Cisco Cisco ASR 5000
HSGW Service Configuration Mode Commands
▀ ip
▄ Command Line Interface Reference, StarOS Release 18
6362
source-violation { clear-on-valid-packet | drop-limit
num | period secs | reneg-
limit num }
clear-on-valid-packet
Configures the service to reset the reneg-limit and drop-limit counters after receipt of a properly addressed
packet. Default: disabled
packet. Default: disabled
drop-limit
num
Specifies the number of allowed source violations within a detection period before forcing a call disconnect
as an integer from 1 through 1000000. If
as an integer from 1 through 1000000. If
num
is not specified, the value is set to the default. Default: 10
period
secs
Specifies the length of time (in seconds) for a source violation detection period to last; drop-limit and reneg-
limit counters are decremented each time this value is reached.
The counters are decremented in this manner: reneg-limit counter is reduced by one (1) each time the period
value is reached until the counter is zero (0); drop-limit counter is halved each time the period value is
reached until the counter is zero (0). If
limit counters are decremented each time this value is reached.
The counters are decremented in this manner: reneg-limit counter is reduced by one (1) each time the period
value is reached until the counter is zero (0); drop-limit counter is halved each time the period value is
reached until the counter is zero (0). If
secs
is not specified, the value is set to the default.
secs
is an integer from 1 through1000000. Default: 120
reneg-limit
num
Sets the number of allowed source violations within a detection period before forcing a PPP renegotiation. If
num
is not specified, the value is set to the default.
num
is an integer from 1 through 1000000. Default: 5
Usage
Header Compression RoHC: Use this command to specify that sessions using this service will have Robust
Header Compression applied and configure parameters supporting RoHC.
Entering this command results in the following prompt:
Header Compression applied and configure parameters supporting RoHC.
Entering this command results in the following prompt:
[context_name]hostname(config-ip-header-compression-rohc)#
HSGW Service RoHC Configuration Mode commands are defined in the HSGW Service RoHC
Configuration Mode Commands chapter.
Local Port: Specify the UDP port that should be used for communications between the Packet Control
Function (PCF) and the HSGW.
Configuration Mode Commands chapter.
Local Port: Specify the UDP port that should be used for communications between the Packet Control
Function (PCF) and the HSGW.
Important:
The UDP port setting on the PCF must match the local-port setting for the HSGW service on the
system in order for the two devices to communicate.
Source Violation: This function is intended to allow the operator to configure a network to prevent problems
such as when a user gets handed back and forth between two HSGWs a number of times during a handoff
scenario.
This function operates in the following manner:
When a subscriber packet is received with a source address violation, the system increments both the IP
source-violation reneg-limit and drop-limit counters and starts the timer for the IP-source violation period.
Every subsequent packet received with a bad source address during the IP-source violation period causes the
reneg-limit and drop-limit counters to increment.
For example, if reneg-limit is set to 5, then the system allows 5 packets with a bad source address (source
violations), but on the 5th packet, it re-negotiates PPP.
If the drop-limit is set to 10, the above process of receiving 5 source violations and renegotiating PPP occurs
only once. After the second 5 source violations, the call is dropped. The period timer continues to count
throughout this process.
such as when a user gets handed back and forth between two HSGWs a number of times during a handoff
scenario.
This function operates in the following manner:
When a subscriber packet is received with a source address violation, the system increments both the IP
source-violation reneg-limit and drop-limit counters and starts the timer for the IP-source violation period.
Every subsequent packet received with a bad source address during the IP-source violation period causes the
reneg-limit and drop-limit counters to increment.
For example, if reneg-limit is set to 5, then the system allows 5 packets with a bad source address (source
violations), but on the 5th packet, it re-negotiates PPP.
If the drop-limit is set to 10, the above process of receiving 5 source violations and renegotiating PPP occurs
only once. After the second 5 source violations, the call is dropped. The period timer continues to count
throughout this process.