Cisco Cisco Packet Data Interworking Function (PDIF)
Configuring the Evolved Packet Data Gateway
▀ Configuring the System to Perform as an Evolved Packet Data Gateway
▄ ePDG Administration Guide, StarOS Release 18
106
For descriptions of the epdg schema variables, see “ePDG Schema Statistics” in the Statistics and Counters Reference.
For more information on configuring bulk statistics, see the System Administration Guide.
For more information on configuring bulk statistics, see the System Administration Guide.
Logging Configuration
Use the following configuration example to enable logging on the ePDG:
configure
logging filter active facility sessmgr level <critical/error>
logging filter active facility ipsec level <critical/error>
logging filter active facility ikev2 level <critical/error>
logging filter active facility epdg level <critical/error>
logging filter active facility aaamgr level<critical/error>
logging filter active facility diameter level<critical/error>
logging filter active facility egtpc level<critical/error>
logging filter active facility egtpmgr level<critical/error>
logging filter active facility gtpumgr level<critical/error>
logging filter active facility diameter-auth level<critical/error>
logging active
end
Non UICC device support for certificate and multi authentication configuration
List of authentication methods are defined and associated in Crypto Template. The basic sample configuration required
for OCSP and Certificate based authentication is as follows. For backward compatibility, the configuration for auth
method inside Crypto Template will be working.
for OCSP and Certificate based authentication is as follows. For backward compatibility, the configuration for auth
method inside Crypto Template will be working.
The following are the configuration considerations:
1. At max three sets of authentication methods in list can be associated.
2. Each set has only one local and one remote authentication method configuration.
3. The existing configuration inside the Crypto Template takes precedence over the new auth-method-set defined in
2. Each set has only one local and one remote authentication method configuration.
3. The existing configuration inside the Crypto Template takes precedence over the new auth-method-set defined in
case same auth method is configured at both places.
configure
#CA Certificate for device certificate authentication:
ca-certificate name <ca-name> pem url file: <ca certificate path>
#ePDG Certificate: