Cisco Cisco Packet Data Gateway (PDG)
ip source-violation
Enables or disables packet source validation for the current APN.
Product
GGSN
P-GW
SAEGW
Privilege
Security Administrator, Administrator
Command Modes
Exec > Global Configuration > Context Configuration > APN Configuration
configure > context context_name > apn apn_name
Entering the above command sequence results in the following prompt:
[
context_name
]
host_name
(config-apn)#
Syntax Description
ip source-violation { ignore | check [ drop-limit limit ] [ exclude-from-accounting ] }
default ip source-violation
default ip source-violation
default
Enables the checking of source addresses received from subscribers for violations, with a drop limit of 10
invalid packets that can be received from a subscriber prior to their session being deleted.
invalid packets that can be received from a subscriber prior to their session being deleted.
ignore
Default: Disabled
Disables source address checking for the APN.
check [ drop-limit limit ]
Default: Enabled, limit = 10
Enables the checking of source addresses received from subscribers for violations.
A drop-limit can be configured to set a limit on the number of invalid packets that can be received from a
subscriber prior to their session being deleted.
subscriber prior to their session being deleted.
limit can be configured to any integer value between 0 and 1000000. A value of 0 indicates that all invalid
packets will be discarded, but the session will never be deleted by the system.
packets will be discarded, but the session will never be deleted by the system.
Command Line Interface Reference, Modes A - B, StarOS Release 19
1629
APN Configuration Mode Commands
ip source-violation