UCC 5G PCF Configuration and Administration Guide

Unknown

UCC 5G PCF Configuration and Administration Guide - Cisco

28 apr 2023 — is hardcoded in the user interfaces of the product software, language used based on standards documentation, or language that is used by a referenced ...

PDF preview unavailable. Download the PDF instead.

b ucc-5g-pcf-config-and-admin-guide 2023-02
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 Configuration and Administration Guide
First Published: 2023-04-28 Last Modified: 2023-04-25
Americas Headquarters
Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000
800 553-NETS (6387) Fax: 408 527-0883

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED "AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
The documentation set for this product strives to use bias-free language. For purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on standards documentation, or language that is used by a referenced third-party product.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R)
© 2023 Cisco Systems, Inc. All rights reserved.

CONTENTS

PREFACE CHAPTER 1
CHAPTER 2

About this Guide xxix Conventions Used xxix Contacting Customer Support xxx
5G Architecture 1 Feature Summary and Revision History 1 Summary Data 1 Revision History 1 Overview 2 Control Plane Network Functions 2 User Plane Network Function 3 Subscriber Microservices Infrastructure Architecture 3 Control Plane Network Function Architecture 4
PCF Overview 7 Product Description 7 Use Cases 7 Base PCF Configuration 8 Infrastructure 8 Interoperability with CHF 8 Interoperability with NRF 8 Configuring LDAP for Subscriber Query 9 Parity with 4G 9 VoNR 10 Deployment Architecture and Interfaces 10 PCF Architecture 10

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide iii

Contents

CHAPTER 3 CHAPTER 4 CHAPTER 5

PCF Deployment Architecture 12 Supported Interfaces 13
Deploying and Configuring PCF through Ops Center 15 Feature Summary and Revision History 15 Summary Data 15 Revision History 15 Feature Description 15 PCF Ops Center 16 Prerequisites 16 Deploying and Accessing PCF 16 Deploying PCF 16 Accessing the PCF Ops Center 16
Smart Licensing 19 Feature Summary and Revision History 19 Summary Data 19 Revision History 19 Smart Software Licensing 19 Cisco Software Central 20 Smart Accounts/Virtual Accounts 20 Request a Cisco Smart Account 20 PCF Smart Licensing 21 Software Tags and Entitlement Tags 21 Configuring Smart Licensing 22 Users with Access to CSC 22 Users without Access to CSC 27 OAM Support 31 Monitoring and Troubleshooting Smart Licensing 31
Software Upgrade using Site Isolation Procedure 33 Feature Summary and Revision History 33 Summary Data 33 Revision History 33

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide iv

CHAPTER 6 CHAPTER 7 CHAPTER 8 CHAPTER 9

Feature Description 33 Prerequisites 34 Pre-Upgrade Backup Steps 34 Post-Upgrade Verification Steps 42
PCF Rolling Software Update 47 Supported Upgrade Procedures 47 Introduction 47 Updating PCF 48 Rolling Software Update Using SMI Cluster Manager 48 Prerequisites 49 Upgrading the PCF 54 Validating the Upgrade 57 Rollback the Upgrade 60
3GPP Specification Compliance for PCF Interfaces 65 Feature Summary and Revision History 65 Summary Data 65 Revision History 65 Feature Description 66 Standards Compliance 66 Configuring Interfaces and Endpoints 67
Basic Systems Configuration 69 Feature Summary and Revision History 69 Summary Data 69 Revision History 69 Overview 69 Adding a System 70
Cisco Common Data Layer 71 Feature Summary and Revision History 71 Summary Data 71 Revision History 71

Contents

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide v

Contents

CHAPTER 10

Feature Description 72 Geographic Redundancy 72 Limitations 72 Stale Sessions Cleanup 72 Limitations 73 Synchronizing the Index Records 73 Architecture 74
How it Works 74 Processing of CDL Conflict Notification 75 Call Flows 75 CDL Endpoint Failure Call Flow 75 GR Call Flows 76 Local and Remote Sites Receive Rx_STR Without Any Time Gap Call Flow 78 Local and Remote Sites Receive N5 Delete Request Without Any Time Gap Call Flow 80
Configuring Cisco Common Data Layer 81 Configuring the CDL Session Database and Defining the Base Configuration 81 Configuring Kafka in CDL 83 Configuring Zookeeper in CDL 84
Configuring the CDL Engine 85 Configuring the CDL Endpoints 85
Configuring the External Services 86 Associating the Datastore with the CDL Endpoint Service 86 Starting the Remote Index Synchronization 87 Viewing the Remote Index Synchronization Status 87 Configuring the Stale Session Cleanup Using the Unique Key 88 Sample Configuration 89 Stale Sessions Cleanup Troubleshooting Information 89 OAM Support 89 Statistics 89
Authorization With Required QoS 93 Feature Summary Revision History 93 Summary Data 93 Revision History 93

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide vi

CHAPTER 11 CHAPTER 12 CHAPTER 13

Feature Description 93 How it Works 94 Call Flows 94
Authorization with Required QoS Call Flow 94 Standards Compliance 96
Configuring HTTP or HTTPS and SSL for SBA Interface 97 Feature Summary 97 Summary Data 97 Revision History 97 Feature Description 98 How it Works 98 Configuring Support for HTTP or HTTPS and TLS 99 Configuring Server and Client Certificates 99 Obtaining the Private key 100 Verifying the Certificate Status 100 HTTP and SSL for SBA Interface OA&M Support 100 Statistics 100
Content Filtering 101 Feature Summary and Revision History 101 Summary Data 101 Revision History 101 Feature Description 101 Configuration Support for Content Filtering 102 CiscoContentFilteringPolicy 102
Diameter Endpoint 103 Feature Summary and Revision History 103 Summary Data 103 Revision History 103 Feature Description 104 Configuring the Node for the Diameter Endpoint Pod 104

Contents

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide vii

Contents

CHAPTER 14 CHAPTER 15 CHAPTER 16

Dummy N7 Notify Request 107 Feature Summary and Revision History 107 Summary Data 107 Revision History 107 Feature Description 108 How it Works 108 Configuration Support for the Dummy N7 Notify Request 108 Creating the STG for the N7 Notify Request 109 Configuring the Dummy N7 Notify Parameters 109 Configuring the Event Triggers 109
Dynamic ARP Functionality for PC and PV 111 Feature Summary and Revision History 111 Summary Data 111 Revision History 111 Feature Description 112 How it Works 112 Configuring CRD Table and RxSTGConfiguration AVP 112 Adding Rx_Dynamic_Capability and Rx_Dynamic_Vulnerability 112 Configuring RxSTGConfiguration AVP 113 Configuring CRD Table and N5STGConfiguration AVP 114 Adding N5_Dynamic_Capability and N5_Dynamic_Vulnerability 114 Configuring N5STGConfiguration AVP 114 OAM Support 115 Bulk Statistics Support 115 Modified Stats 117
Dynamic ARP Functionality for PL 119 Feature Summary and Revision History 119 Summary Data 119 Revision History 119 Feature Description 119 How it Works 120

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide viii

CHAPTER 17 CHAPTER 18 CHAPTER 19

Feature Configuration 120 Configuring N5STGConfiguration for Dynamic QoS ARP 120
Dynamic Rules and Table-Driven Charging Rules 123 Feature Summary and Revision History 123 Summary Data 123 Revision History 123 Feature Description 123 Standards Compliance 124 Restrictions 124 Configuration Support for Dynamic and Table-Driven Charging Rules 125 TableDrivenQosDecision 125 TableDrivenDynamicPccRule 127
Flexible QoS Actions 129 Feature Summary and Revision History 129 Summary Data 129 Revision History 129 Feature Description 129 Configuring QoS Actions on N7 Interface 130 OverrideSessionRule 130
Handling the Network Provided Location Information Requests 133 Feature Summary and Revision History 133 Summary Data 133 Revision History 133 Feature Description 134 How it Works 134 Considerations 134 Call Flows 135 NPLI in Rx RAR Call Flow 135 NPLI in Rx STA Call Flow 137 Required Access Information in STR Call Flow 139 NPLI in N5 Notify Call Flow 141

Contents

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide ix

Contents

CHAPTER 20 CHAPTER 21 CHAPTER 22

NPLI in N5 Delete Response Call Flow 143 Required Access Information in N5 Delete Request Call Flow 145 Enabling the NetLoc Feature 147
Heartbeat 149 Feature Summary and Revision History 149 Summary Data 149 Revision History 149 Feature Description 150 How it Works 150 Standards Compliance 151 Configuring the Cluster Load Attribute 151
LDAP and Sh Interface 153 Feature Summary and Revision History 153 Summary Data 153 Revision History 153 Feature Description 153 Call Flows 154 Sh Interface Call Flow 154 Configuring PCF to use LDAP 155 Setting Up Additional Profile Data 155 Associating PCF with LDAP 157
Managing Custom Reference Data 159 Feature Summary and Revision History 159 Summary Data 159 Revision History 159 Feature Description 159 Configuration Support for Importing CRD 160 Backing Up the Existing SVN Repository 160 Backing Up the Existing CRD 161 Removing the Existing CRD from MongoDB 162 Importing and Publishing the New CRD Schema 162

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide x

CHAPTER 23 CHAPTER 24 CHAPTER 25

Importing the New CRD Table 165
Message Prioritization and Overload Handling 167 Feature Summary and Revision History 167 Summary Data 167 Revision History 167 Feature Description 167 How it Works 168 Feature Configuration 168 Configuring Inbound Message Overload Handling 168 Diameter Configuration 169 PCF Configuration 173 Configuring SBI-Message-Priority Prioritization 177 OAM Support 178 Bulk Statistics Support 178
Multiple Virtual IP Address 181 Feature Summary and Revision History 181 Summary Data 181 Revision History 181 Feature Description 182 Architecture 182 How it Works 183 Configuration Support for Multiple Virtual IP Address 183 Configuring the REST Endpoints 183 Verifying the REST Endpoints Configuration 185
mTLS on SBA Interfaces 187 Feature Summary Revision History 187 Summary Data 187 Revision History 187 Feature Description 187 How it Works 188 Standards Compilance 188

Contents

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide xi

Contents

CHAPTER 26 CHAPTER 27

Feature Configuration 188 Configuring mTLS for REST Endpoints Using HTTPS 188
N5 Authorization 189 Feature Summary and Revision History 189 Summary Data 189 Revision History 189 Feature Description 189 Architecture 190 Components 190 How it Works 190 Call Flows 191 All Bearers Are Rejected Call Flow 191 Few Bearers Are Rejected Call Flow 192 Existing Bearers Are Rejected Call Flow 194 Considerations 195 Limitations 195 Feature Configuration 196 Creating the STG Tables 196 Adding the N5AuthorizationSTGConfiguration Service 197 Configuring the Service Chaining 197 Rejecting the N5 Create Request with Missing MediaType IE 198 Setting Up the Delayed Message Schedule 198 N5 Profile 198
N7 Notify Retry Based on Error Codes 201 Feature Summary and Revision History 201 Summary Data 201 Revision History 201 Feature Description 201 How it Works 202 Call Flows 202 N7 Notify Retry on Error code Call Flow 202

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide xii

Contents

CHAPTER 28 CHAPTER 29 CHAPTER 30

Network Repository Function Subscription to Notifications 205 Feature Summary and Revision History 205 Summary Data 205 Revision History 205 Feature Description 205 Standards Compliance 206 Configuration Support for the NRF Subscription to Notifications 206 Configuring NRF with Multiple Base URLs 207 Configuring NRF for Registration 207 Configuring NRF for Discovery of Network Function 208 Troubleshooting Information 209
Network Slicing 211 Feature Summary and Revision History 211 Summary Data 211 Revision History 211 Feature Description 212 Architecture 212 How it Works 212 Call Flows 212 Slice Validation and Slice-Specific Policy Generation Call Flow 212 Configuring the Network Slicing Feature 213 Configuring the Reject Requests Capability 213 Configuring the Custom Error Codes 214 Configuring the Allowed NSSAIs 214 Network Slicing OA&M Support 215 Statistics 215
NRF Registration Enhancement 217 Feature Summary and Revision History 217 Summary Data 217 Revision History 217 Feature Description 217

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide xiii

Contents

CHAPTER 31
CHAPTER 32 CHAPTER 33

How It Works 218 Feature Configuration 218
Configuring the Rest-ep Stop Leading on Failure Count 218 Configuring the Rest-ep Restart on Leader Change Count 218
NRF Interface 219 Feature Summary and Revision History 219 Summary Data 219 Revision History 219 Feature Description 220 How it Works 221 Standards Compliance 222 Configuring the PCF Profile 222 Defining the PCF Registration Status 224 Configuring the NRF Endpoint for Management Services 224 Configuring the NRF Endpoint Group 225 Configuring the Management Service 226 Configuring the NRF Endpoint for Discovery Service 227 Configuring the NRF Endpoint Group 227 Configuring the Discovery Service 229 Configuring the Local NF Endpoint 229
NRF Enhancements 233 Feature Summary and Revision History 233 Summary Data 233 Revision History 233 Feature Description 233 How it Works 234 Feature Configuration 234 Subscribe to Registered NRF 234 Configuring NRF HTTP Max Frame Size 234
N28 Interface 235 Feature Summary and Revision History 235

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide xiv

CHAPTER 34

Summary Data 235 Revision History 235 Feature Description 235 How it Works 236 Call Flows 237
Counter Subscription/Retrieval (N28 Session Creation) 237 Unsubscribe Counters (N28 Session Termination) 240 N28 Counter-Based Policy 240 Notification of Counter Changes from CHF 241 Configuration Support for the N28 Interface 242 SpendingLimitSubscription 242 RequestPolicyCounters 242 AvpServiceConfiguration 243 Troubleshooting 243 Configuring NF or Logical Groups 244 OAM Support 244 Statistics 244
Online Charging Enablement over N7 to SMF 245 Feature Summary and Revision History 245 Summary Data 245 Revision History 245 Feature Description 245 How it Works 246 Charging Information 246 Charging Data 246 Call Flows 246 Online and Offline Charging over N7 to SMF 246 Creating SM Policy 247 Updating SM Policy 249 Updating Notify SM Policy 250 Configuration Support for Online Charging 252 ChargingInformation 252 TableDrivenChargingDecision 252

Contents

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide xv

Contents

CHAPTER 35 CHAPTER 36

PCF Integration with Access and Mobility Function 253 Feature Summary and Revision History 253 Summary Data 253 Revision History 253 Feature Description 254 How it Works 254 Call Flows 254 Create Policy Association 255 Update Policy Association 255 Delete Policy Association 256 Terminate Policy Association 257 Update Notification Call Flow 259 Standards Compliance 260 Limitations 260 Configuration Support for the N15 Access and Mobility Policies 260 Configuring the N15 Policy Service 260 Configuring the N15 Policy Triggers 262 Configuring the N15 Policy Retrievers 262 Configuring the Stale Session Timer 263 Removing Stale Sessions 264
Charging Function Selection Based on NSSAI 267 Feature Summary Revision History 267 Summary Data 267 Revision History 267 Feature Description 268 How it Works 268 Call Flows 268 CHF Selection with Slice Information Call Flow 268 Standards Compliance 269 Feature Configuration 269 Configuring to Enable or Disable Slice Based CHF Selection 269 Configuring SNSSAIS of a Locally Configured CHF Client Profile 269

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide xvi

Contents

CHAPTER 37 CHAPTER 38 CHAPTER 39

OAM Support 270 Statistics 270
RAN and NAS Release Causes 271 Feature Summary Revision History 271 Summary Data 271 Revision History 271 Feature Description 271 How it Works 272 Call Flows 272 Request SMF for Report of RAN and NAS Release Causes Call Flow 272 Reporting RAN-NAS Release Causes to AF Call Flows 273 PCC Rule Installation and Modification Failures Call Flow 273 Deletion of Application Session with AF Call Flow 274 Notify RAN and NAS Release Causes for Termination of PDU Session Call Flow 275 Notify RAN and NAS Release Causes for SDF Deactivation Call Flow 276 Standards Compliance 277
Diameter Peer Load Rebalancing 279 Feature Summary and Revision History 279 Summary Data 279 Revision History 279 Feature Description 279 How it Works 280 Feature Configuration 280 View the Diameter Peer Connections Per Pod 280 Diameter Peer Disconnection 280
Persistent Storage for Policy Configuration 283 Feature Summary and Revision History 283 Summary Data 283 Revision History 283 Feature Description 284 How it Works 284

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide xvii

Contents

CHAPTER 40 CHAPTER 41 CHAPTER 42

Configuring Persistent Storage 284 Enabling Support for Persistent Storage 285 Assigning Persistent Storage 285
Configuring the Restore Capability 286
Pods and Services 287 Feature Summary and Revision History 287 Summary Data 287 Revision History 287 Feature Description 287 Pods 289 Services 291 Ports and Services 293 Limitations 294 Configuration Support for Pods and Services 294 Associating Pods to the Nodes 294 Viewing the Pod Details and Status 295 States 296
Policy Tracing and Execution Analyzer 297 Feature Summary and Revision History 297 Summary Data 297 Revision History 297 Feature Description 297 Architecture 298 How it Works 298 Configuration Support for the Policy Traces 298 Setting Up the Trace Database 298 Configuring the Trace Microservice Pod 299 Executing the Tracing Scripts 299 Managing the Trace Rules 299 Managing the Trace Results 301
Policy Control Request Triggers Over N7 303

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide xviii

CHAPTER 43
CHAPTER 44 CHAPTER 45

Feature Summary and Revision History 303 Summary Data 303 Revision History 303
Feature Description 303 Handling Out of Credit over N7 304
Configuring the Policy Control Request Trigger Events over N7 304
PCF Session Binding with Binding Support Function 305 Feature Summary Revision History 305 Summary Data 305 Revision History 305 Feature Description 306 How it Works 306 Call Flows 306 Creating Call Flow for Nbsf Management Register Service 306 Updating Call Flow for Nbsf Management Register Service 307 Deleting Call Flow for Nbsf Management Register Service 308 Feature configuration 309 Configuring BSF at OPS Center 309 Standards Compilance 309 OAM Support 309 Statistics 310
Predefined Rules and Rulebase 311 Feature Summaryand Revision History 311 Summary Data 311 Revision History 311 Feature Description 311 Configuration Support for Rule and Rulebase 312
Dynamic QoS Flow-based ADC Support 313 Feature Summary and Revision History 313 Summary Data 313 Revision history 313

Contents

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide xix

Contents

CHAPTER 46 CHAPTER 47

Feature Description 314 How It Works 314 Feature Configuration 315
Ops Center Configuration for ADC Support 315 Policy Builder Configuration for ADC Support 315 Call Flows 318 Dynamic QoS Flow-Based ADC Support Call Flow 319 Standards Compliance 320
Rx Authorization 321 Feature Summary and Revision History 321 Summary Data 321 Revision History 321 Feature Description 321 Architecture 322 Components 322 How it Works 322 Call Flows 323 All Bearers Are Rejected Call Flow 323 Few Bearers Are Rejected Call Flow 324 Existing Bearers Are Rejected Call Flow 326 Considerations 327 Limitations 327 Configuration Support for Rx Authorization 328 Creating the STG Tables 328 Adding the RxAuthorizationSTGConfiguration Service 329 Configuring the Service Chaining 329 Rejecting the AAR with the Missing Media-Type AVP 330 Setting Up the Delayed Message Schedule 330 Rx Client 330
Rx Interface for 4G and 5G 333 Feature Summary and Revision History 333 Summary Data 333

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide xx

CHAPTER 48 CHAPTER 49 CHAPTER 50

Revision History 334 Feature Description 334
Relationships 334 How it Works 334 Routing the Rx Diameter Requests 334
Configuring RxSTGConfiguration AVP 335
Site Isolation 337 Feature Summary and Revision History 337 Summary Data 337 Revision History 337 Feature Description 338 How it Works 338 Prerequisites 339 Configuring the Site Isolation Feature 339 Configuring the PCF Registration Status 339 Bringing Down the Primary Site 339 Determining the Pod Status 341 Bringing Up the Primary Site 341 Verifying if the Sessions are Synchronized 341 Verifying if the Primary Site is Up 342
Simless Emergency Feature 343 Feature Summary and Revision History 343 Summary Data 343 Revision History 343 Feature Description 343 How it Works 344 Feature Configuration 344 Add DNN to the Emergency DNN List 344 Update DNN Table 344 Add Is Emergency Variable in the Policy 345
Service 347

Contents

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide xxi

Contents

CHAPTER 51 CHAPTER 52

Feature Summary and Revision History 347 Summary Data 347 Revision History 347
Feature Description 348 Service 348 Adding a Service 348
Service Configuration 348 Use Case Templates 349
Configuring the Use Case Template 349 GenericServiceConfiguration 350 Common Parameters 351
Serviceability Diagnostics 357 Feature Summary and Revision History 357 Summary Data 357 Revision History 357 Feature Description 357 How It Works 358
Session Queries over LDAP 359 Feature Summary and Revision History 359 Summary Data 359 Revision History 359 Feature Description 360 How it Works 360 NAP Notifications 360 LDAP Queries 361 Call Flows 361 NAP Notification Call Flow 361 LDAP Server Initialization Call Flow 363 Enabling the Policy Server to Process the NAP and LDAP Queries 364 Configuring the gRPC Endpoint for PCF 364 Configuring the Forwarding Capability 364 Configuration Support for PCF-NAP Requests 367

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide xxii

CHAPTER 53

Prerequisites for PCF-NAP Requests 367 Configuring the Unified API 367 Setting a Limit on NAP Requests 368 Configuration Support for LDAP Endpoint 368 Configuring the LDAP Endpoint 368 Setting a Limit on LDAP Search Request 370 OAM Support 370 Statistics 370
Specification Compliance - N7 and N28 373 Feature Summary and Revision History 373 Summary Data 373 Revision History 373 Feature Description 374 Relationships 374 Components 374 N15 Interface 374 N28 Interface 374 N7 Interface 374 N5 Interface 374 Rx Interface 374 Configuration Support for the N7 and N28 Interface 375 SessionRule 376 SessionRuleAction 377 SessionRuleConditionData 377 QosData 378 TableDrivenQosDecision 379 TableDrivenDynamicPccRule 381 Use Case Initiators 382 Conditions of Input Variables 383 Retrievers 384 Configuring Retrievers through Custom Reference Data Table 384 Configuring Retrievers through Service Configuration 385

Contents

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide xxiii

Contents

CHAPTER 54 CHAPTER 55 CHAPTER 56

Status Monitoring Using Commands 387 Feature Summary and Revision History 387 Summary Data 387 Revision History 387 Feature Description 388 Viewing the Connection and Registration Status 388 Viewing the NFs Connected to PCF 389 Viewing the Discovered Endpoint 389 Fetching the Subscriber Sessions 390 Prerequisites for Fetching Subscriber Sessions 390 Configuring the Configuration File 391 Viewing the Subscriber Session Details 391
UDR Interface 393 Feature Summary and Revision History 393 Summary Data 393 Revision History 393 Feature Description 394 API Details 394 Parameter Details 394 AMPolicy Query Parameters 394 AmPolicyData 394 SmPolicy Query Parameters 395 SmPolicyData 395 How it Works 396 Call Flows 397 AM Policy Subscription Call Flow 397 SM Policy Subscription Call Flow 399 Configuring the UDR Base URL 400 Standards Compliance 400 Filtering the Profile Data 401
Serviceability KPIs Diagnostics Implementation 403

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide xxiv

CHAPTER 57 CHAPTER 58 CHAPTER 59

Feature Summary and Revision History 403 Summary Data 403 Revision History 403
Feature Description 403 How It Works 404
Support for OAUTH2 on PCF 405 Feature Summary and Revision History 405 Summary Data 405 Revision History 405 Feature Description 406 How It Works 406 Feature Configuration 406 Call Flows 407 OAuth2 Support Call Flow 407 Standards Compliance 407
Support for UDR Subscribe, Unsubscribe, and Notity 409 Feature Summary and Revision History 409 Summary Data 409 Revision History 409 Feature Description 410 How It Works 410 Call Flows 410 UDR Subscribe and Notify Call Flow 410 UDR Unsubscribe Call Flow 412 Feature Configuration 412 Rest End-Point configuration 413 Engine Configuration 413 Standards Compliance 413
User Agent Implementation 415 Feature Summary and Revision History 415 Summary Data 415

Contents

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide xxv

Contents

CHAPTER 60 CHAPTER 61
CHAPTER 62

Revision History 415 Feature Description 415 How It Works 416 Feature Configuration 416
Configuring to Enable or Disable the User-Agent-Specific-Info 416
Utilization of SMI Labels in the Network Policy 417 Feature Summary and Revision History 417 Summary Data 417 Revision History 417 Feature Description 417 How It Works 418
Update Requests Toward CHF 419 Feature Summary and Revision History 419 Summary Data 419 Revision History 419 Feature Description 420 How it Works 420 Standards Compliance 420 Configuration Support for Setting up the Update Requests 420 TableDrivenActionOverN28 420 SpendingLimitSubscription 422 Use Case Template Actions 423 Troubleshooting Information 423
VoNR through the Rx Interface 425 Feature Summary and Revision History 425 Summary Data 425 Revision History 425 Feature Description 426 Prerequisites 426 How it Works 426 Call Flows 426

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide xxvi

CHAPTER 63 CHAPTER 64

Session Create, Update, and Terminate Call Flow 426 Binding Database Query Failures Call Flow 429 Binding Database Query Call Flow 431 PCF Failover Call Flow 432 Standards Compliance 432 Limitations 433 Enabling Interaction Between PCF and PCRF for VoNR Calls 433 Configuring the Interface Between PCF and PCRF 433 VoNR through Rx Interface OA&M Support 434 Statistics 434
Advanced Tuning Parameters 435 Feature Summary and Revision History 435 Summary Data 435 Revision History 435 Feature Description 436 Configuration Support for the Advanced Tuning Parameters 436 Configuring the Async Threading Parameters 436 Configuring the HTTP2 Threading Parameters 437 Configuring the N7 Stale Session Error Codes 438 Configuring the Message Threshold Per Endpoint 438 Configuring the HTTP2 Heap Memory Tuning 439 OAM Support 439 Bulk Statistics Support 439
PCF Application-Based Alerts 441 Feature Summary and Revision History 441 Summary Data 441 Revision History 441 Feature Description 441 How it Works 442 Configuring Alert Rules 442 Viewing Alert Logger 443 Sample Alerts Configuration 444

Contents

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide

xxvii

Contents

CHAPTER 65 CHAPTER 66 CHAPTER 67

Interface-Specific Alerts 444 Message-Level Alerts 446 Process-Level Alerts 450 Call Flow Procedure Alerts 453 System Alerts 454
Event Logs 457 Feature Summary and Revision History 457 Summary Data 457 Revision History 457 Feature Description 457 How it Works 458 Viewing the Logs 458 Troubleshooting Information 458
Troubleshooting Information 459 Feature Summary and Revision History 459 Summary Data 459 Revision History 459 Debugging the PCF Deployment Issues 460 Issue with Refreshing the PCF Ops Center 461 Subscriber Not Found or Primary Key Not Found 463 Message Routing Issues 463 Collecting the Troubleshooting Information 464 Interface Error Codes 465 Forwarding logs to the Splunk Server 467 Pods stop running when PCF is upgraded through the Rolling Upgrade process 468
Sample PCF Configuration 471 Sample Configuration File 471

xxviii

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide

About this Guide

Note The documentation set for this product strives to use bias-free language. For purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. While any existing biased terms are being substituted, exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product.
This preface describes the Ultra Cloud Core 5G Policy Control Function Configuration and Administration Guide, the document conventions, and the customer support details.
· Conventions Used, on page xxix · Contacting Customer Support, on page xxx

Conventions Used

The following tables describe the conventions used throughout this documentation.

Notice Type Information Note

Description
Provides information about important features or instructions.

Caution

Alerts you of potential damage to a program, device, or system.

Warning

Alerts you of potential personal injury or fatality. May also alert you of potential electrical hazards.

Typeface Conventions
Text represented as a screen display

Description
This typeface represents displays that appear on your terminal screen, for example:
Login:

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide xxix

Contacting Customer Support

About this Guide

Typeface Conventions Text represented as commands
Text represented as a command variable
Text represented as menu or sub-menu names

Description
This typeface represents commands that you enter, for example: show ip access-list This document always gives the full form of a command in lowercase letters. Commands are not case sensitive.
This typeface represents a variable that is part of a command, for example: show card slot_number slot_number is a variable representing the applicable chassis slot number.
This typeface represents menus and sub-menus that you access within a software application, for example: Click the File menu, then click New

Contacting Customer Support
Use the information in this section to contact customer support.
Refer to the support area of http://www.cisco.com for up-to-date product documentation or to submit a service request. A valid username and password are required to access this site. Please contact your Cisco sales or service representative for additional information.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide xxx

1 C H A P T E R

5G Architecture

· Feature Summary and Revision History, on page 1 · Overview, on page 2 · Subscriber Microservices Infrastructure Architecture, on page 3 · Control Plane Network Function Architecture, on page 4
Feature Summary and Revision History

Summary Data
Table 1: Summary Data
Applicable Product(s) or Functional Area
Applicable Platform(s) Feature Default Setting Related Documentation

· PCF · SMF · UPF
SMI Not Applicable Not Applicable

Revision History
Table 2: Revision History
Revision Details First introduced.

Release Pre-2020.02.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 1

Overview

5G Architecture

Overview
The Ultra Cloud Core is Cisco's solution supporting 3GPP's standards for 5G new radio (NR) standalone (SA) mode. These standards define various network functions (NFs) based on the separation of control plane (CP) and user plane (UP) (for example CUPS) functionality for increased network performance and capabilities.
Control Plane Network Functions
The CP-related NFs that comprise the Ultra Cloud Core are based on a common architecture that is designed around the following tenants:
· Cloud-scale--Fully virtualized for simplicity, speed, and flexibility. · Automation and orchestration--Optimized operations, service creation, and infrastructure. · Security--Multiple layers of security across the deployment stack from the infrastructure through the
NF applications. · API exposure--Open and extensive for greater visibility, control, and service enablement. · Access agnostic--Support for heterogeneous network types (for example 5G, 4G, 3G, Wi-Fi, and so on).
These control plane NFs are each designed as containerized applications (for example microservices) for deployment through the Subscriber Microservices Infrastructure (SMI). The SMI defines the common application layers for functional aspects of the NF such as life-cycle management (LCM), operations and management (OAM), and packaging.
Figure 1: Ultra Cloud Core CP Architectural Components

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 2

5G Architecture

User Plane Network Function

User Plane Network Function
The 5G UP NF within the Ultra Cloud Core is the User Plane Function (UPF). Unlike the CP-related NFs, the 5G UPF leverages the same Vector Packet Processing (VPP) technology currently in use by the user plane component within Cisco 4G CUPS architecture. This commonality ensures the delivery of a consistent set of capabilities between 4G and 5G such as:
· Ultrafast packet forwarding.
· Extensive integrated IP Services such as Subscriber Firewall, Tethering, Deep-Packet Inspection (DPI), Internet Content Adaption Protocol (ICAP), Application Detection and Control (ADC), and header enrichment (HE).
· Integrated third-party applications for traffic and TCP optimization.
Subscriber Microservices Infrastructure Architecture
The Ultra Cloud Core (UCC) Subscriber Microservices Infrastructure (SMI) is a layered stack of cloud technologies that enable the rapid deployment of, and seamless life-cycle operations for microservices-based applications.
The SMI stack consists of the following:
· SMI Cluster Manager--Creates the Kubernetes (K8s) cluster, creates the software repository, and provides ongoing LCM for the cluster including deployment, upgrades, and expansion.
· Kubernetes Management--Includes the K8s primary and etcd functions, which provide LCM for the NF applications that are deployed in the cluster. This component also provides cluster health monitoring and resources scheduling.
· Common Execution Environment (CEE)--Provides common utilities and OAM functionalities for Cisco Cloud native NFs and applications, including licensing and entitlement functions, configuration management, telemetry and alarm visualization, logging management, and troubleshooting utilities. Also, it provides consistent interaction and experience for all customer touch points and integration points in relation to these tools and deployed applications.
· Common Data Layer (CDL)--Provides a high performance, low latency, stateful data store, designed specifically for 5G and subscriber applications. This next generation data store offers high availability in local or geo-redundant deployments.
· Service Mesh--Provides sophisticated message routing between application containers, enabling managed interconnectivity, extra security, and the ability to deploy new code and new configurations in low risk manner.
· NB Streaming--Provides Northbound Data Streaming service for billing and charging systems.
· NF or Application Worker Nodes--The containers that comprise an NF application pod.
· NF or Application Endpoints (EPs)--The NFs or applications and their interfaces to other entities on the network
· Application Programming Interfaces (APIs)--Provides various APIs for deployment, configuration, and management automation.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 3

Control Plane Network Function Architecture

5G Architecture

The following figure depicts how these components interconnect to comprise a microservice-based NF or application.
Figure 2: SMI Components

For more information on SMI components, see Ultra Cloud Core Subscriber Microservices Infrastructure and the related-documentation at Deployment Guide > Overview chapter.
Control Plane Network Function Architecture
Control plane (CP) NFs are designed around a three-tiered architecture that take advantage of the stateful or stateless capabilities that are afforded within cloud native environments. The architectural tiers are as follows:
· Protocol Load Balancer Services--These are stateless microservices that are primarily responsible for dynamic discovery of application containers as well as for protocol proxy and termination. These include traditional 3GPP protocols and new protocols that are introduced with 5G.
· Applications Services--Responsible for implementing the core application or business logic, these are the stateless services that render the actual application based on the received information. This layer may contain varying degrees of microservice granularity. Application services are stateless.
· State management services--Enable stateless application services by providing a common data layer (CDL) to store or cache state information (for example session and subscriber data). This layer supports various data storage technologies from in-memory caches to full-fledge databases.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 4

5G Architecture Figure 3: Control Plan Network Function Tiered Architecture

Control Plane Network Function Architecture

The three-tiered architecture on which Cisco CP NFs are designed fully support the 5G core (5GC) Service-based Architecture (SBA) defined by 3GPP. These NFs communicate with each other and with third-party NFs over the Service-based Interface (SBI) using HTTP/2 over TCP as defined by 3GPP.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 5

Control Plane Network Function Architecture Figure 4: Cisco CP NF Service-based Architecture Support

5G Architecture

For more information on the Cisco network functions, see their corresponding network function documentation.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 6

2 C H A P T E R

PCF Overview

· Product Description, on page 7

Product Description
The Cisco Policy Control Function (PCF) is one of the control plane network functions (NF) of the 5G core network (5GC). Cisco PCF is an evolution from Cisco Policy and Charging Rules Function (PCRF) on the existing Cisco Policy Suite Cloud Native Docker container-based platform.
In the 5G network, PCF has the following features and functions:
· Support 5G QoS policy and charging control functions and the related 5G signaling interfaces. The 3GPP standards, such as N5, N7, N15, N28, N36, and Rx, define these interfaces for the 5G PCF.
· Provide policy rules for control plane functions, which include network slicing, roaming, and mobility management.
· Collect the subscriber metrics in context with their network, usage, applications, and more. The operators analyze this information to optimize resources and make informed decisions to segment users.
· Provide the real-time management of subscribers, applications, and network resources based on the business rules configured for a service provider.
· Accelerate and simplify deployment and upgrades using the ConfD CLI, increased speed and efficiency, and low latency by adopting the cloud-native implementation.
· Collaborate with other NFs through NRF, which provides a unified communication platform for the NFs to interact with each other.
For information on how to deploy and configure PCF, see Deploying and Configuring PCF through Ops Center, on page 15.

Use Cases

The policy charging solution can be potentially applied to address various business scenarios. Some of the key application scenarios are described in this section.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 7

Base PCF Configuration

PCF Overview

Base PCF Configuration
PCF base configuration provides a detailed view of the configurations that are required for making PCF operational. This includes setting up the infrastructure to deploy PCF, deploying PCF through SMI, and configuring the Ops Center for exploiting the PCF capabilities over time.
This use case involves the following steps:
1. Prerequisites--Provides the list of resources that are required to deploy PCF in your environment successfully. See Prerequisites, on page 16 for details.
2. Deployment through SMI--All the 5G network functions are deployed through the SMI platform. The platform simplifies the cloud-native NF deployments and monitors the NF performance while providing an integrated experience.
See Deploying PCF, on page 16 for details.
3. Configuring Ops Center--The PCF Ops Center provides an intuitive console for interacting with PCF in terms of configuring and gaining visibility into resources and features that you have subscribed to.
The Ops Center lets you review the current and historical configurations corresponding to your environment. See Accessing the PCF Ops Center, on page 16 for details.

Infrastructure

With moving to 5G Core, Cisco has built PCF to have a robust and flexible infrastructure. Considering the rapidly evolving industry trends in the area of capacity and bandwidth, the infrastructure is also continuously altered by converging various components to make it more reliable, scalable, and secure.
Some of the key integrations that PCF infrastructure has undergone include the Cisco Common Data Layer--PCF supports the Geographic Redundancy (GR) for the Cisco Common Data Layer (CDL). See Cisco Common Data Layer, on page 71 for more information.

Interoperability with CHF
Complying with the charging architecture published in 3GPP December 2018 release 15. In the 5G Service-based architecture, PCF interoperates with the CHF. For instance, PCF determines the policy decisions that are based on the status of the policy counters available in the CHF.
This use case involves the following steps:
· N28 Interface--PCF allows retrieval of policy counters and their use in policy decisions. See N28 Interface, on page 235 for details.
· Forwarding the NAP and LDAP requests--The Policy Server relies upon the NAP and LDAP server to collect the subscriber details. With the revised Policy Server, PCF processes the subscriber detail requests and sends it to the appropriate function that is PCF or PCRF. It determines the function considering the technology that the subscriber has subscribed to. See Session Queries over LDAP, on page 359 for details.

Interoperability with NRF
The Network Repository Function (NRF) is one of the key network entities in the 5G Core Network (5GC). It primarily maintains the NF profile of the available NF instances and their supported services. It permits the NF instances to subscribe to, and get notified about the registration in NRF of new NF instances. The NRF supports the service discovery function by receiving the NF Discovery Requests from NFs and providing the information of the available NF instances by satisfying specific criteria such as supporting a given service.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 8

PCF Overview

Configuring LDAP for Subscriber Query

This use case involves the following:
· NRF Interface--The NRF offers a platform for the NFs to communicate with each other and to exchange information for carrying out their operations. However, to build this communication framework, the NFs similar to PCF must register their profiles and services with the NRF. The NFs use the NRF's native management and discovery services to establish this framework. See NRF Interface, on page 219 for details.
· NRF Subscription to Notifications--PCF supports NRF and the associated repository functions such as the interface discovery, registration for renaming NRF, change type, and removal or addition of new API attributes. PCF extends this support as per the 3GPP December 2018 specification compliance. See Network Repository Function Subscription to Notifications, on page 205 for details.
· Heartbeat--The NF heartbeat configuration enables the network functions to notify their operational status to the NRF periodically. PCF invokes a heartbeat at the configured intervals. If the NRF is unavailable, then PCF switches between the registered primary, secondary, and tertiary NRF depending on their availability. See Heartbeat, on page 149 for more information.
· N28 Interface--PCF discovers the NFs based on the Instance ID which the NFs provide such as CHF and UDR. See for N28 Interface, on page 235 and UDR Interface, on page 393 for details.

Configuring LDAP for Subscriber Query
The policy charging solution combines with LDAP to sends and receives trusted information about the modified subscriber or subscriber details through the LDAP interface.
PCF has constructed the following capabilities to optimize the services that LDAP offers:
· PCF as an LDAP Client
LDAP and Sh Interface--PCF acts as an LDAP client and establishes communication with Home Subscriber Server (HSS) and downloads the subscription profile over a Sh Interface. This enables PCF to update the policies automatically in the SMF when the Sh, LDAP, or local configuration sends a subscription change notification. See LDAP and Sh Interface, on page 153 for details.
· PCF as an LDAP Server
Forwarding the NAP and LDAP requests--PCF acts as an LDAP server. The Policy Server relies upon NAP and the LDAP server to collect the subscriber details. With the revised Policy Server, it now processes the subscriber detail requests and sends it to the appropriate function that is PCF or PCRF. It determines the function considering the technology that the subscriber has subscribed to. See Session Queries over LDAP, on page 359 for details.

Parity with 4G

4G introduced cutting-edge solutions that redefined the way humans consumed cellular technology. It turned out to be an inherent part of exponential growth and amplified human advancement with AI, IoT, and other applications that exploit the technology. When 5G was conceived, some of the key capabilities of 4G were rebuilt on the 5G's tech stack and infrastructure to provide a more scalable and positive experience to the customer base.
PCF has adopted the following feature from the 4G implementation:
Rx Authorization--PCF provides a method for service providers to regulate the services available to individual subscribers. You can configure the bearer-level regulation through the configuration of the Rx Authorization.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 9

VoNR

PCF Overview

VoNR

The configuration lets you control the services available to each subscriber. See Rx Authorization, on page 321 for details.
In the new 5G spectrum, the subscribers are aware of the transitioning infrastructure that offers high-speed, increased capacity, reduced cost, real-time interaction, and other innovative offerings. However, the expectation that is associated with telecommunication still revolves around making regular voice calls, emergency calls, exceeding quality audio, and sending SMS. Service providers are being competitive over providing a positively differentiated experience to the user while making the Audio, Video, and Emergency calls. Like 4G, the providers can access the VoNR through PCF, which is the preferred approach.
This use case involves the following:
· VoNR through the Rx Interface--With PCF in 5G supporting full Diameter stack with the supported standard Diameter Rx interfaces, PCF accepts Rx messages for processing and Rx session binding with N7 sessions. See VoNR through the Rx Interface, on page 425 for details.
· Specification Compliance - N5, N7 and N28--Enhancements to the N7 and N28 interfaces of PCF to comply with the 3GPP December 2018 specification and enhancements to the N5 interface of PCF to comply with the 3GPP December 2020 specification. See Specification Compliance - N7 and N28, on page 373 for details.
· Predefined Rule and Rulebase--Provision to configure PCC rule ID for predefined rule and rulebase is available in PCF. SMF uses these rules when configuring the User Plane Function (UPF) for performing data flow tasks, such as shaping, policing to provide bandwidth, and charging functions. See Predefined Rules and Rulebase, on page 311 for more information.
· Dynamic Rules and Table-driven Charging Rules--PCF supports the provisioning of the table-driven dynamic charging rules. See Dynamic Rules and Table-Driven Charging Rules, on page 123 for more information.
· Dummy N7 Notify Request--If PCF has not subscribed to specific event triggers during the session initiation, it can send a dummy N7 Notify Request, which is an intermediate request to fetch those event triggers. The events must correspond to the configured Media-Type specified in the AAR message from the IMS. See Dummy N7 Notify Request, on page 107 for more information.

Deployment Architecture and Interfaces
The Cisco PCF is part of the 5G core network functions portfolio with a common mobile core platform architecture. These network functions include Access and Mobility Management Function (AMF), Session Management Function (SMF), Network Function Repository Function (NRF), Policy Control Function (PCF), Network Slice Selection Function (NSSF), and User Plane Function (UPF).
PCF Architecture
The PCF architecture is built on a multi-layer platform, which enables efficient policy control and management in the 5G Core network.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 10

PCF Overview Figure 5: PCF Architecture

PCF Architecture

At a high level, the components in the architecture perform the following: 1. External Endpoint
· REST-EP--It is a RESTful interface, which provides a channel for the 5G inbound and outbound messages.
· LDAP-EP, UAPI, and CRD API--Provides interfaces for PCF communications. · Diameter-EP--Responsible for routing the Diameter traffic.
2. Processing Layer · grPC--Provides a framework that enables the internal processes to communicate with each other and synchronize their events. · PCF-Engine--Hosts the business logic of PCF and responsible for driving the rules engine for making crucial policy decisions.
3. Configurations · Policy Builder--Allows configuration of the PCF cluster of virtual machines (VMs) and configuration of services and advanced policy rules. · PCF Central--Provides a unified GUI that allows you to configure Policy Builder, manage custom reference table data, and start the Web-based applications and utilities. · Ops Center--Allows you to configure and manage the applications and pods configuration.
4. Storage Layer · Binding Database Client--Provisions the client to look up the PCRF Mongo Binding Database for information about the secondary key lookup across 4G and 5G. · MongoDB--Preserves the subscriber-specific, balance data, and admin configuration data.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 11

PCF Deployment Architecture

PCF Overview

· Session store--Contains the data which CDL accesses for processing a session persistence activity. Stores the PCF sessions.
· Etcd--Contains the Diameter endpoint configurations.
PCF Deployment Architecture
The PCF reduces the deployment complexity by integrating PCRF and PCF in a unified environment. The following figure illustrates the PCF deployment.
Figure 6: PCF Deployment

Note

· The PCRF's deployment architecture includes:

· One Region = Two sites. Each site has one cluster (total two clusters in a region).

· Noncloud-native deployment along with cloud-native 5G PCF.

· External binding database is the local database for PCRF.

· MongoDB is the dedicated session database for PCRF.

· The PCF's deployment architecture includes: · One Region = Two sites. Each site has one cluster (total two clusters in a region). · Cloud-native deployment that deployed along with 4G PCRF. · Cisco CDL is the dedicated session database for PCF.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 12

PCF Overview

Supported Interfaces

Supported Interfaces
PCF and other NFs in 5GC use the following: · Rx­ Reference point for interworking with AF, PCRF, and PCF · N5­ Reference point between PCF and AF · N7­ Reference point between PCF and SMF · N15­ Reference point between PCF and AMF · N28­ Reference point between PCF and CHF · N36­ Reference point between PCF and UDR · LDAP­ Reference point between PCF and external subscriber profile

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 13

Supported Interfaces

PCF Overview

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 14

3 C H A P T E R

Deploying and Configuring PCF through Ops Center

· Feature Summary and Revision History, on page 15 · Feature Description, on page 15 · Deploying and Accessing PCF, on page 16
Feature Summary and Revision History

Summary Data
Table 3: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Default Setting Related Documentation

PCF SMI Enabled ­ Always-on Not Applicable

Revision History
Table 4: Revision History
Revision Details First introduced.

Release 2020.01.0

Feature Description
The PCF deployment and configuration process involve deploying PCF through the SMI Deployer and configuring the settings or customization through the PCF Ops Center. The Ops Center is based on the ConfD

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 15

PCF Ops Center

Deploying and Configuring PCF through Ops Center

CLI. Configuration of PCF also includes the NRF profile data configuration and setting up the externally visible IP address and port numbers.
PCF Ops Center
The PCF Ops Center allows you to configure the PCF features such as configuring the license, PCF Engine, REST endpoint, and CDL. You can also configure the NRF components that enable the interworking of various NFs. Policy Ops Center reuses the existing Ops Center image from mobile-cnat-infrastructure, and is accessible via the ingresses that are defined by that chart.
Prerequisites
Before deploying PCF on the SMI layer, complete the following prerequisites. · Ensure that all the virtual network functions (VNFs) are deployed. · Run the SMI sync operation for the PCF Ops Center and Cloud Native Common Execution Environment (CN-CEE).
Deploying and Accessing PCF
This section describes how to deploy PCF and access the PCF Ops Center. Deploying PCF involves the following steps: 1. Deploying PCF 2. Accessing the PCF Ops Center
Deploying PCF
The Subscriber Microservices Infrastructure (SMI) platform is responsible for deploying and managing the Cloud Native 5G PCF application and other network functions. For information on how to deploy PCF Ops Center on a vCenter environment, see Configuring the vCenter Environment section in Ultra Cloud Core SMI Cluster Deployer Operations Guide. For deploying PCF Ops Center on an OpenStack environment, see UAME-based VNF Deployment section in the UAME-based 4G and 5G VNF Deployment Automation Guide, Release 6.9. For information on how to deploy PCF Ops Center on bare metal servers (currently Cisco UCS-C servers) environment, see Operating the SMI Cluster Manager on Bare Metal section in Ultra Cloud Core Subscriber Microservices Infrastructure -- Operations Guide.
Accessing the PCF Ops Center
This section describes how to access the PCF Ops Center.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 16

Deploying and Configuring PCF through Ops Center

Accessing the PCF Ops Center

You can access the PCF Ops Center from the console application or the Web-based CLI console. Depending upon your selection, access one of the following from the master node: 1. CLI:
ssh admin@ops_center_pod_ip -p 2024
2. Web-based console: a. Log in to the Kubernetes master node. b. To view the available ingress connections, use the following configuration: kubectl get ingress namespace The available ingress connections are displayed. c. Select the appropriate ingress from where you want to run Ops Center and open the following URL from the browser: cli.namespace-ops-center.ip_address.nip.io

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 17

Accessing the PCF Ops Center

Deploying and Configuring PCF through Ops Center

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 18

4 C H A P T E R

Smart Licensing

· Feature Summary and Revision History, on page 19 · Smart Software Licensing, on page 19 · Configuring Smart Licensing, on page 22 · OAM Support, on page 31
Feature Summary and Revision History

Summary Data
Table 5: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Disabled ­ Configuration required to enable Not Applicable

Revision History
Table 6: Revision History
Revision Details First introduced.

Release 2020.02.0

Smart Software Licensing
Smart Licensing is a cloud-based approach to licensing that simplifies the purchase, deployment, and management of Cisco software assets. Entitlements are purchased through your Cisco account via Cisco Commerce Workspace (CCW) and immediately deposited into your Virtual Account for usage. This eliminates

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 19

Cisco Software Central

Smart Licensing

the need to install license files on every device. Products that are smart enabled communicate directly to Cisco to report consumption. Cisco Software Central (CSC) is a single location which is available to customers to manage Cisco software licenses. License ownership and consumption are readily available to help make better purchase decision based on consumption or business need. See https://www.cisco.com/c/en/us/buy/smart-accounts/software-licensing.html for more information about Cisco Smart Licensing.
Cisco Software Central
Cisco Software Central (CSC) enables the management of software licenses and Smart Account from a single portal. The interface allows you to activate your product, manage entitlements, and renew and upgrade software. A functioning Smart Account is required to complete the registration process. To access the Cisco Software Central, see https://software.cisco.com.
Smart Accounts/Virtual Accounts
A Smart Account provides a single location for all Smart-enabled products and entitlements. It helps speed procurement, deployment, and maintenance of Cisco Software. When creating a Smart Account, you must have the authority to represent the requesting organization. After submitting, the request goes through a brief approval process.
A Virtual Account exists as a subaccount within the Smart Account. Virtual Accounts are a customer-defined structure based on organizational layout, business function, geography, or any defined hierarchy. They are created and maintained by the Smart Account administrator.
See https://software.cisco.com to learn about, set up, or manage Smart Accounts.
Request a Cisco Smart Account
A Cisco Smart Account is an account where all products enabled for Smart Licensing are deposited. A Cisco Smart Account allows you to manage and activate your licenses to devices, monitor license use, and track Cisco license purchases. Through transparent access, you have a real-time view into your Smart Licensing products. IT administrators can manage licenses and account users within your organization's Smart Account through the Software Central. 1. In a browser window, enter the following URL:
https://software.cisco.com
2. Log in using your credentials, and then click Request a Smart Account in the Administration area. The Smart Account Request window is displayed.
3. Under Create Account, select one of the following options: · Yes, I have authority to represent my company and want to create the Smart Account ­ If you select this option, you agree to authorization to create and manage product and service entitlements, users, and roles on behalf of your organization.
· No, the person specified below will create the account ­ If you select this option, you must enter the email address of the person who will create the Smart Account.
4. Under Account Information:

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 20

Smart Licensing

PCF Smart Licensing

a. Click Edit beside Account Domain Identifier. b. In the Edit Account Identifier dialog box, enter the domain, and click OK. By default, the domain
is based on the email address of the person creating the account and must belong to the company that will own this account. c. Enter the Account Name (typically, the company name).
5. Click Continue. The Smart Account request will be in pending status until it is approved by the Account Domain Identifier. After approval, you will receive an email confirmation with instructions to complete the setup process.
PCF Smart Licensing
At present, the Smart Licensing feature supports application entitlement for online and offline licensing for all Cisco 5G applications (PCF and SMF). The application usage is unrestricted during all stages of licensing including Out of Compliance (OOC) and expired stages.

Note A 90-day evaluation period is granted for all licenses in use. Currently, the functionality and operation of the 5G applications is unrestricted even after the end of the evaluation period.

Software Tags and Entitlement Tags
Tags for the following software and entitlements have been created to identify, report, and enforce licenses.
Software Tags Software tags uniquely identify each licensable software product or product suite on a device. The following software tags exist for the PCF.
Product Type / Description Software Tag Ultra Cloud Core - Policy regid.2020-04.com.cisco.PCF,1.0_a0b80e76-1cc3-4a0f-bbf5-c7a8dafea5f8 Control Function (PCF), Base Minimum

Entitlement Tags The following entitlement tags identify licenses in use:

Product Type / Description

Entitlement Tag

Ultra Cloud Core - Policy regid.2020-04.com.cisco.PCF_BASE,1.0_60b1da6f-3832-4687-90c9-8879dc815a27 Control Function (PCF), Base Minimum

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 21

Configuring Smart Licensing

Smart Licensing

Note The license information is retained during software upgrades and rollback.
Configuring Smart Licensing
You can configure Smart Licensing after a new PCF deployment.
Users with Access to CSC
This section describes the procedure involved in configuring Smart Licensing for users with access to CSC portal from their internal environment.
Setting Up the Product and Entitlement in CSC Before you begin, you need to set up your product and entitlement in the CSC. To set up your product and entitlement: 1. Log in to your CSC account. 2. Click Add Product and enter the following details.
· Product name--Specify the name of the deployed product. For example, PCF. · Primary PM CEC ID--Specify the primary Project Manager's CEC ID for the deployed product. · Dev Manager CEC ID--Specify the Development Manager's CEC ID for the deployed product. · Description--(Optional) Specify a brief description of the deployed product. · Product Type--Specify the product type. · Software ID Tag--Specify the software ID Tag provided by the Cisco Account's team.
3. Click Create. 4. Select your product from the Product/Entitlement Setup grid. 5. Click Entitlement drop-down and select Create New Entitlement. 6. Select New Entitlement in Add Entitlement and enter the following details.
· Entitlement Name--Specify the license entitlement name. For example, PCF_BASE. · Description--(Optional) Specify a brief description about the license entitlement. · Entitlement Tag--Specify the entitlement tag provided by the Cisco Account's team. · Entitlement Type--Specify the type of license entitlement. · Vendor String--Specify the vendor name.
7. Click Entitlement Allocation. 8. Click Add Entitlement Allocation.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 22

Smart Licensing

Users with Access to CSC

9. In New License Allocation, provide the following details: · Product--Select your product from the drop-down list.
· Entitlement--Select your entitlement from the drop-down list.
10. Click Continue.
11. In New License Allocation window, provide the following details: · Quantity--Specify the number of licenses.
· License Type--Specify the type of license.
· Expiring Date--Specify the date of expiry for the license purchased.
12. Click Create.
13. Verify the status of Smart Licensing using the following command. show license all Example:
pcf# show license all
Smart Licensing Status ======================= Smart Licensing is ENABLED
Registration: Status: UNREGISTERED Export-Controlled Functionality: Not Allowed
License Authorization: Status: EVAL MODE Evaluation Period Remaining: 83 days, 0 hr, 15 min, 8 sec Last Communication Attempt: NONE
License Conversion: Automatic Conversion Enabled: true Status: NOT STARTED
Utility: Status: DISABLED
Transport: Type: CALLHOME
Evaluation Period: Evaluation Mode: In Use Evaluation Period Remaining: 83 days, 0 hr, 15 min, 8 sec
License Usage ============= License Authorization Status: EVALUATION MODE
Evaluation Period Remaining: 83 days, 0 hr, 15 min, 8 sec
UCC 5G PCF BASE (PCF_BASE) Description: Ultra Cloud Core - Policy Control Function (PCF), Base Minimum Count: 1 Version: 1.0 Status: EVAL MODE

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 23

Users with Access to CSC

Smart Licensing

Export status: RESTRICTED_NOTALLOWED Feature Name: <empty> Feature Description: <empty>
Product Information =================== UDI: PID:PCF,SN:6GKJ2OA-NMUWA7Y
Agent Version ============= Smart Agent for Licensing: 3.0.13
Registering Smart Licensing You need to register the product entitled to the license with CSC. To register, you need to generate an ID token from CSC. 1. Log in to your CSC account.
2. Choose General > New Token and enter the following details: · Description--Specify a brief description about the ID token.
· Expires After--Specify the number of days for the token to expire.
· Max. Number Users--Specify the maximum number users.
3. Click Create Token.
4. Select new ID token in Product Instance Registration Token.
5. Choose Actions > Copy.
6. Log in to PCF Ops Center CLI and paste the ID token using the following configuration: license smart register idtoken Example:
pcf# license smart register Value for 'idtoken' (<string>): MTI2Y2FlNTAtOThkMi00YTAxLWE4M2QtOTNhNzNjNjY4ZmFiLTE2MTc4N Tky%0AMTA5MDh8ck1jUHNwc3k1ZC9nWFFCSnVEcUp4QU1jTFoxOGxDTU5kQ3lpa25E%0Ab04wST0%3D%0A pcf#
7. Verify the status of Smart Licensing using the following command. show license all Example:
pcf# show license all
Smart Licensing Status ======================= Smart Licensing is ENABLED
Registration: Status: REGISTERED Smart Account: Cisco Systems, Inc. Virtual Account: PCF-SMF Export-Controlled Functionality: Allowed Initial Registration: SUCCEEDED on Apr 15 05:45:07 2020 GMT Last Renewal Attempt: SUCCEEDED on Apr 15 05:45:07 2020 GMT

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 24

Smart Licensing

Users with Access to CSC

Next Renewal Attempt: Oct 12 05:45:07 2020 GMT Registration Expires: Apr 15 05:40:31 2021 GMT
License Authorization: Status: AUTHORIZED on Apr 15 05:45:12 2020 GMT Last Communication Attempt: SUCCEEDED on Apr 15 05:45:12 2020 GMT Next Communication Attempt: May 15 05:45:12 2020 GMT Communication Deadline: Jul 14 05:40:40 2020 GMT
License Conversion: Automatic Conversion Enabled: true Status: NOT STARTED
Utility: Status: DISABLED
Transport: Type: CALLHOME
Evaluation Period: Evaluation Mode: Not In Use Evaluation Period Remaining: 83 days, 0 hr, 10 min, 43 sec
License Usage ============= License Authorization Status: AUTHORIZED as of Apr 15 05:45:12 2020 GMT
UCC 5G PCF BASE (PCF_BASE) Description: Ultra Cloud Core - Policy Control Function (PCF), Base Minimum Count: 1 Version: 1.0 Status: AUTHORIZED Export status: RESTRICTED_ALLOWED Feature Name: <empty> Feature Description: <empty>
Product Information =================== UDI: PID:PCF,SN:6GKJ2OA-NMUWA7Y
Agent Version ============= Smart Agent for Licensing: 3.0.13
NOTES:
· license smart register --Registers Smart Licensing with CSC.
· idtoken --Specify the ID token generated from CSC.
Deregistering Smart Licensing
You can deregister the registered product from Smart Licensing if required. 1. Log in to PCF Ops Center CLI and use the following configuration:
license smart deregister
Example:
pcf# license smart deregister pcf#

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 25

Users with Access to CSC

Smart Licensing

2. Verify the status of Smart Licensing using the following command.
show license all
Example:
pcf# show license all
Smart Licensing Status ======================= Smart Licensing is ENABLED
Registration: Status: UNREGISTERED Export-Controlled Functionality: Not Allowed
License Authorization: Status: EVAL MODE Evaluation Period Remaining: 83 days, 0 hr, 10 min, 43 sec Last Communication Attempt: NONE
License Conversion: Automatic Conversion Enabled: true Status: NOT STARTED
Utility: Status: DISABLED
Transport: Type: CALLHOME
Evaluation Period: Evaluation Mode: In Use Evaluation Period Remaining: 83 days, 0 hr, 10 min, 43 sec
License Usage ============= License Authorization Status: EVALUATION MODE
Evaluation Period Remaining: 83 days, 0 hr, 10 min, 43 sec
UCC 5G PCF BASE (PCF_BASE) Description: Ultra Cloud Core - Policy Control Function (PCF), Base Minimum Count: 1 Version: 1.0 Status: EVAL MODE Export status: RESTRICTED_NOTALLOWED Feature Name: <empty> Feature Description: <empty>
Product Information =================== UDI: PID:PCF,SN:6GKJ2OA-NMUWA7Y
Agent Version ============= Smart Agent for Licensing: 3.0.13
pcf#
NOTES:
· license smart deregister --Deregisters Smart Licensing from CSC.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 26

Smart Licensing

Users without Access to CSC

Users without Access to CSC
The Smart License Reservation feature ­ Perpetual Reservation ­ is reserved for customers without access to CSC from their internal environments. With this feature, Cisco allows customers to reserve licenses from their virtual account and tie them to their devices Unique Device Identifier (UDI). This enables customers to use their devices with reserved licenses in a disconnected mode. The subsequent sections describe the procedure involved in reserving Smart License for users without access to CSC from their internal environment.
Enabling Smart License Reservation You can enable Smart License reservation through PCF Ops Center CLI. 1. Log in to PCF Ops Center CLI and use the following configuration:
config terminal license smart reservation commit end
NOTES: · license smart reservation --Enables license reservation.
Generating Smart License Reservation Request Code You can generate the Smart License reservation request code through PCF Ops Center CLI. 1. Log in to PCF Ops Center CLI and using the following configuration to enable the reservation:
config terminal license smart reservation commit end
2. Use the following configuration to request a reservation code: license smart reservation request Example:
pcf# license smart reservation request reservation-request-code CJ-ZPCF:6GKJ2OA-NMUWA7Y-Ai75GxtBs-3B pcf# Message from confd-api-manager at 2020-04-15 05:51:37... Global license change NotifyReservationInProgress reason code Success - Successful. pcf#
NOTES: · license smart reservation --Enables license reservation request code.
· license smart reservation request --Generates the license reservation request code.
Important You need to copy the generated license request code from the PCF Ops Center CLI.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 27

Users without Access to CSC

Smart Licensing

Generating an Authorization Code from CSC You can generate an authorization code from CSC using the license reservation request code. 1. Log in to your CSC account.
2. Click License Reservation.
3. Enter the Request Code: Paste the license reservation request code copied from the PCF Ops Center CLI in the Reservation Request Code text-box.
4. Select the Licenses: Click the Reserve a Specific License radio button and select UCC 5G PCF BASE.
Note In the Reserve text-box enter the value 1.
5. Review your selection.
6. Click Generate Authorization Code.
7. Download the response file: The authorization code is generated and displayed on-screen. Click Download as File to download the authorization code.
8. Click Close.
Reserving Smart Licensing You can reserve Smart License for the deployed product using the authorization code generated in CSC. 1. Log in to PCF Ops Center CLI and use the following configuration:
license smart reservation install
authorization_code
Example:
pcf# license smart reservation install Value for 'key' (<string>): <specificPLR><authorizationCode><flag>A</flag><version>C</version> <piid>35757dc6-2bdf-4fa1-ba7e-4190f5b6ea22</piid><timestamp>1586929992297</timestamp> <entitlements><entitlement><tag>regid.2020-04.com.cisco.PCF_BASE,1.0_60b1da6f-3832-4687-90c9-8879dc815a27</tag> <count>1</count><startDate>2020-Apr-08 UTC</startDate><endDate>2020-Oct-05 UTC</endDate> <licenseType>TERM</licenseType><displayName>UCC 5G PCF BASE</displayName> <tagDescription>Ultra Cloud Core - Policy Control Function (PCF), Base Minimum</tagDescription> <subscriptionID></subscriptionID></entitlement></entitlements></authorizationCode> <signature>MEYCIQC/9v5LpgFoEk2l4omIgjjk83g5WXjzs09kQnsO8D0jRgIhAMh+D6DRuYmqh1TlfJoZxNte0fPKw6fHEY5CEF3+kPQj</signature> <udi>P:PCF,S:6GKJ2OA-NMUWA7Y</udi></specificPLR> pcf#
2. Verify the status of smart licensing using the following command. show license all Example:
pcf# show license all
Smart Licensing Status ======================= Smart Licensing is ENABLED

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 28

Smart Licensing

Users without Access to CSC

License Reservation is ENABLED
Registration: Status: REGISTERED - SPECIFIC LICENSE RESERVATION
Export-Controlled Functionality: Allowed Initial Registration: SUCCEEDED on Wed Apr 15 05:53:31 GMT 2020 Last Renewal Attempt: None
License Authorization: Status: AUTHORIZED - RESERVED on Wed Apr 15 05:53:31 GMT 2020
Utility: Status: DISABLED
Transport: Type: CALLHOME
Evaluation Period: Evaluation Mode: Not In Use Evaluation Period Remaining: 83 days, 0 hr, 5 min, 15 sec
License Usage =============
License Authorization Status: Status: AUTHORIZED - RESERVED on Wed Apr 15 05:53:31 GMT 2020
Last Communication Attempt: SUCCEEDED on Apr 15 05:53:31 2020 GMT Next Communication Attempt: NONE Communication Deadline: NONE
UCC 5G PCF BASE (PCF_BASE) Description: Ultra Cloud Core - Policy Control Function (PCF), Base
Minimum Count: 1 Version: 1.0 Status: AUTHORIZED
Export status: NOT RESTRICTED Feature Name: <empty> Feature Description: <empty> Reservation:
Reservation Status: SPECIFIC INSTALLED Total Reserved Count: 1 Term expiration: 2020-Oct-05 GMT
Product Information =================== UDI: PID:PCF,SN:6GKJ2OA-NMUWA7Y
Agent Version ============= Smart Agent for Licensing: 3.0.13
NOTES:
· license smart reservation install authorization_code ­ Installs a Smart License Authorization code.
Returning the Reserved License
You can return the reserved license to CSC if required. Use the following procedures to return the reserved license:

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 29

Users without Access to CSC

Smart Licensing

1. When the license reservation authorization code is installed in the PCF Ops Center. a. Log in to the PCF Ops Center CLI and use the following configuration: license smart reservation return Example:
pcf# license smart reservation return reservation-return-code CJ6m3k-RAvu6b-hMNmwf-mrdcko-NoSwKL-tF7orz-9aNtEu-yVjGAm-D6j pcf#
b. Copy the license reservation return code generated in PCF Ops Center CLI. c. Log in to your CSC account. d. Select your product instance from the list. e. Choose Actions > Remove. f. Paste the license reservation return code in Return Code text-box.
NOTES: · license smart reservation return ­ Returns a reserved Smart License.
2. When the license reservation authorization code is not installed in the PCF Ops Center. a. Log in to the PCF Ops Center CLI and use the following configuration to generate the return code. license smart reservation return
authorization_code
Important Paste the license reservation authorization code generated in CSC to generate the return code.
b. Log in to your CSC account. c. Select your product instance from the list. d. Choose Actions > Remove. e. Paste the license reservation return code in Return Code text-box.
3. Verify the status of smart licensing using the following command. show license all Example:
pcf# show license all
Smart Licensing Status ======================= Smart Licensing is ENABLED License Reservation is ENABLED
Registration: Status: UNREGISTERED Export-Controlled Functionality: Not Allowed

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 30

Smart Licensing

OAM Support

License Authorization: Status: EVAL MODE Evaluation Period Remaining: 83 days, 0 hr, 5 min, 15 sec Last Communication Attempt: SUCCEEDED on Apr 15 05:53:31 2020 GMT Next Communication Attempt: NONE Communication Deadline: NONE
License Conversion: Automatic Conversion Enabled: true Status: NOT STARTED
Utility: Status: DISABLED
Transport: Type: CALLHOME
Evaluation Period: Evaluation Mode: In Use Evaluation Period Remaining: 83 days, 0 hr, 5 min, 15 sec
License Usage ============= License Authorization Status: EVALUATION MODE
Evaluation Period Remaining: 83 days, 0 hr, 5 min, 15 sec
UCC 5G PCF BASE (PCF_BASE) Description: Ultra Cloud Core - Policy Control Function (PCF), Base Minimum Count: 1 Version: 1.0 Status: EVAL MODE Export status: RESTRICTED_NOTALLOWED Feature Name: <empty> Feature Description: <empty>
Product Information =================== UDI: PID:PCF,SN:6GKJ2OA-NMUWA7Y
Agent Version ============= Smart Agent for Licensing: 3.0.13
pcf#
OAM Support
This section describes operations, administration, and maintenance support for this feature.
Monitoring and Troubleshooting Smart Licensing
You can use the following show commands to display information about Smart Licensing in the PCF Ops Center.
show license [all | UDI | displaylevel | reservation | smart | status | summary | tech-support | usage]
NOTES:

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 31

Monitoring and Troubleshooting Smart Licensing

Smart Licensing

· all --Displays an overview of Smart Licensing information that includes license status and, usage, product information, and Smart Agent version.
· UDI --Displays Unique Device Identifiers (UDI) details. · displaylevel --Depth to display information. · reservation --Displays Smart Licensing reservation information. · smart --Displays Smart Licensing information. · status --Displays the overall status of Smart Licensing. · summary --Displays a summary of Smart Licensing. · tech-support --Displays Smart Licensing debugging information. · usage --Displays the license usage information for all the entitlements that are currently in use.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 32

5 C H A P T E R

Software Upgrade using Site Isolation Procedure

· Feature Summary and Revision History, on page 33 · Feature Description, on page 33 · Prerequisites, on page 34 · Pre-Upgrade Backup Steps, on page 34 · Post-Upgrade Verification Steps, on page 42
Feature Summary and Revision History

Summary Data
Table 7: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled - Always-on Not Applicable

Revision History
Table 8: Revision History
Revision Details First introduced.

Release 2023.02.0

Feature Description
The PCF supports the base images of all containers from the Ubuntu and Mongo versions, which got updated from 20.04 to 18.04 for the Ubuntu version and from 4.4 to the 4.0 version for Mongo containers. The Software

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 33

Prerequisites

Software Upgrade using Site Isolation Procedure

Upgrade using Site Isolation Procedure requires the site isolation and a method of procedures for execution during the maintenance window considering the upgrade path. The in-service updates aren't supported because there's no upgrade from Mongo 4.0 to 4.4.
Prerequisites
Ensure that the PCF system runs with the Pre April 2023 PCF release version.
Pre-Upgrade Backup Steps

Step 1

To start the upgrade, log in to the SMI Cluster Manager node as an Ubuntu user and verify all the pods and nodes are operational.
# SSh to Master node and if not all the pods and nodes are running please don't not proceed

cloud-user@pcf-cm-node-master-1:~$ kubectl get nodes -A

NAME

STATUS ROLES

AGE

VERSION

pcf-cm-node-master-1 Ready control-plane 6d15h v1.24.6

pcf-cm-node-master-2 Ready control-plane 6d14h v1.24.6

pcf-cm-node-master-3 Ready control-plane 6d14h v1.24.6

pcf-cm-node-worker-1 Ready <none>

6d14h v1.24.6

cloud-user@pcf-cm-node-master-1:~$ kubectl get pods -A

NAMESPACE

NAME

RESTARTS

AGE

cee-cee-pcf

alert-logger-6bc6fd558d-mw6ch

0

5d16h

cee-cee-pcf

alert-router-7c5c6576b8-jvc6h

0

5d16h

cee-cee-pcf

alertmanager-0

0

5d16h

cee-cee-pcf

alertmanager-1

0

5d16h

cee-cee-pcf

alertmanager-2

0

5d16h

cee-cee-pcf

alertmanager-config-sync-c9fcf48bd-r44bv

0

5d16h

cee-cee-pcf

blackbox-exporter-blq6p

0

5d16h

cee-cee-pcf

blackbox-exporter-dh76h

0

5d16h

cee-cee-pcf

blackbox-exporter-l9xhw

0

5d16h

cee-cee-pcf

bulk-stats-0

0

5d16h

cee-cee-pcf

bulk-stats-1

0

5d16h

cee-cee-pcf

cee-cee-pcf-product-documentation-547fd88785-zxd7h

0

5d16h

cee-cee-pcf

core-retriever-d2znn

0

5d16h

cee-cee-pcf

core-retriever-gm9dl

0

5d16h

cee-cee-pcf

core-retriever-hn65w

0

5d16h

pcf-ims

db-balance1-1

READY STATUS

1/1

Running

1/1

Running

2/2

Running

2/2

Running

2/2

Running

1/1

Running

1/1

Running

1/1

Running

1/1

Running

3/3

Running

3/3

Running

2/2

Running

2/2

Running

2/2

Running

2/2

Running

1/1

Running

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 34

Software Upgrade using Site Isolation Procedure

Pre-Upgrade Backup Steps

0

pcf-ims

0

pcf-ims

0

pcf-ims

0

pcf-ims

0

pcf-ims

0

pcf-ims

0

pcf-ims

0

pcf-ims

0

pcf-ims

0

registry

0

registry

0

registry

0

1/1

Running

registry

0

smi-certs

0

smi-ops-control

0

smi-vips

0

smi-vips

11

smi-vips

18

smi-vips

8

14h

db-balance1-2

14h

db-spr-config-0

14h

db-spr-config-1

14h

db-spr-config-2

14h

redis-keystore-0

14h

redis-keystore-1

14h

redis-queue-0

14h

zookeeper-1

14h

zookeeper-2

14h

charts-cee-2023-01-1-i20-0

6d

charts-cee-2023-01-1-i20-1

6d

charts-cee-2023-01-1-i20-2

6d

0

6d14h

software-unpacker-2

6d15h

ss-cert-provisioner-6cb559cf57-9rzzk

6d15h

opscenter-controller-647df69568-np6ql

6d15h

keepalived-l57sc

6d14h

keepalived-ls7mr

36d

keepalived-qssvm

36d

keepalived-v9fbl

36d

# Should be no output from the command below: cloud-user@pcf-cm-node-master-1:~$ kubectl get pods -A | grep 0/

# Should be no output from the command below:

cloud-user@pcf-cm-node-master-1:~$ kubectl get pods -A | grep -v Running

NAMESPACE

NAME

RESTARTS

AGE

1/1

Running

1/1

Running

1/1

Running

1/1

Running

2/2

Running

2/2

Running

2/2

Running

1/1

Running

1/1

Running

1/1

Running

1/1

Running

1/1

Running

1/1

Running

1/1

Running

1/1

Running

3/3

Running

3/3

Running

3/3

Running

3/3

Running

READY STATUS

# Verify Current version of the CEE and PCF and ensure the software is with pre-April release:

cloud-user@pcf-cm-node-master-1:~$ helm ls -n pcf-ims

NAME

NAMESPACE

REVISION

UPDATED

STATUS

CHART

APP

VERSION

pcf-ims-cnat-cps-infrastructure

pcf-ims

1

2023-02-22 17:58:35.144604765

+0000 UTC deployed

cnat-cps-infrastructure-0.6.10-main-0045-230214110634-13d42ee

BUILD_2023.02.m0.i18

pcf-ims-cps-diameter-ep-rx-protocol-1 pcf-ims

1

2023-02-22 17:58:35.145251077

+0000 UTC deployed

cps-diameter-ep-0.6.43-main-0399-230207041116-a31a488

BUILD_2023.02.m0.i18

pcf-ims-cps-ldap-ep

pcf-ims

1

2023-02-22 17:58:35.034167458

+0000 UTC deployed

cps-ldap-ep-0.8.13-main-0612-230208043335-ad5f65d

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 35

Pre-Upgrade Backup Steps

Software Upgrade using Site Isolation Procedure

BUILD_2023.02.m0.i18

pcf-ims-etcd-cluster

pcf-ims

1

2023-02-22 17:58:35.139498443

+0000 UTC deployed

etcd-cluster-1.4.0-1-4-0130-221017070357-25906ad

BUILD_2023.02.m0.i18

pcf-ims-network-query

pcf-ims

1

2023-02-22 17:58:35.121107291

+0000 UTC deployed

network-query-0.5.4-main-0057-230206125913-ed3642a

BUILD_2023.02.m0.i18

pcf-ims-ngn-datastore

pcf-ims

1

2023-02-22 17:58:35.139994348

+0000 UTC deployed

ngn-datastore-1.10.0-1-10-0997-230210092614-c6b6164

BUILD_2023.02.m0.i18

pcf-ims-ops-center

pcf-ims

15

2023-02-22 10:55:58.982801266

+0000 UTC deployed

pcf-ops-center-0.6.32-main-0445-230221061642-374d10a

BUILD_2023.02.m0.i18

pcf-ims-pcf-config

pcf-ims

1

2023-02-22 17:58:35.151228581

+0000 UTC deployed

pcf-config-0.6.3-main-0021-221221114706-77d0a10

BUILD_2023.02.m0.i18

pcf-ims-pcf-dashboard

pcf-ims

1

2023-02-22 17:58:35.152400298

+0000 UTC deployed

pcf-dashboard-0.2.17-main-0136-221005221847-13bfa13

BUILD_2023.02.m0.i18

pcf-ims-pcf-engine-app-production

pcf-ims

1

2023-02-22 17:58:35.125468923

+0000 UTC deployed

pcf-engine-app-0.8.16-main-0424-230208043521-b26d906

BUILD_2023.02.m0.i18

pcf-ims-pcf-ldapserver-ep

pcf-ims

1

2023-02-22 17:58:35.152091423

+0000 UTC deployed

pcf-ldapserver-ep-0.1.8-main-0080-221220155902-e80a62f

BUILD_2023.02.m0.i18

pcf-ims-pcf-oam-app

pcf-ims

1

2023-02-22 17:58:35.154061042

+0000 UTC deployed

pcf-oam-app-0.6.2-main-0015-230206125249-2118fad

BUILD_2023.02.m0.i18

pcf-ims-pcf-rest-ep

pcf-ims

1

2023-02-22 17:58:35.136755614

+0000 UTC deployed

pcf-rest-ep-0.7.46-main-0960-230118121105-2fd07f9

BUILD_2023.02.m0.i18

pcf-ims-pcf-services

pcf-ims

1

2023-02-22 17:58:35.146493569

+0000 UTC deployed

pcf-services-0.6.17-main-0074-221221114612-90ebedc

BUILD_2023.02.m0.i18

Step 2

Collect and backup the Mongo data from the db-admin pods primary members. a) Collect the names of the Mongo admin pods.

cloud-user@pcf-cm-node-master-1:~$ kubectl get pods -n pcf-ims | grep db-admin

db-admin-0

1/1

Running 0

13h

db-admin-1

1/1

Running 0

13h

db-admin-2

1/1

Running 0

13h

db-admin-config-0

1/1

Running 0

13h

db-admin-config-1

1/1

Running 0

13h

db-admin-config-2

1/1

Running 0

13h

b) Log in to the db-admin pod to acquire access to the primary pod member.

cloud-user@pcf-cm-node-master-1:~$ kubectl exec -it db-admin-0 -n pcf-ims bash kubectl exec [POD] [COMMAND] is DEPRECATED and will be removed in a future version. Use kubectl exec [POD] -- [COMMAND] instead. Defaulted container "mongo" out of: mongo, cleanup (init) groups: cannot find name for group ID 303

# Login to mongo prompt

I have no name!@db-admin-0:/$ mongo

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 36

Software Upgrade using Site Isolation Procedure

Pre-Upgrade Backup Steps

MongoDB shell version v4.0.2 connecting to: mongodb://127.0.0.1:27017/?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("fa2ee0ae-fcc3-45f4-80f4-f1658dd3297c") } MongoDB server version: 4.0.2 Welcome to the MongoDB shell.
# Get the primary pod member using rs.status() command admin:SECONDARY> rs.status() {
"set" : "admin", "date" : ISODate("2023-02-23T08:52:22.268Z"), "myState" : 2, "term" : NumberLong(3), "syncSourceHost" : "mongo-admin-2:27017", "syncSourceId" : 3, "heartbeatIntervalMillis" : NumberLong(300), "majorityVoteCount" : 2, "writeMajorityCount" : 2, "votingMembersCount" : 3, "writableVotingMembersCount" : 3, "optimes" : {
"lastCommittedOpTime" : { "ts" : Timestamp(1677142340, 1), "t" : NumberLong(3)
}, "lastCommittedWallTime" : ISODate("2023-02-23T08:52:20.219Z"), "readConcernMajorityOpTime" : {
"ts" : Timestamp(1677142340, 1), "t" : NumberLong(3) }, "readConcernMajorityWallTime" : ISODate("2023-02-23T08:52:20.219Z"), "appliedOpTime" : { "ts" : Timestamp(1677142340, 1), "t" : NumberLong(3) }, "durableOpTime" : { "ts" : Timestamp(1677142340, 1), "t" : NumberLong(3) }, "lastAppliedWallTime" : ISODate("2023-02-23T08:52:20.219Z"), "lastDurableWallTime" : ISODate("2023-02-23T08:52:20.219Z") }, "lastStableRecoveryTimestamp" : Timestamp(1677142310, 1), "electionParticipantMetrics" : { "votedForCandidate" : true, "electionTerm" : NumberLong(3), "lastVoteDate" : ISODate("2023-02-22T17:59:58.482Z"), "electionCandidateMemberId" : 3, "voteReason" : "", "lastAppliedOpTimeAtElection" : { "ts" : Timestamp(1677088640, 1), "t" : NumberLong(2) }, "maxAppliedOpTimeInSet" : { "ts" : Timestamp(1677088640, 1), "t" : NumberLong(2) }, "priorityAtElection" : 1, "newTermStartDate" : ISODate("2023-02-22T17:59:58.492Z"), "newTermAppliedDate" : ISODate("2023-02-22T17:59:59.463Z") }, "members" : [ { "_id" : 1,

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 37

Pre-Upgrade Backup Steps

Software Upgrade using Site Isolation Procedure

"name" : "mongo-admin-0:27017", "health" : 1, "state" : 2, "stateStr" : "SECONDARY", "uptime" : 53558, "optime" : {
"ts" : Timestamp(1677142340, 1), "t" : NumberLong(3) }, "optimeDate" : ISODate("2023-02-23T08:52:20Z"), "lastAppliedWallTime" : ISODate("2023-02-23T08:52:20.219Z"), "lastDurableWallTime" : ISODate("2023-02-23T08:52:20.219Z"), "syncSourceHost" : "mongo-admin-2:27017", "syncSourceId" : 3, "infoMessage" : "", "configVersion" : 3, "configTerm" : 3, "self" : true, "lastHeartbeatMessage" : "" }, { "_id" : 2, "name" : "mongo-admin-1:27017", "health" : 1, "state" : 2, "stateStr" : "SECONDARY", "uptime" : 53543, "optime" : { "ts" : Timestamp(1677142340, 1), "t" : NumberLong(3) }, "optimeDurable" : { "ts" : Timestamp(1677142340, 1), "t" : NumberLong(3) }, "optimeDate" : ISODate("2023-02-23T08:52:20Z"), "optimeDurableDate" : ISODate("2023-02-23T08:52:20Z"), "lastAppliedWallTime" : ISODate("2023-02-23T08:52:20.219Z"), "lastDurableWallTime" : ISODate("2023-02-23T08:52:20.219Z"), "lastHeartbeat" : ISODate("2023-02-23T08:52:22.266Z"), "lastHeartbeatRecv" : ISODate("2023-02-23T08:52:22.265Z"), "pingMs" : NumberLong(0), "lastHeartbeatMessage" : "", "syncSourceHost" : "mongo-admin-2:27017", "syncSourceId" : 3, "infoMessage" : "", "configVersion" : 3, "configTerm" : 3 }, { "_id" : 3, "name" : "mongo-admin-2:27017", "health" : 1, "state" : 1, "stateStr" : "PRIMARY", "uptime" : 53543, "optime" : { "ts" : Timestamp(1677142340, 1), "t" : NumberLong(3) }, "optimeDurable" : { "ts" : Timestamp(1677142340, 1), "t" : NumberLong(3) },

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 38

Software Upgrade using Site Isolation Procedure

Pre-Upgrade Backup Steps

"optimeDate" : ISODate("2023-02-23T08:52:20Z"), "optimeDurableDate" : ISODate("2023-02-23T08:52:20Z"), "lastAppliedWallTime" : ISODate("2023-02-23T08:52:20.219Z"), "lastDurableWallTime" : ISODate("2023-02-23T08:52:20.219Z"), "lastHeartbeat" : ISODate("2023-02-23T08:52:22.266Z"), "lastHeartbeatRecv" : ISODate("2023-02-23T08:52:22.148Z"), "pingMs" : NumberLong(0), "lastHeartbeatMessage" : "", "syncSourceHost" : "", "syncSourceId" : -1, "infoMessage" : "", "electionTime" : Timestamp(1677088798, 1), "electionDate" : ISODate("2023-02-22T17:59:58Z"), "configVersion" : 3, "configTerm" : 3 } ], "ok" : 1, "$gleStats" : { "lastOpTime" : Timestamp(0, 0), "electionId" : ObjectId("000000000000000000000000") }, "lastCommittedOpTime" : Timestamp(1677142340, 1), "$configServerState" : { "opTime" : { "ts" : Timestamp(1677142326, 3), "t" : NumberLong(5) } }, "$clusterTime" : { "clusterTime" : Timestamp(1677142340, 1), "signature" : { "hash" : BinData(0,"AAAAAAAAAAAAAAAAAAAAAAAAAAA="), "keyId" : NumberLong(0) } }, "operationTime" : Timestamp(1677142340, 1) } admin:SECONDARY>
Note:- In the above output primary pod is db-admin-2
c) Log in to the primary db-admin pod and take the dump of data and create the tar file out of the dump.
cloud-user@pcf-cm-node-master-1:~$ kubectl exec -it db-admin-2 -n pcf-ims bash kubectl exec [POD] [COMMAND] is DEPRECATED and will be removed in a future version. Use kubectl exec [POD] -- [COMMAND] instead. Defaulted container "mongo" out of: mongo, cleanup (init) groups: cannot find name for group ID 303 I have no name!@db-admin-2:/$ cd /tmp I have no name!@db-admin-2:/tmp$ ls mongodb-27017.sock
# Get the data dump using mongodump command
I have no name!@db-admin-2:/tmp$ mongodump --port 27017 2023-02-23T06:58:28.624+0000 writing admin.system.version to dump/admin/system.version.bson 2023-02-23T06:58:28.625+0000 done dumping admin.system.version (2 documents) 2023-02-23T06:58:28.626+0000 writing cust_ref_data.OCS_TABLE to dump/cust_ref_data/OCS_TABLE.bson 2023-02-23T06:58:28.626+0000 writing cust_ref_data.TAC_TABLE_N7 to dump/cust_ref_data/TAC_TABLE_N7.bson 2023-02-23T06:58:28.626+0000 writing cust_ref_data.DUS_TABLE to dump/cust_ref_data/DUS_TABLE.bson 2023-02-23T06:58:28.627+0000 writing cust_ref_data.TAC_TABLE_N15 to dump/cust_ref_data/TAC_TABLE_N15.bson 2023-02-23T06:58:28.655+0000 done dumping cust_ref_data.TAC_TABLE_N15 (7152 documents)

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 39

Pre-Upgrade Backup Steps

Software Upgrade using Site Isolation Procedure

2023-02-23T06:58:28.656+0000 writing cust_ref_data.TAC_TABLE to dump/cust_ref_data/TAC_TABLE.bson 2023-02-23T06:58:28.656+0000 done dumping cust_ref_data.TAC_TABLE_N7 (7152 documents) 2023-02-23T06:58:28.657+0000 writing cust_ref_data.USD_TABLE to dump/cust_ref_data/USD_TABLE.bson 2023-02-23T06:58:28.666+0000 done dumping cust_ref_data.OCS_TABLE (7569 documents) 2023-02-23T06:58:28.667+0000 writing cust_ref_data.SGSN_IP_TABLE_2 to dump/cust_ref_data/SGSN_IP_TABLE_2.bson 2023-02-23T06:58:28.684+0000 done dumping cust_ref_data.TAC_TABLE (7128 documents) 2023-02-23T06:58:28.684+0000 writing cust_ref_data.PLMN_ID_TABLE_N7 to dump/cust_ref_data/PLMN_ID_TABLE_N7.bson 2023-02-23T06:58:28.687+0000 done dumping cust_ref_data.USD_TABLE (5579 documents) dump/cust_ref_data/FEATURE_COUNTER_MAPPING.bson 2023-02-23T06:58:28.705+0000 done dumping cust_ref_data.PCC_RULE_TABLE_N7 (747 documents) 2023-02-23T06:58:28.706+0000 writing cust_ref_data.DNN_TABLE to dump/cust_ref_data/DNN_TABLE.bson 2023-02-23T06:58:28.708+0000 done dumping cust_ref_data.DNN_TABLE (194 documents) 2023-02-23T06:58:28.709+0000 writing cust_ref_data.APN_TABLE to dump/cust_ref_data/APN_TABLE.bson 2023-02-23T06:58:28.709+0000 done dumping cust_ref_data.CRN_TABLE (733 documents) 2023-02-23T06:58:28.747+0000 done dumping spr.subscriber_ssid (0 documents) 2023-02-23T06:58:28.747+0000 done dumping spr.subscriber (0 documents) 2023-02-23T06:58:28.747+0000 writing spr.auth_failures to dump/spr/auth_failures.bson 2023-02-23T06:58:28.747+0000 writing spr.location_history to dump/spr/location_history.bson 2023-02-23T06:58:28.749+0000 done dumping scheduler.tasks (0 documents) 2023-02-23T06:58:28.751+0000 done dumping patches.files.chunks (0 documents) 2023-02-23T06:58:28.753+0000 done dumping spr.location_history (0 documents) 2023-02-23T06:58:28.754+0000 done dumping spr.auth_failures (0 documents) I have no name!@db-admin-2:/tmp$ ls dump mongodb-27017.sock
# Create tar file out of dump
I have no name!@db-admin-2:/tmp$ tar cvf db-admin-dump.tar dump dump/ dump/cust_ref_data/ dump/cust_ref_data/USD_TABLE_N7.metadata.json dump/cust_ref_data/CRBN_TABLE.metadata.json dump/cust_ref_data/crdVersionInstance.bson dump/cust_ref_data/SERVICE_AREA_RESTRICTION_N15.bson dump/cust_ref_data/N7_CHG_REF_DATA_TABLE.metadata.json dump/cust_ref_data/TEARDOWN_TABLE_N7.metadata.json dump/cust_ref_data/QOS_OVERRIDE_TABLE.bson dump/cust_ref_data/E_PASS_TABLE_IMS.metadata.json dump/cust_ref_data/CRBN_TABLE_N7.bson dump/cust_ref_data/TAC_TABLE.bson dump/cust_ref_data/OCS_TABLE.bson dump/cust_ref_data/POLICY_CONTROL_REQUEST_TRIGGER_TABLE_N15.metadata.json dump/cust_ref_data/SL_TABLE.metadata.json dump/cust_ref_data/N5_psi_mapping_table.metadata.json dump/cust_ref_data/TRIGGER_TABLE.metadata.json dump/cust_ref_data/USD_TABLE.bson dump/cust_ref_data/TEARDOWN_TABLE.metadata.json dump/cust_ref_data/CRBN_TABLE.bson dump/cust_ref_data/PLMN_ID_TABLE_N15.bson dump/cust_ref_data/N5_AUTH_TABLE_N7.bson dump/cust_ref_data/QOS_OVERRIDE_TABLE_N7.bson dump/cust_ref_data/RX_AUTH_TABLE_N7.metadata.json dump/cust_ref_data/IMSI_TABLE.bson dump/cust_ref_data/N28_ACTION.metadata.json dump/cust_ref_data/PLMN_ID_TABLE_N7.metadata.json dump/cust_ref_data/FEATURE_COUNTER_MAPPING.metadata.json dump/cust_ref_data/SL_TABLE.bson dump/cust_ref_data/SUPI_TABLE_N7.bson dump/cust_ref_data/SGSN_IP_TABLE_2.bson dump/cust_ref_data/USD_TABLE.metadata.json dump/cust_ref_data/PLMN_ID_TABLE.bson dump/cust_ref_data/DUMMY_RAR_TABLE.bson

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 40

Software Upgrade using Site Isolation Procedure

Pre-Upgrade Backup Steps

dump/cust_ref_data/QOS_STATUS_TABLE.metadata.json dump/policy_trace/trace_id_version.metadata.json I have no name!@db-admin-2:/tmp$ ls db-admin-dump.tar dump mongodb-27017.sock

Note:- db-admin-dump.tar is the tar file created
d) Transfer the dump tar file to the host from the primary db-admin pod.
cloud-user@pcf-cm-node-master-1:~$ kubectl cp db-admin-2:/tmp/db-admin-dump.tar db-admin-dump.tar -n pcf-ims
Defaulted container "mongo" out of: mongo, cleanup (init) tar: Removing leading `/' from member names

cloud-user@pcf-cm-node-master-1:~$ ls about.sh ml_clusterHardwareInfo.csv Automated_System_Info_site1_03_FunctionalPreTest_BVLongevity.txt nohup.out Automation_Scripts_repo Noisy_Scenario checkDiskSpace.sh PCF_compare_alert_config_with_log.sh checkMinionCPUAverage.sh smi_dep_id_rsa check_mongo_pod_primary.sh validateK8sMinionCPUMemory.sh ConsolidateLogsSummary.py

cpu_Load_Check.sh db-admin-config-2-dump.tar db-admin-dump.tar get_deploy_status.sh GetPCFInstalledBuild.sh GetSystemDeploymentStatus.sh log_start_time.txt

Step 3
Step 4 Step 5

Collect and backup the Mongo data from the primary members of the db-admin-config pods.

Note

Refer to Step 2, for detailed commands for the following steps.

a) Collect the names of the Mongo admin pods.

cloud-user@pcf-cm-node-master-1:~$ kubectl get pods -n pcf-ims | grep db-admin-config

db-admin-config-0

1/1

Running 0

13h

db-admin-config-1

1/1

Running 0

13h

db-admin-config-2

1/1

Running 0

13h

b) Log in to the db-admin-config pod to acquire access to the primary pod member. c) Log in to the primary db-admin-config pod and take the dump of data and create the tar file out of the dump. d) Transfer the dump tar file to the host from the primary db-admin-config pod.

SSH to the ops-center, enter "system mode shutdown" at the config prompt, and then commit. Delete the data files from the Mongo admin pods using the PCF namespace on all three master nodes.

Master-1 cloud-user@pcf-cm-node-master-1:~$ cd /data cloud-user@pcf-cm-node-master-1:/data$ ls cee-cee-pcf etcd k8s-offline kubernetes pcf-ims

software

# Go to namespace directory

cloud-user@pcf-cm-node-master-1:/data$ cd pcf-ims cloud-user@pcf-cm-node-master-1:/data/pcf-ims$ ls db-etcd-pcf-ims-etcd-cluster-0 db-local-data-db-admin-0 db-local-data-db-admin-config-0

# Delete all file under db-local-data-db-admin-0 and db-local-data-db-admin-config-0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 41

Post-Upgrade Verification Steps

Software Upgrade using Site Isolation Procedure

Step 6

cloud-user@pcf-cm-node-master-1:/data/pcf-ims/db-local-data-db-admin-0$sudo rm -rf * cloud-user@pcf-cm-node-master-1:/data/pcf-ims/db-local-data-db-admin-config-0$sudo rm -rf *

Master-2 cloud-user@pcf-cm-node-master-2:~$ cd /data cloud-user@pcf-cm-node-master-2:/data$ ls cee-cee-pcf etcd k8s-offline kubernetes pcf-ims

software

# Go to namespace directory

cloud-user@pcf-cm-node-master-2:/data$ cd pcf-ims cloud-user@pcf-cm-node-master-2:/data/pcf-ims$ ls db-etcd-pcf-ims-etcd-cluster-0 db-local-data-db-admin-0 db-local-data-db-admin-config-0

# Delete all file under db-local-data-db-admin-0 and db-local-data-db-admin-config-0

cloud-user@pcf-cm-node-master-2:/data/pcf-ims/db-local-data-db-admin-0$sudo rm -rf * cloud-user@pcf-cm-node-master-2:/data/pcf-ims/db-local-data-db-admin-config-0$sudo rm -rf *

Master-3 cloud-user@pcf-cm-node-master-3:~$ cd /data cloud-user@pcf-cm-node-master-3:/data$ ls cee-cee-pcf etcd k8s-offline kubernetes pcf-ims

software

# Go to namespace directory

cloud-user@pcf-cm-node-master-3:/data$ cd pcf-ims cloud-user@pcf-cm-node-master-3:/data/pcf-ims$ ls db-etcd-pcf-ims-etcd-cluster-0 db-local-data-db-admin-0 db-local-data-db-admin-config-0

# Delete all file under db-local-data-db-admin-0 and db-local-data-db-admin-config-0

cloud-user@pcf-cm-node-master-3:/data/pcf-ims/db-local-data-db-admin-0$sudo rm -rf * cloud-user@pcf-cm-node-master-3:/data/pcf-ims/db-local-data-db-admin-config-0$sudo rm -rf *

Run the April release upgrade (Ubuntu 20.04 and Mongo 4.4).

Post-Upgrade Verification Steps

Step 1

Verify that the software is running with the April release after the upgrade.

cloud-user@pcf-cm-node-master-1:~$ helm ls -n pcf-ims

NAME

NAMESPACE

REVISION

UPDATED

STATUS

CHART

APP

VERSION

pcf-ims-cnat-cps-infrastructure

pcf-ims

1

2023-02-22 17:58:35.144604765

+0000 UTC deployed

cnat-cps-infrastructure-0.6.10-main-0045-230214110634-13d42ee

BUILD_2023.02.m0.i18

pcf-ims-cps-diameter-ep-rx-protocol-1 pcf-ims

1

2023-02-22 17:58:35.145251077

+0000 UTC deployed

cps-diameter-ep-0.6.43-main-0399-230207041116-a31a488

BUILD_2023.02.m0.i18

pcf-ims-cps-ldap-ep

pcf-ims

1

2023-02-22 17:58:35.034167458

+0000 UTC deployed

cps-ldap-ep-0.8.13-main-0612-230208043335-ad5f65d

BUILD_2023.02.m0.i18

pcf-ims-etcd-cluster

pcf-ims

1

2023-02-22 17:58:35.139498443

+0000 UTC deployed

etcd-cluster-1.4.0-1-4-0130-221017070357-25906ad

BUILD_2023.02.m0.i18

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 42

Software Upgrade using Site Isolation Procedure

Post-Upgrade Verification Steps

Step 2 Step 3 Step 4

pcf-ims-network-query

pcf-ims

1

2023-02-22 17:58:35.121107291

+0000 UTC deployed

network-query-0.5.4-main-0057-230206125913-ed3642a

BUILD_2023.02.m0.i18

pcf-ims-ngn-datastore

pcf-ims

1

2023-02-22 17:58:35.139994348

+0000 UTC deployed

ngn-datastore-1.10.0-1-10-0997-230210092614-c6b6164

BUILD_2023.02.m0.i18

pcf-ims-ops-center

pcf-ims

15

2023-02-22 10:55:58.982801266

+0000 UTC deployed

pcf-ops-center-0.6.32-main-0445-230221061642-374d10a

BUILD_2023.02.m0.i18

pcf-ims-pcf-config

pcf-ims

1

2023-02-22 17:58:35.151228581

+0000 UTC deployed

pcf-config-0.6.3-main-0021-221221114706-77d0a10

BUILD_2023.02.m0.i18

pcf-ims-pcf-dashboard

pcf-ims

1

2023-02-22 17:58:35.152400298

+0000 UTC deployed

pcf-dashboard-0.2.17-main-0136-221005221847-13bfa13

BUILD_2023.02.m0.i18

pcf-ims-pcf-engine-app-production

pcf-ims

1

2023-02-22 17:58:35.125468923

+0000 UTC deployed

pcf-engine-app-0.8.16-main-0424-230208043521-b26d906

BUILD_2023.02.m0.i18

pcf-ims-pcf-ldapserver-ep

pcf-ims

1

2023-02-22 17:58:35.152091423

+0000 UTC deployed

pcf-ldapserver-ep-0.1.8-main-0080-221220155902-e80a62f

BUILD_2023.02.m0.i18

pcf-ims-pcf-oam-app

pcf-ims

1

2023-02-22 17:58:35.154061042

+0000 UTC deployed

pcf-oam-app-0.6.2-main-0015-230206125249-2118fad

BUILD_2023.02.m0.i18

pcf-ims-pcf-rest-ep

pcf-ims

1

2023-02-22 17:58:35.136755614

+0000 UTC deployed

pcf-rest-ep-0.7.46-main-0960-230118121105-2fd07f9

BUILD_2023.02.m0.i18

pcf-ims-pcf-services

pcf-ims

1

2023-02-22 17:58:35.146493569

+0000 UTC deployed

pcf-services-0.6.17-main-0074-221221114612-90ebedc

BUILD_2023.02.m0.i18

SSH to the ops-center, enter "system mode running" in the configuration prompt, and then commit. Use the same commands as in Step 1, and verify that all the pods and nodes are operational. Restore the Mongo dump to the db-admin pod as the primary member.
# copy the dump tar file to primary member of db-admin

cloud-user@pcf-cm-node-master-1:~$ kubectl cp db-admin-dump.tar db-admin-2:/tmp -n pcf-ims Defaulted container "mongo" out of: mongo, cleanup (init)

# login to primary member of db-admin go to the path of the dump tar and restore dump using "mongorestore --port=27017 <dump tar file name>"

cloud-user@pcf-cm-node-master-1:~$ kubectl exec -it db-admin-2 -n pcf-ims bash kubectl exec [POD] [COMMAND] is DEPRECATED and will be removed in a future version. Use kubectl exec
[POD] -- [COMMAND] instead. Defaulted container "mongo" out of: mongo, cleanup (init) groups: cannot find name for group ID 303 I have no name!@db-admin-2:/$ cd /tmp I have no name!@db-admin-2:/tmp$ ls db-admin-dump.tar dump mongodb-27017.sock

# Untar the dump tar file

I have no name!@db-admin-2:/tmp$ tar xvf db-admin-dump.tar dump/ dump/cust_ref_data/ dump/cust_ref_data/USD_TABLE_N7.metadata.json dump/cust_ref_data/CRBN_TABLE.metadata.json dump/cust_ref_data/crdVersionInstance.bson dump/cust_ref_data/SERVICE_AREA_RESTRICTION_N15.bson dump/cust_ref_data/N7_CHG_REF_DATA_TABLE.metadata.json dump/spr/subscriber_ssid.bson

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 43

Post-Upgrade Verification Steps

Software Upgrade using Site Isolation Procedure

dump/spr/subscriber.bson dump/spr/subscriber.metadata.json dump/admin/ dump/admin/system.version.bson dump/admin/system.version.metadata.json dump/scheduler/ dump/scheduler/tasks.bson dump/scheduler/tasks.metadata.json dump/policy_trace/ dump/policy_trace/traces.bson dump/policy_trace/traces.metadata.json dump/policy_trace/trace_id_version.bson dump/policy_trace/trace_id_version.metadata.json
# Run restore command to restore data I have no name!@db-admin-2:/tmp$ mongorestore --port=27017 dump 2023-02-23T10:19:28.068+0000 preparing collections to restore from 2023-02-23T10:19:28.070+0000 reading metadata for cust_ref_data.n7-pcc-rule from dump/cust_ref_data/n7-pcc-rule.metadata.json 2023-02-23T10:19:28.070+0000 reading metadata for cust_ref_data.n7-policy-trigger from dump/cust_ref_data/n7-policy-trigger.metadata.json 2023-02-23T10:19:28.070+0000 reading metadata for cust_ref_data.volte from dump/cust_ref_data/volte.metadata.json 2023-02-23T10:19:28.070+0000 reading metadata for keystore.keystore from dump/keystore/keystore.metadata.json 2023-02-23T10:19:28.070+0000 reading metadata for cust_ref_data.Called_station_id from dump/cust_ref_data/Called_station_id.metadata.json 2023-02-23T10:19:28.070+0000 reading metadata for cust_ref_data.N7_QoS_Mapping_Ldap from dump/cust_ref_data/N7_QoS_Mapping_Ldap.metadata.json 2023-02-23T10:19:28.070+0000 reading metadata for cust_ref_data.PSI_Mapping from 2023-02-23T10:19:28.071+0000 reading metadata for cust_ref_data.n5-charging-rules from dump/cust_ref_data/n5-charging-rules.metadata.json 2023-02-23T10:19:28.071+0000 reading metadata for keystore.changes from dump/keystore/changes.metadata.json 2023-02-23T10:19:28.071+0000 reading metadata for config.cache.collections from dump/config/cache.collections.metadata.json 2023-02-23T10:19:28.071+0000 reading metadata for cust_ref_data.QosDesc from dump/cust_ref_data/QosDesc.metadata.json
2023-02-23T10:19:34.742+0000 index: &idx.IndexDocument{Options:primitive.M{"name":"state_1", "ns":"scheduler.tasks", "v":2}, Key:primitive.D{primitive.E{Key:"state", Value:1}}, PartialFilterExpression:primitive.D(nil)} 2023-02-23T10:19:34.742+0000 index: &idx.IndexDocument{Options:primitive.M{"name":"runningOn_1",
"ns":"scheduler.tasks", "v":2}, Key:primitive.D{primitive.E{Key:"runningOn", Value:1}}, PartialFilterExpression:primitive.D(nil)} 2023-02-23T10:19:34.742+0000 index: &idx.IndexDocument{Options:primitive.M{"name":"type_1", "ns":"scheduler.tasks", "v":2}, Key:primitive.D{primitive.E{Key:"type", Value:1}}, PartialFilterExpression:primitive.D(nil)} 2023-02-23T10:19:34.742+0000 index: &idx.IndexDocument{Options:primitive.M{"name":"scheduleTime_1",
"ns":"scheduler.tasks", "v":2}, Key:primitive.D{primitive.E{Key:"scheduleTime", Value:1}}, PartialFilterExpression:primitive.D(nil)} 2023-02-23T10:19:34.743+0000 62 document(s) restored successfully. 15 document(s) failed to restore.
Note: Some duplicate key errors like below are expected. Please ignore the same. 2023-02-21T09:51:55.708+0000 continuing through error: E11000 duplicate key error collection: config.mongos index: _id_ dup key: { _id: "admin-db-0:27017" }

Step 5 Step 6

Use the same commands as in Step 4, Restore the Mongo dump to the db-admin-config pod as the primary member. Check the PB and CRD data is loading.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 44

Software Upgrade using Site Isolation Procedure

Post-Upgrade Verification Steps

Step 7 Use the same commands as in Step 1, and verify that all the pods and nodes are operational.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 45

Post-Upgrade Verification Steps

Software Upgrade using Site Isolation Procedure

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 46

6 C H A P T E R
PCF Rolling Software Update
· Supported Upgrade Procedures, on page 47 · Introduction, on page 47 · Updating PCF, on page 48
Supported Upgrade Procedures
Note The software upgrade to PCF April release from earlier releases requires site isolation procedure and MOP steps needs executed during the Maintenance Window, in-service upgrade isn't supported since Mongo 4.0 to 4.4 upgrade path isn't feasible as per Mongo recommendations.
For detailed procedure, see this Software Upgrade using Site Isolation Procedure, on page 33. Following the PCF April release, the same old procedure of the in-service upgrade process is used for all subsequent software upgrades.
Introduction
The Cisco PCF has a three-tier architecture which consists of Protocol, Service, and Session tiers. Each tier includes a set of microservices (pods) for a specific functionality. Within these tiers, there exists a Kubernetes Cluster comprising of Kubernetes (K8s) master, and worker nodes (including Operation and Management nodes). For high availability and fault tolerance, a minimum of two K8s worker nodes are required for each tier. You can have multiple replicas for each worker node. Kubernetes orchestrates the pods using the StatefulSets controller. The pods require a minimum of two replicas for fault tolerance. The following figure depicts a PCF K8s Cluster with 12 nodes ­ 3 Master nodes, 3 Operations, and Management (OAM) worker nodes, 2 Protocol worker nodes, 2 Service worker nodes, 2 Session (data store) worker nodes.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 47

Updating PCF Figure 7: PCF Kubernetes Cluster

PCF Rolling Software Update

Note

· OAM worker nodes - These nodes host the Ops Center pods for configuration management and metrics

pods for statistics and Key Performance Indicators (KPIs).

· Protocol worker nodes - These nodes host the PCF protocol-related pods for service-based interfaces (N5, N7, N28, N36, and NRF) and Diameter Rx Endpoint.

· Service worker nodes - These nodes host the PCF application-related pods that perform session management processing.

· Session worker nodes - These nodes host the database-related pods that store subscriber session data.

Updating PCF
The following section describes the procedure involved in updating the PCF software: · Rolling Software Update Using SMI Cluster Manager
Rolling Software Update Using SMI Cluster Manager
The PCF software update or in-service update procedure utilizes the K8s rolling strategy to update the pod images. In K8s rolling update strategy, the pods of a StatefulSet are updates sequentially to ensure that the ongoing process remains unaffected. Initially, a rolling update on a StatefulSet causes a single pod instance to terminate. A pod with an updated image replaces the terminated pod. This process continues until all the replicas of the StatefulSet are updated. The terminating pods exit gracefully after competing all the ongoing processes. Other in-service pods continue to receive and process the traffic to provide a seamless software update. You can control the software update process through the Ops Center CLI.
Note Each pod needs a minimum of two replicas for high availability. For example, Policy Engine must have 2 Engine replicas. In a worst-case scenario, the processing capacity of the pod may briefly reduce to 50% while the software update is in-progress.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 48

PCF Rolling Software Update

Prerequisites

The following figure illustrates a PCF rolling update for PCF REST endpoint pods (two replicas) on Protocol worker nodes along with PCF Service pods (three replicas) on Service worker nodes.
Figure 8: PCF Rolling Update

Prerequisites

The prerequisites for upgrading PCF are: · All the nodes ­ including all the pods in the node ­ are up and running. · A patch version of the PCF software.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 49

PCF Health Check

PCF Rolling Software Update

Note Currently, major versions do not support the rolling upgrade. The major version represents the release year, release number, and maintenance number. Cisco follows the versioning format as YYYY.RN.MN such as 2020.03.0.

Important Trigger rolling upgrade only when the CPU usage of the nodes is less than 50%.

PCF Health Check

You need to perform a health check to ensure that all the services are running and nodes are in ready state. To perform a health check:
1. Log in to master node and use the following configuration:
kubectl get pods -n smi kubectl get nodes kubectl get pod --all-namespaces -o wide kubectl get pods -n pcf-wsp -o wide kubectl get pods -n cee-wsp -o wide kubectl get pods -n smi-vips -o wide helm list kubectl get pods -A | wc -l

Important Ensure that all the nodes are in the ready state before you proceed further. Use the kubectl get nodes command to display the node states.
Preparing for Upgrade This section describes the procedure involved creating a backup configuration, logs, and deployment files. To back up the files: 1. Log in to the SMI Cluster Manager Node as an ubuntu user.
2. Create a new directory for deployment. Example:
test@smipcf-cm01:~$ mkdir -p "temp_$(date +'%m%d%Y_T%H%M')" && cd "$_"
3. Move all the pcf deployment file into the newly created deployment directory.
4. Untar the pcf deployment file. Example:
test@smi1pcf01-cm01:~/temp_08072019_T1651$ tar -xzvf pcf.2020.01.0-1.SPA.tgz ./ ./PCF_REL_KEY-CCO_RELEASE.cer ./cisco_x509_verify_release.py ./pcf.2020.01.0-1.tar

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 50

PCF Rolling Software Update

Back Up SVN, Policy, and CRD Data

./pcf.2020.01.0-1.tar.signature.SPA ./pcf.2020.01.0-1.tar.SPA.README
5. Verify the downloaded image. Example:
test@smi1pcf01-cm01:~/temp_08072019_T1651$ cat pcf.2020.01.0-1.tar.SPA.README
Important Follow the procedure mentioned in the SPA.README file to verify the build before proceeding to the next step.
Back Up SVN, Policy, and CRD Data This section describes the procedure involved in creating a backup of SVN, Policy, and CRD data. To perform a backup of SVN and Policy files: 1. Log in to the master node as an ubuntu user. 2. Use the following command to retrieve the Policy Builder URL. kubectl get ing -n $( kubectl get namespaces | grep -oP 'pcf-(\d+|\w+)' | cut -d\ -f1) | grep policy-builder | awk '{ print $2 }' pb.pcf-02-pcf-engine-app-blv02.ipv4address.nip.io Example:
ubuntu@ mas01:~/backups_09182019_T2141$ kubectl get ing -n $( kubectl get namespaces | grep -oP 'pcf-(\d+|\w+)' | cut -d\ -f1) | grep policy-builder | awk '{ print $2 }'
Sample output:
pb.pcf-02-pcf-engine-app-blv02.ipv4address.nip.io
3. Navigate to the Policy Builder home page. 4. Click Import/Export. 5. Click All Data.
· Export URL--Specify the export URL. · Export File Prefix--Specify an appropriate name for the export file.
6. Click Export.
Important You can find the exported file in your local Downloads directory.
To perform a backup of CRD data: 1. Navigate to the Policy Builder Home page. 2. Click Custom Reference Data. 3. Click Import/Export CRD data.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 51

Back Up Ops Center Configuration

PCF Rolling Software Update

4. Click Export.
Important You can find the CRD data in your Web browser's Downloads directory.
Back Up Ops Center Configuration This section describes the procedure involved in creating a backup of the Ops Center configurations. To perform a backup of the Ops Center configurations: 1. Log in to SMI Cluster Manager node as an ubuntu user. 2. Run the following command to backup the SMI Ops Center configuration to /home/ubuntu/smiops.backup file. ssh -p <port_number> admin@$(kubectl get svc -n smi | grep '.*netconf.*<port_number>' | awk '{ print $4 }') "show run | nomore" > smiops.backup_$(date +'%m%d%Y_T%H%M') NOTES: · ssh -p <port_number>: Specifies the port number of the system on which the SMI Ops Center service is running. Use the Kubectl get service command to display the ports on which is the services are running. · *netconf.*<port_number>': Specifies the port number of the system on which the Netconf service is running.
3. Run the following command to backup the CEE Ops Center configuration to /home/ubuntu/ceeops.backup file. ssh admin@<cee-vip> "show run | nomore" > ceeops.backup_$(date +'%m%d%Y_T%H%M') NOTES: · cee-vip: Specifies the CEE VIP that is configured in the SMI Ops Center. Use the show running-config to display the SMI Ops Center configuration.
4. Run the following command to backup the PCF Ops Center configuration to /home/ubuntu/pcfops.backup file. ssh admin@<pcf-vip> "show run | nomore" > pcfops.backup_$(date +'%m%d%Y_T%H%M') NOTES: · pcf-vip>: Specifies the PCF VIP that is configured in the SMI Ops Center. Use the show running-config to display the SMI Ops Center configuration.
Back Up CEE and PCF Ops Center Configuration This section describes the procedure involved in creating a backup of CEE and Ops Center configuration from the master node. To perform a backup of CEE and Ops Center configuration:

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 52

PCF Rolling Software Update

Back Up CEE and PCF Ops Center Configuration

1. Log in to the master node as an ubuntu user.

2. Create a directory to backup the configuration files.

mkdir backups_$(date +'%m%d%Y_T%H%M') && cd "$_"

3. Back up the PCF Ops Center configuration and verify the line count of the backup files.

ssh -p <port_number> admin@$(kubectl get svc -n $(kubectl get namespaces | grep -oP 'pcf-(\d+|\w+)') | grep <port_number> | awk '{ print $3 }') "show run | nomore" > pcfops.backup_$(date +'%m%d%Y_T%H%M') && wc -l pcfops.backup_$(date +'%m%d%Y_T%H%M')

Example:

ubuntu@popcf-mas01:~/backups_09182019_T2141$ ssh -p <port_number> admin@$(kubectl get svc -n $(kubectl get namespaces | grep -oP 'pcf-(\d+|\w+)') | grep <port_number> | awk '{ print $3 }') "show run | nomore" > pcfops.backup_$(date +'%m%d%Y_T%H%M') && wc -l pcfops.backup_$(date +'%m%d%Y_T%H%M') admin@<admin_ip_address> password: PCF-OPS-PASSWORD 334 pcfops.backup

4. Back up the CEE Ops Center configuration and verify the line count of the backup files.

ssh -p <port_number> admin@$(kubectl get svc -n $(kubectl get namespaces | grep -oP 'cee-(\d+|\w+)') | grep <port_number> | awk '{ print $3 }') "show run | nomore" > ceeops.backup_$(date +'%m%d%Y_T%H%M') && wc -l ceeops.backup_$(date +'%m%d%Y_T%H%M')

Example:

ubuntu@popcf-mas01:~/backups_09182019_T2141$ ssh -p <port_number> admin@$(kubectl get svc -n $(kubectl get namespaces | grep -oP 'cee-(\d+|\w+)') | grep <port_number> | awk '{ print $3 }') "show run | nomore" > ceeops.backup_$(date +'%m%d%Y_T%H%M') && wc -l ceeops.backup_$(date +'%m%d%Y_T%H%M') admin@<admin_ip_address> password: CEE-OPS-PASSWORD 233 ceeops.backup

5. Move the SMI Ops Center backup file (from the SMI Cluster Manager) to the backup directory.

scp $(grep cm01 /etc/hosts | awk '{ print $1 }'):/home/ubuntu/smiops.backup_$(date +'%m%d%Y_T%H%M') .

Example:

ubuntu@popcf-mas01:~/backups_09182019_T2141$ scp $(grep cm01 /etc/hosts | awk '{ print

$1 }'):/home/ubuntu/smiops.backup_$(date +'%m%d%Y_T%H%M') .

ubuntu@<admin_ip_address> password: SMI-CM-PASSWORD

smiops.backup

100% 9346 22.3MB/s

00:00

6. Verify the line count of the backup files.

Example:

ubuntu@popcf-mas01:~/backups_09182019_T2141$ wc -l * 233 ceeops.backup 334 pcfops.backup 361 smiops.backup 928 total

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 53

Upgrading the PCF

PCF Rolling Software Update

Upgrading the PCF
This section describes the procedures involved in upgrading PCF. Staging a New PCF Image
This section describes the procedure involved in staging a new PCF image before initiating the upgrade. To stage the new PCF image: 1. Download and verify the new PCF image. 2. Log in to the SMI Cluster Manager node as an ubuntu user. 3. Copy the images to Uploads directory.
sudo mv <pcf_new_image.tar> /data/software/uploads
Note The SMI uses the new image present in the Uploads directory to upgrade.
4. Verify whether the image is picked up by the SMI for processing from the Uploads directory. sleep 30; ls /data/software/uploads Example:
ubuntu@popcf-cm01:~/temp_08072019_T1651$ sleep 30; ls /data/software/uploads ubuntu@popcf-cm01:~/temp_08072019_T1651$
5. Verify whether the images were successfully picked up and processed. Example:
auser@unknown:$ sudo du -sh /data/software/packages/* 1.6G /data/software/packages/cee.2019.07 5.3G /data/software/packages/pcf.2019.08-04 16K /data/software/packages/sample
Note The SMI must unpack the images into the packages directory successfully to complete the staging.
Triggering the Rolling Software Upgrade The PCF utilizes the SMI Cluster Manager to perform a rolling software update. To update PCF using SMI Cluster Manager, use the following configurations:
Important Before you begin, ensure that PCF is up and running with the current version of the software.
1. Log in to the SMI Cluster Manager console. 2. Run the following command to log in to the SMI Ops Center.
ssh -p <port_number> admin@$(kubectl get svc -n smi | grep '.*netconf.*<port_number>' | awk '{ print $4 }')

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 54

PCF Rolling Software Update

Triggering the Rolling Software Upgrade

Example:
ubuntu@popcf-cm01:~$ ssh -p <port_number> admin@$(kubectl get svc -n smi | grep '.*netconf.*<port_number>' | awk '{ print $4 }') admin@<admin_ip_address> password: SMI-CONSOLE-PASSWORD Welcome to the CLI admin connected from <admin_ip_address> using ssh on ops-center-smi-cluster-manager-85869cf9b6-7j64k
3. Download the latest TAR ball from the URL. software-packages download URL Example:
SMI Cluster Manager# software-packages download <URL>
NOTES: · software-packages download url--Specify the software packages to be downloaded through HTTP/HTTPS.
4. Verify whether the TAR balls are loaded. software-packages list Example:
SMI Cluster Manager# software-packages list [ PCF-2019-08-21 ] [ sample ]
NOTES: · software-packages list --Specify the list of available software packages.
5. Update the product repository URL with the latest version of the product chart.
Note If the repository URL contains multiple versions, the Ops Center selects the latest version automatically.
config cluster cluster_name ops-centers app_name PCF_instance_name repository url exit exit
Example:
SMI Cluster Manager# config SMI Cluster Manager(config)# clusters test2 SMI Cluster Manager(config-clusters-test2)# ops-centers PCF data SMI Cluster Manager(config-ops-centers-PCF/data)# repository <url> SMI Cluster Manager(config-ops-centers-PCF/data)# exit SMI Cluster Manager(config-clusters-test2)# exit
NOTES: · cluster --Specify the K8s cluster.
· cluster_name --Specify the name of the cluster.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 55

Monitoring the Upgrade

PCF Rolling Software Update

· ops-centers app_name instance_name --Specify the product Ops Center and instance. app_name is the application name. instance_name is the name of the instance.
· repository url--Specify the local registry URL for downloading the charts.
6. Run the cluster sync command to update to the latest version of the product chart. For more information on cluster sync command, see the Important section. clusters cluster_name actions sync run Example:
SMI Cluster Manager# clusters test2 actions sync run
Important The cluster synchronization updates the PCF Ops Center, which in turn updates the application pods (through helm sync command) one at a time automatically.
NOTES: · cluster --Specify the K8s cluster. · cluster_name --Specify the name of the cluster. · actions --Specify the actions performed on the cluster. · sync run --Triggers the cluster synchronization.
Monitoring the Upgrade You can monitor the status of the upgrade through SMI Cluster Manager Ops Center. To monitor the upgrade status, use the following configurations: config clusters cluster_name actions sync run debug true clusters cluster_name actions sync logs monitor sync-logs cluster_name clusters cluster_name actions sync status end Example:
SMI Cluster Manager# clusters test1 actions sync run SMI Cluster Manager# clusters test1 actions sync run debug true SMI Cluster Manager# clusters test1 actions sync logs SMI Cluster Manager# monitor sync-logs test1 SMI Cluster Manager# clusters test1 actions sync status
NOTES: · clusters cluster_name--Specify the information about the nodes to be deployed. cluster_name is the name of the cluster. · actions--Configures the actions performed on the cluster. · sync run--Triggers the cluster synchronization. · sync logs--Displays the current cluster synchronization logs.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 56

PCF Rolling Software Update

Validating the Upgrade

· sync status--Displays the current status of the cluster synchronization. · debug true--Enters the debug mode. · monitor sync logs ­ Monitors the cluster synchronization process.

Important You can view the pod details after the upgrade through CEE Ops Center. For more information on pod details, see Viewing the Pod Details section.
Validating the Upgrade
This section describes the procedures involved in validating the upgrade process.
Viewing the Pod Details You can view the details of the current pods through CEE Ops Center. To view the pod details, use the following command (in CEE Ops Center CLI): cluster pods instance_name pod_name detail

Note

· cluster pods--Specify the current pods in the cluster.

· instance_name--Specify the name of the instance.

· pod_name--Specify the name of the pod.

· detail--Displays the details of the specified pod.

The following example displays the details of the pod named alertmanager-0 in the PCF-data instance.
Example:
cee# cluster pods PCF-data alertmanager-0 detail details apiVersion: "v1" kind: "Pod" metadata:
annotations: alermanager.io/scrape: "true" cni.projectcalico.org/podIP: "<ipv4address/subnet>" config-hash: "5532425ef5fd02add051cb759730047390b1bce51da862d13597dbb38dfbde86"
creationTimestamp: "2020-02-26T06:09:13Z" generateName: "alertmanager-" labels:
component: "alertmanager" controller-revision-hash: "alertmanager-67cdb95f8b" statefulset.kubernetes.io/pod-name: "alertmanager-0" name: "alertmanager-0" namespace: "PCF" ownerReferences: - apiVersion: "apps/v1" kind: "StatefulSet" blockOwnerDeletion: true controller: true name: "alertmanager" uid: "82a11da4-585e-11ea-bc06-0050569ca70e"

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 57

Viewing the Pod Details

PCF Rolling Software Update

resourceVersion: "1654031" selfLink: "/api/v1/namespaces/PCF/pods/alertmanager-0" uid: "82aee5d0-585e-11ea-bc06-0050569ca70e" spec: containers: - args:
- "/alertmanager/alertmanager" - "--config.file=/etc/alertmanager/alertmanager.yml" - "--storage.path=/alertmanager/data" - "--cluster.advertise-address=$(POD_IP):6783" env: - name: "POD_IP"
valueFrom: fieldRef: apiVersion: "v1" fieldPath: "status.podIP"
image: "<path_to_docker_image>" imagePullPolicy: "IfNotPresent" name: "alertmanager" ports: - containerPort: 9093
name: "web" protocol: "TCP" resources: {} terminationMessagePath: "/dev/termination-log" terminationMessagePolicy: "File" volumeMounts: - mountPath: "/etc/alertmanager/" name: "alertmanager-config" - mountPath: "/alertmanager/data/" name: "alertmanager-store" - mountPath: "/var/run/secrets/kubernetes.io/serviceaccount" name: "default-token-kbjnx" readOnly: true dnsPolicy: "ClusterFirst" enableServiceLinks: true hostname: "alertmanager-0" nodeName: "for-smi-cdl-1b-worker94d84de255" priority: 0 restartPolicy: "Always" schedulerName: "default-scheduler" securityContext: fsGroup: 0 runAsUser: 0 serviceAccount: "default" serviceAccountName: "default" subdomain: "alertmanager-service" terminationGracePeriodSeconds: 30 tolerations: - effect: "NoExecute" key: "node-role.kubernetes.io/oam" operator: "Equal" value: "true" - effect: "NoExecute" key: "node.kubernetes.io/not-ready" operator: "Exists" tolerationSeconds: 300 - effect: "NoExecute" key: "node.kubernetes.io/unreachable" operator: "Exists" tolerationSeconds: 300 volumes: - configMap: defaultMode: 420

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 58

PCF Rolling Software Update

Verifying the Helm Status

name: "alertmanager" name: "alertmanager-config" - emptyDir: {} name: "alertmanager-store" - name: "default-token-kbjnx" secret:
defaultMode: 420 secretName: "default-token-kbjnx" status: conditions: - lastTransitionTime: "2020-02-26T06:09:02Z" status: "True" type: "Initialized" - lastTransitionTime: "2020-02-26T06:09:06Z" status: "True" type: "Ready" - lastTransitionTime: "2020-02-26T06:09:06Z" status: "True" type: "ContainersReady" - lastTransitionTime: "2020-02-26T06:09:13Z" status: "True" type: "PodScheduled" containerStatuses: - containerID: "docker://821ed1a272d37e3b4c4c9c1ec69b671a3c3fe6eb4b42108edf44709b9c698ccd"
image: "<path_to_docker_image>" imageID: "docker-pullable:<path_to_docker_image>@sha256:c4bf05aa677a050fba9d86586b04383ca089bd784d2cb9e544b0d6b7ea899d9b"
lastState: {} name: "alertmanager" ready: true restartCount: 0 state:
running: startedAt: "2020-02-26T06:09:05Z"
hostIP: "<host_ipv4address>" phase: "Running" podIP: "<pod_ipv4address>" qosClass: "BestEffort" startTime: "2020-02-26T06:09:02Z" cee#
Verifying the Helm Status
This section describes the procedure involved in verifying the helm status. You need to determine whether the deployed helm chart is listed in the helm list successfully.
To determine the helm status:
1. Run the following on the master node to view the list of deployed helm charts.
helm list
2. If the helm chart is not found, run the following in the operational mode to view the charts irrespective of their deployment status.
show helm charts

Verifying the Pods

This section describes the procedure involved in determining the pod and container status after upgrading PCF. You need to ensure that the pods and containers are up and running.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 59

Rollback the Upgrade

PCF Rolling Software Update

Use the following commands to view the PCF pod logs. kubectl describe pod pod_name -n namespace
Note If the Status column displays the state as Running, and the Ready column has the same number of containers on both sides of the forward-slash (/), then the pod is healthy and operational.
Rollback the Upgrade
You can rollback the upgrade if you encounter any issues during the upgrade process. This section describes the procedure involved rolling back the upgrade.
Reloading PCF Ops Center Configuration This section describes the procedure involved in reloading the PCF Ops Center configuration from the backup file. To reload the PCF Ops Center configuration: 1. Log in to the SMI console as an ubuntu user. 2. Untar the backup file created on SMI and move it into a directory. Example:
ubuntu@popcf-cm01:~$ cd ~/backups && tar ­zxf popcf-cfg-backup_110219-053530.tar.gz ubuntu@popcf-cm01 :~/backups$
3. Move the backup configuration file into the newly created backups directory. Example:
ubuntu@popcf-cm01 :~/backups$ cd popcf-cfg-backup_110219-053530 ubuntu@popcf-cm01 :~/backups/popcf-cfg-backup_110219-053530$
4. Convert the exported PCF Ops Center configuration into a clean file, which is ready for import. Example:
ubuntu@popcf-cm01 :~/backups/popcf-cfg-backup_110219-053530$ cat pcfops*.cfg | perl -pe 's/vendor.*\[(.*)\]/vendor $1/g' | perl -pe 's/(^\s+ips).*\[(.*)\]/$1$2/g' | perl -pe
's/(\w)\s+(\w)/$1 $2/g' | perl -pe 's/^\s+//g' | grep -v "system mode run" > pcfops.txt ubuntu@popcf-cm01 :~/backups/popcf-cfg-backup_110219-053530$
Updating PCF Ops Center Configuration This section describes the procedure involved in updating the PCF Ops Center configuration after restoring it. To update the PCF Ops Center configuration: 1. Log in to the master node as an ubuntu user. 2. Run the following command to log in to the PCF Ops Center CLI. Example:
ubuntu@popcf-mas01:~$ ssh -p <port_number> admin@$(kubectl get svc -n $(kubectl get namespaces | grep -oP 'pcf-(\d+|\w+)') | grep <port_number> | awk '{ print $3 }') admin@<admin_ip_address> password: PCF-OPS-PASSWORD Welcome to the pcf CLI on popcf01

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 60

PCF Rolling Software Update

Restoring the Configuration from Back Up

admin connected from <admin_ip_address> using ssh on ops-center-pcf-01-ops-center-68dd9f588-htjdf
3. Paste the contents of the exported PCF configuration file (the pcfops.txt file mentioned in this example) in the PCF Ops Center. Example:
product pcf# config Entering configuration mode terminal product pcf(config)# <PASTE CONTENTS OF pcfops.txt AND RETURN TO `config' mode. Don't Paste Default Configuration> product pcf(config)#
Important Fix any sections in the configuration file that did not import properly.
4. Ensure that the helm URLs are inline with the updated PCF image. Example:
product pcf(config)# helm repository base-repos product pcf(config-repository-base-repos)# url <url> product pcf(config-repository-base-repos)# exit product pcf(config)# k8s registry <registry_url> product pcf(config)# commit Commit complete. product pcf(config)#
Restoring the Configuration from Back Up This section describes the procedure involved in restoring all the Policy Builder and CRD configuration files from the backup.
Restoring Policy Builder Configuration 1. Log in to the master node as an ubuntu user. 2. Retrieve the Cisco Policy Suite Central URL.
Example:
ubuntu@popcf-mas01:~/backups_09182019_T2141$ kubectl get ing -n $( kubectl get namespaces | grep -oP 'pcf-(\d+|\w+)' | cut -d\ -f1) | grep policy-builder | awk '{ print $2
}' pb.pcf-02-pcf-engine-app-blv02.<ipv4address>.nip.io
3. Navigate to the Cisco Policy Suite Central URL. 4. Log in with your user credentials. 5. Click Import/Export. 6. Click Import tab. 7. Click File to Import. 8. Select the exported policy backed up in the Back Up SVN, Policy, and CRD Data section. 9. In Import URL, specify the following URL:

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 61

Restoring the Configuration from Back Up

PCF Rolling Software Update

http://svn/repos/configuration

10. Enter a brief description in Commit Message text-box.

11. Click Import.

12. Log in to the master node as an ubuntu user.

13. Run the following command to retrieve the Cisco Policy Builder URL. Example:

kubectl get ing -n $(kubectl get namespaces | grep -oP 'pcf-(\d+|\w+)' | cut -d\ | grep policy-builder | awk '{ print "https://"$2"/pb" }'
https://pb.pcf-02-pcf-engine-app-blv02.<ipv4address>.nip.io/pb ubuntu@popcf-mas01:~/backups_09182019_T2141$

-f1)

14. Navigate to the Cisco Policy Builder URL.

15. Click Build Policies using version controlled data.

16. Choose Repository from the drop-down list.

17. Click OK.

18. Log in with your user credentials.

19. Click File.

20. Click Publish to Runtime Environment.

21. Enter a brief description in Commit Message.

22. Click OK.

Restoring CRD Data 1. In CPS Central home page, click Custom Reference Data. 2. Check the Export CRD to Golden Repository check-box. 3. Specify the SVN host name in Please enter valid server Hostname or IP text-box.

Note For PCF the SVN host name value is svn. 4. Click +. 5. Click Export.

Note You receive a success message when the data is exported successfully.
Removing Temporary Files 1. Log in to SMI Cluster Manager as an ubuntu user.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 62

PCF Rolling Software Update

Restoring the Configuration from Back Up

2. Delete the temporary directory.
Note Ensure that a copy of the image is stored on OSPD before deleting.
Example:
ubuntu@popcf-cm01:~$ ls | grep temp temp_09192019_T0143 ubuntu@popcf-cm01:~/temp_08072019_T1651$ ubuntu@popcf-cm01:~/temp_08072019_T1651$ rm ­f temp_09192019_T0143 ubuntu@popcf-cm01:~/temp_08072019_T1651$

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 63

Restoring the Configuration from Back Up

PCF Rolling Software Update

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 64

7 C H A P T E R

3GPP Specification Compliance for PCF Interfaces

· Feature Summary and Revision History, on page 65 · Feature Description, on page 66 · Configuring Interfaces and Endpoints, on page 67
Feature Summary and Revision History

Summary Data
Table 9: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Not Applicable Not Applicable

Revision History
Table 10: Revision History
Revision Details Enhancement introduced. PCF supports N5 Interface. First introduced.

Release 2022.02.0
2020.02.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 65

Feature Description

3GPP Specification Compliance for PCF Interfaces

Feature Description
The PCF is compliant with the December 2018 and June 2019 compliance version of 3GPP specification for the PCF interfaces such as N7, N25, N28, and Nnrf. The PCF processes the messages from these interfaces as per the compliance profile configured for the corresponding services.
Currently, IE encoding and decoding are supported. Only the existing features work with the June 2019 specification versions. No additional features in the June 2019 version are supported.

Note The PCF continues to support the older versions of 3GPP specifications and the compliance profile configuration controls the same for the PCF interfaces.

Standards Compliance
The PCF is one of the control plane network functions (NFs) of the 5G core network. The PCF uses different interfaces to communicate with the other NFs or nodes, for example, the N7 interface exists between the SMF and PCF. Each of the PCF interfaces complies with a specific version of 3GPP specification.
Use the following table to determine the compliance mapping of each PCF interface and the 3GPP Standards specification versions.
Table 11: Compliance Mapping

Interface

Relationship

3GPP Specification

Rx

Reference point for

29.214 Release 15

interworking with AF and

PCF.

N5

Reference point between 29.514 Release 16

AF and PCF.

N7

Reference point between 29.510 Release 15

SMF and PCF.

N15

Reference point between 29.507 Release 15

AMF and PCF.

N36

Reference point between 29.519 Release 15

UDR and PCF

N28

Reference point between 29.594 Release 15

PCF and CHF

Lightweight Directory Reference point between NA Access Protocol (LDAP) PCF and external
subscriber profile.

Nnrf

Reference point between 29.510 Release 15

PCF and NRF.

Version 15.1.0
16.7.0
15.4.0 and 15.2.0
15.4.0
15.4.0
15.4.0 and 15.2.0
RFC 4511 Lightweight Directory Access Protocol (LDAP) 15.4.0 and 15.4.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 66

3GPP Specification Compliance for PCF Interfaces

Configuring Interfaces and Endpoints

Configuring Interfaces and Endpoints
This section describes how to configure the interfaces/endpoints that interact with PCF. · For configuring the N5, N7, N15, N25, and N28, see Configuring the REST Endpoints, on page 183. · For configuring the LDAP endpoint, see Configuring the LDAP Endpoint, on page 368. · Configuring the NRF interface involves the following steps: · Configuring the NRF Endpoint for Management Services, on page 224 · Configuring the NRF Endpoint for Discovery Service, on page 227

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 67

Configuring Interfaces and Endpoints

3GPP Specification Compliance for PCF Interfaces

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 68

8 C H A P T E R

Basic Systems Configuration

· Feature Summary and Revision History, on page 69 · Overview, on page 69 · Adding a System, on page 70
Feature Summary and Revision History

Summary Data
Table 12: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled ­ Configuration required to disable Not Applicable

Revision History
Table 13: Revision History
Revision Details First introduced.

Release 2020.05.01

Overview
The PCF provides the Policy Builder as an interface for policy management. Policies translate a Service Provider's business rules into actionable, logical processing methods that the PCF enforces on the network.
The PCF provides some standard base policies that creates a starting point for customization to suit a Service Provider's specific business rules.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 69

Adding a System

Basic Systems Configuration

Adding a System

This section describes how to add a system. After installation, use this procedure to set up your Policy Builder by using an example populated with default data. You can change anything that does not apply to your deployment. 1. Click the Reference Data tab, and then click the Systems node to display the Systems tree.
2. Click System... under Create Child: to open the System pane on the right side.
3. Fill in the Name field, and provide a description of this system. Enter the rest of the parameters based on your network requirements.
Table 14: System Parameters

Parameter Name Description Session Expiration Hours

Description

The name of the PCF system.

Describes the system using which you can uniquely identify the system.

An event occurs whenever a session is updated, which in turn increments the session expiry duration.

If no session update event occurs in the specified session expiration duration (combination of Session Expiration Hours and Session Expiration Minutes), then the session will be removed.

Note

The combined value of Session Expiration Hours

multiplied by 60 plus Session Expiration Minutes should

not exceed 35,400 minutes.

Default value is 8.

Session Expiration Minutes

An event occurs whenever a session is updated, which in turn increments the session expiry duration.

If no session update event occurs in the specified session expiration duration (combination of Session Expiration Hours and Session Expiration Minutes), then the session will be removed.

Note

The combined value of Session Expiration Hours

multiplied by 60 plus Session Expiration Minutes should

not exceed 35,400 minutes.

Default value is 0.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 70

9 C H A P T E R

Cisco Common Data Layer

· Feature Summary and Revision History, on page 71 · Feature Description, on page 72 · How it Works, on page 74 · Configuring Cisco Common Data Layer, on page 81 · Configuring the CDL Engine, on page 85 · Configuring the CDL Endpoints, on page 85 · Starting the Remote Index Synchronization, on page 87 · Configuring the Stale Session Cleanup Using the Unique Key, on page 88 · Stale Sessions Cleanup Troubleshooting Information, on page 89 · OAM Support, on page 89
Feature Summary and Revision History

Summary Data
Table 15: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Disabled ­ Configuration required to enable Not Applicable

Revision History
Table 16: Revision History
Revision Details Enhancement introduced. PCF supports N5 Interface.

Release 2022.02.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 71

Feature Description

Cisco Common Data Layer

Revision Details Enhancement introduced. PCF can handle issues of multiple CDL entry updates when multiple RxSTR received on PCF within a short gap. Added configuration support for:
· Stale sessions cleanup · Remote index synchronization
First introduced.

Release 2021.04.0
2020.01.0

Feature Description
Geographic Redundancy
The PCF extends support to the Geographic Redundancy (GR) version of the Cisco Common Data Layer (CDL). When the highest rated CDL endpoint fails, PCF attempts the same operation on the next highly rated CDL endpoint thus providing a nondisrupted message handling. If the next rated endpoint is unavailable, then PCF reattempts the operation on the subsequent endpoint that has the highest rating and so on. PCF can handle issues of multiple CDL entry updates when multiple RxSTR received on PCF within a short gap.

Limitations

Note It is recommended to enable this feature after upgrading both local and remote sites to the latest PCF version.
For more information on the CDL concepts, see the Ultra Cloud Core Common Data Layer Configuration Guide.
This GR support feature has the following limitations: · The PCF attempts to reroute the calls only when it encounters gRPC errors such as UNAVAILABLE. It does not acknowledge errors that the datastore returns and actual gRPC timeouts such as DEADLINE_EXCEEDED gRPC status code. · The PCF Engine does not resolve failures occurring with the datastore such as indexing and slot failures. The CDL layer must resolve these failures and if necessary, send an API call on the remote.

Stale Sessions Cleanup
In the CDL sessions, PCF adds the unique session key SupiDnnKey and the pre-existing unique keys that include FramedIpv6PrefixKey. With the CDL's index overwrite detection command in the PCF Ops Center,

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 72

Cisco Common Data Layer

Limitations

the administrators can configure the ability to delete the old session using the same unique key while the new session is created.
The unique keys that should be used in the overwrite detection configuration are SupiDnnKey and FramedIpv6PrefixKey with the action as delete_record.

Limitations

Note If two unique keys (one key mapped to the notify action and the other to the delete action) point to the same primary key, then only the notify action is considered for the primary key.
For more information on CDL components, see Cisco Common Data Layer documentation.
This Stale Sessions Cleanup feature has the following limitations: · Operations that depend on indexes for the stale sessions require either of the following: · The sessions must be present at the same subscriber that is reconnecting with the same DNN. · The associated framed IPv6 prefix is assigned to the same or the different subscriber session.
If the subscriber has reconnected with a different DNN or framed IPv6 prefix is not reassigned to a different session, the sessions are not identified as stale. · The stale detection and cleanup procedures use the SupiDnnKey values. Indexes of the older session are not created based on the SupiDnnKey values. If the stale session is created before an upgrade, and a new session is created for the same SUPI and DNN combination postupgrade, then the older session is not identified as stale. · If the system has multiple stale sessions with the framed IPv6 prefix key, the corresponding index is associated only with the latest session. When a new session is created with then same key then only one session gets associated.

Synchronizing the Index Records
Sometimes after the local site is reinstated, the index data on both the sites may not be consistent. To reconcile the records and eliminate the discrepancy in the sites, configure the sync operation that initiates index data synchronization on the site with its remote peers.
For information on how site isolation works in PCF, see Site Isolation, on page 337.

Note Configuring the sync operation may cause a negative performance impact. It is recommended to perform this operation in a production environment that experiences a high number of inconsistent index records.
A sync operation cannot be initiated for an index instance where the remote sync is in progress.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 73

Architecture

Cisco Common Data Layer

Architecture
You can configure CDL through PCF Ops Center. CDL in the GR mode replicates the session data across the configured sites. When PCF connects to the CDL, it always treats the local CDL endpoints as the primary endpoint and the remote endpoints as secondaries (with the appropriate rating). PCF uses the secondary endpoints when the connection to the primary endpoint fails.
The following illustration depicts the failover that happens when the PCF Engine is unable to access the primary CDL datastore endpoint.
Figure 9: CDL Datastore Architecture

How it Works
This section describes how this feature works.
Geographic Redundancy When you configure the CDL in PCF through the PCF Ops Center, PCF gets enabled to support multiple CDL datastore endpoints. You can configure the endpoints by specifying the IP addresses, port numbers, and assigning ratings to each endpoint. By default, PCF considers the local endpoint as the primary endpoint, which has the highest rating. PCF performs CDL API operations on the primary endpoint. If this endpoint is unavailable, then PCF routes the operations to the next highest rated endpoint. PCF keeps failing over to the accessible secondary endpoint or until all the configured endpoints are exhausted. It does not reattempt a query on the next rated endpoint if the endpoint is reachable but responds with error or timeout. If PCF is unable to access any of the endpoints in the cluster, then CDL operation fails with the "Datastore Unavailable" error. When Rx STR or N5 Delete messages are received on two different sites (site A and site B) for the same subscriber session, a conflict occurs while each PCF site tries to update and replicate the session data. In this situation:
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 74

Cisco Common Data Layer

Processing of CDL Conflict Notification

· PCF receives notification from CDL with session record from both the sites. · After receiving the notification from CDL based on the session creation state only one site must processes
the notification to resolve the conflict and save the session.
Processing of CDL Conflict Notification
The local and remote sites receive the same CDL conflict notification. The site where session is created will process the notification and the other site ignores the notification.
Note Based on GeoSiteName, PCF identifies whether the session is created at current site or not.
PCF decodes the records (local and remote) into session objects available in the CDL notification. PCF considers the decoded local session object as a base and checks whether the Rx or N5 SessionIds are available in LastActionList of remote session object. If Rx or N5 SessionIds are available, PCF removes the following from base session object.
· Rx or N5 device session. · Rx or N5 session tags (secondary keys). · Rx or N5 session rules. PCF then saves the modified local session.
Call Flows
This section describes the key call flows for this feature.
CDL Endpoint Failure Call Flow
This section describes the CDL Endpoint Failure call flow.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 75

GR Call Flows Figure 10: CDL Endpoint Failure Call Flow

Cisco Common Data Layer

Table 17: CDL Endpoint Failure Call Flow Description
Step Description 1 In the Site 1 environment, the SMF sends a N7 Create Request to the PCF 1 over the N7 interface. 2 The PCF 1 sends Session Create Request to the PCF 2. 3 The PCF 1 sends a Session Store Request to the CDL2. 4 The PCF 1 sends N7 Create Response to the SMF.

GR Call Flows

This section describes the possible CDL GR mode call flows scenarios that could start a failover to another site.

Indexing Shard Failure Call Flow
This section describes how the failover happens when two index replicas that belong to the same shard are down or unavailable.
The indexing shard failure is an example of two points-of-failure scenario where the two replicas reside on different virtual machines or hosts.
The PCF REST endpoint and PCF Engine redirect the traffic to the secondary CDL endpoint site (Site 2) based on the highest rating when the primary CDL site (Site 1) is unavailable.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 76

Cisco Common Data Layer Figure 11: Indexing Shard Failure Call Flow

Slot Replica Set Failure Call Flow

Table 18: Indexing Shard Failure Call Flow Description
Step Description 1 In the Site 1 environment, index replica 1 and replica 2 for a configured shard has failed or unavailable.
Since both the replicas for the shard are unavailable, the CDL endpoint in Site 1 is shut down and all the subsequent requests are directed to the CDL endpoint on Site 2. In the Site 1 environment, the SMF sends a Create Request to PCF REST endpoint over the N7 interface. 2 After receiving the request, the PCF REST endpoint forwards the Create Request to the PCF Engine. 3 The PCF Engine attempts to reach the CDL endpoint to send the Session Create Request. However, the CDL endpoint is unreachable. The PCF Engine sorts the CDL points across Site 1 and Site 2 to recognize the endpoint with the highest rating or priority. 4 The Create Request is evaluated in the stored session and the PCF Engine forwards the request to the CDL endpoint residing in Site 2. 5 After the call request is successful, the PCF Engine notifies the Success Message to the PCF REST endpoint. 6 The PCF REST endpoint forwards the Success Message to the SMF.
Slot Replica Set Failure Call Flow This section describes how the failover happens when two slot replicas that belong to the same replica set are down or unavailable. The slot failure is an example of two points-of-failure scenario where the two slot replicas reside on different virtual machines or hosts.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 77

Local and Remote Sites Receive Rx_STR Without Any Time Gap Call Flow Figure 12: Slot Replica Set Failure Call Flow

Cisco Common Data Layer

Table 19: Slot Replica Set Failure Call Flow Description
Step Description
1 In the Site 1 environment, slot replica 1 and replica 2 for a configured shard is down or unavailable. Since both the replicas for the shard are unavailable, the CDL endpoint in Site 1 is shut down and all the subsequent requests are directed to the CDL endpoint on Site 2. In the Site 1 environment, the SMF sends a N7 Create request to PCF REST endpoint over the N7 interface.
2 The PCF REST endpoint receives the request and forwards it to the PCF Engine.
3 The PCF Engine attempts to connect the CDL endpoint to send the Session Create request. If the CDL endpoint is unreachable, the PCF Engine sorts the CDL points across Site 1 and Site 2 to recognize the endpoint with the highest rating or priority.
4 The Create Request is evaluated in the stored session and the PCF Engine forwards the request to the CDL endpoint residing in Site 2.
5 After the call request is successful, the PCF Engine notifies the Success message to the PCF REST endpoint.
6 The PCF REST endpoint forwards the Success message to the SMF.
Local and Remote Sites Receive Rx_STR Without Any Time Gap Call Flow
This section describes the local and remote sites receive Rx_STR without any time gap call flow.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 78

Cisco Common Data Layer

Local and Remote Sites Receive Rx_STR Without Any Time Gap Call Flow

Figure 13: Local and Remote Sites Receive Rx_STR Without Any Time Gap Call Flow

Table 20: Local and Remote Sites Receive Rx_STR Without Any Time Gap Call Flow Description
Step Description 1 The SMF sends a N7 Create Request to the PCF 1 over the N7 interface. 2 The AF(n) sends a request Rx-AAR (R1) to the PCF 1. 3 The AF(n) sends a request Rx-AAR (R2) to the PCF 1. 4 The AF(n) sends the Rx Session-Termination-Request R1 to the PCF 1. 5 The AF(n) sends the Rx Session-Termination-Request R2 to the PCF 2.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 79

Local and Remote Sites Receive N5 Delete Request Without Any Time Gap Call Flow

Cisco Common Data Layer

Local and Remote Sites Receive N5 Delete Request Without Any Time Gap Call Flow
This section describes the local and remote sites receive N5 Delete Request without any time gap call flow.
Figure 14: Local and Remote Sites Receive N5 Delete Request Without Any Time Gap Call Flow

Table 21: Local and Remote Sites Receive Rx_STR Without Any Time Gap Call Flow Description
Step Description 1 The SMF sends a N7 Create Request to the PCF 1 over the N7 interface. 2 The AF(n) sends a request N5 Create Request (R1) to the PCF 1.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 80

Cisco Common Data Layer

Configuring Cisco Common Data Layer

Step Description 3 The AF(n) sends a request N5 Create Request (R2) to the PCF 1.
4 The AF(n) sends the N5 Delete Request R1 to the PCF 1.
5 The AF(n) sends the N5 Delete Request R2 to the PCF 2.
Configuring Cisco Common Data Layer
This section describes how to configure the CDL endpoints. Configuring the CDL using PCF Ops Center involves the following steps: 1. Configuring the CDL Session Database and Defining the Base Configuration
2. Configuring Kafka in CDL
3. Configuring Zookeeper in CDL
Configuring the CDL Session Database and Defining the Base Configuration
This section describes how to configure the CDL session database and define the base configuration in PCF. To configure the CDL session database and define the base configuration in CDL, use the following configuration in the Policy Ops Center console: config
cdl system-id system_id node-type node_type enable-geo-replication [ true | false ] zookeeper replica zookeeper_replica_id remote-site remote_system_id db-endpoint host host_name db-endpoint port port_number kafka-server remote_kafka_host1 remote_port1 kafka-server remote_kafka_host2 remote_port2 kafka-server remote_kafka_host3 remote_port3 exit
cdl logging default-log-level debug_level cdl datastore session cluster-id cluster_id geo-remote-site remote_site_value endpoint replica replica_number endpoint external-ip ip_address endpoint external-port port_number index map map_value slot replica replica_slot slot map map/shards slot write-factor write_factor slot notification host host_name
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 81

Configuring the CDL Session Database and Defining the Base Configuration

Cisco Common Data Layer

slot notification port port_number slot notification limit tps slot notification include-conflict-data [ true | false ] index replica index_replica index map map/shards index write-factor write_factor end
NOTES:
· system-id system_id--(Optional) Specify the system or Kubernetes cluster identity. The default value is 1.
· node-type node_type--(Optional) Specify the Kubernetes node label to configure the node affinity. The default value is "session." node_type must be an alphabetic string of 0-64 characters.
· enable-geo-replication [ true | false ] --(Optional) Specify the geo replication status as enable or disable. The default value is false.
· zookeeper replica zookeeper_replica_id--Specify the Zooker replica server ID.
· remote-site remote_system_id--Specify the endpoint IP address for the remote site endpoint. Configure this command only when you have set the cdl enable-geo-replication to true.
· db-endpoint host host_name--Specify the endpoint IP address for the remote site. Configure this command only when you have set the cdl enable-geo-replication to true.
· db-endpoint port port_number--Specify the endpoint port number for the remote site endpoint. The default port number is 8882. Configure this command only when you have set the cdl enable-geo-replication to true.
· kafka-server remote_kafka_host1 remote_port1--Specify the Kafka server's external IP address and port number of the remote site that the remote-system-id identifies. You can configure multiple host address and port numbers per Kafka instance at the remote site. Configure this command only when you have set the cdl enable-geo-replication to true.
· endpoint replica replica_number--(Optional) Specify the number of replicas to be created. The default value is 1. replica_number must be an integer in the range of 1 ­ 16.
· endpoint external-ip ip_address--(Optional) Specify the external IP address to expose the database endpoint. Configure this command only when you have set the cdl enable-geo-replication to true.
· endpoint external-port port_number--(Optional) Specify the external port number to expose the database endpoint. Configure this command only when you have set the cdl enable-geo-replication to true. The default value is 8882.
· slot replica replica_slot--(Optional) Specify the number of replicas to be created. The default value is 1. replica_slot must be an integer in the range of 1 ­ 16.
· slot map map/shards--(Optional) Specify the number of partitions in a slot. The default value is 1. map/shards must be an integer in the range of 1 ­ 1024.
· slot write-factor write_factor--(Optional) Specify the number of copies to be written before successful response. The default value is 1. write_factor must be an integer in the range of 0 ­ 16. Make sure that the value is lower than or equal to the number of replicas.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 82

Cisco Common Data Layer

Configuring Kafka in CDL

· slot notification host host_name--(Optional) Specify the notification server hostname or IP address. The default value is datastore-notification-ep.
· slot notification port port_number--(Optional) Specify the notification server port number. The default value is 8890.
· slot notification limit tps--(Optional) Specify the notification limit per second. The default value is 2000.
· slot notification include-conflict-data [ true | false ]--(Optional) Specify whether to receive the original data and the data from the request along with the DB conflict notification. This command is used to send conflict record data from CDL.
· index replica index_replica--(Optional) Specify the number of replicas to be created. The default value is 2. index_replica must be an integer in the range of 1 ­ 16.
· index map map/shards--(Optional) Specify the number of partitions in a slot. The default value is 1. map/shards must be an integer in the range of 1 ­ 1024. Avoid modifying this value after deploying the CDL.
· index write-factor write_factor--(Optional) Specify the number of copies to be written before successful response. The default value is 1. write_factor must be an integer in the range of 0 ­ 16.
Configuring Kafka in CDL
This section describes how to configure Kafka in CDL.
To configure the Kafka in CDL, use the following configuration:
1. Open the Policy Ops Center console and navigate to the datastore CLI.
2. To configure Kafka, use the following configuration:
config cdl kafka replica number_of_replicas enable-JMX-metrics [ true | false ] external-ip ip_address port_number enable-persistence [ true | false ] storage storage_size retention-time retention_period retention-size retention_size end
NOTES:
All the following parameters are optional.
· cdl kafka replica number_of_replicas--Specify the number of replicas to be created. The default value is 3. number_of_replicas must be an integer in the range of 1 ­ 16.
· enable-JMX-metrics [ true | false ]--Specify the status of the JMX metrics. The default value is true.
· external-ip ip_address port_number--Specify the external IPs to expose to the Kafka service. Configure this command when you have set the enable-geo-replication parameter to true. You are required to define an external IP address and port number for each instance of the Kafka replica. For

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 83

Configuring Zookeeper in CDL

Cisco Common Data Layer

example, if the cdl kafka replica parameter is set to 3, then specify three external IP addresses and port numbers.
· enable-persistence [ true | false ]--Specify whether to enable or disable persistent storage for Kafka data. The default value is false.
· storage storage_size--Specify the Kafka data storage size in gigabyte. The default value is 20 GB. storage_size must be an integer in the range of 1-64.
· retention-time retention_period--Specify the duration (in hours) for which the data must be retained. The default value is 3. retention_period must be an integer in the range of 1 ­ 168.
· retention-size retention_size--Specify the data retention size in megabyte. The default value is 5120 MB.
Configuring Zookeeper in CDL
This section describes how to configure Zookeeper in CDL. To configure Zookeeper in CDL, use the following configuration: 1. Open the Policy Ops Center console and navigate to the datastore CLI.
2. To configure the parameters, use the following configuration:
config cdl zookeeper data-storage-size data_storage log-storage-size log_storage replica number_of_replicas enable-JMX-metrics [ true | false ] enable-persistence [ true | false ] end
NOTES: All the following parameters are optional.
· cdl zookeeper data-storage-size data_storage--Specify the size of the Zookeeper data storage in gigabyte. The default value is 20 GB. data_storage must be an integer in the range of 1-64.
· log-storage-size log_storage--Specify the size of the Zookeeper data log's storage in gigabyte. The default value is 20 GB. log_storage must be an integer in the range of 1-64.
· replica number_replicas--Specify the number of replicas that must be created. The default value is 3. number_replicas must be an integer in the range of 1-16.
· enable-JMX-metrics [ true | false ]--Specify the status of the JMX metrics. The default value is true.
· enable-persistence [ true | false ]--Specify the status of the persistent storage for Zookeeper data. The default value is false.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 84

Cisco Common Data Layer

Configuring the CDL Engine

Sample Configuration The following is a sample configuration of CDL in the HA environment.
cdl system-id system_i cdl enable-geo-replication true cdl zookeeper replica num_zk_replica cdl datastore session
endpoint replica ep_replica index map index_shard_count
slot replica slot_replica slot map slot_shard_count exit cdl kafka replica kafka_replica
Configuring the CDL Engine
To configure this feature use the following configuration: config
cdl engine properties enable.conflict.merge [ true | false ] GeoSiteName geosite_name conflict.tps conflict_number conflict.resolve.attempts end
NOTES: · properties--Specify the system properties.
· enable.conflict.merge [ true | false ]--Specify to enable the feature at application end.
· GeoSiteName geosite_name--Specify which site notification to be processed.
· conflict.tps conflict_number--Specify the rate limit of the confliction notification. The default value is considered as '5 tps'.
· conflict.resolve.attempts--Specify the number of attempts that application can try to merge the record. The default value is considered as '2 attempts'.
Note The enable.conflict.merge [ true | false ], conflict.tps conflict_number, and conflict.resolve.attempts are to be configured manually.
Configuring the CDL Endpoints
This section describes how to configure the CDL endpoints. Configuring the CDL endpoints involves the following steps:

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 85

Configuring the External Services

Cisco Common Data Layer

1. Configuring the External Services 2. Associating the Datastore with the CDL Endpoint Service
Configuring the External Services
This section describes how to configure the external services in PCF. CDL gets deployed in the GR environment as part of the SMI deployment procedure. By default, the CDL endpoints are available in the Datastore CLI node of the PCF Ops Center. However, you are required to configure these endpoints. For each CDL site and instance, configure external service with the IP address and port number that corresponds to the site and instance. 1. Open the Policy Ops Center console and navigate to the datastore CLI. 2. To configure the parameters, use the following configuration:
config external-services site_name ips ip_address ports port_number end
NOTES: · external-services site_name--Specify the CDL site or instance name. · ips ip_address--Specify the IP address on which the CDL endpoint is exposed. · ports port_number--Specify the port number on which the CDL endpoint is exposed.
Associating the Datastore with the CDL Endpoint Service
This section describes how to configure the external service for each CDL endpoint service that you plan to use. To configure the external service for each CDL endpoint service, use the following configuration: 1. Open the Policy Ops Center console and navigate to the datastore CLI. 2. To associate the datastore with CDL endpoint service, use the following configuration:
config datastore external-endpoints service_name port port_number rating rating_priority end
NOTES: · datastore external-endpoints service_name--Specify the service name that belongs to the external services. · port port_number--Specify the port number where the external service resides.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 86

Cisco Common Data Layer

Starting the Remote Index Synchronization

· rating rating_priority--Specify the rating or priority of the external service. PCF gives preference to the endpoints with the higher ratings.
Starting the Remote Index Synchronization
This section describes how to start the remote index synchronization. Before configuring the remote index sync, ensure that the geo-remote-site parameter for CDL is configured. To start the remote index synchronization, use the following configuration:
cdl actions remote-index-sync start [ map-id map_id | slice-name slice_name ] end
NOTES: · cdl--Enters the CDL configuration mode. · remote-index-sync start--Specify the remote index sync feature. · map-id map_id --Specify the index mapID for which the remote index sync procedure should start. By default, remote index sync is initiated for all the index instances. Using this parameter you can specify a maximum of 5 mapIDs. · slice-name slice_name--Specify the slice name for which the remote index sync procedure should start. By default, remote index sync is initiated for all the sliceNames. There is no limit to the number of sliceNames that you can specify.
Sample Configuration
cdl actions remote-index-sync start map-id { 1 } map-id { 2 } slice-name { session-1 } slice-name { session-2 }
Viewing the Remote Index Synchronization Status
This section describes how to view the status of the index synchronization procedure that you have executed. To view the status of the index sync procedure, use the following configuration:
cdl actions remote-index-sync status end
NOTES: · remote-index-sync status--Displays the status of the index instances for which the syncing with the remote peers is in progress.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 87

Configuring the Stale Session Cleanup Using the Unique Key

Cisco Common Data Layer

Sample Output
syncing-instances 'index-mapID-1-instanceID-1, index-mapID1-instanceID-2, index-mapID-2-instanceID-1, index-mapID-2instanceID-2'
Configuring the Stale Session Cleanup Using the Unique Key
The section describes how to configure stale session cleanup using the unique key. To configure the stale session cleanup, use the following configuration: config
cdl datastore session datastore_name features index-overwrite-detection [ max-tps | queue-size |
unique-keys-prefix [ SupiDnnKey | FramedIpv6PrefixKey ] action [ notify-record | log-record | delete-record ] exit end
NOTES: · cdl--Enter the CDL configuration mode. · datastore session datastore_name--Specify the CDL datastore session. · index-overwrite-detection [ max-tps | queue-size | unique-keys-prefix ]--Configures the index keys overwrite detection capability. The parameter has the following subparameters: · max-tps--Specify the TPS per cdl-endpoint at which the stale record notification is sent. This parameter is applicable only when the action is "notify-record". The accepted value range is 1..2000. The default value is 200. · queue-size--Specify the queue size for each cdl-endpoint. The default value is 1000. · unique-keys-prefix [ SupiDnnKey | FramedIpv6PrefixKey ]--Specify the list of uniqueKey prefixes for the index overwrite detection and the action that must be performed on successful detection.
· action [ log-record | delete-record ]--Specify the action that must be taken on detecting a stale record.
Note If configuring the stale session cleanup feature for the first time on your system, Cisco recommends performing the configuration after both the GR sites are upgraded to the same software version.
Important The delete-record action on key SupiDnnKey command takes effect only when the required key SupiDnnKey is added in the CDL sessions.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 88

Cisco Common Data Layer

Sample Configuration

Sample Configuration
The following is a sample configuration:
cdl datastore session features index-overwrite-detection unique-keys-prefix SupiDnnKey action delete-record exit features index-overwrite-detection unique-keys-prefix FramedIpv6PrefixKey action delete-record exit end

Stale Sessions Cleanup Troubleshooting Information
To view the status of the clean up status of the stale sessions, review the warning logs in index pods.
You can review the logs to debug the stale sessions issues by setting the index.overwrite.session log to INFO level.
Example:
cdl logging logger index.overwrite.session level info exit

OAM Support
This section describes operations, administration, and maintenance support for this feature.

Statistics

Following are the list of counters that are generated for scenarios where the stale session cleanup process is initiated. The following metrics track the counter information:
· overwritten_index_records_deleted - Captures the total number of records deleted due to overwritten or duplicate unique keys at index Sample query: overwritten_index_records_deleted The following labels are defined for this metric: · errorCode - The error code in the DB response. Example: 0, 502.
· sliceName - The name of the logical sliceName. Example: session
· overwritten_index_records_skipped - Captures the total number of records detected as stale, but dropped when the queue is full while processing the records for notify or delete. Sample query: overwritten_index_records_skipped The following labels are defined for this metric: · action - The action that was supposed to be performed for the stale record. Example: delete, notify.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 89

Statistics

Cisco Common Data Layer

· sliceName - The name of the logical sliceName. Example: session
The following statistics are supported to handle issues of multiple CDL entries updates when multiple Rx STR or N5 Delete received on PCF within a short gap feature:
Note The following values apply to all the statistics: · Unit - Int64 · Type - Counter · Nodes - Service
· record_conflict_merge_total - Captures the total count of conflict merge actions.
The following label is defined for this metric: · action
The "action" label supports the following values: · ok: Captures success processing of conflict notification. · submit: Captures the number of messages submitted to the engine when conflict notification is received from CDL. · retry: Captures the number of retry operations occurred during conflict merge. · skip_<reason for skip>: Indicates that the PCF is expecting some data validation before the records are merged when CDL notification is received. If that data is missing, PCF logs these skip counters with reason to skip the data. Reasons to skip the data are: · throttle: Due to throttle check. · feature_disabled: Feature is disabled. · no_geositename: GeoSiteName is not configured. · flag1_mismatch: Mismatch of CDL flag 1 at both sites. · unsupported_record: Invalid data records of CDL notification. · retry_unsupported_record: Invalid data records available during retry. · unsupported_lastaction: Invalid lastAction objects are available in notification records. · retry_ unsupported_lastaction: During retry lastAction objects are invalid. · no_sessionid - Session id is not available in remoteLastAction object. · retry_no_sessionid: Session id is not available in remoteLastActoin object. · no_remotesessionid: Remote session id is not available to remove in local record object.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 90

Cisco Common Data Layer

Statistics

· retry_no_remotesessionid: Remote session id not available to remove in local record object during retry.
· attemptsdone: Total number of attempts completed.
· error_<cause of error>: Indicates while merging the records some error/exception occurred in that case pcf logs this error related counter. Following are the types of cause of errors: · deletesession: Remote rx session delete operation from the local record failed. · retry_deletesession: During retry remote rx session delete operation from the local record failed. · removeflags: after deleting remote rx session from local record while removing corresponding flags from local record failed. · addactionlist: Failed to consolidated all action list objects from local and remote records. · nopk: Primary key is not available in the record. · retry_nopk: Primary key is not available in the record during retry.
For information on statistics, see Ultra Cloud Core Common Data Layer Configuration and Administration Guide.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 91

Statistics

Cisco Common Data Layer

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 92

1 0 C H A P T E R

Authorization With Required QoS

· Feature Summary Revision History, on page 93 · Feature Description, on page 93 · How it Works, on page 94 · Call Flows, on page 94 · Standards Compliance , on page 96
Feature Summary Revision History

Summary Data
Table 22: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled Not Applicable

Revision History
Table 23: Revision History
Revision Details First introduced.

Release 2022.03.0

Feature Description
The Application Function (AF) initiates support for Authorization with Required QoS to enable the high-priority traffic and applications for network resources.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 93

How it Works

Authorization With Required QoS

How it Works
This section describes how this feature works. In the Authorization with Required QoS feature, the interactions happen in the following sequence:
· AF initiates Authorization of Required QoS, the Policy Control Function (PCF) sets the feature state as enabled in the create response.
· For authorizing a media component, PCF uses a QoS reference as a parameter, and the operators added the QoS reference as an extra key column to the Search Table Groups (STG).
· To create and update requests without QoS reference: PCF uses the null value for QoS parameters and * value to match Customer Reference Data (CRD) queries without QoS reference.
· If the CRD query failed to generate a match while analyzing STG Configuration with QoS reference, PCF applies the QoS parameters obtained using the QoS algorithm.
· Rejecting media components with the alternate QoS: The SMF supports the Authorization with the Required QoS feature for provisioning rules with different QoS levels. When SMF does not support this feature, PCF automatically rejects the media components with alternate QoS references as authorization failure. Refer to Bearer Authorization in N5 Authorization.
· In the Service Based Interface (SBI) profile, the configuration option is disabled rejecting media components with alternate QoS references. When this option is enabled, PCF ignores the alternate service requirements and selects the QoS parameters for the media component that based on QoS reference.
· Handling of AF sessions without Authorization with Required QoS: The QoS parameters that are derived for QoS reference are modified, and a final QoS parameter is applied for the Message Prioritization Service (MPS). If the PDU session to AF session is associated with one or more MPS sessions.
· Subscribing and unsubscribing to the QoS: In subscribing and unsubscribing to the QOS_NOTIF event, PCF supports AF and specifies if the GBR QoS targets are assured or not. In QoS data, PCF enables and disables the QNC flag for Policy and Charging Control (PCC) rules connected to an AF session.
Call Flows
This section describes the key call flows for this feature.
Authorization with Required QoS Call Flow
This section describes the Authorization with Required QoS call flow for the N7 and N5 interface.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 94

Authorization With Required QoS Figure 15: Authorization with Required QoS Call Flow

Authorization with Required QoS Call Flow

Table 24: Authorization with Required QoS Call Flow Description
Step Description 1 The SMF sends a N7 Create request to the PCF-REST-EP. 2 The PCF-REST-EP sends the Single Mode (SM) Policy Create Request to the PCF-SERVICE. 3 The PCF-SERVICE sends the Create session to the CDL. 4 The PCF-SERVICE sends the SM Policy Create Response to the PCF-REST-EP. 5 The PCF-REST-EP responds with the N7 Create to the SMF. 6 After UE IP Allocation, the SMF sends the N7 Update to the PCF-REST-EP. 7 The PCF-REST-EP sends the SM Policy Update Request to the PCF-Service. 8 The PCF-SERVICE sends the Update Session to the CDL. 9 After Indexing Information Updated, the PCF-Service sends the SM Policy Update Response to the
PCF-REST-EP.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 95

Standards Compliance

Authorization With Required QoS

Step Description 10 The PCF-REST-EP sends the N7 Update Response to the SMF. 11 After AF Session Establishment, the AF sends the N5 Create Request to the PCF-REST-EP. 12 The PCF-REST-EP sends AF Policy Create Request to the PCF-SERVICE. 13 The PCF-SERVICE sends the Find by Unique Key (IP Address) to the CDL. 14 After Index Lookup Successful, the CDL sends the Return Session Details to the PCF-SERVICE. 15 After QoS Reference Handling, the PCF-SERVICE sends the AF Policy Create Response to the
PCF-REST-EP. 16 The PCF-REST-EP sends the N5 Create Response to the AF. 17 The PCF-SERVICE sends the SM Policy Notify Request to the PCF-REST-EP. 18 The PCF-REST-EP sends the N7 Notify to the SMF. 19 The SMF sends the N7 Notify Response to the PCF-REST-EP. 20 The PCF-REST-EP sends the SM Policy Notify Request to the PCF-SERVICE. 21 After QoS Notification, the SMF sends the N7 Update to the PCF-REST-EP. 22 The PCF-REST-EP sends the SM Policy Update Request to the PCF-SERVICE. 23 After Process N7 Update, the PCF-SERVICE sends the SM Policy Update Response to the
PCF-REST-EP. 24 The PCF-SERVICE sends the AF Policy Notify Request to the PCF-REST-EP. 25 The PCF-REST-EP sends the N5 Notify to the AF. 26 The AF sends the N5 Notify Response to the PCF-REST-EP.
Standards Compliance
This feature complies with the following standards specifications: · 3GPP 29.513 "Policy and Charging Control signaling flows and QoS parameter mapping" · 3GPP 29.514 version 16.7.0 "Policy Authorization Service (PAS)"

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 96

1 1 C H A P T E R

Configuring HTTP or HTTPS and SSL for SBA Interface

· Feature Summary, on page 97 · Feature Description, on page 98 · How it Works, on page 98 · Configuring Support for HTTP or HTTPS and TLS, on page 99 · HTTP and SSL for SBA Interface OA&M Support, on page 100
Feature Summary

Summary Data
Table 25: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled ­ Configuration required to disable Not Applicable

Revision History
Table 26: Revision History
Revision Details First introduced.

Release 2020.03.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 97

Feature Description

Configuring HTTP or HTTPS and SSL for SBA Interface

Feature Description
In the SBA framework, the PCF exchanges data across the interconnected network functions and data repositories. The communication within this framework is established over a secure layer comprising of Hypertext Transfer Protocol (HTTP) or HTTPS using Transport Layer Security (TLS). TLS offers a secure network layer transportation of data between the components. However, PCF also offers support for HTTPS without TLS.
In this release, TLS provides a transport layer encryption between the nodes for the security compliance purposes. This feature does not support the NF security requirements as per the 3GPP specifications of 5G.
The PCF provides HTTP or HTTPS support for the N7, N15, N28, N36, and NRF interface. The information transmission between the client and server happens through the HTTPS requests.
How it Works
This section describes how this feature works.
The implementation of HTTP or HTTPS with TLS in PCF requires you to configure the HTTP and HTTPs secure port for each interface. To enable a TLS handshake, import the signed certificate into the PCF Ops Center from a trusted source. The PCF supports both server and client HTTPS requests. By default, the PCF supports HTTP requests without TLS.
The following graphic illustrates the communication flow between NFs and REST endpoint.
Figure 16: HTTP or HTTPS Communication Flow

The support for HTTP and HTTPS in PCF involves the following steps: 1. Configure the ca-certificates which are required for TLS. The certificate data must be in the PEM format
and residing in the Java KeyStore (JKS).
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 98

Configuring HTTP or HTTPS and SSL for SBA Interface

Configuring Support for HTTP or HTTPS and TLS

2. Configure the certificate and private key for establishing the TLS channel between the server and client. Obtain the private key from the certificate.
3. By default, the uri-scheme is associated with the HTTP. Enable HTTPS by associating the rest-endpoint uri-scheme with the HTTPS. PCF invokes the configured server certificate when starting up the pcf-rest-ep pod. This step ensures that the SSL context is set for the REST server. When PCF is a client that initiates N28, nNRF, or the N15 requests, the HTTP or HTTPS protocol is specified in the endpoint profile. The rest-endpoint server detects all the certificates from the Kubernetes secrets during a startup. An individual Kubernetes secret is created for each certificate. These secrets are mounted on the rest-endpoint pods, at /config/secrets location during its deployment. All the certificates are loaded into the keystore that is located at /opt/workspace/rest-ep/certs/server/keystore. If the HTTPS is configured as the uri-scheme, then the HTTP server initiates the SSL context with the certificate name configured. For messages initiated from the REST endpoint (PCF as client), the HTTP client loads all the certificates from the keystore.
Configuring Support for HTTP or HTTPS and TLS
This section describes how to configure the HTTP or HTTPS and TLS from the PCF Ops Center. Configuration of HTTP or HTTPS and TLS involves:
· Configuring Server and Client Certificates
Configuring Server and Client Certificates
This section describes how to configure the certificates for the server and client. To configure the certificates for the server and client, use the following configuration in the PCF Ops Center:
config pcf-tls ca-certificates [name] cert-data certificate_pem certificates [name] cert-data certificate_pem private-key certificate_private_key end
NOTES: · ca-certificates [name] --Specify the certificate name. The list of certificates names is displayed based on the configured certificates.
· certificates [name]--Specify the certificate name. The list of certificates names is displayed based on the configured certificates.
· cert-data certificate_pem--Specify the cert-data value in the PEM format.
· private-key certificate_private_key--Specify the private key value in the Public-Key Cryptography Standards (PKCS) #8 format.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 99

Obtaining the Private key

Configuring HTTP or HTTPS and SSL for SBA Interface

Obtaining the Private key
This section describes how to obtain the private key from a certificate. To obtain the private key, perform the following procedure: 1. Convert the certificate from PEM to PKCS12 format using the following:
openssl pkcs12 -export -out pkcscertificate.p12 -inkey certificatekey.pem -in
inputcertificate.pem
2. Extract the private key from the PKCS12 certificate created in the previous step by using the following: openssl pkcs12 -in pkcscertificate.p12 -nocerts -nodes -out privatekey.pem
3. Convert the private key to a PKCS8 key using the following: openssl pkcs8 -in privatekey.pem -topk8 -nocrypt -out privatekey.p8

Verifying the Certificate Status

This section describes how to verify the configuration status of the certificates. The following configuration is a sample output of the show rest-endpoint certificate-status command:

CERTIFICATE

NAME

TIME TO EXPIRE

---------------------------------------------

pcfserver 3649 days 10 hours 25 minutes

cacert

3610 days 13 hours 55 minutes

pcfclient 334 days 21 hours 26 minutes

HTTP and SSL for SBA Interface OA&M Support
This section describes the operations, administration, and maintenance information for this feature.

Statistics

This section provides gauge that is generated for computing the HTTP TLS certificate validity information. · http_tls_cert_validity: This gauge fetches the duration (in milliseconds) after which the certificate expires. The cert_name label fetches the certificate name. An example of the Prometheus query:
abs(http_tls_cert_validity)>0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 100

1 2 C H A P T E R

Content Filtering

· Feature Summary and Revision History, on page 101 · Feature Description, on page 101 · Configuration Support for Content Filtering, on page 102
Feature Summary and Revision History

Summary Data
Table 27: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Disabled ­ Configuration required to enable Not Applicable

Revision History
Table 28: Revision History
Revision Details First introduced.

Release 2020.01.0

Feature Description
PCF offers fine-grained control over the content that SMF processes. The filtering policy provides methodical control over the content during the PCF and SMF interaction by identifying and limiting the access to inappropriate content.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 101

Configuration Support for Content Filtering

Content Filtering

Configuration Support for Content Filtering
This section describes how to configure the filtering policy using the following service: · CiscoContentFilteringPolicy

CiscoContentFilteringPolicy
This section describes the parameters for the CiscoContentFilteringPolicy configuration.
Before configuring the CiscoContentFilteringPolicy service, ensure that you have created the use case templates and added the CiscoContentFilteringPolicy service. Use case templates are the building blocks of the PCF architecture. The use case templates allow you to define the Service Configuration objects set by a Service Option.
For information on how to create a use case template and add a service for this configuration, see Configuring the Use Case Template, on page 349 and Adding a Service, on page 348.
Table 29: CiscoContentFilteringPolicy Parameters

Parameters

Description

Priority

Indicates the priority of the service configuration object to be used in case multiple service initiator conditions match.

Cisco Content Filtering Policy Specifies the policy ID that PCF filters when transmitting content.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 102

1 3 C H A P T E R

Diameter Endpoint

· Feature Summary and Revision History, on page 103 · Feature Description, on page 104 · Configuring the Node for the Diameter Endpoint Pod, on page 104
Feature Summary and Revision History

Summary Data
Table 30: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled ­ Always-on Not Applicable

Revision History

Table 31: Revision History

Revision Details Enhancement introduced. PCF supports dual stack (IPv4 and IPv6) connectivity on its external interfaces/endpoints.
Enhancement introduced. PCF supports IPv6 connectivity on its external interfaces/endpoints.
First introduced.

Release 2022.01.0
2021.04.0 Pre 2020.01.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 103

Feature Description

Diameter Endpoint

Feature Description
You can enable the Diameter endpoint to dynamically create pods on a designated node or host. This feature might be a requirement when you want to ensure that the nodes are meeting specific security and regulatory parameters, or the node is closer to the datacenter in terms of geographical proximity. The node affinity determines the node where PCF creates the Diameter endpoint pods, which are based on the affinity towards a node or group of nodes. Node affinity is a set of rules that allows you to define the custom labels on nodes and specify the label selectors within the pods. Based on these rules, the scheduler determines the location where the pod can be placed.
Note If you do not specify a node, then the Kubernetes scheduler determines the node where the Diameter endpoint creates a pod.
PCF supports both IPv4 and IPv6 connectivity on its external interfaces/endpoints (inbound and outbound).
Configuring the Node for the Diameter Endpoint Pod
This section describes how to specify the node or host where the Diameter endpoint must spawn the pod.
Note Configuration changes to the diameter endpoint cause the endpoint to restart automatically. Cisco recommends making such changes only within the maintenance window.
To specify the node where you want Diameter endpoint to spawn the pod, use the following configuration: config
diameter group diameter_group_name mode server server_name stack stack_name
application application_name bind-ip ipv4 host_address bind-ipv6 ipv6 host_address bind-port port_number fqdn fqdn_address realm realm_address node-host node_host_address end NOTES: · diameter group diameter_group_name--Specify the Diameter group name. · mode server server_name--Specify the server name that operates as the mode server. · stack stack_name--Specify the stack name. · application application_name--Specify the application name.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 104

Diameter Endpoint

Configuring the Node for the Diameter Endpoint Pod

· bind-ip host_address--Specify the host address IPv4 to bind the stack.
· bind-ipv6 host_address--Specify the host address IPv6 to bind the stack.
· bind-port port_number--Specify the port number to bind the stack.
· fqdn fqdn_address--Specify the FQDN address.
· realm realm_address--Specify the realm address.
· node-host node_host_address--Specify the host IP address of the node.
Sample Configuration The following is a sample configuration of the node configuration.
mode server stack cicdsite application rx bind-ip 192.0.2.18 realm cisco.com node-host for-node-2a-worker39e1587354h exit

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 105

Configuring the Node for the Diameter Endpoint Pod

Diameter Endpoint

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 106

1 4 C H A P T E R

Dummy N7 Notify Request

· Feature Summary and Revision History, on page 107 · Feature Description, on page 108 · How it Works, on page 108 · Configuration Support for the Dummy N7 Notify Request, on page 108
Feature Summary and Revision History

Summary Data
Table 32: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation
Revision History
Table 33: Revision History
Revision Details Enhancement introduced. PCF supports N5 Interface. First introduced.

PCF SMI Disabled ­ Configuration required to enable Not Applicable
Release 2022.02.0 2020.01.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 107

Feature Description

Dummy N7 Notify Request

Feature Description
PCF is equipped to retrieve the event triggers from the SMF by sending the N7 Notify Request. Certain features such as Rx or N5 bearer authorization, QoS derivation, and rule evaluation depends on specific event triggers such as RAT-Type and AccessType for taking the appropriate action. For instance, the RAT-Type event trigger lets you determine the Radio Access Technology (RAT) that is serving the User Equipment. Typically, PCF does not subscribe to all the event triggers during the session initiation using N7 Create. If the features are dependent on specific event triggers and PCF did not subscribe to them, then PCF does not fetch the values associated with those events. With the dummy N7 Notify Request, you can send an intermediate request to fetch the event triggers corresponding to the configured Media-Type which is specified in the Rx AAR or N5 Create message from the IMS.
How it Works
This section describes how this feature works. In the Dummy N7 Notify Request feature, the PCF interactions happen in the following sequence: 1. The SMF sends an N7 Create Request to PCF. The PCF responds to this request with the configured event
triggers.
2. When IMS initiates multimedia calls containing the AAR message with the Media-Type, PCF initiates an N7 Notify Request to assign the PCC rules that are evaluated based on the media details received in the AAR message. However, in some situations PCF cannot compute the rules as it did not subscribe to the specific event triggers such as RAT-Change and AccessType AVP.
3. The PCF attempts to determine the corresponding event trigger from the SMF by sending an intermediate (dummy) N7 Notify Request to SMF.
4. The SMF responds with the applicable event triggers that are specified in the dummy N7 request.
5. The PCF uses these triggers to compute the PCC rules and transmits it to the SMF in the subsequent N7 Notify Request.
Configuration Support for the Dummy N7 Notify Request
This section describes how to configure the dummy Notify Request through which PCF retrieves the triggers for the AAR messages with Media-Type. The configuration of the proxy N7 Notify Request involves the following steps: 1. Creating the STG for the N7 Notify Request
2. Configuring the Dummy N7 Notify Parameters
3. Configuring the Event Triggers

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 108

Dummy N7 Notify Request

Creating the STG for the N7 Notify Request

Creating the STG for the N7 Notify Request
This section describes how to create the STG N7 Notify request which is referred by the CRD. 1. Log in to Policy Builder. 2. Click the Reference Data tab, and from the left pane click Custom Reference Data Tables to view the
options. 3. On the left pane, click the Search Table Groups folder. A default folder is created under the Search Table
Groups folder. 4. Expand the default folder and select the table icon to view the Custom Reference Data Table parameters
on the right pane. A default STG is created under the Search Table Groups folder. 5. Enter the parameters in the Custom Reference Data Table pane. Rename the CRD with a unique name. 6. Navigate to the Column field and click Add. In the Columns pane, click the row to enter the Name,
Display Name, and Type. Select the Use In Condition, Key, and Required check box. 7. Specify a row for the Media-Type and a row for the event triggers that you want to fetch.
The event triggers row does not require the Use In Condition, Key, and Required check box to be selected. 8. Save and publish the changes.
Configuring the Dummy N7 Notify Parameters
This section describes how to configure the dummy N7 Notify event trigger parameters through the PCF Central. 1. Log in to PCF Central. 2. Select the Custom Reference Data. 3. In the Custom Reference Data Tables pane, click the table that you have created in Creating the STG
for the N7 Notify Request, on page 109. 4. In the dialgox box, click Add Row to include the Media-Type and event trigger. The information is
populated based on the configured STG table. 5. Click Done to save your changes.
Configuring the Event Triggers
This section describes how to subscribe to the N7 event triggers through the dummy N7 Notify request. 1. Log in to Policy Builder. 2. Click the Reference Data tab. 3. In the left pane, choose Diameter Defaults > Rx Profiles. 4. In the Rx Profiles Summary pane, under Create Child, click Rx Profile.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 109

Configuring the Event Triggers

Dummy N7 Notify Request

5. On the left pane, choose Rx Profiles > default. In the Rx STG lookup binding pane, rename the default profile name.
6. In the Stg Reference field, click select to select the STG table that you have configured.
7. In the List Of Input Column Avp Pairs section, click Add. a. Click the row in the Avp Name to specify the media type.
b. In the Column column, hover the cursor on the first row to click the ellipsis (...) and select the media type that you specified in the STG. For more information, see Creating the STG for the N7 Notify Request, on page 109.
8. In the List Of Output Column Avp Pairs section, click Add. a. Click the row in the Avp Name to specify the event trigger.
b. In the Column column, hover the cursor on the first row to click the ellipsis (...) and select the event trigger that you specified in the STG. For more information, see Creating the STG for the N7 Notify Request, on page 109.
9. In the left pane, navigate to the Diameter Client > Summary. In the Summary pane, choose Rx Client > default.
10. In the Rx Client pane, navigate to Request Gx RAA for Event-Triggers section and select the check box in the corresponding row.
11. In the Rx CRD AVP name to extract Event-Triggers section, click Add.
12. In the Add Values dialog box, add the triggers. Specify the same values that you have entered for the Diameter Defaults parameters. The events in the list are populated based on the values of the CRD table (dummy notify table). The input columns of the CRD table are associated to the Rx media details such as Media-Type, and the output columns indicate the event trigger numbers that are to be subscribed or enabled on the SMF.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 110

1 5 C H A P T E R

Dynamic ARP Functionality for PC and PV

· Feature Summary and Revision History, on page 111 · Feature Description, on page 112 · How it Works, on page 112 · Configuring CRD Table and RxSTGConfiguration AVP, on page 112 · Configuring CRD Table and N5STGConfiguration AVP, on page 114 · OAM Support, on page 115
Feature Summary and Revision History

Summary Data
Table 34: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation
Revision History
Table 35: Revision History
Revision Details Enhancement introduced. PCF supports N5 Interface. First introduced.

PCF SMI Enabled ­ Always-on Not Applicable
Release 2022.02.0
2021.04.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 111

Feature Description

Dynamic ARP Functionality for PC and PV

Feature Description
PCF supports the dynamic ARP feature to send the same Priority-Level value in the dedicated bearers as that of the default bearer. The dynamic ARP functionality is extended to Preemption Capability (PC) and Preemption Vulnerability (PV). The PC parameter defines whether a bearer with a lower priority level can be dropped to free up the required resources. The PV parameter defines whether a bearer is applicable for such dropping by a preemption capable bearer with a higher priority value. To support this functionality for Rx interface, add two new columns, Rx_Dynamic_Vulnerability and Rx_Dynamic_Capability to the Rx_QoS_Table and for N5 interface, add two new columns, N5_Dynamic_Vulnerability and N5_Dynamic_Capability to the N5_QoS_Table.
How it Works
This section describes how this feature works. For a WPS user, the default bearer ARP value includes a Priority-Level value with PC set to enabled and PV set to disabled. In case, when a non-WPS user calls a WPS user in Rx interface, the dynamic ARP attribute in the Rx_QoS_Table initiates the PCF to set the Priority-Level value in the dedicated bearer rules to match that of the default bearer value. But the PVI/PCI values sent in the dedicated bearer rules use the enforced values from the Rx_QoS_Table (typically PVI enabled, PCI disabled). In case, when a non-WPS user calls a WPS user in N5 interface, the dynamic ARP attribute in the N5_QoS_Table initiates the PCF to set the Priority-Level value in the dedicated bearer rules to match that of the default bearer value. But the PVI/PCI values sent in the dedicated bearer rules use the enforced values from the N5_QoS_Table (typically PVI enabled, PCI disabled). For WPS user, if dynamic ARP attribute for PVI and PCI is set to "D", then the PVI and PCI values will be mirrored from the default bearer instead using the configured Rx QoS Table values in Rx interface and configured N5 QoS Table values in N5 interface.
Configuring CRD Table and RxSTGConfiguration AVP
Configuring CRD table and RxSTGConfiguration AVP involves the following steps:
Adding Rx_Dynamic_Capability and Rx_Dynamic_Vulnerability
To add Rx_Dynamic_Capability and Rx_Dynamic_Vulnerability columns to the Rx_QoS CRD table, use the following steps: 1. Log in to Policy Builder.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 112

Dynamic ARP Functionality for PC and PV

Configuring RxSTGConfiguration AVP

2. Click the Reference Data tab, and from the left pane click Custom Reference Data Tables to view the options.
3. On the left pane, expand the Search Table Groups folder. 4. Expand the Rx_QoS_Table sub folder of Search Table Groups and click the.Rx_QoS_Table 5. Go to the *Columns field and click the Add. 6. Add the column Name and Display Name as RX_DYNAMIC_CAPABILITY and
RX_DYNAMIC_VULNERABILITY.
Figure 17: Adding Rx_Dynamic_Capability and Rx_Dynamic_Vulnerability

Configuring RxSTGConfiguration AVP
This section describes the parameters that can be configured for RxSTGConfiguration. The RxSTGConfiguration service configuration supports the following output AVPs that allow the dynamic value expression. Before setting the service parameters, ensure that you create a use case template and add a service for this configuration. For details, see Configuring the Use Case Template, on page 349 and Adding a Service. The following table describes the RxSTGConfiguration service parameter.
Table 36: RxSTGConfiguration ParameterD

Parameters Dynamic-QoS-ARP-Pre-Emption-Capability
Dynamic-QoS-ARP-Pre-Emption-Vulnerability

Description
If the value is configured as "D" then the feature is enabled for PC. If the value is configured with any other value except "D" or is empty then the feature is disabled for PC.
If the value is configured as "D" then the feature is enabled for PV. If the value is configured with any other value except "D" or is empty then the feature is disabled for PV.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 113

Configuring CRD Table and N5STGConfiguration AVP

Dynamic ARP Functionality for PC and PV

Configuring CRD Table and N5STGConfiguration AVP
Configuring CRD table and N5STGConfiguration AVP involves the following steps:
Adding N5_Dynamic_Capability and N5_Dynamic_Vulnerability
To add N5_Dynamic_Capability and N5_Dynamic_Vulnerability columns to the N5_QoS CRD table, use the following steps: 1. Log in to Policy Builder. 2. Click the Reference Data tab, and from the left pane click Custom Reference Data Tables to view the
options. 3. On the left pane, expand the Search Table Groups folder. 4. Expand the N5_QoS_Table sub folder of Search Table Groups and click the N5_QoS_Table. 5. Go to the *Columns field and click the Add. 6. Add the column Name and Display Name as N5_DYNAMIC_CAPABILITY and
N5_DYNAMIC_VULNERABILITY.
Figure 18: Adding N5_Dynamic_Capability and N5_Dynamic_Vulnerability

Configuring N5STGConfiguration AVP
This section describes the parameters that can be configured for N5STGConfiguration. The N5STGConfiguration service configuration supports the following output AVPs that allow the dynamic value expression. Before setting the service parameters, ensure that you create a use case template and add a service for this configuration. For details, see Configuring the Use Case Template, on page 349 and Adding a Service. The following table describes the N5STGConfiguration service parameter.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 114

Dynamic ARP Functionality for PC and PV

OAM Support

Table 37: N5STGConfiguration ParameterD
Parameters Dynamic-QoS-ARP-Pre-Emption-Capability
Dynamic-QoS-ARP-Pre-Emption-Vulnerability

Description
If the value is configured as "D" then the feature is enabled for PC. If the value is configured with any other value except "D" or is empty then the feature is disabled for PC.
If the value is configured as "D" then the feature is enabled for PV. If the value is configured with any other value except "D" or is empty then the feature is disabled for PV.

OAM Support
This section describes operations, administration, and maintenance support for this feature
Bulk Statistics Support
The following statistics are supported for the dynamic ARP functionality for PC and PV feature.

Note The following values apply to all the statistics: · Unit - Int64 · Type - Counter · Nodes - Service
· qos_rule_pc_total - Indicates the number of N5/N7/Rx rule installs (per qci/Media Type) provisioned with dynamic QoS PCI. The following labels are defined for this metric: · Interface · N5 · N7 · Rx
· type · default_qos_pc · dynamic_qos_pc
· identifier · qci

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 115

Bulk Statistics Support

Dynamic ARP Functionality for PC and PV

· media-type
· arp_pc
· qos_rule_pv_total - Indicates the number of N5/N7/Rx rule installs (per qci/Media Type) provisioned with dynamic QoS PVI. The following labels are defined for this metric: · Interface · N5 · N7 · Rx
· type · default_qos_pv · dynamic_qos_pv
· identifier · qci · media-type
· arp_pv

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 116

Dynamic ARP Functionality for PC and PV

Modified Stats
Table 38: Modified Stats
Old Stats qos_rule_total

New Stats qos_rule_pl_total

Modified Stats
Description Indicates the number of N5/N7/Rx rule installs (per qci/Media Type) provisioned with dynamic QoS PL. The following labels are defined for this metric:
· Interface · N5 · N7 · Rx
· type · default_qos_pl · dynamic_qos_pl
· identifier · qci · media-type
· arp_pl

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 117

Modified Stats

Dynamic ARP Functionality for PC and PV

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 118

1 6 C H A P T E R

Dynamic ARP Functionality for PL

· Feature Summary and Revision History, on page 119 · Feature Description, on page 119 · How it Works, on page 120 · Feature Configuration, on page 120
Feature Summary and Revision History

Summary Data
Table 39: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation
Revision History
Table 40: Revision History
Revision Details First introduced.

PCF SMI Enabled ­ Always-on Not Applicable
Release 2022.02.0

Feature Description
PCF supports Dynamic QoS ARP feature to calculate ARP (Priority Level) based on dynamic expression.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 119

How it Works

Dynamic ARP Functionality for PL

How it Works
This section describes how this feature works.
When PCF evaluates Rx_QoS_Table or N5_QoS_Table to derive QoS for dedicated bearer PCC rules, if a dynamic value expression is configured for ARP Priority-Level, then PCF evaluates the expression and set the result as Priority-Level.

Feature Configuration
To configure this feature, use N5STGConfiguration for Dynamic QoS ARP

Configuring N5STGConfiguration for Dynamic QoS ARP
This section describes the parameters that can be configured for N5STGConfiguration. The N5STGConfiguration service configuration supports the following output AVPs that allow the dynamic value expression and their ranges to be defined. Before setting the service parameters, ensure that you create a use case template and add a service for this configuration. For details, see Configuring the Use Case Template, on page 349 and Adding a Service, on page 348. The following table describes the N5STGConfiguration service parameters.
Table 41: N5STGConfiguration Parameters

Parameters Dynamic-QoS-ARP-Priority-Level

Description

Note

This is a mandatory parameter if the Dynamic QoS

ARP feature is enabled.

This AVP is bound to the dynamic expression Priority-Level column. If the value is null/not configured, then Dynamic QoS ARP feature is disabled. If the value is configured, it overrides the integer PL value (if configured). The dynamic PL expression is either expected to match the java regex: ^[dD](\\s*([+-/*])\\s*([0-9]+))?$ or must be an offset value (of syntax: [+-][0-9]+). In case the value is provided in offset form, the "D" is implicit. Thus "+8" corresponds to "D+8" in expression form, "-5" corresponds to "D-5" and similarly, "0" corresponds to "D".
Dynamic-QoS-ARP-Priority-Level-Default If the default bearer doesn't have a Priority-Level, this value is used as dedicated bearer PL. If the value is null/not configured, the default value (15) is used.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 120

Dynamic ARP Functionality for PL

Configuring N5STGConfiguration for Dynamic QoS ARP

Parameters

Description

Dynamic-QoS-ARP-Priority-Level-Min This output AVP provides upper/lower bound for the calculated PL value using the Dynamic expression provided under Dynamic-QoS-ARP-Priority-Level. If the value is null/not configured, the default value (1) is used.

Dynamic-QoS-ARP-Priority-Level-Max The upper end of the valid PL range. If the value is null/not configured, the default value (15) is used.

Dynamic-QoS-Update-On-Change

This AVP controls whether the PCC rules must be updated on change in the dynamic PL value (for example, due to change in default bearer PL value). If value is null/not configured, the PCC rules are not updated with new dynamic PL value once installed.

Note

· Using the offset form may have minor performance gains as compared to a full expression.

· Range limits are not applied for the default dynamic values.

· Dynamic expression has an implicit "Enforce" QoS action. The Action column value is ignored.

· If dynamic expression configured for Priority-Level is invalid, PCF ignores the expression and does not include the ARP parameters (since PL is set as null) in the rule install. This is true even if absolute PL value is configured (absolute value is ignored).

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 121

Configuring N5STGConfiguration for Dynamic QoS ARP

Dynamic ARP Functionality for PL

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 122

1 7 C H A P T E R

Dynamic Rules and Table-Driven Charging Rules

· Feature Summary and Revision History, on page 123 · Feature Description, on page 123 · Configuration Support for Dynamic and Table-Driven Charging Rules, on page 125
Feature Summary and Revision History

Summary Data
Table 42: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation
Revision History
Table 43: Revision History
Revision Details First introduced.

PCF SMI Enabled ­ Configuration required to disable Not Applicable
Release Pre 2020.01.0

Feature Description
PCF supports the provisioning of the following dynamic and table-driven charging rules. · Table-driven dynamic PCC rules in PCF · N7 session retrievers: · SUPI

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 123

Standards Compliance

Dynamic Rules and Table-Driven Charging Rules

· GPSI · DNN · PLMN ID · N7 Access Type · N7 Cell Global Identifier · N7 DNN · N7 GPSI · N7 IMEI TAC · N7 MCC (SUPI Based) · N7 MNC (SUPI Based) · N7 Permanent Equipment Identifier · N7 RAT Type · N7 Serving Network · N7 SliceInformation · N7 SUPI · N7 Tracking Area Identifier
Standards Compliance
This feature complies with the following standards specifications: · 3GPP TS 29.512 V15.1.0 (2018-09) "Session Management Policy Control Service" · 3GPP TS 29.571 V15.1.0 (2018-09) "Common Data Types for Service Based Interfaces"
Restrictions
The values configured for the maxbrUl, maxbrDl, gbrUl, and gbrDL attributes under QosData and TableDrivenQosDecision service configuration objects as well as any other attribute configured in Policy Builder that corresponds to an attribute defined as having the BitRate data type must match the format that is described in 3GPP TS 29.571, Table 5.5.2-1: Simple Data Types. Use the following pattern in Policy Builder to validate the format: '^\d+(\.\d+)? (bps|Kbps|Mbps|Gbps|Tbps)$'

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 124

Dynamic Rules and Table-Driven Charging Rules

Configuration Support for Dynamic and Table-Driven Charging Rules

Configuration Support for Dynamic and Table-Driven Charging Rules
This section describes how to configure the dynamic and table-driven charging rules using the following services:
· TableDrivenQosDecision
· TableDrivenDynamicPccRule
TableDrivenQosDecision
The TableDrivenQosDecision service configuration object provides a way for the different refQosData values that are encountered while adding the PCC rules to be expanded to actual QosData objects. The different refQosData are added to a bucket, the duplicates (if any) are eliminated, and the QosData objects are added for all the PCC rules that are added or updated. The addition happens even if a PCC rule having the same refQosData value is removed. A one-time CRD lookup is executed for each QosData object using a refQosData as a key value.

Note

· Do not use the QosData service configuration object and TableDrivenQosDecision service configuration

object in the same policy if there are overlapping QoS references.

· Since the actual QoS attributes are stored in a CRD table, it is assumed they do not change over time. However, if the values change in the CRD, the new values are going to be pushed next time when the policy gets evaluated. Changing the values in the CRD does not automatically trigger a policy update.

Before setting the service parameters, ensure that you create a use case template and add a service for this configuration. For details, see Configuring the Use Case Template, on page 349 and Adding a Service, on page 348.
The following table describes the TableDrivenQosDecision service parameters.
Table 44: TableDrivenQosDecision Parameters

Parameter Priority
Search Table Search Column

Description
The priority assigned for this service configuration object (among similar service configuration objects) is used for policy evaluation by the Policy Engine. Higher the value, higher is its priority.
Default: 0

CRD table that is queried for the PCC rule data.

Primary key column in the table configured under the Search Table field.

Note

The search value corresponding to this column is passed in the

code and not exposed.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 125

TableDrivenQosDecision

Dynamic Rules and Table-Driven Charging Rules

Parameter QoS Id Source 5qi Source
Maxbr Ul Source

Description

Primary key value for the column configured under Search Column.

Additional primary key column-value pairs in the table configured under the Search Table field.

Maxbr Ul column in the table that is configured under the Search Table field corresponding to the maxbrUl attribute. The values that are allowed for this attribute are specified in 3GPP TS 29.571, Table 5.5.2-1: Simple Data Types.

Note

The values that are provided for this attribute must match the

specific format.

See the Restrictions, on page 124 section for more details.

Maxbr Dl Source

Maxbr Dl column in the table that is configured under the Search Table field corresponding to the maxbrDl attribute. The values that are permitted for this attribute are specified in 3GPP TS 29.571, Table 5.5.2-1: Simple Data Types.

Note

The values that are provided for this attribute must match the

specific format. Refer the Restrictions section for more details.

Gbr Ul Source

Gbr Ul column in the table that is configured under the Search Table field corresponding to the gbrUl attribute. The values that are allowed for this attribute are specified in 3GPP TS 29.571, Table 5.5.2-1: Simple Data Types.

Note

The values that are provided for this attribute must match the

specific format. Refer the Restrictions section for more details.

Gbr Dl Source

Gbr Dl column in the table configured under the Search Table field corresponding to the gbrDl attribute. The values that are allowed for this attribute are specified in 3GPP TS 29.571, Table 5.5.2-1: Simple Data Types.

Note

The values that are provided for this attribute must match the

specific format. Refer the Restrictions section for more details.

Priority Level Source Preempt Cap Source Preempt Vuln Source Qnc Source

Priority Level Source column in the table configured under the Search Table field corresponding to priorityLevel attribute.
Preempt the Cap Source column in the table configured under Search Table field corresponding to the preemptCap attribute. The values that are allowed for this attribute are specified in 3GPP TS 29.571, section 5.5.3.1 Enumeration: PreemptionCapability.
Preempt the Vuln Source column in the table that is configured under the Search Table field corresponding to the preemptVuln attribute. The values that are allowed for this attribute are specified in 3GPP TS 29.571, section 5.5.3.2 Enumeration: PreemptionVulnerability.
Indicates whether the notifications are requested from the 3GPP NG-RAN when the GFBR can no longer (or again) be guaranteed for a QoS Flow during the lifetime of the QoS Flow.

Authorized Qos Priority Indicates a priority in scheduling the resources among the QoS Flows. Level

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 126

Dynamic Rules and Table-Driven Charging Rules

TableDrivenDynamicPccRule

Parameter Aver Window Source

Description
Indicates the duration over which the guaranteed and maximum bitrate is calculated.

Max Data Burst Vol Source

Indicates the largest amount of data that is required to be transferred within a period of 5G-AN PDB.

Reflective QoS Source Indicates applying reflective QoS for the SDF.

Sharing Key DI Source Indicates resource sharing in downlink direction with the service data flows having the same value in their PCC rule.

Sharing Key UI Source Indicates resource sharing in an uplink direction with the service data flows having the same value in their PCC rule.

Max Packet Loss Rate DI The maximum rate for lost packets that can be tolerated in the downlink direction

Source

for the service data flow.

Max Packet Loss Rate UI The maximum rate for lost packets that can be tolerated in the uplink direction

Source

for the service data flow.

Def QoS Flow Indication Indicates that the dynamic PCC rule shall always have its binding with the default

Source

QoS Flow.

TableDrivenDynamicPccRule
This section describes the parameters for the TableDrivenDynamicPccRule configuration.
TableDrivenDynamicPccRule service configuration object provides a mapping between the PCC rule attributes and the CRD table that backs the service. A one-to-many relation is supported between the service configuration object and the PCC rules.
Before setting the service parameters, ensure that you create a use case template and add a service for this configuration. For details, see Configuring the Use Case Template, on page 349 and Adding a Service, on page 348.
The following table describes the TableDrivenDynamicPCCRule service parameters.
Table 45: TableDrivenDynamicPCCRule Parameters

Parameter Priority
Search Table Search Column Search Value

Description
The priority assigned for this service configuration object (among similar service configuration objects) is used for policy evaluation by the Policy Engine. Higher the value, higher is its priority. Default: 0
The CRD table that is to be queried for the PCC rule data.
Primary key column in the table configured under the Search Table field.
Primary key value for the column configured under Search Column.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 127

TableDrivenDynamicPccRule

Dynamic Rules and Table-Driven Charging Rules

Parameter Input List (List) PCC Rule Id Source Precedence Source App Id Source QoS Id Source
Chg Id Source Flow Information Source

Description
Additional primary key column-value pairs in the table configured under the Search Table field.
PCC Rule Id column in the table that is configured under the Search Table field corresponding to the pccRuleId attribute.
Precedence column in the table that is configured under the Search Table field corresponding to the precedence attribute.
App Id column in the table that is configured under the Search Table field corresponding to the appId attribute.
QoS Id column in the table configured under the Search Table field corresponding to refQosData attribute.
Per 3GPP TS 29.512 v15.1.0, refQosData can be an array of string objects. To accommodate multiple string values in the CRD, the following convention is used:
· The different refQosData objects are separated by ",".
· Any blank characters before and after the actual data is dropped.
The value must be bound to the Chg Id column in the STG. The value in the STG column must be of Type Text.
Flow Information column in the table configured under the Search Table field corresponding to flowInfos attribute.
Per 3GPP TS 29.512 v15.1.0, flowInfos can be an array of FlowInformation objects. To accommodate multiple FlowInformation values in the CRD, the following convention is used:
· The different FlowInformation objects are separated by ",".
· The different attributes within each FlowInformation object are separated by ";".
· ethFlowDescription attribute within FlowInformation is not currently supported.
· The expected format for each FlowInformation attribute is as follows: flowDescription;packetFilterUsage;tosTrafficClass
;spi;flowLabel;flowDirection.
· If any of the FlowInformation is missing, leave the corresponding placeholder empty while preserving the format (for example tosTrafficClass and spi are missing: flowDescription;packetFilterUsage;;;flowLabel;flowDirection)
· Any blank characters before and after the actual data is dropped.
· The values that are allowed for flowDirection attribute are the ones that are specified in 3GPP TS 29.512, section 5.6.3.3 Enumeration: FlowDirection.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 128

1 8 C H A P T E R

Flexible QoS Actions

· Feature Summary and Revision History, on page 129 · Feature Description, on page 129 · Configuring QoS Actions on N7 Interface, on page 130
Feature Summary and Revision History

Summary Data
Table 46: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation
Revision History
Table 47: Revision History
Revision Details First introduced.

PCF SMI Enabled ­ Configuration required to disable Not Applicable
Release 2020.01.0

Feature Description
PCF supports the Flexible QoS Actions feature on the N7 interface. During policy management on the N7 interface, PCF sends session rules that are based on the configured QoS to the SMF.
The following QoS actions are applicable to an uplink AMBR and downlink AMBR are configurable for calculating the session rules. The default configuration is QoS-Enforcement.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 129

Configuring QoS Actions on N7 Interface

Flexible QoS Actions

· QoS-Bounding facilitates PCF to calculate the minimum QoS between the Requested QoS (from the SMF) and the calculated QoS based on the internal logic, and authorize that in the response message to the SMF.
· QoS-Mirroring is the ability for the PCF to grant or authorize the requests from the SMF. · QoS-Enforcement is the ability for the PCF to enforce the calculated QoS (computed based on PCF's
internal logic) back to the SMF in the request or response message. This is the default configuration.
Configuring QoS Actions on N7 Interface
This section describes how to configure the QoS Actions on the N7 interface using the following service. · OverrideSessionRule
OverrideSessionRule
This section describes the parameters for the OverrideSessionRule configurations. The OverrideSessionRule service configuration is used to override the N7 default bearer QoS APN AMBR UL/DL values. PCF first evaluates the derived QoS values for default bearer and then assesses the table provided in OverrideSessionRule service configuration using the key values. It further determines the result APN AMBR UL/DL values. If the "Condition to Override" is "LT", then PCF limits the derived QoS values with these override values. If the "Condition to Override" is "GT", then PCF selects the maximum UL/DL among the derived values and overrides these values.

Note The OverrideSessionRule configuration works in conjunction with the SessionRuleAction configuration. For information on SessionRuleAction, see SessionRuleAction, on page 377.

Before setting the service parameters, ensure that you create a use case template and add a service for this configuration. For details, see Configuring the Use Case Template, on page 349 and Adding a Service, on page 348.
The following table describes the OverrideSessionRule service parameters.
Table 48: OverrideSessionRule Parameters

Parameters Priority
Stg Reference

Description
Indicates the priority of the server when sending requests. Higher number is equal to higher priority.
Refers to the STG that contains the QoS reference and the QoS parameter values such as QCI and APN-MBRUL.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 130

Flexible QoS Actions

OverrideSessionRule

Parameters List Of Input Column Avp Pairs (List)
Apn Agg Max Bit Rate U L Apn Agg Max Bit Rate D L Condition to Override

Description
The list that specifies the mapping for input (key) columns to determine their values. Based on these values, the STG is queried.
ColumnAndAvpPair
· Avp Name: Specify the AVP name whose value is used to map to the corresponding key Column for querying the STG.
· Column: The key column in the STG that corresponds to the specified AVP.
Reference to the STG output column that gives the "APNAggregate-Max-Bitrate-UL" value for limiting QoS. This value and the corresponding value derived after QoS actions are compared to determine the final value for APN-Aggregate-Max-Bitrate-UL.
Reference to the STG output column that gives the "APNAggregate-Max-Bitrate-DL" value for limiting QoS. This value and the corresponding value derived after QoS actions are compared to determine the final value for APN-Aggregate-Max-Bitrate-DL.
Provides the condition to compare the values. Only two values are supported "LT" and "GT".
If LT is selected, PCF uses the lowest QoS parameter value from the two QoS references.
If GT is selected, PCF considers the highest QoS parameter value from the two QoS references.
Possible Values:
· LT: Less than (Default)
· GT: Greater than

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 131

OverrideSessionRule

Flexible QoS Actions

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 132

1 9 C H A P T E R

Handling the Network Provided Location Information Requests

· Feature Summary and Revision History, on page 133 · Feature Description, on page 134 · How it Works, on page 134 · Enabling the NetLoc Feature, on page 147
Feature Summary and Revision History

Summary Data
Table 49: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled ­ Always-on Not Applicable

Revision History
Table 50: Revision History
Revision Details Enhancement introduced. PCF supports N5 Interface. First introduced.

Release 2022.02.0
2020.05.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 133

Feature Description

Handling the Network Provided Location Information Requests

Feature Description
The Network Provided Location Information (NPLI) service is responsible for retrieving the access network information in the IMS network architecture. Depending on the service operator's policy configuration and subscription, the NPLI service fetches the UE time zone information and the user location information from the access network. The PCF provides the NPLI information over the Rx or N5 interface to the Application Function (AF) based on the response that it receives from SMF over the N7 interface.
How it Works
This section describes how this feature works. The AF initiates a request toward the PCF to provide the network information. For AF supporting Rx interface, the request is sent over Rx through the Required-Access-Info AVP. When the Access Network Information is available the SMF provides the required Access Network Information to the PCF within the 3GPP-User-Location-Info AVP or 3GPP-MS-TimeZone AVP or both as requested. For AF supporting N5 interface, the request is sent over N5 interface by subscribing to AF event ANI_REPORT and specifying the required access network information (user location or user time zone information). Upon receiving the request, PCF triggers an N7 Update Notify request with `Access Network Info' event trigger (if not already subscribed for) towards SMF. The SMF responds to PCF with the required information, which PCF further forwards to the AF. When the SMF responds with ServingNetwork attribute instead of UserLocationInfo, then to set the Mobile Country Codes (MCC) and Mobile Network Code (MNC) ensure that the NetLoc features is enabled. For information on how to enable the NetLoc, see Enabling the NetLoc Feature, on page 147 . For Rx interface, PCF provides the following information during an ACCESS_NETWORK_INFO_REPORT event trigger within the Event-Trigger AVP:
· 3GPP-User-Location-Info AVP (If available) · User-Location-Info-Time AVP (If available) · 3GPP-SGSN-MCC-MNC AVP (If the location information is not available) or 3GPP-MS-TimeZone
AVP or both.
For N5 interface, PCF provides the following information which includes notification for AF event ANI_REPORT:
· 3GPP User Location Information (If available and required) · Serving Network Identity (If user location is required and not available) · UE Timezone (If available and required)
Considerations
This section defines the considerations that apply for successful handling of the NPLI requests:
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 134

Handling the Network Provided Location Information Requests

Call Flows

· For Rx Interface, navigate to Policy Builder > Diameter Clients > Rx Client, set the STA Hold Time Ms parameter to maximum duration of 3000 milliseconds. The parameter indicates the duration by which the STA is held back.
· For N5 Interface, navigate to Policy Builder > SBA Profiles > N5 Profiles, set the N5 Delete Response Hold Time Ms parameter to maximum duration of 3000 milliseconds. The parameter indicates the duration by which the N5 Delete response is held back.
A lower timer value minimizes the performance impact that occurs when AF and PCF continue to wait for a response from each other and eventually timeout.

Call Flows

This section describes the key call flows for this feature.

NPLI in Rx RAR Call Flow
This section describes the NPLI in Rx RAR call flow.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 135

NPLI in Rx RAR Call Flow Figure 19: NPLI in Rx RAR Call Flow

Handling the Network Provided Location Information Requests

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 136

Handling the Network Provided Location Information Requests

NPLI in Rx STA Call Flow

Table 51: NPLI in Rx RAR Call Flow Description
Step Description 1 The SMF sends a SMPolicyControl_Ceate request to the PCF. 2 The PCF responds to the SMPolicyControl_Create request. 3 The AF sends an Authenticate-Authorize-Request (AAR) message to the PCF. The message contains
Required-Access-Info AVP requesting the access network information required for the AF session. 4 The PCF sends the AAA request to the AF. 5 If the NetLoc feature is enabled, then the PCF sends an SMPolicyControl_UpdateNotify request
toward the SMF. 6 In response to the SMPolicyControl_UpdateNotify request, the SMF sends the access network
information to the PCF. 7 The PCF sends the SMPolicyControl_Update request to the SMF. 8 The SMF sends the SMPolicyControl_Update request to the PCF. 9 After the establishing the Rx-session and the Required-Access-Info lookup, the PCF sends the Rx
Re-Authorization Request message to the AF. 10 The AF sends the Rx Re-Authorization Request response containing the 3GPP-User-Location-Info
AVP and access network information report to the PCF. 11 If the session terminates, the SMF sends a SMPolicyControl_Delete request to the PCF. 12 The PCF responds to SMF for the SMPolicyControl_Delete request. 13 The PCF sends the Abort-Session-Request message to the AF. 14 The AF responds with the Abort-Session-Answer to the PCF. 15 The AF sends the Session-Termination-Request to the PCF. 16 The PCF responds with the Session-Termination-Answer message to the AF.
NPLI in Rx STA Call Flow
This section describes the NPLI in Rx STA call flow.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 137

NPLI in Rx STA Call Flow Figure 20: NPLI in Rx STA Call Flow

Handling the Network Provided Location Information Requests

Table 52: NPLI in Rx STA Call Flow Description
Step Description 1 The SMF sends a SMPolicyControl_Ceate request to the PCF. 2 The PCF responds with the SMPolicyControl_Create response to the SMF.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 138

Handling the Network Provided Location Information Requests

Required Access Information in STR Call Flow

Step Description 3 The AF sends an Authenticate-Authorize-Request message to the PCF.
The message contains Required-Access-Info AVP requesting the access network information required for the AF session. 4 The PCF responds with an AA-Answer message to the AF. 5 If the NetLoc feature is enabled, the PCF sends the SMPolicyControl_UpdateNotify request to the SMF. 6 The SMF responds with the SMPolicyControl_UpdateNotify message to the PCF. This message contains the access network information. 7 The SMF sends the SMPolicyControl_Delete request to the PCF. 8 The PCF responds to the SMF with the SMPolicyControl_Delete message. 9 The PCF sends the Abort-Session-Request message to the AF. 10 The AF responds with the Abort-Session-Answer to the PCF. 11 The AF sends the Session-Termination-Request to the PCF. 12 The PCF responds with the Session-Termination-Answer message to the AF. This message contains the user location information.
Required Access Information in STR Call Flow
This section describes the Required Access Information in STR call flow.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 139

Required Access Information in STR Call Flow

Handling the Network Provided Location Information Requests

Figure 21: Required Access Information in STR Call Flow

Table 53: Required Access Information in STR Call Flow Description
Step Description 1 The SMF sends an SMPolicyControl_Create request to the PCF.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 140

Handling the Network Provided Location Information Requests

NPLI in N5 Notify Call Flow

Step Description 2 The PCF responds to the SMF with the SMPolicyControl_Create response. 3 The AF sends the Specific-Action: 12 (Access n/w info. report) message to the PCF. 4 The PCF sends an AA-Answer message to the AF. 5 The PCF sends an SMPolicyControl_UpdateNotify request to the SMF. 6 The SMF sends PCC rules as requested in the Authenticate-Authorize-Request in the
SMPolicyControl_UpdateNotify response to the PCF. 7 The AF sends a Session-Termination-Request to PCF to retrieve the Required-Access-Info AVP. 8 If the NetLoc feature is enabled, the PCF sends as SMPOlicyControl_UpdateNotify request to the
SMF. 9 The SMF sends an SMPOlicyControl_UpdateNotify response to the PCF. 10 The SMF sends an SMPOlicyControl_Update request to the PCF. 11 The PCF sends a response for the SMPOlicyControl_Update request to the SMF. 12 The PCF sends the Session-Termination-Answer message to the AF with the user location information. 13 The PCF sends the SMPolicyControl_UpdateNotify request to the SMF. 14 On installing the PCC rules, the SMF sends SMPolicyControl_UpdateNotify response to the PCF.
NPLI in N5 Notify Call Flow
This section describes the NPLI in N5 Notify call flow.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 141

NPLI in N5 Notify Call Flow Figure 22: NPLI in N5 Notify Call Flow

Handling the Network Provided Location Information Requests

Table 54: NPLI in N5 Notify Call Flow Description
Step Description 1 The SMF sends a SMPolicyControl_Ceate request to the PCF. 2 The PCF responds to the SMPolicyControl_Create request.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 142

Handling the Network Provided Location Information Requests

NPLI in N5 Delete Response Call Flow

Step Description 3 The AF sends an PolicyAuthorization_Create request to the PCF. The request contains the access
network information required for the AF session. 4 The PCF sends the PolicyAuthorization_Create response to the AF. 5 If the NetLoc feature is enabled, then the PCF sends an SMPolicyControl_UpdateNotify request
toward the SMF. 6 In response to the SMPolicyControl_UpdateNotify request, the SMF sends the access network
information to the PCF. 7 The PCF sends the SMPolicyControl_Update request to the SMF. 8 The SMF sends the SMPolicyControl_Update request to the PCF. 9 After the establishing the N5 session and the required access information lookup, the PCF sends the
PolicyAuthorization_Notify request to the AF containing access network information report with 3GPP user location, UE Timezone and serving network PLMN ID if available 10 The AF sends the PolicyAuthorization_Notify response to the PCF. 11 If the session terminates, the SMF sends a SMPolicyControl_Delete request to the PCF. 12 The PCF responds to SMF for the SMPolicyControl_Delete request. 13 The PCF sends the PolicyAuthorization_Notify (Terminate) request to the AF. 14 The AF responds with the PolicyAuthorization_Notify response to the PCF. 15 The AF sends the PolicyAuthorization_Delete request to the PCF. 16 The PCF responds with the PolicyAuthorization_Delete response to the AF.
NPLI in N5 Delete Response Call Flow
This section describes the NPLI in N5 Delete Response call flow.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 143

NPLI in N5 Delete Response Call Flow Figure 23: NPLI in N5 Delete Response Call Flow

Handling the Network Provided Location Information Requests

Table 55: NPLI in N5 Delete Response Call Flow Description
Step Description 1 The SMF sends a SMPolicyControl_Ceate request to the PCF. 2 The PCF responds with the SMPolicyControl_Create response to the SMF.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 144

Handling the Network Provided Location Information Requests

Required Access Information in N5 Delete Request Call Flow

Step Description 3 The AF sends a PolicyAuthorization_Create request to the PCF.
The request contains the access network information required for the AF session. 4 The PCF responds with an PolicyAuthorization_Create response to the AF. 5 If the NetLoc feature is enabled, the PCF sends the SMPolicyControl_UpdateNotify request to the
SMF. 6 The SMF responds with the SMPolicyControl_UpdateNotify message to the PCF. This message
contains the access network information. 7 The SMF sends the SMPolicyControl_Delete request to the PCF. 8 The PCF responds to the SMF with the SMPolicyControl_Delete message. 9 The PCF sends the PolicyAuthorization_Notify (Terminate) request to the AF. 10 The AF responds with the PolicyAuthorization_Notify response to the PCF. 11 The AF sends the PolicyAuthorization_Delete request to the PCF. 12 The PCF responds with the PolicyAuthorization_Delete response to the AF. This response contains
the user location information.
Required Access Information in N5 Delete Request Call Flow
This section describes the Required Access Information in N5 Delete Request call flow.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 145

Required Access Information in N5 Delete Request Call Flow

Handling the Network Provided Location Information Requests

Figure 24: Required Access Information in N5 Delete Request Call Flow

Table 56: Required Access Information in N5 Delete Request Call Flow Description
Step Description 1 The SMF sends an SMPolicyControl_Create request to the PCF. 2 The PCF responds to the SMF with the SMPolicyControl_Create response. 3 The AF sends a PolicyAuthorization_Create request to the PCF.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 146

Handling the Network Provided Location Information Requests

Enabling the NetLoc Feature

Step Description 4 The PCF sends a PolicyAuthorization_Create response to the AF. 5 The PCF sends an SMPolicyControl_UpdateNotify request to the SMF. 6 The SMF sends PCC rules as requested in the Authenticate-Authorize-Request in the
SMPolicyControl_UpdateNotify response to the PCF. 7 The AF sends a PolicyAuthorization_Delete request to PCF to retrieve the required access network
information. 8 If the NetLoc feature is enabled, the PCF sends as SMPOlicyControl_UpdateNotify request to the
SMF. 9 The SMF sends an SMPOlicyControl_UpdateNotify response to the PCF. 10 The SMF sends an SMPOlicyControl_Update request to the PCF. 11 The PCF sends a response for the SMPOlicyControl_Update request to the SMF. 12 The PCF sends the PolicyAuthorization_Delete response to the AF with the user location information. 13 The PCF sends the SMPolicyControl_UpdateNotify request to the SMF. 14 On installing the PCC rules, the SMF sends SMPolicyControl_UpdateNotify response to the PCF.
Enabling the NetLoc Feature
This section describes how to enable the NetLoc feature that supports the Access Network Information Reporting in 5G. To enable the NetLoc feature, in the initial N7 request set the "suppFeat" value's 6th binary digit to 1.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 147

Enabling the NetLoc Feature

Handling the Network Provided Location Information Requests

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 148

2 0 C H A P T E R

Heartbeat

· Feature Summary and Revision History, on page 149 · Feature Description, on page 150 · How it Works, on page 150 · Configuring the Cluster Load Attribute, on page 151
Feature Summary and Revision History

Summary Data
Table 57: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled ­ Configuration required to disable Not Applicable

Revision History

Table 58: Revision History

Revision Details

Release

Enhancement introduced.

2020.05.0

PCF is configured to send the cluster load information in the heartbeat.

First introduced.

2020.02.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 149

Feature Description

Heartbeat

Feature Description
PCF registers with NRF and sends a heartbeat message to the same NRF to infer its status as active or inactive. Complying with 3GPP TS 29.510, PCF performs the following tasks when sending a heartbeat:
· Sends a heartbeat in the form of a PATCH request to, and processes responses with the NRF that it has registered with.
· Performs the failover operation when the registered NRF is unavailable due to connectivity issues or some unknown reasons. In such situations, PCF registers and uses the available secondary or tertiary NRF when the primary NRF is unresponsive. Simultaneously, PCF attempts to register with the primary NRF. When registration to the original (primary) NRF is successful, PCF stops sending heartbeats to the secondary or tertiary NRF. In the absence of the primary NRF, PCF performs the failover and failback in the following sequence: · Failover: Primary > Secondary or Tertiary > Tertiary · Failback: Tertiary > Secondary or Primary > Primary
· When PCF registers with a nonprimary NRF, it attempts to register with the primary NRF in the interval that is configured in the interval-in-secs parameter. For more information, see the nfServices information in the Network Repository Function Subscription to Notifications, on page 205 chapter.
· When sending two consecutive heartbeat messages, PCF honors the time interval that is available in the heartBeatTimer attribute in the registration response or the heartbeat response.
· Subscription management: · PCF subscribes to notifications from NRF for profile changes based on the ServiceName attribute. The subscription happens through a PATCH request. · After a subscription validity time has elapsed, PCF resubscribes to NRF through a PATCH request. · PCF sends a remove or delete request to NRF to cancel the subscription.
How it Works
This section describes how this feature works. The PCF registers with the NRF to create a passage for interacting with the other NFs to perform operations such as discovery and selection. The overview of how NF and PCF interact through NRF in the following sequence: 1. Registration: PCF registers its profile that defines the services or capabilities with the NRF. The registration
service request contains the load parameters. The cluster load value is a collective value of the cluster memory and cluster CPU usage derived from Prometheus. 2. Discovery: After the registration is successful, the NRF sends the information about the registered PCF instances to the (consumer NF) NFs through an NRF query. The NFs that are registered with the NRF periodically send a heartbeat in the form of an NFUpdate service. The NF discovery response carries attributes such as load, capacity.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 150

Heartbeat

Standards Compliance
3. Selecton: When the NF wants to establish a connection with a PCF instance, it determines the appropriate instance based on the attributes such as load and location. If the NRF receives an NF query with the preferred-locality attribute, then, NRF assigns a higher priority value (higher the value, lower the priority) to the profiles or services that do not match the preferred-locality parameter. The NRF sorts the NF profiles and services based on the load, capacity, and priority in the next step. The consumer NF determines the registered NF based on the criteria that NRF has used for sorting. For example, if UPF wants to send a service request to a PCF instance in a preferred locality, then it selects the PCF profiles with the lowest value.
The following figure depicts how these components interconnect.
Figure 25: PCF-NRF-NFs Interaction Flow

Standards Compliance
This feature complies with the following standards specifications: · 3GPP TS 29.510 (2018-12) "Network Function Repository Services;"
Configuring the Cluster Load Attribute
This section describes how to enable PCF to send the cluster load information in the heartbeat request. To configure the ability that allows PCF to send the cluster load parameter in the heartbeat request to the NRF, use the following configuration: config
group nf-mgmt [ name ] load-report-enabled [ false | true ] end
NOTES: · group--Enters the group configuration mode. · nf-mgmt [ name ]--Specify the management group that is associated to a network function. · load-report-enabled [ false | true ]--Configures the ability to send the cluster load size in the heartbeat service request. The default value is set to true. The registration request may fail if the cluster load size (cluster memory usage and cluster CPU usage) is unavailable in the request. In such situations, you can disable the capability by setting this attribute to false.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 151

Configuring the Cluster Load Attribute

Heartbeat

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 152

2 1 C H A P T E R

LDAP and Sh Interface

· Feature Summary and Revision History, on page 153 · Feature Description, on page 153 · Configuring PCF to use LDAP, on page 155
Feature Summary and Revision History

Summary Data
Table 59: Summary Data
Applicable Product(s) or FunctionalArea Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Disabled ­ Configuration required to enable Not Applicable

Revision History
Revision Details Enhancement introduced. PCF supports IPv6 connectivity on LDAP endpoint. First introduced.

Release 2021.04.0
2020.01.0

Feature Description
PCF supports the LDAP and Sh versions of the N36 reference point to and from the simulated UDR to access subscriber profile information and to write dynamic session data as required for session processing.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 153

Call Flows

LDAP and Sh Interface

This feature provides the following capabilities:
· Support for Sh Interface: PCF communicates with HSS and downloads the subscription profile. It sends policies that are based on the subscription profile.
· Support for policy changes based on subscription changes in PCF: Based on subscription changes that are received from Sh or LDAP or local configuration, PCF invokes the Npcf_SMPolicyControl_UpdateNotify service to update the policies in SMF.
· PCF supports both IPv4 and IPv6 connectivity on LDAP endpoint.

Call Flows

This section describes the key call flow for this feature.

Sh Interface Call Flow
This section describes the Sh Interface call flow.
Figure 26: Sh Interface Call Flow

Table 60: Sh Interface Call Flow Description

Step Description

1

The User Equipment (UE) sends a PDU Session Establishment request to the Access and Mobility

Management (AMF) function.

2

The AMF creates the Namf_PDUSession_CreateSMConext_Request service and sends it to SMF.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 154

LDAP and Sh Interface

Configuring PCF to use LDAP

Step Description

3

The SMF creates and sends the Npcf_SMPolicyControl_CreateRequest[ContextData] service to

H-PCF.

4

The PCF sends a request to the User Data Repository (UDR) through the Sh interface.

5

The Sh interface sends the UDA (Billing Plan) to the PCF.

6

The PCF responds with the Npcf_SMPolicyControl_Create service to the SMF.

7

The SMF sends the Npcf_SMPolicyControl_Update request to the PCF.

8

The PCF responds with the Npcf_SMPolocyControl_Update response to the SMF.

9

The UE sends the PDU Session Release request to SMF.

10

The SMF forwards the Npcf_SMPolicyContro_Delete request to the PCF.

11

The PCF sends the Npcf_SMPolicyControl_Delete response to SMF.

Configuring PCF to use LDAP
This section describes how to configure PCF to leverage the LDAP interface. The configuration support for LDAP involves the following steps: 1. Setting Up Additional Profile Data 2. Associating PCF with LDAP
Setting Up Additional Profile Data
This section describes how to set up the profile data. PCF establishes a connection with an LDAP server to access the subscriber profile data that resides on an external database. Upon receiving the PCF query, the LDAP searches its database to retrieve the user profile and other information. You can set an LDAP interface profile for a new or an existing domain. By configuring the Domain, you direct PCF to retrieve data from an LDAP query. 1. Log in to Policy Builder and select the Services tab. 2. Navigate to the Domains tab and select DATA_5G. 3. In the Domains pane, click the Additional Profile Data tab. 4. Select Generic Ldap Search in the drop-down menu on the right-hand side of the Additional Profile
section heading. 5. Under Profile Mappings, click Add to configure a new row for each attribute that is retrieved from the
LDAP server. In the Profile Mappings table, the following parameters can be configured for the new row:

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 155

Setting Up Additional Profile Data

LDAP and Sh Interface

a. External Code: The LDAP attribute name to retrieve.
b. Mapping Type: The mapping of the data to an internal PCF data type.
c. Regex Expression and Regex Group: If parsing of the incoming AVP is required then define a regular expression and regular expression group to support retrieval of the parsed values.
d. Missing AVP: Defines the default AVP value when the subscriber attribute that is received from the external profile is missing.

Note · If a subscriber attribute is missing and its missing AVP value is not configured, PCF does not create or update policy derived AVP for this subscriber with Missing AVP Value.
· This parameter is applicable only for Mapping Type as Subscriber Attribute or Service. For all other mapping types, this column is not applicable.
e. Empty AVP Value: Defines the default AVP value when a subscriber attribute that is received from an external profile has empty or blank value.

Note · If a subscriber attribute is empty or blank and its empty or blank AVP value is not configured, PCF does not create or update policy derived AVP for this subscriber with Empty AVP Value.
· This parameter is applicable only for Mapping Type as Subscriber Attribute or Service. For all other mapping types, this column is not applicable.

f. Apply Timer: This check box indicates whether Timer Attribute is applicable to other subscriber attributes or not. Select the check box if Timer Attribute that must be applied for that subscriber attribute.
g. Discard If Empty: When checked, deletes the LDAP attribute from the session (thus preventing any further use) if regex (when configured) does not match the received value. By default, the check box is unchecked (false).

6. Enter the appropriate value in the following fields for completing the configuration: The following table describes the configuration service parameters.
Table 61: Configuration Parameters

Field Ldap Server Set
Base Dn

Description
Associate the LDAP server set defined in the LDAP Server Set Definition.
Specify the Base DN that is sent in the LDAP query. If not defined, then the request does not contain a base DN.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 156

LDAP and Sh Interface

Associating PCF with LDAP

Field

Description

Filter

Set to the filter value that is sent in the LDAP query. If not defined, then the request does not contain a filter.

Note

This string supports string replacement using the find and

replace of strings with variables from the policy state as

defined in the "Replacement Rules" table.

Dereference Policy

This is an optional field that controls whether to disable the LDAP query. This is often used along with Custom Reference Data tables and other session attributes to optionally disable an LDAP query. If the calculated CRD AVP has a value (ignoring case) of "false", then the LDAP query is skipped.

Avp Code to Disable Query

Set this to the dereference policy that the LDAP query requires. Default value is NEVER.

Profile Refresh Interval (mins) Set this value to automatically refresh a profile by querying the profile after specified delay.

Replacement Rules

In the replacement rules table, add one row per replacement string to substitute into the Base DN or Filter string on a request by request basis.

Subscriber Timer Attribute

Indicates which attribute is a timer attribute among all the LDAP server attributes.
The timer follows the ISO 8601 time standards. See ISO 8601 for more information.

Lower Bound For Timer Attribute In Minutes

Indicates how much time before the start time of Subscriber Timer Attribute PCF has to accept when LDAP server sends timer attribute. Default value is 30 mins.

Associating PCF with LDAP
This section describes how to associate PCF with LDAP.
When you configure PCF environment to interact with a defined LDAP, PCF must connect to the LDAP server using a trusted authentication method. This method is known as binding. PCF uses the binding information while making LDAP queries to retrieve the required subscriber information from the LDAP server.
To associate PCF with LDAP, use the following configuration:
config product pcf
ldap replicas replica_count ldap server-set server_set
search-user dn cn=username,dc=C ntdb search-user password health-check interval-ms interval initial-connections connection_count

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 157

Associating PCF with LDAP

LDAP and Sh Interface

max-connections maximum_connections retry-count retry_count retry-timer-ms retry_time max-failover-connection-age-ms maximum_failover binds-per-second binds number-consecutive-timeout-for-bad-connection consecutive_timeout connection ip_address
priority priority connection-rule connection_type auto-reconnect [ true | false ] timeout-ms timeout bind-timeout-ms bind_timeout end
NOTES: · product pcf--Enters the PCF configuration mode.
· ldap replicas replica_count--Specify the LDAP replica count. Depending on the count, the LDAP pods are created.
· ldap server-set server_set--Specify the LDAP server set details.
· search-user dn cn=username, dc=C ntdb--Specify the domain details.
· search-user password--Specify the password.
· health-check interval-ms interval--Specify the interval at which the health check should be initiated.
· initial-connections connection_count--Specify the number of connections that can be attempted initially.
· max-connections maximum_connections--Specify the maximum number of connections at any point of time.
· retry-count retry_count--Specify the number of retries that the PCF Engine must attempt on a timeout.
· retry-timer-ms retry_time--Specify the interval after which the PCF Engine must reattempt.
· max-failover-connection-age-ms maximum_failover--Specify the maximum number of connection failures after which failover must happen
· binds-per-second binds--Specify the interval in seconds for the bind operation.
· number-consecutive-timeout-for-bad-connection consecutive_timeout--Specify the number of bad connections after which the timeout occurs.
· connection ip_address--Specify the IPv4/IPv6 address of the LDAP server that attempts the connection.
· priority priority--Specify the priority of the connection.
· connection-rule connection_type--Specify the connection type. The default rules are "Fastest" or "Round Robin".
· auto-reconnect [ true | false ]--Specify if the auto-connect capability should be enabled or disabled.
· timeout-ms timeout--Specify the period between the LDAP client or endpoint when the timeout must happen.
· bind-timeout-ms bind_timeout--Specify the bind timeout.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 158

2 2 C H A P T E R

Managing Custom Reference Data

· Feature Summary and Revision History, on page 159 · Feature Description, on page 159 · Configuration Support for Importing CRD, on page 160
Feature Summary and Revision History

Summary Data
Table 62: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled ­ Always-on Not Applicable

Revision History
Table 63: Revision History
Revision Details First introduced.

Release 2020.05.0

Feature Description
The Custom Reference Data (CRD) is the reference data specific to a service provider, such as their networks or cell sites' names and characteristics. This data is required to operate the policy engine but not used for evaluating the policies. The CRD is represented in the table format. The service providers have the flexibility to create custom data tables and manage them as per their requirements.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 159

Configuration Support for Importing CRD

Managing Custom Reference Data

Note Make sure to start all the policy servers after a CRD table schema is modified (for example, column added/removed).
CRD supports the pagination component, which controls the data displayed according to the number of rows configured for each page. You can change the number of rows to be displayed per page. Once you set the value for rows per page, the same value is used across the Central unless you change it. Also, you can navigate to other pages using the arrows.

Configuration Support for Importing CRD
This section describes the procedure to import CRD when the CRD schema is modified. Importing of CRD involves the following steps:
· Backing Up the Existing SVN Repository · Backing Up the Existing CRD · Removing the Existing CRD from MongoDB · Importing and Publishing the New CRD Schema · Importing the New CRD Table

Backing Up the Existing SVN Repository
This section describes how to import the SVN repository when the CRD schema is modified. To take a backup of the existing SVN repository and store it on another environment, use the following configuration: 1. Log in to the PCF Central GUI. 2. On the Cisco Policy Suite Central page, navigate to Policy Builder and click the Import/Export link.
The Import/Export form opens. 3. In the Export tab, select the All data option to configure the export type.
The following table describes the export/import options:
Table 64: Export and Import Options

Parameters All data

Description
Exports service configuration with environment data, which acts as a complete backup of both service configurations and environmental data.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 160

Managing Custom Reference Data

Backing Up the Existing CRD

Parameters Exclude Environment
Only Environment Export URL Export File Prefix

Description

Exports without environment data, which allows exporting configuration from a lab and into another environment without destroying the new system's environment-specific data.

Exports only environment data, which provides a way to back up the system-specific environmental information.

The URL can be accessed from the Policy Builder or viewed directly in Subversion.

Provide a name (prefix) for the export file.

Note

The exported filename automatically

includes the date and time when the

export was performed.

4. If you want to export the file in the compressed format, select the Use 'zip' file extension check box. 5. Click Export. 6. Navigate to the file and save it to your local machine. The file must include the cluster name and date.

Backing Up the Existing CRD
This section describes how to import an existing CRD when the CRD schema is modified. To take a backup of the configured CRD and store it to another environment, use the following configuration: 1. Log in to the PCF Central GUI. 2. On the Cisco Policy Suite Central page, navigate to Custom Reference Data and click the Custom
Reference Data link. The Import/Export CRD data form opens. 3. Under Export Custom Reference Data, the following options are displayed:
Table 65: Export Custom Reference Data Options

Options Use 'zip' file extension
Export CRD to Golden Repository

Description
Enables easier viewing of the exported contents for the advanced users.
When the system is in a BAD state, the CRD cache is built using the golden-crd data.

4. Click Export.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 161

Removing the Existing CRD from MongoDB

Managing Custom Reference Data

Removing the Existing CRD from MongoDB
This section describes how to remove the existing CRD tables that have schema change from MongoDB. To remove a configured CRD schema change, use the following configuration: 1. Log in to the admin-db pod that has the CRD (cust_ref_data) database. 2. Access the cust_ref_data using the following command:
use cust_ref_data
3. Delete the data from one or more existing CRD tables using the following command:
db.table_name.remove({})
4. Exit the admin-db pod.
Importing and Publishing the New CRD Schema
This section describes how to import and publish the new CRD schema. To import and publish the CRD schema, use the following configuration: 1. Log in to the PCF Central GUI. 2. On the Cisco Policy Suite Central page, navigate to Policy Builder and click the Import/Export link.
The Import/Export form opens. 3. In the Import tab, browse to the file that you want to import. 4. In the Import URL field, enter the URL where the file must be imported. We recommend importing a
new URL and verify it using the Policy Builder. 5. In the Commit Message field, enter the appropriate information. 6. To enforce import in situations where the checksums don't match, select the Force import even if
checksums don't match check box. 7. Click Import.
Importing the New CRD To import the new CRD, use the following configuration: 1. Access the Policy Builder URL and add a new repository.
a. In the Choose Policy Builder data reposiorty... window, select <Add New Repository> from the drop-down. The Repository dialog box appears. The following parameters can be configured under Repository: Configure the parameters according to the network requirements.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 162

Managing Custom Reference Data Table 66: Repository Parameters
Parameter Name
Username and Password Save Password Url

Importing and Publishing the New CRD Schema

Description

This is a mandatory field. Ensure that you specify a unique value to identify your repository's site.

Note

We recommend the following

format for naming the repositories:

customername_project_date, where

underscores are used to separate

customer name, project, and date.

Date can be entered in the

MMDDYYYY format.

Enter a username that is configured to view the Policy Builder data. The password can be saved for faster access, but it is less secure. A password, used with the Username, permits, or denies access to make changes to the repository.
Select this check box to save the password on the local hard drive. This password is encrypted and saved as a cookie on the server.
You can have several branches in the version control software to save different versions of configuration data. Create a branch in the version control software before assigning the URL in this screen.
Enter the URL of the branch of the version control software server that is used to check in this version of the data.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 163

Importing and Publishing the New CRD Schema

Managing Custom Reference Data

Parameter Local Directory
Validate on Close Remove

Description
Do not modify the value in this field. This is the location on the hard drive where the Policy Builder configuration objects are stored in the version control. When you click either Publish or Save to Repository, the data is saved from this directory to the version control application specified in the Url text field. The field supports the following characters:
· Uppercase: A to Z
· Lowercase: a to z
· Digits: 1­9
· Nonalphanumeric: /

Note

The user must use only the

supported characters.

Select this check box to see if the values for Username, Password, or the URL are legitimate and unique. If not, the screen displays an error message and provides a chance to correct the errors.

Removes the display of the repository in Cisco Policy Builder.

Note

The remove link here does not

delete any data at that URL. The

local directory is deleted.

b. Click OK to save your work to the local directory.

Note When you change screens, the Policy Builder automatically saves your work. We recommend saving your work to the local directory by clicking on the diskette icon on the Policy Builder GUI or CTRL-S on the keyboard.
c. If you are ready to commit these changes to the version control software, choose File > Save to Client Repository on the Policy Builder home screen.
2. Log in to the new repository. 3. Verify the new CRD table schema and publish the changes.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 164

Managing Custom Reference Data

Importing the New CRD Table

4. Review the crd-api pod logs for any exception or error related to the duplicate key or duplicate index. If there are no errors, then the CRD is successfully imported.
Importing the New CRD Table
This section describes how to import the CRD table. To import new CRD tables, use the following configuration: Before importing the CRD table, ensure that the CRD data archive is saved as dot (.) crd or dot (.) zip. 1. Log in to the PCF Central. 2. Click Custom Reference Data. 3. Click Import/Export CRD Data. 4. Under Export Custom Reference Data, the following options are displayed:
· Select the Use 'zip' file extension check box to enable easier viewing of export contents for advanced users.
· Select the Export CRD to Golden Repository check box to export CRD to golden repository which is used to restore cust_ref_data in case of error scenarios. A new input text box is displayed.
5. Add a valid SVN server hostname or IP address to push CRD to repository. You can add multiple hostnames or IP addresses by clicking on the plus sign.
6. Click Export.
Verifying the Successful Export of CRD Table to Golden Repository To verify of the export of the custom CRD table to the golden repository is successful, use the following configuration: 1. Log in to the PCF Central. 2. Click Custom Reference Data. 3. Click Import/Export CRD Data. 4. In Import Custom Reference Data, click Field to Import field and browse for the CRD archive. 5. Click the Import button to import the CRD data. 6. On successful import, verify that you receive a "Data imported" message on the PCF Central GUI. 7. Review crd-api pod logs for any exception or error related to duplicate key or duplicate index. If there
are no errors, then the CRD is successfully imported.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 165

Importing the New CRD Table

Managing Custom Reference Data

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 166

2 3 C H A P T E R

Message Prioritization and Overload Handling

· Feature Summary and Revision History, on page 167 · Feature Description, on page 167 · How it Works, on page 168 · Feature Configuration, on page 168 · OAM Support, on page 178
Feature Summary and Revision History

Summary Data
Table 67: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation
Revision History
Table 68: Revision History
Revision Details First introduced.

PCF SMI Disabled ­ Configuration required to enable Not Applicable
Release 2022.01.0

Feature Description
PCF supports the following message prioritizations: · Message priority handling framework--Provides configuration to handle the incoming message rules with priority.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 167

How it Works

Message Prioritization and Overload Handling

· Diameter configuration · PCF configuration
· Inbound WPS Rx Message prioritization--During engine processing the WPS messages are prioritized over non-WPS messages.
· Inbound WPS SBI Message prioritization--During engine processing the 3gpp-Sbi-Message-Priority header messages are prioritized.
How it Works
This section describes how this feature works. · Message Prioritization Handling Framework · Diameter Configuration--Use Message Handling Rules parameters (Diameter Client, Protocol, Command Code, Request Type, Priority, Per Instance TPS, and Discard Behavior) to identify and prioritize the diameter messages. · PCF Configuration--Use Message Handling Rules parameters (Request Type, Priority, Per Instance TPS, and Discard Behavior) to identify and prioritize the SBI messages.
· Inbound WPS Rx Message Prioritization--Use the Rx Message Prioritization parameters to mark the WPS specific MPS-Identifier and Reservation Priority. Rx message should be prioritized based on the MPS-Identifier and Reservation-Priority AVPs received in the request message.
· Inbound WPS SBI Message Prioritization--Based on the SBI Message Priority value in the incoming message, a user specified priority (Inbound SBI-Message-Priority prioritization table in PCF configuration) is assigned. SBI messages with higher priority are considered for processing earlier than the messages with lower priority.
Note Currently, the priority queue and rate limiting for REST and Diameter messages are independent of each other.
Feature Configuration
To configure this feature, use the following configurations: · Configuring Inbound Message Overload Handling · Configuring SBI-Message-Priority Prioritization
Configuring Inbound Message Overload Handling
This section describes how to configure the Inbound Message Overload Handling for the diameter and PCF configurations.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 168

Message Prioritization and Overload Handling

Diameter Configuration

Diameter Configuration
1. Log in into Policy Builder. 2. Select Reference Data tab. 3. From the left pane, select Systems. 4. Select and expand your system name. 5. Select Diameter Configuration. 6. In the right pane, to add the parameters of the inbound message overload handling, check the Inbound
Message Overload Handling check box. 7. In the Inbound Message Overload Handling area, define the following parameter details.
Table 69: Inbound Message Overload Handling Parameters

Parameter Default Priority Message Sla Ms
Inbound Message Queue Size Default Instance Rate Limit

Description
Default priority to be assigned to an incoming message if no specific priority is defined in the Message Handling Rules table.
Default value is 0.
Service Level Agreement (SLA) in milliseconds, defines the number of milliseconds that are associated with an incoming event or message. In case the configured duration times out, the Discard Behavior configured in the Message Handling Rules is applied else the Default Discard Behavior is used.
Maximum time (in millisec) that a message has in an inbound message handling queue waiting for a worker thread. Configuring this value avoids processing a message to time out by a remote peer.
Default value is 1500 ms.
Allows the maximum number of messages in the Inbound Message Queue. When the number of messages exceeds this value, messages are discarded as defined in the Message Handling Rules and the Default Discard Behavior.
Default value is 1000.
This parameter is applied to messages that do not have an applicable overload handling rule configured in the Message Handling Rules table.
Default value is 0.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 169

Diameter Configuration

Message Prioritization and Overload Handling

Parameter Default Discard Behaviour

Description
Default behavior to be applied to an incoming message if no specific discard behavior for that message is defined in the Message Handling Rules table.
· MESSAGE_DROP: Discards the request.
· DIAMETER_TOO_BUSY: Sends a response message havingResult-Code AVP value set to DIAMETER_TOO_BUSY (3004).

Rx Message Prioritization Message Handling Rules

Default value is MESSAGE_DROP
Defines Rx eMPS message handling priority based on the Rx message MPS-Identifier and Reservation-Priority AVPs. For more information see Table 70: Rx Message Prioritization Parameters, on page 170.
Defines specific inbound message overload handling rules based on different criteria. For more information, see Table 71: Message Handling Rules Parameters, on page 171.

Figure 27: Inbound Message Overload Handling Parameters

Table 70: Rx Message Prioritization Parameters
Parameter MPS Identifier

Description
MPS-Identifier indicates that an AF session relates to an MPS session. It contains the national variant forMPS service name. For example, NGN GETS.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 170

Message Prioritization and Overload Handling

Diameter Configuration

Parameter Reservation Priority
Priority
Table 71: Message Handling Rules Parameters
Parameter Diameter Client Protocol Command Code

Description
The AF specifies the Reservation-Priority AVP at request level in the AA-Request in order to assign a priority to the AF session as well as specify the Reservation-Priority AVP at the media-component-description AVP level to assign a priority to the IP flow. The Reservation-Priority AVP available at the request level only is used under Rx Message Prioritization table. If Reservation priority is not found at the message level in Rx message, then best value of Reservation Priority is calculated from the MCD and used for lookup. Range: 1 to 15, where 15 is considered as the highest priority and 1 is considered as the least priority.
A user defined priority based on MPS-Identifier and Reservation-Priority combination. Higher Priority messages are processed before lower priority messages.
Description
This is used to configure different priorities for different clients based on realms.
Specific application id value to be used for scoring. This value is used to match Auth-Application-Id AVP value.
Specific command code value to be used for scoring. This value is used to match the Command-Code field. These command codes map to different types of Diameter messages.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 171

Diameter Configuration
Parameter Request Type
Priority Per Instance Tps

Message Prioritization and Overload Handling
Description
Specific request type value to be used for scoring. This value should match the value of the CC-Request-Type AVP for Gx CCR messages.
· 0: Request Type not used for scoring · 1: INITIAL_REQUEST (1) · 2: UPDATE_REQUEST (2) · 3: TERMINATION_REQUEST (3)
Default value is 0. Request type should match the value of the Rx-Request-Type AVP for Rx messages.
· 0: INITIAL_REQUEST (0) · 1: UPDATE_REQUEST (1)
Request type should match the value of SL-Request-Type AVP for Sy SLR messages. The possible values are:
· INITIAL_REQUEST (0) · INTERMEDIATE_REQUEST (1)
It has to be configured to zero if the incoming message does not have a request type AVP. For example, Rx STR does not have a request type AVP or Rx-Request-Type AVP is unavailable in Rx message as it is not a mandatory AVP per 3GPP TS 29.214.
Priority value assigned to the message. Higher numerical value has the higher priority. Default value is 0. For example, 10, 20, 100, 200, 300, 500 and so on.
Transactions per second limit per process. This value is the TPS that these messages are limited to. The actual system's transaction per second limit can be calculated using the following formula: Per Instance Tps x Number of instances per VM x Number of VMs. Default value is 0. For example, 1000, 2000, 5000 and so on.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 172

Message Prioritization and Overload Handling

PCF Configuration

Parameter Discard Behavior

Description
Behavior to be applied to an incoming message. · MESSAGE_DROP: Discards the request. · DIAMETER_TOO_BUSY: Sends a response message having Result-Code AVP value configured to DIAMETER_TOO_BUSY (3004).
Default value is MESSAGE_DROP.

PCF Configuration
1. Log in into Policy Builder. 2. Select Reference Data tab. 3. From the left pane, select Systems. 4. Select and expand your system name. 5. Select PCF Configuration. 6. In the right pane, to add the parameters of the inbound message overload handling, check the Inbound
Message Overload Handling check box. 7. In the Inbound Message Overload Handling area, define the following parameter details.
Table 72: Inbound Message Overload Handling Parameters

Parameter Default Priority
Message Sla Ms

Description
Default priority to be assigned to an incoming message if no specific priority is defined in the Message Handling Rules table.
Default value is 0.
Service Level Agreement (SLA) in milliseconds, defines the number of milliseconds that are associated with an incoming event or message. In case the configured duration times out, the Default Discard Behavior is applied.
Maximum time (in millisec) that a message has in an inbound message handling queue waiting for a worker thread. Configuring this value avoids processing a message to time out by a remote peer.
Default value is 1500 ms.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 173

PCF Configuration

Message Prioritization and Overload Handling

Parameter Inbound Message Queue Size Default Instance Rate Limit N7 Emergency Message Priority Default Discard Behaviour
Message Handling Rules

Description
Allows the maximum number of messages in the Inbound Message Queue. When the number of messages exceeds this value, messages are discarded as defined in the Message Handling Rules and the Default Discard Behavior.
Default value is 1000.
This parameter is applied to messages that do not have an applicable overload handling rule configured in the Message Handling Rules table.
Default value is 0.
Default priority assigned to messages related to an emergency session.. Emergency message priority is applied when the DNN matches an emergency DNN configured under PCF Configuration.
Default value is 1.
Default behavior to be applied to an incoming message if no specific priority is defined in the Message Handling Rules table.
· MESSAGE_DROP: Discards the request.
· SERVICE_UNAVAILABLE: Service is not available.
Default value is MESSAGE_DROP.
Defines specific inbound message overload handling rules based on different criteria. For more information, see Table 74: Message Handling Rules Parameters, on page 176

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 174

Message Prioritization and Overload Handling Figure 28: N5 Message Prioritization Rule

PCF Configuration

The following tables provides the inputs for N5 Message Prioritization Parameters.
Table 73: N5 Message Prioritization Parameters

Parameter mpsId
resPrio

Description
mpsId indicates that an AF session relates to an MPS session. It contains the national variant for MPS service name. For example, NGN GETS.
The AF specifies the Reservation-Priority (resPrio) attribute at request level in the N5 messages in order to assign a priority to the AF session as well as specify the Reservation-Priority attribute at the medComponents attribute level to assign a priority to the IP flow.
The Reservation-Priority attribute available at the request level only is used under N5 Message Prioritization table.
If Reservation-Priority is not found at the message level in N5 message, then best value of Reservation-Priority is calculated from the MCD and used for lookup.
Range: 1 to 15, where 15 is considered as the highest priority and 1 is considered as the least priority.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 175

PCF Configuration

Message Prioritization and Overload Handling

Parameter

Description

Priority

A user defined priority based on mpsId and Reservation-Priority combination.
Higher Priority messages are processed before lower priority messages.

Figure 29: Inbound Message Overload Handling Parameters

Table 74: Message Handling Rules Parameters
Parameter Request Type Priority
Per Instance Tps

Description
Specifies request type value to be used for scoring. For example N7_CREATE, N28_NOTIFY, and so on.
Priority value assigned to the message. Higher numerical value has the higher priority. For example, 700, 800 and so on.
Transactions per second limit per process. This value is the TPS that these messages are limited to. Default value is 0.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 176

Message Prioritization and Overload Handling

Configuring SBI-Message-Priority Prioritization

Parameter Discard Behavior

Description
Behavior to be applied to an incoming message. · SERVER_TOO_BUSY: Sends a responsive message having result code attribute value with HTTP code 503. · MESSAGE_DROP: Discards the request.

Configuring SBI-Message-Priority Prioritization
This section describes how to configure the SBI-Message-Priority Prioritization. 1. Log in into Policy Builder. 2. Select Reference Data tab. 3. From the left pane, select Systems. 4. Select and expand your system name. 5. Select PCF Configuration. 6. In the right pane, to add the parameters of the SBI-Message-Priority prioritization, check the
SBI-Message-Priority Prioritization check box. 7. In the SBI-Message-Priority Prioritization area, define the following parameter details.
Table 75: SBI-Message-Priority Prioritization Parameters

Parameter Default Inbound Priority
Inbound SBI-Message-Priority Prioritization

Description
The default value is used if priority value does not match a value in Inbound SBI-Message-Priority Prioritization table
A user defined priority based on SBI Message Priority and Priority combination. For more information, see Table 76: Inbound SBI-Message-Priority Prioritization Parameters, on page 178

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 177

OAM Support Figure 30: SBI-Message-Priority Prioritization

Message Prioritization and Overload Handling

Table 76: Inbound SBI-Message-Priority Prioritization Parameters

Parameter SBI Message Priority
Priority

Description
The range of values allowed for SBI-Message-Priority are from 0­31, where 0 is considered as the highest priority and 31 is considered as the least priority value.
It provides the queue priority value. A higher numerical priority value equates to a higher priority.

OAM Support
This section describes operations, administration, and maintenance information for this feature.
Bulk Statistics Support
The following statistics are supported for the message prioritization and overload handling feature.

Note The following values apply to all the statistics: · Unit - Int64 · Type - Counter · Nodes - Service

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 178

Message Prioritization and Overload Handling

Bulk Statistics Support

The following metrics track the counter information: · input_queue_result - Captures the status of the message in the inbound queue whether it is dropped or rate limited. The following labels are defined for this metric: · appid · message-type · result
· wps_rx_priority - Captures the Rx message queue priority. The following labels are defined for this metric: · command_code · priority
· sbi_priority_total - Captures the SBI message queue priority. The following labels are defined for this metric: · interface · message_type · priority

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 179

Bulk Statistics Support

Message Prioritization and Overload Handling

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 180

2 4 C H A P T E R

Multiple Virtual IP Address

· Feature Summary and Revision History, on page 181 · Feature Description, on page 182 · How it Works, on page 183 · Configuration Support for Multiple Virtual IP Address, on page 183
Feature Summary and Revision History

Summary Data
Table 77: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Disabled ­ Configuration required to enable Not Applicable

Revision History

Table 78: Revision History

Revision Details

Release

Enhancement introduced. PCF supports N5 Interface.

2022.02.0

Enhancement introduced.
PCF supports dual stack (IPv4 and IPv6) connectivity on N7, N28 and NNRF external interfaces/endpoints.

2022.01.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 181

Feature Description

Multiple Virtual IP Address

Revision Details

Release

Enhancement introduced.

2021.04.0

PCF supports IPv6 connectivity on N7, N28 and NNRF external interfaces/endpoints.

Enhancement introduced.

2021.02.0

Support added for HTTP IDLE Connection Timeout on Server

First introduced.

2020.01.0

Feature Description
You can now enable the IPv4 communication between PCF and the other network functions such as AF, SMF, NRF, CHF, and UDR through multiple virtual IP addresses (VIP). With a provision to configure discrete VIP addresses or external IP addresses for each rest-ep service and link them to an endpoint, you can prevent sharing of IP addresses between the NFs. Multiple VIPs take the role of a load balancer to offer a high availability environment.
In a scenario where multiple calls are simultaneously made to a distinct network function, the policy service spawns different REST ep services to complete each interaction. PCF spawns a service using the IP address available in the IP pool.
PCF supports both IPv4 and IPv6 connectivity on N5, N7, N28 and NNRF external interfaces/endpoints (inbound and outbound).
Architecture
This section describes how the network function components interact when the multiple VIP model is implemented.
The multiple VIP architecture focuses on high availability and load-balancing aspect of IP addresses in 5G. With relevance to the multiple VIP graphic, the Policy Engine invokes a new rest-ep service for a NF when you assign an IP address as an external endpoint. All the incoming requests from the network functions, such as NRF and SMF are routed to the rest-ep-service and the traffic is redirected to the pcf-rest-ep pod. The pod has a bilateral communication with the PCF Engine. The rest-ep-service operates as a load balancer.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 182

Multiple Virtual IP Address Figure 31: Multiple VIPs

How it Works

How it Works
This section describes how this feature works. After the admin associates an IP address to a network function such as PCF, a new endpoint is linked to the network function through the rest-ep service. This service enables you to connect to the pcf-rest-ep pod. You can configure multiple IP address for the N5, N7, N36, N28, and Nnrf interfaces. During this process, an individual K8 service resource of type Load Balancer is created for each interface that communicates with the rest-endpoint pod. These IP addresses get listed in the ExternalIP property of the K8 service. PCF supports multiple IP service communications with one replica of the rest-endpoint pod.
Configuration Support for Multiple Virtual IP Address
The configuration of the multiple virtual IP address involves the following: · Configuring the REST Endpoints · Verifying the REST Endpoints Configuration
Configuring the REST Endpoints
This section describes how to configure the IP address, port numbers, and other attributes for a REST endpoint.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 183

Configuring the REST Endpoints

Multiple Virtual IP Address

Note Configuration changes to the REST endpoint cause the endpoint to restart automatically. Cisco recommends making such changes only within the maintenance window.
Before configuring the external IP addresses for the PCF REST endpoints, make sure that you configure and deploy the IP addresses using the SMI Deployer. For a single interface both IPv4 or IPv6 address can be used. To configure REST endpoint, use the following configuration in the Policy Ops Center console: config
rest-endpoint interface [ n5 | n7 | n15 | n25 | n28 | nnrf ] ip ipv6 interface_ipv6_address port interface_port_number ips ip_address port port_number http-connection-limit maximum_inbound_connection_count http-idle-connection-timeout-on-server-seconds idle_connection_timeout replicas replica_count inbound-request-timeout-ms inbound_timeout outbound-request-timeout-ms outbound_timeout repository repository_address tracing-service-name tracing_service uri-scheme uri_scheme end
NOTES: · For each REST endpoint, use a separate rest-endpoint ip_address command.
· interface [ n5 | n7 | n15 | n25 | n28 | nnrf ]--Specify the interface name and IP address that is configured for the external IP. interface_name ip_address must include the interface name such as N7, N36, N28, and NNRF. · ip interface_ip_address--Specify the IPv4 address that is assigned for the interface.
· ipv6 interface_ipv6_address--Specify the IPv6 address that is assigned for the interface.
· port interface_port_number--Specify the port number for the interface. For example, to enable the N15 interface allocate resources such as IP and port number. Once the interface is configured, the PCF-AMF traffic can pass through N15.
· ips ip_address--Specify the IPv4 or IPv6 address that is assigned as a REST endpoint external IP address.
· port port_number--Specify the port number for the REST endpoint.
· http-connection-limit maximum_inbound_connection_count--Specify the maximum number of inbound HTTP connections that the REST endpoint server must accept. Default value is 200.
· http-idle-connection-timeout-on-server-seconds idle_connection_timeout--Specify the idle connection timeout for REST connection where PCF is acting as server. Default value is 60 seconds.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 184

Multiple Virtual IP Address

Verifying the REST Endpoints Configuration

If the value is less than or equal to 0, the default value of 60 seconds is used. · replicas replica_count--Specify the number of instances of the service-based interface. · inbound-request-timeout-ms inbound_timeout--Specify the timeout period after which the inbound
request expires. You can configure a single inbound_timeout value for all the configured interfaces or the single interface. · outbound-request-timeout-ms outbound_timeout--Specify the timeout period after which the outbound request expires. You can configure a single outbound_timeout value for all the configured interfaces or the single interface. · repository repository_address--Specify a repository that the network interface optimizes. · tracing-service-name tracing_service--Specify the service that is used for tracing purpose. · uri-scheme uri_scheme--Specify the URI scheme as HTTP or HTTPs.
Note If the configured IP address is not accessible, then PCF fails to connect with the other NFs and reports an error message in the service as "Failed to allocate IP for "pcf/udr-rest-ep": no available IPs".
Verifying the REST Endpoints Configuration
This section describes how to verify the REST Endpoints configuration. After an interface IP address is configured, you can observe a new service with the name as <interface-name>-rest-ep. The service type as ClusterIP gets created within the configured IP address. For example, n36-rest-ep. If an IP address is not associated to an interface, then PCF considers an external IP address and associates it with the interface.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 185

Verifying the REST Endpoints Configuration

Multiple Virtual IP Address

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 186

2 5 C H A P T E R

mTLS on SBA Interfaces

· Feature Summary Revision History, on page 187 · Feature Description, on page 187 · How it Works, on page 188 · Standards Compilance, on page 188 · Feature Configuration, on page 188
Feature Summary Revision History

Summary Data
Table 79: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation
Revision History
Table 80: Revision History
Revision Details First introduced.

PCF SMI Disabled ­ Configuration required to enable Not Applicable
Release 2022.04.0

Feature Description
PCF supports Hypertext Transfer Protocol (HTTP) over Transport Layer Security (TLS) for provided Service Based Interfaces (SBI). PCF enables support to the TLS client authentication for NF consumers (SMF, AF) and authenticates itself with NFs (CHF, UDR, NRF).

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 187

How it Works

mTLS on SBA Interfaces

Enabling and disabling mTLS: PCF supports the configuration option to enable and disable TLS client authentication for REST server endpoints when using HTTPS. Certificate configuration: PCF configures with a single certificate and enabled with server authentication and client authentication. When mTLS enabled, PCF uses the same certificate for client authentication.
How it Works
This section describes how this feature works.
Standards Compilance
This feature complies with the following standards specifications: · 3GPP 29.510 "Network function repository services" · 3GPP 33.310 "Network Domain Security (NDS), Authentication Framework (AF)" · 3GPP 33.501 "Security architecture and procedures for 5G system"
Feature Configuration
To configure this feature, use the following configuration:
Configuring mTLS for REST Endpoints Using HTTPS
config rest-endpoint mTLS [true|false] end
NOTES: · rest-endoint mTLS [true | false] --Specifies the rest endpoint for mTLS. For example, the specified default value is false.
Note PCF does not support simultaneous enablement of HTTP and HTTPS on SBI interfaces. PCF configures with either HTTP or HTTPS since the URI scheme setting for the Rest endpoint is global.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 188

2 6 C H A P T E R

N5 Authorization

· Feature Summary and Revision History, on page 189 · Feature Description, on page 189 · How it Works, on page 190 · Feature Configuration, on page 196
Feature Summary and Revision History

Summary Data
Table 81: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Disabled ­ Configuration required to enable Not Applicable

Revision History
Table 82: Revision History
Revision Details First introduced.

Release 2022.02.0

Feature Description
PCF provides a method for the service providers to regulate the services available to individual subscribers. You can configure the bearer-level regulation through the customization and configuration of N5 Authorization.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 189

Architecture

N5 Authorization

The configuration handles the Video over NR (ViNR) authorization as per the subscriber attributes (SUPI, GPSI, and Throttling) to control the services available to each subscriber.
Architecture
This section depicts how the network function components interact during an N5 Authorization.
The SMF and PCF have a bilateral communication over the N7 interface. The AF sends an N5 Create/Update request to PCF. The PCF performs the N5 Authorization of the request by evaluating the message for the missing media type attribute and consults the value that is assigned to the Bearer-Authorization column in the STG table for the configured status as accept or reject. PCF fetches the STG information from the associated database. PCF communicates the evaluation result to the SMF and AF through REST requests.
The following figure illustrates how the NF interactions happen over the N5 interface.
Figure 32: NF Interactions

Components
This section describes the N5AuthorizationSTGConfiguration component in the N5 Authorization process. The N5AuthorizationSTGConfiguration service configuration is used to evaluate the N5 Authorization table and obtain the configured output values. The N5AuthorizationSTGConfiguration service supports chained evaluation of Search Table Groups (STGs) which means multiple STGs are configured hierarchically in the service and outputs of one table is used as input keys for another table. The N5AuthorizationSTGConfiguration configuration evaluates all the bearers on receiving a Rest message and sends the appropriate Rest requests or responses depending on the bearer's authorization status provided the N5 session exists. The N5 Authorization table from which Bearer Authorization and Error Cause output values are received is configured as the last table in the list of chained STGs configured under N5AuthorizationSTGConfiguration.
How it Works
This section describes how this feature works. At a high-level, PCF supports the N5-based authorization of bearers. The N5 authorization requires a Search Table Groups (STG), which enables logical grouping of multiple Customer Reference Data (CRD) tables. Within this STG, a CRD table that is dedicated to N5 Authorization is created in the Policy Builder. The input keys in the CRD signify the conditions based on which PCF determines the throttle limit for a bearer. The table has the following output columns:
· Bearer Authorization: Indicates whether to allow or reject a bearer.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 190

N5 Authorization

Call Flows

· Error Cause: Specifies the Error-Message that is included in the N5 response, if necessary.
If PCF is configured to reject the N5 dedicated bearer when the associated Media-Type is missing, it rejects the bearer with the HTTP status code = 403 Forbidden, problem cause=REQUESTED_SERVICE_NOT_AUTHORIZED and, problem detail="Invalid service information, Media type is not specified" in response.
PCF is configured to reject a non-GBR bearer if the value for both, upload and download of the non-GBR bearer is set to 0. PCF determines if the bearer is non-GBR with 0-bit rate after consulting the NON-GBR QCI and ZERO BIT RATE QoS input columns in the N5 Authorization table. If Bearer-Authorization value is set to REJECT, then PCF rejects the bearer with HTTP status code=403 Forbidden, problem cause=REQUESTED_SERVICE_NOT_AUTHORIZED and, problem detail="BLOCKED" in response.
If PCF receives a N5 Create/Update request with multiple media components, and it rejects one of the media component after assessing for N5 Authorization, PCF sends a successful response for the accepted media components. For the rejected media components, PCF creates a scheduled event for sending a delayed N5 Notify request. You can configure the duration between the rejection and the time when scheduling the delayed message happens. The default value is set to 500 milliseconds.

Note In case, PCF rejects multiple media components with cause=REQUESTED_SERVICE_NOT_AUTHORIZED, the error resulting from the last rejected media component is set as problem detail in the response.
For existing bearers in an N5 session, PCF evaluates them for N5 Authorization when an event occurs such as LDAP refresh, N28 NOTIFY, and N7_NOTIFY. In situations where all the media components that are stored in the N5 sessions are rejected, then PCF sends a N7 Notify Terminate request to Application Function (AF).

Note You may observe a degradation in the performance of the PCF system when the N5AuthorizationSTGConfiguration service is added. The level of degradation corresponds to the number of STGs configured for the chained evaluation in the N5AuthorizationSTGConfiguration service and the number of bearers the service has evaluated.

Call Flows

This section describes the key call flows for this feature.

All Bearers Are Rejected Call Flow
This section describes the All Bearers Are Rejected call flow.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 191

Few Bearers Are Rejected Call Flow Figure 33: All Bearers Are Rejected Call Flow

N5 Authorization

Table 83: All Bearers Are Rejected Call Flow Description
Step Description 1 The SMF sends a N7 Create request to the PCF. 2 The PCF responds to the SMF with the success response. 3 The AF sends an N5 Create request (Audio and Video) message to the PCF. 4 The PCF performs the N5 Authorization CRD lookup. 5 The N5 Authorization CRD evaluates both, audio and video bearer. If there is a missing MediaType
IE, PCF rejects the bearer. PCF validates all the bearers for Bearer-Authorization=REJECT. The bearers are classified as unauthorized and are not installed on the SMF. If all bearers received in the AAR are rejected, PCF sends a N5 Create error response with Status Code=403 Forbidden, Problem Cause=REQUESTED_SERVICE_NOT_AUTHORIZED, Problem Detail=Throttled to the AF
Few Bearers Are Rejected Call Flow
This section describes the Few Bearers are Rejected call flow.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 192

N5 Authorization Figure 34: Few Bearers Are Rejected Call Flow

Few Bearers Are Rejected Call Flow

Table 84: Few Bearers Are Rejected Call Flow Description
Step Description 1 The SMF sends a N7 Create request to the PCF. 2 The PCF responds to SMF with success response. 3 The AF sends an N5 Create request (Audio and Video) message to the PCF. 4 The PCF performs the N5 Authorization CRD lookup. 5 The N5 Authorization CRD evaluates both the audio and video bearers. The audio bearers that contain
the required MediaType IE are tagged as accepted. Video bearers with the missing MediaType IE are rejected. Bearers evaluated to Bearer-Authorization=ACCEPT are authorized and installed on the SMF. PCF responds to the accepted audio bearers with N5 Create success response. 6 The PCF sends N7 Notify (Audio) to the SMF. 7 The SMF responds to the PCF with a N7 Notify-Resp (Success). 8 Bearers evaluated to Bearer-Authorization=REJECT are marked as unauthorized and are not installed at the SMF. The PCF sends N5 Notify request (Video) AF-Event=FAILED_RESOURCES_ALLOCATION to AF.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 193

Existing Bearers Are Rejected Call Flow
Step Description 9 The AF responds with N5 Notify success-response to the PCF.
Existing Bearers Are Rejected Call Flow
This section describes the Existing Bearers Are Rejected call flow.
Figure 35: Existing Bearers Are Rejected Call Flow

N5 Authorization

Table 85: All Bearers Are Rejected Call Flow Description
Step Description 1 The SMF sends a N7 Create request to the PCF. 2 The PCF responds to the SMF with a N7 Create Success response. 3 The AF sends N5 Create request (Audio and Video) message to the PCF. 4 The PCF performs the N5 Authorization CRD lookup. 5 The N5 Authorization CRD evaluates both, the audio and video bearers.
If successful authorization, PCF sends N5 Create success response to AF. 6 The PCF sends N7 Notify (Audio and Video) message.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 194

N5 Authorization

Considerations

Step Description 7 The SMF responds with N7-Notify-Resp (Success) to the PCF. 8 The SMF sends N7 Update (RAT-Type Change). 9 The PCF performs the N5 Authorization CRD lookup. 10 When PCF reevaluates the existing bearer and the N5 Authorization CRD detects a VIDEO bearer
with the Bearer-Authorization=REJECT, PCF rejects the bearer with Error-Message=Throttled. The PCF sends N7-UPDATE (Success) Charging Rule Remove for VIDEO to the SMF. 11 The PCF sends N5 Notify request (Video) AF-Event=FAILED_RESOURCES_ALLOCATION to the AF 12 The AF responds with N5 Notify success-response to the PCF.

Considerations
The following considerations apply when you configure the N5 Authorization:
· The STG names that are configured in the N5AuthorizationSTGConfiguration should be unique.
· The IE names for the output columns that are configured in the N5AuthorizationSTGConfiguration service should be unique.
· The chained evaluation keys should have the same IE name for the output column in the source table, and the input column in the destination table.
· The result of the N5AuthorizationSTGConfiguration service is available in the last table that is defined in the list. The table includes the output columns with the following mandatory IE names: Bearer-Authorization and Error-Message.
· The Bearer-Authorization column can be configured to accept the fixed values that are Accept and Reject.
· Perform the configurations that are required for defining and mapping the CRD tables as per the requirement.
· The Policy Server evaluates the mapped source output IEs (result column of the STG) through the CRD which it has created. If PCF has not created the CRD, then it cannot query the corresponding chained input key which further limits it from verifying the N5 Authorization.
· 1:1 mapping must exist between a chained pair of output IE and the input key.

Limitations

This feature has the following limitations in this release:
· When N5 Authorization fails, PCF sends an N5 Notify request only if the AF has subscribed to AF-Event=FAILED_RESOURCES_ALLOCATION in N5 Create request.
· The N5 Authorization is performed only against MediaComponent IE in the request. This indicates that the attributes from N5 Create/Update messages that are used as input for the CRD table evaluation should be from MediaComponent IE only. PCF does not evaluate the MediaSubComponent IE.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 195

Feature Configuration

N5 Authorization

· If using the PolicyState or Session data retrievers that are bound to the input keys, then PCF retrieves the data for the input keys if it is inserted into the session data.
Feature Configuration
This section describes how to configure N5 Authorization. The configuration of the N5 Authorization capability in PCF involves the following steps: 1. Creating the STG Tables 2. Adding the N5AuthorizationSTGConfiguration Service 3. Configuring the Service Chaining 4. Rejecting N5 Create with Missing MediaType IE 5. Setting Up the Delayed Message Schedule
Creating the STG Tables
This section describes how to create the STG column in Policy Builder. To configure the STG column, use the following configuration: 1. Log in to Policy Builder. 2. Click the Reference Data tab, and from the left pane click Custom Reference Data Tables to view
the options. 3. On the left pane, click the Search Table Groups folder. 4. In the Search Table Group Summary pane, click Search Table Group. A default STG gets created
under the Search Table Groups folder. 5. Click the new STG and in the Search Table Groups pane rename the STG with a unique name. 6. Click Customer Reference Data Table. A new table gets created on the left pane. 7. Click the new table to open the Customer Reference Data Table pane. Rename the table with a unique
name. 8. Navigate to the Columns section and click Add. A default column gets added to the Columns section. 9. Click the newly created column heading and rename it. Select the options in the corresponding row as
applicable to your environment.
Note If the Key option is selected for a specific column, then it indicates as the input column.
10. Save the changes.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 196

N5 Authorization

Adding the N5AuthorizationSTGConfiguration Service

Adding the N5AuthorizationSTGConfiguration Service
This section describes how to add the N5AuthorizationSTGConfiguration service. To configure the N5AuthorizationSTGConfiguration service, use the following configuration: 1. Log in to Policy Builder. 2. Choose the Services tab, and from the left pane click Use Case Templates to create a new service. 3. On the left pane, click Summary to open the Summary pane. 4. Under Actions, click Use Case Template. 5. In the Use Case Template pane, specify the name for the template. 6. Click the Actions tab and select Add. 7. In the Select Service Configuration dialog box, select the N5AuthorizationSTGConfiguration and
click OK. The Use Case template with the specified name is created. 8. In the left pane, click Services > Service Options to view the options. The newly created service appears
in the Service Options. 9. Select the service that you have created. 10. Under Service Configurations, click Add to open the Select Service Configuration dialog box. 11. Under Service Configurations, select N5AuthorizationSTGConfiguration, then click OK.
Configuring the Service Chaining
This section describes how to configure the service chaining for N5 Authorization. Before configuring the service chaining, ensure that you have created the use case templates and added the N5AuthorizationSTGConfiguration service. Use case templates are the building blocks of the PCF architecture. The use case templates allow you to define the Service Configuration objects to be set by a Service Option. To configure service chaining, use the following configuration: 1. Log in to Policy Builder. 2. Click the Services tab, and from the left pane click Service Options to view the options. 3. Expand the new service that you have created, and select the child. 4. In the Service Option pane, select N5_AuthorizationSTGConfiguration service under Service
Configurations and specify the N5_AuthorizationSTGConfiguration parameters. 5. Expand the List Of Input Column Avp Pairs (List) > ColumnAndAvpPair, and enter the appropriate
information. 6. Expand the List Of Output Column Avp Pairs (List) > ColumnAndAvpPair, and enter the Avp Name
as Bearer-Authorization. Similarly, in another ColumnAndAvpPair > Avp Name field specify Error-Message. 7. Save the changes.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 197

Rejecting the N5 Create Request with Missing MediaType IE

N5 Authorization

Rejecting the N5 Create Request with Missing MediaType IE
This section describes how to enable PCF to reject the N5 Create Request with Missing MediaType IE. To configure PCF to reject the N5 Create Request, use the following configuration: 1. Log in to Policy Builder. 2. Click the Reference Data tab. 3. In the left pane, click SBA Profiles > N5 Profiles. 4. Click N5 Profile. 5. In the N5 Profile pane, select the Reject AAR with missing Media Type check box. 6. Save the changes.

Setting Up the Delayed Message Schedule
This section describes how to set up the duration after which PCF sends the delayed message to the AF. To configure the delayed message schedule through the Policy Builder, use the following configuration: 1. Log in to Policy Builder. 2. Click the Reference Data tab. 3. In the left pane, click SBA Profiles > N5 Profile. 4. Click N5 Profile. 5. In the N5 Profile pane, specify the duration in the Sending Delayed Message Wait Time (In millisec)
field. If you do not specify the period, then PCF considers the default period of 500 milliseconds.

N5 Profile

This section describes the parameters, which you can configure for the N5 Profile. Before setting the service parameters, ensure that you create a use case template and add a service for this configuration. For details, see Configuring the Use Case Template, on page 349 and Adding a Service, on page 348. The following table describes the N5 Profile service parameters:
Table 86: N5 Client Parameters

Parameter Reject AAR with missing Media Type

Description
Enables PCF to reject the N5 Create/Update requests when MediaComponent have MediaType IE unspecified. PCF rejects the request with HTTP Status Code=403 Forbidden, Problem Cause=REQUESTED_SERVICE_NOT_AUTHORIZED
To enable the parameter, select the check box available in the SBA Profiles > N5 Profiles.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 198

N5 Authorization
Parameter Delayed Message Wait Time

N5 Profile
Description Allows you to specify the duration after which PCF sends a delayed message. The default value is 500 milliseconds. To define the duration, specify the period in the text field available in SBA Profiles > N5 Profiles.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 199

N5 Profile

N5 Authorization

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 200

2 7 C H A P T E R

N7 Notify Retry Based on Error Codes

· Feature Summary and Revision History, on page 201 · Feature Description, on page 201 · How it Works, on page 202 · Call Flows, on page 202
Feature Summary and Revision History

Summary Data
Table 87: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Disabled ­ Configuration required to enable Not Applicable

Revision History
Table 88: Revision History
Revision Details First introduced.

Release 2022.03.0

Feature Description
The Cisco PCF enables the N7 Notify Retry on an error code in the instance of the N7 Notify error response from SMF. The PCF performs the retry to the SMF, only if the error code is configured in the OPs center.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 201

How it Works

N7 Notify Retry Based on Error Codes

Note PCF supports retry on error code only for the same site.
How it Works
This section describes how this feature works.
Call Flows
This section describes the key call flow for this feature.
N7 Notify Retry on Error code Call Flow
This section describes the configuration of N7 Notify Retry on Error code call flow.
Figure 36: N7 Notify Retry on Error code Call

Table 89: N7 Notify Retry on Error code Call Flow Description
Step Description 1 The SMF sends a N7 Create Request to the REST-EP. 2 The REST-EP sends N7 Create to the PCF-ENGINE.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 202

N7 Notify Retry Based on Error Codes

N7 Notify Retry on Error code Call Flow

Step Description 3 The PCF-ENGINE responds to the REST-EP with a N7 Create Response Policy Decision. 4 The REST-EP sends N7 Create Response to the SMF. 5 The AF sends RX AAR to the DIAMETER-EP. 6 The DIAMETER-EP sends RX AAR to the PCF-ENGINE. 7 The PCF-ENGINE sends N7 Notify to the REST-EP. 8 The REST-EP sends N7 Notify to the SMF. 9 The SMF responds with a N7 Notify Response to the REST-EP. 10 The PCF-ENGINE sends RX AAA to the DIAMETER-EP. 11 The DIAMETER-EP sends RX AAA to the AF. 12 The REST-EP validates the conditions after receiving an error code in the SMF. 13 The REST-EP sends N7 Notify to the SMF. 14 The SMF responds to the REST-EP with a N7 Notify Response. 15 The REST-EP responds with N7 Notify Success Response to the PCF-ENGINE.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 203

N7 Notify Retry on Error code Call Flow

N7 Notify Retry Based on Error Codes

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 204

2 8 C H A P T E R

Network Repository Function Subscription to Notifications

· Feature Summary and Revision History, on page 205 · Feature Description, on page 205 · Configuration Support for the NRF Subscription to Notifications, on page 206
Feature Summary and Revision History

Summary Data
Table 90: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled ­ Configuration required to disable Not Applicable

Revision History
Table 91: Revision History
Revision Details First introduced.

Release 2020.01.0

Feature Description
PCF supports the following functions for the Network Repository Function (NRF) Subscription to Notifications feature:

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 205

Standards Compliance

Network Repository Function Subscription to Notifications

· The NRF supports the 3GPP December 2018 specification for interface discovery, registration for renaming NRF, change type, and removal or addition of new API attributes. PCF supports the notification subscription from NRF. The notifications are for profile changes that are based on the service name.
· PCF supports the subscription of notifications from NRF. This support includes the following functions: · Use the NRFManagement service for subscriptions for changes in network function instances that are based on the subscribed service name. · Implement notifications callback URL for PCF to handle the notifications from NRF for subscribed service names. · Allow the resubscription during the validity subscription time. · Support unsubscription based on the subscribed ID. · Prioritize NF profiles from NRF over preconfigurations or configured local set for an NF type.
· Supports the following repository functions: · Allow the repository configuration with multiple endpoints, which are primary endpoints, secondary endpoints, and tertiary endpoints. · Allow configuration of the profile discovery, which is based on service name and other parameters. · Allow configuration of the registration repository.
· Handles notifications from NRF for the subscribed service name. · Provides statistics and metrics to track the following tasks:
· Manage notifications of NFProfile from NRF for a specific service name. · Manage subscriptions for a specific service name. · Manage resubscriptions for a specific service name. · Manage unsubscriptions and deletions for a specific service name.
Standards Compliance
This feature complies with the following standards specifications: · 3GPP TS 29.510 V15.2.0 (2018-12) "Network Function Repository Services"
Configuration Support for the NRF Subscription to Notifications
The configuration of NRF subscription to notifications involves performing the followings steps: 1. Configuring NRF with Multiple Base URLs 2. Configuring NRF for Registration 3. Configuring NRF for Discovery of Network Function

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 206

Network Repository Function Subscription to Notifications

Configuring NRF with Multiple Base URLs

Configuring NRF with Multiple Base URLs
This section describes how to configure NRF that has multiple base URLs.
To configure NRF with multiple base URLs, use the following configuration:
config nf-services nf_services_name repository repository name repository_name services services_name api-version-in-uri api_version_uri_name base-urls primary primary_endpoints_url secondary secondary_endpoints_url tertiary tertiary_endpoints_url end
NOTES:
· nf-services nf_services_name--Specify network functions, such as registration, repository, and service discovery details.
· repository repository--Specify a repository for the network function services.
· name repository_name--Specify the repository with the name you specify.
· services services_name--Specify a service for the repository name that you configured. Select one of these options -- nchf-spendinglimitcontrol, nnrf-disc, nnrf-nfm, and nudr-dr.
· api-version-in-uri api_version_uri_name--Specify a version for the API version in URI for discovery and subscription of service to NRF.
· base-urls--Specify the primary, secondary, or tertiary endpoint as the base URL.
· primary primary_endpoints_url--Specify the base URL for the primary endpoint.
· secondary secondary_endpoints_url--Specify the base URL for the secondary endpoint when the primary endpoint is unavailable.
· tertiary tertiary_endpoints_url--Specify the base URL for the tertiary endpoint when both the primary and the secondary endpoints are unavailable.
Configuring NRF for Registration
This section describes how to enable NRF for registering the NFs.
To configure NRF for registration, use the following configuration:
config nf-services nf_services_name registration service-repository service_repository_name heartbeat failure-threshold failure_threshold_in_secs

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 207

Configuring NRF for Discovery of Network Function

Network Repository Function Subscription to Notifications

interval-in-secs interval_in_secs end
NOTES: · nf-services nf_services_name--Specify the network function service configuration mode. From this mode, you can configure the services such as registration, repository, and service discovery details.
· registration ­ Enters the registration configuration mode.
· service-repository service_repository_name--Specify the name of the repository from the repository configuration.
· heartbeat ­ Enters the heartbeat configuration mode.
· failure-threshold failure_threshold_in_secs--Specify the value for the number of failures before confirming the heartbeat failure. The acceptable value is an integer in the range of 1-3.
· interval-in-secs interval_in_secs--Specify the interval between two heartbeats in seconds. The acceptable value is an integer.
Configuring NRF for Discovery of Network Function
This section describes how to configure NRF to enable discovery of an NF.
To configure NRF for discovering an NF, use the following configuration:
config nf-services nf_services_name discovery [ nchf-spendinglimitcontrol | nudr-dr ] service-repository service_repository cache-forever [ true | false ] disable-subscription [ true | false ] subscription-extension-in-minutes subscription_extension end
NOTES: · nf-services nf_services_name--Specify network functions, such as registration, repository, and service discovery details.
· discovery--Enters the discovery configuration mode.
· service-repository service_repository--Specify the name of the repository that you configured in repositories.
· cache-forever [ true | false ]--Specify the discovery of services as "true" or "false" value. If this parameter is set to "true", then the discovered NFProfile cache does not expire at PCF.
· disable-subscription [ true | false ] --Specify the services as "true" or "false" to disable a subscription. If this is set to "true", then no subscription request is sent to NRF for the NF profile type.
· subscription-extension-in-minutes subscription_extension--Specify the duration by when you want to extend the subscription. PCF shows this value as validityTime in resubscription when the subscription validity time expires.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 208

Network Repository Function Subscription to Notifications

Troubleshooting Information

Troubleshooting Information
For message routing failures, check the datastore pod health and the logs for any issues. For more information on how to check the pod health and logs, see Troubleshooting Information, on page 459.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 209

Troubleshooting Information

Network Repository Function Subscription to Notifications

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 210

2 9 C H A P T E R

Network Slicing

· Feature Summary and Revision History, on page 211 · Feature Description, on page 212 · How it Works, on page 212 · Configuring the Network Slicing Feature, on page 213 · Network Slicing OA&M Support, on page 215
Feature Summary and Revision History

Summary Data
Table 92: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled ­ Configuration required to disable Not Applicable

Revision History

Table 93: Revision History

Revision Details
Enhancement introduced.
PCF to support metrics and statistcs counters based on Slice -ID.

Release 2022.03.0

Enhancement introduced. Configuration updated for N5 interface service.

2022.02.0

First introduced.

2021.04.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 211

Feature Description

Network Slicing

Feature Description
The network slicing solution allows the service providers to partition the 5G physical network into multiple virtual network slices. PCF implements network virtualization by registering the Single­Network Slice Selection Assistance Information (S-NSSAIs) with the NRF. The S-NSSAI enables PCF to identify a network slice. After the registration is complete, SMF and AMF can discover the PCF instances serving the specific slices.
Note PCF supports only soft slicing, slice-based policy control, without isolating the system resources belonging to different slices.
PCF Supports the Statistics counters to provide volume of TPS per Service based interfaces (SBI) with slice-ID as one of the labels.
Architecture
The REST endpoint performs the slice validation based on the requests from the client using HTTP2. The REST endpoint interacts with the Policy Engine to retrieve the policy status and the slice information over gRPC. Slice information associated with the PDU session can be bound to CRD to generate the slice-specific policies.
Figure 37: Network Slice Architecture

How it Works
This section describes how this feature works.

Call Flows

This section describes the key call flows for this feature.

Slice Validation and Slice-Specific Policy Generation Call Flow
This section describes the Slice Validation and Slice-Specific Policy Generation call flow.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 212

Network Slicing

Configuring the Network Slicing Feature

Figure 38: Slice Validation and Slice-Specific Policy Generation Call Flow

Table 94: Slice Validation and Slice-Specific Policy Generation Call Flow Description

Step Description

1

The Client sends a request to validate the slice information to the REST endpoint.

2

The REST endpoint validates the slice information.

3

If the slice validation is successful, the REST endpoint sends a policy request to Policy Engine.

4

Policy Engine processes the request with the Session.setSliceInfo() message.

5

Policy Engine sends the Create Session request with the slice information to the Session Datastore.

6

If the slice validation is unsuccessful, the REST endpoint sends the Reject (403 Forbidden) message

to the Client.

Configuring the Network Slicing Feature
Configuring this feature involves the following steps:
Configuring the Reject Requests Capability
This section describes how to enable the capability to reject requests from a slice that PCF does not support. To enable PCF to reject requests, use the following configuration: config
advance-tuning slicing access-control [ enabled | disabled ] end

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 213

Configuring the Custom Error Codes

Network Slicing

NOTES: · slicing access-control [ enabled | disabled ]--Enable or disable PCF to reject the requests from the unsupported slices with the HTTP error code.
Configuring the Custom Error Codes
This section describes how to configure the error codes for the requests that PCF rejects. To configure the custom error codes, use the following configuration: config
advance-tuning slice-access-control rejection-status-code error_code end NOTES: · advance-tuning slice-access-control rejection-status-code error_code--Specify the error code that must be displayed when PCF rejects a request. It must be an integer in the range of 100-599.
· If the error code is not configured, the default error code is 403.
Configuring the Allowed NSSAIs
This section describes how to configure the allowed NSSAIs in the PCF Registration Profile. To configure allowed-NSSAIs, use the following configuration: config
service-registration profile allowed-nssais snssai_name sst sst_value [ sd sd_value ] services afService allowed-nssais snssai_name sst sst_value [ sd sd_value ] smfService allowed-nssais snssai_name sst sst_value [ sd sd_value ] end
NOTES: · allowed-nssais snssai_name sst sst_value [ sd sd_value ]--Configures the SNSSAI. The snssai_name name is a logical identifier that is local to PCF. This name is not used in the PCF NFProfile when registering with NRF. To configure multiple slices per service, configure SNSSAI with same SST and different SD values. The allowed-nssais configured for smfService takes precedence over the allowed-nssais value configured at the profile-level.
Note Ensure to configure the allowed-nssais at the profile-level.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 214

Network Slicing

Network Slicing OA&M Support

Configuration changes to the allowed-nssai of services do not affect the PDU sessions that are created before the configuration is modified.

Configuration Example
The following is an example configuration.
service-registration profile snssais embb-1 sst 1
exit service-registration profile snssais embb-2 sst 1
sd 0000a1 exit service-registration profile allowed-nssais name embb-1
sst 1 exit service-registration profile allowed-nssais name embb-2
sst 1 sd 0000a1 exit service-registration services smfService allowed-nssais name embb-2 sst 1
sd 0000a1 exit exit

Network Slicing OA&M Support
This section describes operations, administration, and maintenance information for this feature.

Statistics

This section provides the counter that gets generated for the network slicing scenarios.
· inbound_request_slice_rejected: Captures the requests initiated for specific slices and the requests rejected for the slices that PCF does not support. The inbound_request_slice_rejected counter monitors requests that contain the slice information (Npcf_SMPolicyControl_Create).

Note The inbound_request_slice_rejected does not determine the traffic on the slice.
The inbound_request_slice_rejected counter supports the following labels: · interface_name--Indicates the name of the Service Based Interface (SBI) such as N7. · service_name--Indicates the name of the service such as npcf-smpolicycontrol. · operation_name--Indicates the name of the service operation such as Npcf_SMPolicyControl_Create. · command--Indicates the command type such as Create. · slice--Indicates the S-NSSAI that corresponds to the slice such as 1:0000ab.
· incoming_request_slice_total--The incoming_request_slice_total includes all create, update, and delete actions and indicates the total number of incoming requests per slice on the N7 and N5 interfaces.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 215

Statistics

Network Slicing

The incoming_request_slice_total counter supports the following labels: · interface_name--Indicates the name of the Service Based Interface (SBI) such as N5, N7, nNRF, and N28. · service_name--Indicates the name of the service such as nchf-spendinglimitcontrol. · result--Success and Error. Indicates that the request is success or error. · slice--Indicates the allowed-nssais that corresponds to the slice such as 1:0000ab.
· outgoing_request_slice_total--The outgoing_request_slice_total includes all subscribe and unsubscribe/notify operations and indicates the total volume of outgoing requests per slice on N28/N7 interfaces.
The outgoing_request_slice_total counter supports the following labels: · interface_name--Indicates the name of the Service Based Interface (SBI) such as N5, N7, nNRF, and N28. · service_name--Indicates the name of the service such as nchf-spendinglimitcontrol. · result--Success and Error. Indicates that the request is success or error. · slice--Indicates the allowed-nssais that corresponds to the slice such as 1:0000ab.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 216

3 0 C H A P T E R

NRF Registration Enhancement

· Feature Summary and Revision History, on page 217 · Feature Description, on page 217 · How It Works, on page 218 · Feature Configuration, on page 218
Feature Summary and Revision History

Summary Data
Table 95: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation
Revision History
Table 96: Revision History
Revision Details First introduced.

PCF SMI Disabled ­ Configuration required to Enable Not Applicable
Release 2023.01.0

Feature Description
If the PCF is unable to register with the configured NRFs and encounters IO exceptions, then the PCF changes the leadership control to the next Rest-ep.
The other Rest-ep takes up the leadership control and starts sending the subscription, registration, and heartbeat requests to the configured NRFs.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 217

How It Works

NRF Registration Enhancement

This improvement reduces the problems that arise during NRF registration when the leader-ep is unavailable because of a network failure.
How It Works
This section describes how this feature works.
Feature Configuration
To configure this feature, use the following configuration:
Configuring the Rest-ep Stop Leading on Failure Count
To configure the stop leading on failure count for the NRF, use the following configuration: config
rest-endpoint interface nnrf stop-leading-on-failure-count end Notes:
· config --Enters the configuration mode. · rest-endpoint interface nnrf stop-leading-on-failure-count --Specifies the stop leading on failure
count for the rest-ep. For example, the specific default value is zero and the minimum value for this count is 100. If the count exceeds this value and the rest-ep is unable to register with any of the present NRFs, change the rest-ep leadership.
Configuring the Rest-ep Restart on Leader Change Count
To configure the restart restep on leadership change count for the NRF, use the following configuration: config
rest-endpoint interface nnrf restart-restep-on-leader-change-count end Notes:
· config --Enters the configuration mode. · rest-endpoint interface nnrf restart-restep-on-leader-change-count --Specifies to restart the restep
on leader change count. For example, the specific default value is zero. If the leadership count exceeds this value, the rest-ep gets restarted.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 218

3 1 C H A P T E R

NRF Interface

· Feature Summary and Revision History, on page 219 · Feature Description, on page 220 · How it Works, on page 221 · Configuring the PCF Profile, on page 222 · Configuring the NRF Endpoint for Management Services, on page 224 · Configuring the NRF Endpoint for Discovery Service, on page 227
Feature Summary and Revision History

Summary Data
Table 97: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Default Setting Related Documentation

PCF SMI Disabled ­ Configuration required to enable Not Applicable

Revision History

Table 98: Revision History

Revision Details

Release

Enhancement introduced. Configuration updated for N5 interface service.

2022.01.0

Enhancement introduced.

2022.01.0

PCF supports dual stack (IPv4 and IPv6) connectivity on all NRF external interfaces/endpoints.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 219

Feature Description

NRF Interface

Revision Details

Release

Enhancement introduced.

2021.04.0

PCF supports IPv6 connectivity on all NRF external interfaces/endpoints.

Enhancement introduced. Added new PCF attributes - priority and capacity

2020.02.0

Enhancement introduced. Introduced instructions on how to register an NF profile with NRF.

2020.01.0

First introduced.

Pre 2020.01.0

Feature Description
The NRF provides a fabric for all the NFs to register their profile and the supported services which facilitate in discovering each other. The registration enables the NFs to discover the other NFs based on the NF Type, Instance ID, and other conditions. In a broader view, this enables the NFs to exchange information that is required to carry out the diversified service requirements outlined for each NF.
PCF supports both IPv4 and IPv6 connectivity on its external endpoints (inbound and outbound).
With compliance to the 3GPP December 2018 29.510v15.2.0 specification, NF is equipped to use the NRF management and discovery services. These services allow you to invoke the following service operations:
NRF Management Services (nnrf-nfm)
· PCF uses the NFRegister service to register its profile and other parameters with the NRF. The registration process involves of PCF registering the npcf-am-policy-control and npcf-smpolicycontrol services with the NRF along with the list of services that the PCF instances expose.

Note PCF endpoint registers with the NRF only if there is a reachable pcf-engine. Registration is complete when the heartbeat between the endpoint and engine is successful. If the heartbeat fails, the deregistration process is initiated.
· PCF uses the NFDeregister service to deregister its NF profile and the services that it has registered in the NRF. The NFDeregister service is initiated during a graceful endpoint shutdown.
· PCF applies the NFStatusSubscribe service to subscribe to the notifications when the NF_REGISTERED, NF_DEREGISTERED, and NF_PROFILE_CHANGED events occur on the individual NF instance. The instance is associated with the registered service, such as nchf-spendinglimitcontrol (CHF) and nudr-dr (UDR).
· The NFStatusNotify service enables the NRF to notify the subscribed PCF when the status of the individual NF instance change.
· PCF uses the NFStatusUnsubscribe service to unsubscribe to the notifications that are invoked when the status of an NF instance changes.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 220

NRF Interface

How it Works

· PCF that is registered in NRF periodically contacts the NRF by sending a heartbeat. PCF attempts the contact by invoking the NFUpdate service operation to indicate that it is still operative.
· PCF monitors the NF profile (NFProfile) by periodically polling the NFProfile configuration to determine the modified parameters. If it detects a modified parameter, then PCF informs NRF about the update by sending a PATCH request containing the details of the modified parameter.
· When the PCF's registration status changes from REGISTERED to UNDISOCVERABLE or conversely in the NFStatus, PCF sends a PATCH request to NRF for the new status.
NRF Discovery Service (nnrf-disc)
· PCF uses the discovery service to discover the CHF and UDR NFs that support the nchf-spendinglimitcontrol and nudr-dr services.
How it Works
This section describes how this feature works.
At the startup, PCF registers its profile with the NRF endpoint of the highest priority. After the registration is complete, it periodically sends a heartbeat to the NRF along with its profile.
When PCF requires a service of another NF, it checks for the profile of that service in the cache. If PCF detects the NFProfile (profile), then it uses the information to consume the service. If the NFProfile is not found in the cache, PCF uses the configured NRF endpoints to discover the NF to which the service belongs. The information that is fetched by the discovery service is stored in the cache and reused until the validity period is met. If PCF does not find the NRF endpoint for discovery or receives an invalid response, it falls back on the local configuration looking for the required service.
After discovering the service from the NRF endpoint, PCF subscribes to the NRF for changes that happen in the NF profile. In response, a notification URI is called back for the event notification.
PCF updates the cache when NRF notifies it about the changes such as registration, deregistration, and modifications that happen in the NFPofile.
PCF periodically polls the NFProfile to determine the updated NF parameters. If it detects a modified parameter, PCF updates the configuration that is running. If PCF is registered to an NRF, then it sends a PATCH request to that NRF containing the details of the modified parameter in the payload. For example, [{"op":"replace","path":"/capacity","value":33}].
If PCF determines that it is not registered (or deregistered) to an NRF, then it does not start the NRF Update Request.
The endpoint selection of the NF and NRF endpoints for registration and discovery is based on the probabilistic load-balancing algorithm (IETF RFC 2782) that uses priority and capacity parameters. In addition, for the discovery service, the locality of the NF is used in the algorithm as:
1. The first set of NFs is from the preferred locality which are sorted based on the locality for priority or capacity in the profile and endpoint.
2. The second set of NFs is from the geo-server locality which are sorted among the locality for priority or capacity in the profile and endpoint.
3. The third set of NFs is from the discovered NFs. These NFs are not part of the first and second set.
4. The fourth set contains the locally configured NFs.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 221

Standards Compliance

NRF Interface

Note Before PCF is shut down, it unregisters its profile and unsubscribes to the events that it has subscribed to.
Standards Compliance
This feature complies with the following standards specifications: · 3GPP TS 29.510 version 15.0.0 (2018-06) "Network Function Repository Services" · 3GPP TS 29.510 version 15.2.0 (2018-12) "Network Function Repository Services" · 3GPP TS 29.510 CR#124 "Network Function Repository Services" · 3GPP TS 29.571 version 15.2.0 "Common Data Types for Service Based Interfaces"
Configuring the PCF Profile
This section describes how to configure the PCF profile with NRF. PCF registration involves associating the PCF profile with the NRF and registering the services such as npcf-am-policy-control and npcf-smpolicycontrol with the NRF. If you do not register any service, then the smfService is registered as the default service. A PCF instance is discoverable by other NFs only after the PCF profile successfully registers with NRF. The PCF invokes the NFRegister service to complete the profile registration with the NRF.
Note Each NF Profile has a mapped Instance ID which the other NFs use to determine the profile.
To configure a PCF profile, use the following configuration in the Policy Ops Center console: config
service-registration profile allowed-plmns [ mcc mnc ] mcc mcc mnc mnc capacity pcf_capacity instance-id instance_id locality locality_string pcf-info dnn-list dnn_list_name supi-ranges [ supi-range-id ] supi-range-id supi_range_id start start_integer end end_integer pattern regular_expression plmn-list [ mcc mnc ] mcc mcc
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 222

NRF Interface

Configuring the PCF Profile

mnc mnc priority pcf_priority snssais [ sst sd ]
sst sst sd sd services [afService | smfService] allowed-nssais [ sst sd ]
sst sst sd sd allowed-plmns [ mcc mnc ] mcc mcc mnc mnc api-version [ 1.0.0 | 1.0.2 ] end
NOTES:
· service-registration--Enters the service registration configuration mode.
· profile --Enter the profile configuration mode.
· allowed-plmns [ mcc mnc ]--Specify the PLMN code which is identified by a globally unique. The PLMN consists of Mobile Country Code (MCC) and Mobile Network Code (MNC). Typically, it is a 5 ­ 6 integers that identify a country, and a mobile network operator in that country represented in the form 001-01 or 001-001.
· mcc mcc--Specify the MCC value. Comprises of 3 integers.
· mnc mnc--Specify the MNC value. Comprises of 2­3 integers.
· capacity pcf_capacity--Specify the PCF profile's capacity. pcf_capacity must be an integer in the range is 0-65535.
· instance-id instance_id--Specify the service registration ID of the profile instance.
· locality locality--Specify the location of the NF instance such as geographic location and data center.
· pcf-info--Configures the PCF information such as Data Network Name and SUPI information.
· dnn-list dnn_list_name--Specify the Data Network Name (DNN) list name.
· supi-ranges supi_range--Specify the ranges of SUPIs, which the AUSF instance serves. If you do not specify a SUPI range, the AUSF instance determines a SUPI to serve.
· supi-range-id supi_range_id--Specify the SUPI range identifier.
· start start--Specify the initial value of a SUPI range. This value permits integers such as IMSI range.
· end end--Specify the last value of the SUPI range. This value permits integers such as IMSI range.
· pattern pattern--Specify a regular expression according to the ECMA-262 dialect that represents the set of SUPIs belonging to the specified range.
· plmn-list [ mcc mnc ] --Configures the PLMN code of the network function. Specifies the PLMN code which is a unique code. The PLMN consists of MCC and MNC. Typically, it is a 5­6 integers that identify a country, and a mobile network operator in that country represented in the form 001-01 or 001-001.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 223

Defining the PCF Registration Status

NRF Interface

· priority pcf_priority--Specify the PCF profile's priority order. pcf_priority must be an integer in the range is 0-65535.
· snssais [ sst sd ]--Configures the S-NSSAIs of the network function.
· sst sst--Specify the Slice or Service Type to signify the expected Network Slice behaviour in terms of features and services. The acceptable range is 0­255.
· sd sd--Specify complements one or more Slice or Service Types to allow differentiation among multiple Network Slices of the same Slice or Service Type. Specifies the Slice Differentiator in a hexadecimal representation.
· services --Enters the services configuration mode.
· allowed-nssais [ sst sd ]--The Serving PLMN provides the NSSAI during the registration procedure. The NSSAI consists of the S-NSSAI values, which the UE uses in the serving PLMN for the current registration.
· api-version api_version--Specify the API version of the services that are deployed. The default version is 1.0.0.
Defining the PCF Registration Status
This section describes how to configure the PCF's registration status. The registration status of PCF reflects its capability to transact with NRF and other NFs. The PCF instance that is registered with an NRF periodically contacts that NRF by invoking the NFUpdate service operation to indicate that it is operative. You can now define the registration status as UNDISCOVERABLE. The UNDISCOVERABLE status is typically assigned when you want to perform preventive maintenance, or operations and maintenance activities. During this period, PCF would be in a dormant state, which means all the operations involving the PCF instance are suspended. The feature to modify the registration status is compliant with 3GPP TS 29.510 CR 124. To configure the registration state as UNDISCOVERABLE, use the following configuration in the Policy Ops Center console: config
service-registration profile nf-status [ REGISTERED | UNDISCOVERABLE ] end NOTES: · service-registration profile nf-status [ REGISTERED | UNDISCOVERABLE ] --Configures the
network function's registration status. The default NFStatus is REGISTERED.
Configuring the NRF Endpoint for Management Services
This section describes the configurations that you must perform to enable the NRF's management services. 1. Configuring the NRF Endpoint Group

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 224

NRF Interface

Configuring the NRF Endpoint Group

2. Configuring the Management Service
Configuring the NRF Endpoint Group
This section describes how to configure the NRF Groups.
To configure the nnrf-nfm service for enabling the management service, use the following configuration in the Policy Ops Center console:
config group nrf mgmt [ name ] name nrf_group_name service type service_type nrf [ nrf-service-name ] nrf-service-name nrf_service_name endpoint-profile [ name ] name endpoint_profile_name capacity endpoint_capacity priority endpoint_priority api-uri-prefix uri_prefix api-root api uri-scheme uri_scheme version uri-version [ name ] name version_name full-version full_version endpoint-profile [name] name endpoint_name priority endpoint_priority capacity endpoint_capacity primary ip-address ipv4 ipv4_address ipv6ipv6_address fqdn fqdn port port_number secondary ip-address ipv4 ipv4_address ipv6 ipv6_address fqdn fqdn port port_number tertiary ip-address ipv4 ipv4_address ipv6 ipv6_address fqdn fqdn port port_number end
· group--Enters the group configuration mode.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 225

Configuring the Management Service

NRF Interface

· nrf--Enters the NRF configuration mode.
· mgmt [ name ] --Enters the management configuration mode.
· name nrf_group_name--Specify the name of the nrf group.
· service--Enters the service configuration mode.
· type service_type--Specify the configured NF service types. The service types vary depending on the configured service. The PCF service supports the nnrf-nfm service.
· nrf-service-name nrf_service_name--Specify the NRF service name.
· endpoint-profile [ name ]--Enters the endpoint profile configuration mode.
· name endpoint_profile_name--Specify the name of the endpoint profile.
· api-uri-prefix uri_prefix--Specify the apiName. If not configured, it takes the standard API name for the service as per the specification.
· api-root api--Specify the deployment-specific service API prefix that is used within the apiRoot.
· uri-scheme uri_scheme--Specify the URI scheme as HTTP or HTTPs.
· uri-version--Specify the api/Version and the version number. The full version format is <Major-version>.<Minor-version>.<patch-version>.[alpha-<draftnumber>].
· endpoint-name--Specify the endpoint name and priority for the service to select the appropriate profile using the load-balancing logic. The priority must be an integer in the range of 0-65535. Capacity denotes the node capacity for the endpoint. It must be an integer in the range of 0-65535.
· primary ip-address--Specify the IP address, FQDN, and Port for the primary endpoint.
· secondary ip-address--Specify the IP address, FQDN, and port number for the secondary endpoint.
· tertiary ip-address --Specify the IP address, FQDN, and port number for the tertiary endpoint.
NOTES:
Configuring the Management Service
This section describes how to enable the management service for the NRF. To configure the NRF Management service, PCF locality, and associating them to the NRF Endpoint, use the following configuration in the Policy Ops Center console: config
group nf-mgmt [ name ]
name nf_management_group_name nrf-mgmt-group -> /group/nrf/mgmt/name locality locality failover
sla reconnect interval interval end

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 226

NRF Interface

Configuring the NRF Endpoint for Discovery Service

NOTES: · group--Enters the group configuration mode.
· nf-mgmt [ name ]--Specify the management group that is associated to a network function.
· locality locality--Specify the NF locality.
· failover--Enters the failover configuration mode.
· sla--Enters the sla configuration mode.
· reconnect--Enters the reconnect configuration mode.
· interval interval--Specify the time interval after which NF must attempt a reconnect operation.
Configuring the NRF Endpoint for Discovery Service
This section describes the configurations that you must perform to enable NRF's discovery services. 1. Configuring the NRF Endpoint Group
2. Configuring the Discovery Service
3. Configuring the Local NF Endpoint
Configuring the NRF Endpoint Group
This section describes how to configure the NRF endpoint groups for the discovery of different NFs using the discovery (nnrf-disc) service. To enable discovery of the NRF groups, use the following configuration in the Policy Ops Center console: config
profile nrf discovery [ name ] name discovery_group_name service
type service_type nrf [ nrf-service-name ] nrf-service-name nrf_service_name endpoint-profile [ name ] name endpoint_profile_name capacity endpoint_capacity priority endpoint_priority api-uri-prefix uri_prefix_string api-root api uri-scheme uri_scheme version
uri-version [ name ] name version_name full-version full_version

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 227

Configuring the NRF Endpoint Group

NRF Interface

endpoint-name name endpoint_name priority endpoint_priority capacity endpoint_capacity
primary ip-address ipv4 ipv4_address ipv6 ipv6_address fqdn fqdn port port_number
secondary ip-address ipv4 ipv4_address ipv6 ipv6_address fqdn fqdn port port_number
tertiary ip-address ipv4 ipv4_address ipv6 ipv6_address fqdn fqdn port port_number end
NOTES:
· profile--Enters the profile configuration mode.
· nrf--Enters the nrf configuration mode.
· discovery [ name ]--Enters the discovery [ name ] configuration mode.
· name discovery_group_name--Specify the name of the discovery group. Discovery group is the logical link to the NRF endpoint groups (nrf-group). For each NF type, you can associate a discovery group and the locality information.
· type service_type--Specify the configured NF service types. The service types vary depending on the configured service. The PCF service supports the nnrf-disc service.
· nrf-service-name nrf_service_name--Specify the NRF service name.
· endpoint-name --Specify the endpoint's name and priority for the service to select the appropriate profile using the load-balancing logic. The priority must be an integer in the range of 0-65535. Capacity denotes the node capacity for the endpoint. It must be an integer in the range of 0-65535.
· api-uri-prefix uri_prefix_string--Specify the {apiName}. If not configured, it takes the standard API name for the service as per the specification.
· api-root api--Specify the deployment-specific service API prefix that is used within the apiRoot.
· uri-scheme uri_scheme--Specify the URI scheme as HTTP or HTTPs.
· uri-version { name version_name | full-version full_version}--Specify the api/Version and the version number. The full version format is <Major-version>.<Minor-version>.<patch-version>.[alpha-<draftnumber>].
· primary ip-address--Specify the IP address, FQDN, and port number for the primary endpoint.
· secondary ip-address--Specify the IP address, FQDN, and port number for the secondary endpoint.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 228

NRF Interface

Configuring the Discovery Service

· tertiary ip-address--Specify the IP address, FQDN, and port number for the tertiary endpoint.
Configuring the Discovery Service
This section describes how to enable the discovery service for the NRF.
To configure the NRF Discovery and PCF locality and associating them to the NRF Endpoint, use the following configuration in the Policy Ops Center console:
config profile nf-pair nf-type [ type ] type nf_type nrf-discovery-group -> /group/nrf/discovery/name subscription-enabled subscription_status subscription-extension extension_value locality client -> /service-registration/profile/locality preferred-server server_name geo-server geo_server end
NOTES:
· type nf_type--Specify one or more NF types such as AMF, CHF, PCF, and UDM as the network element profile.
· subscription-enabled subscription_status--Specify if PCF is enabled to subscribe to notifications related to the discovered service.
· subscription-extension extension_value--Specify the duration (in minutes) for which the subscription is extended.
· preferred-server server_name--Specify the preferred server locality information. Preferred server locality is the locality that is considered as the locality of preference during the corresponding NF discovery.
· geo-server geo_server--Specify the geo-server locality information. Geo-server locality is a geo redundant site for the preferred locality and is used as the next suitable server locality after preferred locality, during NF discovery.
Configuring the Local NF Endpoint
This section describes how to configure the local NF endpoint.
The PCF becomes aware of the various NFs in the 5G fabric through the NF discovery service that is exposed by the NRF or through the CLI configuration. If the NRF is unavailable, then PCF relies on the local configuration of the NF endpoints to discover the NFs.
To configure the local configuration for the NF services that PCF uses, use the following configuration in the Policy Ops Center console:

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 229

Configuring the Local NF Endpoint
config profile nf-client nf-type udr udr-profile [ name ] name udr_profile_name locality name udr_locality_name priority priority sevice name service_name type [ type ] type service_type endpoint-profile [ name ] name endpoint_profile_name capacity endpoint_capacity priority endpoint_priority api-uri-prefix uri_prefix_string api-root api uri-scheme uri_scheme version uri-version [ name ] name version_name full-version full_version endpoint-profile [ name ] name endpoint_name priority endpoint_priority capacity endpoint_capacity primary ip-address ipv4 ipv4_address ipv6 ipv6_address port port_number secondary ip-address ipv4 ipv4_address ipv6 ipv6_address port port_number tertiary ip-address ipv4 ipv4_address ipv6 ipv6_address port port_number chf-profile [ name ] name chf_profile_name locality [ name ] name locality_name priority priority service name service_name type [ type ] type service_type endpoint-profile [ name ]
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 230

NRF Interface

NRF Interface

Configuring the Local NF Endpoint

endpoint-profile [ name ] name endpoint_profile_name capacity endpoint_capacity priority endpoint_priority api-uri-prefix uri_prefix_string api-root api uri-scheme uri_scheme version uri-version [ name ] name version_name full-version full_version
endpoint-profile [ name ] name endpoint_name priority endpoint_priority capacity endpoint_capacity
primary ip-address ipv4 ipv4_address ipv6 ipv6_address port port_number
secondary ip-address ipv4 ipv4_address ipv6 ipv6_address port port_number
tertiary ip-address ipv4 ipv4_address ipv6 ipv6_address port port_number end
NOTES:
· udr-profile [ name ]--Enter the UDR profile configuration mode.
· name udr_profile_name--Specify the name of the UDR profile.
· type service_type--Specify the configured NF service types. The service types vary depending on the configured service.
· nrf-service-name nrf_service_name--Specify the NRF service name.
· api-uri-prefix uri_prefix_string--Specify the apiName. If not configured, it takes the standard API name for the service as per the specification.
· api--Specify the deployment-specific service API prefix that is used within the apiRoot.
· uri_scheme--Specify the URI scheme as HTTP or HTTPs.
· uri-version--Specify the API/version and the version number. The full version format is <Major-version>.<Minor-version>.<patch-version>.[alpha-<draftnumber>].
· endpoint-name--Specify the endpoint name and priority for the service to select the appropriate profile using the load-balancing logic. The priority must be an integer in the range of 0-65535. Capacity denotes the node capacity for the endpoint. It must be an integer in the range of 0-65535.
· primary ip-address--Specify the IP address, FQDN, and port number for the primary endpoint.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 231

Configuring the Local NF Endpoint

NRF Interface

· secondary ip-address--Specify the IP address, FQDN, and port number for the secondary endpoint. · tertiary ip-address--Specify the IP address, FQDN, and port number for the tertiary endpoint.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 232

3 2 C H A P T E R

NRF Enhancements

· Feature Summary and Revision History, on page 233 · Feature Description, on page 233 · How it Works, on page 234 · Feature Configuration, on page 234
Feature Summary and Revision History

Summary Data
Table 99: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled Not Applicable

Revision History
Table 100: Revision History
Revision Details First introduced.

Release 2022.04.0

Feature Description
The Network Repository Function (NRF) subscription, registration, and KPI enhancements that included with this feature are as follows:

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 233

How it Works

NRF Enhancements

· The Cisco PCF sends an NRF Registration Request to the primary, secondary, or tertiary node NRF for each interval rather than sending the request only to the primary node. If there is failure, PCF sends the subscription request to the same node for a particular count. If the primary NRF is not operational, PCF sends subscription requests only to the registered primary NRF.
· The outgoing request total of an existing NRF subscription supports the separate primary, secondary, and tertiary KPIs for each peer and route.
· PCF includes the location Uniform Resource Indentifier (URI) as a part of the NRF Hypertext Transfer Protocol (HTTP) response header. If PCF does not receive a response, PCF attempts to register on every reconnect interval.
· NRF sets the HTTP maximum frame size as 16 MB in HTTP settings, which internally causes high global catalog intervals. At the time of initializing HTTP2 Jetty Transport, PCF REST EP sets the maximum frame size.
How it Works
This section describes how this feature works.
Feature Configuration
To configure this feature, use the following configuration:
Subscribe to Registered NRF
config rest-endpoint interface nnrf subscribe-registered-nrf enabled|disabled
end NOTES:
· rest-endpoint interface nnrf subscribe-registered-nrf enabled | disabled --If the configuration is enabled, PCF subscribes to the primary, secondary, or tertiary NRF currently registered with PCF. If disabled, PCF considers the primary NRF for the subscription.
Configuring NRF HTTP Max Frame Size
config rest-endpoint interface nnrf http-settings-max-frame-size-in-bytes end
NOTES: · rest-endpoint interface nnrf http-settings-max-frame-size-in-bytes--PCF sets the maximum and minimum frame sizes to 16777215 and 16,384 bytes, respectively.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 234

3 3 C H A P T E R

N28 Interface

· Feature Summary and Revision History, on page 235 · Feature Description, on page 235 · How it Works, on page 236 · Configuration Support for the N28 Interface, on page 242 · Configuring NF or Logical Groups, on page 244 · OAM Support, on page 244
Feature Summary and Revision History

Summary Data
Table 101: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation
Revision History
Table 102: Revision History
Revision Details First introduced.

PCF SMI Enabled ­ Always-on Not Applicable
Release 2020.01.0

Feature Description
The N28 interface supports the key charging and quota handling scenarios.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 235

How it Works Figure 39: N28 Interface

N28 Interface

PCF performs the following capabilities through the N28 interface: · Retrieving or subscribing to policy counter information from Charging Function (CHF) over N28 for use in policy decisions over N7 only. This includes subscription to specific counters or all. · Support for receiving notifications for policy counter information changes from CHF and using the information for policy decisions. · Support for using the retrieved counters in policy decisions through Virtual Services (VS). · This includes subscription to specific counters or all Support for Service Based Architecture (SBA) interface toward CHF. Currently, it supports: · Initial Subscribe toward CHF on N7 session creation (if enabled). · Notify from CHF. · Unsubscribe toward CHF on N7 session termination.
Note Intermediate Subscribe and CHF driven termination is currently not supported. · NRF discovery of CHF: · PCF also supports the local configuration for CHF endpoints. · If CHF endpoints are configured locally, the configured endpoints are used, and discovery may be skipped. · Currently discovery is only supported by NFType and does not support any criteria. · Endpoints caching - Locally cache and reuse of the discovered CHF endpoints for sending N28 messages. · Random Load Balancing for cached Endpoints.
How it Works
This section describes how this feature works.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 236

N28 Interface

Call Flows

The Nchf_SpendingLimitControl service enables the NF service consumer to retrieve policy counter status information per UE from the CHF by subscribing to spending limit reporting (that is notifications of policy counter status changes).
If the spending limit reporting is no more required, the Nchf_SpendingLimitControl service enables the NF service consumer to unsubscribe from the reporting.
On receiving an N7 Create a Session request, if the N28 lookup or counter subscription is configured, PCF Engine triggers a session creation and subscription toward CHF. PCF then retrieves the counter information from the CHF response and generates virtual services for each counter which are used for making policy decisions.
If the errors or timeouts policy decisions continue without N28 counter information or policy (N7 response is success but excludes N28 based policy), then the N7 session and N28 session terminate.
The interface or model details for the N28 interface are provided in 3GPP TS29.594.

Call Flows

This section describes the key call flows for this feature.

Counter Subscription/Retrieval (N28 Session Creation)
This section describes the Counter Subscription/Retrieval (N28 Session Creation) call flow.
The decision to subscribe to N28 counters is determined based on the presence of the SpendingLimitRequest service configuration. If this service configuration is present in the policy, then the Policy Engine triggers the N28 session creation.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 237

Counter Subscription/Retrieval (N28 Session Creation) Figure 40: N28 Subscribe (N7 Create) Call Flow

N28 Interface

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 238

N28 Interface

Counter Subscription/Retrieval (N28 Session Creation)

Note

· Counter retrieval:

· Generating the list of counters to subscribe is based on the SpendingLimitSubscription and RequestPolicyCounters service configuration: SpendingLimitSubscription also includes a list of counters to subscribe to. The RequestPolicyCounters service also satisfies the same role (providing a list of counters to subscribe to) and is expected to be used in cases where counters can come from different sources. For example, specific counters per LDAP attribute.

· Policy Engine sends the subscribe request to PCF REST EP. The REST EP in turn attempts to lookup a CHF (based either on local configuration or via NRF discovery).

· If no endpoint is available, error response is generated towards the engine.

· If local endpoint is available, the REST EP invokes the Nchf_SpendingLimitControl_Subscribe operation towards the CHF.

· If no response/error response is received, an error response is generated towards the engine for further action.

· On success response, the counter information is forwarded to engine for further action.

· If discovery is performed and endpoint is available, the REST EP invokes the Nchf_SpendingLimitControl_Subscribe operation towards the CHF which is handled as mentioned above.
· The discovered CHF EP is also cached locally (in a TTL cache) so that it can be used for subsequent N28 operations.
· For subsequent operations, the one of the locally cached EPs is randomly selected (that matches the selection criteria). Currently, only the NFType is supported as selected criteria.
· The cached NFs are expired from local cache based on the ValidityPeriod provided by NRF in discovery response. Any subsequent operation that requires the EP will then result in a fresh discovery.
· The discovered NF profile caching is generic and currently applicable for both CHF and UDR.

Table 103: N28 Subscribe (N7 Create) Call Flow Description
Step Description 1 The SMF sends a N7 Create request to the PCF. 2 Based on the routing configuration, PCF configures the lookup or caches the CHF. 3 If CHF is not found locally, then the PCF sends a Discover CH request to NRF. 4 The NRF responds with the CHF profiles with the PCF. 5 The PCF sends a N28 Subscribe request to the CHF.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 239

Unsubscribe Counters (N28 Session Termination)

N28 Interface

Step Description 6 The CHF responds with the N28 Subscribe result to the PCF. 7 The PCF performs the policy calculation. 8 The PCF sends the N7 Create response after calculating the policy to the SMF.
Unsubscribe Counters (N28 Session Termination)
This section describes the Unsubscribe Counters (N28 Session Termination) call flow. On receiving an N7 terminate request, PCF triggers an N28 Nchf_SpendingLimitControl_Unsubscribe request towards CHF for unsubscribing for changes in N28 counter information.
Figure 41: N28 Unsubscribe (N7 terminate) Call Flow

Table 104: N28 Unsubscribe (N7 terminate) Call Flow Description

Step Description

1

The SMF sends a N7 Delete request to the PCF.

2

The PCF sends a Delete Session request to the CDL.

3

The PCF sends a N28 Unsubcribe request to the CHF.

4

The PCF forwards the N7 Terminate Success message to SMF.

5

If the unsubscribe request is successful, then the CHF sends the N28 Unsubscribe response to the

CHF.

N28 Counter-Based Policy
Similar to existing Diameter Sy implementation, the counters retrieved from CHF are made available for policy decisions via Virtual Services (VS).
A Virtual Service (VS) is created per policy counter with counter ID and status as AVPs. This allows the binding of the counters to CRD tables for VS evaluation.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 240

N28 Interface

N28 Virtual Service Details

N28 Virtual Service Details The N28 Virtual Service details are as follows: · VS Name: Name will be of the format: CounterId-CounterStatus · VS AVPs: Following AVPs will be added to the VS: · Code: counter-id, Value: the counter ID value · Code: counter-status, Value: the counter status
Notification of Counter Changes from CHF
This section describes the Notification of Counter Changes from CHF call flow. In case of changes in the subscribed policy counters, the CHF notifies PCF using the Nchf_SpendingLimitControl_Notify operation. The PCF supports this operation through the PCF REST endpoint. On receiving the notification, the REST EP performs a datastore lookup to determine the route and then forward the notification message to the selected engine group. On the PCF Engine, the existing session is updated with the new counter information and policy is recalculated (using the new VS) and applicable decisions are pushed on the N7 interface towards SMF via N7 Notify operation.
Figure 42: N28 Notify

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 241

Configuration Support for the N28 Interface

N28 Interface

Table 105: N28 Notify Call Flow Description
Step Description
1 If the N7 and N28 sessions are available, then CHF sends a N28 Notify request to the PCF.
2 After the N28 session is updated with the new information, the policy is recalculated and the updated session is saved in the CDL.
3 The PCF sends a N7 Update Notification message to the SMF.
4 The SMF sends response for the N7 Update Notification message to the PCF.
5 The PCF sends a N28 Notification Success response to the CHF.
Configuration Support for the N28 Interface
This section describes how to configure support for the N28 interface using the following services. · SpendingLimitSubscription · RequestPolicyCounters · AvpServiceConfiguration
SpendingLimitSubscription
If SpendingLimitSubscription is configured in a policy, then the N28 session creation or subscription is triggered on session create. Only one instance of this configuration is allowed or else any random instance is picked. The configuration includes subscriber identifiers (Subscriber SUPI and GPSI) and a list of Counter Ids to subscribe. The counters can be directly configured or can be pulled from other sources with the "Pull Value from..." configuration. Before setting the service parameters, ensure that you create a use case template and add a service for this configuration. For details, see Configuring the Use Case Template, on page 349 and Adding a Service, on page 348.
RequestPolicyCounters
This section describes the parameters for the RequestPolicyCounters configuration. Use this configuration to add counters in the subscription list while generating the N28 Subscribe request. Multiple instances of this configuration can exist. The application collects all instances and includes counters from all in the final CounterIds list (to subscribe). Before setting the service parameters, ensure that you create a use case template and add a service for this configuration. For details, see Configuring the Use Case Template, on page 349 and Adding a Service, on page 348. The following table describes the RequestPolicyCounters service parameters.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 242

N28 Interface

AvpServiceConfiguration

Table 106: RequestPolicyCounters Configuration Parameters

Parameters Priority Policy Counter Group Policy Counter Id

Description
The priority of the message for processing. The higher the number, the higher the priority.
Represents a logical name for the counter set included in the service configuration. The field pulls value from the OfferGroup column.
Specifies the policy counter identifier name.

AvpServiceConfiguration
This section describes the parameters for the AvpServiceConfiguration configuration. Before setting the service parameters, ensure that you create a use case template and add a service for this configuration. For details, see Configuring the Use Case Template, on page 349 and Adding a Service, on page 348. The following table describes the AvpServiceConfiguration service parameters.
Table 107: AvpServiceConfiguration Configuration Parameters

Parameters Priority Group Name
Code Value

Description
The priority of the message for processing. The higher the number, the higher the priority.
Specifies a group name. Only 1 per "Group Name" is allowed to be active. If multiple configurations are added highest priority per "Group Name" is used.
Specifies a code for the AVP.
Specifies a value for the AVP.

Troubleshooting
Perform the following when the message routing fails: · Ensure that the SpendingLimitRequest service configuration is available and enabled in the subscribed service list in Policy Builder.
· If the CHF is configured locally, ensure that the URL is specified in the correct format. For CHFs that are not configured locally, make sure to enable the NF discovery.
· If discovery is enabled, ensure that the NRF URL is configured locally and is valid.
· Enable the DEBUG level for com.cisco.pcf.endpoint.routing and review the pcf-rest-ep logs for any issues.
· Review the data store pod health and the logs for information about the issues.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 243

Configuring NF or Logical Groups

N28 Interface

Configuring NF or Logical Groups
This section describes how to configure the NF locally or logical groups of the NFs.
To configure the NF or logical groups of the NFs, use following configuration in the Policy Ops Center console:
config network-function logical_group_name nf-info nf_type service-version version_in_uri http-endpoint list_of_base_urls end
NOTES:
· network-function logical_group_name --Specify the name for a logical group of NFs
· nf-info nf_type --Specify the type of NF that is configured. Currently, only NRF, CHF, and UDR are supported.
· service-version version_in_uri --Specify the version field in the resource URI for accessing the NF services.
· http-endpoint list_of_base_urls --Specify the base-urls that are used to consume services that are provided by the configured NF.

OAM Support
This section describes operations, administration, and maintenance support for this feature.

Statistics

This section provides the list of statistics and counters that are generated for the charging and quota handling scenarios. The following metrics track the counter information:
· async_svc_runnable_total: Captures the total count of the async service runnable count.
· async_svc_runnable_total_seconds: Captures the total duration (in seconds) to process the async service runnable count.
For information on statistics, see Ultra Cloud Core 5G Policy Control Function Statistics Reference.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 244

3 4 C H A P T E R

Online Charging Enablement over N7 to SMF

· Feature Summary and Revision History, on page 245 · Feature Description, on page 245 · How it Works, on page 246 · Configuration Support for Online Charging, on page 252
Feature Summary and Revision History

Summary Data
Table 108: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation
Revision History
Table 109: Revision History
Revision Details First introduced.

PCF SMI Disabled ­ Configuration required to enable Not Applicable
Release 2020.01.0

Feature Description
PCF supports converged online and offline charging. As part of this support, PCF sends the CHF address to the SMF over the N7 interface. This allows the SMF to connect to the specified CHF for converged online and offline charging. In addition, PCF sends charging-specific attributes (charging decision attributes) in the PCC rules to SMF over the N7 interface.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 245

How it Works

Online Charging Enablement over N7 to SMF

How it Works
This section describes how this feature works.
The ability to send CHF addresses in "ChargingInformation" in SM policy create response is added to PCF. In the subsequent SM policy updates, the same address is sent to the SMF. Similarly, the ability to send charging decision attributes in the PCC rules is available in PCF.
The charging information includes primary and secondary CHF addresses. The charging decisions include the following attributes- chgId, meteringMethod, offline, online, ratingGroup, reportingLevel, serviceId, sponsorId, appSvcProvId, and afChargingIdentifier.

Note The charging decisions are supported only for a table-driven PCC and dynamic PCC rules.

Charging Information
· After the SM create control request is received, the PCF reads the charging information service configuration and adds the charging information in the PCF session (if it is not already added).
· PCF uses the charging information in the PCF session and sends the ChargingInformation field in "ChgDecs" in response.

Charging Data
· After the SM create control request is received, PCF retrieves the PCC rules using "TableDrivenDynamicPccRule" or "DynamicPccRule" service configurations.
· The PCC retrieves "ChgIds" (it can either be single chgid value or multiple based on comma separated values) from the "TableDrivenDynamicPccRule" and "ChgID" "from the DynamicPccRule" service configurations.
· PCF queries the Charging Data CRD table and retrieves the list of charging data to be sent, after the charging ids are found and "TableDrivenChargingDecisions" is configured.
· PCF creates response by adding all charging data under "ChgDecs" and also adds the reference in PCC rules by specifying the "refChgData" array.

Call Flows

This section describes the key call flows for this feature.

Online and Offline Charging over N7 to SMF
This section describes the Online and Offline Charging over N7 to SMF call flow.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 246

Online Charging Enablement over N7 to SMF Figure 43: Charging over N7 Call Flow

Creating SM Policy

Creating SM Policy
This section describes the Creating SM Policy call flow.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 247

Creating SM Policy Figure 44: Create SM Policy Call Flow

Online Charging Enablement over N7 to SMF

Table 110: Create SM Policy Call Flow Description

Step Description

1

The SMF sends a N7 Create request to the PCF.

2

The PCF sends a Load Session request to the CDL.

3

The CDL sends a Session Record request to the PCF.

4

If the charging information is configured in the service, then PCF populates the PCF session with

primary and secondary CHF address.

5

The PCF adds the charging information in the response object.

6

If the table-driven charging decision is configured in the service, then PCF queries the CRD to

retrieve the list of charging decisions.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 248

Online Charging Enablement over N7 to SMF

Updating SM Policy

Step Description

7

The PCF compares the results with the PCF session and identifies the differences.

8

The PCF adds charging decisions in the response object.

9

The PCF sends a Create Session request to the CDL.

10

In response, the CDL sends an acknowledgment to the PCF.

11

The PCF sends an N7 Create response to the SMF.

Updating SM Policy
This section describes the Updating SM Policy call flow.
Figure 45: Update SM Policy Call Flow

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 249

Updating Notify SM Policy

Online Charging Enablement over N7 to SMF

Table 111: Update SM Policy Call Flow Description

Step

Description

1

The SMF sends an N7 Update request to the PCF.

2

The PCF sends a load session by SessionID to the CDL.

3

In response, the CDL sends the Session Record to the PCF.

4

The PCF resolves the service configuration.

5

If the charging information is not available in the PCF session, then PCF populates the session

with the primary and secondary CHF address.

6

If the charging information is configured in the service, then PCF adds the charging information

object in the response object.

7

If the table driven charging decision is configured in the service, then PCF queries CRD to retrieve

the list of charging decision.

8

The PCF compares the result with the PCF session and identifies the delta information.

9

The PCF adds the charging decision in the response object.

10

The PCF sends the Update Session request to the CDL.

11

The CDL acknowledges the update request by sending an acknowledgment to the PCF.

12

The PCF sends an N7 Update response to the SMF.

Updating Notify SM Policy
This section describes the Updating Notify SM Policy call flow.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 250

Online Charging Enablement over N7 to SMF Figure 46: Update Notify SM Policy Call Flow

Updating Notify SM Policy

Table 112: Update Notify SM Policy Call Flow Description

Step Description

1

The CDL sends a next evaluation timer request to the PCF.

2

The PCF sends the Session Record in response to the CDL.

3

The PCF resolves the service configuration.

4

If the charging information is not available in the PCF session, PCF populates the PCF session

with primary and secondary CHF address in the charging information.

5

If the charging information is configured in the service, PCF adds the charging information in

the response object.

6

If the table driven charging decision is configured in the service, PCF queries the CRD to retrieve

the list pf charging decisions.

7

The PCF compares the results with the PCF session to identify the delta.

8

The PCF adds the charging decisions in the response object.

9

The PCF sends the Update Session request to the CDL.

10

In response, the CDL sends an acknowledgment to the PCF.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 251

Configuration Support for Online Charging

Online Charging Enablement over N7 to SMF

Step Description

11

The PCF sends a N7 Notify request to the SMF.

12

The SMF sends a N7 Notify response to the PCF.

Configuration Support for Online Charging
The configuration of online charging enablement over N7 to SMF involves the following steps: 1. ChargingInformation 2. TableDrivenChargingDecision
ChargingInformation
This section describes how to configure the ChargingInformation service. 1. Log in to Policy Builder and navigate to Services tab > Use Case Templates. 2. Under Actions > Create Child, click Use Case Template, and add ChargingInformation in Service
Configuration. 3. Navigate to Services > Service Option (for that use case template). 4. Attach the service option to the service.
TableDrivenChargingDecision
This section describes how to configure the TableDrivenChargingDecision service. 1. Log in to Policy Builder and navigate to Custom Reference Data Table, and create a search table group
for the charging decision table. 2. Navigate to Services > Use Case Templates. 3. Under Actions > Create Child, click Use Case Template, and add TableDrivenChargingDecision in
Service Configuration. 4. Navigate to Services > Service Option (for that use case template). 5. Attach the Service Option to the service. 6. Map the source field to Custom Reference Data (CRD) table created in Step 1.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 252

3 5 C H A P T E R

PCF Integration with Access and Mobility Function

· Feature Summary and Revision History, on page 253 · Feature Description, on page 254 · How it Works, on page 254 · Configuration Support for the N15 Access and Mobility Policies, on page 260 · Configuring the Stale Session Timer, on page 263
Feature Summary and Revision History

Summary Data
Table 113: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Default Setting Related Documentation

AMF CN-CEE Enabled ­ Configuration required to disable Not Applicable

Revision History
Table 114: Revision History
Revision Details Enhancement introduced. Added information on how to remove the stale sessions. Enhancement introduced. Introduced procedure to configure the N15 Access and Mobility Policies.

Release 2020.05.01
2020.02.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 253

Feature Description

PCF Integration with Access and Mobility Function

Revision Details First introduced.

Release 2020.01.0

Feature Description
PCF integrates with AMF through the Access and Mobility Policy Control Service by transmitting the access control and mobility management-related policies to the AMF. With this integration, PCF, and AMF interact and exchange information through the following procedures:
· The PCF creates and updates the policies, and deletes the policy association depending on the request that it receives from AMF during the UE registration.
· The PCF notifies the AMF when a policy that AMF has subscribed to is updated. Similarly, AMF is also notified when a policy context is deleted for a UE.
· Depending on the event triggers that PCF has subscribed to, AMF takes the appropriate actions such as update the location procedure when the Service Area Restriction change triggers occur. The Service Area Restriction change is triggered only when a location change happens or the UE is changed in the Presence Reporting Area (PRA).
· During the PCF-AMF communication, if the PCF accumulates session information that is stale which means AMF has a more recent version of the session, or the session in PCF is no longer valid, then PCF purges the stale sessions.
In a reference point representation, a point-to-point reference point defines the interactions between the NFs. The PCF communicates with AMF over N15, and with SMF over N7.
Figure 47: Interfaces in a Non-Roaming 5G System Architecture

Th PCF-AMF framework is compliant with the definitions of 3GPP TS 23.502 [3], 3GPP TS 23.503 [4], and 3GPP TS 29.507.

How it Works
This section describes how this feature works. This section provides a summary of how the PCF and AMF work.

Call Flows

This section describes the key call flows for this feature.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 254

PCF Integration with Access and Mobility Function
Create Policy Association
This section describes the Create Policy Association call flow.
Figure 48: Create Policy Association Call Flow

Create Policy Association

Table 115: Create Policy Association Call Flow Description

Step Description

1

The User Equipment (UE) sends a UE Registration request to AMF.

2

The AMF forwards the UE Registration request in the form of a Npcf_ AMPolicyControl_Create

request to the PCF.

3

If the registration is successful, then PCF responds to AMF with a header and policy ID details.

4

In case of registration failure, PCF responds to AMF with an error indicating that the request was

not completed and the issue that caused the failure.

Update Policy Association
This section describes the Update Policy Association call flow.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 255

Delete Policy Association Figure 49: Update a Policy Association Call Flow

PCF Integration with Access and Mobility Function

Table 116: Update a Policy Association Call Flow Description

Step Description

1

When AMF is relocated and the new AMF instance prefers to maintain the policy association, the

AMF sends the Npcf_ AMPolicyControl_Update request to PCF.

2

The PCF registers and subscribes to the triggers for the service area restriction changes and responds

to AMF with the trigger details.

3

In case of registration failure, PCF responds to AMF with an error indicating that the request is not

completed and details of the issue that caused the failure.

Delete Policy Association
This section describes the Delete Policy Association call flow.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 256

PCF Integration with Access and Mobility Function Figure 50: Delete Policy Association Call Flow

Terminate Policy Association

Table 117: Delete Policy Association Call Flow Description

Step Description

1

In a situation where a policy association must be deleted, the UE sends a Deregistration request to

AMF.

2

The AMF sends a Npcf_AMPolicyControl_Delete request to PCF.

3

On successful deletion, PCF sends a response to AMF with the confirmation.

4

In case the deletion was unsuccessful, PCF responds to AMF with an error indicating the deletion

failure and the appropriate cause.

Terminate Policy Association
This section describes the Terminate Policy Association call flow.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 257

Terminate Policy Association Figure 51: Terminate Policy Association Call Flow

PCF Integration with Access and Mobility Function

Table 118: Terminate Policy Association Call Flow Description

Step Description

1

When PCF terminates the policy association, it initiates a terminate notification by sending the Npcf_

AMPolicyControl_UpdateNotify request to AMF.

2

The AMF responds to PCF with the confirmation indicating that Npcf_AMPolicyControl_Delete

is initiated. Depending on the termination notification, AMF removes the policy association and

initiates delete request.

3

In case the update policy enforcement was unsuccessful, the AMF redirects the subsequent notification

to the new AMF.

4

In case of 404 error, AMF responds to PCF stating that it must search for a new URI using the IPv4

or IPv6 address, or refrain from sending notifications to the original AMF.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 258

PCF Integration with Access and Mobility Function
Update Notification Call Flow
This section describes the Update Notification call flow.
Figure 52: Update Notification Call Flow

Update Notification Call Flow

Table 119: Update Notification Call Flow Description

Step Description

1

When PCF must change the policy, it initiates an update notification by sending the Npcf_

AMPolicyControl_UpdateNotify request to AMF.

2

The AMF responds to PCF with the confirmation indicating that update policy is enforced.

3

In case the update policy enforcement was unsuccessful, the AMF redirects the subsequent notification

to the new AMF.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 259

Standards Compliance

PCF Integration with Access and Mobility Function

Step Description

4

In case of 404 error, AMF responds to PCF stating that it must search for a new URI using the IPv4

or IPv6 address, or refrain from sends notifications to the original AMF.

Standards Compliance
This feature complies with the following standards specifications: · 3GPP TS 29.510 Release 15.2.0 December 2018 "Network Function Repository Services" · 3GPP TS 29.571 [11] "Common Data Types for Service Based Interfaces"

Limitations

This feature has the following limitations in this release: · The PCF does not support PRA_CH trigger and related use cases.

Configuration Support for the N15 Access and Mobility Policies
This section describes how to configure the N15 access and mobility policies using the following services: 1. Configure the N15 interface using the information documented at Configuring the REST Endpoints, on
page 183. 2. Configuring the N15 Policy Service
· Configuring the N15 Policy Retrievers · Configuring the N15 Policy Triggers

Configuring the N15 Policy Service
This section describes the parameters for the N15 policy configuration.
The N15 policy service configuration object is used to configure the Service Area Restriction capability. The configuration involves mapping the N15 policy attributes and the Service Area Restriction CRD table that derives data from the bilateral exchange of requests between AMF and PCF. A one-to-many relation is supported between this service configuration object and the associated CRD table.
Before configuring the N15 policy service, ensure that you have created the use case template and added the required service.
For information on how to create a use case template and add a service for this configuration, see Configuring the Use Case Template, on page 349 and Adding a Service, on page 348.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 260

PCF Integration with Access and Mobility Function

Configuring the N15 Policy Service

Table 120: N15 Policy Parameters

Parameters

Description

Priority

Indicates the priority of the message for processing. The higher the number, the higher the priority. Default for most settings: 0

RAT Frequency Selection Priority Indicates the "rfsp" attributes that PCF receives in the request.
The Radio Access Network (RAN) uses this parameter to derive the UE-specific cell reselection priorities to control the idle mode camping, and to decide on redirecting the active mode UEs to different frequency layers or RATs.

UE Policy

The UE policy consists of the UE Access Network discovery and selection policies.

Area Code

The area code is required only when the TAC information is unavailable. This code is operator-specific.

Tac Value

TACs are required only when the area code is unavailable.
Indicates a tracking area code that has a hexadecimal representation. Each character in the string shall take a value of "0" to "9" or "A" to "F" and represents 4 bits. The most significant character representing the 4 most significant bits of the TAC shall appear first in the string, and the character representing the 4 least significant bit of the TAC appears last in the string.
Examples:
A legacy TAC 0x4305 is encoded as "4305".
An extended TAC 0x63F84B is encoded as "63F84B"

Restriction Type

Provides the options to configure the type of restriction attribute that you want to configure:
· ALLOWED_AREAS: Indicates the area where the restriction can be applied.
· NOT_ALLOWED_AREAS: Indicates the area where the restriction cannot be applied.
· NO_RESTRICTION: Indicates the areas that do not have any restriction applied.

Max Num Of T As

Denotes the maximum number of allowed tracking areas for use when the restriction is set to "ALLOWED_AREAS".

This attribute is unavailable when the Restriction Type takes the value as "NOT_ALLOWED_AREAS".

Note

The Max Num Of T As value cannot be lower than the

number of TAIs included in the "tacs" attribute.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 261

Configuring the N15 Policy Triggers

PCF Integration with Access and Mobility Function

Parameters
Max Num Of T As For Not Allowed Areas

Description
Denotes the maximum number of allowed tracking areas for use when Restriction Type is set to "NOT_ALLOWED_AREAS".
This attribute is unavailable when the Restriction Type takes the value as "ALLOWED_AREAS".

Configuring the N15 Policy Triggers

This section describes how to configure the N15 policy event triggers.
You can configure the event triggers through the Custom Reference Data (CRD) table. The triggers are a group of conditions used to evaluate a table. PCF subscribes to the configured triggers from the AMF. When the configured triggers are violated, AMF notifies PCF and sends the trigger information.
To configure the N15 policy event triggers, use the following configuration:
1. Log in to Policy Builder.

2. Click the Reference Data tab.

3. In the left pane, choose Custom Reference Data Tables > Custom Reference Data Triggers.

4. Select the service for which you want to create the trigger.

5. In the right pane, enter the following trigger parameter:

Parameter

Description

Priority

Indicates the priority of the event triggers that must be used in case multiple service initiator conditions match.

Trigger

Specifies the trigger against which the N15 policy object is evaluated.
You can configure the following triggers:
· LOC_CH: Location change. This trigger is issued when the tracking area of the UE is changed.

· RFSP_CH: Change in the RAT Frequency Selection Priority. The UDM notifies the AMF when the subscribed RFSP index is changed.

· SERV_AREA_CH: Change in the Service Area Restrictions. The UDM notifies the AMF when the subscribed service area restriction information has modified.

Configuring the N15 Policy Retrievers
This section describes how to configure the retrievers for the N15 policy configuration object. You can add the retrievers through the CRD table or Service Configuration. For information on how to add the retrievers through CRD, see Configuring Retrievers through Custom Reference Data Table, on page 384.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 262

PCF Integration with Access and Mobility Function

Configuring the Stale Session Timer

For information on how to add the retrievers through Service Configuration pane, see Configuring Retrievers through Service Configuration, on page 385. You can configure the following parameters under N15 policy retrievers:
· N15 Access Type · N15 AMF Id · N15 AreaCode · N15 Cell Global Identifier · N15 GPSI · N15 GroupID · N15 MaxNumOfTAs · N15 MaxNumOfTAsForNotAllowedAreas · N15 MCC (SUPI Based) · N15 MNC (SUPI Based) · N15 Permanent Equipment Identifier · N15 RAT Type · N15 Restriction Type · N15 Serving Plmn · N15 ServiveName · N15 SliceInformation · N15 SUPI · N15 Tracking Area Identifier
Configuring the Stale Session Timer
This section describes how to configure the stale session timer. Stale session builds up due to events such as network and timeout issues. As a result, PCF starts rejecting new sessions due to capacity or session license limit. The stale session timer configuration lets you set a timer after which PCF revalidates the stale sessions by sending a N7Notify request. If the N7Notify request gets an error response with code 404, then the session is deleted. To configure the stale session timer for N7 and N15, use the following configuration: 1. Log in into Policy Builder. 2. Select Reference Data tab. 3. From the left pane, select Systems. 4. Select and expand your system name.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 263

Removing Stale Sessions

PCF Integration with Access and Mobility Function

5. Select PCF Configuration. 6. In the right pane, configure the following parameters depending on the interface:

Parameter

Description

N7 Stale Session Timer in Minutes

The stale session maps to a session that is not available on the peer.

The configured timeout value determines the duration for which a N7 session can remain idle before PCF revalidates it using the N7Notify request. If the response returned for the request contains an error code 404, then the session gets deleted.

Default value is 180 minutes.

Note

The stale session timer value should be less than the session

expiration time. For information on how to configure the

session expiration hours/minutes, see Adding a System, on

page 70.

N15 Stale Session Timer in Minutes

The stale session maps to a session that is not available on the peer.

The configured timeout value determines the duration for which a N15 session can remain idle before PCF revalidates it using the N7Notify request. If the response returned for the request contains an error code 404, then the session gets deleted.

Default value is 180 minutes.

Note

The stale session timer value should be less than the session

expiration time. For information on how to configure the

session expiration hours/minutes, see Adding a System, on

page 70.

Preferred Bit Rate

Defines the value of the bitrate that is sent in the N7 policies. The bitrate is automatically converted as per the configured preferred bitrate.

Removing Stale Sessions
This section describes how to remove stale sessions for an SMF instance.
When the SMF issuing the sessions is unavailable, the sessions become stale after a period of inactivity. These sessions expire based on the duration that you defined in the Stale Session Timer configuration. In the case of a large number of sessions, the system takes longer to delete the session.

Important We recommend removing the stale sessions only when SMF is unavailable. If SMF is active and has active sessions on PCF, then executing the cdl clear sessions command may remove the active sessions.
To delete the sessions in bulk, use the following command: cdl clear sessions filter { key smfInstanceIdKey:SMF_instance_ip_address condition match }

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 264

PCF Integration with Access and Mobility Function

Removing Stale Sessions

NOTES:
· The cdl clear sessions command performs a hard delete of the sessions without generating termination request for the child sessions such as Rx and N28 sessions.
· SMF_instance_ip_address--Specify the instance ID of SMF, which is derived from the notification URL sent by the SMF.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 265

Removing Stale Sessions

PCF Integration with Access and Mobility Function

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 266

3 6 C H A P T E R

Charging Function Selection Based on NSSAI

· Feature Summary Revision History, on page 267 · Feature Description, on page 268 · How it Works, on page 268 · Call Flows, on page 268 · Standards Compliance , on page 269 · Feature Configuration , on page 269 · OAM Support, on page 270
Feature Summary Revision History

Summary Data
Table 121: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation
Revision History
Table 122: Revision History
Revision Details Enhancement introduced. PCF - CHF selection based on NSSAI. First introduced.

PCF SMI Enabled ­ Configuration required to disable Not Applicable
Release 2022.03.0
2022.03.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 267

Feature Description

Charging Function Selection Based on NSSAI

Feature Description
The Cisco PCF supports the Charging Function (CHF) selection with the availability of slice ID in the N7/N5 session. The PCF identifies and specifies the slice information for Protocol buffers messages that are meant for CHF, and the REST endpoint maintains a map for CHF with the slice-id among the keys. PCF configures slice information through a slice-id counter in the Policy Engine and REST endpoint to select the CHF.
How it Works
This section describes how this feature works.
Call Flows
This section describes the key call flow for this feature.
CHF Selection with Slice Information Call Flow
This section describes the CHF Selection with Slice Information call flow.
Figure 53: CHF Selection with Slice Information Call Flow

Table 123: CHF Selection with Slice Information Call Flow Description
Step Description 1 The PCF-REST-EP sends a Discover NF and CHF to the NRF. 2 The PCF-REST-EP performs the updating of the NF map with slice ID as part of the key. 3 The PCF-REST-EP adds the update of the NF map with a slice for locally configured CFH. 4 After Engine Processing generates the CHF request, the PCF-POLICY-ENGINE sends Read slice
information to the PCF-SESSION-DATASTORE.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 268

Charging Function Selection Based on NSSAI

Standards Compliance

Step Description 5 The PCF-POLICY-ENGINE performs an update CHF message with slice information if available. 6 The PCF-POLICY-ENGINE sends the CHF message to the PCF-REST-EP. 7 The PCF-REST-EP performs Include slice in CHF selection. 8 The PCF-REST-EP sends Subscribe or Unsubscribe to the CHF.
Standards Compliance
This feature complies with the following standards specifications: · 3GPP 29.510 "Network function repository services" · 3GPP 29.512 "Session Management Policy Control Service" · 3GPP 29.513 "Policy and Charging Control signaling flows and QoS parameter mapping"
Feature Configuration
To configure this feature, use the following configuration:
Configuring to Enable or Disable Slice Based CHF Selection
This section describes how to configure the slice-based CHF selection commands. To configure the slice-based CHF selection, use the following configuration: config
advance-tuning slice-based-nf-selection chf [enabled | disabled] end NOTES: · advance-tuning slice-based-nf-selection chf [enabled | disabled] error_codes--Enable or disable CHF with slice information. The configuration displays CHF as an option, the scope is limited to CHF, and the CHF option is disabled.
Configuring SNSSAIS of a Locally Configured CHF Client Profile
This section describes how to configure the CHF client profile. To configure the snssais of a locally configured CHF client profile, use the following configuration: config
profile nf-client nf-type

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 269

OAM Support

Charging Function Selection Based on NSSAI

chf chf-profile [name] endpoint-profile [name] allowed-nssais slice value sst sst_value [sd sd_value] end
NOTES:
· chf-profile [name] ­ Configures the locality for the CHF profile.
· endpoint-profile [name] ­ Configures the endpoint name.
· allowed-nssais slice value sst sst_value [sd sd_value] ­ Configures the SNSSAI. The snssai_name is a logical identifier that is local to PCF. To configure multiple slices per service, configure SNSSAI with an identical SST and different SD values.

OAM Support
This section describes operations, administration, and maintenance support for this feature.

Statistics

This section provides the counter that gets generated for the PCF-CHF selection that based on NSSAI scenarios. · outbound_request_slice_nf_selection--Indicates the outbound requests initiated from PCF for specific slices.
The outbound_request_slice_nf_selection counter supports the following labels: · interface_name--Indicates the name of the Service Based Interface (SBI) such as N28. service_name--Indicates the name of the service such as nchf-spendinglimitcontrol. operation_name--Indicates the name of the service operation such as Nchf_SpendingLimitControl_Subscribe command--Indicates the command type such as Subscribe. slice--Indicates the allowed-nssais that corresponds to the slice such as 1:0000ab
· outbound_request_slice_nf_unavailable--The outbound_request_slice_nf_unavailable counter monitors requests that contain the slice information. Indicates the outbound requests for specific slices, which are rejected from PCF. This counter increments if there is no NF available with the required slice.
The outbound_request_slice_nf_unavailable counter supports the following labels: · interface_name--Indicates the name of the Service Based Interface (SBI) such as N28. service_name--Indicates the name of the service such as nchf-spendinglimitcontrol. operation_name--Indicates the name of the service operation such as Nchf_SpendingLimitControl_Subscribe command--Indicates the command type such as Subscribe. slice--Indicates the allowed-nssais that corresponds to the slice such as 1:0000ab

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 270

3 7 C H A P T E R

RAN and NAS Release Causes

· Feature Summary Revision History, on page 271 · Feature Description, on page 271 · How it Works, on page 272 · Call Flows, on page 272 · Standards Compliance , on page 277
Feature Summary Revision History

Summary Data
Table 124: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled Not Applicable

Revision History
Table 125: Revision History
Revision Details First introduced.

Release 2022.03.0

Feature Description
PCF receives extensive Radio Access Network (RAN) and Network Attached Storage (NAS) release cause code information in the RAN-NAS feature in the access network. Session Management Function (SMF), PCF

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 271

How it Works

RAN and NAS Release Causes

or Application Function (AF) helps to set up calls and sessions between RAN and Network Attached Storage NAS. If a failure occurs in RAN and NAS, it reports the cause to the SMF, SMF sends information to PCF, and PCF sends information to the AF. RAN-NAS feature allows you to:
· Request SMF for Report of RAN and NAS Release Cause · Reporting RAN and NAS Release Causes to AF
· PCC Rule Installation and Modification Failures · Deletion of Application Session with AF · Notify RAN-NAS Cause for Termination of PDU Session · Notify RAN and NAS Release Causes for SDF Deactivation
How it Works
This section describes how this feature works.
Call Flows
This section describes the key call flows for this feature.
Request SMF for Report of RAN and NAS Release Causes Call Flow
This section describes the Request SMF for Report of RAN and NAS Release Causes call flow for this feature. AF enables the RAN-NAS-Cause, creates, and updates a session with the RAN-NAS-Cause feature. PCF requests SMF to report RES_RELEASE for corresponding PCC rules under the following conditions:
· RAN-NAS-Cause feature is enabled for PDU session. · AF subscribes to a FAILED_RESOURCES_ALLOCATION event.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 272

RAN and NAS Release Causes

Reporting RAN-NAS Release Causes to AF Call Flows

Figure 54: Requesting SMF for RAN and NAS Release Causes Call Flow

Table 126: Requesting SMF for RAN and NAS Release Causes Call Flow Description
Step Description 1 The SMF sends a N7 Create PDU session context to the PCF. 2 The PCF sends the N7 Create Response to the SMF. 3 The SMF sends the N7 update PDU session context to the PCF. 4 The PCF sends the N7 update response to the SMF. 5 After Creating the AF Session, the AF sends the N5 update response to the PCF. 6 After Creating AF Session Context, the PCF sends the N7 Create Response to the AF. 7 The PCF sends the N7 Update Notify Request to the SMF. 8 The SMF sends the N7 Update Notify Response to the PCF.
Reporting RAN-NAS Release Causes to AF Call Flows
This section describes the Reporting RAN and NAS Release Causes to AF call flows for this feature.
Note The new attribute epsCause broadens the RAN-NAS Cause data type. This attribute provides the EPS specified RAN/NAS Causes for 3GPP EPS and non-3GPP EPS access types.
PCC Rule Installation and Modification Failures Call Flow
This section describes the PCC Rule Installation and Modification Failures call flow for this feature.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 273

Deletion of Application Session with AF Call Flow

RAN and NAS Release Causes

If SMF fails to install and modify the PCC rules, RAN-NAS-Cause updates PCF that includes rule reports containing references to the affected PCC rules and the failure code of RES_ALLO_FAIL. If the RAN-NAS-Cause feature supports the PDU session, and if SMF received RAN and NAS release causes in the network, it includes the available RAN and NAS release causes and user access information.
Figure 55: PCC Rule Installation and Modification Failures Call Flow

Table 127: PCC Rule Installation and Modification Failures Call Flow Description
Step Description 1 After creation of AF session, the AF sends a N5 Create Request to the PCF. 2 After Create AF Session Context, the PCF sends the N5 Create Response to the AF. 3 The PCF sends the N7 update Notify Request to the SMF. 4 The SMF sends the N7 update Notify Response to the PCF. 5 The SMF sends the N7 update Request to the PCF. 6 The PCF sends the N5 Notify Request to the AF.
Deletion of Application Session with AF Call Flow
This section describes the Deletion of Application Session with AF call flow for this feature. If the RAN-NAS-Cause feature supports the session, AF requests deletion of the application session. The PCF needs SMF to report the RAN-NAS release cause with access information for removing the PCC rules.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 274

RAN and NAS Release Causes

Notify RAN and NAS Release Causes for Termination of PDU Session Call Flow

Figure 56: Deletion of Application Session with AF Call Flow

Table 128: Deletion of Application Session with AF Call Flow Description
Step Description 1 The AF sends a N5 Delete Request to the PCF. 2 After Request removal of PCC rules corresponding to AF Session, the PCF sends the N7 Notify
Request to the SMF. 3 The SMF sends the N7 Update Notify Response to the PCF. 4 After Hold N5 Delete Response, the SMF sends the N7 Update Request to the PCF. 5 The PCF sends the N7 Update Response to the SMF. 6 The PCF sends the N5 Delete Response to the AF.
Notify RAN and NAS Release Causes for Termination of PDU Session Call Flow
This section describes Notify RAN-NAS Cause for Termination of PDU Session call flow. PCF requests AF to terminate all application sessions associated with the PDU session. AF requests for deletion of application session context. PCF deletes the AF session and includes events notification with RAN-NAS release causes along with the user access information and provides the SMF in the delete response.
Figure 57: PCC Rule Installation and Modification Failures Call Flow

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 275

Notify RAN and NAS Release Causes for SDF Deactivation Call Flow

RAN and NAS Release Causes

Table 129: PCC Rule Installation and Modification Failures Call Flow Description
Step Description 1 The SMF sends a N7 Delete Request to the PCF. 2 After Storing RAN and NAS release cause in session, the PCF sends the N7 Delete Response to the
SMF. 3 The PCF sends the N5 Notify Terminate Request to the AF. 4 The AF sends the N5 Notify Response to the PCF. 5 The AF sends the N5 Delete Request to the PCF. 6 The PCF sends the N5 Delete Response to the AF.
Notify RAN and NAS Release Causes for SDF Deactivation Call Flow
This section describes the Notify RAN and NAS Release Causes for SDF Deactivation call flow. The SMF deletes the impacted PCC rules and updates the PCF, which includes rule reports containing identifiers of affected PCC rules, and the failure code RES_ALLO_FAIL. This includes the following conditions:
· RAN initiates deactivation of QoS flow. · SMF removes and deactivates PCC rules without PCF request due to ineffective resource allocation.
Figure 58: PCC Rule Installation and Modification Failures Call Flow

Table 130: PCC Rule Installation and Modification Failures Call Flow Description
Step Description 1 After RAN requests the SMF to remove the PCC rules, the SMF sends a N7 Update Request to the
PCF.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 276

RAN and NAS Release Causes

Standards Compliance

Step Description 2 The PCF sends the N7 Update Response to the SMF. 3 The PCF sends the N5 Notify Request to the AF. 4 After removing some of the PCC rules, the AF sends the N5 Notify Response to the PCF. 5 After removing all PCC rules and storing RAN-NAS release causes in session, the PCF sends the
N5 Notify Terminate Request to the AF. 6 The AF sends the N5 Notify Response to the PCF. 7 The AF sends the N5 Delete Request to the PCF. 8 The PCF sends the N5 Delete Response to the AF.
Standards Compliance
This feature complies with the following standards specifications: · 3GPP 29.513 "Policy and Charging Control signaling flows and QoS parameter mapping" · 3GPP 29.514 version 16.7.0 "Policy Authorization Service (PAS)"

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 277

Standards Compliance

RAN and NAS Release Causes

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 278

3 8 C H A P T E R

Diameter Peer Load Rebalancing

· Feature Summary and Revision History, on page 279 · Feature Description, on page 279 · How it Works, on page 280 · Feature Configuration, on page 280
Feature Summary and Revision History

Summary Data
Table 131: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation
Revision History
Table 132: Revision History
Revision Details First introduced.

PCF SMI Disabled ­ Configuration required to enable Not Applicable
Release 2022.02.0

Feature Description
PCF supports diameter peer load rebalancing.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 279

How it Works

Diameter Peer Load Rebalancing

How it Works
This section describes how this feature works. · CLI is implemented to show the diameter peer connections and its mapping to the individual pods.
· CLI is also used to initiate disconnection of a peer identified by its peer fqdn and realm details. The peer disconnect request is redirected to the respective diameter stack where the connection termination is managed in graceful manner.

Feature Configuration
To configure this feature, use the following configurations: · View the diameter peer connections per pod. · Diameter peer disconnection.

View the Diameter Peer Connections Per Pod

This section describes how to view the diameter peer connections per pod.

To view the diameter peer connections per pod, use the following configuration in the Policy Ops Center console:

show diameter peer-status

The output of this command displays the peer hostname, peer realm, pod IP and the status.

The following is a sample output of the show diameter peer-status command.

pcf# show diameter peer-status

PEER HOSTNAME

PEER REALM

POD IP

STATUS

----------------------------------------------------------------------site-host-rx1 site-rx-client-cisco.com 192.168.174.137 Connected site-host-rx2 site-rx-client-cisco.com 192.168.174.137 Connected

Diameter Peer Disconnection
This section describes how to disconnect the diameter peer connection. To disconnect the diameter peer connection, use the following configuration in the Policy Ops Center console: diameter-peer disconnect fqdn <peer-fqdn> realm <peer-realm> The following is a sample connection success output of the diameter-peer disconnect fqdn site-host-rx1 realm site-rx-client-cisco.com command.
pcf# diameter-peer disconnect fqdn site-host-rx1 realm site-rx-client-cisco.com
The following is a sample connection failure output of the diameter-peer disconnect fqdn site-host-rx1 realm site-rx-client-tmo.com command.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 280

Diameter Peer Load Rebalancing

Diameter Peer Disconnection

pcf# diameter-peer disconnect fqdn ecscf-client-s111 realm cscf.mnc010.mcc100.3gppnetwork.org

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 281

Diameter Peer Disconnection

Diameter Peer Load Rebalancing

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 282

3 9 C H A P T E R

Persistent Storage for Policy Configuration

· Feature Summary and Revision History, on page 283 · Feature Description, on page 284 · How it Works, on page 284 · Configuring Persistent Storage, on page 284 · Configuring the Restore Capability, on page 286
Feature Summary and Revision History

Summary Data
Table 133: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled ­ Configuration required to disable Not Applicable

Revision History

Table 134: Revision History

Revision Details

Release

Enhancement introduced.

2020.03.0

Added the procedure to assign the storage volume as persistent storage.

First introduced.

2020.02.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 283

Feature Description

Persistent Storage for Policy Configuration

Feature Description
Persistent storage is a storage solution that retains the data after the power and network resources are disconnected. The PCF provides various storage technologies for managing the configuration data. The PCF has pre-defined storage such as the OpenStack Cinder volume used for storing the CRD data. PCF optionally stores the CRD data in shared storage such as OpenStack Cinder (default) or local storage. In the case of deployment on bare metal servers, PCF uses the local storage class along with the default storage layer as the persistent storage. For generic information on the Persistent Volume concepts, see the Kubernetes documentation. Restore Capability The Subversion repository stores the policy-specific configuration data in the XMI format. This repository resides in an SVN pod. If the SVN pod is restarted, the repository experiences a data loss. In such scenarios, you must reimport the configuration files to the SVN pod. A new restore mechanism is introduced to protect the configuration data and maintain its integrity when the SVN pod restarts.
How it Works
This section describes how this feature works. The PCF implements the Kubernetes Persistent Volume (PV) framework, which lets the administrators allocate persistent storage for a cluster. Regardless of the storage tier, you can use the Persistent Volume Claims (PVCs) to request PV resources. You must enable persistent volume claim and assign storage that represents local storage. The data residing on the local storage is intact in situations where the associated node or pod restarts. Restore Capability The restore capability maintains the continuity of the policy configuration files in conditions where the SVN pod is restarted. The policy configuration files are in the XMI format. Each SVN repository contains XMI files that are represented in a configMap. The configMap is updated whenever a policy configuration is modified and committed into an SVN repository. When the SVN pod is restarted, it verifies if the configMap is available and the corresponding XMI files are loaded to the repository. The restore capability is managed through the following configMaps:
· Monitor-svn-configmap-pcf: Contains configuration data in key-value pairs that represent the repository name and policy hash.
· Policy-svn-persistence-configmap: Contains the configured value of the policy-configuration-restore configMap.
Configuring Persistent Storage
This section describes how to configure persistent storage.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 284

Persistent Storage for Policy Configuration

Enabling Support for Persistent Storage

Configuring the persistent storage in PCF involves the following steps: 1. Enabling Support for Persistent Storage 2. Assigning Persistent Storage
Enabling Support for Persistent Storage
This section describes how to enable persistent volume claim to configure persistent storage. 1. To enable persistent volume claim, use the following configuration:
config k8s use-volume-claims [ true | false ] end
NOTES: · config--Enters the configuration terminal. · k8s--Enters the Kubernetes configuration mode. · use-volume-claims [ true | false ]--Configures using the volume claims during the NF deployment. When set to true, the default storage class such as OpenStack Cinder is enabled. If the use-volume-claims is set to false, then the data gets stored in the memory that is susceptible to lose on a pod restart.
Assigning Persistent Storage
This section describes how to assign a storage volume as the persistent storage. Before configuring the persistent storage, ensure that use-volume-claims is enabled. 1. To assign persistent storage, use the following configuration:
config db global-settings volume-storage-class [ default | local ] end
NOTES: · config ­ Enters the configuration terminal. · db ­ Enters the database configuration mode. · global-settings ­ Configures the database global settings. · volume-storage-class [ default | local ] ­ Configures the storage that gets assigned as the persistent storage. Specify default to indicate the default storage volume. For example, Cinder. To indicate local-storage volume, specify local. If you do not specify any value, the PCF uses the default storage volume.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 285

Configuring the Restore Capability

Persistent Storage for Policy Configuration

Configuring the Restore Capability
This section describes how to configure the restore capability.
To configure the restore capability that ensures the persistency of policy configuration file, use the following configuration in the Policy Ops Center console:
config engine engine_name pcf policy-configuration-restore [ true | false ] end
NOTES:
· engine engine_name--Specify the engine for which the restore capability must be configured
· pcf policy-configuration-restore [ true | false ]--Configures the capability that is responsible for restoring the configMap. The default value for this parameter is true.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 286

4 0 C H A P T E R

Pods and Services

· Feature Summary and Revision History , on page 287 · Feature Description, on page 287 · Configuration Support for Pods and Services, on page 294
Feature Summary and Revision History

Summary Data
Table 135: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation
Revision History
Table 136: Revision History
Revision Details First introduced.

PCF SMI Enabled ­ Always-on Not Applicable
Release 2020.01.0

Feature Description
The PCF is built on the Kubernetes cluster strategy, which implies that it has adopted the native concepts of containerization, high availability, scalability, modularity, and ease of deployment. To achieve the benefits offered by Kubernetes, PCF uses the construct that includes the components such as pods and services.
Depending on your deployment environment, PCF deploys the pods on the virtual machines that you have configured. Pods operate through the services that are responsible for the intrapod communications. If the

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 287

Feature Description

Pods and Services

machine hosting the pods fail or experiences network disruption, the pods are terminated or deleted. However, this situation is transient and PCF spins new pods to replace the invalid pods.
The following workflow provides a high-level visibility into the host machines, and the associated pods and services. It also represents how the pods interact with each other. The representation might defer based on your deployment infrastructure.
Figure 59: Communication Workflow of Pods

The Protocol VM hosts the rest-ep, diameter-ep, and ldap-ep pod that governs the ingress (incoming) and egress (outgoing) traffic on the interfaces. The pods responsible for the operations and management processes reside in the OAM VM and, the Service VM hosts the pcf-engine. The session VMs hosts the pods that operate as the databases to store the data accessed by the pods. The illustration also depicts the services which the pods use to channel the interactions. The pods communicate over the gRPC interface.
Note Typically, multiple instances of the Protocol and OAM VMs are created to ensure resiliency. Kubernetes deployment includes the kubectl command-line tool to manage the resources in the cluster. You can manage the pods, nodes, and services using the CLI. For performing the maintenance activities, you can use the kubectl drain command to withdraw a node voluntarily. This command prepares the node by evicting or assigning the associated pods to another node with sufficient resources. You can run the kubectl drain on individual or multiple nodes concurrently. For generic information on the Kubernetes concepts, see the Kubernetes documentation. For more information on the Kubernetes components in PCF, see the following. · Pods, on page 289 · Services, on page 291
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 288

Pods and Services Pods

Pods

Pod is a process that runs on your Kubernetes cluster. Pod encapsulates a granular unit known as a container. A pod can contain one or multiple containers.
Kubernetes deploys one or multiple pods on a single node which can be a physical or virtual machine. Each pod has a discrete identity with an internal IP address and port space. However, the containers within a pod can share the storage and network resources.
The following table lists the pod names and the hosts on which they are deployed depending on the labels that you assign. For information on how to assign the labels, see Associating Pods to the Nodes, on page 294.
Table 137: PCF Pods

Pod Name admin-db api-pcf-ops-center cdl-ep-session-c1

Description

Host Name

Acts as the MongoDB router pod for the Admin Session database.

Functions as the confD API pod for the PCF Ops OAM Center.

Provides an interface to the CDL.

Session

Note

Configuration changes to the CDL

endpoint cause the endpoint to restart

automatically. Cisco recommends

making such changes only within the

maintenance window.

cdl-index-session
cdl-slot-session-c1
cps-license-manager crd-api-pcf-pcf-engineapp-pcf-<n>-mjgxp db-admin db-admin-config
db-spr-config
db-spr1

Preserves mapping information of the keys to the Session session pods.

Operates as the CDL Session pod to store the session data.

Session

Acts as the PCF License Manager.

OAM

Hosts the CRD APIs.

Protocol

Acts as the replica set pod for the Admin database. Session
Acts as the replica set pod that stores the Admin Session database configuration.
Operates as the replica set pod that stores the SPR Session database configuration.
Functions as the replica set pod that preserves the Session SPR database.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 289

Pods

Pods and Services

Pod Name diameter-ep-rx-rx
documentation etcd-pcf-etcd-cluster grafana-dashboard-cdl grafana-dashboard-pcf kafka ldap-ep
network-query ops-center-pcf-ops-center patch-server-pcf-cnat-cpsinfrastructure pcf-day0-config-pcf-pcf -engine-<n>-rchg2 pcf-engine-pcf-pcf-engineapp-pcf

Description

Host Name

Contains the Diameter stack details and acts as the Protocol endpoint.

Note

Configuration changes to the diameter

endpoint cause the endpoint to restart

automatically. Cisco recommends

making such changes only within the

maintenance window.

Contains the documentation.

OAM

Hosts the etc-d for the PCF application.

OAM

Contains the Grafana metrics for CDL.

OAM

Contains the Grafana metrics for PCF.

OAM

Hosts the Kafka details for the CDL replication. Protocol

Operates as an LDAP client to establish communication with an external LDAP server.

Protocol

Note

Configuration changes to the LDAP

endpoint cause the endpoint to restart

automatically. Cisco recommends

making such changes only within the

maintenance window.

Operates as the utility pod to determine the route OAM IP for the Diameter outbound messages.

Acts as the PCF Ops Center.

OAM

Operates as the utility pod for patching the PCF OAM JAR files.

Dedicated for performing the Day-0 configuration OAM for PCF.

Operates as the PCF Engine.

Service

Note

Configuration changes to the PCF

Engine endpoint cause the endpoint

to restart automatically. Cisco

recommends making such changes

only within the maintenance window.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 290

Pods and Services

Services

Services

Pod Name pcf-rest-ep

Description

Host Name

Operates as a REST endpoint for PCF.

Protocol

Note

Configuration changes to the REST

endpoint cause the endpoint to restart

automatically. Cisco recommends

making such changes only within the

maintenance window.

policy-builder-pcf-pcf-engine-app Operates as the Policy Builder for PCF.

OAM

redis-keystore

Operates as the REDIS Index.

Protocol

redis-queue

Operates as the REDIS IPC.

Protocol

rs-controller-admin

Responsible for the replication controller for Admin Session database.

rs-controller-admin-config

Operates as a replication controller for the Admin Session database configuration.

rs-controller-spr-config

Operates as a replication controller for SPR database configuration.

Session

rs-controller-spr1

Operates as a replication controller for the SPR Session database.

smart-agent-pcf-ops-center

Operates as the utility pod for the PCF Ops Center. OAM

svn

Stores all the PCF XMI configuration files.

OAM

svn-ldap

Stores the LDAP endpoint configuration which is Protocol configured through the ops-center.

swift-pcf-ops-center

Operates as the utility pod for the PCF Ops Center. OAM

traceid-pcf-pcf-engine

Stores the subscriber tracing details.

OAM

zookeeper

Assigned for the Zookeeper.

OAM

The PCF configuration is composed of several microservices that run on a set of discrete pods. Microservices are deployed during the PCF deployment. PCF uses these services to enable communication between the pods. When interacting with another pod, the service identifies the pod's IP address to start the transaction and acts as an endpoint for the pod.
The following table describes the PCF services and the pod on which they run.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 291

Services

Pods and Services

Table 138: PCF Services and Pods
Service Name admin-db
cps-diameter-inbound-rx-rx-rx
crd-api-pcf-pcf-engine-app-pcf datastore-ep datastore-ep-session datastore-notification-ep
diameter-engine documentation etcd etcd-pcf-etcd-cluster-<n> grafana-dashboard-cdl
grafana-dashboard-pcf helm-api-pcf-ops-center kafka mongo-admin-<n>
mongo-admin-config-<n>
mongo-spr-config-<n>
mongo-spr1-<n> ops-center-pcf-ops-center patch-server-pcf-cnatcps-infrastructure

Pod Name

Description

admin-db-0

Serves to process the MongoDB-specific router messages.

cps-diameter-ep

Transmits the Rx messages to the Diameter endpoint.
You can set an external IP address for the service.

crd-api

Processes the CRD API calls.

datastore-ep

Processes the CDL endpoint calls.

ngn-datastore-ep

Responsible for the CDL session.

pcf-engine

Responsible for sending the notifications from the CDL to the engine.

pcf-engine

Acts as the Diameter endpoint to pcf-engine.

documentation

Processes the documentation API calls.

pcf-etcd-cluster

Processes the etc-d API.

pcf-etcd-cluster

Processes the etc-d stateful sets.

grafana-dashboard-cdl Responsible for managing the Grafana dashboard for inputs from the CDL.

grafana-dashboard-pcf Manages the Grafana dashboard for PCF.

helm-api

Manages the Ops Center API.

kafka

Processes the Kafka messages.

db-admin-0

Responsible for the Admin database stateful sets.

db-admin-config-0

Responsible for the Admin database configuration stateful sets.

db-spr-config-0

Responsible for the SPR database configuration stateful sets.

db-spr1-0

Responsible for the SPR database stateful sets

ops-center

Manages the PCF Ops Center.

patch-server

Maintains the patch repository.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 292

Pods and Services

Ports and Services

Service Name pcf-day0-config-pcf-pcfengine-app-pcf pcf-engine pcf-rest-ep
policy-builder-pcf-pcfengine-app-pcf redis-keystore-<n> redis-queue-<n> rs-admin rs-admin-config
rs-spr-config
rs-spr1 smart-agent-pcf-ops-center svn swift-pcf-ops-center

Pod Name pcf-day0-config

Description Manages the Day-0 configuration.

pcf-engine pcf-rest-ep
policy-builder

Processes the API calls to pcf-engine.
Acts as the http2 request/response to the REST endpoint. You can set an external IP address for the service.
Manages the Policy Builder's request/response messages.

redis-keystore-0

Manages the REDIS keystore stateful set.

redis-queue-0

Processes the REDIS queue stateful set.

replica-set admin

Manages the replica set for Admin database.

replica-set admin-config Manages the replica set for the Admin database configuration.

replica-set spr-conifg Manages the replica set for the SPR configuration.

replica-set sp1

Manages the replica set for the SPR database.

smart-agent-pcf-ops-center Responsible for the Ops Center API.

cps-subversion

Responsible for the SVN API calls.

swift-pcf-ops-center Responsible for the Ops Center API.

Ports and Services
PCF uses different ports for communication purposes. The following table describes the default ports and the associated services.
Table 139: Ports and Services

Port

Service

Usage

22

SSH

SMI uses this port to communicate with the virtual machines.

80

HTTP

SMI uses this port for providing Web access to CLI, Documentation, and TAC.

443

SSL/HTTP SMI uses this port for providing Web access to CLI, Documentation, and

TAC.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 293

Limitations

Pods and Services

Port 2024 3868 6443 8080
9082
9299 9885
10250 10256

Service SSH TCP HTTP HTTP
HTTP
HTTP TCP
SSL/HTTP HTTP

Usage SMI accesses the ConfdD CLI through this port. PCF uses this port as the default Diameter Endpoint on a public port. SMI uses this port to communicate with the Kubernetes API server. PCF uses this port to communicate with the Keep Alive API Interface on a public network. PCF uses this port to access the SBI Interface on a public network. The Keepalive monitors the health of the container on this port. If the port is not accessible, then the kubectl restarts the container to restore the service. SMI uses this port to communicate with the Prometheus Service. Default port that operates as the PCF Service gRPC endpoint on a private network. SMI uses this port to communicate with Kubelet. SMI uses this port to interact with the Kube proxy.

Limitations

This feature has the following limitations in this release:
When removing a node using the kubectl drain command, the pods managing the inbound traffic such as pcf-rest-ep, pcf-ldapserver-ep, and diameter-ep-rx-protocol cannot be assigned to another node. The workload of these pods' cannot be scheduled to another node since the traffic is routed through persistent connections that do not support load balance. As a result, the Grafana dashboard does not display the Transaction Per Second (TPS) for these pods.

Configuration Support for Pods and Services
This section describes how to associate pods to node and view the pod-related information using the following steps: 1. Associating Pods to the Nodes 2. Viewing the Pod Details and Status

Associating Pods to the Nodes
This section describes how to associate a pod to the node based on their labels. After you have configured a cluster, you can associate pods to the nodes through labels. This association enables the pods to get deployed on the appropriate node based on the key-value pair.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 294

Pods and Services

Viewing the Pod Details and Status

Labels are required for the pods to identify the nodes where they must get deployed and to run the services. For example, when you configure the protocol-layer label with the required key-value pair, the pods get deployed on the nodes that match the key-value pair. To associate pods to the nodes through the labels, use the following configuration:
config label cdl-layer key key_value value value oam-layer key key_value value value protocol-layer key key_value value value service-layer key key_value value value end
NOTES: · If you opt not to configure the labels, then PCF assumes the labels with the default key-value pair.
· cdl-layer--Configures the key-value pair parameters for the CDL.
· oam-layer--Configures the key-value pair parameters for the OAM layer.
· protocol-layer--Configures the key-value pair parameters for the protocol layer.
· service-layer--Configures the key-value pair parameters for the service layer.
Viewing the Pod Details and Status
This section describes how to view the pod details. If the service requires additional pods, PCF creates and deploys the pods. You can view the list of pods that are participating in your deployment through the PCF Ops Center. You can run the kubectl command from the master node to manage the Kubernetes resources.
· To view the comprehensive pod details, use the following configuration:
kubectl get pods -n pcf pod_name -o yaml
The pod details are available in YAML format. The output of this command results in the following information:
· The IP address of the host where the pod is deployed.
· The service and application that is running on the pod.
· The ID and name of the container within the pod
· The IP address of the pod

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 295

States
States

Pods and Services

· The current state and phase in which the pod is. · The start time from which pod is in the current state.
· To view the summary of the pod details, use the following configuration: kp -get pods -o wide

Understanding the pod's state lets you determine the current health and prevent the potential risks. The following table describes the pod's states.
Table 140: Pod States

State Running
Pending Succeeded Failed
Unknown

Description
The pod is healthy and deployed on a node. It contains one or more containers.
The application is in the process of creating the container images for the pod.
Indicates that all the containers in the pod are successfully terminated. These pods cannot be restarted.
One ore more containers in the pod have failed the termination process. The failure occurred as the container either exited with non zero status or the system terminated the container.
The state of the pod could not be determined. Typically, this could be observed because the node where the pod resides was not reachable.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 296

4 1 C H A P T E R

Policy Tracing and Execution Analyzer

· Feature Summary and Revision History, on page 297 · Feature Description, on page 297 · How it Works, on page 298 · Configuration Support for the Policy Traces, on page 298
Feature Summary and Revision History

Summary Data
Table 141: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation
Revision History
Table 142: Revision History
Revision Details First introduced.

PCF SMI Enabled ­ Configuration required to disable Not Applicable
Release 2020.01.0

Feature Description
PCF comes with a set of utilities to actively monitor and trace policy execution. These utilities interact with the core Policy Server and the Mongo database to trigger and store traces for specific conditions.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 297

Architecture

Policy Tracing and Execution Analyzer

Architecture
Cisco PCF comes with a trace pod to actively monitor and trace the policy execution. The utilities in this pod interact with the Policy Engine pods and the Mongo database pods to trigger and store traces for specific conditions. The policy tracing and execution analyzer is a three-tier architecture:
· Tier 1--Command-line utilities to manage the policy trace generation and extract policy traces.
· Tier 2--Policy server creation of policy traces using triggers that are defined in Tier 1.
· Tier 3--Storage of the policy traces in a MongoDB.

How it Works
This section describes how this feature works.

Configuration Support for the Policy Traces
This section describes how you configure the policy traces. Configuration support of the policy traces involves the following steps: 1. Setting Up the Trace Database 2. Configuring the Trace Microservice Pod 3. Executing the Tracing Scripts

Setting Up the Trace Database
This section describes how to configure the database and port where you want to store the traces. 1. Log in to Policy Builder. 2. From left pane, select your system and click the appropriate cluster. 3. From right pane, select the check box for Trace Database.
The following table provides the parameter descriptions under Trace Database check box.
Table 143: Trace Database Parameters

Parameter

Description

Primary Database IP Address The name of the Mongo database cluster that holds the trace information which allows debugging of specific sessions and subscribers based on the unique primary keys.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 298

Policy Tracing and Execution Analyzer

Configuring the Trace Microservice Pod

Parameter Secondary Database IP Address
Database Port

Description
The IP address of the database that provides fail over support for the primary database.
This is the mirror of the database that is specified in the Primary IP Address field. Use this only for replication or replica pairs architecture. This field is present but deprecated to maintain the downward compatibility.
Port number of the database that stores the trace data.
Default value is 27017.

Configuring the Trace Microservice Pod

PCF hosts the tracing-specific commands on the trace microservice pod that is available under the /usr/local/bin directory.

To determine the trace pod, use the following configuration:

config kubectl -n pcf namespace [ get pods | grep trace ] end

Sample output of the command:

luser@for-cn-dev-10c-masterb92844ec32:~$ kubectl -n pcf get pods | grep trace

traceid-pcf-pcf-engine-app-pcf-75b6dc6c4-hc7qc

1/1

Running 0

40m

luser@for-cn-dev-10c-masterb92844ec32:~$

Executing the Tracing Scripts
Tracing logs assist you in backtracking the steps that you or the system has performed to accomplish a task. This information is useful when you want to conduct forensics of the unexpected outcomes. PCF provides two scripts that let you obtain the tracing information:
· trace_ids.sh: Manages the rules for activating and deactivating traces within the system. · trace.sh: Allows retrieval of the real-time and historical traces.
The execution of the tracing scripts involves the following steps: 1. Managing the Trace Rules 2. Managing the Trace Results

Managing the Trace Rules
The trace_ids.sh script fetches the real-time and historical traces. This script resides in /usr/local/bin/ of the Tracing Pod that you have configured.
See Configuring the Trace Microservice Pod, on page 299 for procedure to set up a Pod.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 299

Managing the Trace Rules

Policy Tracing and Execution Analyzer

The Execute the trace_ids.sh script with -h arguments produces a help text describing the capabilities of the script. The trace_ids.sh script starts a selective trace and outputs it to a standard out. 1. To specify the audit ID tracing, use the following configuration:
kubectl -n pcf exec -it traceid-pcf-pcf-engine-app-pcf-75b6dc6c4-hc7qc -- trace_ids.sh -i specific id 2. To remove trace for specific audit ID, use the following configuration: kubectl -n pcf exec -it traceid-pcf-pcf-engine-app-pcf-75b6dc6c4-hc7qc
-- trace_ids.sh -r specific id 3. To remove trace for all IDs, use the following configuration:
kubectl -n pcf exec -it traceid-pcf-pcf-engine-app-pcf-75b6dc6c4-hc7qc -- trace_ids.sh -x
4. To list all the IDs under trace, use the following configuration: kubectl -n pcf exec -it traceid-pcf-pcf-engine-app-pcf-75b6dc6c4-hc7qc -- trace_ids.sh -l Adding a specific audit ID for tracing requires running the command with the -i argument and passing in a specific ID. The Policy Server matches the incoming session with the ID provided and compares this against the following network session attributes: · Credential ID · Framed IPv6 Prefix · IMSI · MAC Address · MSISDN · User ID
If an exact match is found, then the transactions are traced.
Note Spaces and special characters are not supported in the audit IDs.
· Removing a specific audit ID from active tracing requires specifying the -r argument with ID to remove.
· Removing all IDs requires sending in the -x argument. This step purges all the IDs from the database. · Listing all IDs requires sending in the -l argument.
Example output: kubectl -n pcf exec -it traceid-pcf-pcf-engine-app-pcf-75b6dc6c4-hc7qc
-- trace_ids.sh

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 300

Policy Tracing and Execution Analyzer

Managing the Trace Results

-s mongo-admin-0 -p 27017 -t admin -d policy_trace -i 2001
Run the trace_ids.sh with -h arguments produces a help text describing the capabilities of the script as follows:
kubectl -n pcf exec -it traceid-pcf-pcf-engine-app-pcf-75b6dc6c4-hc7qc -- trace_ids.sh -h /usr/local/bin/trace_ids.sh: option requires an argument -- h usage: /usr/local/bin/trace_ids.sh -i specific id
/usr/local/bin/trace_ids.sh -r specific id /usr/local/bin/trace_ids.sh -x /usr/local/bin/trace_ids.sh -l /usr/local/bin/trace_ids.sh -s mongo service name /usr/local/bin/trace_ids.sh -p mongo service port /usr/local/bin/trace_ids.sh -t mongo replica set /usr/local/bin/trace_ids.sh -d mongo database name
This script starts a selectve trace and outputs it to standard out. 1. Add Specific Audit Id Tracing /usr/local/bin/trace_ids.sh -i specific id 2. Remove Trace for Specific Audit Id /usr/local/bin/trace_ids.sh -r specific id 3. Remove Trace for All Ids /usr/local/bin/trace_ids.sh -x 4. List All Ids under Trace /usr/local/bin/trace_ids.sh -l 5. K8 mongo service name -s (default: mongo-admin-0) 6. Mongo port -p (default: 27017) 7. Replica set name -t (default: admin) 8. Trace database name -d (default: policy_trace) 9. /usr/local/bin/trace_ids.sh -h displays this help
Managing the Trace Results
The trace.sh script that initiates selective trace process resides in /usr/local/bin/ of the Tracing Pod that you have configured.
See Configuring the Trace Microservice Pod, on page 299 for procedure to set up a pod.
1. To specify the audit ID tracing, use the following configuration:
kubectl -n pcf exec -it traceid-pcf-pcf-engine-app-pcf-75b6dc6c4-hc7qc -- trace.sh -i specific_id
Specifying the -i argument for a specific ID causes a real-time policy trace to be generated while the script is running. You can redirect this to a specific output file using standard Linux commands.
2. To dump all traces for the specific audit ID, use the following configuration:
kubectl -n pcf exec -it traceid-pcf-pcf-engine-app-pcf-75b6dc6c4-hc7qc -- trace.sh -x specific_id
Specifying the -x argument with a specific ID, dumps all historical traces for a given ID. You can redirect this to a specific output file using standard Linux commands.
3. To trace all, use the following configuration:
kubectl -n pcf exec -it traceid-pcf-pcf-engine-app-pcf-75b6dc6c4-hc7qc ­ trace.sh -a
Specifying the -a argument causes all traces to output in the real-time policy trace while the script is running. You can redirect this to a specific output file using standard Linux commands.
4. To trace all the errors, use the following configuration:

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 301

Managing the Trace Results

Policy Tracing and Execution Analyzer

kubectl -n pcf exec -it traceid-pcf-pcf-engine-app-pcf-75b6dc6c4-hc7qc -- trace.sh -e
Specifying the -e argument causes all traces that are triggered by an error to output in real-time policy trace while the script is running. You can redirect this to a specific output file using standard Linux commands.
Example output:
kubectl -n pcf exec -it traceid-pcf-pcf-engine-app-pcf-75b6dc6c4-hc7qc -- trace.sh -s mongo-admin-0
-p 27017 -t admin -d policy_trace -x 1234567890
5. Execute the trace.sh script with -h arguments to produce a help text describing the capabilities of the script as follows:
kubectl -n pcf exec -it traceid-pcf-pcf-engine-app-pcf-75b6dc6c4-hc7qc -- trace.sh -h /usr/local/bin/trace.sh: option requires an argument -- h usage:
/usr/local/bin/trace.sh -i specific_id /usr/local/bin/trace.sh -x specific_id /usr/local/bin/trace.sh -a /usr/local/bin/trace.sh -e /usr/local/bin/trace.sh -s mongo_service_name /usr/local/bin/trace.sh -p mongo_service_port /usr/local/bin/trace.sh -t mongo_replica_set /usr/local/bin/trace.sh -d mongo_database_name /usr/local/bin/trace.sh -h This script starts a selectve trace and outputs it to standard out. 1. Specific Audit Id Tracing /usr/local/bin/trace.sh -i specific_id 2. Dump All Traces for Specific Audit Id /usr/local/bin/trace.sh -x specific_id 3. Trace All /usr/local/bin/trace.sh -a 4. Trace All Errors /usr/local/bin/trace.sh -e 5. K8 mongo service name -s (default: mongo-admin-0) 6. Mongo port -p (default: 27017) 7. Replica set name -t (default: admin) 8. Trace database name -d (default: policy_trace) 9. /usr/local/bin/trace.sh -h displays this help

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 302

4 2 C H A P T E R

Policy Control Request Triggers Over N7

· Feature Summary and Revision History, on page 303 · Feature Description, on page 303 · Configuring the Policy Control Request Trigger Events over N7, on page 304
Feature Summary and Revision History

Summary Data
Table 144: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation
Revision History
Table 145: Revision History
Revision Details First introduced.

PCF SMI Enabled ­ Configuration required to disable Not Applicable
Release 2020.01.0

Feature Description
PCF can subscribe to the policy control request triggers on the SMF. This is done by including triggers in the response to smPolicyControl_Create request. PCF can modify the request triggers that are subscribed in the SMF using Npcf_SMPolicyControl_UpdateNotify request or in response to smPolicyControl_Update service operation.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 303

Handling Out of Credit over N7

Policy Control Request Triggers Over N7

Handling Out of Credit over N7
The SMF notifies the PCF about the termination action as instructed by the CHF within the "finUnitAct" attribute and the impacted PCC rules within the "ruleReports" attribute. As received from the SMF, the PCF enhanced to include the Out of Credit information within the "finUnitAct" attribute of the AF event notification.
Configuring the Policy Control Request Trigger Events over N7
This section describes how to configure the Policy Control Request Trigger (EventTrigger) service to configure different events that are subscribed in response to smPolicyControl_Create request. Before configuring the trigger service, ensure that you have created the use case templates and added the required service. For information on how to create a use case template and add a service for this configuration, see Configuring the Use Case Template, on page 349 and Adding a Service, on page 348. 1. Under Service Configurations, click Add to open the Select Service Configuration window.
2. Choose PCF > EventTrigger and configure the required parameters. PCF can subscribe to the policy control request triggers in SMF. For the list of supported policy control triggers, see 3GPP TS 29.512 N7 specification.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 304

4 3 C H A P T E R

PCF Session Binding with Binding Support Function

· Feature Summary Revision History, on page 305 · Feature Description, on page 306 · How it Works, on page 306 · Feature configuration, on page 309 · Standards Compilance, on page 309 · OAM Support, on page 309
Feature Summary Revision History

Summary Data
Table 146: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation
Revision History
Table 147: Revision History
Revision Details First introduced.

PCF SMI Enabled ­ Configuration required to disable Not Applicable
Release 2022.04.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 305

Feature Description

PCF Session Binding with Binding Support Function

Feature Description
The Cisco Policy Control Function (PCF) supports the Binding Support Function (BSF) to provide a packet data unit (PDU) session binding functionality. PCF ensures that an AF request for a PDU session reaches the relevant PCF holding the PDU session information. The Nbsf Management Register service enables the PCF to register the session binding information for a User Equipment (UE) in the BSF. The BSF maintains and provides the user identity, the Data Network Name (DNN), the UE addresses, and the PCF address for the PDU session. The PCF registers a new session binding information in the BSF and obtains a unique BSF binding ID for the existing PDU session. If PCF receives a new UE address (for example, an IPv4 address) and the session binding information is registered for this PDU session. The PCF deletes the session binding data for a UE in the BSF using the Nbsf Management De-Register service operation and deletes a specific resource with the resource identifier by Individual PCF Session Binding (for example Binding ID).
How it Works
This section describes how this feature works.
Call Flows
This section describes the key call flow for this feature.
Creating Call Flow for Nbsf Management Register Service
This section describes the creating call flow for a Nbsf management register service.
Figure 60: Registering a New PDU Session Binding with BSF

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 306

PCF Session Binding with Binding Support Function

Updating Call Flow for Nbsf Management Register Service

Table 148: Registering a new PDU Session Binding with BSF Call Flow Description
Step Description 1 The SMF sends a Npcf SMPolicy Control Create Request to the PCF-REST-EP. 2 The PCF-REST-EP sends the Npcf sSMPolicy Control Create Request to the PCF Policy Engine. 3 The PCF Policy Engine initiates the BSF PCF binding create request to the PCF-REST-EP. 4 The PCF-REST-EP sends the Nbsf management register request to the BSF. 5 The BSF sends the Nbsf management register response to the PCF-REST-EP. 6 The PCF-REST-EP sends the BSF PCF binding create response with binding info to the PCF Policy
Engine. 7 The PCF Policy Engine sends the Npcf SMPolicy Control Create Request to the PCF REST EP. 8 The PCF REST EP sends the Npcf SMPolicy Control Create Request to the SMF.
Updating Call Flow for Nbsf Management Register Service
This section describes the updating call flow for a Nbsf management register service.
Figure 61: Registering an existing PDU Session as New Binding with BSF

Table 149: Registering an existing PDU Session as New Binding with BSF Call Flow Description
Step Description 1 After the policy control request trigger is triggered for UE IP Change, the SMF send a Npcf SMPolicy
Control Update Request to the PCF REST EP. 2 The PCF REST EP sends the Npcf SMPolicy Control Update Request to the PCF POLICY ENGINE. 3 The PCF POLICY ENGINE initiates the BSF PCF Binding Create request with previous Binding
Info to the PCF REST EP.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 307

Deleting Call Flow for Nbsf Management Register Service

PCF Session Binding with Binding Support Function

Step Description 4 The PCF REST EP sends the Nbsf Management register request with a new IP Address to the BSF. 5 The BSF sends the Nbsf Management register response with new Binding Info to the PCF REST
EP. 6 After getting the previous binding info, the PCF REST EP sends the Nbsf Management Deregister
request with Previous Binding Info to the BSF. 7 The BSF sends the Nbsf Management Deregister response to the PCF REST EP. 8 The PCF REST EP sends the BSF PCFBinding Create response with new Binding Info to the PCF
POLICY ENGINE. 9 After storing new Binding Info, the Npcf SMPolicy Control Update Response to the PCF REST EP. 10 The PCF REST EP sends the Npcf SMPolicy Control Update Response to the SMF.
Deleting Call Flow for Nbsf Management Register Service
This section describes the deleting call flow for a Nbsf management register service.
Figure 62: Deregistering a PDU Session with the BSF

Table 150: Deregistering a PDU Session with the BSF Call Flow Description
Step Description 1 The SMF sends a Npcf SMPolicy Control Delete Request to the PCF REST EP. 2 The PCF REST EP sends the Npcf SMPolicy Control Delete Request to the PCF Policy Engine. 3 The PCF Policy Engine sends the Npcf SMPolicy Control Delete response with Binding Info to the
PCF REST EP. 4 After getting the Binding Info of the PDU session, the PCF REST EP sends the Nbsf Management
Deregister request with Binding Info to the BSF. 5 The BSF sends the Nbsf Management Deregister response to the PCF REST EP.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 308

PCF Session Binding with Binding Support Function

Feature configuration

Step Description
6 The PCF REST EP sends the Npcf SMPolicy control Delete response to the SMF.
Feature configuration
Configuring BSF at OPS Center
To configure this feature, use the following configuration: config
engine pcf-green properties bsf.pcfbinding.enabled value true profile nf-client nf-type bsf bsf-profile bsfprofile locality default service name type nbsf-management endpoint-profile profile-1 endpoint-name ep1 capacity 10 properties bsf.pcfbinding.enabled primary ip-address ipv4 {config.Core.HostIpAddress.QPS1} port 8090 profile nf-client nf-type bsf bsf-profile bsfprofile locality default service name type nbsf-management endpoint-profile profile-1 uri-scheme http version uri-version v1 service-registration profile locality default capacity 20 priority 10 nf-status REGISTERED plmn-list 100 010 service-registration profile snssais embb sst 1 profile nf-pair nf-type BSF locality client default profile nf-pair nf-type BSF locality preferred-server default profile nf-pair nf-type BSF locality geo-server geoLocality profile nf-pair nf-type BSF subscription-enabled false end Notes: · engine pcf-green properties bsf.pcfbinding.enabled value [true | false] --The value is set to true to enable the BSF.
Standards Compilance
This feature complies with the following standards specifications: · 3GPP TS 29.521 "Binding Support Management Service" · 3GPP 29.513 "Policy and Charging Control signaling flows and QoS parameter mapping"
OAM Support
This section describes operations, administration, and maintenance support for this feature.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 309

Statistics

PCF Session Binding with Binding Support Function

Statistics

This section provides the counter that gets generated for the BSF. outgoing_request_total--Collects the outgoing request total for the BSF. The outgoing_request_total counter supports the following labels:
· interface_name--Indicates the name of the Service Based Interface (SBI) such as BSF. · service_name--Indicates the name of the service such as nbsf-management. · command--Indicates the command type such as Register|Deregister.
outgoing_request_time--Collects the outgoing request time for the BSF. The outgoing_request_time counter supports the following labels:
· service_name--Indicates the name of the service such as nbsf-management. · command--Indicates the command type such as Register|Deregister.
incoming_rpc_request_total--Collects the incoming rpc request total for the BSF. The incoming_rpc_request_total counter supports the following labels:
· interface_name--Indicates the name of the Service Based Interface (SBI) such as BSF. · service_name--Indicates the name of the service such as nbsf-management. · command--Indicates the command type such as Register.
incoming_rpc_request_time--Collects the incoming rpc request time for the BSF. The incoming_rpc_request_time counter supports the following labels:
· interface_name--Indicates the name of the Service Based Interface (SBI) such as BSF. · service_name--Indicates the name of the service such as nbsf-management. · command--Indicates the command type such as Register.
async_svc_runnable_total--Collects the async svc runnable total for the BSF. The async_svc_runnable_total counter supports the following labels:
· service_name--Indicates the name of the service such as nbsf-management. · command--Indicates the command type such as Register.
async_svc_runnable_time--Collects the async svc runnable time for the BSF. The async_svc_runnable_time counter supports the following labels:
· service_name--Indicates the name of the service such as nbsf-management. · command--Indicates the command type such as Register.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 310

4 4 C H A P T E R

Predefined Rules and Rulebase

· Feature Summaryand Revision History, on page 311 · Feature Description, on page 311 · Configuration Support for Rule and Rulebase, on page 312
Feature Summaryand Revision History

Summary Data
Table 151: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation
Revision History
Table 152: Revision History
Revision Details First introduced.

PCF SMI Enabled ­ Always-on Not Applicable
Release 2020.01.0

Feature Description
During session establishment and modification, the SMF communicates with PCF over the N7 interface. When a user equipment (UE) establishes a packet data unit (PDU) session, the UE requires policies for session management. PCF stores the policies as Policy and Charging Control (PCC) rule IDs in the Policy Builder application. When SMF receives the session establishment request, SMF requests PCF to provide policies, PCF then sends the PCC rule ID. SMF uses the PCC rules to configure the UPF for various data flow tasks, such as shaping, policing to provide bandwidth, and charging functions.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 311

Configuration Support for Rule and Rulebase

Predefined Rules and Rulebase

PCF supports configuration of PCC rule ID for Rule and Rulebase. Rulebase is the collection of charging rule names. PCF sends this PCC rule ID to the SMF, and as per the PCC rule ID, the SMF searches the definition of these rules.
Note Rule and Rulebase Name is equivalent to Charging Rule Name and Charging Rulebase Name that were present in PCRF.
Configuration Support for Rule and Rulebase
This section describes how to configure a PCC rule ID for Rule and Rulebase rules. 1. Log in to the Policy Builder application. 2. In the Service Configurations pane, click DynamicPccRule.
The dynamic PCC rule parameters appear. 3. Click the PCC Rule Id parameter and enter the Pcc_Rule_Id value. 4. Click Save.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 312

4 5 C H A P T E R

Dynamic QoS Flow-based ADC Support

· Feature Summary and Revision History, on page 313 · Feature Description, on page 314 · How It Works, on page 314 · Feature Configuration, on page 315 · Call Flows, on page 318 · Standards Compliance , on page 320
Feature Summary and Revision History

Summary Data
Table 153: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled Not Applicable

Revision history
Table 154: Revision History
Revision Details First introduced.

Release 2023.02.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 313

Feature Description

Dynamic QoS Flow-based ADC Support

Feature Description
For providing the bandwidth allocation dynamically, the PCF interacts with the SMF (N7) and LDAP to provide the ADC policy on subscriber application detection. The ADC feature applies the detection and enforcement policy actions for the specified application.
PCF verifies the support feature (suppFeat) attributes received in the N7_CREATE request from the SMF to check if the SMF supports ADC. The PCF also checks for ADC support validation among PCF feature lists and sends an LDAP query to validate the ADC support per subscriber. If all the validations are successful, PCF includes ADC in the support feature (suppFeat) of the N7_CREATE response.
PCF subscribes to SMF for the following events:
· APP_STA (Application Start)--Installs the application enforcement rules for the dedicated bearer for the detected application flows.
· APP_STO (Application Stop)--Uninstalls the application enforcement rules on the dedicated bearer for the detected application flows.
For the installed predefined rules, SMF reports the information about the detected application traffic to PCF, and PCF provides the corresponding ADC enforcement rules.
The SMF notifies the application start and detects the application flow with the following information:
· Application ID
· Instance ID
· SDF

Table 155: Enforcement Rules for Application Flows Detected

With SDF Deduced

Without SDF Deduced

· PCF creates unique Application Enforcement rule name using application ID and Instance ID.
· The SMF verifies that the application ID-instance ID pair only experiences one trigger of the application detection notification.
· PCF responds with the Derived rule from the CRD without any Application ID.
· Application Stop event--PCF maps to the corresponding PCC rule using appId + instanceId and delete the corresponding enforcement rule.

· If the UPF can't deduce the SDF, Application Start only contains the application ID.
· The SMF doesn't send any SDFs, the PCF responds without using a pccRule and logs the same information in the KPI.

How It Works
This section describes how Dynamic QoS Flow-Based ADC Support feature works.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 314

Dynamic QoS Flow-based ADC Support

Feature Configuration

Feature Configuration
This section describes how to configure the ADC Support.
Ops Center Configuration for ADC Support
To configure the Ops Center Configuration for ADC support, use the following configuration: config
engine pcf-green properties adcSupportAttribute value adcSupport [value] end Notes:
· engine pcf-green properties adcSupportAttribute value adcSupport [value] --Configures the LDAP attribute for adcSupport. The specific default value is true.
Policy Builder Configuration for ADC Support
Figure 63: CRD ­ Detection Rules

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 315

Policy Builder Configuration for ADC Support Figure 64: CRD- Enforcement Rules

Dynamic QoS Flow-based ADC Support

Figure 65: Domain Configuration

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 316

Dynamic QoS Flow-based ADC Support Figure 66: ADC Domain

Policy Builder Configuration for ADC Support

Figure 67: Service

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 317

Call Flows Figure 68: Service Configuration ­ Detection Rules

Dynamic QoS Flow-based ADC Support

Figure 69: Service Configuration ­ Enforcement Rules
Call Flows
This section describes the call flows for this feature.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 318

Dynamic QoS Flow-based ADC Support

Dynamic QoS Flow-Based ADC Support Call Flow

Dynamic QoS Flow-Based ADC Support Call Flow
This section describes the Dynamic QoS Flow-Based adcSupport call flow.
Figure 70: Basic Flow for LDAP - ADC Support Call Flow

Table 156: Basic Flow for LDAP - ADC Support Call Flow Description
Step Description 1 The SMF sends a N7 Create to the PCF and verifies the supported feature attribute. 2 The PCF performs an LDAP search request to the LDAP server to collect the Attribute adcSupport
and a list of application IDs from the LDAP server. 3 The LDAP server sends the attributes adcSupport = true, the list of application IDs in the LDAP
Search Response to the PCF. 4 The PCF sends N7 Create Response to the SMF and add rules for the application IDS and event the
triggers for the ADC. 5 The SMF sends N7 Update to the PCF with the event trigger APP_STA for the specific ID.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 319

Standards Compliance

Dynamic QoS Flow-based ADC Support

Step Description 6 The PCF sends the N7 Update Response to the SMF with the specific rules for the application IDs
sent in the request. 7 The SMF sends N7 Update to the PCF with APP_STA for installing the dedicated bearer. 8 The PCF sends N7 Update Response to the SMF with dedicated rule information. 9 The SMF sends N7 Update to the PCF with the event trigger APP_STO for the specific ID. 10 The PCF sends the N7 Update Response to the SMF by removing the dedicated bearer for the specific
application IDs.
Standards Compliance
This feature complies with the following standards specifications: · 3GPP 29.503 "Policy and Charging Control framework" · 3GPP 29.512 "Session Management Policy Control Service"

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 320

4 6 C H A P T E R

Rx Authorization

· Feature Summary and Revision History, on page 321 · Feature Description, on page 321 · How it Works, on page 322 · Configuration Support for Rx Authorization, on page 328
Feature Summary and Revision History

Summary Data
Table 157: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Disabled ­ Configuration required to enable Not Applicable

Revision History
Table 158: Revision History
Revision Details First introduced.

Release 2020.01.0

Feature Description
PCF provides a method for the service providers to regulate the services available to individual subscribers. You can configure the bearer-level regulation through the customization and configuration of Rx Authorization.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 321

Architecture

Rx Authorization

The configuration handles the Video over LTE (ViLTE) authorization as per the subscriber attributes (IMSI, MSISDN, and Throttling) to control the services available to each subscriber.
Architecture
This section depicts how the network function components interact during an Rx Authorization.
The SMF and PCF have a bilateral communication over the N7 interface. The AF sends an AAR request to PCF. The PCF performs the Rx Authorization of the request by evaluating the message for the missing Media-AVP and consults the value that is assigned to the Bearer-Authorization column in the STG table for the configured status as accept or reject. PCF fetches the STG information from the associated database. PCF communicates the evaluation result to the SMF through a REST request and AF through the outgoing Diameter messages.
The following figure illustrates how the NF interactions happen over the Rx interface.
Figure 71: NF Interactions

Components
This section describes the RxAuthorizationSTGConfiguration component in the Rx Authorization process. The RxAuthorizationSTGConfiguration service configuration is used to evaluate the Rx Authorization table and obtain the configured output values. The RxAuthorizationSTGConfiguration service supports chained evaluation of Search Table Groups (STGs) which means multiple STGs are configured hierarchically in the service and outputs of one table is used as input keys for another table. The RxAuthorizationSTGConfiguration configuration evaluates all the bearers on receiving a Diameter message and sends the appropriate Diameter requests or responses depending on the bearer's authorization status provided the Rx session exists. The Rx Authorization table from which Bearer Authorization and Error Cause output values are received is configured as the last table in the list of chained STGs configured under RxAuthorizationSTGConfiguration.
How it Works
This section describes how this feature works. At a high-level, PCF supports the Rx-based authorization of bearers. The Rx authorization requires a Search Table Groups (STG), which enables logical grouping of multiple Customer Reference Data (CRD) tables. Within this STG, a CRD table that is dedicated to Rx Authorization is created in the Policy Builder. The input keys in the CRD signify the conditions based on which PCF determines the throttle limit for a bearer. The table has the following output columns:
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 322

Rx Authorization

Call Flows

· Bearer Authorization: Indicates whether to allow or reject a bearer.
· Error Cause: Specifies the Error-Message that is included in the AAA Diameter message, if necessary.
If PCF is configured to reject the Rx dedicated bearer when the associated Media-Type is missing, it rejects the bearer with the Experimental-Result-Code=INVALID_SERVICE_INFORMATION (5061) in AAA.
PCF is configured to reject a non-GBR bearer if the value for both, upload and download of the non-GBR bearer is set to 0. PCF determines if the bearer is non-GBR with 0-bit rate after consulting the NON-GBR QCI and ZERO BIT RATE QoS input columns in the Rx Authorization table. If PCF rejects the bearer, then its Bearer-Authorization value is set to REJECT with Result-Code=DIAMETER_AUTHORIZATION_REJECTED (5003) AVP and the Error-Message="BLOCKED (0)" in AAA.
If PCF receives an AAR message with multiple Media-Component-Descriptions AVPs, and it rejects one of the AVPs after assessing for Rx Authorization. PCF sends a successful AAA message for the accepted AVPs. For the rejected media component, PCF creates a scheduled event for sending a delayed Rx RAR. You can configure the duration between the rejection and the time when scheduling of the delayed message happens. The default value is set to 500 milliseconds.

Note In case PCF rejects multiple Media-Component-Descriptions AVPs with AAA 5003, the Error-Message resulting from the last evaluated rejected AVP is sent in the AAA message.
For existing bearers in an Rx session, PCF evaluates them for Rx Authorization when an event occurs such as LDAP refresh, N28 NOTIFY, and N7_NOTIFY. In situations where all the Media-Component-Descriptions that are stored in the Rx sessions are rejected, then PCF sends an Rx Abort-Session-Request (ASR) to Application Function (AF).

Note You may observe a degradation in the performance of the PCF system when the RxAuthorizationSTGConfiguration service is added. The level of degradation corresponds to the number of STGs configured for the chained evaluation in the RxAuthorizationSTGConfiguration service and the number of bearers the service has evaluated.

Call Flows

This section describes the key call flows for this feature.

All Bearers Are Rejected Call Flow
This section describes the All Bearers Are Rejected call flow.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 323

Few Bearers Are Rejected Call Flow Figure 72: All Bearers Are Rejected Call Flow

Rx Authorization

Table 159: All Bearers Are Rejected Call Flow Description
Step Description 1 The SMF sends a N7 Create request to the PCF. 2 The PCF responds to the SMF with the success response. 3 The AF sends an AAR-I (Audio and Video) message to the PCF. 4 The PCF performs the Rx Authorization CRD lookup. 5 The Rx Authorization CRD evaluates both, audio and video bearer. If there is a missing Media-Type
AVP, PCF rejects the bearer. PCF validates all the bearers for Bearer-Authorization=REJECT. The bearers are classified as unauthorized and are not installed on the SMF. If all bearers received in the AAR are rejected, PCF sends a AAA (5003) Result-Code=DIAMETER_AUTHORIZATION_REJECTED Error-Message=Throttled to the AF.
Few Bearers Are Rejected Call Flow
This section describes the Few Bearers are Rejected call flow.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 324

Rx Authorization Figure 73: Few Bearers Are Rejected Call Flow

Few Bearers Are Rejected Call Flow

Table 160: Few Bearers Are Rejected Call Flow Description
Step Description 1 The SMF sends a N7 Create request to the PCF. 2 The PCF responds to SMF with success response. 3 The AF sends an AAR-I (Audio and Video) message to the PCF. 4 The PCF performs the Rx Authorization CRD lookup. 5 The Rx Authorization CRD evaluates both the audio and video bearers. The audio bearers that contain
the required Media-Type AVP are tagged as accepted. Video bearers with the missing Media-Type AVP are rejected. Bearers evaluated to Bearer-Authorization=ACCEPT are authorized and installed on the SMF. PCF responds to the accepted audio bearers with AAA (Audio) Result-Code=DIAMETER_SUCCESS (2001). 6 The PCF sends N7 Notify (Audio) to the SMF. 7 The SMF responds to the PCF with a N7 Notify-Resp (Success).
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 325

Existing Bearers Are Rejected Call Flow

Rx Authorization

Step Description
8 Bearers evaluated to Bearer-Authorization=REJECT are marked as unauthorized and are not installed at the SMF. The PCF sends RAR (Video) Specific-Action=INDICATION_OF_FAILED_RESOURCES_ALLOCATION message to AF.
9 The AF sends RAA (Success) message to PCF.
Existing Bearers Are Rejected Call Flow
This section describes the Existing Bearers Are Rejected call flow.
Figure 74: Existing Bearers Are Rejected Call Flow

Table 161: All Bearers Are Rejected Call Flow Description
Step Description 1 The SMF sends a N7 Create request to the PCF. 2 The PCF responds to the SMF with a N7 Create Success response. 3 The AF sends an AAR-I (Audio and Video) message to the PCF. 4 The PCF performs the Rx Authorization CRD lookup. 5 The Rx Authorization CRD evaluates both, the audio and video bearers.
If successful authorization, PCF sends AAA (Success) Result-Code=DIAMETER_SUCCESS(2001) to AF.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 326

Rx Authorization

Considerations

Step Description 6 The PCF sends N7 Notify (Audio and Video) message. 7 The SMF responds with N7-Notify-Resp (Success) to the PCF. 8 The SMF sends N7 Update (RAT-Type Change). 9 The PCF performs the Rx Authorization CRD lookup. 10 When PCF reevaluates the existing bearer and the Rx Authorization CRD detects a VIDEO bearer
with the missing AVP, PCF rejects the bearer with Error-Message=Throttled. The PCF sends N7-UPDATE (Success) Charging Rule Remove for VIDEO to the SMF. 11 The PCF sends RAR (VIDEO) Specific-Action=INDICATION_OF_FAILED_RESOURCES_ALLOCATION to the AF. 12 The AF responds with RAA (Success) to the PCF.

Considerations
The following considerations apply when you configure the Rx Authorization:
· The STG names that are configured in the RxAuthorizationSTGConfiguration should be unique.
· The AVP names for the output columns that are configured in the RxAuthorizationSTGConfiguration service should be unique.
· The chained evaluation keys should have the same AVP name for the output column in the source table, and the input column in the destination table.
· The result of the RxAuthorizationSTGConfiguration service is available in the last table that is defined in the list. The table includes the output columns with the following mandatory AVP names: Bearer-Authorization and Error-Message.
· The Bearer-Authorization column can be configured to accept the fixed values that are Accept and Reject.
· Perform the configurations that are required for defining and mapping the CRD tables as per the requirement.
· The Policy Server evaluates the mapped source output AVPs (result column of the STG) through the CRD which it has created. If PCF has not created the CRD, then it cannot query the corresponding chained input key which further limits it from verifying the Rx Authorization.
· 1:1 mapping must exist between a chained pair of output AVP and the input key.

Limitations

This feature has the following limitations in this release:
· When an Rx Authorization fails, PCF sends an Rx_RAR request only if the Specific-Action= INDICATION_OF_FAILED_RESOURCES_ALLOCATION is armed in the AAR message.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 327

Configuration Support for Rx Authorization

Rx Authorization

· The Rx authorization is performed only at the Media-Component-Description AVP level. This indicates that the AVPs from the AAR message that are used as input for the CRD table evaluation should be from Media-Component-Description AVP only. PCF does not evaluate of the Media-Sub-Component AVP.
· If using the PolicyState or Session data retrievers that are bound to the input keys, then PCF retrieves the data for the input keys if it is inserted into the session data.
Configuration Support for Rx Authorization
This section describes how to configure Rx Authorization. The configuration of the Rx Authorization capability in PCF involves the following steps: 1. Creating the STG Tables 2. Adding the RxAuthorizationSTGConfiguration Service 3. Configuring the Service Chaining 4. Rejecting the AAR with the Missing Media-Type AVP 5. Setting Up the Delayed Message Schedule
Creating the STG Tables
This section describes how to create the STG column in Policy Builder. To configure the STG column, use the following configuration: 1. Log in to Policy Builder. 2. Click the Reference Data tab, and from the left pane click Custom Reference Data Tables to view
the options. 3. On the left pane, click the Search Table Groups folder. 4. In the Search Table Group Summary pane, click Search Table Group. A default STG gets created
under the Search Table Groups folder. 5. Click the new STG and in the Search Table Groups pane rename the STG with a unique name. 6. Click Customer Reference Data Table. A new table gets created on the left pane. 7. Click the new table to open the Customer Reference Data Table pane. Rename the table with a unique
name. 8. Navigate to the Columns section and click Add. A default column gets added to the Columns section. 9. Click the newly created column heading and rename it. Select the options in the corresponding row as
applicable to your environment.
Note If the Key option is selected for a specific column, then it indicates as the input column.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 328

Rx Authorization

Adding the RxAuthorizationSTGConfiguration Service

10. Save the changes.
Adding the RxAuthorizationSTGConfiguration Service
This section describes how to add the RxAuthorizationSTGConfiguration service. To configure the RxAuthorizationSTGConfiguration service, use the following configuration: 1. Log in to Policy Builder. 2. Choose the Services tab, and from the left pane click Use Case Templates to create a new service. 3. On the left pane, click Summary to open the Summary pane. 4. Under Actions, click Use Case Template. 5. In the Use Case Template pane, specify the name for the template. 6. Click the Actions tab and select Add. 7. In the Select Service Configuration dialog box, select the RxAuthorizationSTGConfiguration and
click OK. The Use Case template with the specified name is created. 8. In the left pane, click Services > Service Options to view the options. The newly created service appears
in the Service Options. 9. Select the service that you have created. 10. Under Service Configurations, click Add to open the Select Service Configuration dialog box. 11. Under Service Configurations, select RxAuthorizationSTGConfiguration, then click OK.
Configuring the Service Chaining
This section describes how to configure the service chaining for Rx Authorization. Before configuring the service chaining, ensure that you have created the use case templates and added the RxAuthorizationSTGConfiguration service. Use case templates are the building blocks of the PCF architecture. The use case templates allow you to define the Service Configuration objects to be set by a Service Option. To configure service chaining, use the following configuration: 1. Log in to Policy Builder. 2. Click the Services tab, and from the left pane click Service Options to view the options. 3. Expand the new service that you have created, and select the child. 4. In the Service Option pane, select Rx_AuthorizationSTGConfiguration service under Service
Configurations and specify the Rx_AuthorizationSTGConfiguration parameters. 5. Expand the List Of Input Column Avp Pairs (List) > ColumnAndAvpPair, and enter the appropriate
information. 6. Expand the List Of Output Column Avp Pairs (List) > ColumnAndAvpPair, and enter the Avp Name
as Bearer-Authorization. Similarly, in another ColumnAndAvpPair > Avp Name field specify Error-Message.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 329

Rejecting the AAR with the Missing Media-Type AVP

Rx Authorization

7. Save the changes.

Rejecting the AAR with the Missing Media-Type AVP
This section describes how to enable PCF to reject the AAR messages with missing Media-Type AVPs. To configure PCF to reject the AAR messages, use the following configuration: 1. Log in to Policy Builder. 2. Click the Reference Data tab. 3. In the left pane, click Diameter Clients > Rx Clients. 4. Click Rx-Client. 5. In the Rx Client pane, select the Reject AAR with Invalid Service Info for missing Media-Type check
box. 6. Save the changes.

Setting Up the Delayed Message Schedule
This section describes how to set up the duration after which PCF sends the delayed message to the AF. To configure the delayed message schedule through the Policy Builder, use the following configuration: 1. Log in to Policy Builder. 2. Click the Reference Data tab. 3. In the left pane, click Diameter Clients > Rx Clients. 4. Click Rx-Client. 5. In the Rx Client pane, specify the duration in the Sending Delayed Message Wait Time (In millisec)
field. If you do not specify the period, then PCF considers the default period of 500 milliseconds.

Rx Client

This section describes the parameters, which you can configure for the Rx client.
Use the Rx Client, which is a Diameter client object along with the Rx interface. You can add the Rx-specific features to the generic Diameter client.
Before setting the service parameters, ensure that you create a use case template and add a service for this configuration. For details, see Configuring the Use Case Template, on page 349 and Adding a Service, on page 348.
The following table describes the Rx Client service parameters:

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 330

Rx Authorization

Rx Client

Table 162: Rx Client Parameters

Parameter

Description

Reject AAR with Invalid Service Info for missing Media-Type

Enables PCF to reject the Rx_AAR message when Media-Component-Descriptions AVPs have the Media-Type AVP missing. PCF rejects the message with Experimental-Result-Code= INVALID_SERVICE_INFORMATION (5061).
To enable the parameter, select the check box available in the Diameter Clients > Rx Client.

Delayed Message Wait Time

Allows you to specify the duration after which PCF sends a delayed message. The default value is 500 milliseconds.
To define the duration, specify the period in the text field available in Diameter Clients > Rx Client.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 331

Rx Client

Rx Authorization

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 332

4 7 C H A P T E R

Rx Interface for 4G and 5G

· Feature Summary and Revision History, on page 333 · Feature Description, on page 334 · How it Works, on page 334 · Routing the Rx Diameter Requests, on page 334
Feature Summary and Revision History

Summary Data
Table 163: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled ­ Configuration required to disable Not Applicable

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 333

Revision History

Rx Interface for 4G and 5G

Revision History

Table 164: Revision History

Revision Details

Release

Behavior change introduced.

2020.01.0

Prior to the 2019.03 release, for the "3GPP Diameter Rx support on 5G PCF" feature, the "device-protocol-id configuration" option under Diameter application was required to be configured with the value 30. This option was configured using CLI for the Rx Diameter incoming calls for tagging them to RX_5G_TGPP device protocol.

For the "Converged Rx Support for 5G/4G" feature, the session lookup is done at the PCRF + PCF engine to determine whether the incoming Rx request needs to be tagged to RX_TGPP device protocol or RX_5G_TGPP device protocol. Hence, for this feature the "device-protocol-id configuration" option under Diameter application is removed and is no longer configurable in the CLI.

Note

The update for this feature is not backward compatible and requires a fresh install.

First introduced.

Pre 2020.01.0

Feature Description
The combined PCF-PCRF deployment architecture provides both PCRF and PCF capabilities. In this deployment, all the incoming Rx Diameter requests are sent to the PCRF or PCF Engine, where session lookup determines the session binding of the 4G and 5G sessions.
Relationships
This feature is an extension of the "3GPP Diameter Rx support on 5G PCF" feature, which was the implementation of N5 interface on PCF.
How it Works
This section describes how this feature works. The incoming Rx requests are tagged to RX_5G_TGPP device protocol, if the respective N7 session is available. Else, the requests are tagged to RX_TGPP device protocol. No CLI configuration is required for tagging these requests.
Routing the Rx Diameter Requests
This section describes the service configurations that enable routing of the Rx Diameter requests to PCF or PCRF.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 334

Rx Interface for 4G and 5G

Configuring RxSTGConfiguration AVP

· RxSTGConfiguration

Configuring RxSTGConfiguration AVP
This section describes the parameters that can be configured for RxSTGConfiguration. The RxSTGConfiguration service configuration supports the following output AVPs that allow the dynamic value expression and their ranges to be defined. Before setting the service parameters, ensure that you create a use case template and add a service for this configuration. For details, see Configuring the Use Case Template, on page 349 and Adding a Service, on page 348. The following table describes the RxSTGConfiguration service parameters.
Table 165: RxSTGConfiguration Parameters

Parameters Dynamic-QoS-ARP-Priority-Level

Description

Note

This is a mandatory parameter if the Dynamic QoS

ARP feature is enabled.

This AVP is bound to the dynamic expression Priority-Level column. If the value is null/not configured, then Dynamic QoS ARP feature is disabled. If the value is configured, it overrides the integer PL value (if configured). The dynamic PL expression is either expected to match the java regex: ^[dD](\\s*([+-/*])\\s*([0-9]+))?$ or must be an offset value (of syntax: [+-][0-9]+). In case the value is provided in offset form, the "D" is implicit. Thus "+8" corresponds to "D+8" in expression form, "-5" corresponds to "D-5" and similarly, "0" corresponds to "D".

Dynamic-QoS-ARP-Priority-Level-Default If the default bearer doesn't have a Priority-Level, this value is used as dedicated bearer PL. If the value is null/not configured, the default value (15) is used.

Dynamic-QoS-ARP-Priority-Level-Min This output AVP provides upper/lower bound for the calculated PL value using the Dynamic expression provided under Dynamic-QoS-ARP-Priority-Level. If the value is null/not configured, the default value (1) is used.

Dynamic-QoS-ARP-Priority-Level-Max The upper end of the valid PL range. If the value is null/not configured, the default value (15) is used.

Dynamic-QoS-Update-On-Change

This AVP controls whether the Rx rules must be updated on change in the dynamic PL value (for example, due to change in default bearer PL value). If value is null/not configured, the Rx rules aren't updated with new dynamic PL value once installed.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 335

Configuring RxSTGConfiguration AVP

Rx Interface for 4G and 5G

Note

· Using the offset form may have minor performance gains as compared to a full expression.

· Range limits are not applied for the default dynamic values.

· Dynamic expression has an implicit "Enforce" QoS action. The Action column value is ignored.

· If dynamic expression configured for Priority-Level is invalid, PCF ignores the expression and does not include the ARP parameters (since PL is set as null) in the rule install. This is true even if absolute PL value is configured (absolute value is ignored).

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 336

4 8 C H A P T E R

Site Isolation

· Feature Summary and Revision History, on page 337 · Feature Description, on page 338 · How it Works, on page 338 · Configuring the Site Isolation Feature, on page 339
Feature Summary and Revision History

Summary Data
Table 166: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled ­ Configuration required to disable Not Applicable

Revision History

Table 167: Revision History

Revision Details

Release

Enhancement introduced.

2021.04.0

Introduced instructions to configure the remote system ID in the secondary site while the primary site is undergoing a site isolation procedure.

First introduced.

2020.02.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 337

Feature Description

Site Isolation

Feature Description
Site isolation is segmenting your PCF environment to create silos of cluster or a standalone CDL instance in a Geographic Redundancy (GR) deployment. Each silo is self-sufficient with access to dedicated resources and network utilities. With this approach, you can upgrade or resolve network issues targeted towards the affected site without impacting any other site. The site isolation strategy protects against data loss by replicating changes between the primary site and the secondary site. The secondary site takes over the primary site's traffic workload whenever the primary site is unavailable. After the maintenance activity is completed, you can bring up the primary site and reinstate it to the previous state to process the requests.
How it Works
This section describes how this feature works. A site can be unavailable when it is undergoing maintenance level upgrade or experiencing a network issue. During this period, the site cannot manage the traffic that the client directs towards it. In such situations, you can isolate the site so that the traffic workload is switched from a primary site to a secondary site. Configuring the PCF site isolation feature is a simplified process that involves issuing the commands from the PCF Ops Center console of the primary and secondary sites. The primary-secondary-primary switch includes the following: 1. In the PCF Ops Center of the primary site, set the PCF registration status to UNDISCOVEREABLE. If
the primary site is unavailable, the client automatically contacts the secondary site. Similarly, when the primary site comes online, the client attempts to connect to the primary site. No manual intervention is required to bring up the secondary site. The primary and secondary sites are always synchronized, so the data integrity is maintained. To determine whether all the traffic requests are switched successfully to the secondary site, review the traffic status on the Grafana dashboard. Also, verify that the primary site has not received any SBA inbound traffic.
2. After the traffic is switched to a secondary site, you can bring down the primary site and take the required actions to upgrade or resolve the accessibility issues.
Note If you intend to isolate the site without disrupting the GR replication system, do not shut down the primary site.
3. In the primary site, ensure that only the Ops Center-specific pods are running in the PCF product namespace. The rest of the pods must be terminated.
4. After the planned activities are completed on the primary site, and it is ready to be brought back to a consistent state, bring up the primary site.
5. Ensure that the sessions on the primary site are synchronized with the recent updates on the secondary site. You can verify the CDL changes and compare the CLD local session count on both the sites

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 338

Site Isolation

Prerequisites

Prerequisites
This section describes the prerequisites that must be met to configure the site isolation feature. Before bringing down a site, ensure that all the in-progress traffic requests are completed.
Configuring the Site Isolation Feature
You can configure the site isolation feature from the PCF Ops Center. Configuring the site isolation feature involves the following steps: 1. Configuring the PCF Registration Status 2. Bringing Down the Primary Site 3. Determining the Pod Status 4. Bringing Up the Primary Site 5. Verifying if the Sessions are Synchronized 6. Verifying if the Primary Site is Up
Configuring the PCF Registration Status
This section describes how to configure PCF as undiscoverable. To configure the PCF registration status to undiscoverable, use the following configuration from the PCF Ops Center of the primary site: config
service-registration profile nf-status { REGISTERED | UNDISCOVERABLE } commit exit
NOTES: · config--Enters the configuration mode. · service-registration--Enters the service registration configuration mode. · profile--Enters the profile configuration mode. · nf-status { REGISTERED | UNDISCOVERABLE }--Enters the profile configuration mode.
Bringing Down the Primary Site
This section describes how to configure to bring the primary site down and the remote site for generating notification when primary site is isolated.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 339

Bringing Down the Primary Site

Site Isolation

Note If you want to isolate the site without disrupting the GR replication system, do not bring down the primary site.
1. Configure the primary site to bring the primary site down on the PCF Ops Center: The secondary site takes over the primary site's traffic when the primary site is down or in the UNDISCOVERABLE state. config system mode shutdown commit end NOTES: · config--Enter the configuration mode.
· system mode shutdown--Shut down the site.
2. Configure the remote system ID on the PCF Ops Center: After primary site is unavailable, configure the remote-system-id in the secondary site using the siteID of the primary site. config cdl datastore session slot notification remote-system-id [ siteID ] exit exit NOTES: · config--Enter the configuration mode.
· cdl--Enter the CDL configuration mode.
· datastore session--Enter the datastore session configuration.
· slot notification remote-system-id [ siteID ]--Specify the siteID for the primary site. The SiteID is associated with the cdl remote-site system-id configuration in the YANG model.
Sample Configuration The following is a sample configuration for specifying the siteID.
cdl datastore session slot notification remote-system-id [ 1 ]. <- 1 is the siteID of site1 exit
For more information on CDL components, see Cisco Common Data Layer documentation.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 340

Site Isolation

Determining the Pod Status

Determining the Pod Status
This section describes how to verify that only the PCF Ops Center-specific pod is running on the secondary site. To verify if the Ops Center-specific pod is running in the PCF product namespace, use the following: Use the following command in the CEE Ops Center of the secondary site: show cluster pods | tab | nomore | include ops-center Alternatively, on the master node, use the following command to display the pod status associated with a specific namespace. kubectl get pods -n pcf_namespace
Bringing Up the Primary Site
This section describes how to bring up the primary site. 1. Configure the secondary site to remove siteID on the PCF Ops Center:
Before bringing up the primary site, remove the primary site's siteID from the secondary site's "remote-system-id" list. no cdl datastore session slot notification remote-system-id Sample Configuration
no cdl datastore session slot notification remote-system-id
2. Configure the primary site to bring up the primary site on the PCF Ops Center: config system mode running commit exit NOTES: · config--Enters the configuration mode. · system mode running--Configures the system mode as "running".
Verifying if the Sessions are Synchronized
This section describes how to verify if the sessions are synchronized between the sites. The site isolation implementation requires that sessions are synchronized between the primary-secondary-primary sites. After the sites are switched, you can validate that synchronization is successful by reviewing the slots' state and indexes in both the sites. If the state of the slots and indexes is ONLINE, the synchronization status is a success. Another approach is to ensure that the local session count on both the sites match. The local session counts are synchronized between the primary and secondary site when the sessions are replicated. To display the CDL status in the secondary site, use the following commands on the PCF Ops Center:
· To display the state of slots and indexes, run the following:

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 341

Verifying if the Primary Site is Up

Site Isolation

cdl show status · To display the local session count details, run the following:
cdl show sessions count summary

Note

· Ensure the count mismatch between the sites are minimal, as the sessions count is updated with the live

traffic.

· Ensure each slot and index instances has non-zero records and status shows "ONLINE" in "cdl show status" output.

· Alternatively, Grafana CDL dashboard can be used to view the total number of session counts, per slot and index records in respective panels.

Verifying if the Primary Site is Up
This section describes how to confirm if the primary site is brought up successfully.
To verify whether the primary site is up, review the deployment status and percentage usage using the following commands on the PCF Ops Center:
show system status deployed show system status percent-ready
Example: The following example displays the output of the show system status deployed and show system status percent-ready commands:
system status deployed true system status percent-ready 100.0
NOTES:
· The deployment status of the system must be true.
· The percentage of the system must be 100.
· When the primary site is available, ensure to change the nf-status from UNDISCOVERABLE to REGISTERED to enable PCF to serve the SBI traffic. For information on how to change the nf-status, see Configuring the PCF Registration Status, on page 339.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 342

4 9 C H A P T E R

Simless Emergency Feature

· Feature Summary and Revision History, on page 343 · Feature Description, on page 343 · How it Works, on page 344 · Feature Configuration, on page 344
Feature Summary and Revision History

Summary Data
Table 168: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation
Revision History
Table 169: Revision History
Revision Details First introduced.

PCF SMI Disabled ­ Configuration required to enable Not Applicable
Release 2022.01.0

Feature Description
Simless emergency feature allows the UE without a SIM to make an emergency call. Emergency calls are routed to the emergency services in accordance with national regulations to the subscriber location.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 343

How it Works

Simless Emergency Feature

How it Works
This section describes how this feature works. · Add the required DNN to the Emergency DNN list. · To the added Emergency DNN, ensure that the Query LDAP is set to FALSE in DNN table to skip the LDAP Query. · Ensure to add Is Emergency (Boolean) condition in the custom policies to process the emergency calls.
Feature Configuration
To configure this feature, use the following configuration: 1. Add DNN to the Emergency DNN List. 2. Update the DNN Table. 3. Add Is Emergency variable in the policies.
Add DNN to the Emergency DNN List
This section describes how to add DNN to the Emergency DNN List. 1. Log in into Policy Builder. 2. Click the Reference Data tab. 3. From the left pane, click Systems. 4. Click to expand your system name. 5. Click PCF Configuration. 6. In the right pane, add the required DNN to the Emergency DNN List for the emergency calls.
Update DNN Table
This section describes how to update the DNN table. 1. Log in to Policy Builder and navigate to Custom Reference Data. 2. Click the Custom Reference Data. 3. Click Logical_dnn in the Custom Reference Data Tables. 4. In the Actions column, click Edit symbol to change the query_ldap parameter. 5. Edit the query_ldap parameter to false. 6. Click Close, to close the Logical_dnn dialog box.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 344

Simless Emergency Feature

Add Is Emergency Variable in the Policy

Add Is Emergency Variable in the Policy
This section describes how to add Is Emergency variable in the custom policy. 1. Log in into Policy Builder. 2. Click the Tools menu and choose Preferences. 3. Check the Show Policies (custom configuration) editing options? check box and then click Ok. 4. Click the POLICIES tab. 5. On the left pane, click to expand the Initial Blueprint folder under Policies. 6. Expand the Setup network access policies, and then click Missing GPSI. 7. On the right pane, click A Policy N7 TGPP Session exists under Conditions to add a new variable. 8. From the Available Input Variables, click Add to add the Is Emergency (Boolean) to the Conditions
tab. 9. For the Is Emergency (Boolean) variable, choose < > from the Operator drop-down list and enter
true in the Value column. 10. Save and publish the changes.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 345

Add Is Emergency Variable in the Policy

Simless Emergency Feature

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 346

5 0 C H A P T E R

Service

· Feature Summary and Revision History, on page 347 · Feature Description, on page 348 · Service Configuration, on page 348 · Use Case Templates, on page 349 · GenericServiceConfiguration, on page 350 · Common Parameters, on page 351
Feature Summary and Revision History

Summary Data
Table 170: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Default Setting Related Documentation

PCF SMI Enabled ­ Always-on Not Applicable

Revision History
Table 171: Revision History
Revision Details First introduced.

Release 2020.01.0

Important Due to non-backward compatible changes in PCF operations center configuration model, a direct PCF upgrade is not possible. You must perform a fresh PCF installation after un-deploying the previous installation and clearing out the PCF configmaps from CNEE.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 347

Feature Description

Service

Feature Description
A service dictates the capabilities that are assigned to a subscriber (in USuM). An administrator assigns a service to a user through the service configurations. Depending on the service provider's requirements, PCF lets you flexibly map the service configuration with the policies.
For instance, a user with the GOLD account might get a high upload/download speed in comparison to a BRONZE user.
In a tier-based classification, if the quota is "y" then the users from the first tier are redirected to a portal and users belonging the second tier would only experience a downgrade in the speed.

Service

A service is effectively a "code" to label the service and a collection of Service Options which contain the definition of what a service is. Multiple services can be assigned to a single subscriber. If multiple services are assigned to a subscriber, the service options are combined between all assigned services.

Adding a Service
Before adding a service, ensure that you have created the corresponding Use Case template for the service that you intend to add. For information on how to create a use case template, see Configuring the Use Case Template, on page 349. Use the following steps to add a service through Policy Builder. 1. Log in to Policy Builder. 2. Click the Use Case Templates from the left pane and select the template that you have created. 3. In the right pane, click Add to include a new service. 4. In the Select Service Configuration dialog box, click the appropriate entry to view the associated services. 5. Select the service and click OK. The selected service is added as a new service. 6. In the left pane, choose Services > Service Options to view the options. 7. Expand the service that you have created and select the child.

Note The service name resembles the name that you specified for the use case template.
8. In the Service Option pane, click the service under Service Configurations and specify the parameters referring to the relevant configuration.
Service Configuration
PCF uses the low-level configuration objects to drive a feature in the system. You can configure the Service Configuration objects from the Service > Service Option > Use Case Template.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 348

Service

Use Case Templates

Types of service configurations: · PriorityConfiguration: Only one configuration is allowed to be active at a time. If multiples priority configurations are added, the configuration of the highest priority is used. These are used in cases where only a single value makes sense. For example, when sending an Accept message, only one template is required. Objects of this type always have a priority field. If multiple priority configurations are added, the highest priority object is used. For example, AccessAcceptConfiguration and RegisterMacAddress.
· GroupConfiguration (most common): Only 1 configuration per 'Group Name' is allowed to be active. If multiple configurations are added, the highest priority per Group Name is used. These configurations are used in cases where a configuration only makes sense for a single "group" (key). For example, to control the upload/download speed based on the network type (cell, Wi-Fi, and so on). A service configuration to control network speed with a group set for cell/Wi-Fi would allow multiple service configurations to be added. These objects always have a group field and a priority field. For each unique group value, the highest priority is used. For example, IsgServiceConfiguration, All Diameter Configurations, and OneTimeUsageCharge.
· ServiceConfiguration: Multiple configurations are allowed. If multiple configurations are added, all are used. For example, AutoChargeUpAccounts, AutoProvisionQuota, and BalanceRateConfiguration.
Note The Modify feature in PB for Use Case Options/Service Options can override the values conditionally.
Use Case Templates
Use case templates are the essential elements of the PCF architecture. The values that you define in the templates allow you to design and configure one or more services once and reuse them. Only advanced users such as administrators are authorized to create a use case template. On a higher-level, the use case template lets you:
· Define the Service Configuration objects to be set by a Service Option.
· Provide default values and hide values which the use case must not configure.
· Optionally, contains Initiators (Conditions) which define when the template is active.
· Makes Service Option and Service creation easier. For example, a use case template setup to create different upload or download speeds includes a DefaultBearer QoS Service Configuration object. The user creating a use case template can set default and hide the values for ARP and other values that are not directly related to upload or download speed. This allows the creation of the Service Option to be much simpler.
· A copy of the Use Case Options is created while copying a use case template.
Configuring the Use Case Template
This section describes how to configure the use case template. Use the following steps to configure the use case template through Policy Builder.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 349

GenericServiceConfiguration

Service

1. Log in to Policy Builder. 2. Select the Services tab, and from the left pane click Use Case Templates to create a new service. 3. On the left pane, click Summary to open the Summary pane. 4. Under Actions, click Use Case Template. 5. In the Use Case Template pane, specify the name for the template. 6. Click the Actions tab and select Add. 7. In the Select Service Configuration dialog box, select the service and click OK. The Use Case template
with the specified name is created. 8. In the left pane, click Services > Service Options to view the options. The newly created service appears
in the Service Options. 9. Select the service that you have created. 10. Under Service Configurations, click Add to open the Select Service Configuration dialog box. 11. Under Service Configurations, select the service, then click OK.

GenericServiceConfiguration

This section describes the parameters for the GenericServiceConfiguration service configuration object.
Table 172: GenericServiceConfiguration Parameters

Parameters Priority
Group Name
Code Value String Value Int Value Long Value Boolean Value

Description
Denotes the priority of the message for processing. The higher the number, the higher the priority. Default for most settings: 0
Specifies a group name. Only 1 per Group Name is allowed to be active. If multiple configurations are added highest priority per Group Name is used.
Specifies a code for the AVP.
Specifies a value for the AVP.
Specifies the string value.
Indicates the integer value.
Indicates the long value.
Specifies the boolean value.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 350

Service

Common Parameters

Parameters String Value to Override
New String Value Precedence

Description
Indicates whether overriding is required.
For virtual services, if the value of "String Value" field matches exactly with the value of "String Value To Override", then the value of "String Value" is over written with the "New String Value".
The new string value that is used to overwrite the "String Value" if the value of "String Value" field matches exactly with the value of "String Value To Override".
Defines the second-level priority when the highest priority matches among the multiple generic service configurations.

Common Parameters

These parameters are common between many service configuration objects.
Table 173: Common Service Configuration Object Parameters

Parameter Apn Agg Max Bit Rate DL Apn Agg Max Bit Rate UL Arp

Description
Defines the total bandwidth usage for the downlink direction of non-GBR QCIs at the APN.
Defines the total bandwidth usage for the uplink direction of non-GBR QCIs at the APN.
AllocationRetentionPriority · Priority Level ­ Priority-Level AVP value. · Preemption Capability ­ Preemption-Capability AVP value. · Preemption Vulnerability ­ Preemption-Vulnerability AVP value.

Balance Code Diameter Client
Dosage

Indicates with which balance the quota is associated. You can subscribe to multiple balances, but the monitoring key is associated with one balance.
The client configuration is used to apply different policies based on PCF type.
To filter a service based on the Diameter client, specify which Diameter client you want the service to be applied to. Diameter clients are configured in the Reference Data > Diameter Clients > Diameter Clients section of the interface.
This parameter is optional.
How much quota to initially give the client (in bytes).
Default: 0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 351

Common Parameters

Service

Parameter Dual Stack Session
Enable Resource Allocation Notification Encoding Format
Event Trigger Flow Status Framed I P Type

Description Set to enable or disable the parameter. Default: disabled
Can be set to enabled or disabled. Default: disabled
Can be set to true or false. If the Monitoring Key parameter is numeric, set this parameter to true. Default: false
Used primarily to notify the starting and stopping of applications or to report usage. It is not used to rerequest rules.
Defines whether the service data flow is enabled or disabled.
Can be set to one of the following options: · ANY_ONE · BOTH · IPv4_ADDRESS · IPv6_ADDRESS

Default: ANY_ONE

Guaranteed Bit Rate DL

Defines the guaranteed bit rate allowed for the downlink direction.

Guaranteed Bit Rate UL

Defines the guaranteed bit rate allowed for the uplink direction.

List of Input Column Avp Pairs (List) Defines the mapping between the AVP Names and the key columns defined in the selected STG. These AVPs are used as inputs while evaluating the CRD table in STG.
· Avp Name ­ The name of the Diameter AVP that is used as input for CRD table evaluation. For example: Flow-Number, Media-Component-Number, and so on.
· Column ­ The key column in STG that corresponds to the specified AVP.

List Of Output Column Avp Pairs (List)

Defines the mapping between the AVP Names and the output columns defined in the selected STG. These mappings indicate how the output columns values are mapped to AVPs after the CRD is evaluated.
· Avp Name ­ The name of the Diameter AVP to which the value of the output column is mapped while setting the charging parameters on the dynamic rule (for the Dedicated Bearer). For example: Rating-Group Service-Identifier.
· Column ­ The output column defined in the selected STG.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 352

Service

Parameter Max Req Bandwidth DL Max Req Bandwidth UL Monitoring Key Monitoring Level
Mute Notification New String Value Online
Offline
Precedence

Common Parameters
Description
Defines the maximum bit rate allowed for the downlink direction.
Defines the maximum bit rate allowed for the uplink direction.
Identifies a usage monitoring control instance. You can specify any value.
Can be set to one of the following values: · SESSION_LEVEL (0) · PCC_RULE_LEVEL (1) · ADC_RULE_LEVEL (2)
Indicates whether notifications for application starts and stops are muted for ADC Rule by the TDF.
The new string value that is used to overwrite the "String Value" if the value of "String Value" field matches exactly with the value of "String Value To Override".
Defines whether the online charging interface from PCF for the associated PCC rule is enabled. The default charging method provided by PCF takes precedence over any preconfigured default charging method at PCF.
· Enable: Indicates that the online charging interface for the associated PCC rule is enabled.
· Disable: Indicates that the online charging interface for the associated PCC rule is disabled.
Defines whether the offline charging interface from PCF for the associated PCC rule is enabled. The default charging method provided by PCF takes precedence over any preconfigured default charging method at PCF.
· Enable: Indicates that the offline charging interface for the associated PCC rule is enabled.
· Disable: Indicates that the offline charging interface for the associated PCC rule is disabled.
Defines the second-level priority when the highest priority matches among the multiple generic service configurations.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 353

Common Parameters

Service

Parameter Preemption Capability
Preemption Vulnerability
Priority Priority Levels

Description
When provided within the QoS-Information AVP, the AVP defines whether a service data flow can get resources that were already assigned to another service data flow that has a lower priority level. If it is provided within the Default-EPS-Bearer-QoS AVP, the AVP defines whether the Default Bearer can get resources that were already assigned to another bearer with a lower priority level.
· 0: Indicates that the service data flow or bearer is allowed to get resources that were already assigned to another service data flow or bearer with a lower priority level.
· 1: Indicates that the service data flow or bearer is not allowed to get resources that were already assigned to another service data flow or bearer with a lower priority level. This is the default value applicable if this AVP is not supplied.
When provided within the QoS-Information AVP, the AVP defines whether a service data flow can lose the resources assigned to it in order to admit a service data flow that has a higher priority level. If it is provided within the Default-EPS-Bearer-QoS AVP, the AVP defines whether the Default Bearer can lose the resources assigned to it in order to admit a pre-emption capable bearer with a higher priority level.
· 0: Indicates that the resources assigned to the service data flow or bearer can be pre-empted and allocated to a service data flow or bearer with a higher priority level. This is the default value applicable if this AVP is not supplied.
· 1: Indicates that the resources assigned to the service data flow or bearer cannot be pre-empted and allocated to a service data flow or bearer with a higher priority level.
The priority of the message for processing. The higher the number, the higher the priority.
Default for most settings: 0
Used to decide whether a bearer establishment or modification request can be accepted, or rejected due to resource limitations (typically used for admission control of GBR traffic). The AVP can also be used to decide which existing bearers to pre-empt during resource limitations. The priority level defines the relative importance of a resource request.
Values 1­15 are defined, with value 1 as the highest level of priority.
· Values: 1­8 ­ Assigned for services that are authorized to receive
Prioritized treatment within an operator domain.
· Values: 9­15 ­ Assigned to resources that are authorized by the Home network and thus applicable when a UE is roaming.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 354

Service

Common Parameters

Parameter Provision Default Bearer QoS
Qci
Rating Group Realm Redirect Address Redirect Address Type Redirect Server Address Redirect Support Retry Profile Rule Group Rule Name

Description
Must be bound to the appropriate column in the STG. The data contained in the STG column is of type True/False. If the value is True, the Default Bearer QoS information from the session is applied to the rule, while QoS information derived from the prior parameters in this STG is ignored.
The Quality of Service (QoS) Class Identifier. The QoS class identifier identifies a set of IP-CAN specific QoS parameters that define QoS, excluding the applicable bitrates and ARP. It is applicable both for uplink and downlink direction. The QCI values 0, 10­255 are divided for usage as follows:
· 0: Reserved
· 10-127: Reserved
· 128-254: Operator specific
· 255: Reserved
The charging key for the PCC rule used for rating purposes.
The destination realm where the message is sent from PCF.
Indicates the target for redirected application traffic.
Defines the address type of the address given in the Redirect-Server-Address AVP. Default: IPV4_ADDRESS
Indicates the target for redirected application traffic.
This value indicates that Redirection is enabled for a detected application's traffic.
Indicates the Rule Retry Profile to be used. When PCF receives a Charging-Rule-Report indicating failure to install or to activate one or more rules, it evaluates the failed rules and takes further action.
Used to classify rules at PCF to change set of predefined rules based on policy. This parameter is optional.
A partial name configured in Policy Builder (as derived using AF-Application-Identifier and Media-Type values from the Custom dynamic rule name table in Gx Client). Default: AF

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 355

Common Parameters

Service

Parameter Scheduled Hour
Search Column Search Group Search Table String Value to Override
Tdf Application Identifier ToD Schedule

Description
Can be set to one of the following values: · Default: Turns off the Hour Boundary RAR enhancement feature for look-ahead rules installation at hour boundary. This causes rules to be installed at hour boundary as applicable.
· CurrentHour: Rule activation time will be current time, deactivation time will be the next hour.
· NextHour: Rule activation time will be the next hour, and deactivation time will be next-next hour.
Must be bound to the Key column in the STG. The data contained in the STG column is of type Text.
A constant value that PCF uses to search within the Search Table Group indicated by the Search Table parameter.
The name of the table from which to perform a lookup.
Indicates whether overriding is required. For virtual services, if the value of "String Value" field matches exactly with the value of "String Value To Override", then the value of "String Value" is over written with the "New String Value".
References the application detection filter (for example, its value may represent an application such as a list of URLs) to which the PCC rule for application detection and control in PCF applies.
Identifies the schedule for rule activation and deactivation.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 356

5 1 C H A P T E R

Serviceability Diagnostics

· Feature Summary and Revision History, on page 357 · Feature Description, on page 357 · How It Works, on page 358
Feature Summary and Revision History

Summary Data
Table 174: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled - Always-on Not Applicable

Revision History
Table 175: Revision History
Revision Details First introduced.

Release 2023.01.0

Feature Description
The Cisco Policy Control Function (PCF) doesn't offer capabilities for viewing the system of consolidated health such as Policy and Charging Rules Function (PCRF) Diagnostics. PCF relies significantly on numerous Kubernetes commands to determine the system of health.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 357

How It Works

Serviceability Diagnostics

PCF implements the diagnostics utility to provide the health check consolidated output of different critical services on the PCF namespace. Validates health of pods, services, and ingress points and produces a pass or fail health check status for each service. The services for the health check:
· Rest-endpoint · Engine · Diameter · Common Data Layer (CDL) · ETCD · Database (DB) Admin
Utility Details: · Critical Pod Service Health Check and other Pods Check : When the status argument is "all", then all pods health check for previous mentioned services gets executed. · CDL Pods Health Check: · When the status argument is "cdl" for the CDL pods health check, then the health check gets executed. · When the cdl-ep pods are up and running, then the geo sync functionality gets validated, and the execution status gets displayed.
· Database Pods Health Check: · When the status of the argument is "db" for the DB pod of the health check, then the health check gets executed. · When the pods are up, then the accessibility of the database gets performed.
How It Works
This section describes how this feature works.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 358

5 2 C H A P T E R

Session Queries over LDAP

· Feature Summary and Revision History, on page 359 · Feature Description, on page 360 · How it Works, on page 360 · Enabling the Policy Server to Process the NAP and LDAP Queries, on page 364 · Configuration Support for PCF-NAP Requests, on page 367 · Configuration Support for LDAP Endpoint, on page 368 · OAM Support, on page 370
Feature Summary and Revision History

Summary Data
Table 176: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Disabled ­ Configuration required to enable Not Applicable

Revision History
Table 177: Revision History
Revision Details Enhancement introduced. Added procedural information to configure the LDAP Endpoint. First introduced.

Release 2020.02.0
2020.01.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 359

Feature Description

Session Queries over LDAP

Feature Description
In the policy-based network, the SPR/LDAP initiates a NAP notification towards PCF to signify a profile change. Upon receiving the notification, the PCF refreshes the subscriber profile by requerying LDAP to receive information about the modified subscriber. If the NAP endpoint terminates on PCRF, the PCRF forwards the NAP request to PCF when it does not find the session in the local database. In situations where the NAP endpoint terminates on PCF, the PCF requeries LDAP and CHF to refresh the subscriber details.
How it Works
This section describes how this feature works.
NAP Notifications
When you modify subscriber details, the NAP server, LDAP server, and PCF or PCRF perform the following operations:
NAP request termination on the PCRF 1. The LDAP server updates the NAP server with the modified details. 2. The NAP server broadcasts the Subscriber Change Notification message to the connected PCRF server.
The message contains the unique identifier, and MSISDN or IMSI ID. 3. After receiving the message, the PCRF sends an acknowledgment to NAP. The PCRF then searches for
the local session. 4. If the subscriber session is active on the PCRF, then PCRF requests the updated subscriber information
from SPR or LDAP server. Depending upon the information it receives, PCRF updates the local session with the updated subscriber information and sends a Re-Auth-Request (RAR) for the Policy and Charging Rules Function (PCEF). For example, if PCRF identifies a session for the notification that contains the specified MSISDN in the PCRF then it triggers a Gx-RAR for the subscriber sessions. 5. If PCRF does not find the subscriber session locally, then the Policy Server forwards the Subscriber Change Notification to PCF. After receiving notification, PCF seeks the session locally and takes the appropriate action.
NAP request termination on PCF When profile changes occur in NAP, it signifies that certain policies are added or modified. In this situation, the PCF performs the following: 1. Upon receiving a notification from NAP, the PCF initiates a requery or refresh request. 2. The PCF sends an N28 Subscribe Update request seeking the details of the policies that are added or
updated. 3. After receiving the updates, the PCF reevaluates the policies to determine the updated policies and sends
the Update_Notify message to SMF (over the N7 interface).
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 360

Session Queries over LDAP

LDAP Queries

LDAP Queries
The Policy Server manages the 4G and 5G subscriber information in separate modules, which indicates that the PCRF continues to store the 4G-specific information, and PCF preserves the 5G-specific details. When the Policy Server receives a request seeking subscriber information, the LDAP with other components performs the following tasks:
1. The LDAP queries the MongoDB or Subscriber Profile Repository (SPR) by sending the "Get Subscriber Information" message.
2. After receiving the query, the Policy Server searches the subscriber information in the local MongoDB instance.
3. After receiving the search query, the Policy Server searches the subscriber information in the local MongoDB instance.
4. If the Policy Server discovers the subscriber information on PCRF, it sends the details to LDAP in the defined format. If the PCRF does not find the information, it forwards the request to PCF for further processing.
5. When PCF detects the information, it notifies PCRF with the subscriber information, which the PCRF forwards to the LDAP in the specified format.

Call Flows

This section describes the key call flows for this feature.

NAP Notification Call Flow
This section describes the NAP Notification call flow.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 361

NAP Notification Call Flow Figure 75: NAP Notification Call Flow

Session Queries over LDAP

Table 178: NAP Notification Call Flow Description
Step Description 1 The SMF sends an N7 Create request to the PCF requesting the policy details. 2 The PCF searches for the configured policies by sending the LDAP Search request towards LDAP. 3 The LDAP sends the response with search results in the LDAP Search success message to the PCF. 4 PCF evaluates the policies to determine the newly added or modified policies, and install the rules as
required. The PCF responds with a set of pccRules to the original N7_Create request from the SMF with HTTP status 201.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 362

Session Queries over LDAP

LDAP Server Initialization Call Flow

Step Description 5 The NAP sends a SOAP request for Subscriber Profile Change to the PCF. 6 In response to the request, PCF sends a Success response along with the requested subscriber
information to NAP. 7 After PCF initiates a search request to LDAP, the PCF sends a LDAP Search request to LDAP. 8 The LDAP responds with LDAP_Search success message and the search results to the PCF. 9 PCF reevaluates the policies to determine the updated or modified policies, and installs or removes
the policy rules as required. The PCF initiates an N7 Notify request to the SMF. 10 The SMF acknowledges the request with the N7 Notify response message towards the PCF.
LDAP Server Initialization Call Flow
This section describes the LDAP Server Initialization call flow.
Figure 76: LDAP Server Initialization Call Flow

Table 179: LDAP Server Initialization Call Flow Description
Step Description 1 The SMF sends an N7 Create request to the PCF requesting the policy details. 2 The PCF searches for the configured policies by sending the LDAP Search request towards LDAP. 3 The LDAP sends the response with search results in the LDAP Search Success message to the PCF.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 363

Enabling the Policy Server to Process the NAP and LDAP Queries

Session Queries over LDAP

Step Description 4 PCF evaluates the policies to determine the newly added or modified policies, and install the rules as
required. The PCF responds with a set of pccRules to the original N7 Create request from the SMF with the HTTP status 201. 5 The LDAP Client sends an LDAP request for Subscriber Profile Change to the PCF. 6 In response to the request, PCF sends a Success response along with the requested subscriber information to LDAP Client.
Enabling the Policy Server to Process the NAP and LDAP Queries
The configuration that enables the Policy Server to forward the NAP and LDAP queries to PCF or PCRF involves the following: 1. Configuring the gRPC Endpoint for PCF 2. Configuring the Forwarding Capability
Configuring the gRPC Endpoint for PCF
This section describes how to configure the gRPC endpoint to route the messages for PCF. To set up the endpoint for gRPC, use the following configuration: config
engine engine_group_name grpc externalIPs external_ip port port_number end
For example, engine magenta grpc externalIPs [192.0.2.18] port 8080 NOTES:
· engine engine_group_name --Specify the engine group name. · grpc externalIPs external_ip--Specify the gRPC external IP address. · port port_number--Specify the port number.
Configuring the Forwarding Capability
This section describes how to configure the forwarding capability.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 364

Session Queries over LDAP

Configuring the Forwarding Capability

For High Availability (HA) or Geographic Redundancy (GR) environments, ensure that the PCF Engine can access the Policy Server VMs. You can configure the capability responsible for routing the notification and queries by adding the following parameters to the qns.conf file.
The following table describes the application parameters.
Table 180: Application Parameters

Parameter Name -DsubmitToPCF
-Dpcf.host

Description

Default Value Possible Values

Example

When set to true, False PCRF sends NAP and LDAP requests to the PCF Engine.
For HA or GR deployment, the external PCF Engine must be able to access the Policy Server VMs.
Enable this feature on PCRF.
This is an optional parameter.

True or False -DsubmitToPCF=true

Host or IP

-

address of the

PCF Engine on

which PCRF

sends the NAP

and LDAP

request. This

parameter works

when you set the

submitToPCF

parameter to true.

Configuring this parameter is an optional step.

IP or host address

-Dpcf.host=192.0.2.19

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 365

Configuring the Forwarding Capability

Session Queries over LDAP

Parameter Name

Description

Default Value Possible Values

Example

-Dpcf.alternate.host

Host or IP

-

address of the

PCF Engine on

which PCRF

sends the NAP

and LDAP

requests.

The NAP and LDAP requests are sent to the specified IP or host address when the address specified in the ­Dpcf.host parameter is not accessible from the Policy Server.

This parameter is usable only when you set the submitToPCF parameter to true.

Configuring this parameter is an optional step.

The IP or host -Dpcf.alternate.host

address

=192.0.2.20

-Dpcf.actions.sync.timeout The timeout

Ms.default

period in milliseconds.

350

An integer

(recommended value

value)

Policy Server reports a timeout message when the PCRF sends a NAP and LDAP request and waits for the response until the specified interval is met.

Configuring this parameter is an optional step.

-Dpcf.actions.sync.timeout Ms.default=350

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 366

Session Queries over LDAP

Configuration Support for PCF-NAP Requests

Parameter Name -Dpcf.engine.port

Description

Default Value Possible Values

The port number 9884 on which the PCF Engine is running.
The NAP and LDAP requests are directed to this port number.

An integer value

Example -Dpcf.engine.port=9884

Configuration Support for PCF-NAP Requests
This section describes the prerequisites and configurations that are required to support the PCF-NAP communication. This configuration support involves the following:
· Prerequisites for PCF-NAP Requests
1. Configuring the Unified API 2. Setting a Limit on NAP Requests
Prerequisites for PCF-NAP Requests
This section describes the prerequisites that must be met for PCF-NAP communication. For PCF-NAP interaction, make sure that the following configurations are available in your environment:
· N7 interface must be configured. For information on configuring the N7 interface, see Configuration Support for the N7 and N28 Interface, on page 375.
· LDAP must be configured to operate with PCF. For information on configuring the LDAP, see Configuring PCF to use LDAP, on page 155.
Configuring the Unified API
This section describes how to configure the unified API through the PCF Ops Center. PCF receive NAP requests to requery the LDAP and reevaluate policies after receiving notification about profile change from NAP, so the new policies are applied. PCF receives the NAP requests through the unified API ingress endpoint. To configure the unified API, use the following configuration in the Policy Ops Center console: config
api unified engine-group engine_group_name external-port external_ip

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 367

Setting a Limit on NAP Requests

Session Queries over LDAP

externalIPs external_ip end NOTES: · api unified--Enter the unified API configuration mode. · engine-group engine_group_name --Specify the PCF engine's group name. · external-port port_number--(Optional) Specify the service to be accessed using an external IP instead of an Ingress endpoint. Specifies the external port number to expose the unified API endpoint. · externalIPs external_ip--(Optional) Specify the service to be accessed using an external IP instead of an Ingress endpoint. Specifies the IP address for the external endpoint.
Setting a Limit on NAP Requests
This section describes how to set a limit on the number of NAP requests for PCF to process. To configure the maximum number NAP requests TPS per PCF Engine deployment, use the following configuration in the Policy Ops Center console: config
engine engine_name properties broadcast.tps value tps end
NOTES: · engine engine_name --Specify the engine name. · properties broadcast.tps value tps--Specify the maximum number of NAP requests TPS that each PCF Engine must process. The default value is 20.
Configuration Support for LDAP Endpoint
This section describes how to configure the LDAP server endpoint that enables PCF to establish a connection with LDAP. The configuration of the LDAP server endpoint involves the following steps: 1. Configuring the LDAP Endpoint 2. Setting a Limit on LDAP Search Request
Configuring the LDAP Endpoint
This section describes how to configure the LDAP server endpoint and the associated filter mappings. Based on the LDAP endpoint configuration, the LDAP endpoint authenticates itself with PCF to retrieve the subscriber details through the search query.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 368

Session Queries over LDAP

Configuring the LDAP Endpoint

Note Configuration changes to the LDAP endpoint cause the endpoint to restart automatically. Cisco recommends making such changes only within the maintenance window.
To configure the LDAP server endpoint, use the following configuration in the Policy Ops Center console:
config ldap-server-endpoint connect bind-ip ip_address port port_number binddn username password password request-timeout timeout replica replica_count max-transactions maximum_transaction health-check-attributes attribute_name valueattribute_value health-check-filter name attribute_name valueattribute_value ldap-clients client_name passwordpassword input-mapping filter_from_client internal-lookup-key [ IMSI | IP_ADDRESS | MSISDN ] output-mapping output_attribute_name input session_attribute_name end
NOTES: · ldap-server-endpoint--Enters the LDAP server endpoint configuration mode.
· connect--Enters the LDAP connection configuration.
· bind-ip ip_address port port_number request-timeout timeout--Specify the external IP address and port number to which the LDAP client can connect to externally. The default port number is 9389.
· binddn username password password--Specify the user DN, for example: cn=manager, ou=account, so=profile, and password for connecting to the LDAP server.
· request-timeout timeout_duration --Specify the duration in milliseconds after which the request expires. The request awaits a response from the PCF engine. The default timeout value is 2000.
· replica replica_count --Specify the replica count for the LDAP server.
· max-transactions maximum_transaction--Specify the maximum number of transactions per second that each connection must process. The default value is 200.
· health-check-attributes attribute_name value attribute_value--Specify the attribute name and value that the client receives as a response to the health check request.
· health-check-filter name attribute_name value attribute_value--Specify the attribute name and value that distinguishes the health check request.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 369

Setting a Limit on LDAP Search Request

Session Queries over LDAP

· ldap-clients client_name password password--Specify the configuration that PCF uses to configure multiple client authentication parameters.
· input-mapping filter_from_client--Specify the configuration to map the filter ID received from LDAP client and the internal-lookup-key. The accepted value must contain text string. For example, IMSI, MSISDN, framedIp, framedIpv6Prefix. You can configure the input mapping separately for frameIP, MSISDN, IMSI, and framedIpv6Prefix.
· internal-lookup-key [ IMSI | IP_ADDRESS | MSISDN ]--Configures the internal lookup key.
· output-mapping output_attribute_name input session_attribute_name --Specify the table that is used to defile the response attributes for the client. The response attribute name is mapped to the internal CPS session attributes for added flexibility.

Note PCF does not process the requests for which the output-mapping configuration is missing. The response attributes contain only those values that are configured in the output mapping as input key.
You can configure multiple supported keys only if they are available in the PCF session. The input keys can be duplicate but not the output values that you cannot configure two output-mappings with the same values.
Setting a Limit on LDAP Search Request
This section describes how to set the limit on the number of LDAP search requests for PCF to process. To configure the maximum number LDAP requests TPS per replica, use the following configuration in the Policy Ops Center console:
config ldap-server-endpoint connect max-transactions max_tps end
NOTES: · max-transactions max_tps --Specify the maximum number of LDAP requests TPS that each replica must process. The default value is 200.

OAM Support
This section describes operations, administration, and maintenance support for this feature.

Statistics

This section provides the list of statistics and counters that are involved when the Policy Server routes the LDAP queries and NAP notification to PCF or PCRF.
· PCF:

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 370

Session Queries over LDAP

Statistics

· inbound_request_total: Captures the total number of inbound LDAP search requests that PCF receives.
· incoming_request_total: Captures the total number of search results that contain the result code.
· LDAP_CHANGE-RES success: Invoked when the LDAP change message is successfully sent to the PCF Engine.
· LDAP_CHANGE-RES error: Invoked when the LDAP change message is not sent to the PCF Engine because of some exception.
· LDAP_SEARCH-RES success: Invoked when the LDAP query receives successful response from the PCF Engine.
· LDAP_SEARCH-RES error: Invoked when the LDAP queries fail to process due to an error or an exception.
· ldap_policy_request_total: Captures the total count of LDAP policy requests.
· message_total: Captures the total NAP requests such as total count of ldap_notify and ldap-change-message messages.
· PCRF: · ldap_change_success: Invoked when the PCRF receives success response from PCF for a NAP notification.
· ldap_change_timeout: Invoked when the PCRF receives timeout response from PCF for a NAP notification.
· ldap_change_<MessageType>: Invoked when the PCRF receives an error message from PCF for a NAP notification.
· ldap_search_success: Invoked when the PCRF receives success response from the PCF for the LDAP queries.
· ldap_search_timeout: Invoked when the PCRF receives timeout response from the PCF for the LDAP queries.
· ldap_search_<MessageType>: Invoked when the PCRF receives an error message from the PCF for the LDAP queries.
· PCRF counters: · ldap_search_send: Captures the count of the cumulative number of the LDAP queries which the PCRF sends to the PCF.
· ldap_change_send: Captures the count of the cumulative number of the NAP notifications that PCRF sends to the PCF.
For information on statistics, see Ultra Cloud Core 5G Policy Control Function Statistics Reference.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 371

Statistics

Session Queries over LDAP

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 372

5 3 C H A P T E R

Specification Compliance - N7 and N28

· Feature Summary and Revision History, on page 373 · Feature Description, on page 374 · Configuration Support for the N7 and N28 Interface, on page 375
Feature Summary and Revision History

Summary Data
Table 181: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Disabled ­ Configuration required to enable Not Applicable

Revision History

Table 182: Revision History

Revision Details

Release

Enhancement introduced.

2020.01.0

With this release, various service configurations are added and enhanced for compliance with the 3GPP December 2018 specification. The procedures to configure use case initiators and retrievers are also added.

First introduced.

Pre 2020.01.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 373

Feature Description

Specification Compliance - N7 and N28

Feature Description
PCF complies to the 3GPP December 2018 specification by supporting the N7 and N28 interfaces.

Relationships
The SMF should comply to 3GPP December 2018 specification so that PCF can apply the dedicated bearer rules to SMF.

Components
The following components are involved when PCF is configured to work with the N7 and N28 interface. · N15 Interface · N28 Interface · N7 Interface · N5 Interface

N15 Interface N28 Interface N7 Interface N5 Interface Rx Interface

The N15 interface complies with 3GPP TS 29.507 Release 15 specification.
The N28 interface complies with the 3GPP December 2018 specification. Hence, no compliance changes are required on the N28 interface for this feature.
The pcf-rest-ep and pcf-engine comply with the 3GPP December 2018 specification.
The pcf-rest-ep and pcf-engine comply with the 3GPP December 2020 specification.
With the N7 interface being 3GPP December 2018 specification compliant, PCF supports the notification of rule status of the dedicated bearer rules. You can configure this support with the new "ruleReports" parameter, which is sent in the SmPolicyUpdateRequest message. This parameter consists of the report of rule status as successful or failed. When IMS initiates multimedia calls, PCF installs the dedicated bearer rules on the SMF nodes. SMF enforces these rules and provides the status of these rules to PCF in the ruleReports parameter. Following are some of the subparameters of the ruleReports parameter that the feature supports:
· Array of pccRuleIds

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 374

Specification Compliance - N7 and N28

Configuration Support for the N7 and N28 Interface

· Rule Status · Failure Code
The N5 (Rx) interface works in the following way: · If the AAR message on the N5 interface receives the "INDICATION_OF_SUCCESSFUL_RESOURCES_ALLOCATION (8)" action, PCF sends the "SUCC_RES_ALLO" event trigger to SMF in the SmPolicyUpdateNotify message. · SMF sends the status report in the SmPolicyUpdateRequest message. When PCF sends the "SUCC_RES_ALLO" event trigger, ruleReports parameter consists of the rules with the Rule Status as Active. Rule Status value can either be "Active" or "Inactive". PCF sends these rule reports through Rx_RAR toward AF. · The ruleReports parameter also consists of "Inactive" rules along with their Failure Status. If some rules are Inactive, PCF sends the failure report of these in Rx_RAR to AF. If all the rules are Inactive, PCF sends the failure report of these rules in Rx_ASR to AF.
Note PCF sends the failure report to AF if the Rx session has already requested the "INDICATION_OF_FAILED_RESOURCES_ALLOCATION(9)" specific action in AAR.
· PCF handles reporting of both Active and Inactive rule status in the same ruleReports along with the "SUCC_RES_ALLO" event trigger.
· If multiple Inactive rules exist under ruleReports with multiple failureCode, then all the rules are mapped to only single Specific-Action. Then, PCF sends these rules in the Rx_RAR (or abort-cause for Rx_ASR).
Configuration Support for the N7 and N28 Interface
This section describes how to configure the N7 and N28 interface by configuring the following services: · SessionRule · SessionRuleAction · SessionRuleConditionData · QosData · TableDrivenQosDecision · TableDrivenDynamicPccRule · Use Case Initiators · Retrievers

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 375

SessionRule

Specification Compliance - N7 and N28

SessionRule
This section describes how to configure SessionRule Service. The SessionRule service configuration consists of policy information elements that are associated with a PDU session. The object configures the QoS attributes for the default bearer. Before setting the service parameters, ensure that you create a use case template and add a service for this configuration. For details, see Configuring the Use Case Template, on page 349 and Adding a Service, on page 348. To configure the SessionRule service, use the following configuration: 1. Log in to Policy Builder.
2. Click the Services tab.
3. Configure the following parameters: a. From the Use Case Template pane, select the N7 service configuration object.
b. From the Service Configurations pane, select SessionRule.
c. Click Add.
4. From the N7 service configuration, click SessionRule. The service configuration parameters appear in the right pane.
5. Configure one or more of the following SessionRule parameters: · Sess Rule Id: Enter a unique value to identify the session rule within a PDU session.
· Uplink: This parameter is the Aggregate Maximum Bit Rate (AMBR) for the uplink frequency. Configure the value of this parameter in BitRate.
· Downlink: This parameter is the AMBR for the downlink frequency. Configure the value of this parameter in BitRate.
· 5qi: This 5G QoS Identifier identifies a specific QoS forwarding behavior for a 5G QoS flow. Configure a numeric value for this parameter.
· Arp: Configure the following Allocation Retention Priority levels: · Priority Level: Configure this parameter to define the relative importance of a resource request.
· Preempt Cap: Configure this parameter to define a service data flow to reassign the resources. These resources are already assigned to another service data flow with a lower priority level.
· Preempt Vuln: Configure this parameter to define a service data flow to lose the assigned resources for admitting a service data flow with a higher priority level.
· Priority Level: Configure this parameter to indicate the 5QI priority level. Enter a value from 1 through 127, where 1 implies the highest level, and 127 implies the lowest level.
· Aver Window: Configure this parameter to indicate the Averaging Window, which is in milliseconds. Enter a value from 1 through 4095, where 1 implies the minimum averaging level and 4095 implies the maximum averaging level.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 376

Specification Compliance - N7 and N28

SessionRuleAction

· Max Data Burst Vol: Configure this parameter to indicate the Maximum Data Burst Volume, which is in bytes. Enter a value from 1 through 4095, where 1 implies the minimum data burst volume and 4095 implies the maximum data burst volume.
6. Click Add.
SessionRuleAction
This section describes how to configure the SessionRuleAction service. The SessionRuleAction service configures the values for the various SessionRuleAction attributes that are based on Policy or the configured SessionRule. Before setting the service parameters, ensure that you create a use case template and add a service for this configuration. For details, see Configuring the Use Case Template, on page 349 and Adding a Service, on page 348. To configure the SessionRuleAction service parameters, use the following configuration: 1. Log in to Policy Builder. 2. Click the Services tab. 3. Configure the following parameters:
a. From the Use Case Template pane, select the N7 service configuration object. b. From the Service Configurations pane, select SessionRuleAction. c. Click Add.
The Select Service Configuration window appears. 4. From the N7 service configuration, click SessionRuleAction.
The service configuration parameters appear in the right pane. 5. For all the parameters of SessionRuleAction service, configure one of the following options:
· Mirror: The value that is requested on the N7 interface is granted. · Enforce: The default bearer QoS value is granted. Enforce is the default value. · Bound: The minimum value between the configured value, and the requested value is granted and
is sent back as a response.
6. Click Add.
SessionRuleConditionData
This section describes how to configure the SessionRuleConditionData service. The PCF schema lets you set a threshold for an active SessionRules service by configuring the SessionRuleConditionData service. The value that you define in this service configuration indicates the period for which the SessionRules service remains active. After the set period is complete, the SessionRules service is deactivated. The SessionRuleConditionData service includes the Extend Deactivation parameter. If you

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 377

QosData

Specification Compliance - N7 and N28

have configured the Extend Deactivation parameter and an event occurs within the configured interval, then PCF extends the waiting period. For example, if the deactivation time is set to 2 hours, and an event occurs after 1 hour, then the activation time is extended by 2 hours from the time the event happened. The service remains active for 3 hours.
Before setting the service parameters, ensure that you create a use case template and add a service for this configuration. For details, see Configuring the Use Case Template, on page 349 and Adding a Service, on page 348.
To configure the SessionRuleConditionData service parameters, use the following configuration: 1. Log in to Policy Builder.
2. Click the Services tab.
3. From the Use Case Template pane, select the N7 service configuration object.
4. From the Service Configurations pane, select SessionRuleConditionData, and click Add. The Select Service Configuration window appears.
5. From the N7 service configuration, click SessionRuleConditionData.
The service configuration parameters appear in the right pane.
6. Configure one or more of the following SessionRuleConditionData parameters: · Priority: Enter an integer value to indicate the priority of the service configuration object. This value is considered in case multiple service initiator conditions match.
· Deactivation Time (In Minutes): Specify the time in minutes after which the SessionRule service is deactivated.
· Deactivation Time (In Hours): Enter the time in hours after which the SessionRule service is deactivated.
· Deactivation Time (In Seconds): Specify the time in seconds after which the SessionRule service is deactivated.

Note PCF aggregates the values that you specify in hours, minutes, and seconds to determine the deactivation time.
· Extend Deactivation: If set to true, then PCF extends the SessionRule service deactivation time for the period that you have specified for deactivation.

QosData

This section describes how to configure the QosData Service.
The QosData Service configuration is updated with the parameters to meet the 3GPP December 2018 specification compliance.
Before setting the service parameters, ensure that you create a use case template and add a service for this configuration. For details, see Configuring the Use Case Template, on page 349 and Adding a Service, on page 348.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 378

Specification Compliance - N7 and N28

TableDrivenQosDecision

To configure the QosData service from Policy Builder, use the following configuration: 1. Log in to Policy Builder. 2. Click the Services tab. 3. Configure the following parameters:
a. From the Use Case Template pane, select the N7 service configuration object. b. From the Service Configurations pane, select QosData. c. Click Add.
4. From the N7 service configuration, click QosData. The Select Service Configuration window appears.
5. Configure one or more of the following QosData parameters: · Qnc: Enter a boolean value for this parameter. This parameter indicates whether notifications are requested from 3GPP NextGen RAN (NG-RAN) when the Guaranteed Flow Bit Rate (GFBR) is no longer available for a QoS Flow during the lifetime of the QoS Flow. By default, the value of this parameter is False. · Priority Level: Enter an integer value to indicate the scheduling of resources among QoS Flows. · Aver Window: Enter an integer value to indicate the duration for which the guaranteed, and maximum bitrate is to be calculated. · Max Data Burst Vol: Enter an integer value to indicate the maximum amount of data to be transferred for 5G-AN PDB. · Reflective QoS: Enter a boolean value to indicate whether the QoS information is reflective for the corresponding Service Data Flow. The default value of this parameter is False. · Sharing Key Dl: Configure this parameter to indicate the PCC rules that can share a resource in the downlink direction. · Sharing Key Ul: Configure this parameter to indicate the PCC rules that can share a resource in the uplink direction. · Max Packet Loss Rate Dl: Configure this parameter to indicate the downlink maximum rate for the lost packets that can be used for a service data flow. · Max Packet Loss Rate Ul: Configure this parameter to indicate the uplink maximum rate for the lost packets that can be used for a service data flow. · Def Qos Flow Indication: Enter a boolean value to indicate the binding of QoS Flow, which is associated with the default QoS rule, with the dynamic PCC rule. The default value of this parameter is False.
6. Click Add.
TableDrivenQosDecision
This section describes how to configure the TableDrivenQosDecision Service.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 379

TableDrivenQosDecision

Specification Compliance - N7 and N28

The TableDrivenQosDecision service configuration captures the data from the custom CRD table for the newly added fields. This table defines and associates the parameters in the table. Before setting the service parameters, ensure that you create a use case template and add a service for this configuration. For details, see Configuring the Use Case Template, on page 349 and Adding a Service, on page 348. To configure the TableDrivenQosDecision service parameters, use the following configuration: 1. Log in to Policy Builder.
2. Click the Services tab.
3. Configure the following parameters: a. From the Use Case Template pane, select the N7 service configuration object.
b. From the Service Configurations pane, select TableDrivenQosDecision.
c. Click Add.
The Select Service Configuration window appears.
4. From the N7 service configuration, click TableDrivenQosDecision. The service configuration parameters appear in the right pane.
5. Configure one or more of the following TableDrivenQosDecision parameters: · Qnc Source: Enter the primary key value for the column configured under Search Column.
· Authorized QoS Priority Level: Specify the priority that is used for scheduling the resources among the QoS Flows.
· Aver Window Source: Specify the duration over which the guaranteed, and maximum bitrate is calculated.
· Max Data Burst Vol Source: Enter the maximum amount of data that is required to be transferred within a period of 5G-AN PDB.
· Reflective QoS Source: Specify the value that applies reflective QoS for the SDF.
· Sharing Key Dl Source: Specify the value that indicates resource sharing in downlink direction with the service data flows having the same value in their PCC rule.
· Sharing Key Ul Source: Specify the value that indicates resource sharing in an uplink direction with the service data flows having the same value in their PCC rule.
· Max Packet Loss Rate DI Source: Specify the maximum rate for lost packets that can be tolerated in the downlink direction for the service data flow.
· Max Packet Loss Rate UI Source: Enter the maximum rate for lost packets that can be tolerated in the uplink direction for the service data flow.
· Def QoS Flow Indication Source: Enter the value that indicates the dynamic PCC rule that shall always have its binding with the default QoS Flow.
Only the mandatory parameters are listed in this section. For the complete list of parameters, see TableDrivenQosDecision, on page 125.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 380

Specification Compliance - N7 and N28

TableDrivenDynamicPccRule

6. Click Add.
TableDrivenDynamicPccRule
This section describes how to configure the TableDrivenDynamicPccRule service. The TableDrivenDynamicPccRule service configuration shows one or more PCC rules that are available in the custom reference data table. Before setting the service parameters, ensure that you create a use case template and add a service for this configuration. For details, see Configuring the Use Case Template, on page 349 and Adding a Service, on page 348. To configure the TableDrivenDynamicPccRule service parameters, use the following configuration. 1. Log in to Policy Builder. 2. Click the Services tab. 3. Configure the following:
a. From the Use Case Template pane, choose the N7 service configuration object. b. From the Service Configurations pane, choose TableDrivenDynamicPccRule. c. Click Add.
The Select Service Configuration window appears. 4. From the N7 service configuration, click TableDrivenDynamicPccRule.
The service configuration parameters appear in the right pane. 5. Configure one or more of the following TableDrivenDynamicPccRule parameters:
· Search Table: Enter the name of the table that is used to perform a lookup. · Search Column: Enter a value, which is associated with the primary key column of the STG. The
data that is contained in the STG column has a text value. · Search Value: Enter a value of the Search Column primary key to perform a lookup in Search
Table. · Input List (List): If the lookup requires extra key or value pairs, then configure this field using
InputColumn under Input List. · Column Name: Enter a value that is associated with the additional key column of STG. · Column Value: Enter the value that you have entered for the Column Name field.
· Pcc Rule Id Source: Specify a value for the key column that is associated with the PccRuleId column within the STG. The data that is contained in the STG column has a text value.
· Precedence Source: Enter a value for this field that is associated with the Precedence column in STG. The data that is contained in the STG column has a numeric value. For the allowed values, see 3GPP specification 29.512.
· App Id Source: Specify a value that is associated with the App Id column in the STG. The data that is contained in the STG column has a text value.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 381

Use Case Initiators

Specification Compliance - N7 and N28

· Qos Id Source: Enter a value that is associated with the Qos Id column in the STG. The data that is contained in the STG column has a text value.
· Chg Id Source: Specify a value that is associated with the Chg Id column in the STG. The data that is contained in the STG column has a text value.
· Flow Information Source: Enter a value that is associated with the Flow Information column in the STG. The data that is contained in the STG column has a text value. Only the mandatory parameters are listed in this section. For the complete list of parameters, TableDrivenDynamicPccRule, on page 127.
Note · Use the following format to add the Flow Information Source parameter for PCF to perform Flow Information grouped parameter mapping: Multiple Flow Information is separated by "," as delimiter, whereas each Flow Information the format is: <Flow Description1>;<packetFilterUsage1>;<Tos TrafficClass1>;<Spi1> ;<Flow Label1>;<Flow Direction1>, <Flow Description2>;<packetFilterUsage2>
· Using an incorrect format results in missing the Flow Information value.
6. Click Add.
Use Case Initiators
This section describes how to configure the Use Case Initiators. Use case initiators are a group of conditions that indicate the time, event, or functionality for a specific service to be added for a subscriber. If no use case initiators are configured, then the service configuration objects are added. 1. Log in to Policy Builder. 2. Click the Services tab. 3. From the Use Case Template pane, select the N7 service configuration object, and click the Use Case
Initiators tab. 4. In the Service Initiators (OR Together) field, configure multiple use case initiators, which activate
the Use Case Template and its service configurations. Service Initiators are a group of conditions. If any one of the service initiators of the use case template is true then the service configuration of that use case template are used.
Note In the Service Initiators (OR Together) box, select the add icon to add a service initiator and close icon to remove a service initiator. Use the up or down arrow buttons to specify the order in which service initiators are to be evaluated.
5. In the Initiator Name field, enter a name for the group of conditions.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 382

Specification Compliance - N7 and N28

Conditions of Input Variables

6. In the Conditions (AND Together) field, click Add.
The condition box appears.
7. Select one or more conditions from the Select a Condition Phrase window from the PCF, N7, 3GPP, or N28 3GPP messages option. The conditions that you add are associated with the service initiator. Conditions are related to the messages session, subscriber information, balance information, or the message itself.
The conditions that you select appear in the Conditions (AND Together) box.

Note If multiple conditions exist for the Conditions (AND Together) box, then all the chosen conditions must be true for them to be configured.
8. In the Conditions (AND Together) box, click one or multiple conditions. The input variables for the selected condition appear in the right pane.
9. From the available input variables, add all or the required input variables. See the Conditions of Input Variables, on page 383 section for the conditions to configure for the input variables. The input variables are added.
10. Configure the values for the added variables. The use case initiators are configured.

Conditions of Input Variables

The table lists the conditions for the input variables.

Condition for Input Variable

Description

A Policy Request Message exists

An N7, N15, N28, or UDR Policy Request message exists in the system.

A Policy Request Message does not exist

An N7, N15, N28, or UDR Policy Request does not exist in the system.

A Policy Message exists

An N7, N15, N28, or UDR Policy Request or Response message exists in the system.

A Policy Message does not exist

An N7, N15, N28, or UDR Policy Request or Response message does not exist in the system.

A Policy Response Message exists

An N7, N15, N28, or UDR Policy Response message exists in the system.

A Policy Response Message does not exist

An N7, N15, N28, or UDR Policy Response message does not exist in the system.

A Policy N7 TGPP Session exists

A valid N7 TGPP session exists in the Policy Builder configuration for a subscriber.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 383

Retrievers

Specification Compliance - N7 and N28

Condition for Input Variable A Policy N7 TGPP Session does not exist A N28 TGPP Session exists A N28 TGPP Session does not exist

Description
A valid N7 TGPP session does not exist in the Policy Builder configuration for a subscriber.
A valid N28 TGPP session exists in the Policy Builder configuration for a subscriber.
A valid N28 TGPP session does not exist in the Policy Builder configuration for a subscriber.

Retrievers

Retrievers are the values that are retrieved for the key columns from the custom reference data table. You can retrieve the value of retrievers in the following ways in Policy Builder.
· Using the Service Configuration option · Using the custom reference data table
Following is the list of the available session-level retrievers in PCF: · N7 Access Type · N7 Cell Global Identifier · N7 DNN · N7 GPSI · N7 MCC (SUPI Based) · N7 MNC (SUPI Based) · N7 Permanent Equipment Identifier · N7 RAT Type · N7 Serving Network · N7 SliceInformation · N7 SUPI · N7 Tracking Area Identifier

Note These retrievers are session-level retrievers and not the message-level retrievers. It implies that as a request is received, a session is created in the database for a subscriber. Then, the value of these retrievers is retrieved from those sessions.
Configuring Retrievers through Custom Reference Data Table
This section describes how to configure the retrievers through the custom reference data table.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 384

Specification Compliance - N7 and N28

Configuring Retrievers through Service Configuration

1. Log in to Policy Builder. 2. From the Custom Reference Data Tables pane, select a rule.
The parameters of the selected custom reference table appear in the right pane. 3. In the Columns box, select a key column. 4. Click the Bind to Session/Policy State option and click Select.
A dialog box with the list of available retrievers appears. 5. In the text box, enter N7 or N15to view all the newly added retrievers. 6. Select a retriever and click OK.
Configuring Retrievers through Service Configuration
This section describes how to configure the retrievers through the service configuration. 1. Log in to Policy Builder. 2. From the Services pane, click the N7/N15 service-compliant configuration. 3. Select a service configuration from Service Configurations box.
The parameters of the selected service parameters appear. 4. Choose a parameter and click the pull value icon to pull a value for the parameter.
The Dynamically pull this value from window appears. 5. Click the Bind to Session/Policy State option and click Select.
A window showing the list of available retrievers appears. 6. In the text box, enter N7 or N15 to view all the newly added retrievers. 7. Select a retriever and click OK.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 385

Configuring Retrievers through Service Configuration

Specification Compliance - N7 and N28

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 386

5 4 C H A P T E R

Status Monitoring Using Commands

· Feature Summary and Revision History, on page 387 · Feature Description, on page 388 · Viewing the Connection and Registration Status, on page 388 · Viewing the NFs Connected to PCF, on page 389 · Viewing the Discovered Endpoint, on page 389 · Fetching the Subscriber Sessions, on page 390
Feature Summary and Revision History

Summary Data
Table 183: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled ­ Configuration required to disable Not Applicable

Revision History
Table 184: Revision History
Revision Details Enhancement introduced. Introduced procedure to view the NF connection status First introduced.

Release 2020.03.0
2020.01.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 387

Feature Description

Status Monitoring Using Commands

Feature Description
PCF allows you to view the Diameter peer, LDAP connection, and NRF registration status using the PCF Ops Center. Alternatively, you can access this information from the Grafana dashboard. For information on Grafana, see the Ultra Cloud Core 5G Policy Control Function Statistics Reference.
PCF provides an in-depth information about the NF endpoint that it has discovered through NRF. PCF discovers an NF endpoint only when both, PCF and the NF are registered with the same NRF. PCF also lets you view the subscriber session details across the configured regions.

Viewing the Connection and Registration Status

This section describes how to view the Diameter peer, LDAP connection, and NRF registration status.

Based on the component that you want to view the status for, use the following configuration:

· To view the status of the configured Diameter peers, use the following configuration:

show diameter peer-status

The output of this command displays the peer hostname, peer realm, and the peer status.

The following is a sample output of the show diameter peer-status command.

pcf# show diameter peer-status

PEER HOSTNAME PEER REALM

PEER

STATUS

--------------------------------------------------------

site-host-rx2 site-rx-client-mob-1.com

Connected

site-host-rx1 site-rx-client-mob-2.com

Connected

· To view the status of the LDAP connection, use the following configuration:

show ldap connection-status

The output of this command displays the ServerSet, maximum number of available connections, and the number of available connections.

The following is a sample output of the show ldap connection-status command.

pcf# show ldap connection-status

SERVERSET METRIC

VALUE

--------------------------------------------------

USD

MaximumAvailableConnections 10

USD

NumAvailableConnections

0

· To view the NRF registration status, use the following configuration:

show rest-endpoint registration-status

The output of this command displays the IP address of the pod, registration status, and the registered NRF URI.

The following is a sample output of the show rest-endpoint registration-status command.

pcf# show rest-endpoint registration-status

POD IP

REGISTERED NRF URI

------------------------------------------------------------

192.0.2.19:8486 Registered http://192.0.2.12:8001/

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 388

Status Monitoring Using Commands

Viewing the NFs Connected to PCF

Viewing the NFs Connected to PCF

This section describes how to view the NFs that are presently connected to PCF.

· To view the NFs that are currently connected to PCF, use the following configuration:

show rest-endpoint peer-status

The command displays the mapped port numbers only if you have configured the ports for the interface. After you configure the port and send a request to that port, then on running the show rest-endpoint peer-status command, the PCF displays the mapping details. If the request comes to the pcf-rest-ep external port, which is not associated with any configured interface port, then the NFName is displayed as "UNKNOWN".

For information on how to configure the NFs and the corresponding port numbers with PCF, see Configuring the External IP Address section in the Multiple Virtual IP Address chapter.

The output of this command displays NF name, peer details, pod IP address, peer IP address, and the duration for which the connection is active.

pcf# show rest-endpoint peer-status

PEER NF

PORT NAME POD IP

PEER IP

CONNECTION DURATION

---------------------------------------------------------------------------

8142 AMF 192.0.2.255 192.0.2.254 1 days 17 hours 44 minutes 38 seconds

8147 AMF 192.0.2.255 192.0.2.254 1 days 17 hours 44 minutes 13 seconds

6082 CHF 192.0.2.255 192.0.2.254 1 days 17 hours 44 minutes 22 seconds

8042 SMF 192.0.2.255 192.0.2.252 1 days 17 hours 44 minutes 17 seconds

8043 SMF 192.0.2.255 192.0.2.252 1 days 17 hours 44 minutes 38 seconds

8044 SMF 192.0.2.255 192.0.2.252 1 days 17 hours 44 minutes 17 seconds

8045 SMF 192.0.2.255 192.0.2.252 1 days 17 hours 44 minutes 17 seconds

8046 SMF 192.0.2.255 192.0.2.252 1 days 17 hours 44 minutes 17 seconds

8047 SMF 192.0.2.255 192.0.2.252 1 days 17 hours 44 minutes 17 seconds

Viewing the Discovered Endpoint

This section describes how to view the discovered endpoint details such as the NF type, IP address, and the port number of the endpoint.

Based on the endpoint that you want to view, use the following configuration:

· To view the discovered endpoints associated to the CHF service, use the following configuration:

show rest-endpoint discover-profiles chf

The output of this command displays the NF type, NF instance ID, NF status, IPv4 address, port number, and the expiry date of the CHF's discovered profiles.

The following is a sample output of the show rest-endpoint discover-profiles chf command.

pcf# show rest-endpoint discover-profiles chf

NF Type NF INSTANCE ID

NF STATUS IPV4 ADDRESS PORT

CHF bdb743fc-80fd-49e4-8563-ab54f24ba019 REGISTERED 192.168.103.150 5082

[]

CHF 95430d8c-68d4-48a5-9e6a-9915f94eee52 REGISTERED 192.168.103.150 5083

[]

CHF a3a454a2-0ead-4d0e-bc5b-b34dd8d7bac9 REGISTERED 192.168.103.150 5084

[]

EXPIRY 175
175
175

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 389

Fetching the Subscriber Sessions

Status Monitoring Using Commands

Note The NF Status indicates the discovered NFs registration status with NRF.

· To view the discovered endpoints associated to the UDR service, use the following configuration:

show rest-endpoint discover-profiles udr

The output of this command displays the NF type, NF instance ID, NF status, IPv4 address, port number, and the expiry date of the UDR's discovered profiles.

The following is a sample output of the show rest-endpoint discover-profiles udr command.

pcf# show rest-endpoint discover-profiles udr

NF Type NF INSTANCE ID

NF STATUS IPV4 ADDRESS

UDR 66bf4f8b-02ea-48af-84ed-4494764f9921 REGISTERED 192.168.103.50

-

UDR cff06a6d-b89a-4895-bbd7-edad8b4813f7 REGISTERED 192.168.103.50

-

UDR bf3941b9-8fd8-4c49-a4c2-5ad0b038ed72 REGISTERED 192.168.103.50

-

PORT 5183
5184
5182

EXPIRY 0
0
0

· To view the consolidated list of endpoints that PCF has discovered, use the following configuration:

show rest-endpoint discover-profiles

The output of this command displays the NF type, NF instance ID, NF status, IPv4 address, port number, and the expiry date of both, CHF and UDR discovered profiles.

The following is a sample output of the show rest-endpoint discover-profiles command.

pcf# show rest-endpoint discover-profiles NF Type NF INSTANCE ID UDR 66bf4f8b-02ea-48af-84ed-4494764f9921 UDR cff06a6d-b89a-4895-bbd7-edad8b4813f7 UDR bf3941b9-8fd8-4c49-a4c2-5ad0b038ed72 -

NF STATUS IPV4 ADDRESS REGISTERED 192.168.103.50
REGISTERED 192.168.103.50
REGISTERED 192.168.103.50

PORT 5183
5184
5182

EXPIRY 0
0
0

Fetching the Subscriber Sessions
This section describes how to fetch the subscriber sessions that are configured across regions. · Prerequisites for Fetching Subscriber Sessions · Viewing the Subscriber Session Details
Prerequisites for Fetching Subscriber Sessions
This section describes the prerequisites configuration that you must configure before fetching the subscriber session data across the configured regions. The prerequisite configuration involves the following step:
· Configuring the Configuration File, on page 391

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 390

Status Monitoring Using Commands

Configuring the Configuration File

Configuring the Configuration File
This section describes how to configure the cluster name, external IP address, and port number of the unified API service in the configuration file. The PCF configuration file determines the application servers and their associated configurations. To configure the cluster and external IP address for the unified API service, use the following configuration: config
deployment add config cluster-namecluster_name unified-api-external-ipexternal_ip portport_number end
NOTES: · cluster-name cluster_name--Specify the cluster name where you want to deploy PCF.
· unified-api-external-ip external_ip--Specify the IP address on which the unified API listens.
· port port_number--Specify the port number on which the unified API is exposed.
Verifying the Contents of the Configuration File This section describes how to verify the contents of the configuration file. Use the deployment show-config command to view the deployment details. The following is a sample output of the deployment show-config command.
pcf# deployment show-config deploymentInfo: west-coast, 192.0.2.18, http,9090 east-coast, 192.0.2.22, http,9090
Deleting the Configuration File This section describes how to delete the configuration file. You can delete a configuration file when you no longer require any of the configured resources and services. To delete the configuration file that is currently configured in your deployment environment, use the following configuration: deployment remove-config
Viewing the Subscriber Session Details
This section describes how to view the subscriber session information about the sessions configured. Before proceeding with the configuration, make sure that you have configured the cluster and external IP for the unified API. For more information, see Configuring the Configuration File, on page 391.
· To view the sessions available on all the configured regions, use the following configuration: show subscriber [ imsi imsi_value | msisdn msisdn_value] NOTES:

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 391

Viewing the Subscriber Session Details

Status Monitoring Using Commands

· imsi_value--Displays the subscriber session associated to the specified IMSI value. · msisdn_value--Displays the subscriber session associated to the specified MSISDN value.

The output of this command displays session details and the interfaces that are involved.
pcf# show subscriber imsi 100100222233266 SessionInfo:

+---------------------------------------------------------------------------------+

| 1: development-session

: ism.3.imsi-10012121212123.133131313.1222.68881149 |

+---------------------------------------------------------------------------------+

| Activity Timestamp

|

| --------------------------------------------------------------------------------|

| Connect Time

: 06-03-2020 04:39:43 AM

|

| Expiration Time

: 29-03-2020 04:39:43 PM remaining: 23 days, 20:04.0|

|

|

| Session Detail

|

| --------------------------------------------------------------------------------|

| Bearer Session Type

: STATIC_5G

|

| External Profile

: No

|

|---------------------------------------------------------------------------------|

| LDAP

|

|---------------------------------------------------------------------------------|

| External Profile

: No

|

|

|

| N7

|

|---------------------------------------------------------------------------------|

| mcc,mnc

: 100, 010

|

| dnn

: static.one.5g

|

| rat-type

: NR

|

| access-type

: 3GPP_Access

|

| pdu-session-id

:5

|

| supi

: imsi-100101222233266

|

| gpsi

: msisdn-11112433266

|

| framed-ip-v4

: 31.31.154.88

|

| framed-ip-v6

: 2710:ae00:d2f3:9a78

|

| update-notify-url

: http://192.0.2.12:7010/callbacks/v1/

|

|

smPoliciesUpdateNotification/i msi-10001011111:5 |

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 392

5 5 C H A P T E R

UDR Interface

· Feature Summary and Revision History, on page 393 · Feature Description, on page 394 · How it Works, on page 396 · Configuring the UDR Base URL, on page 400 · Standards Compliance, on page 400 · Filtering the Profile Data, on page 401
Feature Summary and Revision History

Summary Data
Table 185: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled ­ Configuration required to disable Not Applicable

Revision History
Table 186: Revision History
Revision Details Enhancement introduced. Introduced changes related to the Nudr_DataRepository service. First introduced.

Release 2020.02.0
2020.01.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 393

Feature Description

UDR Interface

Feature Description
The PCF interfaces with the User Data Repository (UDR) to receive subscriber-related policies for User Equipment (UE) attach and session establishment. When a UE attaches to the network, AMF requires AM policies of the subscriber from PCF for the UE. Similarly, when a UE makes a PDU Session, SMF requires policy rules from PCF. Subscriber attributes are stored in the UDR. PCF communicates with UDR to receive these attributes which are used in the evaluation of policies.
PCF invokes the Nudr_DataRepository service to retrieve the AM and SM Policy attributes. PCF carries out the discovery of UDR URL through the Nnrf_NFDiscovery service which is NRF service.

API Details
Description

API URI

Retrieves the access and mobility {apiRoot}/nudr-dr/v1/ policy data for a subscriber. policy-data/ues/{ueId}
/am-data

Retrieves the session management policy data for a subscriber.

{apiRoot}/nudr-dr/v1/ policy-data/ues/{ueId} /sm-data

Request Parameters Path and Query
Path and Query

Response Parameters 200 Ok AmPolicyData
200 Ok SmPolicyData

Important The UE Id in the API represents the SUPI or GPSI.

Parameter Details
PCF supports the following parameters:

AMPolicy Query Parameters

Table 187: AMPolicy Query Parameters

Parameter Name ueId

Parameter Type Path

AmPolicyData
Table 188: AmPolicyData
Parameter Name ueId AmPolicyData

Parameter Type Path -

Description SUPI or GPSI
Description SUPI or GPSI List of category identifiers associated with the subscriber.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 394

UDR Interface

SmPolicy Query Parameters

SmPolicy Query Parameters

Table 189: SmPolicy Query Parameters

Parameter Name ueId Snssai

Parameter Type Path Query

Dnn Fields

Query Query

Description SUPI or GPSI Identifies single network slice selection assistance information. Identifies a Data Network Name. Attributes to be received.

SmPolicyData

Before configuring the SmPolicyData parameters, make sure that in the Policy Builder the policy subscriber AVP field has the following keys:
· allowedServices
· subscCats

Table 190: smPolicySnssaiData Object

Parameter Name smPolicySnssaiData

Description

The Session Management Policy data per S-NSSAI for all the SNSSAIs of the subscriber. The key of the map is the S-NSSAI.

Note

The SmPolicySnssaiData parameter contains the Snssai and

SmPolicyDnnData objects.

Table 191: Snssai Object

Parameter Name Snssai

Description Identifies a single network slice selection assistance information.

Table 192: SmPolicyDnnData objects

Parameter Name Dnn allowedServices subscCats gbrUl

Description
Identifies the Data Network Name. List of subscriber's allowed service identifiers. List of categories associated with the subscriber. Maximum aggregate UL bitrate that is provided across all GBR QoS Flows in the DNN.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 395

How it Works

UDR Interface

Parameter Name gbrDl adcSupport subscSpendinglimits ipv4Index ipv6Index Offline Online chfInfo usageMonDataLimits
usageMonData
mpsPriority imsSignallingprio mpsPrioritylevel smPolicySnssaiData

Description
Maximum aggregate DL bitrate that is provided across all GBR QoS Flows in the DNN.
Indicates whether application detection and control that is enabled for a subscriber.
Indicates whether PCF must enforce policies that are based on subscriber spending limits.
Information that identifies which IP pool or external server that is used to allocate the IPv4 address.
Information that identifies which IP pool or external server that is used to allocate the IPv6 address.
Indicates that the offline charging is applicable to the PDU session.
Indicates that the online charging is applicable to the PDU session.
Address of the charging function.
Contains a list of usage monitoring profiles that are associated with the subscriber. The monitoring key that is used as the key in the map.
Contains the remaining allowed usage data that are associated with the subscriber. The monitoring key that is used as the key in the map.
Indicates subscription to the MPS priority service. Priority applies to all traffic on the PDU Session.
Indicates subscription to the IMS signaling priority service. Priority only applies to IMS signaling traffic.
Relative priority level for the multimedia priority services.
The Session Management Policy data per S-NSSAI for all the SNSSAIs of the subscriber. The key of the map is the S-NSSAI.

Note The PCF does not support the UDR-N36 response data fields such as umDataLimits and umData.
How it Works
This section describes how this feature works. The User Data Repository (UDR) provisions PCF to retrieve the data stored in the UDR through the Nudr_DataRepository service. The service is also responsible for enabling the NF to subscribe and unsubscribe to the data change notifications from UDR. In particular to PCF, the Nudr_DataRepository service provides the following retrieve services to access policy control-related subscription information and application-specific information that is stored in the UDR:

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 396

UDR Interface

Call Flows

· Subscription to notifications from the UDR on changes in the policy control-related subscription information.
· Subscription to the UDR for the AF requests targeting a DNN and S-NSSAI or a group of UEs (roaming UEs for LBO case) that are identified by an Internal Group Identifier.
· Subscription to notifications from the UDR on the update of AF requests targeting a DNN and S-NSSAI or a group of UEs (roaming UEs for LBO case) identified by an Internal Group Identifier.
The N36 reference point is defined for the interactions between PCF and UDR in the following reference point representation.
Figure 77: N36 Reference Point

Call Flows

This section describes the key call flows for this feature.

AM Policy Subscription Call Flow
This section describes the AM Policy Subscription call flow .

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 397

AM Policy Subscription Call Flow Figure 78: AM Policy Subscription Call Flow

UDR Interface

Table 193: AM Policy Subscription Call Flow Description
Step Description 1 The AMF sends a Npcf_AmPolicyControl_Create request to the PCF. 2 If the UDR URL is not configured, the PCF sends the Nnrf_NFDiscovery request is sent to NRF. 3 In response, the NRF sends the Nnrf_NFDiscovery results to the PCF. 4 The PCF sends the Nudr_DataRespository query to the UDR. 5 In response, the UDR sends the repository details to the PCF. 6 The PCF sends the Npcf_AmPolicyControl_Create request to the AMF. 7 The PCF sends the Nudr_DataRepository query to the UDR. 8 The UDR responds to PCF with the repository information. 9 After PCF evaluates the response, if the policy has modified, then the PCF sends the
Npcf_AmPolicyControl_UpdateNotify request to the AMF. 10 The AMF sends the Update Notification as a response to the PCF.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 398

UDR Interface
SM Policy Subscription Call Flow
This section describes the SM Policy Subscription call flow.
Figure 79: SM Policy Subscription Call Flow

SM Policy Subscription Call Flow

Table 194: SM Policy Subscription Call Flow Description
Step Description 1 The SMF sends a Npcf_SmPolicyControl_Create request to the PCF. 2 If the UDR URL is not configured, the PCF sends the Nnrf_NFDiscovery request to NRF. 3 In response, the NRF sends the Nnrf_NFDiscovery results to the PCF. 4 The PCF sends the Nudr_DataRespository query to the UDR. 5 In response, the UDR sends the repository details to the PCF. 6 The PCF sends the Npcf_SmPolicyControl_Create request to the SMF. 7 The PCF sends the Nudr_DataRepository query to the UDR. 8 The UDR responds to PCF with the repository information. 9 After PCF evaluates the response, if the policy has modified, then the PCF sends the
Npcf_SmPolicyControl_UpdateNotify request to the SMF. 10 The SMF sends the Update Notification as a response to the PCF.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 399

Configuring the UDR Base URL

UDR Interface

Configuring the UDR Base URL
This section describes how to configure the UDR base URL discovery. You must configure the UDR base URL for discovering profiles. The base URL aids in navigating to the mapped UDR. In the absence of the UDR base URL, the NRF's base URL is queried for the UDR base URL on the discovered profiles. To configure the UDR base URL, use the following configuration in the Policy Ops Center console: config
nrfDiscovery nfType locality client client_name geoServer server_name preferredServer server_name nrfDiscoveryGroup subscriptionEnabled [ true | false ] subscriptionExtension extension_count type nf_type end
NOTES: · nrfDiscovery--Enters the NRF discovery configuration mode.
· locality--Enters the locality configuration mode. The PCF REST endpoint considers the locality configuration.
· client client_locality--Specify the client locality of used by the NRF endpoint.
· geoServer server_name--Specify the geo redundant site of the preferred locality.
· preferredServer preferred_locality --Specify the server that is configured as the preferred server. Preferred locality takes precedence over the geo locality while using the service of the discovered NF (UDR).
· nrfDiscoveryGroup--Enters the NRF discovery group configuration.
· subscriptionEnabled [ true | false ] --Configures the subscription capability.
· subscriptionExtension extension_count--Specify the count for which the subscription can be extented.
· type nf_type--Specify the NF type. For this configuration, it should be UDR.
Standards Compliance
This feature complies with the following standards specifications: · 3GPP TS 23.501 "System Architecture for the 5G System "
· 3GPP TS 23.502 "Procedures for the 5G System (5GS)"

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 400

UDR Interface

Filtering the Profile Data

· 3GPP TS 23.503 "Policy and charging control framework for the 5G System (5GS)" · 3GPP TS 29.508 "Session Management Event Exposure Service" · 3GPP TS 29.512 "Session Management Policy Control Service" · 3GPP TS 29.513 "Policy and Charging Control signalling flows and QoS parameter mapping" · 3GPP TS 29.519 V15.4.0 "Usage of the Unified Data Repository Service for Policy Data, Application
Data and Structured Data for Exposure"
Filtering the Profile Data
PCF queries the subscriber attributes that are mapped in additional profiles from UDR for the N7 interface. Based on the UDR response, the attributes that are returned are mapped to the subscriber attribute. The allowed services that are returned can be mapped to the services associated with the subscriber. For information on how to configure the additional profile data, see Setting Up Additional Profile Data, on page 155. In Policy Builder, you can access the following filters under Domain > Additional Profile Data > Filter:
· SUPI · GPSI

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 401

Filtering the Profile Data

UDR Interface

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 402

5 6 C H A P T E R

Serviceability KPIs Diagnostics Implementation

· Feature Summary and Revision History, on page 403 · Feature Description, on page 403 · How It Works, on page 404
Feature Summary and Revision History

Summary Data
Table 195: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled - Always-on Not Applicable

Revision History
Table 196: Revision History
Revision Details First introduced.

Release 2023.02.0

Feature Description
The Cisco Policy Control Function (PCF) doesn't offer capabilities for viewing the messages packet counters at each critical application component. The PCF uses a Key Performance Indicators (KPIs) diagnostics utility to compute and determine the systems behavioral status at a specified time interval. The diagnostics utility

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 403

How It Works

Serviceability KPIs Diagnostics Implementation

also collects the counters from the component and helps to limiting down the issue to a particular area. The utility computes the appropriate KPI counters by querying the prometheus server. The services to check the counters:
· Rest-endpoint · Engine · CDL
How It Works
This section describes how this feature works.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 404

5 7 C H A P T E R

Support for OAUTH2 on PCF

· Feature Summary and Revision History, on page 405 · Feature Description, on page 406 · How It Works, on page 406 · Feature Configuration, on page 406 · Call Flows , on page 407 · Standards Compliance , on page 407
Feature Summary and Revision History

Summary Data
Table 197: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Disabled ­ Configuration required to enable Not Applicable

Revision History
Table 198: Revision History
Revision Details First introduced.

Release 2023.02.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 405

Feature Description

Support for OAUTH2 on PCF

Feature Description
The PCF supports the OAuth2, which is an authorization protocol and NOT an authentication protocol. The Network Function Repository (NRF) is the designated OAuth2 Authorization Server. The OAuth2 provides the client to the NRF and includes the OAuth2 Access Token validation for the SBI requests from consumer NFs. The OAuth2 feature needs to enable or disable globally for all SBA interfaces and allows the subscribers to access to a set of resources. For example:
· Remote APIs · User data
Following the "Client Credentials" authorization, the NRF provides the Nnrf_AccessToken service for OAuth2 authorization. The OAuth2 uses Access Tokens, and the Access Token provides the authorization to access resources on behalf of the end user. However, the JSON Web Token (JWT) format needs to used in some contexts. The OAuth2 enables token issuers to include data in the token itself. For security reasons, the Access Tokens may have an expiration date.
Note There's no specific format for Access Tokens.
How It Works
This section describes how OAuth2 Support feature works.
Feature Configuration
This section describes how to configure the OAuth2 Support. To configure the OAuth2 support, use the following configuration: config
oauth2 oauth2Group service type nrf nnrf-oauth2 endpoint-profile oauth2Profile capacity 10 priority 10 uri-scheme http endpoint-name ep1 priority 10 capacity 10 primary ip-address ipv4 10.X.X.X primary ip-address port 81XX secondary ip-address ipv4 10.X.X.X secondary ip-address port 81XX tertiary ip-address ipv4 10.X.X.X
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 406

Support for OAUTH2 on PCF

Call Flows

tertiary ip-address port 81XX end Rest-Endpoint Configurations:
· rest-endpoint oauth-service server false
· rest-endpoint oauth-service client true

Note

· The PCF OAuth2 server not supported in this release, so it should be false.

Call Flows
This section describes the call flows for this feature.
OAuth2 Support Call Flow
This section describes the OAuth2 Support call flow.
Figure 80: OAuth2 Support Call Flow

Table 199: OAuth2 Support Call Flow Description
Step Description 1 The NF Service Consumer sends a Post /OAuth2 /Token Access Token Request to the NRF. 2 The NRF sends 200 OK (Access Token Response) to the NF Service Consumer. 3 The NRF sends 400 Bad Request (Access Token Error) or 3xx to the NF Service Consumer.
Standards Compliance
This feature complies with the following standards specifications:
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 407

Standards Compliance

Support for OAUTH2 on PCF

· 3GPP 29.510 v15.4.0 "Network function repository services" · 33GPP 33.310 "Network Domain Security (NDS); Authentication Framework (AF)" · 3GPP 33.501 v16.8.0 "Security architecture and procedures for 5G system" · IETF RFC 6749 and 6750 "OAUTH 2.0 Authorization Framework" · 3GPP 29.510 v16.9.0 "Network Function Repository Services" · 3GPP 29.500 v16.8.0 "Technical Realizations of Service Based Architecture (HTTP Standards reference)"

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 408

5 8 C H A P T E R

Support for UDR Subscribe, Unsubscribe, and Notity

· Feature Summary and Revision History, on page 409 · Feature Description, on page 410 · How It Works, on page 410 · Call Flows, on page 410 · Feature Configuration, on page 412 · Standards Compliance, on page 413
Feature Summary and Revision History

Summary Data
Table 200: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled ­ Always-on Not Applicable

Revision History
Table 201: Revision History
Revision Details First introduced.

Release 2023.01.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 409

Feature Description

Support for UDR Subscribe, Unsubscribe, and Notity

Feature Description
The Unified Data Repository (UDR) offers the Nudr_DataRepository service. The Nudr_DataRepository service allows the Network Function (NF) service consumers to retrieve, create, update, and modify, and delete data stored in the UDR. PCF supports the following services of UDR for both AMF and SMF Policies:
· Subscribe · Unsubscribe · Notify · Query
Following are the functions of Nudr_DataRepository service: · Allows NF service consumers to subscribe or unsubscribe to the data change notification and notifies the data change. · Allows the PCF to access subscription data for policy controls and application-specific data stored in the UDR.
The Nudr interface supports the reference point representation and defines the N36 reference point for the interactions between PCF and UDR.
How It Works
This section describes how this feature works.
Call Flows
This section describes the key call flows for this feature.
UDR Subscribe and Notify Call Flow
This section describes the UDR subscribe and notify call flow.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 410

Support for UDR Subscribe, Unsubscribe, and Notity Figure 81: UDR Subscribe and Notify Call Flow

UDR Subscribe and Notify Call Flow

Table 202: UDR Subscribe and Notify Call Flow Description
Step Description 1 The SMF sends a Npcf SmPolicy Control Create request to the PCF. 2 The PCF sends the Nudr Data Repository Query to the UDR. 3 The UDR sends the Nudr Data Repository Query response to the PCF. 4 The PCF sends the Npcf SmPolicy Control Create response to the SMF. 5 The PCF sends the Nudr Data Repository Subscribe to the UDR. 6 The UDR sends the 201 Created to the PCF. 7 After smPolicy SnssaiData changes, the UDR sends the Notify smPolicy SnssaiData changes to the
PCF. 8 The PCF sends 204 No Content to the UDR.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 411

UDR Unsubscribe Call Flow

Support for UDR Subscribe, Unsubscribe, and Notity

Step Description 9 After Policy Evaluation, the PCF sends the Npcf SmPolicy Control Update Notify to the SMF. 10 The PCF sends the Npcf SmPolicy Control Update Notify to the SMF. 11 The SMF sends the Npcf SmPolicy Control Update Notify Response to the PCF.
UDR Unsubscribe Call Flow
This section describes the UDR Unsubscribe Call Flow.
Figure 82: UDR Unsubscribe Call Flow

Table 203: UDR Unsubscribe Call Flow Description
Step Description 1 The SMF sends a Npcf SmPolicy Control Delete request to the PCF. 2 The PCF sends the Npcf SmPolicy Control Delete request to the SMF. 3 The PCF sends the Nudr Data Repository UnSubscribe to the UDR. 4 The UDR sends 204 No Content to the PCF.
Feature Configuration
To configure this feature, use the following configuration:
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 412

Support for UDR Subscribe, Unsubscribe, and Notity

Rest End-Point configuration

Rest End-Point configuration
config rest-endpoint interface [n36] ips ip_address port port_number end
NOTES: · rest-endpoint interface [n36]--Specifies the interface name N36 for the rest endpoint configurations for PCF-UDR communication.
· ip_address--Specifies the IPv4 or IPv6 address that needs to assign for the interface. The specified value is 192.168.X.X.
· port interface_port_number--Specifies the port number for the interface. The specified default value is 9082.
Engine Configuration
By default, UDR is disabled on PCF. Enabling the UDR interface on the pcf engine, use the following configuration: config
properties skipped.device.mgrs value RX_TGPP,GX_TGPP,SY_V11 exit Disabling the UDR interface on the pcf engine, use the following configuration: config properties skipped.device.mgrs value RX_TGPP,GX_TGPP,SY_V11,N36_TGPP exit
Standards Compliance
This feature complies with the following standards specifications: · 3GPP 29.510 Network function repository services
· 3GPP 33.310 Network Domain Security (NDS); Authentication Framework (AF)
· 3GPP 33.501 Security architecture and procedures for 5G system
· 3GPP 29.512 v16.9.0 Session Management Policy Control Service

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 413

Standards Compliance

Support for UDR Subscribe, Unsubscribe, and Notity

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 414

5 9 C H A P T E R

User Agent Implementation

· Feature Summary and Revision History, on page 415 · Feature Description, on page 415 · How It Works, on page 416 · Feature Configuration, on page 416
Feature Summary and Revision History

Summary Data
Table 204: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled - Always-on Not Applicable

Revision History
Table 205: Revision History
Revision Details First introduced.

Release 2023.01.0

Feature Description
The user-agent header identifies the Network Function (NF) type of the HTTP/2 client and includes in the HTTP/2 request sent over the SBI. When PCF sends the outbound request, the user agent header includes in

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 415

How It Works

User Agent Implementation

the HTTP/2 request. The user agent header values are extracted from all PCF inbound requests and added to the inbound request total statistics. The nf-type - user-agent-specific-info filled as the pattern for this header. For example, PCF-Inst1ClusterABC.
How It Works
This section describes how this feature works.
Feature Configuration
Configuring to Enable or Disable the User-Agent-Specific-Info
To configure the user-agent-specific-info for this feature, use the following configuration: config
rest-endpoint interface user-agent-specific-info [value] end NOTES: · rest-endpoint interface user-agent-specific-info [value]--Specifies the user-agent-specific-info to enable or disable the user-specific value for the PCF. The specific default value is null.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 416

6 0 C H A P T E R

Utilization of SMI Labels in the Network Policy

· Feature Summary and Revision History, on page 417 · Feature Description, on page 417 · How It Works, on page 418
Feature Summary and Revision History

Summary Data
Table 206: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled ­ Always-on Not Applicable

Revision History
Table 207: Revision History
Revision Details First introduced.

Release 2023.02.0

Feature Description
The Subscriber Microservices Infrastructure (SMI) or Cloud Native Deployment Platform (CNDP) uses the network policy usage on the Kubernetes cluster. The Utilized network policies in the Common Execution Environment (CEE) namespace block the incoming traffic from the PCF namespace. The REST endpoint provides the SMI label in the network policy for accessing CEE services. PCF manages the changes in

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 417

How It Works

Utilization of SMI Labels in the Network Policy

application pods to communicate with the CEE services. The PCF REST endpoint also needs access to the Prometheus high-resolution service to collect the CPU load data.
How It Works
This section describes how this feature works.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 418

6 1 C H A P T E R

Update Requests Toward CHF

· Feature Summary and Revision History, on page 419 · Feature Description, on page 420 · How it Works, on page 420 · Configuration Support for Setting up the Update Requests, on page 420 · Use Case Template Actions, on page 423 · Troubleshooting Information, on page 423
Feature Summary and Revision History

Summary Data
Table 208: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled ­ Configuration required to disable Not Applicable

Revision History
Table 209: Revision History
Revision Details First introduced.

Release 2020.01.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 419

Feature Description

Update Requests Toward CHF

Feature Description
The 4G CPS PCRF supports LDAP notification. In 5G, this support is available to PCF by using the same LDAP plugins which were deployed for 4G. PCF supports the following features:
· Requery Subscriber Profile Repository (SPR) on receiving the LDAP notification. · Reevaluate the subscriber policies after receiving LDAP response. · Based on the action derived from the CRD table, the corresponding action is performed over the N28
interface. The corresponding actions are to start, continue, update, reinitiate, and to terminate an N28 session.
How it Works
This section describes how this feature works. The SMF sends the N7 Create Request to PCF. PCF then sends the query to LDAP to find the subscriber profile. The LDAP notifications from the LDAP client are supported in the following way: 1. For any changes in a subscriber profile, PCF receives an LDAP notification. PCF then sends a requery to
find the updated subscriber profile. 2. On receiving the LDAP notification, PCF sends the N28 Subscribe Update on the Charging Function
(CHF). PCF sends this update to receive the updated status of policy counters for the policy that the subscriber has subscribed. 3. After reevaluating the counters that PCF receives from CHF over the N28 interface, if policy has changed, then SMF is updated with the Update Notify message over the N7 interface.
Standards Compliance
This feature complies with the following standards specifications: · 3GPP TS 29.510 V15.2.0 (2018-12) "Network Function Repository Services"
Configuration Support for Setting up the Update Requests
Setting up the update requests toward CHF involves configuring the following services: 1. TableDrivenActionOverN28 2. SpendingLimitSubscription
TableDrivenActionOverN28
This section describes the parameters that are required to configure the TableDrivenActionOverN28 service.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 420

Update Requests Toward CHF

TableDrivenActionOverN28

The TableDrivenActionOverN28 service configuration evaluates and retrieves action on the received messages. During the policy evaluation, if the TableDrivenActionOverN28 service exists in policy, PCF evaluates the CRD table and determines the action for the implementation on the N28 interface.
Based on the action value, PCF performs the following tasks:
· If the action value is Update and if the N28 session exists, PCF initiates the Intermediate Spending Limit Report operation.
· On receiving the Subscription-Update response or timeout, PCF reevaluates the TableDrivenActionOverN28 configuration and determines the next action.
· If the action value is Reinitiate, PCF terminates the existing session and initiates a new session by sending a subscription request. After PCF terminates the existing session, sync N28 Unsubscribe is sent and the session gets deleted.
The TableDrivenActionOverN28 service configuration accepts only request message attributes for Input column binding. Hence, the attribute value pair (AVP) code must match the JSON path that is received in the message. In addition to message attributes, the following AVP codes are used as input AVP codes:
· Command-Code--The command code of request message.
· Application-Id--The Diameter Application Identifier to send the Diameter message.
Before setting the service parameters, ensure that you create a use case template and add a service for this configuration. For details, see Configuring the Use Case Template, on page 349 and Adding a Service, on page 348.
The following table describes the TableDrivenActionOverN28 service parameters.

Note Select the N28 service configuration object to configure this service.

Table 210: TableDrivenActionOverN28 Parameters

Parameters Search Table Group

Description

Enter the table group that you want to search from the custom reference data table.

Note

The STG and the included CRD table can have key

columns that may not refer to the message attributes

in the inbound message. For example, output of other

tables. Therefore, ensure to bind these columns

correctly.

· Input Column Binding--Under this parameter, select a value for the ColumnAndAvpPair parameter.

· AVP Name--Select the name of the Request Attribute for input for evaluating the custom reference data table.

· Column--Select the key column in the Search Table Group corresponding to the specified AVP.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 421

SpendingLimitSubscription

Update Requests Toward CHF

Parameters Output Column Binding

Description
Under this parameter, select a value for the ColumnAndAvpPair parameter.
· Avp Name--Select the name of the Request Attribute to which the value of the output column is mapped.
· Column--Select the CRD table column for the output AVP.

Note

The list of Output column to AVP bindings supports

only one column or AVP binding for fixed AVP code

Action-Over-N28.

SpendingLimitSubscription
This section describes the parameters that are required to configure the SpendingLimitSubscription service. The SpendingLimitSubscription service configuration object is added for the N28 interface. With this configuration, you can perform the following tasks:
· Request and subscribe the policy counter status reporting from PCF to CHF. · Unsubscribe from spending limit reports. · Receive notifications of spending limit reports from CHF to PCF.

Note Select the N28 service configuration object to configure the SpendingLimitSubscription service.

Before setting the service parameters, ensure that you create a use case template and add a service for this configuration. For details, see Configuring the Use Case Template, on page 349 and Adding a Service, on page 348.
The following table describes the SpendingLimitSubscription service parameters.
Table 211: SpendingLimitSubscription Parameters

Parameter Supi
Gpsi

Description

Pulls the value from the session and policy state retrievers, which are mapped to the N7 Subscription Permanent Identifier (SUPI) object.

Note

The default values of SUPI and GPSI are not configured and

their values are always dynamically pulled from the session and

policy state retrievers.

Pulls the value from the session and policy state retrievers, which are mapped to the N7 Generic Public Subscription Identifier (GPSI) object.

Note

The default values of SUPI and GPSI are not configurable, and

their values are always dynamically pulled from the session and

policy state retrievers.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 422

Update Requests Toward CHF

Use Case Template Actions

Parameter Defaults On Failure

Description
This is an optional parameter. · Under this parameter, configure DefaultSpendingLimitReport, which specifies the default list of Policy Counter Identifiers that are subscribed for failures. Configure the following parameters: · Failure Reason--From the drop-down list, select failure code for the default identifier.
· Identifier--Enter the name for the policy counter identifier.
· Status--Select the status of the policy counter identifier.

Use Case Template Actions

This section describes the actions that you can perform for the use case templates. The N28 TGPP session exists condition indicates that a valid N28 session exists for the use case to become true. The following table describes the condition input variables that you can configure in Policy Builder:
Table 212: Conditions and the AVP Descriptions

Condition Input Variable failureReason
lastSubscriptionType failureReason syCountersIdentifierAndStatus subscriptionId Connected

AVP Used and Description Reason for failure when the N28 session is not established due to an error. Last subscription request type, which can be Initial or Update. Failure reason of the last N28 session. N28 counter identifier and status. Unique ID of the N28 session. Boolean value to indicate whether the N28 connection is established or not.

Troubleshooting Information
For message routing failures, check the datastore pod health and the logs for any issues. For more information on how to check the pod health and logs, see Troubleshooting Information, on page 459.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 423

Troubleshooting Information

Update Requests Toward CHF

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 424

6 2 C H A P T E R

VoNR through the Rx Interface

· Feature Summary and Revision History, on page 425 · Feature Description, on page 426 · How it Works, on page 426 · Enabling Interaction Between PCF and PCRF for VoNR Calls, on page 433 · VoNR through Rx Interface OA&M Support, on page 434
Feature Summary and Revision History

Summary Data
Table 213: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Enabled ­ Configuration required to disable Not Applicable

Revision History

Table 214: Revision History

Revision Details

Release

Enhancement introduced.

2020.01.0

Revised the content to include the new and updated call flows that reflects support for the PCF to PCRF interaction which encourages the VoLTE calls. Also, added procedure to configure the gRPC interface.

First introduced.

Pre 2020.01.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 425

Feature Description

VoNR through the Rx Interface

Feature Description
PCF supports the full Diameter stack along with the standard Diameter interfaces like Rx. With this support, you can configure PCF to handle VoLTE calls for 4G and VoNR for 5G. In 4G scenarios, PCF serves as a proxy and performs the session binding lookups to re-route the 4G calls to the PCRF instances for processing. PCF supports the PCRF GR active/active mode for routing messages to the secondary PCRF site when the primary site is unavailable.
Prerequisites
To enable the interaction between PCF and PCRF for VoLTE/VoNR calls, ensure to perform the following on PCRF:
· Install the following features by adding them to the /etc/broadhop/pcrf/features file:
· com.cisco.bindingdb.feature
· com.broadhop.diameter2.local.cnat.feature
· On all the QNS nodes, ensure to add the Diameter endpoint gRPC service names in the /etc/hosts file.
· Include the etcd IPs in the qns.conf: -Ddiameter.registry.etcd.hosts=comma separated etcd-external IP file.
· Make sure that the routable network connectivity exists between the node where the PCF Diameter endpoint is hosted, the QNS engine VMs for site-local, and the remote (in GR mode) communication (over HTTP2).
· The Rx peer must be connected to both the local and remote PCF Diameter endpoints simultaneously with one or both the connections as active. For the active Rx connection from AF to PCF, the AF peer handles and receives the Rx requests from other PCF instance without any connectivity issues.
· For the PCRF and PCF components to communicate, the configured port numbers must be open on the firewall.

How it Works
This section describes how this feature works.

Call Flows

This section describes the following call flows.

Session Create, Update, and Terminate Call Flow
This section describes the call flow to create, update, or terminate a session.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 426

VoNR through the Rx Interface Figure 83: Session Creation, Update, and Termination Call Flow

Session Create, Update, and Terminate Call Flow

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 427

Session Create, Update, and Terminate Call Flow

VoNR through the Rx Interface

Table 215: Session Creation, Update, and Termination Call Flow Description
Step Description 1 The SMF sends a Policy Control Create request to the PCF REST endpoint. 2 The PCF REST endpoint forwards the request to the PCF Engine. 3 The PCF Engine sends a Create Session request to Session DB/CDL. 4 The Session DB/CDL sends an acknowledgement to the PCF Engine for the Create Session request. 5 The PCF performs a binding or tagging the database and sends it to the Binding DB. 6 The PCF confirms that the binding or tagging of the database is complete by sending an
acknowledgement to the PCF Engine. 7 The PCF Engine sends Policy response to the PCF REST endpoint. 8 The PCF REST endpoint creates a response and sends it to the SMF. 9 A new session is created on PCRF. The P-GW sends Gx CCR request to the PCRF LB. 10 The PCRF LB sends the Diameter request to the PCRF QNS. 11 The PCRF QNS creates a session in the session database and sends it to PCRF. 12 The session database sends an acknowledgement to the PCRF indicating that the session is created. 13 The PCRF QNS performs the binding and notifies the PCRF. 14 The PCRF sends an acknowledgement to the PCRF QNS indicating that the binding is created. 15 The PCRF QNS sends Diameter response to the PCRF LB. 16 The PCRF LB sends Gx CCA request to the P-GW. 17 The P-CSCF sends Rx AAR request to the PCF Diameter endpoint. 18 The PCF Diameter endpoint checks if the session exists on PCF. 19 If the PCRF BindingDB lookup is enabled, the PCF Diameter endpoint checks whether the session
exists on PCRF. 20 In the existing session of the PCRF SkDB instance with lookup enabled, the PCF Diameter endpoint
sends the Rx AAR request over the gRPC interface to the PCRF QNS. 21 The PCRF QNS processes the AAR request. 22 The PCRF QNS binds or tags the database and sends an acknowledgement to PCRF. 23 The PCRF acknowledges the binding or tagging of the database and notifies the PCRF QNS. 24 The PCRF QNS sends Create Session request to the PCRF. 25 The PCRF sends an acknowledgement for the request to the PCRF QNS.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 428

VoNR through the Rx Interface

Binding Database Query Failures Call Flow

Step Description 26 The PCRF QNS sends Rx AAR request to the PCRF QNS. 27 The PCRF QNS sends Diameter request to the PCRF LB. 28 The PCRF LB sends Gx RAR request to the P-GW. 29 The P-GW sends the Gx RAA response to PCRF LB. 30 In the existing session of PCF, the PCF Diameter endpoint sends Diameter request to the PCF REST
endpoint. 31 The PCF Engine processes the AAR request. 32 The PCF Engine sends a Create Session request to Session DB/CDL. 33 The Session DB/CDL sends an acknowledgement to PCF Engine. 34 PCF sends a Create New Binding/Tag request to the Binding DB. 35 The Binding DB sends an acknowledgement to PCF. 36 The PCF Engine sends Notification request to the PCF REST endpoint. 37 The PCF REST endpoint sends a Diameter response request to the PCF Diameter endpoint. 38 The PCF Diameter endpoint sends Policy Notification Request to the P-CSCF. 39 The P-CSCF sends the Policy Notification response to the PCF Diameter endpoint. 40 The PCF Diameter endpoint sends the Rx AAA request to the P-CSCF.
Binding Database Query Failures Call Flow
This section describes the PCF failover for the binding database query call flow.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 429

Binding Database Query Failures Call Flow Figure 84: PCF Failover for Binding Database Query Call Flow

VoNR through the Rx Interface

Table 216: PCF Failover for Binding Database Query Call Flow Description
Step Description 1 When a Gx session exists on PCRF and Rx AAA response is received, P-CSCF sends the Rx AAA
request to the PCF Diameter endpoint. 2 For a local PCRF failure, the PCF Diameter endpoint checks if the session exists on local PCRF. 3 If the PCRF query times out due to the local PCRF failure or network issue, PCF reattempts sending
the query to the remote PCRF instance. 4 If the session is not found, PCRF notifies the PCF Diameter endpoint. 5 If the PCF Diameter endpoint query times out due to the local PCF or PCRF failure or network issue,
the PCF Diameter endpoint reattempts to check if the session exists in the local PCRF.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 430

VoNR through the Rx Interface

Binding Database Query Call Flow

Binding Database Query Call Flow
This section describes the PCF Rx rerouting and PCRF binding database call flow.
Figure 85: PCF Rx Rerouting and PCRF Binding Database Call Flow

Table 217: PCF Rx Rerouting and PCRF Binding Database Call Flow Description
Step Description 1 When a Gx session exists on the PCRF and the local PCF has received the original AAR Initialization
message, the P-CSCF sends the Rx AAR request to the local PCF Diameter endpoint. 2 The PCF Diameter endpoint performs a parallel local data store lookup and a binding database query
toward the site local PCRF SkDB instance. The PCF Diameter endpoint checks if the session exists on the PCRF. 3 The PCRF notifies the PCF Diameter endpoint that the session exists. 4 The PCF Diameter endpoint forwards the Rx AAR request to the PCRF QNS engine. 5 If the PCF Diameter endpoint query times out due to the local PCRF failure or network issue, the PCF reattempts sending the query to the local PCRF instance.
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 431

PCF Failover Call Flow

VoNR through the Rx Interface

Step Description 6 If the session is not found, then the PCRF notifies the PCF Diameter endpoint. 7 The PCF Diameter endpoint reattempts to check if the session exists in the remote PCRF instance. 8 If the session is found, the PCRF notifies the PCF Diameter endpoint that the session exists. 9 The PCF Diameter endpoint sends the Rx AAA response to the QNS Engine.
PCF Failover Call Flow
This section describes the PCF failover call flow.
Figure 86: PCF Failover Call Flow

Table 218: PCF Failover Call Flow Description
Step Description 1 When a Gx session exists on the PCRF and the local PCF has received the original AAR Initialization
message, the PCRF sends the Rx RAR request over gRPC to the local PCF Diameter endpoint. 2 If the local PCF is unreachable or is inactive, the PCRF reattempts to send the Rx RAR request over
gRPC to the remote PCF Diameter endpoint. 3 If the remote PCF Diameter endpoint is connected, it forwards the Rx RAR request to P-CSCF. 4 The P-CSCF sends the Rx RAA request to the remote PCF Diameter endpoint. 5 The Remote PCF Diameter endpoint sends the Rx RAA response to the PCRF.
Standards Compliance
This feature complies with the following standards specifications: · 3GPP TS 29.510 V15.2.0 (2018-12) "Network Function Repository Services"
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 432

VoNR through the Rx Interface

Limitations

Limitations

This feature has the following limitations in this release:
· The deployment or configuration of the PCF Binding database (SkDB) Mongo instances is not supported via PCF. The PCF binding database instances are deployed through the PCRF installation with PCF SkDB as separate "sites."
· The Gx interface traffic should not be configured on PCF because it supports only the Diameter Rx interface with the Rx rerouting enabled.
· The remote binding database lookup in PCRF for a session can be enabled only when the existence is configured.
· If the PCRF BindingDB lookup capability is disabled in PCF, then PCF forwards all the requests for which the associated sessions are not found in the PCF CDL database to the local PCRF.

Enabling Interaction Between PCF and PCRF for VoNR Calls
This section describes the configurations that you must perform to enable the interaction between PCF and PCRF.
· Configuring the Interface Between PCF and PCRF
Configuring the Interface Between PCF and PCRF
The gRPC interface is configured on PCRF to accept the Diameter request. You can configure the gRPC interface by adding the com.broadhop.diameter2.local.cnat.feature to the /etc/broadhop/pcrf/features file.

Note The com.broadhop.diameter2.local.cnat.feature capability is an additional requirement to the standard list of features that are required for 4G PCRF to be operational.
To enable the access, configure the following system properties using the existing "properties" CLI which is available through the engine node:
· diameter grpc channel count integer: Specifies the number of gRPC channels that each diameter-ep replica opens toward a diameter-engine.
· diameter group group stack stack grpc ext-svc ip ip-address port port: Indicates the externally accessible IP: Port for the diameter-ep service that belongs to the specified group and stack. This property enables the specified diameter-ep to receive incoming gRPC requests from diameter-engines outside the K8 cluster.
· diameter group group stack stack diameter-engine alt-engines primary svc-name external-service-name port port: Indicates the external-service-name that refers to the service defined under the root level external-services CLI node. The port number corresponds to the port number on which the alternate primary engine is listening (for gRPC requests). This port number must be included in the list of port numbers for the configured external-service.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 433

VoNR through Rx Interface OA&M Support

VoNR through the Rx Interface

· diameter group group stack stack diameter-engine alt-engines secondary svc-name external-service-name port port: Acts as the alternative for the primary diameter-engine that is configured for diameter group group stack stack diameter-engine alt-engines primary svc-name external-service-name port port. If PCF diameter-ep is unable to send the request to the primary engine, it reattempts sending the request on the secondary diameter-engine.
· diameter group group stack stack diameter-engine alt-engines check-session-exists [ true | false] : Enables verification of the session's existence (using PCRF BindingDB/SkDB) before forwarding the request to the alternate engine. If this property is enabled and the session is not found on the alternate engines, then the message is sent to the local pcf-engine for error handling. By default, the property is configured as False.
· external-services svc-name ips list of ip addresses ports list of ports: Holds the external service definition for services that exist outside the K8 cluster. This property creates an Egress or external K8 service that comprises of the IP addresses/port numbers which allows access to services outside the cluster. For example, alternate Diameter engines.
· etcd external-ips list of IP addresses: Lists the externally accessible IP addresses for the etcd Diameter endpoint registry that enables access beyond the K8 cluster.

VoNR through Rx Interface OA&M Support
This section describes operations, administration, and maintenance information for this feature.

Statistics

This section provides the list of statistics and counters that enable you to track the flow of messages between PCRF and PCF:
· grpc_message_send_total: Collects the total count of messages that are sent over the gRPC toward the PCF Engine. This metric support the following tag and values:
· command_code, application, remote_service: Counts the number of Diameter requests sent toward the Diameter Engines.
The command_code represents the Diameter command code and the application represents the Diameter application to which the message belongs.
The remote_service corresponds to the name of the Diameter engine service to which the request is forwarded to.
For the PCF Engine, the metric corresponds to the Diameter Engine value.
For alternate engines, it corresponds to the name of the external service selected.

For information on statistics, see Ultra Cloud Core 5G Policy Control Function, Statistics Reference.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 434

6 3 C H A P T E R

Advanced Tuning Parameters

· Feature Summary and Revision History, on page 435 · Feature Description, on page 436 · Configuration Support for the Advanced Tuning Parameters, on page 436 · OAM Support, on page 439
Feature Summary and Revision History

Summary Data
Table 219: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Disabled ­ Configuration required to enable Not Applicable

Revision History
Table 220: Revision History
Revision Details Enhancement introduced. PCF supports message threshold per endpoint. Enhancement introduced. Added procedure to configure the N7 stale session error codes. First introduced.

Release 2022.02.0 2020.05.01 2020.01.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 435

Feature Description

Advanced Tuning Parameters

Feature Description
The PCF Ops Center allows you to configure the advanced tuning parameters for PCF. The tuning parameters primarily consist of the async-threading and http2-threading parameters. These parameters provide the flexibility of the tuning threads responsible for PCF's incoming and outgoing requests over HTTP.
Note Configure the advanced tuning parameter values only if you have a strong understanding of the PCF deployment.
PCF supports the message threshold per endpoint.
Note Message threshold is applicable only for the configured message types in rest-endpoint
Configuration Support for the Advanced Tuning Parameters
This section describes how to configure the advanced tuning parameters using the CLI. The configuration of the advanced tuning parameters involves:
· Configuring the Async Threading Parameters · Configuring the HTTP2 Threading Parameters · Configuring the N7 Stale Session Error Codes · Configuring the Message Threshold Per Endpoint · Configuring the HTTP2 Heap Memory Tuning
Configuring the Async Threading Parameters
This section describes how to fine tune the async threading parameters. To configure the http2-threading parameters, use the following configuration in the Policy Ops Center console: config
advance-tuning async-threading
default-priority default_priority default-worker-threads default_worker_threads default-queue-size default_queue_size default-processing-threads default_processing_threads default-drop-oldest-when-full [ true | false ] threading-config service_name priority priority queue-size queue_size threads number_threads end
Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 436

Advanced Tuning Parameters

Configuring the HTTP2 Threading Parameters

NOTES: · advance-tuning--Enters the advance tuning configuration mode.
· async-threading--Enters the async threading configuration mode.
· default-priority default_priority--Specify the default priority level.
· default-worker-threads default_worker_threads--Specify the default number of worker threads.
· default-queue-size default_queue_size--Specify the default size of the queue.
· default-processing-threads default_processing_threads--Specify the default number of threads used for processing.
· default-drop-oldest-when-full [ true | false ] --Indicates if the oldest message in the queue should be removed when the queue is full.
· threading-config service_name--Specify the service name for which the threading configuration is enabled.
· priority priority--Specify the priority of the thread.
· queue-size queue_size--Specify the queue size.
· threads number_threads--Specify the number of threads to be processed.
Configuring the HTTP2 Threading Parameters
This section describes how to refine the http2-threading parameters. To configure the http2-threading parameters, use the following configuration in the Policy Ops Center console: config
http2-threading min-thread-pool-size min_thread_pool max-thread-pool-size max_thread_pool
idle-thread-timeout-ms idle_thread_timeout max-queue-capacity max_queue_capacity disable-validation [ true | false ] end NOTES: · http2-threading http2_threading--Specify the parameters for inbound SBA requests that are received by PCF.
· min-thread-pool-size min_thread_pool--Specify the minimum number of threads for processing the inbound SBA request. The accepted range contains integers. Default value is 5.
· max-thread-pool-size max_thread_pool--Specify the maximum size of the thread pool.
· idle-thread-timeout-ms idle_thread_timeout--Specify the time in milliseconds that the thread can remain idle. idle_thread_timeout must contain only integers. Default value is 60000.
· disable-validation [ true | false ]--Disables the validation of the request sent to PCF. [ true | false ] must contain the value as true or false. Default value is false.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 437

Configuring the N7 Stale Session Error Codes

Advanced Tuning Parameters

· max-queue-capacity max_queue_capacity--Specify the maximum number of requests that can wait in the queue for processing. max_queue_capacity must contain only integers. Default value is 5000.
· max-thread-pool-size max_thread_pool--Specify the maximum number of threads that PCF can accommodate in the pool. max_thread_pool_size must contain only integers. Default value is 20.
Configuring the N7 Stale Session Error Codes
This section describes how to configure the error codes for the N7 stale sessions.
To configure the n7-stale-session-error-codes parameters, use the following configuration in the Policy Ops Center console:
config advance-tuning n7-stale-session-error-codes error_codes end
NOTES:
· n7-stale-session-error-codes error_codes--Specify the error code values for the N7 sessions. When a session is idle, the PCF revalidates it by using the N7NotifyUpdate request. If the N7NotifyUpdate response includes any one or more specified error codes, then the session expiry time is reverted to original value.
You can specify multiple error codes using comma-separated values.
Configuring the Message Threshold Per Endpoint
This section describes how to configure the message threshold enhancement.
To configure the message threshold enhancement, use the following configuration in the Policy Ops Center console:
config advance-tuning overload-control rest global action threshold-action { N7_CREATE | N7_DELETE | N7_UPDATE
| N15_CREATE | N15_DELETE | N15_UPDATE} discard-action { DROP | REJECT } threshold-count
threshold_count
end
NOTES:
· discard-action { DROP | REJECT } threshold-count threshold_count--Specify the type of discard-action when the message is received at endpoint. The threshold-count provides the maximum number of inbound messages for each threshold-action configured per endpoint. For example, N7_CREATE or N7_DELETE.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 438

Advanced Tuning Parameters

Configuring the HTTP2 Heap Memory Tuning

Configuring the HTTP2 Heap Memory Tuning
This section describes how to configure the http2 heap memory tuning. To configure the http2 heap memory tuning parameters, use the following configuration in the PCF Ops Center console:
config advance-tuning app-resource-control rest-ep memory max-heap-size
max_heap_size
advance-tuning app-resource-control rest-ep memory new-gen-size
new_gen_size
advance-tuning http2-client-threading interface-config interface_type
max-thread-pool-size max_thread_pool_size max-heap-size max_heap_size exit NOTES: · advance-tuning app-resource-control rest-ep memory max-heap-size max_heap_size--Specifies the max heap size (in GB) allotted to a rest-ep. The accepted range contains integers. Default value is 4.
· advance-tuning app-resource-control rest-ep memory new-gen-size new_gen_size--Specifies the new gen size (in GB) allotted to a rest-ep. The accepted range contains integers. Default value is 3.
· advance-tuning http2-client-threading interface-config interface_type max-thread-pool-size max_thread_pool_size--Specifies the maximum size of the thread pool. The accepted range contains integers. The default value is 200, minimum value is 20, and the maximum value is 400.
· advance-tuning http2-client-threading interface-config interface_type max-heap-size max_heap_size --Specifies http2-client max heap size configured for an interface. The accepted range contains long. The default value is -1, and the minimum value is 16384.
· The above http2-client-threading configuration is supported for all type of interfaces (N5, N7, N15, N28, N36 and NRF).
OAM Support
This section describes operations, administration, and maintenance information for this feature.
Bulk Statistics Support
This section provides the list of statistics and counters that are generated for the monitoring for message threshold enhancement.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 439

Bulk Statistics Support

Advanced Tuning Parameters

Note The following values apply to all the statistics: · Unit - Int64 · Type - Counter · Nodes - Service
The following metrics track the counter information: · inbound_request_threshold_exceeded_total - Captures the total count of the inbound threshold requests exceeded due to overload. The following labels are defined for this metric: · interface_name · service_name · operation_name · command · action

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 440

6 4 C H A P T E R

PCF Application-Based Alerts

· Feature Summary and Revision History, on page 441 · Feature Description, on page 441 · How it Works, on page 442 · Configuring Alert Rules, on page 442 · Sample Alerts Configuration, on page 444
Feature Summary and Revision History

Summary Data
Table 221: Summary Data
Applicable Products or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

PCF SMI Disabled ­ Configuration required to enable Not Applicable

Revision History
Table 222: Revision History
Revision Details First introduced.

Release 2020.01.0

Feature Description
When the system detects an anomaly, it generates an alert notification. The system statistics are the cause for these alert notifications. You can set an expression to trigger an alert when the expression becomes true.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 441

How it Works

PCF Application-Based Alerts

How it Works
This section describes how this feature works.
The Common Execution Environment (CEE) uses the Prometheus Alert Manager for alerting operations. The CEE YANG model, accessible through CLI or API, allows you to view the active alerts, silenced alerts, and alert history. During the application installation or upgradation, the system adds a set of preset alerting rules. Also, the applications can call the alert API directly to add or clear alerts. The Prometheus Alert Manager API (v2) is the standard API used.
The Prometheus Alerts Manager includes the following options:
· DefiningAlert Rules: This option defines the types of alerts that the Alert Manager should trigger. Use the Prometheus Query Language (PromQL) to define the alerts.
· Defining Alert Routing: This option defines the action the Alert Manager should take after receiving the alerts. At present, the SNMP Trapper is supported as the outbound alerting. Also, the CEE provides an Alert Logger for storing the generated alerts.
Configuring Alert Rules
This section describes how to configure the alert rules.
To configure the alert rules, use the following configuration:
config alerts rules group alert_group_name rule rule_name expression promql_expression duration duration severity severity_level type alert-type annotation annotation_name value annotation_value end
NOTES:
· alerts rules--Specify the Prometheus alerting rules.
· group alert_group_name--Specify the Prometheus alerting rule group. One alert group can have multiple lists of rules. alert-group-name is the name of the alert group. alert_group_name must be a string in the range of 0­64 characters.
· rule rule_name--Specify the alerting rule definition. rule_name is the name of the rule.
· expression promql_expression--Specify the PromQL alerting rule expression. promql_expression is the alert rule query expressed in PromQL syntax. The promql_expression must be a string in the range of 0­64 characters.
· duration duration--Specify the duration of a true condition before it is considered true. duration is the time interval before the alert is triggered.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 442

PCF Application-Based Alerts

Viewing Alert Logger

· severity severity_level--Specify the severity of the alert. severity-level is the severity level of the alert. The severity levels are critical, major, minor, and warning.
· type alert_type--Specify the type of the alert. alert_type is the user-defined alert type. For example, Communications Alarm, Environmental Alarm, Equipment Alarm, Indeterminate Integrity Violation Alarm, Operational Violation Alarm, Physical Violation Alarm, Processing Error Alarm, Quality of Service Alarm, Security Service Alarm, Mechanism Violation Alarm, or Time Domain Violation Alarm.
· annotation annotation_name--Specify the annotation to attach to the alerts. annotation_name is the name of the annotation.
· value annotation_value--Specify the annotation value. annotation_value is the value of the annotation.
The following example configures an alert, which is triggered when the percentage of N7 responses is less than the specified threshold limit.
Example:
configure terminal alerts rules group PCFN7chk_incr interval-seconds 300 rule PCFN7chk_incr expression "sum(increase(inbound_request_total{interface_name=\"N7\",
result_code=~\"2..\"}[3m])) / sum(increase(inbound_request_total{interface_name=\"N7\"}[3m]))< 0.95" severity major type "N7 Communications Alarm" annotation summary value "This alert is fired when the percentage of N7 responses is less than threshold" exit exit
exit
Viewing Alert Logger
The Alert Logger stores the alerts that PCF generates by defualt. You can view these alerts using the following command:
show alert history [ filtering ]
You can narrow down the result using the following filtering options:
· annotations--Specify the annotations of the alert.
· endsAt--Specify the end time of the alert.
· labels--Specify the additional labels of the alert.
· severity--Specify the severity of the alert.
· source--Specify the source of the alert.
· startsAt--Specify the start time of the alert.
· type--Specify the type of the alert.
You can view the active and silenced alerts with the show alerts active and show alerts active commands.
Example:

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 443

Sample Alerts Configuration

PCF Application-Based Alerts

show running-config alerts interval-seconds 300 rule PCFN7chk_incr expression "sum(increase(inbound_request_total{interface_name=\"N7\",
result_code=~\"2..\"}[3m])) / sum(increase(inbound_request_total{interface_name=\"N7\"}[3m]))< 0.95" severity major type "N7 Communications Alarm" annotation summary value "This alert is fired when the percentage of N7 responses is less than threshold" exit exit
exit
The following example displays the history of the alerts configured in the system:
Example:
show alerts history alerts active PCFN7chk_incr ac2a970ab621 state active severity major type "N7 Communications Alarm" startsAt 2019-11-15T08:26:48.283Z source System annotations [ "summary:This alert is fired when the percentage of N7 responses is less than
threshold." ]
The following example displays the active alerts. The alerts remain active as long as the evaluated expression is true.
Example:
show alerts active alerts active PCFN7chk_incr ac2a970ab621 state active severity major type "N7 Communications Alarm" startsAt 2019-11-15T08:26:48.283Z source System annotations [ "summary:This alert is fired when the percentage of N7 responses is less than
threshold." ]
Sample Alerts Configuration
This section provides sample configurations that are defined in PCF.
Interface-Specific Alerts
N7 Interface Inbound
Use the following commands to configure alerts related to an inbound N7 interface.
alerts rules group PCFSvcStatus interval-seconds 300 rule PCFN7Inbound expression sum(increase(inbound_request_total{interface_name=\"N7\",
result_code=~\"2..\"}[5m])) /sum(increase(inbound_request_total{interface_name =\"N7\"}[5m])) <0.90

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 444

PCF Application-Based Alerts

Interface-Specific Alerts

severity major type Communications Alarm annotation summary value This alert is fired when the percentage of Success N7 responses sent is lesser
threshold.
exit exit
N7 Interface Outbound
Use the following commands to configure alerts related to an outbound N7 interface.
alerts rules group PCFSvcStatus interval-seconds 300 rule PCFN27outbound expression sum(increase(outgoing_request_total{interface_name
=\"N7\",response_status=~\"2..\"}[5m])) /sum(increase(outgoing_request_total{interface_name =\"N7\"}[5m])) <0.90
severity major type Communications Alarm annotation summary value This alert is fired when the percentage of Success N7 responses received is lesser
threshold.
exit exit
N28 Interface Inbound
Use the following commands to configure alerts related to an inbound N28 interface.
alerts rules group PCFSvcStatus interval-seconds 300 rule PCFN28Inbound expression
sum(increase(inbound_request_total{interface_name=\"N28\",response_status=~\"2..\"}[5m])) /sum(increase(inbound_request_total{interface_name =\"N28\"}[5m])) <0.90
severity major type Communications Alarm annotation summary value This alert is fired when the percentage of Success N28 responses sent is lesser
threshold.
exit exit
N28 Interface Outbound
Use the following commands to configure alerts related to an outbound N28 interface.
alerts rules group PCFSvcStatus interval-seconds 300 rule PCFN28outbound expression sum(increase(outgoing_request_total{interface_name
=\"N28\",response_status=~\"2..\"}[5m])) /sum(increase(outgoing_request_total{interface_name =\"N28\"}[5m])) <0.90
severity major

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 445

Message-Level Alerts

PCF Application-Based Alerts

type Communications Alarm annotation summary value This alert is fired when the percentage of Success N28 responses received is
lesser threshold.
exit exit
Diameter Rx Interface Inbound
Use the following commands to configure alerts related to an inbound Diameter Rx interface.
alerts rules group PCFSvcStatus interval-seconds 300 rule PCFNRxInbound expression
sum(increase(diameter_responses_total{command_code=\"AAA|STA\",response_status=~\"2001\"}[5m])) /sum(diameter_responses_total(outgoing_request_total{command_code=\"A AA|STA\"}[5m])) <
0.90
severity major type Communications Alarm annotation summary value This alert is fired when the percentage of Success Rx responses Send is lesser
threshold.
exit exit
Diameter Rx Interface Outbound
Use the following commands to configure alerts related to an outbound Diameter Rx interface.
alerts rules group PCFSvcStatus interval-seconds 300 rule PCFNRxOutbound expression
sum(increase(diameter_responses_total{command_code=\"RAA|ASA\",response_status=~\"2001\"}[5m])) /sum(diameter_responses_total(outgoing_request_total{command_code=\"AAA|STA\"}[5m])) <
0.90
severity major type Communications Alarm annotation summary value This alert is fired when the percentage of Success Rx responses received is lesser
threshold.
exit exit
Message-Level Alerts
N7 Create Request
Use the following commands to configure alerts related to N7 Create Request.
alerts rules group PCFSvcStatus interval-seconds 300 rule N7CreateRequest

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 446

PCF Application-Based Alerts

Message-Level Alerts

expression sum(increase(inbound_request_total{interface_name=\"N7\", command=\"Create\",
result_code=~\"2..\"}[5m])) / sum(increase(inbound_request_total{interface_name =\"N7\", command=\"Create\"}[5m])) < 0.90
severity major type Communications Alarm annotation summary value This alert is fired when the percentage of Success N7 Create responses sent is
lesser threshold.
exit exit
N7 Update Request
Use the following commands to configure alerts related to N7 Update Request.
alerts rules group PCFSvcStatus interval-seconds 300 rule N7UpdateRequest expression sum(increase(inbound_request_total{interface_name=\"N7\", command=\"Update\",
result_code=~\"2..\"}[5m])) /sum(increase(inbound_request_total{interface_name =\"N7\", command=\"Update\"}[5m])) < 0.90
severity major type Communications Alarm annotation summary value This alert is fired when the percentage of Success N7 Update responses sent is
lesser threshold.
exit exit
N7 Delete Request
Use the following commands to configure alerts related to N7 Delete Request.
alerts rules group PCFSvcStatus interval-seconds 300 rule N7DeleteRequest expression sum(increase(inbound_request_total{interface_name=\"N7\",command=\"Delete\",
result_code=~\"2..\"}[5m])) /sum(increase(inbound_request_total{interface_name =\"N7\",command=\"Delete\"}[5m])) < 0.90
severity major type Communications Alarm annotation summary value This alert is fired when the percentage of Success N7 Delete responses sent is
lesser threshold.
exit exit
N7 Notify Request
Use the following commands to configure alerts related to N7 Notify Request.
alerts rules group PCFSvcStatus interval-seconds 60 rule N7NotifyUpdate expression sum(increase(outgoing_request_total{interface_name
=\"N7\",command=\"Notify\", response_status=~\"2..\"}[5m]))

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 447

Message-Level Alerts

PCF Application-Based Alerts

/sum(increase(outgoing_request_total{interface_name =\"N7\",command=\"Notify\"}[5m])) < 0.90
severity major type Communications Alarm annotation summary value This alert is fired when the percentage of Success N7 Notify responses received
is lesser threshold.
exit exit
N28 Subscribe (Initial) Request
Use the following commands to configure alerts related to N28 Subscribe Request.
alerts rules group PCFSvcStatus interval-seconds 60 rule N28Subscribe expression sum(increase(outgoing_request_total{interface_name
=\"N28\",command=\"Subscribe\", response_status=~\"2..\"}[5m])) /sum(increase(outgoing_request_total{interface_name =\"N28\",command=\"Subscribe\"}[5m])) < 0.90
severity major type Communications Alarm annotation summary value This alert is fired when the percentage of Success N28 Subscribe (Initial)
responses received is lesser threshold.
exit exit
N28 Subscribe (Update) Request
Use the following commands to configure alerts related to N28 Subscribe Update Request.
alerts rules group PCFSvcStatus interval-seconds 60 rule N28SubscribeUpdate expression sum(increase(outgoing_request_total{interface_name =\"N28\",
command=\"Subscribe_Update\", response_status=~\"2..\"}[5m])) / sum(increase(outgoing_request_total{interface_name =\"N28\", command=\"Subscribe_Update\"}[5m])) < 0.90
severity major type Communications Alarm annotation summary value This alert is fired when the percentage of Success N28 Subscribe (Update) responses
received is lesser threshold.
exit exit
N28 Notify Request
Use the following commands to configure alerts related to N28 Notify Request.
alerts rules group PCFSvcStatus interval-seconds 60 rule N28Notify expression sum(increase(outgoing_request_total{interface_name =\"N28\",

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 448

PCF Application-Based Alerts

Message-Level Alerts

command=\"Notify\", response_status=~\"2..\"}[5m])) / sum(increase(outgoing_request_total{interface_name =\"N28\", command=\"Notify\"}[5m])) < 0.90
severity major type Communications Alarm annotation summary value This alert is fired when the percentage of Success N28 Notify responses send is
lesser threshold.
exit exit
Rx AAR Request
Use the following commands to configure alerts related to Rx AAR Request.
alerts rules group PCFSvcStatus interval-seconds 300 rule RxAAR expression sum(increase(diameter_responses_total{command_code=\"AAA\",
response_status=~\"2001\"}[5m])) / sum(diameter_responses_total(outgoing_request_total{command_code=\"AAA\"}[5m])) < 0.90"
severity major type Communications Alarm annotation summary value This alert is fired when the percentage of Success Rx AAR responses send is lesser
threshold.
exit exit
Rx STR Request
Use the following commands to configure alerts related to Rx STR Request.
alerts rules group PCFSvcStatus interval-seconds 300 rule RxSTR expression
sum(increase(diameter_responses_total{command_code=\"STA\",response_status=~\"2001\"}[5m])) /sum(diameter_responses_total(outgoing_request_total{command_code=\"STA\"}[5m])) < 0.90
severity major type Communications Alarm annotation summary value This alert is fired when the percentage of Success Rx STA responses send is lesser
threshold.
exit exit
Rx RAR Request
Use the following commands to configure alerts related to Rx RAR Request.
alerts rules group PCFSvcStatus interval-seconds 300 rule RxSTR expression sum(increase(diameter_responses_total{command_code=\"RAA\",
response_status=~\"2001\"}[5m]))

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 449

Process-Level Alerts

PCF Application-Based Alerts

/sum(diameter_responses_total(outgoing_request_total{command_code=\"RAA\"}[5m])) < 0.90
severity major type Communications Alarm annotation summary value This alert is fired when the percentage of Success Rx RAR responses Received is
lesser threshold.
exit exit
Rx ASR Request
Use the following commands to configure alerts related to Rx ASR Request.
alerts rules group PCFSvcStatus interval-seconds 300 rule RxASR expression
sum(increase(diameter_responses_total{command_code=\"ASA\",response_status=~\"2001\"}[5m])) /sum(diameter_responses_total(outgoing_request_total{command_code=\"ASA\"}[5m])) < 0.90
severity major type Communications Alarm annotation summary value This alert is fired when the percentage of Success Rx ASR responses send is lesser
threshold.
exit exit
Process-Level Alerts
CDL Endpoint Down
Use the following commands to configure alerts related to CDL endpoint down.
alerts rules group cdl-ep-change rule pod-down expression up{pod=~'cdl-ep.*'} == 0 duration 1m severity major type Equipment Alarm annotation description value CDL EP Pod Down exit
exit
CDL Slot State Change
Use the following commands to configure alerts related to CDL slot state change.
alerts rules group cdl-slot-change rule pod-down expression up{pod=\"cdl-slot-session-c1-m1-0\"} == 0 severity major type Equipment Alarm

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 450

PCF Application-Based Alerts

Process-Level Alerts

annotation description value CDL Pod Slot Change exit exit
Diameter Endpoint State Change
Use the following commands to configure alerts related to Diameter endpoint state change.
alerts rules group diamter-ep-change rule pod-down expression up{pod=~'diameter-ep.*'} == 0 duration 1m severity major type Equipment Alarm annotation description value Diameter EP Change exit
exit
ETCD State Change
Use the following commands to configure alerts related to etcd state change.
alerts rules group ep-mapping-change rule pod-down expression up{pod=~'etcd-pcf.*'} == 0 duration 1m severity major type Equipment Alarm annotation description value EP Mapping Change exit
exit
Grafana Dashboard State Change
Use the following commands to configure alerts related to Grafana dashboard state change.
alerts rules group grafana-dashboard-change rule pod-down expression up{pod=~'grafana-dashboard.*'} == 0 duration 1m severity major type Equipment Alarm annotation description value Grafana Dashboard Change exit
exit
Kafka State Change
Use the following commands to configure alerts related to Kafka state change.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 451

Process-Level Alerts

PCF Application-Based Alerts

alerts rules group kafka-change rule pod-down expression up{pod=~'kafka.*'} == 0 duration 1m severity major type Equipment Alarm annotation description value Kafka Changed exit
exit
LDAP Endpoint State Change
Use the following commands to configure alerts related to LDAP endpoint state change.
alerts rules group ldap-change rule pod-down expression up{pod=~'ldap-pcf.*'} == 0 duration 1m severity major type Equipment Alarm annotation description value LDAP Pod Changed exit
exit
PCF Engine State Change
Use the following commands to configure alerts related to PCF Engine state change.
alerts rules group pcf-engine-change rule pod-down expression up{pod=~'pcf-engine-pcf.*'} == 0 duration 1m severity major type Equipment Alarm annotation description value PCF Engine Changed exit
exit
REST Endpoint State Change
Use the following commands to configure alerts related to REST endpoint state change.
alerts rules group pcf-rest-ep-change rule pod-down expression up{pod=~'pcf-rest-ep.*'} == 0 duration 1m severity major type Equipment Alarm annotation description value PCF Rest EP Change

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 452

PCF Application-Based Alerts

Call Flow Procedure Alerts

exit exit
Call Flow Procedure Alerts
LDAP Query Request
Use the following commands to configure alerts related to LDAP Query Request.
alerts rules group PCFProcStatus interval-seconds 300 rule LDAPQuery expression sum(increase(message_total{type=~\".*_ldap_query\", status=\"success\"}[5m]))
/sum(increase(message_total{type=~\".*_ldap_query\"}[5m])) < 0.90
severity major type Communications Alarm annotation summary value This alert is fired when the success percentage of ldap query request is lesser
threshold.
exit exit
LDAP Modify Request
Use the following commands to configure alerts related to LDAP Modify Request.
alerts rules group PCFProcStatus interval-seconds 300 rule LDAPModify expression sum(increase(message_total{component=\"ldap-ep\", type=~\".*_ldap_modify\",
status=\"success\"}[5m])) / sum(increase(message_total{component=\"ldap-ep\", type=~\".*_ldap_modify\"}[5m])) < 0.90
severity major type Communications Alarm annotation summary value This alert is fired when the success percentage of ldap modify request is lesser
threshold.
exit exit
PLF Query Request
Use the following commands to configure alerts related to PLF Query Request.
alerts rules group PCFProcStatus interval-seconds 300 rule PLFRequest expression
sum(increase(message_total{type=~\"ldap_search-res_success\",status=\"success\"}[5m])) /sum(increase(message_total{type=~\"ldap_search-res_.*\"}[5m])) <0.90
severity major type Communications Alarm annotation summary value This alert is fired when the success percentage of PLF request is lesser threshold.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 453

System Alerts

PCF Application-Based Alerts

exit exit
NAP Notification Request
Use the following commands to configure alerts related to NAP Notification Request.
alerts rules group PCFProcStatus interval-seconds 300 rule NAPNotification expression sum(increase(message_total{type=~\"ldap_change-res_success\",
status=\"success\"}[5m])) /sum(increase(message_total{type=~\"ldap_change-res_.*\"}[5m])) <0.90
severity major type Communications Alarm annotation summary value This alert is fired when the success percentage of NAP request is lesser threshold.
exit exit
System Alerts
Disk Full Alert
Use the following commands to configure alerts related to disk full alert.
alerts rules group rule node-disk-running-full expression node_filesystem_usage > 0.0001 duration 5m severity critical type Processing Error Alarm annotation disk_full value test exit
exit
VM Down Alert
Use the following commands to configure alerts related to virtual machine down alert.
alerts rules group vm-state-change rule vm-down expression up{pod=~\"node-expo.*\"} == 0 duration 1m severity major type Equipment Alarm annotation summary value VM Down exit
exit

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 454

PCF Application-Based Alerts

System Alerts

High Memory Usage
Use the following commands to configure alerts related to high memory usage.
alerts rules group memory-util-high rule mem-util-high expression avg(node_memory_MemAvailable_bytes /node_memory_MemTotal_bytes * 100) by
(hostname) < 20
duration 1m severity critical type Processing Error Alarm annotation mem_util_high value Hig Memory Usage exit exit
High Disk Usage
Use the following commands to configure alerts related to high disk usage alert.
alerts rules group disk-util-high duration 1m rule disk-util-high expression avg (node_filesystem_avail_bytes{mountpoint =\"/\"}
/node_filesystem_size_bytes{mountpoint =\"/\"} *100) by (hostname) <20
severity critical type Processing Error Alarm annotation description value Hig Memory Usage exit exit
High CPU Usage
Use the following commands to configure alerts related to high CPU usage alert.
alerts rules group cpu-util-high rule cpu-util-idle duration 1m expression avg(rate(node_cpu_seconds_total{mode='idle'}[1m])) by (hostname) *100 < 50
severity critical type Processing Error Alarm annotation description value Hig CPU exit exit

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 455

System Alerts

PCF Application-Based Alerts

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 456

6 5 C H A P T E R

Event Logs

· Feature Summary and Revision History, on page 457 · Feature Description, on page 457 · How it Works, on page 458 · Viewing the Logs, on page 458 · Troubleshooting Information, on page 458
Feature Summary and Revision History

Summary Data
Table 223: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation
Revision History
Table 224: Revision History
Revision Details First introduced.

PCF SMI Enabled ­ Always-on Not Applicable
Release 2020.02.0

Feature Description
PCF provides a centralized view of the application logs that are consolidated from different containers. The unified view improves the efficiency as you can determine the issue faster instead of accessing the individual containers to view the logs. Collection of logs from the containers is enabled by default.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 457

How it Works

Event Logs

You can view the logs in the real time and offline mode. The real-time mode captures the current event activity that is performed on the container. In the offline mode, you have the flexibility to access the logs from a remote machine. Logs are listed based on the timestamp at which they are generated.
How it Works
This section describes how this feature works. The OAM node hosts the logs which different application containers generate. These containers include the pcf (engine), pcf-rest-ep, policy-builder, diameter-ep, ldap-ep, crd, and unifiedapi.
Viewing the Logs
This section describes how to view the consolidated application logs. To view the consolidated logs, use the following command: kubectl logs -n namespace consolidated-logging-0 NOTES:
· namespace ­ Specifies the namespace under which PCF is deployed.
Troubleshooting Information
This section provides information for troubleshooting any issues that may arise during the feature operation. If the logs are not generated in the consolidated-logging-0 pod, then one of the following conditions may be causing the failure. To resolve the issue, make sure that you do the following:
· Verify the status of <namespace>-pcf-oam-app helm deployment. To view the configured helm charts and their status, use the following command: helm list
· Ensure that the gRPC stream appender is enabled by verifying the contents of cps-logback configMap. To verify the contents, use the following command: kubectl describe configmap -n namespace cps-logback
· Ensure that the consolidated-logging-0 pod is up and running. To check the pod status, use the following command: kubectl describe pod consolidated-logging-0 -n namespace
· Verify that the consolidated-logging-0 pod is accessible through the consolidated-logging service. To verify the connection, use the nc command.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 458

6 6 C H A P T E R

Troubleshooting Information

· Feature Summary and Revision History, on page 459 · Debugging the PCF Deployment Issues, on page 460 · Issue with Refreshing the PCF Ops Center, on page 461 · Subscriber Not Found or Primary Key Not Found, on page 463 · Message Routing Issues, on page 463 · Collecting the Troubleshooting Information, on page 464 · Interface Error Codes, on page 465 · Forwarding logs to the Splunk Server, on page 467 · Pods stop running when PCF is upgraded through the Rolling Upgrade process, on page 468
Feature Summary and Revision History

Summary Data
Table 225: Summary Data
Applicable Product(s) or Functional Area Applicable Platform(s) Feature Default Setting Related Documentation

SMI PCF Enabled ­ Configuration required to disable Not Applicable

Revision History
Table 226: Revision History
Revision Details First introduced.

Release 2020.01.0

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 459

Debugging the PCF Deployment Issues

Troubleshooting Information

Debugging the PCF Deployment Issues

This section describes how to debug the issues that may occur when you deploy PCF through the SMI Deployer. To debug the deployment issues, use the following checklist. If the checklist does not assist you in resolving the issue, analyze the diagnostic data that is available in the form of logs.
Table 227: Troubleshooting Checklist

Task

Resolution

Verify if the Ops Center is refreshing with the latest configurations

Manually verify if the configurations are refreshed.
If the Ops Center is not refreshing or displaying the recent changes, then reinstall the helm charts.
For information on reinstalling the charts, see Issue with Refreshing the PCF Ops Center, on page 461.

Validate if the external Use Telnet or any other application protocol and access the external IP address. This

IPs and ports are

is to confirm that the IP address is accessible.

accessible.

If you are unsure of the IP address, run the following in the Kubernetes service to

view the configured external IP addresses and port number:

kubectl get services -n namespace

Ensure that the IP Use the following command to open the ports: addresses and ports that are configured for firewall-cmd ­zone=public ­add-port= port/tcp ­permanent PCF are open in the firewall.

Confirm if PCF

Use the following command on the master node to verify that a healthy connection

connects with the other is available between the NFs:

NFs. nc -v

Alternatively, from the proto VM, run the nc -v command on the Telnet CLI.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 460

Troubleshooting Information

Issue with Refreshing the PCF Ops Center

Task

Resolution

Validate that the

Use the following steps to determine which helm chart is not listed in the helm list:

successfully deployed helm chart is listed in

1.

Run the following on the master node to view the list of deployed helm charts:

the helm list.

helm list

2. If the helm chart is not found, run the following in the operational mode to view the charts irrespective of their deployment status.

show helm charts

3. Review the pcf-ops-center logs to identify the helm chart which has the issue. Depending on the issue, take the appropriate action.
Alternatively, you can review the consolidated set of logs, using the following command:

kubectl logs -n namespace consolidated-logging-0

For information about the event logs, see Event Logs, on page 457.

Issue with Refreshing the PCF Ops Center
This section describes how to refresh the PCF Ops Center to display the latest configurations.
Problem The PCF Ops Center is not considering the recent configurations due to which you may observe stale data or not get the expected response.
Resolution You can refresh the PCF Ops Center using the basic and advanced steps. Perform the advanced steps only when the basic steps do not resolve the issue.
Basic 1. Run the following to undeploy PCF from the Ops Center:
system mode shutdown 2. Use the following to manually purge any pending deployments from the helm:
helm delete --purge helm_chart_name 3. From the master node, run the following to delete the configMaps from the namespace where PCF is
installed: kubectl delete cm config_map_name -n namespace 4. Run the following to delete the product-specific configMaps from the CNEE namespace. a. Use the following to list the available configMaps:
kubectl get configmaps -n namespace

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 461

Issue with Refreshing the PCF Ops Center

Troubleshooting Information

From the list, determine the configMap that you want to delete. b. Run the following to delete the configMap:
Kubectl delete configmap configmap_name -n namespace
5. Use the following commands to reinstall the helm chart. Once the chart is installed, a new instance of the PCF Ops Center is available. helm upgrade ­install release name addR/chart_name -f filenames --namespace
namespace
Advanced 1. Remove the cnee-ops-center. 2. Delete the configMaps from the namespace.
For more information on step 1 and 2, see the Basic steps. 3. Install the PCF Ops Center. For information on how to PCF Ops Center, see Deploying and Accessing
PCF, on page 16.
The recent configuration is not rendered because the responsible pods are not in a healthy state to process the refresh request. To investigate the issue at the pod level, review the pod's state. Use the following command to view the pod's logs: kubectl describe pod pod_name -n namespace Alternatively, you can review the consolidated set of logs, using the following command: kubectl logs -n namespace consolidated-logging-0 For information about the event logs, see Event Logs, on page 457. In the logs, the values in the Status and Ready columns indicate the following:
· If the Status column displays the state as Running, and the Ready column has the same number of containers on both sides of the forward-slash (/), then the pod is healthy and operational. This implies that the issue is at the application level. To investigate the application issue, check the logs of all the containers residing within the pods to detect the issue. Or, log into the container and review the logs.
· If the Status column displays the state as Pending, Waiting, or CrashLoopBackOff, then run the following to review the details such as the messages, reasons, and other relevant information: kubectl describe pod pod_name -n namespace
· If the Status is init or ContainerCreating, it signifies that the pod is in the process of starting up. · If the Status is Running, and in the Ready column the number of containers on both sides of forward-slash
(/) are different, then the containers have issues. Run the following to view the details: kubectl describe pod pod_name -n namespace When reviewing the details, if the Ready column has the value as false then it indicates that the corresponding container has issues. Review the associated logs to understand the issue.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 462

Troubleshooting Information

Subscriber Not Found or Primary Key Not Found

· If the Status and Ready columns, and logs of the container do not indicate any issue, then verify that the required ingress or the service that is required to reach the application is up and running.
Subscriber Not Found or Primary Key Not Found
This section describes how to resolve the issues that report the Subscriber Not Found or Primary Key Not Found messages.
Problem When the NFs cannot find the subscriber details, they send the Subscriber Not Found or Primary Key Not Found to PCF.
Resolution 1. Analyse the logs of the PCF Engine and REST endpoint pod for the subscriber or primary key related
issues. On the master node, run the following command to determine the engine and rest-ep pod. kubectl logs -n namespace pod_name 2. Navigate to the pods and review the subscriber availability status and the subscriber count in the database. Based on the subscriber's status, take the appropriate action to resolve the issue. cdl show session count/summary
Message Routing Issues
This section describes how to troubleshoot the message routing issues.
Problem You may observe a message routing failure when a message from the PCF endpoint incorrectly routes a message from Canary to the PCF Engine. The issue occurs when the message is sent to an incorrect PCF group.
Resolution The following conditions might be causing the message routing failure. Check for these conditions and correct them, if necessary.
· From the PCF Ops Center, manually verify that the routing rules are configured correctly and they match the incoming traffic.
· Ensure that the Istio proxy is injected in the pcf-rest-ep pod. · Verify that the virtual services are generated using the istioctl command. For more information on the
traffic routing logs, see Collecting the Troubleshooting Information, on page 464. · Enable the DEBUG level for com.cisco.pcf.endpoint.routing and review the pcf-rest-ep logs for any
issues. Use the following command to enable the DEBUG level:

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 463

Collecting the Troubleshooting Information

Troubleshooting Information

debug logging logger com.cisco.pcf.endpoint.routing level debug

Collecting the Troubleshooting Information

If you encounter issues in your PCF environment, gather and analyse the information associated to the failed action or process. Having this information enables you to detect the component that experiences the failure and resolve the issue faster.
The following table covers the components which might experience an issue, and the logs that contain the information corresponding to the issue.
Table 228: Issues

Issue Deployment errors

Logs
Review the following logs to determine the issue. These logs assist you in identifying the component that may be the source of the error. Use the following commands on the master node:
· View the available pods and review the pod status: kubectl logs -n namespace pod_name Depending on the pod's state, perform the appropriate remediation actions. To understand the pod's states, see States, on page 296.
· View the configured helm charts and their status: helm list
· View the helm chart details for the REST endpoint: helm get namespace -pcf-rest-ep

Communication issues between the NFs

1. On the master node, run the following command to identify the pod that is responsible for the communication: kubectl logs -n namespace pod_name
2. Use the tcpdump utility to trace the packets.

Registration and deregistration issues
Ops Center issues

Use the following command to review the PCF REST endpoint logs: helm get namespace -pcf-rest-ep
Review the pod's log that hosts the Ops Center to determine the issue. kubectl logs -n namespace pod_name To resolve the issue, if you require the configuration information, then run one of the following commands: show full-configuration Or, show running-config

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 464

Troubleshooting Information

Interface Error Codes

Issue Traffic routing issues
Subscriber issues

Logs
To view the traffic routing-specific logs, use the following configuration: kubectl get pod -o yaml -n namespace pcf-rest-ep pod_name istioctl get virtualservice -n namespace -o yaml istioctl get destinationrules -n namespace -o yaml Also, review the logs of the following pods:
· Pcf-rest-ep instance · Pcf-engine instance · Datastore or Session DB
Review the logs associated to the PCF Engine and REST endpoint to determine the issue. For additional information about the subscriber availability status and the subscriber count in the database, run the following command: cdl show session count/summary

Alerts Alerts are notification messages that are generated when incidents requiring your attention or response occur. Review the historical and active alerts to determine the issue. Alerts for PCF are generated through the CEE utility. To view these alerts, run the following command in the CEE Ops Center: For active alerts: show alerts active For historical alerts: show alerts history

Note You must have appropriate permission to view the alert details. For information on application-based alerts, see PCF Application-Based Alerts, on page 441.
Interface Error Codes
This section describes the codes that PCF reports for the interface errors. Interface codes are generated as part of the logs or captured in the statistics. The following tables describes the error and the corresponding codes:

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 465

Interface Error Codes

Troubleshooting Information

Table 229: N7 Error Codes
Error USER_UNKNOWN

Error Code 400 Bad Request

ERROR_INITIAL_PARAMETERS 400 Bad Request

ERROR_TRIGGER_EVENT 400 Bad Request

TRAFFIC_MAPPING_ INFO_REJECTED

403 Forbidden

ERROR_CONFLICTING_REQUEST 403 Forbidden

POLICY_CONTEXT_DENIED 403 Forbidden

Table 230: N28 Error Codes
Error USER_UNKNOWN

Error Code 400 Bad Request

Description
The HTTP request is rejected because the end user who is specified in the request is unknown to the PCF.
The HTTP request is rejected. This error is reported when the set of session or subscriber information which PCF requires for a rule selection is incomplete, erroneous, or unavailable for decision making. For example, QoS, RAT type, and subscriber information.
The HTTP request is rejected because the set of session information sends a message that originated due to a trigger is incoherent with the previous set of session information for the same session. For example, trigger met was RAT changed, and the RAT notified is the same as before.
The HTTP request is rejected because the PCF doesn't accept one or more of the traffic mappings filters provided by the SMF in a PCC Request.
The HTTP request is rejected because the PCF can't accept the UE-initiated resource request as a network initiated resource allocation is already in-progress. This resource allocation has packet filters that cover the packet filters in the received UE-initiated resource request. The SMF rejects the attempt for a UE-initiated resource request.
The HTTP request is rejected because the PCF doesn't accept the SMF request due to operator policies and local configuration.
Description
The subscriber that is specified in the request isn't known at the CHF and the subscription can't be created.

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 466

Troubleshooting Information

Forwarding logs to the Splunk Server

Error NO_AVAILABLE_POLICY _COUNTERS

Error Code 400 Bad Request

Description
There are no policy counters available for the subscriber at the CHF.

Note The generic error codes are applicable for all the network interfaces.

Table 231: Generic Error Codes
Error TIMEOUT
OVERLOAD
INTERNAL_ERROR

Error Code 408 Request Timeout
429 Too Many Requests
500 Internal Server Error

SERVICE_UNAVAILABLE

503 Service Unavailable

Description
The HTTP request to the server took longer than the period the server is configured to wait.
The server has received too many consecutive requests to process within a short interval.
The server has encountered an unprecedented condition, which does not have an appropriate message.
The server cannot process the request because it is either, overloaded or is unavailable due to scheduled maintenance. This is a transient state.

Forwarding logs to the Splunk Server
This section describes how to enable PCF to forward the logs to the Splunk server.
Splunk is a third-party monitoring application that stores the log files and provides index-based search capability. You can configure PCF to send the logs securely to a Splunk server which could be an external server.

Important The Splunk server is a third-party component. Cisco does not take the responsibility of installing, configuring, or maintaining this server.
Use the following configuration to forward the logs to the Splunk server.
config debug splunk batch-count no_events_batch

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 467

Pods stop running when PCF is upgraded through the Rolling Upgrade process

Troubleshooting Information

batch-interval-msbatch_interval_ms batch-size-bytes batch_size hec-tokenhec_token hec-url hec_url end The following is an example configuration:
configure debug splunk hec-url https://splunk.10.86.73.80.nip.io:8088 debug splunk hec-token 68a81ab4-eae9-4361-92ea-b948f31d26ef debug splunk batch-interval-ms 100 debug splunk batch-count 10 debug splunk batch-size-bytes 102400 end
NOTES: · debug splunk--Enters the configuration debug mode.
· batch-count no_events_batch--Specify the maximum number of events to be sent in each batch.
· batch-interval-ms batch_interval_ms--Specify the interval in milliseconds at which a batch event is sent.
· batch-size-bytes batch_size--Specify the maximum size in bytes of each batch of events.
· hec-token hec_token--Specify the HTTP Event Collector (HEC) token for the Splunk server.
· hec-url hec_url--Specify the protocol, hostname, and HTTP Event Collector port of the Splunk server. The default port is 8088.
Pods stop running when PCF is upgraded through the Rolling Upgrade process
This section describes how to ensure that the pods are running when PCF is upgraded. Problem When the PCF version is upgraded to the subsequent available version, some pods such as CRD and Policy Engine stop running. Resolution Whenever you configure PCF ensure that you configure the following parameters:
· db global-settings db-replica replica_count
· db spr shard-count shard_count
· rest-endpoint ips ip_address1, ip_address2, ip_address3
· rest-endpoint port port_number
· engine engine_name replicas replica_count

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 468

Troubleshooting Information

Pods stop running when PCF is upgraded through the Rolling Upgrade process

unified-api-replicas api_replica_count subversion-run-url repository_url subversion-config-url configuration_url tracing-service-name service_name · service-registration profile locality profile_name · service-registration profile plmn-list [ mcc mnc ] · service-registration profile snssais [ sst sd ]

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 469

Pods stop running when PCF is upgraded through the Rolling Upgrade process

Troubleshooting Information

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 470

6 7 C H A P T E R
Sample PCF Configuration
· Sample Configuration File, on page 471
Sample Configuration File
The following is only a sample configuration file provided solely for your reference. You must create and modify your own configuration file according to the specific needs of your deployment.

Important The mandatory parameters are required to ensure that the critical pods such as CRD and Policy Engine are in the running state.

config

datastore primary-endpoint connection-settings keep-alive keep-alive-time-ms 200

datastore primary-endpoint connection-settings channel count 4

datastore primary-endpoint connection-settings timeout-ms 500

datastore external-endpoints datastore

connection-settings keep-alive keep-alive-time-ms 200

connection-settings channel count 3

connection-settings timeout-ms 500

exit

ldap replicas 2

ldap server-set USD

search-user dn cn=sdcUser,dc=C-NTDB

search-user password $8$yx0jELXTK0f7CJO2XklpJx+CpCUIX13B9C5oQ4NEnaI=

health-check interval-ms 5000

health-check dn cn=sdcUser,dc=C-NTDB

health-check filter msisdn=918369110173

health-check attributes napCustType

initial-connections

10

max-connections

10

retry-count

2

retry-timer-ms

100

max-failover-connection-age-ms

60000

binds-per-second

0.2

number-consecutive-timeouts-for-bad-connection -1

missing-attribute-result-code

32

connection 192.0.2.18 389

priority

400

connection-rule ROUND_ROBIN

auto-reconnect true

timeout-ms

200

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 471

Sample Configuration File

Sample PCF Configuration

bind-timeout-ms 3000

exit

connection 192.0.2.18 390

priority

400

connection-rule ROUND_ROBIN

auto-reconnect true

timeout-ms

200

bind-timeout-ms 3000

exit

connection 192.0.2.18 391

priority

400

connection-rule ROUND_ROBIN

auto-reconnect true

timeout-ms

200

bind-timeout-ms 3000

exit

exit

//This is a mandatory parameter

db global-settings db-replica 3

//This is a mandatory parameter

db global-settings volume-storage-class local

db spr shard-count 1

db balance shard-count 1

debug tracing type DISABLED

debug logging default-level error

debug logging logger com.broadhop

level warn

exit

debug logging logger com.broadhop.custrefdata.impl.dao.GenericDao

level error

exit

debug logging logger com.broadhop.diameter2.policy.endpoints

level error

exit

debug logging logger com.broadhop.ldap

level error

exit

debug logging logger com.broadhop.microservices.control

level error

exit

debug logging logger com.broadhop.utilities.queue.redis

level error

exit

debug logging logger com.cisco

level warn

exit

debug logging logger com.cisco.diameter

level error

exit

debug logging logger com.cisco.diameter.endpoint

level error

exit

debug logging logger com.cisco.pcf

level debug

exit

debug logging logger com.cisco.pcf.endpoint.client

level error

exit debug logging logger com.cisco.pcf.endpoint.client.Http2JettyRequestAsync
level error exit debug logging logger com.cisco.pcf.ldapserver
level warn

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 472

Sample PCF Configuration

Sample Configuration File

exit

debug logging logger com.cisco.pcf.nf.cache.NfCache

level warn

exit

debug logging logger io.prometheus.client

level error

exit

debug logging logger policy.engine

level debug

exit

debug logging logger rest.message

level warn

exit

features patching ingress-enabled true

diameter settings timeouts-ms dpa 5000

diameter application rx

application-id 16777236

tgpp-application true

vendor

[ 10415 ]

exit

diameter group rx-protocol-1

mode server

stack rx-protocol-1

application rx

replicas 2

bind-ip

192.0.2.19

bind-port 3868

fqdn

pcf-rx-server-1

realm

pcf.rx.server.cisco.com

settings timeouts-ms request 5000

exit

exit

ldap-server-endpoint connect bind-ip 192.0.2.20

ldap-server-endpoint connect binddn cn=plfuser

ldap-server-endpoint connect password $8$1eiow0TCw8sMRzP8czGABoog5Y1DxrD49EGWVmw3PoI=

ldap-server-endpoint connect port 1399

ldap-server-endpoint connect request-timeout 5000

ldap-server-endpoint connect replicas 2

ldap-server-endpoint connect max-transactions 200

ldap-server-endpoint health-check-filter name msisdn

ldap-server-endpoint health-check-filter value 11110100000

ldap-server-endpoint input-mapping framedipaddress

internal-lookup-key IP_ADDRESS

exit

ldap-server-endpoint input-mapping imsi

internal-lookup-key IMSI

exit

ldap-server-endpoint input-mapping msisdn

internal-lookup-key MSISDN

exit

ldap-server-endpoint output-mapping ACCESS_TYPE

input accessType

exit

ldap-server-endpoint output-mapping RAT_TYPE

input ratType

exit

ldap-server-endpoint output-mapping calledstationid

input dnn

exit

ldap-server-endpoint output-mapping callingstationid

input msisdn

exit

ldap-server-endpoint output-mapping framedipv4

input framedIp

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 473

Sample Configuration File

Sample PCF Configuration

exit

ldap-server-endpoint output-mapping framedipv6

input framedIpv6Prefix

exit

ldap-server-endpoint output-mapping imsi

input supi

exit

ldap-server-endpoint output-mapping offline_charging

input offline

exit

ldap-server-endpoint output-mapping online_charging

input online

exit

ldap-server-endpoint health-check-attributes msisdn

value 11110100000

exit

//This is a mandatory parameter

rest-endpoint port 9082

rest-endpoint tracing-service-name pcf-rest-endpoint

rest-endpoint replicas 2

rest-endpoint interface n28

ip [ 192.0.3.20 ]

exit

rest-endpoint interface n7

ip [ 192.0.3.21 ]

exit

rest-endpoint interface n15

ip [ 10.102.3.218 ]

port 9082

exit

rest-endpoint interface nnrf

ip

[ 192.0.2.22 ]

outbound-request-timeout-ms 500

exit

advance-tuning http2-threading min-thread-pool-size 10

advance-tuning http2-threading max-thread-pool-size 25

advance-tuning http2-threading disable-validation false

advance-tuning overload-control rest global limits max-requests-per-sec 9000

advance-tuning overload-control rest global action throttle-action REJECT

advance-tuning overload-control rest global action throttle-action N7_CREATE discard-action

DROP threshold-count 3500

advance-tuning overload-control rest global action throttle-action N7_CREATE discard-action REJECT threshold-count 2000

advance-tuning overload-control diameter global limits max-requests-per-sec 9000

advance-tuning overload-control diameter global action throttle-action DROP

advance-tuning async-threading default-worker-threads 20

advance-tuning async-threading default-queue-size 100

advance-tuning async-threading default-processing-threads 20

advance-tuning async-threading http2-connect-timeout-ms 120

api unified engine-group pcf01production

//This is a mandatory parameter

api unified externalIPs [ 192.0.2.23 ]

//This is a mandatory parameter

api unified external-port 8080

//This is a mandatory parameter

engine pcf01production

//This is a mandatory parameter

replicas

2

//This is a mandatory parameter

subversion-run-url http://svn/repos/run

//This is a mandatory parameter

subversion-config-url http://svn/repos/configuration

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 474

Sample PCF Configuration
//This is a mandatory parameter tracing-service-name pcf-engine properties broadcast.tps value 100 exit properties ldap.retry.time.ms value 200 exit properties loopback.delay value 20 exit properties pcf.actions.sync.timeoutMs.default value 410 exit properties useZlibCompression value true exit properties virtualservice.cache.enabled value true exit properties virtualservice.evaluate.defaultvs value true exit properties warmup.message.count value 20 exitexit
label protocol-layer key smi.cisco.com/node-type-2 label protocol-layer value protocol label service-layer key smi.cisco.com/node-type-3 label service-layer value service label cdl-layer key smi.cisco.com/node-type-4 label cdl-layer value session label oam-layer key smi.cisco.com/node-type label oam-layer value oam external-services datastore
ips [ 192.0.2.24 ] ports [ 8882 ] exit profile nf-client nf-type udr udr-profile local-udr
locality localudr priority 10000 service name type nudr-dr endpoint-profile udr_profile_1 capacity 10 priority 30 uri-scheme http version uri-version v2 exit exit endpoint-name udr_ep1 primary ip-address ipv4 10.102.4.151 primary ip-address port 5182 exit exit endpoint-profile udr_profile_2 capacity 10 priority 30 uri-scheme http version uri-version v2 exit exit

Sample Configuration File

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 475

Sample Configuration File
endpoint-name udr_ep1 primary ip-address ipv4 10.102.4.151 primary ip-address port 5183
exit exit endpoint-profile udr_profile_3
capacity 10 priority 30 uri-scheme http version
uri-version v2 exit exit endpoint-name udr_ep1 primary ip-address ipv4 10.102.4.151 primary ip-address port 5184 exit exit exit exit exit exit profile nf-client nf-type chf chf-profile local-chf locality localchf priority 10000 service name type nchf-spendinglimitcontrol endpoint-profile chf_profile_1 capacity 50 priority 30 uri-scheme http version uri-version v1 exit exit endpoint-name chf_ep1 primary ip-address ipv4 10.102.1.151 primary ip-address port 5082 exit exit endpoint-profile chf_profile_2 capacity 50 priority 30 uri-scheme http version uri-version v1 exit exit endpoint-name chf_ep1 primary ip-address ipv4 10.102.1.151 primary ip-address port 5083 exit exit endpoint-profile chf_profile_3 capacity 50 priority 30 uri-scheme http version uri-version v1 exit exit endpoint-name chf_ep1 primary ip-address ipv4 10.102.1.151 primary ip-address port 5084

Sample PCF Configuration

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 476

Sample PCF Configuration

exit

exit

exit

exit

exit

exit

profile nf-pair nf-type UDR

nrf-discovery-group nrf-discovery-group

subscription-enabled true

subscription-extension 3

locality client pcf01

locality preferred-server loc1

locality geo-server loc2

exit

profile nf-pair nf-type CHF

nrf-discovery-group nrf-discovery-group

subscription-enabled true

subscription-extension 3

locality client pcf01

locality preferred-server loc1

locality geo-server loc2

exit

service-registration services amfService

exit

service-registration services smfService

exit

//This is a mandatory parameter

service-registration profile locality pcf01

//This is a mandatory parameter

service-registration profile capacity 20

//This is a mandatory parameter

service-registration profile priority 10

//This is a mandatory parameter

service-registration profile nf-status REGISTERED

//This is a mandatory parameter

service-registration profile plmn-list 100 010

exit

//This is a mandatory parameter

service-registration profile snssais

//This is a mandatory parameter

1 sd ABCDEF

exit

group nf-mgmt nf-mgmt-grpup

nrf-mgmt-group nrf-register-group

locality

pcf01

failover sla 1200

reconnect interval 100

exit

group nrf discovery nrf-discovery-group

service type nrf nnrf-disc

endpoint-profile nrf_disc_profile_1

capacity 10

priority 10

uri-scheme http

version

uri-version v1

exit

exit

endpoint-name nrf_disc_ep1

priority 1

capacity 10

primary ip-address ipv4 192.0.2.26

primary ip-address port 8183

secondary ip-address ipv4 192.0.2.19

Sample Configuration File

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 477

Sample Configuration File

secondary ip-address port 8184

tertiary ip-address ipv4 192.0.2.15

tertiary ip-address port 8185

exit

exit

exit

exit

group nrf mgmt nrf-register-group

service type nrf nnrf-nfm

endpoint-profile nrf_regi_profile_1

capacity 10

priority 10

uri-scheme http

version

uri-version v1

exit

exit

endpoint-name nrf_regi_ep1

priority 1

capacity 10

primary ip-address ipv4 192.0.1.15

primary ip-address port 8183

secondary ip-address ipv4 192.0.3.15

secondary ip-address port 8184

tertiary ip-address ipv4 192.0.2.12

tertiary ip-address port 8185

exit

exit

exit

exit

cdl system-id

1

cdl node-type

session

cdl enable-geo-replication true

cdl zookeeper data-storage-size 1

cdl zookeeper log-storage-size 1

cdl zookeeper replica 3

cdl remote-site 2

db-endpoint host 192.0.2.24

db-endpoint port 8882

kafka-server 19.102.11.108 10091

exit

kafka-server 19.102.11.109 10092

exit

kafka-server 19.102.11.110 10093

exit

exit

cdl label-config session

endpoint key smi.cisco.com/node-type-4

endpoint value session

slot map 1

key smi.cisco.com/node-type-4

value session

exit

slot map 2

key smi.cisco.com/node-type-4

value session

exit

slot map 3

key smi.cisco.com/node-type-4

value session

exit

slot map 4

key smi.cisco.com/node-type-4

value session

Sample PCF Configuration

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 478

Sample PCF Configuration

Sample Configuration File

exit

index map 1

key smi.cisco.com/node-type-4

value session

exit

index map 2

key smi.cisco.com/node-type-4

value session

exit

exit

cdl logging logger datastore.ep.session

level debug

exit

cdl logging logger datastore.index.session

level debug

exit

cdl logging logger datastore.slot.session

level debug

exit

cdl datastore session

cluster-id

1

label-config session

geo-remote-site [ 2 ]

endpoint replica 2

endpoint external-ip 10.102.11.218

index replica 2

index map 2

slot replica 2

slot map 4

slot notification limit 25

exit

cdl kafka replica 3

cdl kafka storage 1

cdl kafka label-config key smi.cisco.com/node-type-4

cdl kafka label-config value session

cdl kafka external-ip 10.102.11.104 10091

exit

cdl kafka external-ip 10.102.11.105 10092

exit

cdl kafka external-ip 10.102.11.106 10093

exit

system mode running

helm default-repository base-repos

helm repository base-repos

url https://charts.10.100.11.107.nip.io/pcf.2020.05.m0.i33

exit

k8s name

cl-hawaii-s1

k8s namespace

pcf-pcf-hawaii-s1

k8s nf-name

pcf

k8s registry

docker.10.100.11.107.nip.io/pcf.2020.05.m0.i26

k8s single-node false

k8s use-volume-claims true

k8s ingress-host-name 10.84.102.200.nip.io

k8s nodes cl-hawaii-s1-master-1

node-type master

worker-type master

exit

k8s nodes cl-hawaii-s1-master-2

node-type master

worker-type master

exit

k8s nodes cl-hawaii-s1-master-3

node-type master

worker-type master

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 479

Sample Configuration File

exit

aaa authentication users user admin

uid

1117

gid

1117

password $1$ywmCvRqU$e1ho7HLAmgfQS5LT9HAXQ.

ssh_keydir /tmp/admin/.ssh

homedir /tmp/admin

exit

aaa ios level 0

prompt "\h> "

exit

aaa ios level 15

prompt "\h# "

exit

aaa ios privilege exec

level 0

command action

exit

command autowizard

exit

command enable

exit

command exit

exit

command help

exit

command startup

exit

exit

level 15

command configure

exit

exit

exit

nacm write-default deny

nacm groups group admin

user-name [ admin ]

exit

nacm groups group policy-admin

user-name [ admin ]

exit

nacm rule-list admin

group [ admin ]

rule any-access

action permit

exit

exit

nacm rule-list confd-api-manager

group [ confd-api-manager ]

rule any-access

action permit

exit

exit

nacm rule-list ops-center-security

group [ * ]

rule change-self-password

module-name

ops-center-security

path

/smiuser/change-self-password

access-operations exec

action

permit

exit

rule smiuser

module-name

ops-center-security

path

/smiuser

Sample PCF Configuration

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 480

Sample PCF Configuration

access-operations exec

action

deny

exit

exit

Sample Configuration File

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 481

Sample Configuration File

Sample PCF Configuration

Ultra Cloud Core 5G Policy Control Function, Release 2023.02 - Configuration and Administration Guide 482


DITA Open Toolkit XEP 4.30.961; modified using iText 2.1.7 by 1T3XT