25-99
Cisco Prime Network 4.0 User Guide
OL-29343-01
Chapter 25 Monitoring Mobile Technologies LTE Networks
Viewing the PCF Configuration Details
To view the Packet Control Function (PCF) configuration details for a PDSN service:
Step 1 Right-click the required device in Prime Network Vision and choose Inventory.
Step 2 In the logical inventory window, choose Logical Inventory > Context > Mobile > PDSN > PDSN
service > PCF. The details are displayed in the content pane.
Table 25-61 displays the PCF configuration details.
MSID Authentication Indicates whether the MSID authentication feature is enabled.
MSID Length Check Indicates whether MSID length is enabled for the PDSN service. By default,
this option is disabled.
Note This configuration is required to reject the A11-RRQs with illegal
International Mobile Station Identification (IMSI).
Table 25-60 M SID Configuration Details
Field Description
Table 25-61 PCF Configuration Details
Field Description
PCF Monitor Num
Retries The maximum number of retries before deciding that the PCF service is
down.
PCF Session ID Change
Restart PPP Indicates whether the PPP must be restarted if there is a change in the session
ID of an existing session.
New Call Conflict
Termi nate O ld Se ssio n Indicates whether the session with a PCF must be terminated when a ne w call
request for an existing session is received from another PCF.
PDSN Security Entries
SPI Number The unique Security Parameters Index number that indicates a security
context between the services.
Remote Address The IP address of the source service.
Netmask The subnet mask of the source service.
Zone ID The ID of the zone to which the IP address belongs to.
Hash Algorithm The hash algorithm used to encrypt the data .
Time Stamp Tolerance The acceptable difference (in seconds) in the timestamps.
Note If the actual difference exceeds the difference specified here, then
the session is rejected. If this difference is 0, the timestamp toleran ce
checking is disabled at the receiving end.
Replay Protection The replay protection schemes that is implemented by the service.
Description The description of the security profile.