ePDG Administration Guide, StarOS Release 21.2
First Published: 2017-04-28
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version
of the UNIX operating system. All rights reserved. Copyright ©1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http://
www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
©2017 Cisco Systems, Inc. All rights reserved.
CONTENTS
Preface
About this Guide xi
CHAPTER 1
Evolved Packet Data Gateway Overview 1
Product Description 1
Platform Requirements 2
MIO Demux Card on ASR 5500 2
Licenses 2
Network Deployment(s) and Interfaces 2
Network Elements 3
ePDG 3
eNodeB 3
MME 4
S-GW 4
P-GW 4
3GPP AAA Server 4
HSS 4
PCRF 4
Logical Network Interfaces 4
Transport Combinations 6
Features and Functionality 6
ePDG Service 8
IKEv2 and IPSec Encryption 8
Supported Algorithms 9
x.509 Digital Certificate Handling 9
Timers 10
Dead Peer Detection 10
Child SA Rekeying 10
ePDG Administration Guide, StarOS Release 21.2
iii
Support for MAC Address of WiFi Access Points 11
AAA Server Groups 11
EAP Authentication 11
IPv6 Capabilities 12
General Call Flow 12
Static and Dynamic P-GW Selection 16
Static Selection 16
Dynamic Selection 17
P-GW Initiated Bearer Modification 19
Topology/Weight-based Selection 21
Dual Stack Support 22
Inter-access Handover Support 22
Mobile Access Gateway Function 22
IPv6 Router Advertisement Support 23
DNS Request Support 23
P-CSCF Request Support 23
Multiple PDN Support 24
Default APN Support 24
Congestion Control 25
Session Recovery Support 27
Interchassis Session Recovery (ICSR) Support 27
ePDG P-GW selection 28
S2b GTPv2 support 29
DSCP and 802.1P Marking 30
IPSec Cookie Threshold 31
Threshold Crossing Alerts 33
Bulk Statistics Support 33
IKEv2 RFC 5996 Support 34
IPv6 Support on IPSec SWU Interface 35
Narrowing Traffic Selectors 35
Static IP Address Allocation Support 36
ePDG and PGW Support on the Same Chassis (with GTPv2) 39
ICSR-VoLTE Support 39
Local PGW Resolution Support 39
Non UICC Device Support Using Certificate Based Authentication 41
ePDG Administration Guide, StarOS Release 21.2
iv
Contents
EAP-MSCHAPv2/EAP-TLS/EAP-TTLS Based Support For NON UICC Devices 43
Emergency APN Support on ePDG 53
Passing on UE Tunnel Endpoint Address over SWm Support 53
Passing on IMEI to AAA for EIR Support on WiFi 54
Custom SWm to SWu error code mapping 54
ePDG Bearer Duration KPIs 55
Data Buffering Support for DL Packets Before Session Establishment 55
Downlink DSCP Marking(SWu) 55
ePDG Fast Re-Auth Support 56
ePDG Offline charging 62
UE Local IP Address IE in the S2B Interface over GTPv2 64
Lawful Intercept 68
IKEv2 Fragmentation Support 68
IKEv2 Mobility and Multi-homing Protocol 68
AES-NI Support 69
IPSec Large Support 69
How the ePDG Works 70
ePDG Session Establishment 71
UE-initiated Session Disconnection 74
ePDG-initiated Session Disconnection 77
P-GW-initiated Session Disconnection 78
WiFi-to-WiFi Re-Attach With Same ePDG 80
WiFi to LTE Handoff with Dedicated Bearer (UE initiated) 84
LTE to WiFi Hand Off - With Dedicated bearer (UE initiated) 87
Supported Standards 91
3GPP References 91
IETF References 92
CHAPTER 2
Configuring the Evolved Packet Data Gateway 93
Configuring the System to Perform as an Evolved Packet Data Gateway 93
Required Information 93
Required Local Context Configuration Information 94
Required Information for ePDG Context and Service Configuration 94
Required Information for Egress Context and MAG Service Configuration 97
Required Information for Egress Context and EGTP Service Configuration 98
ePDG Administration Guide, StarOS Release 21.2
v
Contents
Evolved Packet Data Gateway Configuration 98
Initial Configuration 100
Modifying the Local Context 100
ePDG Context and Service Configuration 100
Creating the ePDG Context 101
Creating the ePDG Service 102
Egress Context and MAG Service Configuration 104
Configuring the Egress Context and MAG Service 104
Egress Context and EGTP Service Configuration 105
Configuring the Egress Context and EGTP Service 105
Bulk Statistics Configuration 106
Logging Configuration 107
Non UICC device support for certificate and multi authentication configuration 107
Saving the Configuration 108
Verifying the Configuration 108
CHAPTER 3
Monitoring the Evolved Packet Data Gateway 109
Monitoring ePDG Status and Performance 109
Clearing Statistics and Counters 115
CHAPTER 4
Evolved Packet Data Gateway Engineering Rules 117
IKEv2/IPSec Restrictions 117
X.509 Certificate (CERT) Restrictions 118
GTPv2 Restrictions 118
S2b Interface Rules 119
EGTP Service Rules 119
ePDG Service Rules 119
ePDG Subscriber Rules 120
CHAPTER 5
IKEv2 Error Codes and Notifications 121
CHAPTER 6
Transition Rate KPIs 125
Feature Description 125
Assumptions and Limitations 126
ePDG Administration Guide, StarOS Release 21.2
vi
Contents
CHAPTER 7
Idle Seconds Micro-checkpoint 127
Feature Description 127
Configuration based on Periodic Idle Seconds Micro-checkpoints 127
Event Based Idle Seconds Micro-checkpoint 128
Assumptions and Limitations 128
CHAPTER 8
AAA based PGW Selection for ePDG Initial Attach 129
AAA Based PGW Selection 129
Configuring AAA Based PGW Selection 130
CHAPTER 9
Pre-ESP Fragmentation Support 131
Feature Description 131
ePDG Pre-ESP Fragmentation Configuration 132
CHAPTER 10
Support for RFC 5685 Redirect Mechanism for Internet Key Exchange Protocol V2(IKEv2) 133
Feature Description 133
ePDG Reselection Configuration 134
CHAPTER 11
Send DSReq if new PGW is selected during re-attach 137
Scope and Assumptions 137
Configuring Send DSReq if new PGW is selected feature 138
CHAPTER 12
ePDG Roaming Support 139
ePDG Roaming Support Description 139
Roaming Support for ePDG Configuration 144
CHAPTER 13
ePDG Modify Bearer Command Support 147
Description 147
ePDG Modify Bearer Command Support Configuration 148
CHAPTER 14
Custom S2B to SWu error code mapping 151
Description 151
Custom S2B to SWu error code mapping Configuration 151
ePDG Administration Guide, StarOS Release 21.2
vii
Contents
CHAPTER 15
ePDG Auth Bulkstats for Non-UICC/UICC 153
Auth Bulkstats for Non-UICC/UICC 153
CHAPTER 16
Sending SWm 3GPP AAA FQDN Address in CSReq 155
Feature Description 155
Configuring Sending SWm 3GPP AAA IP Address in CSreq 155
Performance Indicator Changes 156
CHAPTER 17
Network Provided User Location Information reporting extensions over S2b interface 157
Feature Deception 157
Configuring NPLI e2e VoWiFi on ePDG and PGW 161
Performance Indicator Changes 161
CHAPTER 18
Release 13 Emergency PDN support 163
Feature Description 163
Configuring Release 13 Based Emergency APN Support 164
Performance Indicator Changes 164
CHAPTER 19
ePDG International Roaming - Redirection Based on Outer IP 167
Feature Description 167
Configuring ePDG International Roaming Redirection Based on Outer IP 168
Performance Indicator Changes 168
CHAPTER 20
Send User location info to PGW 171
Feature Description 171
Configuring Use MCC MNC Value Provided by Network 172
Performance Indicator Changes 173
CHAPTER 21
ePDG S2b Piggybacking Support 175
Feature Information 175
Feature Description 176
Configuring ePDG S2b Piggybacking Support 176
Monitoring and Troubleshooting the S2B Piggybacking Support 176
ePDG Administration Guide, StarOS Release 21.2
viii
Contents
CHAPTER 22
ePDG P-CSCF Restoration Support 177
Feature Information 177
Feature Description 178
Configuring P-CSCF Restoration Support 184
Monitoring and Troubleshooting the P-CSCF Restoration Support 184
CHAPTER 23
RAN/NAS Cause IE support in S2b Messages 187
Feature Information 187
Feature Description 188
Configuring RAN/NAS Cause IE support in S2b 188
Monitoring and Troubleshooting the ePDG RAN/NAS Cause IE Support In S2b 189
ePDG Administration Guide, StarOS Release 21.2
ix
Contents
ePDG Administration Guide, StarOS Release 21.2
x
Contents
About this Guide
This preface describes the ePDG Administration Guide, how it is organized, and its document conventions.
The guide describes the ePDG (Evolved Packet Data Gateway) and includes network deployments and
interfaces, feature descriptions, session flows, configuration instructions, and CLI commands for monitoring
and troubleshooting the system. It also contains a sample ePDG configuration file and ePDG engineering
rules.
ePDG Administration Guide, StarOS Release 21.2
xi
ePDG Administration Guide, StarOS Release 21.2
xii
About this Guide
CHAPTER 1
Evolved Packet Data Gateway Overview
This chapter contains an overview of the ePDG (evolved Packet Data Gateway), including:
•Product Description, page 1
•Network Deployment(s) and Interfaces, page 2
•Features and Functionality, page 6
•How the ePDG Works, page 70
•Supported Standards, page 91
Product Description
The Cisco®ePDG (evolved Packet Data Gateway) enables mobile operators to provide secure access to the
3GPP E-UTRAN/EPC (Evolved UTRAN/Evolved Packet Core) network from untrusted non-3GPP IP access
networks. The ePDG functions as a security gateway to provide network security and internet working control
via IPSec tunnel establishment based on information obtained during 3GPP AAA (Authentication,
Authorization, and Accounting). The ePDG enables mobile operators to extend wireless service coverage,
reduce the load on the macro wireless network, and make use of existing backhaul infrastructure to reduce
the cost of carrying wireless calls.
The ePDG has the following key features:
•Support for the IPSec/IKEv2-based SWu interface between the ePDG and the WLAN (Wireless LAN)
UEs.
•Routing of packets between the WLAN UEs and the Cisco P-GW (Packet Data Network Gateway) over
the S2b interface via GTPv2 or PMIPv6 (Proxy Mobile IP version 6) protocol.
•P-GW selection via DNS client functionality to provide PDN (Packet Data Network) connectivity to
the WLAN UEs.
•Support for passing assigned IPv4/IPv6 address configurations from the P-GW to the WLAN UEs.
•Support for the Diameter-based SWm interface between the ePDG and the external 3GPP AAA server.
•Tunnel authentication and authorization for IPSec/PMIPv6/GTPv2 tunnels using the EAP-AKA
(Extensible Authentication Protocol - Authentication and Key Agreement) authentication method between
the 3GPP AAA server and the WLAN UEs.
ePDG Administration Guide, StarOS Release 21.2
1
•Encapsulation and decapsulation of packets sent over the IPSec/PMIPv6/GTPv2 tunnels.
•Hosts a MAG (Mobile Access Gateway) function, which acts as a proxy mobility agent in the
E-UTRAN/EPC network and uses PMIPv6 signaling to provide network-based mobility management
on behalf of the WLAN UEs attached to the network.
Platform Requirements
The ePDG service runs on a Cisco ASR 5000/ASR 5500 (DPC1/DPC2) chassis running the StarOS operating
system and Virtualized Packet Core (VPC) platforms. The chassis can be configured with a variety of
components to meet specific network deployment requirements. For additional information, see the installation
guide for the chassis and/or contact your Cisco account representative.
MIO Demux Card on ASR 5500
The ePDG service is fully qualified to run on the Management Input/Output (MIO) card for demux functions.
ePDG can leverage on the additional card for user plane processing to increase the capacity of the chassis.
When IPSec large and demux on MIO are configured together, enable the IPSec large feature (using the
require ipsec-large command) before enabling the demux on MIO (using the require demux
management-card command).
Important
For more information on the Demux card, refer the System Administration Guide.
Licenses
The ePDG is a licensed Cisco product. Separate session and feature licenses may be required. Contact your
Cisco account representative for detailed information on specific licensing requirements. For information on
installing and verifying licenses, see "Managing License Keys" in the System Administration Guide.
Network Deployment(s) and Interfaces
This section describes the ePDG as it provides secure access from the WLAN UEs to the Cisco P-GW and a
connection to the PDN (Packet Data Network) in the E-UTRAN/EPC (Evolved UTRAN/Evolved Packet
Core) network.
The figure below shows the ePDG terminating the SWu interface from the untrusted non-3GPP IP access
network and providing secure access to the Cisco P-GW and a connection to the PDN via the PMIPv6/GTPv2
ePDG Administration Guide, StarOS Release 21.2
2
Evolved Packet Data Gateway Overview
Platform Requirements
S2b interface. It also shows the network interfaces used by the Cisco MME, S-GW, and P-GW in the
E-UTRAN/EPC network.
Figure 1: The ePDG in the E-UTRAN/EPC Network
Network Elements
This section provides a description of the network elements that work with the ePDG in the E-UTRAN/EPC
network. For untrusted non-3GPP IP access, note that the network architecture assumes the access network
elements do not perform any function other than delivering packets.
ePDG
The ePDG is responsible for interworking between the EPC and untrusted non-3GPP networks that require
secure access, such as a WiFi, LTE metro, and femtocell access networks.
eNodeB
The eNodeB (evolved Node B) is the termination point for all radio-related protocols. As a network, E-UTRAN
is simply a mesh of eNodeBs connected to neighboring eNodeBs via the X2 interface.
ePDG Administration Guide, StarOS Release 21.2
3
Evolved Packet Data Gateway Overview
Network Elements
MME
The Cisco MME (Mobility Management Entity) is the key control node for the LTE access network. It works
in conjunction with the eNodeB and the Cisco S-GW to control bearer activation and deactivation. The MME
is typically responsible for selecting the Cisco P-GW for the UEs to access the PDN, but for secure access
from untrusted non-3GPP IP access networks, the ePDG is responsible for selecting the P-GW.
S-GW
The Cisco S-GW (Serving Gateway) routes and forwards data packets from the 3GPP UEs and acts as the
mobility anchor during inter-eNodeB handovers. The S-GW receives signals from the MME that control the
data traffic. Every 3GPP UE accessing the EPC is associated with a single S-GW.
P-GW
The Cisco P-GW (Packet Data Network Gateway) is the network node that terminates the SGi interface
towards the PDN. The P-GW provides connectivity to external PDNs for the subscriber UEs by being the
point of entry and exit for all subscriber UE traffic. A subscriber UE may have simultaneous connectivity
with more than one P-GW for accessing multiple PDNs. The P-GW performs policy enforcement, packet
filtering, charging support, lawful interception, and packet screening. The P-GW is the mobility anchor for
both trusted and untrusted non-3GPP IP access networks. For PMIP-based S2a and S2b interfaces, the P-GW
hosts the LMA (Local Mobility Anchor) function.
3GPP AAA Server
The 3GPP AAA (Authentication, Authorization, and Accounting) server provides UE authentication via the
EAP-AKA (Extensible Authentication Protocol - Authentication and Key Agreement) authentication method.
HSS
The HSS (Home Subscriber Server), is the master user database that supports the IMS (IP Multimedia
Subsystem) network entities. It contains subscriber profiles, performs subscriber authentication and
authorization, and provides information about the subscriber's location and IP information.
PCRF
The PCRF (Policy and Charging Rules Function) determines policy rules in the IMS network. The PCRF
operates in the network core, accesses subscriber databases and charging systems, and makes intelligent policy
decisions for subscribers.
Logical Network Interfaces
The following table provides descriptions of the logical network interfaces supported by the ePDG in the
E-UTRAN/EPC network.
ePDG Administration Guide, StarOS Release 21.2
4
Evolved Packet Data Gateway Overview
Logical Network Interfaces
Table 1: Logical Network Interfaces on the ePDG
DescriptionInterface
The secure interface to the WLAN UEs in the untrusted non-3GPP IP access network,
the SWu interface carries IPSec tunnels. The ePDG uses IKEv2 signaling to establish
IPSec tunnels between the UEs and the ePDG. It also supports the negotiation of
configuration attributes such as IP address, DNS, and P-CSCF in the CP
(Configuration Parameters) payload of IKE_AUTH Request and Response messages.
SWu Interface
The interface to the P-GW, the S2b interface runs PMIPv6 (Proxy Mobile IP version
6)/GTPv2 protocol to establish WLAN UE sessions with the P-GW. It also supports
the transport of P-CSCF attributes and DNS attributes in PBU (Proxy-MIP Binding
Update)/Create Session Request and PBA (Proxy-MIP Binding
Acknowledgement)/Create Session Response messages as part of the P-CSCF
discovery performed by the WLAN UEs.
S2b Interface
The interface to the 3GPP Diameter AAA server, the SWm interface is used for
WLAN UE authentication. It supports the transport of mobility parameters, tunnel
authentication, and authorization data. The EAP-AKA (Extensible Authentication
Protocol - Authentication and Key Agreement) method is used for authenticating
the WLAN UEs over this interface. SWm interface supports both TCP and SCTP
protocols.
Below are the default SCTP Parameters:
•addip_enable 1
•association_max_retrans 10
•cookie_preserve_enable 1
•hb_interval 30000
•max_burst 4
•max_init_retransmits 8
•path_max_retrans 5
•prsctp_enable 1
•rcvbuf_policy 0
•rto_alpha_exp_divisor 3
•rto_beta_exp_divisor 2
•rto_initial 3000
•rto_max 60000
•rto_min 1000
•sack_timeout 200
•sndbuf_policy 0
•valid_cookie_life 60000
SWm Diameter
Interface
ePDG Administration Guide, StarOS Release 21.2
5
Evolved Packet Data Gateway Overview
Logical Network Interfaces
Transport Combinations
Table 2: Transport Combinations for the ePDG
Combination Supported
for Deployment?
GTPv2IPSec Tunnels (between
the WLAN UEs and the
ePDG)
IP Address Allocated by
the P-GW for the WLAN
UEs
YesIPv4IPv4IPv4
YesIPv6IPv6IPv4
YesIPv4IPv6IPv4
YesIPv6IPv4IPv4
YesIPv4IPv4IPv6
YesIPv6IPv6IPv6
YesIPv4IPv6IPv6
YesIPv6IPv4IPv6
YesIPv4IPv4IPv4v6
YesIPv6IPv6IPv4v6
YesIPv6IPv4IPv4v6
YesIPv4IPv6IPv4v6
The table below lists the IPv4/IPv6 transport combinations for the ePDG and whether each combination is
supported for deployment in this release.
PMIPv6 S2b IPv6 transport is qualified.
Features and Functionality
This section describes the ePDG features and functionalities.
The following are the ePDG features:
•ePDG Service, on page 8
•IKEv2 and IPSec Encryption, on page 8
ePDG Administration Guide, StarOS Release 21.2
6
Evolved Packet Data Gateway Overview
Transport Combinations
•Dead Peer Detection, on page 10
•Child SA Rekeying, on page 10
•Support for MAC Address of WiFi Access Points, on page 11
•AAA Server Groups, on page 11
•EAP Authentication, on page 11
•IPv6 Capabilities, on page 12
•Static Selection, on page 16
•Dual Stack Support, on page 22
•Inter-access Handover Support, on page 22
•Mobile Access Gateway Function, on page 22
•IPv6 Router Advertisement Support, on page 23
•DNS Request Support, on page 23
•P-CSCF Request Support, on page 23
•Multiple PDN Support, on page 24
•Default APN Support, on page 24
•Congestion Control, on page 25
•Session Recovery Support, on page 27
•DSCP and 802.1P Marking, on page 30
•ePDG P-GW selection, on page 28
•IPSec Cookie Threshold, on page 31
•Threshold Crossing Alerts, on page 33
•Bulk Statistics Support, on page 33
•Interchassis Session Recovery (ICSR) Support, on page 27
•IKEv2 RFC 5996 Support, on page 34
•IPv6 Support on IPSec SWU Interface, on page 35
•Narrowing Traffic Selectors, on page 35
•Static IP Address Allocation Support, on page 36
•ePDG and PGW Support on the Same Chassis (with GTPv2), on page 39
•ICSR-VoLTE Support, on page 39
•Local PGW Resolution Support, on page 39
•Non UICC Device Support Using Certificate Based Authentication, on page 41
•EAP-MSCHAPv2/EAP-TLS/EAP-TTLS Based Support For NON UICC Devices , on page 43
•Emergency APN Support on ePDG, on page 53
ePDG Administration Guide, StarOS Release 21.2
7
Evolved Packet Data Gateway Overview
Features and Functionality
•Passing on UE Tunnel Endpoint Address over SWm Support, on page 53
•Custom SWm to SWu error code mapping, on page 54
•ePDG Bearer Duration KPIs, on page 55
•Data Buffering Support for DL Packets Before Session Establishment, on page 55
•Downlink DSCP Marking(SWu), on page 55
•ePDG Fast Re-Auth Support, on page 56
•ePDG Offline charging, on page 62
•UE Local IP Address IE in the S2B Interface over GTPv2, on page 64
•IPSec Large Support, on page 69
ePDG Service
The ePDG service enables the WLAN UEs in the untrusted non-3GPP IP access network to connect to the
E-UTRAN/EPC network via a secure IPSec interface.
During configuration, you create the ePDG service in an ePDG context, which is a routing domain in the
system. Context and service configuration for the ePDG includes the following main steps:
•Configure the IPv4/IPv6 address for the service: This is the IP address of the ePDG to which the
WLAN UEs attempt to connect, sending IKEv2 messages to this address to establish IPSec tunnels.
•Configure the name of the crypto template for IKEv2/IPSec: A crypto template is used to define an
IKEv2/IPSec policy. It includes IKEv2 and IPSec parameters for keepalive, lifetime, NAT-T, and
cryptographic and authentication algorithms. There must be one crypto template per ePDG service.
•The name of the EAP profile: The EAP profile defines the EAP authentication method and associated
parameters.
•IKEv2 and IPSec transform sets: Transform sets define the negotiable algorithms for IKE SAs (Security
Associations) and Child SAs to enable calls to connect to the ePDG.
•The setup timeout value: This parameter specifies the session setup timeout timer value. The ePDG
terminates a UE connection attempt if the UE does not establish a successful connection within the
specified timeout period. The default value is 60 seconds.
•Max-sessions: This parameter sets the maximum number of subscriber sessions allowed by the ePDG
service. The default value is 1,000,000 and is subject to license limitations.
•DNS client: DNS client configuration is needed for P-GW selection.
IKEv2 and IPSec Encryption
The ePDG supports IKEv2 (Internet Key Exchange version 2) and IPSec (IP Security) ESP (Encapsulating
Security Payload) encryption as per RFCs 4303 and 5996. IKEv2 and IPSec encryption enables network
domain security for all IP packet-switched networks in order to provide confidentiality, integrity, authentication,
and anti-replay protection. These capabilities are ensured through use of cryptographic techniques.
ePDG Administration Guide, StarOS Release 21.2
8
Evolved Packet Data Gateway Overview
ePDG Service
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI