Cisco Cisco Packet Data Gateway (PDG)

Página de 128
Configuring the SaMOG Gateway   
▀  Configuring the System to Perform as a SaMOG Gateway 
 
 
▄  SaMOG Administration Guide, StarOS Release 18 
106 
   
Step 9 
Create and configure the AAA group for Diameter and AAA authentication and accounting by applying the example 
configuration in the 
  section. 
Step 10  Configure the GTPP group consisting of the GTPP dictionary and CDR attributes, to be used for SGW and SGSN 
CDRs, and associate the GTPP group to the SaMOG Call Control Profile by applying the example configuration in the 
  section. 
Step 11  Configure the DNS service by applying the example configuration in the 
  section. 
Step 12  Optional. Enable Local breakout for an APN by applying the example configuration in the 
  
section. 
Step 13  Optional. Enable web-based authorization by applying the example configuration in the 
  section.  
Step 14  Configure and bind interfaces to the relevant interfaces by applying the example configuration in the 
  section. 
Step 15  Optional. Enable event logging by applying the example configuration in the 
  section. 
Step 16  Optional. Enable the sending of CGW and SaMOG SNMP traps by applying the example configuration in the 
  section. 
Step 17  Optional. Configure the system to gather and transfer bulk statistics by applying the example configuration in the 
  section. 
Step 18  Save the completed configuration by following the instructions in the 
  section. 
Creating the SaMOG Gateway Context  
Create the context in which the SaMOG service will reside. The MRME, CGW, SaMOG and other related services will 
be configured in this context. Create the SaMOG context by applying the configuration example below. 
config 
   context samog_context_name 
   end 
Configuring the MRME, CGW and SaMOG Services 
The MRME and CGW services provide the SaMOG functionality. They must be configured in the SaMOG context and 
then associated with a SaMOG service name. Configure the MRME, CGW, and SaMOG services by applying the 
example configuration below. 
      context context_name 
        twan-profile twan_profile_name 
          radius client { ipv4/ipv6_address [/mask ] } [ encrypted ] key value 
disconnect-message [ dest-port 
destination_port_number ] ] [ dictionary { custom70 | 
custom71 } ]