLIMI, or IPSG applications, perform these procedures.
The sctpcsum
parameter contains another value, percard
, that allows either the Adler-32 or CRC-32c SCTP checksum algorithm to be specified for the all the associations assigned to a specific card. With this option specified, the Adler-32 checksum algorithm can be specified for the associations on one card and the CRC-32c checksum algorithm can be specified for the associations on another card. Setting the sctpcsum
parameter to percard
changes the SCTP checksum algorithm for the associations assigned to a card to the SCTP checksum algorithm value for that card. The checksum algorithm for individual cards is provisioned by performing the Configuring an IP Card procedure.
Once the SCTP checksum option has been changed, the associations on each IP card need to be reset by changing the open
parameter value for each association to no
, then back to yes
. This ensures that the associations on the IP card are using the new SCTP checksum algorithm.
Canceling the RTRV-ASSOC
Command
Because the rtrv-assoc
command used in this procedure can output information for a long period of time, the rtrv-assoc
command can be canceled and the output to the terminal stopped. There are three ways that the rtrv-assoc
command can be canceled.
- Press the
F9
function key on the keyboard at the terminal where thertrv-assoc
command was entered. - Enter the
canc-cmd
without thetrm
parameter at the terminal where thertrv-assoc
command was entered. - Enter the
canc-cmd:trm=<xx>
, where<xx>
is the terminal where thertrv-assoc
command was entered, from another terminal other that the terminal where thertrv-assoc
command was entered. To enter thecanc-cmd:trm=<xx>
command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with thertrv-secu-trm
command. The user’s permissions can be verified with thertrv-user
orrtrv-secu-user
commands.
For more information about the canc-cmd
command, go to Commands User's Guide.
Figure 4-43 Changing the SCTP Checksum Algorithm Option for M3UA and SUA Associations
Sheet 1 of 4
Sheet 2 of 4
Sheet 3 of 4
Sheet 4 of 4
4.38 Changing a UA Parameter Set
Use this procedure to change the values in a UA (user adapter) parameter set using the chg-uaps
command. The chg-uaps
command uses these parameters.
:set
– the UA parameter set being changed, from 1 - 9
:scrset
– the source UA parameter set used to copy the values from one UA parameter set to another, from 1 to 10.
:timer
– the timer being changed, from 1 to 10. Currently, there are only three timers defined:
- Timer 2 – The False IP Connection Congestion Timer – the maximum amount of time (in milliseconds) that an association is allowed to remain congested before failing due to false connection congestion.
- Timer 3 – The UA Heartbeat Period Timer – The frequency, in milliseconds, that heartbeat messages are transmitted.
- Timer 4 – The UA Heartbeat Received Timer – The amount of time, in milliseconds, that the EAGLE waits for a response to the heartbeat message that was transmitted. If a response to the heartbeat message is not received in the amount of time defined by Timer 4, the association is torn down
:tvalue
– The value of the timer specified by the timer
parameter.
- The value of timer 2 is from 10 to 30,000 milliseconds. The system default value is 3,000 milliseconds.
- The value of timer 3 is from 100 to 60,000 milliseconds. The system default value is 10,000 milliseconds.
- The value of timer 4 is from 100 to 10,000 milliseconds. The system default value is 5,000 milliseconds.
:parm
– the UA parameters, from 1 to 10. Currently, only four UA parameters are defined.
- 1 – Controlling ASPSNM Behavior
- 2 – Controlling ASP/Application Server State Notification Behavior
- 3 – UA Serviceability Options
- 4 – SCTP Payload Protocol Indicator Option
:pvalue
– the value of the UA parameters, which is dependent on the parm
parameter value. The value of the pvalue
parameter is a bit-mapped value, requiring a 0 in the specific bit position to disable the item, or a 1 in the specific bit position to enabled the item. The value of the pvalue
parameter is a 32-bit number. Any bits not specified in the following lists are not used.
- If the
parm
value is 1, the bits used by thepvalue
parameter are:- 1 – Response Method – controls the sending of an SNM TFC/UPU as a reply to a message received on an association for an unavailable destination. The SNM TFC/UPU is replicated to all associations that have this capability and meet the Response SNM Criteria. The default is to allow the response to be sent.
- 1 – Response Method – controls the sending of an SNM TFC/UPU as a reply to a message received on an association for an unavailable destination. The SNM TFC/UPU is replicated to all associations that have this capability and meet the Response SNM Criteria. The default is to allow the response to be sent.
- 6 – Broadcast Congestion Status Change – controls the sending of unsolicited congestion status changes by an ASP. Unsolicited congestion status messages (TFCs generated when a destination's congestion status changes) are replicated to all ASPs who have this capability and meet the Multicast SNM Criteria. The default is to generate no unsolicited congestion status changes.
Table 4-22 shows the values can be entered for the
pvalue
parameter if theparm
value is 1. Thepvalue
parameter value can be entered as a hexadecimal or a decimal number.Table 4-22 Valid PVALUE Parameter Values if PARM=1
Bits Enabled Bits Disabled Hexadecimal Value Decimal Value None
Bit 0 - Broadcast
Bit 1 - Response Method
Bit 6 - Broadcast Congestion Status Change
h’0
0
Bit 0 - Broadcast
Bit 1 - Response Method
Bit 6 - Broadcast Congestion Status Change
h’1
1
Bit 1 - Response Method
Bit 0 - Broadcast
Bit 6 - Broadcast Congestion Status Change
h’2
2
Bit 0 - Broadcast
Bit 1 - Response Method
Bit 6 - Broadcast Congestion Status Change
h’3*
3*
Bit 6 - Broadcast Congestion Status Change
Bit 0 - Broadcast
Bit 1 - Response Method
h’40
64
Bit 6 - Broadcast Congestion Status Change
Bit 0 - Broadcast
Bit 1 - Response Method
h’41
65
Bit 6 - Broadcast Congestion Status Change
Bit 1 - Response Method
Bit 0 - Broadcast
h’42
66
Bit 0 - Broadcast
Bit 1 - Response Method
Bit 6 - Broadcast Congestion Status Change
None
h’43
67
* The system default value
- If the
parm
value is 2, the bits used by thepvalue
parameter are:- 0 – ASP Active Notifications – controls the sending of ASP-Active notifications. If this value is specified, an ASP-Default notification is sent when an ASP transitions to the ASP-ACTIVE state. The default is not to send ASP-Active notifications.
- 1 – ASP Inactive Notifications – controls the sending of ASP-Inactive notifications. If this value is specified, an ASP-Inactive notification is sent when an ASP transitions to the ASP-INACTIVE state. The default is not to send ASP-Inactive notifications.
Note:
To see the ASP activations and inactivations, bits 0 and 1 of the pvalue parameter value need to be enabled. See Table 4-23. - 2 – ASPAS State Query – controls the sending of ASP/AS State notifications on request by an ASP. If this value is specified, the EAGLE responds with ASP and AS state notifications if the remote ASP sends ASP-UP or ASP-INACTIVE, while the local ASP is in the ASP-INACTIVE state, or the remote ASP sends an ASP-ACTIVE notification while the local ASP is in the ASP-ACTIVE state. The default is not to send ASP/AS state notifications.
Table 4-23 shows the values can be entered for the
pvalue
parameter if theparm
value is 2. Thepvalue
parameter value can be entered as a hexadecimal or a decimal number.Table 4-23 Valid PVALUE Parameter Values if PARM=2
Bits Enabled Bits Disabled Hexadecimal Value Decimal Value None
Bit 0 - ASP Activate Notifications
Bit 1 - ASP Inactivate Notifications
Bit 2 - ASP AS State Query
h’0*
0*
Bit 0 - ASP Activate Notifications
Bit 1 - ASP Inactivate Notifications
Bit 2 - ASP AS State Query
h’1
1
Bit 1 - ASP Inactivate Notifications
Bit 0 - ASP Activate Notifications
Bit 2 - ASP AS State Query
h’2
2
Bit 0 - ASP Activate Notifications
Bit 1 - ASP Inactivate Notifications
Bit 2 - ASP AS State Query
h’3
3
Bit 2 - ASP AS State Query
Bit 0 - ASP Activate Notifications
Bit 1 - ASP Inactivate Notifications
h’4
4
Bit 0 - ASP Activate Notifications
Bit 2 - ASP AS State Query
Bit 1 - ASP Inactivate Notifications
h’5
5
Bit 1 - ASP Inactivate Notifications
Bit 2 - ASP AS State Query
Bit 0 - ASP Activate Notifications
h’6
6
Bit 0 - ASP Activate Notifications
Bit 1 - ASP Inactivate Notifications
Bit 2 - ASP AS State Query
None
h’7
7
* The system default value
- If the
parm
value is 3, the bits used by thepvalue
parameter are:- 0 – UA Heartbeats – heartbeat messages are sent on connections from the EAGLE to the far-end node that are in the ASP-Down, ASP-Active, and ASP-Inactive states if the bit is enabled.
- 1 – UA Graceful Shutdown – enables the graceful shutdown of IPSG M3UA connections if the bit is enabled.
Table 4-24 shows the values can be entered for the
pvalue
parameter if theparm
value is 3. Thepvalue
parameter value can be entered as a hexadecimal or a decimal number.Table 4-24 Valid PVALUE Parameter Values if PARM=3
Bits Enabled Bits Disabled Hexadecimal Value Decimal Value None
Bit 0 - UA Heartbeats
Bit 1 - UA Graceful Shutdown
h’0*
0*
Bit 0 - UA Heartbeats
Bit 1 - UA Graceful Shutdown
h’1
1
Bit 1 - UA Graceful Shutdown
Bit 0 - UA Heartbeats
h’2
2
Bit 0 - UA Heartbeats
Bit 1 - UA Graceful Shutdown
None
h’3
3
* The system default value
- If the
parm
value is 4, the bit 0, the SCTP Payload Protocol Indicator byte order option, is used by thepvalue
parameter. This bit indicates whether the SCTP Payload Protocol Indicator (PPI) in the received or transmitted message should be in the Big Endian and Little Endian byte format.Table 4-25 shows the values can be entered for the
pvalue
parameter if theparm
value is 4. Thepvalue
parameter value can be entered as a hexadecimal or a decimal number.Table 4-25 Valid PVALUE Parameter Values if PARM=4
SCTP Payload Protocol Indicator Byte Order Option - Bit 0 Hexadecimal Value Decimal Value Big Endian Byte Format h’0*
0*
Little Endian Byte Format
h’1
1
* The system default value
UA parameter set 10 contains the default values for the UA parameter sets and cannot be changed.
The set
and scrset
parameter values cannot be the same.
If the scrset
parameter is specified, no other optional parameter may be specified.
The timer
and tvalue
parameters must be specified together. If one is specified, the other must be specified.
The parm
and pvalue
parameters must be specified together. If one is specified, the other must be specified.
Canceling the RTRV-UAPS
Command
Because the rtrv-uaps
command used in this procedure can output information for a long period of time, the rtrv-uaps
command can be canceled and the output to the terminal stopped. There are three ways that the rtrv-uaps
command can be canceled.
- Press the
F9
function key on the keyboard at the terminal where thertrv-uaps
command was entered. - Enter the
canc-cmd
without thetrm
parameter at the terminal where thertrv-uaps
command was entered. - Enter the
canc-cmd:trm=<xx>
, where<xx>
is the terminal where thertrv-uaps
command was entered, from another terminal other that the terminal where thertrv-uaps
command was entered. To enter thecanc-cmd:trm=<xx>
command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with thertrv-secu-trm
command. The user’s permissions can be verified with thertrv-user
orrtrv-secu-user
commands.
For more information about the canc-cmd
command, go to Commands User's Guide.
Figure 4-44 Changing a UA Parameter Set
4.39 Turning Off the Large MSU Support for IP Signaling Feature
This procedure is used to turn off the Large MSU Support for IP Signaling feature, using the chg-ctrl-feat
command.
The chg-ctrl-feat
command uses these parameters:
:partnum
– The part number of the Large MSU Support for IP Signaling feature, 893018401.
:status=off
– used to turn off the Large MSU Support for IP Signaling feature.
The status of the Large MSU Support for IP Signaling feature must be on and is shown with the rtrv-ctrl-feat
command.
Caution:
If the Large MSU Support for IP Signaling feature is turned off, the EAGLE will not process messages with a signaling information field (SIF) that is larger than 272 bytes.Figure 4-45 Turning the Large MSU Support for IP Signaling Feature Off