Cisco Cisco ASR 5000
GPRS Service Configuration Mode Commands
▀ ciphering-algorithm
▄ Command Line Interface Reference, StarOS Release 18
6030
14 - GPRS services not allowed in this PLMN
15 - No Suitable Cells In Location Area
16 -MSC temporarily not reachable
17 - Network failure
20 - MAC failure
21 - Synch failure
22 - Congestion
23 - GSM authentication unacceptable
40 - No PDP context activated
48 to 63 - retry upon entry into a new cell
95 - Semantically incorrect message
96 - Invalid mandatory information
97 - Message type non-existent or not implemented
98 - Message type not compatible with state
99 - Information element non-existent or not implemented
100 - Conditional IE error
101 - Message not compatible with the protocol state
111 - Protocol error, unspecified
use-geo0
: Instructs the SGSN to honor the Attach/RAU Request without ciphering (geo0). This is the
default action for negotiation failure.
priority priority algorithm
Defines the priority, order of use, for the ciphering algorithm.
priority
: Must be an integer from 1 to 4.
algorithm
Identifies the algorithm to be matched to the priority. Options include:
gea0 - No ciphering
gea1 - GPRS Encryption Algorithm - GEA1
gea2 - GPRS Encryption Algorithm - GEA2
gea3 - GPRS Encryption Algorithm - GEA3
Usage
Use this command to specify the order (priority) of usage for the GPRS encryption algorithms. All of the
GPRS encapsulation algorithms use a 64-bit key derived from a common mechanism: the mobile receives a
random challenge, then the SIM calculates an authentication signature and an encryption key.
Also use this command to define the action to be taken if there is not a match between the MS and the SGSN
ciphering algorithm configurations.
GPRS encapsulation algorithms use a 64-bit key derived from a common mechanism: the mobile receives a
random challenge, then the SIM calculates an authentication signature and an encryption key.
Also use this command to define the action to be taken if there is not a match between the MS and the SGSN
ciphering algorithm configurations.
Example
The following command sets no ciphering to be used after two encryption algorithms have been used: