Cisco Cisco ASR 5000
ACS Configuration Mode Commands
▀ tethering-database
▄ Command Line Interface Reference, StarOS Release 18
584
ua-signature
ua_signature_db_file_name
Specifies the User Agent (UA) Signature database file to load.
ua_signature_db_file_name
must be the name of a UA Signature database file, and must be an
alphanumeric string of 1 through 255 characters.
Default filename:
Default filename:
ua-db
+
Indicates that more than one of the preceding option can be entered in a single command.
Usage
Use this command to enable the Tethering Detection feature, and load the OS, TAC, and UA databases from
the specified files into the service.
Tethering refers to the use of a smartphone as a USB dongle/modem to provide Internet connectivity to
laptops/PDAs/tablets like iPad, using the smartphone's data plan. Typically many operators have in place an
eat-all-you-can-get data plan for smartphones, the usage of which is intended to be from the smartphone as a
mobile device. However, some users use the low rate/unlimited usage of data plan to provide Internet
connectivity to their laptops in places where normal Internet connection via broadband/WiFi might be more
costly/not available/insecure.
Operators are interested in detecting such usage of a smartphone as a modem to better understand the usage
across their networks and offer plans inline to that usage to their customers. They may also charge the
tethered and non-tethered traffic separately.
After Tethering Detection has been enabled here (regardless, it must also be enabled within the rulebase), this
CLI command may be used to change the databases with the specified databases.
The files are picked from the disk file system within the /databases directory. If a file name value is not
configured, the default file names, v6-os-db, os-db, tac-db, and ua-db, are used.
For more information on the Tethering Detection feature, refer to the Enhanced Charging Services
Administration Guide.
the specified files into the service.
Tethering refers to the use of a smartphone as a USB dongle/modem to provide Internet connectivity to
laptops/PDAs/tablets like iPad, using the smartphone's data plan. Typically many operators have in place an
eat-all-you-can-get data plan for smartphones, the usage of which is intended to be from the smartphone as a
mobile device. However, some users use the low rate/unlimited usage of data plan to provide Internet
connectivity to their laptops in places where normal Internet connection via broadband/WiFi might be more
costly/not available/insecure.
Operators are interested in detecting such usage of a smartphone as a modem to better understand the usage
across their networks and offer plans inline to that usage to their customers. They may also charge the
tethered and non-tethered traffic separately.
After Tethering Detection has been enabled here (regardless, it must also be enabled within the rulebase), this
CLI command may be used to change the databases with the specified databases.
The files are picked from the disk file system within the /databases directory. If a file name value is not
configured, the default file names, v6-os-db, os-db, tac-db, and ua-db, are used.
For more information on the Tethering Detection feature, refer to the Enhanced Charging Services
Administration Guide.
Example
The following command enables Tethering Detection and selects the UA Signature database file named
test
:
tethering-database ua-signature test