NetEngine 8000 M14, M8 and M4 V800R023C00SPC500 Configuration Guide
Appendix: GX Interface
- About This Document
- Description of the Gx Interface
- Description of the Gx Interface Messages
- Description of Associated AVPs
- AVP Format Convention
- Auth-Application-Id AVP
- CC-Output-Octets AVP
- CC-Request-Number AVP
- CC-Request-Type AVP
- CC-Time AVP
- CC-Total-Octets AVP
- Charging-Rule-Definition AVP
- Charging-Rule-Install AVP
- Charging-Rule-Name AVP
- Charging-Rule-Remove AVP
- Charging-Rule-Report AVP
- Destination-Host AVP
- Destination-Realm AVP
- Error-Message AVP
- Experimental-Result AVP
- Experimental-Result-Code AVP
- Event-Trigger AVP
- Feature-List AVP
- Feature-List-ID AVP
- Framed-IP-Address AVP
- Framed-IPv6-Prefix AVP
- Granted-Service-Unit AVP
- Guaranteed-Bitrate-DL AVP
- Guaranteed-Bitrate-UL AVP
- IP-CAN-Type AVP
- Max-Requested-Bandwidth-DL AVP
- Max-Requested-Bandwidth-UL AVP
- Monitoring-Key AVP
- Origin-Host AVP
- Origin-Realm AVP
- Origin-State-Id
- PCC-Rule-Status AVP
- QoS-Information AVP
- Re-Auth-Request-Type AVP
- Result-Code AVP
- Rule-Failure-Code AVP
- Session-Id AVP
- Session-Release-Cause AVP
- Subscription-Id AVP
- Subscription-Id-Data AVP
- Subscription-Id-Type AVP
- Supported-Features AVP
- Termination-Cause
- Usage-Monitoring-Information AVP
- Usage-Monitoring-Level AVP
- Usage-Monitoring-Report AVP
- User-Equipment-Info AVP
- User-Equipment-Info-Type AVP
- User-Equipment-Info-Value AVP
- Used-Service-Unit AVP
- Vendor-Id AVP
- Vendor-Specific-Application-Id AVP
- X-HW-User-Physical-Info-Value AVP
- X-HW-MS-Group-Name AVP
- X-HW-ACL-Group-Name AVP
- X-HW-Interim-Interval AVP
- X-HW-Service-Type AVP
- Synchronization Conventions for Message Processing
- Error Code of the Gx Interface
- Compliance Information for Standards
About This Document
Description Agreement
This document focuses on Gx interface messages, including CCR/CCA and RAR/RAA messages. This document does not describe capability exchange messages such as the CER/CEA message. For details, see RFC3588.
The mandatory parameters described in this document refer to the mandatory elements in messages. If a mandatory parameter does not exist in messages, the PCRF/PCEF considers the messages to be invalid and service operations cannot be triggered by these messages.
Even if optional parameters do not exist in the messages generated by the PCEF, the PCRF still considers the messages valid. In this case, certain functions may be unavailable but basic procedures are still normal. If optional parameters do not exist in the messages generated by the PCRF, the user does not subscribe to relevant services and the PCEF considers the messages to be valid.
The static rules mentioned in this document are defined by the PCEF. The PCRF can provide instructions on use of one or several static rules by using the Charging-Rule-Name attribute-value pair (AVP) without providing detailed definitions of the rules. The specific Charging-Rule-Name AVP is used only after the PCRF and PCEF complete negotiation.
Dynamic rules are created by users based on the service information and policy configuration on the PCRF. The PCRF allocates a dynamic rule a unique Charging-Rule-Name. During deployment of the policy, the PCRF provides the PCEF with detailed parameters of a rule, for example, QoS parameters and CC-Time. Subsequently, the PCRF can instruct the PCEF to modify or delete the rule by using the Charging-Rule-Name AVP.
Static rules can be activated and deactivated.
Dynamic rules can be deployed, modified, and deleted.
An device receives but does not process *[AVP] in the AVP format description. This means that device processes the attributes described in this document but ignores other redundant attributes.
Description of the Gx Interface
Definition of the Gx Interface
The Gx interface is located between the Policy and Charging Enforcement Function (PCEF) and the Policy and Charging Rules Function (PCRF) The Gx interface is used for provisioning and removal of PCC rules from the PCRF to the PCEF and the transmission of traffic plane events from the PCEF to the PCRF. The Gx interface can be used for charging control, policy control or both by applying AVPs relevant to the application.
The preceding figure is a copy of Figure 4.1 in 3GPP TS 29.212 V9.7.0.
PCEF: checks service data flows, obtains service-based control and charging policies from the PCRF, and enforces the policies.
When functioning as the PCEF, device supports RADIUS accounting but does not support Gy or Gz interfaces.
PCRF: defines control and charging policies based on service characteristics and user attributes and dynamically delivers the policies to the PCEF.
devicecan function only as the PCEF.
Functions of the Gx Interface
- Delivers PCC rules from the PCRF to the PCEF.
- Deletes PCC rules from the PCEF.
- Transmits events from the PCEF to the PCRF.
Dynamic PCC rules: The PCRF dynamically delivers PCC rules to the PCEF through the Gx interface. Dynamic PCC rules can be installed, modified, or deleted any time.
Dynamic PCC rules are created by users based on the service information and policy configuration on the PCRF. The PCRF allocates a unique Charging-Rule-Name to each dynamic PCC rule. During deployment of the policy, the PCRF provides the PCEF with detailed parameters of a rule(such as QoS,CC-Time,and so on). Subsequently, the PCRF uses the Charging-Rule-Name AVP to instruct the PCEF to modify or delete the rule.
Static PCC rules: PCC rules are pre-configured on the PCEF. Static PCC rules can be activated or deactivated by the PCRF any time.
The static PCC rules mentioned in this document are defined by the PCEF. The PCRF uses the specified Charging-Rule-Name attribute-value pair (AVP) to provide instructions for the use of one or several static rules [negating the provision of detailed rule definitions]. The specific Charging-Rule-Name AVP is used only after the PCRF and PCEF complete negotiation.
Diameter Protocol Stack on the Gx Interface
Diameter is used for information exchanging on the Gx interface.
Diameter is an Authentication, Authorization, and Accounting (AAA) protocol developed by the Internet Engineering Task Force (IETF) for next-generation AAA servers. Diameter is defined in RFC 3588 and derived from the Remote Authentication Dial In User Service (RADIUS) protocol.
Diameter is mainly used in mobile communication systems, whereas RADIUS defined in RFC 2865 is used for fixed network access. However, as fixed and mobile networks converge, demands for unified AAA servers are becoming urgent and the Diameter protocol stack is required, therefore, to support fixed network access.
As shown in Figure 1-4836, Diameter is used in the application layer of the protocol stack, and Transport Control Protocol (TCP) or Stream Control Transmission Protocol (SCTP) is used in the transport layer. The device supports IP and does not support SCTP or IPsec.
When Diameter is used on the Gx interface, its extended application protocols are called Gx applications. Figure 1-4837 shows the Gx interface protocol stack.
Message Exchanging on the Gx Interface
Figure 1-4838 shows the message exchanging process on the Gx interface.
Table 1-1666 describes six messages exchanged over the Gx interface.
Name |
Direction |
Description |
---|---|---|
CCR(Gx Message) |
PCEF -> PCRF |
The interworking between the PCEF and the PCRF involves three CCR messages: IP connectivity access network (IP-CAN) session authorization request, session modification message (including event notification), and session termination message. The PCEF sends CCR messages to indicate that a user is online or offline and to report quota. |
CCA(Gx Message) |
PCRF -> PCEF |
A Credit-Control-Answer (CCA) message is the response to a CCR message. The interworking between the PCEF and the PCRF involves three CCA messages, which are associated with three CCR messages accordingly. The PCRF manages a policy or returns a CCA message to the PCEF after the policy is released. CCA messages are responses to CCR messages that indicate whether a user is online or offline. |
RAR(Gx Message) |
PCRF -> PCEF |
The PCRF sends Re-Auth-Request (RAR) messages to the PCEF to modify, add, or delete value-added service policies. |
RAA(Gx Message) |
PCEF -> PCRF |
After updating a policy based on an RAR message from the PCRF, the PCEF returns a Re-Auth-Answer (RAA) message to the PCRF to inform the PCRF that the policy is updated. |
ASR(Optional)(Base Message) |
PCRF -> PCEF |
When the PCRF operates abnormally and must forcibly remove the policy on it, the PCRF sends an Abort-Session-Request (ASR) message to the PCEF. Upon receiving the ASR message, the PCEF returns an ASA message carrying a CCR-Terminate. The ASR message is an extended message. It is used when supported by the PCEF. |
ASA(Optional)(Base Message) |
PCEF -> PCRF |
An Abort-Session-Answer (ASA) message is the response to an ASR message. |
The device receives but does not process *[AVP]. That is, the device processes only the AVPs listed in this document and ignores other optional AVPs.
Description of the Gx Interface Messages
Message Format Convention
Format |
Description |
---|---|
<> |
The fixed position of the AVP is defined. |
{} |
The AVP must be present and can appear anywhere in the message. |
[] |
The AVP is optional and can appear anywhere in a message. The number of times that the AVP appears can be 0 or 1. |
*[] |
The AVP can appear anywhere in a message. |
This document focuses on Gx messages, including CCR/CCA and RAR/RAA messages. This document does not introduce CER/CEA messages. For details about CER/CEA messages, refer to RFC 3588.
The device receives but does not process *[AVP]. That is, the device processes only the AVPs listed in this document and ignores other optional AVPs.
CCR
Message Function
The Credit Control Request (CCR) command, indicated by the Command-Code field set to 272 and the R bit set in the Command Flags field, is sent by the PCEF to the PCRF in order to request PCC rules. The CCR command is also sent by the PCEF to the PCRF in order to indicate PCC rule related events or the termination of the IP CAN session.
CCR-Initial: Upon receiving an IP-CAN session establishment request message (for example, request for Internet access), the PCEF sends an IP-CAN session authorization request message to the PCRF. Based on the IP-CAN session authorization request message, the PCRF generates a charging control policy.
- CCR-Update: CCR-Update messages are used by the PCEF to request updated PCC rules from the PCRF during the following scenarios:
An IP CAN session is being established, modified, or terminated.
UE resources change.
An event is triggered.
CCR-Terminate: After receiving a request for going offline from a user, the PCEF must terminate the IP-CAN session. The PCEF sends an IP session termination authorization request message (a CCR message) to the PCRF to instruct the PCRF to release the related policy.
CCR-Initial Message Format
<CC-Request> ::= < Diameter Header: 272, REQ, PXY >
< Session-Id >
{ Auth-Application-Id }
{ Origin-Host }
{ Origin-Realm }
[ Destination-Host ]
{ Destination-Realm }
{ CC-Request-Type } [Note1]
{ CC-Request-Number } [Note2]
[ Supported-Features ]
{ Vendor-Id }
{ Feature-List-ID }
{ Feature-List }
*[ Subscription-Id ] [Note3]
{ Subscription-Id-Type }
{ Subscription-Id-Data }
[ Framed-IP-Address ] [Note4]
[ Framed-IPv6-Prefix ] [Note5]
[ IP-CAN-Type ] [Note6]
[ User-Equipment-Info ] [Note7]
{ User-Equipment-Info-Type }
{ User-Equipment-Info-Value }
[ X-HW-User-Physical-Info-Value ] [Note8]
[ QoS-Information ] [Note9]
[ Max-Requested-Bandwidth-UL ]
[ Max-Requested-Bandwidth-DL ]
[ Guaranteed-Bitrate-UL ]
[ Guaranteed-Bitrate-DL ]
Note Index |
Note Description |
---|---|
[Note1] |
In the IP-CAN session authorization establishment request message, the value of CC-Request-Type is INITIAL_REQUEST. |
[Note2] |
The CC-Request-Number AVP is used to distinguish requests or responses in a session because a Session-Id is globally unique. The value of this AVP is set to 0 when a session is established. |
[Note3] |
A CCR-Initial message must carry the Subscription-Id AVP; otherwise, a failure will occur. This AVP consists of the Subscription-Id-Type AVP and the Subscription-Id-Data AVP. For device, the Subscription-Id-Type AVP is set to END_USER_NAI. The Subscription-Id-Data AVP is set to a user name consisting of a maximum of 253 bytes (for example, 206c6d2d0000@rm-1). |
[Note4] |
An IP-CAN session authorization request message must include the Framed-IP-Address AVP or Framed-IPv6-Prefix AVP (specifically, it must contain a user address). Otherwise, the message is considered invalid. If a request message carries both of the preceding AVPs, the PCRF uses an IPv4 address as the user address. |
[Note5] |
Either an IPv6 address or the Framed-IP-Address AVP must exist. |
[Note6] |
The IP-CAN-Type AVP indicates the type of the access network to which users are connected for PCRF management. The value of IP-CAN-Type of the device V800R021C10SPC500 is permanently set to XDSL(2). For other values, see related AVP descriptions. |
[Note7] |
The User-Equipment-Info AVP is used to report user equipment information (user MAC addresses). The AVP consists of User-Equipment-Info-Type AVP and User-Equipment-Info-Value AVP. For the device V800R021C10SPC500, the received AVP is not processed. |
[Note8] |
The X-HW-User-Physical-Info-Value AVP is a private AVP. It is used to report physical information of a user, such as slot ID, sub-slot ID, port ID, and VLANID. The format of the X-HW-User-Physical-Info-Value AVP is similar to that of the RADIUS NAS-PORT-ID AVP and is set to a maximum of 65 bytes. An example of the X-HW-User-Physical-Info-Value AVP is: {atm|eth|trunk} NAS_slot/NAS_subslot/NAS_port:XPI.XCI. |
CCR-Update Message Format
<CC-Request> ::= < Diameter Header: 272, REQ, PXY >
< Session-Id >
{ Auth-Application-Id }
{ Origin-Host }
{ Origin-Realm }
[ Destination-Host ]
{ Destination-Realm }
{ CC-Request-Type } [ Note 1 ]
{ CC-Request-Number } [ Note 2 ]
[ Subscription-Id ] [ Note 3 ]
{ Subscription-Id-Type }
{ Subscription-Id-Data }
[ Framed-IP-Address ] [ Note 4 ]
[ Framed-IPv6-Prefix ] [ Note 5 ]
[ IP-CAN-Type ] [ Note 6 ]
[ User-Equipment-Info ] [ Note 7 ]
{ User-Equipment-Info-Type }
{ User-Equipment-Info-Value }
*[ Charging-Rule-Report ]
*[ Charging-Rule-Name ]
[ PCC-Rule-Status ]
[ Rule-Failure-Code ]
[ X-HW-User-Physical-Info-Value ] [ Note 8 ]
*[ Event-Trigger ] [ Note 9 ]
*[ Usage-Monitoring-Information ] [ Note 10 ]
[ Monitoring-Key ]
[ Usage-Monitoring-Level ]
[ Used-Service-Unit ]
[ CC-Time ]
[ CC-Total-Octets ]
[ Usage-Monitoring-Report ]
Note Index |
Note Description |
---|---|
[Note1] |
In the IP-CAN session authorization modification request message, the value of CC-Request-Type is UPDATE_REQUEST. |
[Note2] |
The CC-Request-Number AVP is used to distinguish requests or responses in a session because a Session-Id is globally unique. The value of CC-Request-Number increases by 1 each time a session is modified. |
[Note3] |
The Subscription-Id AVP consists of the Subscription-Id-Type AVP and Subscription-Id-Data AVP. |
[Note4] |
An IP-CAN session authorization request message must include the Framed-IP-Address AVP or Framed-IPv6-Prefix AVP (specifically, it must contain a user address). Otherwise, the message is considered invalid. If a request message carries both of the preceding AVPs, the PCRF uses an IPv4 address as the user address. |
[Note5] |
Either an IPv6 address or the Frame-IP-Address AVP must exist. |
[Note6] |
The IP-CAN-Type AVP indicates the type of the access network to which users are connected for PCRF management. The value of IP-CAN-Type of the device is permanently set to XDSL(2). For other values, see related AVP descriptions. |
[Note7] |
The User-Equipment-Info AVP is used to report user equipment information (user MAC addresses). This AVP consists of the User-Equipment-Info-Type AVP and the User-Equipment-Info-Value AVP. |
[Note8] |
X-HW-User-Physical-Info-Value is a private AVP. It is used to report physical information of a user, such as slot ID, sub-slot ID, port ID, and VLANID. The format of the X-HW-User-Physical-Info-Value AVP is similar to that of the RADIUS NAS-PORT-ID AVP and is set to a maximum of 65 bytes. An example of the X-HW-User-Physical-Info-Value AVP is: {atm|eth|trunk} NAS_slot/NAS_subslot/NAS_port:XPI.XCI. |
[Note9] |
The PCEF sends to the PCRF an Event-Trigger AVP to indicate the occurrence of an event on the gateway. While the event is ongoing, the PCEF sends the affected AVPs in addition to the Event-Trigger AVP. For the value range, see the related AVP definition. |
[Note10] |
The Usage-Monitoring-Information AVP in a CCR-Update message indicates the quota amount used by a user. Its format is as follows: Usage-Monitoring-Information::= < AVP Header: 1067 > [ Monitoring-Key ]----This sub-AVP must be carried. [ Used-Service-Unit ]----Indicates the used quota amount, including the traffic volume or duration quota. [ Usage-Monitoring-Level ]----Indicates the monitoring level (session level or rule level). |
CCR-Terminate Message Format
<CC-Request> ::= < Diameter Header: 272, REQ, PXY >
< Session-Id >
{ Auth-Application-Id }
{ Origin-Host }
{ Origin-Realm }
[ Destination-Host ]
{ Destination-Realm }
{ CC-Request-Type } [ Note 1 ]
{ CC-Request-Number } [ Note 2 ]
[ Event-Trigger ] [ Note 3 ]
*[ Usage-Monitoring-Information ] [ Note 4 ]
[ Monitoring-Key ]
[ Usage-Monitoring-Level ]
[ Used-Service-Unit ]
[ CC-Time ]
[ CC-Total-Octets ]
*[ AVP ]
[ Usage-Monitoring-Report ]
{ Termination-Cause } [ Note 5 ]
Note Index |
Note Description |
---|---|
[Note1] |
In the IP-CAN session termination authorization request message, the value of the CC-Request-Type AVP is TERMINATION_REQUEST. The PCRF usually focuses on only the Termination-Cause AVP in the IP-CAN session termination authorization request message. |
[Note2] |
The CC-Request-Number AVP is used to distinguish requests or responses in a session because a Session-Id is globally unique. The value of CC-Request-Number increases by 1 each time a session is modified. |
[Note3] |
The Event-Trigger AVP is set to USAGE-REPORT, indicating that usage is monitored and reported. |
[Note4] |
The Usage-Monitoring-Information AVP carries the accumulated usage (quota fragment) of a user. Its format is as follows: Usage-Monitoring-Information::= < AVP Header: 1067 > [ Monitoring-Key ]----If this AVP is not carried, the monitoring is at session level. [ Used-Service-Unit ]----Indicates the used quota amount, including the traffic volume or duration quota. [ Usage-Monitoring-Level ]----Indicates the monitoring level (session level or rule level). |
[Note5] |
The Termination-Cause AVP indicates the cause of the user's logout. When a user logs out normally, this AVP is set to DIAMETER_LOGOUT 1. Other values indicate that a user logs out abnormally. For details, see related AVP description. |
Reference Standards
3GPP TS 29.212 V9.7.0 clause 5.6.2
CCA (Credit-Control-Answer)
Message Function
The Credit Control Answer (CCA) command, indicated by the Command-Code field set to 272 and the 'R' bit cleared in the Command Flags field, is sent by the PCRF to the PCEF in response to the CCR command. It is used to provision PCC rules and event triggers for the session and to provide the selected bearer control mode for the IP-CAN session. If the PCRF performs the bearer binding, PCC rules will be provisioned at bearer level. The primary and secondary CCF and/or primary and secondary OCS addresses may be included in the initial provisioning.
CCA-Initial: After processing the IP-CAN session authorization establishment request message, the PCRF generates a policy and sends it to the PCEF through an IP-CAN session authorization answer message.
CCA-Update: After processing the IP-CAN session authorization update request message, the PCRF generates a policy and sends it to the PCEF through an IP-CAN session authorization answer message.
CCA-Terminate: After processing an IP-CAN session authorization request message, the PCRF generates a policy and sends it to the PCEF through an IP-CAN session termination authorization answer message.
CCA-Initial Message Format
<CC-Answer> ::= < Diameter Header: 272, PXY >
< Session-Id >
{ Auth-Application-Id }
{ Origin-Host }
{ Origin-Realm }
[ Result-Code ] [ Note 1]
[ Experimental-Result ]
{ Vendor-Id }
{ Experimental-Result-Code }
{ CC-Request-Type }
{ CC-Request-Number }
*[ Event-Trigger ] [ Note 2]
*[ Charging-Rule-Install ] [ Note 3]
*[ Charging-Rule-Definition ]
{ Charging-Rule-Name }
[ QoS-Information ]
[ Max-Requested-Bandwidth-UL ]
[ Max-Requested-Bandwidth-DL ]
[ Guaranteed-Bitrate-UL ]
[ Guaranteed-Bitrate-DL ]
*[ AVP ]
[ Monitoring-Key ]
[ X-HW-Service-Type ]
[ X-HW-ACL-Group-Name ]
[ X-HW-Interim-Interval ]
*[AVP]
*[ Charging-Rule-Name ]
*[ AVP ]
*[ QoS-Information ] [ Note 4]
[ Max-Requested-Bandwidth-UL ]
[ Max-Requested-Bandwidth-DL ]
[ Guaranteed-Bitrate-UL ]
[ Guaranteed-Bitrate-DL ]
*[ AVP ]
*[ Usage-Monitoring-Information ] [ Note 5]
[ Monitoring-Key ]
[ Granted-Service-Unit ]
[ CC-Time ]
[ CC-Total-Octets ]
*[AVP]
[ Usage-Monitoring-Level ]
[ Usage-Monitoring-Report ]
*[AVP]
*[AVP]
The device receives but does not process *[AVP]. That is, the device processes only the AVPs listed in this document and ignores other optional AVPs.
Note Index |
Note Description |
---|---|
[Note1] |
Either the Result-Code AVP or Experimental-Result AVP must exist. |
[Note2] |
This AVP indicates a group AVP for policy deletion. In case of a dynamic policy, the Charging-Rule-Name AVP indicates the PCC rule name generated by the PCRF. Otherwise, the AVP indicates the predefined rule name. |
[Note3] |
This AVP indicates the installation policy and consists of the Charging-Rule-Definition and Charging-Rule-Name AVPs.
|
[Note4] |
The QoS-Information AVP at the command level includes user bandwidth information. The QoS-Information AVP at the service level refers to the QoS-Information AVP in the Charging-Rule-Definition AVP. |
[Note5] |
The Usage-Monitoring-Information AVP in CCA-Initial message indicates the usage allocated by the PCRF. |
[Note6] |
When the Event-Trigger AVP is sent by the PCRF to the PCEF, the Event-Trigger AVP indicates an event in which the PCC rule is requested again. |
CCA-Update Message Format
<CC-Answer> ::= < Diameter Header: 272, PXY >
< Session-Id >
{ Auth-Application-Id }
{ Origin-Host }
{ Origin-Realm }
[ Result-Code ] [ Note 1]
[ Experimental-Result ]
{ Vendor-Id }
{ Experimental-Result-Code }
{ CC-Request-Type }
{ CC-Request-Number }
*[ Supported-Features ]
*[ Event-Trigger ] [ Note 2]
*[ Charging-Rule-Remove ] [ Note 3]
*[ Charging-Rule-Name ]
*[ AVP ]
*[ Charging-Rule-Install ] [ Note 4]
*[ Charging-Rule-Definition ]
{ Charging-Rule-Name }
[ QoS-Information ]
[ Max-Requested-Bandwidth-UL ]
[ Max-Requested-Bandwidth-DL ]
[ Guaranteed-Bitrate-UL ]
[ Guaranteed-Bitrate-DL ]
*[ AVP ]
[ Monitoring-Key ]
[ X-HW-Service-Type ]
[ X-HW-ACL-Group-Name ]
[ X-HW-Interim-Interval ]
*[ AVP ]
*[ Charging-Rule-Name ]
*[ AVP ]
*[ QoS-Information ] [ Note 5]
[ Max-Requested-Bandwidth-UL ]
[ Max-Requested-Bandwidth-DL ]
[ Guaranteed-Bitrate-UL ]
[ Guaranteed-Bitrate-DL ]
*[ AVP ]
*[ Usage-Monitoring-Information ] [ Note 6]
[ Monitoring-Key ]
[ Granted-Service-Unit ]
[ CC-Time ]
[ CC-Total-Octets ]
[ CC-Output-Octets ]
*[ AVP ]
[ Usage-Monitoring-Level ]
[ Usage-Monitoring-Report ]
*[ AVP ]
The device receives but does not process *[AVP]. That is, the device processes only the AVPs listed in this document and ignores other optional AVPs.
Note Index |
Note |
---|---|
[Note1] |
The Result-Code AVP is an error code. Either the Result-Code or Experimental-Result AVP must exist. |
[Note2] |
When the Event-Trigger AVP is sent by the PCRF to the PCEF, the Event-Trigger AVP indicates an event in which the PCC rule is requested again. |
[Note3] |
The Charging-Rule-Remove AVP indicates a removal policy and consists of several AVPs. If the policy is a dynamic policy, the Charging-Rule-Name AVP is the PCC rule name generated by the PCRF. Otherwise, the Charging-Rule-Name AVP is the predefined rule name. |
[Note4] |
The Charging-Rule-Install AVP indicates the installation policy and consists of the Charging-Rule-Definition and Charging-Rule-NameAVPs.
|
[Note4] |
The QoS-Information AVP at the command level includes user bandwidth information. The QoS-Information AVP at the service level refers to the QoS-Information AVP in the Charging-Rule-Definition AVP. |
[Note5] |
The QoS-Information AVP at the command level includes user bandwidth information. The QoS-Information AVP at the service or rule level refers to the QoS-Information AVP in the Charging-Rule-Definition AVP. |
[Note6] |
The Usage-Monitoring-Information AVP in a CCA-Update message indicates the amount used by the user. |
CCA-Terminate Message Format
<CC-Answer> ::= < Diameter Header: 272, PXY >
< Session-Id >
{ Auth-Application-Id }
{ Origin-Host }
{ Origin-Realm }
[ Result-Code ] [Note1]
[ Experimental-Result ]
{ Vendor-Id }
{ Experimental-Result-Code }
{ CC-Request-Type}
{ CC-Request-Number}
*[ AVP ]
The device receives but does not process *[AVP]. That is, the device processes only the AVPs listed in this document and ignores other optional AVPs.
Note Index |
Note Description |
---|---|
[Note1] |
Both the Result-Code AVP and the Experimental-Result-Code AVP define an error code. In an IP-CAN session termination authorization answer message, either the Result-Code or Experimental-Result-Code AVP must exist. |
Reference Standards
3GPP TS 29.212 V9.7.0 clause 5.6.3
RAR
Message Function
The Re-Auth-Request (RAR) command, indicated by the Command-Code field set to 258 and the R bit set in the Command Flags field, is sent by the PCRF to the PCEF in order to provision PCC rules using the PUSH procedure initiate the provision of unsolicited PCC rules. It is used to provision PCC rules, event triggers and event report indications for the session. If the PCRF performs the bearer binding, PCC rules will be provisioned at bearer level.
Message Format
<RA-Request> ::= < Diameter Header: 258, REQ, PXY >
< Session-Id >
{ Auth-Application-Id }
{ Origin-Host }
{ Origin-Realm }
{ Destination-Realm }
{ Destination-Host }
{ Re-Auth-Request-Type } [ Note 1 ]
*[ Event-Trigger ] [ Note 2 ]
*[ Charging-Rule-Remove ] [ Note 3 ]
*[ Charging-Rule-Name ]
*[ AVP ]
*[ Charging-Rule-Install ] [ Note 4 ]
*[ Charging-Rule-Definition ]
{ Charging-Rule-Name }
[ QoS-Information ]
[ Max-Requested-Bandwidth-UL ]
[ Max-Requested-Bandwidth-DL ]
[ Guaranteed-Bitrate-UL ]
[ Guaranteed-Bitrate-DL ]
[ Monitoring-Key ]
[ X-HW-Service-Type ]
[ X-HW-ACL-Group-Name ]
[ X-HW-Interim-Interval ]
*[ AVP ]
*[ Charging-Rule-Name ]
*[ AVP ]
*[ QoS-Information ] [ Note 5 ]
[ Max-Requested-Bandwidth-UL ]
[ Max-Requested-Bandwidth-DL ]
[ Guaranteed-Bitrate-UL ]
[ Guaranteed-Bitrate-DL ]
*[ AVP ]
*[ Usage-Monitoring-Information ] [ Note 6 ]
[ Monitoring-Key ]
[ Granted-Service-Unit ]
[ CC-Time ]
[ CC-Total-Octets ]
[ CC-Output-Octets ]
*[ AVP ]
[ Usage-Monitoring-Level ]
[ Usage-Monitoring-Report ]
*[ AVP ]
An device receives but does not process *[AVP] in the message format description. This means that the device processes the AVPs described in this document but ignores other AVPs.
Note Index |
Note Description |
---|---|
[Note1] |
The Re-Auth-Request-Type AVP is set to AUTHORIZE_ONLY, indicating an authorization request. |
[Note2] |
When the Event-Trigger AVP is sent by the PCRF to the PCEF, the Event-Trigger AVP indicates an event in which the PCC rule is requested again. |
[Note3] |
The Charging-Rule-Remove AVP indicates a removal policy and consists of several AVPs. If the policy is a dynamic policy, the Charging-Rule-Name AVP is the PCC rule name generated by the PCRF. Otherwise, the Charging-Rule-Name AVP is the predefined rule name. |
[Note4] |
The Charging-Rule-Install AVP indicates the installation policy and consists of the Charging-Rule-Definition and Charging-Rule-Name AVPs.
|
[Note5] |
The QoS-Information AVP at the command level includes user bandwidth information. The QoS-Information AVP at the service or rule level refers to the QoS-Information AVP in the Charging-Rule-Definition AVP. |
[Note6] |
The Usage-Monitoring-Information AVP consists of several AVPs. CCA-Initial indicates the usage allocated by the PCRF. |
Reference Standards
3GPP TS 29.212 V9.7.0 clause 5.6.4
RAA (Re-Auth-Answer)
Message Function
The Re-Auth-Answer (RAA) command, indicated by the Command-Code field set to 258 and the R bit cleared in the Command Flags field, is sent by the PCEF to the PCRF in response to the RAR command.
Message Format
<RA-Answer> ::= < Diameter Header: 258, PXY >
< Session-Id >
{ Origin-Host }
{ Origin-Realm }
[ Result-Code ]
[ Experimental-Result ] [ Note 1 ]
{ Vendor-Id }
{ Experimental-Result-Code }
*[ Charging-Rule-Report] [ Note 2 ]
*[ Charging-Rule-Name ]
[ PCC-Rule-Status ]
[ Rule-Failure-Code ]
Note Index |
Note Description |
---|---|
[Note1] |
The Experimental-Result AVP includes the error codes for request processing allocated by vendors. It is specified by the protocol stack. When a PCC rule cannot be deployed or activated, the Experimental-Result AVP is set to DIAMETER_PCC_RULE_EVENT(5142). If an RAA message does not include the result code, the PCRF considers the result to be success. |
[Note2] |
The Charging-Rule-Report AVP indicates the execution result of a PCC rule and consists of several AVPs. |
Reference Standards
3GPP TS 29.212 V9.7.0 clause 5.6.5
Abort-Session-Request (ASR)
Message Function
The PCRF sends an ASR message to the PCEF to stop the service of a specified Session-Id. The Command-Code is set to 274, and the R bit in the flag field is set.
Message Format
<ASR> ::= < Diameter Header: 274, REQ, PXY >
< Session-Id >
{ Origin-Host }
{ Origin-Realm }
{ Destination-Realm }
{ Destination-Host }
{ Auth-Application-Id }
[ User-Name ]
[ Origin-State-Id ]
* [ Proxy-Info ]
* [ Route-Record ]
* [ AVP ]
References
Section 8.5.1 in RFC 3588
Abort-Session-Answer (ASA)
Message Function
After receiving an ASR message, the PCEF sends an ASA message to the PCRF. The Command-Code is set to 274, and the R bit in the flag field is cleared.
Message Format
<ASA> ::= < Diameter Header: 274, PXY >
< Session-Id >
{ Result-Code }[Note 1]
{ Origin-Host }
{ Origin-Realm }
[ User-Name ]
[ Origin-State-Id ]
[ Error-Message ]
[ Error-Reporting-Host ]
[ Failed-AVP ]
* [ Redirect-Host ]
[ Redirect-Host-Usage ]
[ Redirect-Max-Cache-Time ]
* [ Proxy-Info ]
* [ AVP ]
Note ID |
Remarks |
---|---|
[Note 1] |
|
References
Section 8.5.2 in RFC 3588
Description of Associated AVPs
AVP Format Convention
Format |
Description |
---|---|
<> |
The fixed position of the AVP is defined. |
{} |
The AVP must be present and can appear anywhere in a message. |
[] |
The AVP is optional and can appear anywhere in a message. The number of times that the AVP appears can be 0 or 1. |
*[] |
The AVP can appear anywhere in a message. |
Auth-Application-Id AVP
Description of AVP
AVP |
Description |
---|---|
Auth-Application-Id |
The Auth-Application-Id AVP (AVP Code 258) is of type Unsigned32 and is used to advertise support of the authentication and authorization of an application. The Auth-Application-Id must also be carried in all authentication and/or authorization messages that are defined in a separate Diameter specification and have an Application ID assigned. The maximum length of the Auth-Application-Id AVP supported by device is 127 bytes. NOTE:
On the device, the Auth-Application-Id AVP indicates the specific application of a Diameter message, and the value of Auth-Application-Id used by PCC on a Gx interface is 16777238. The Auth-Application-Id AVP is a sub-AVP, which is used in the group AVP vendor-specific-application-id. |
Reference Standards
RFC 3588 clause 6.8
CC-Output-Octets AVP
Description
AVP |
Description |
---|---|
CC-Output-Octets |
The code and type of the CC-Output-Octets AVP are 414 and Unsigned64, respectively. The AVP, with the maximum length of 8 bytes, indicates the total number of used downlink traffic bytes. This AVP is a sub-AVP and is used in the group AVP named Granted-Service-Unit. |
References
RFC 4006 clause 8.25
CC-Request-Number AVP
Description of AVP
AVP |
Description |
---|---|
CC-Request-Number |
The CC-Request-Number AVP (AVP Code 415) is of type Unsigned32 and identifies this request within one session. As Session-Id AVPs are globally unique, the combination of Session-Id and CC-Request-Number AVPs is also globally unique and can be used in matching credit-control messages with confirmations. An easy way to produce unique numbers is to set the value to 0 for a credit-control request of type INITIAL_REQUEST and EVENT_REQUEST and to set the value to 1 for the first UPDATE_REQUEST, to 2 for the second, and so on until the value for TERMINATION_REQUEST is one more than for the last UPDATE_REQUEST. NOTE:
On the device, the CC-Request-Number AVP identifies the sequence number of the CCR message. The count starts from 0 and the value does not change in retransmitted messages. This AVP is used independently. |
Reference Standards
RFC 4006 clause 8.2
CC-Request-Type AVP
Description of AVP
AVP |
Description |
---|---|
CC-Request-Type |
The CC-Request-Type AVP (AVP Code 416) is
of type Enumerated and contains the reason for sending the credit-control
request message. It must be present in all Credit-Control-Request
messages. The following values are defined for the CC-Request-Type
AVP:
NOTE:
This AVP is used independently. Currently, the device supports the following types of CC requests:
|
Reference Standards
RFC 4006 clause 8.3
CC-Time AVP
Description of AVP
AVP |
Description |
---|---|
CC-Time |
The CC-Time AVP (AVP Code 420) is of type Unsigned32 and indicates the length of the requested, granted, or used time in seconds. The CC-Time AVP is a sub-AVP, which is used in the group AVP Granted-Service-Unit. |
References
RFC 4006 clause 8.21
CC-Total-Octets AVP
Description
AVP |
Description |
---|---|
CC-Total-Octets |
The CC-Total-Octets AVP (AVP Code 421) is of type Unsigned64 and contains the total number of requested, granted, or used octets regardless of the direction (sent or received). The CC-Total-Octets AVP is a sub-AVP, which is used in the group AVP Granted-Service-Unit. |
References
RFC 4006 clause 8.23
Charging-Rule-Definition AVP
Description of AVP
AVP |
Description |
---|---|
Charging-Rule-Definition |
The Charging-Rule-Definition AVP (AVP code 1003) is of type Grouped, and it defines the PCC rule for a service flow sent by the PCRF to the PCEF. A Charging-Rule-Name AVP is generated by a PCRF and is globally unique. If a PCC rule needs to be deleted, add the value of the Charging-Rule-Name AVP in the Charging-Rule-Remove AVP. If optional AVPs within a Charging-Rule-Definition AVP are omitted, but corresponding information has been provided in previous Gx messages, the previous information remains valid. The Monitoring-Key AVP contains the monitoring key that can be applied to the PCC rule. Charging-Rule-Definition ::= < AVP Header: 1003 > { Charging-Rule-Name } [ QoS-Information ] [ Monitoring-Key ] [ X-HW-ACL-Group-Name ] [ X-HW-Interim-Interval ] *[ AVP ] NOTE:
The device receives but does not process *[AVP] in the AVP format description, that is, the device processes the AVPs listed in this document and ignores other AVPs. The Charging-Rule-Definition AVP is a sub-AVP, which is used in the group AVP charging-rule-install. The Charging-Rule-Definition AVP is also a group AVP, which contains the charging-rule-name, precedence, gx-x-hw-service-type, qos-information, and gx-r9-usage-monitoring-key sub-AVPs. |
Reference Standards
3GPP TS 29.212 V9.7.0 clause 5.3.4
Charging-Rule-Install AVP
Description of AVP
AVP |
Description |
---|---|
Charging-Rule-Install |
The Charging-Rule-Install AVP (AVP code 1001) is of type Grouped, and it is used to activate, install or modify PCC rules as instructed from the PCRF to the PCEF. For installing a new PCC rule or modifying a PCC rule already installed, Charging-Rule-Definition AVP shall be used. For activating a specific PCC rule predefined at the PCEF, Charging-Rule-Name AVP shall be used as a reference for that PCC rule. Charging-Rule-Install ::= < AVP Header: 1001 > *[ Charging-Rule-Definition ] *[ Charging-Rule-Name ] *[ AVP ] NOTE:
The device receives but does not process *[AVP] in the AVP format description, that is, the device processes the AVPs listed in this document and ignores other AVPs. The Charging-Rule-Install AVP is a group AVP, which contains the charging-rule-definition and charging-rule-name sub-AVPs. |
Reference Standards
3GPP TS 29.212 V9.7.0 clause 5.3.2
Charging-Rule-Name AVP
Description of AVP
AVP |
Description |
---|---|
Charging-Rule-Name |
The Charging-Rule-Name AVP (AVP code 1005) is of type OctetString, and it defines a name for PCC rule. For PCC rules provided by the PCRF it uniquely identifies a PCC rule within one IP CAN session. For PCC rules pre-defined at the PCEF it uniquely identifies a PCC rule within the PCEF. The maximum length of the Charging-Rule-Name AVP is 67 bytes. |
Reference Standards
3GPP TS 29.212 V9.7.0 clause 5.3.6
Charging-Rule-Remove AVP
Description of AVP
AVP |
Description |
---|---|
Charging-Rule-Remove |
The Charging-Rule-Remove AVP (AVP code 1002) is of type Grouped, and it is used to deactivate or remove PCC rules from an IP CAN session. Charging-Rule-Name AVP is a reference for a specific PCC rule at the PCEF to be removed or for a specific PCC rule predefined at the PCEF to be deactivated. AVP Format: Charging-Rule-Remove ::= < AVP Header: 1002 > *[ Charging-Rule-Name ] *[ AVP ] NOTE:
The device receives but does not process *[AVP] in the AVP format description, that is, the device processes the AVPs listed in this document and ignores other AVPs. |
Reference Standards
3GPP TS 29.212 V9.7.0 clause 5.3.3
Charging-Rule-Report AVP
Description of AVP
AVP |
Description |
---|---|
Charging-Rule-Report |
The Charging-Rule-Report AVP (AVP code 1018) is of type Grouped, and it is used to report the status of PCC rules.
AVP Format: Charging-Rule-Report ::= < AVP Header:1018 > *[Charging-Rule-Name] [PCC-Rule-Status] [Rule-Failure-Code] *[AVP] NOTE:
The device receives but does not process *[AVP] in the AVP format description, that is, the device processes the AVPs listed in this document and ignores other AVPs. The Charging-Rule-Report AVP is a group AVP, which contains the charging-rule-name, pcc-rule-status, rule-failure-code, and final-unit-indication sub-AVPs. |
Reference Standards
3GPP TS 29.212 V9.7.0 clause 5.3.18
Destination-Host AVP
Description of AVP
AVP |
Description |
---|---|
Destination-Host |
The Destination-Host AVP (AVP Code 293) is of type DiameterIdentity. The Destination-Host AVP may be carried in request messages, and must not be carried in response messages. The absence of the Destination-Host AVP will cause a request to be sent to any Diameter server that supports the application within the realm specified in Destination-Realm AVP. The Destination-Host AVP must be placed as close to the Diameter packet header as possible. |
Reference Standards
RFC 3588 clause 6.5
Destination-Realm AVP
Description of AVP
AVP |
Description |
---|---|
Destination-Realm |
The Destination-Realm AVP (AVP Code 283) is of type DiameterIdentity. The maximum length of the Destination-Realm AVP is 127 bytes. The Destination-Realm AVP must not be carried in response messages. The User-Name AVP needs to be added to a request sent by a Diameter client. Diameter servers initiate a request message using the value of the Origin-Realm AVP carried in a previous message that is sent from the target host. The Destination-Realm AVP is used to perform message routing decisions. The Destination-Realm AVP must be placed as close to the Diameter packet header as possible. |
Reference Standards
RFC 3588 clause 6.6
Error-Message AVP
Description of AVP
AVP |
Description |
---|---|
Error-Message |
The Error-Message AVP (AVP Code 281) is of type UTF8String, and it may accompany a Result-Code AVP as a readable error message. The Error-Message AVP cannot be parsed by NEs. |
Reference Standards
RFC 3588 clause 7.3
Experimental-Result AVP
Description of AVP
AVP |
Description |
---|---|
Experimental-Result |
The Experimental-Result AVP (AVP Code 297) is of type Grouped, and it indicates whether a particular vendor-specific request was completed successfully or whether an error occurred, and the vendor ID. AVP Format: Experimental-Result ::= < AVP Header:297 > { Vendor-Id } { Experimental-Result-Code } |
Reference Standards
RFC 3588 clause 7.6
Experimental-Result-Code AVP
Description of AVP
AVP |
Description |
---|---|
Experimental-Result-Code |
The Experimental-Result-Code AVP (AVP Code 298) is of type Unsigned32 and it contains a vendor-assigned value representing the result of processing the request. The maximum length is 4 bytes. |
Reference Standards
RFC 3588 clause 7.7
Event-Trigger AVP
Description of AVP
AVP |
Description |
---|---|
Event-Trigger |
The Event-Trigger AVP (AVP code 1006) is of type Enumerated. When sent from the PCRF to the PCEF the Event-Trigger AVP indicates an event that shall cause a re-request of PCC rules. When sent from the PCEF to the PCRF the Event-Trigger AVP indicates that the corresponding event has occurred at the gateway. Whenever one of these events occurs, the PCEF shall send the related AVP that has changed together with the event trigger indication. The following values are defined in 3GPP TS 29.212 V9.7.0:
NOTE:
The Event-Trigger AVP is used independently. The following values are supported for the Event-Trigger AVP on the device:
|
Reference Standards
3GPP TS 29.212 V9.7.0 clause 5.3.7
Feature-List AVP
Description
AVP |
Description |
---|---|
Feature-List |
The Feature-List AVP (AVP Code 630) is of type Unsigned32 and contains a bit mask indicating the supported features of an application. The Feature-List AVP is a sub-AVP, which is used in the group AVP Supported-Features. |
References
3GPP TS 29.212 V9.7.0 clause 5.4.1
3GPP TS 29.229 V8.7.0 clause 6.3.31
Feature-List-ID AVP
Description
AVP |
Description |
---|---|
Feature-List-ID |
The Feature-List-ID AVP (AVP Code 629) is of type Unsigned32 and contains the identity of a feature list. The Feature-List-ID AVP is a sub-AVP, which is used in the group AVP Supported-Features. |
References
3GPP TS 29.212 V9.7.0 clause 5.4.1
3GPP TS 29.229 V8.7.0 clause 6.3.30
Framed-IP-Address AVP
Description of AVP
AVP |
Description |
---|---|
Framed-IP-Address |
The Framed-IP-Address AVP (AVP Code 8) is of type OctetString and contains an IPv4 address of the type specified in the attribute value to be configured for the user. An IPv4 address and/or an IPv6 address must be carried in a CCR message. The Framed-IP-Address AVP length is 4 bytes. |
Reference Standards
RFC 4005 clause 6.11.1
Framed-IPv6-Prefix AVP
Description of AVP
AVP |
Description |
---|---|
Framed-IPv6-Prefix |
The Framed-IPv6-Prefix AVP (AVP Code 97) is of type OctetString and contains the IPv6 prefix to be configured for the user. An IPv6 prefix or an IPv4 address must be carried in a CCR message. The Framed-IPv6-Prefix AVP length is 18 bytes. The first byte is reserved and the second byte indicates the prefix length (the prefix length ranges from 0 to 128 bytes). The last 16 bytes constitute the prefix. Three IPv6 address formats are supported:
|
Reference Standards
RFC 4005 clause 6.11.6
Granted-Service-Unit AVP
Description of AVP
AVP |
Description |
---|---|
Granted-Service-Unit |
Granted-Service-Unit AVP (AVP Code 431) is of type Grouped and it indicates the quotas sent from the PCRF to users. AVP Format: Granted-Service-Unit ::= < AVP Header:431 > [ CC-Time ] [ CC-Total-Octets ] *[ AVP ] NOTE:
The device receives but does not process *[AVP] in the AVP format description, that is, the device processes the AVPs listed in this document and ignores other AVPs. |
Reference Standards
RFC 4006 clause 8.17
Guaranteed-Bitrate-DL AVP
Description of AVP
AVP |
Description |
---|---|
Guaranteed-Bitrate-DL |
The Guaranteed-Bitrate-DL AVP (AVP code 1025) is of type Unsigned32, and it indicates the guaranteed bit rate for a downlink service data flow, in bit/s. The Guaranteed-Bitrate-DL AVP length supported by device is 4 bytes. |
Reference Standards
3GPP TS 29.212 V9.7.0 clause 5.3.25
Guaranteed-Bitrate-UL AVP
Description of AVP
AVP |
Description |
---|---|
Guaranteed-Bitrate-UL |
The Guaranteed-Bitrate-UL AVP (AVP code 1026) is of type Unsigned32, and it indicates the guaranteed bit rate for an uplink service data flow, in bit/s. The Guaranteed-Bitrate-UL AVP length supported by device is 4 bytes. AVP format: |
Reference Standards
3GPP TS 29.212 V9.7.0 clause 5.3.26
IP-CAN-Type AVP
Description of AVP
AVP |
Description |
---|---|
IP-CAN-Type |
The IP-CAN-Type AVP (AVP code 1027) is of type Enumerated, and it shall indicate the type of Connectivity Access Network in which the user is connected. The IP-CAN-Type AVP shall always be present during the IP-CAN session establishment. This AVP is included in a CCR-Initial message. The following values
are defined in 3GPP TS 29.212:
NOTE:
For device, the value range of IP-CAN-Type AVP is as follows:
For WiFi users, the IP-CAN-Type AVP is set to WLAN. In other modes, the IP-CAN-Type AVP is set to XDSL. The PCRF determines a policy for users based on the IP-CAN-Type AVP. The policy used varies with the access mode. When the access mode changes, the PCEF sends a message carrying a new access mode and the IP_CAN_CHANGE trigger. The message requests that the PCRF deliver a relevant policy so that the PCEF can implement policy control based on the access mode. |
Reference Standards
3GPP TS 29.212 V9.7.0 clause 5.3.27
Max-Requested-Bandwidth-DL AVP
Description of AVP
AVP |
Description |
---|---|
Max-Requested-Bandwidth-DL |
The Max-Requested-Bandwidth-DL AVP (AVP code 515) is of type Unsigned32, and it indicates the maximum bandwidth for a downlink IP flow, in bit/s. The Max-Requested-Bandwidth-DL AVP length supported by device is 4 bytes. If the Max-Requested-Bandwidth-DL AVP is carried in CC-Request messages, it indicates the maximum requested bandwidth. If the Max-Requested-Bandwidth-DL AVP is carried in CC-Answer messages, it indicates the maximum requested bandwidth of the PCRF. |
Reference Standards
3GPP TS 29.214 V11.6.0 clause 5.3.14
Max-Requested-Bandwidth-UL AVP
Description of AVP
AVP |
Description |
---|---|
Max-Requested-Bandwidth-UL |
The Max-Bandwidth-UL AVP (AVP code 516) is of type Unsigned32, and it indicates the maximum requested bandwidth for an uplink IP flow, in bit/s. The Max -Bandwidth-UL AVP length supported by device is 4 bytes. If the Max-Requested-Bandwidth-UL AVP is carried in CC-Request messages, it indicates the maximum requested bandwidth. If the Max-Requested-Bandwidth-UL AVP is carried in CC-Answer messages, it indicates the maximum requested bandwidth of the PCRF. |
Reference Standards
3GPP TS 29.214 V11.6.0 clause 5.3.15
Monitoring-Key AVP
Description of AVP
AVP |
Description |
---|---|
Monitoring-Key |
The Monitoring-Key AVP (AVP code 1066) is of type OctetString. The Monitoring-Key AVP is an identifier of a quota monitoring instance and used for quota monitoring. The Usage-Monitoring-Information AVP is defined in messages. If the Monitoring-Key AVP appears in the Charging-Rule-Definition AVP, the Usage-Monitoring-Information AVP is associated based on the Monitoring-Key AVP. For the predefined rules, the value of the Monitoring-Key AVP must be configured on the PCEF. NOTE:
On the device, the value of the Monitoring-Key AVP is set to 9 for BOD services and must also be set to 9 on the PCRF for BOD services. The Monitoring-Key AVP is a sub-AVP, which is used in the group AVP Gx-R9-Usage-Monitoring-Info. |
Reference Standards
3GPP TS 29.212 V9.7.0 clause 5.3.59
Origin-Host AVP
Description of AVP
AVP |
Description |
---|---|
Origin-Host |
The Origin-Host AVP (AVP Code 264) is of type DiameterIdentity. The maximum length supported by device is 127 bytes. The host name configured on the PCEF is the Peer-Host for the PCRF. The Origin-Host AVP must be carried in all Diameter messages.
|
Reference Standards
RFC 3588 clause 6.3
Origin-Realm AVP
Description of AVP
AVP |
Description |
---|---|
Origin-Realm |
The Origin-Realm AVP (AVP Code 296) is of type DiameterIdentity and the maximum length is 127 bytes. The Origin-Realm AVP contains the realm that generates any Diameter message, and must be carried in all messages. This AVP SHOULD be placed as close to the Diameter header as possible. NOTE:
On the device, the Origin-Realm AVP indicates the domain name contained in Local Info that is configured on the PCEF, which is the peer domain for the PCRF. The Origin-Realm AVP is used independently. |
Reference Standards
RFC 3588 clause 6.4
Origin-State-Id
Description of AVP
AVP |
Description |
---|---|
Origin-State-Id |
The Origin-State-Id AVP (AVP Code 278) is of type Unsigned32 and the length is 4 bytes. The Origin-State-Id AVP is a monotonically increasing value that is used whenever a Diameter entity restarts with the loss of a previous status, for example upon reboot. The Origin-State-Id AVP can be carried in any Diameter message, including CER. Typically, Origin-State-Id is used by an access device that always starts up with no active sessions; that is, any session that is active before the restart will be lost. By carrying the Origin-State-Id AVP in a message, it allows other Diameter entities to infer that sessions associated with a lower Origin-State-Id are no longer active. If an access device does not intend for such inferences, the device must include the Origin-State-Id AVP in any message or set its value to 0. NOTICE:
The device can receives but does not process the Origin-State-Id AVP. |
Reference Standards
RFC 3588 clause 8.16
PCC-Rule-Status AVP
Description of AVP
AVP |
Description |
---|---|
PCC-Rule-Status |
The PCC-Rule-Status AVP (AVP code 1019) is of type Enumerated, and describes the status of one or a group of PCC Rules. The following values are defined for the PCC-Rule-Status AVP:
|
Reference Standards
3GPP TS 29.212 V9.7.0 clause 5.3.19
QoS-Information AVP
Description of AVP
AVP |
Description |
---|---|
QoS-Information |
The QoS-Information AVP (AVP code 1016) is of type Grouped. The QoS-Information AVP defines the QoS information of IP-CAN sessions and PCC rules. When the QoS-Information AVP is sent by the PCEF to the PCRF through a CCR-Initial message for requesting the PCRF to establish a session, this AVP indicates the initial QoS information of the users in an IP-CAN session. When the QoS-Information AVP is sent by the PCRF to the PCEF, this AVP indicates the total bandwidth of the users in an IP-CAN session or the authorized QoS parameter for a rule or service. AVP format: QoS-Information ::= < AVP Header: 1016> [ Max-Requested-Bandwidth-UL ] [ Max-Requested-Bandwidth-DL ] [ Guaranteed-Bitrate-UL ] [ Guaranteed-Bitrate-DL ] *[ AVP] NOTE:
The device receives but does not process *[AVP] in the AVP format description, that is, the device processes the AVPs listed in this document and ignores other AVPs. The device supports only the QoS-Information attribute as a sub-attribute of Charging-Rule-Definition for delivery. The QoS-Information AVP is a sub-AVP, which is used in the group AVP Charging-Rule-Definition. The QoS-Information AVP is also a group AVP, which contains the Qos-Class-Identifier, Max-Requested-Bandwidth-UL, Max-Requested-bandwidth-DL, Guaranteed-Bitrate-UL, and Guaranteed-Bitrate-DL sub-AVPs. |
Reference Standards
3GPP TS 29.212 V9.7.0 clause 5.3.16
Re-Auth-Request-Type AVP
Description of AVP
AVP |
Description |
---|---|
Re-Auth-Request-Type |
The Re-Auth-Request-Type AVP (AVP Code 285) is of type Enumerated and is carried in application-specific authentication responses to inform the client of the Authorization-Lifetime expiration. If the response message contains an Authorization-Lifetime AVP with a positive value, the Re-Auth-Request-Type AVP must be carried in a response message. The following values are defined for the Re-Auth-Request-Type AVP:
NOTE:
device does not support the AVP. |
Reference Standards
RFC 3588 clause 8.12
Result-Code AVP
Description of AVP
AVP |
Description |
---|---|
Result-Code |
The Result-Code AVP (AVP Code 268) is of type Unsigned32 and the length is 4 bytes. It indicates whether a particular request was completed successfully or whether an error occurred. This AVP is carried in a response message to indicate the result code of a request message. The Result-Code AVP and/or the Experimental-Result AVP must exist. After processing an RAR message successfully, the PCEF sends an RAA message in which the value of the Result-Code AVP is DIAMETER_SUCCESS. The PCRF checks whether a user is online. If the user is offline, the PCRF returns the Result-Code AVP whose value is DIAMETER_UNKNOWN_SESSION_ID. |
Reference Standards
RFC 3588 clause 7.1
Rule-Failure-Code AVP
Description of AVP
AVP |
Description |
---|---|
Rule-Failure-Code |
The Rule-Failure-Code AVP (AVP code 1031) is of type Enumerated, and it is sent by the PCEF to the PCRF and is used to specify the cause value of the error that occurs in the PCC rule during sending of the Charging-Rule-Report AVP. The following values are defined in RFC 3588:
In device, the following values are defined:
|
Reference Standards
3GPP TS 29.212 V9.7.0 clause 5.3.38
Session-Id AVP
Description of AVP
AVP |
Description |
---|---|
Session-Id |
The Session-Id AVP (AVP Code 263) is of type UTF8String and the maximum length is 139 bytes. It is used to identify a specific session. All messages pertaining to a specific session must include only one Session-Id AVP and the same value must be used throughout the life of a session. When present, the Session-Id should appear immediately following the Diameter Header. The Session-Id
must be globally and eternally unique, as it is meant to uniquely
identify a user session without reference to any other information,
and may be needed to correlate historical authentication information
with accounting information. The Session-Id includes a mandatory portion
and an implementation-defined portion; a recommended format for the
implementation-defined portion is outlined below.
The Session-Id AVP is created by the Diameter application initiating the session, which in most cases is done by the client. Note that a Session-Id may be used for both the authorization and accounting commands of a given application. NOTE:
The Session-Id AVP has a maximum of 127 bytes. This AVP is generated by the PCEF and must be unique on the entire network to avoid misoperation when resources are inconsistent. On an device, the format is:
|
Reference Standards
RFC 3588 clause 8.8
Session-Release-Cause AVP
Description of AVP
AVP |
Description |
---|---|
Session-Release-Cause |
The Session-Release-Cause AVP (AVP Code 1045) is of type Enumerated and it determines the reason of the IP-CAN session released by the PCRF. The following values are defined for the Session-Release-Cause AVP:
NOTICE:
For the release of an IP-CAN session initiated by the PCRF, 3GPP defines three different mechanisms successively. The first mechanism is based on Diameter based protocol (DBP) ASR/ASA messages; the second mechanism is based on the RAR messages (in which all deployed rules are removed) sent by the PCRF; the third mechanism is based on the RAR messages (carrying the Session-Release-Cause AVP) sent by the PCRF. The PCEF removes the deployed policies and sends a CCR-T message to the PCRF, requesting the PCRF to terminate an IP-CAN session. From the angle of interoperability and compatibility, the third mechanism is mandatory and the other two are optional. |
Reference Standards
3GPP TS 29.212 V9.7.0 clause 5.3.44
Subscription-Id AVP
Description of AVP
AVP |
Description |
---|---|
Subscription-Id |
The Subscription-Id AVP (AVP Code 443) is of type Grouped and it is used to identify the end user's subscription data. The Subscription-Id AVP consists of the Subscription-Id-Data AVP and the Subscription-Id-Type AVP. The Subscription-Id-Data AVP includes one ID and the Subscription-Id-Type AVP defines the ID type. It is defined as follows (per the grouped-avp-def of RFC 3588 [DIAMBASE]): Subscription-Id ::= <AVP Header: 443 > { Subscription-Id-Type } { Subscription-Id-Data } NOTE:
On the device, the Subscription-Id-Type AVP is set to END_USER_NAI (3) On an device, the Subscription-Id-Data AVP is set to a user name consisting of at most 253 bytes (such as 50ec931b0000@rm-3). The Subscription-Id AVP is a group AVP, which contains the Subscription-id-Type and Subscription-id-Data sub-AVPs. |
Reference Standards
RFC 4006 clause 8.46
Subscription-Id-Data AVP
Description of AVP
AVP |
Description |
---|---|
Subscription-Id-Data |
The Subscription-Id-Data AVP (AVP Code 444) is used to identify the end user and is of type UTF8String. The Subscription-Id-Type AVP defines which type of identifier is used. The Subscription-Id-Data AVP is a sub-AVP, which is used in the group AVP Subscription-Id. |
References
RFC 4006 clause 8.48
Subscription-Id-Type AVP
Description of AVP
AVP |
Description |
---|---|
Subscription-Id-Type |
The Subscription-Id-Type AVP (AVP Code 450) is of type Enumerated, and it is used to determine which type of identifier is carried by the Subscription-Id AVP. The values are as follows:
NOTE:
The device supports only END_USER_NAI(3). The Subscription-Id-Type AVP is a sub-AVP, which is used in the group AVP Subscription-ID. |
References
RFC 4006 clause 8.47
Supported-Features AVP
Description of AVP
AVP |
Description |
---|---|
Supported-Features |
The Supported-Features AVP (Code 628) is of type Grouped. If this AVP is present it may inform the destination host about the features that the origin host supports. The Feature-List AVP contains a list of supported features of the origin host. The Vendor-Id AVP and the Feature-List AVP shall together identify which feature list is carried in the Supported-Features AVP. AVP format: Supported-Features :: = < AVP Header: 628 10415 > { Vendor-Id } { Feature-List-ID } { Feature-List } *[ AVP] NOTE:
The device receives but does not process *[AVP] in the AVP format description, that is, the device processes the AVPs listed in this document and ignores other AVPs. The flag of the Supported-Features AVP in a CCR-Initial message is mandatory ("M"). The Supported-Features AVP is a group AVP, which contains the Vendor-ID, Feature-List-ID, and Feature-List sub-AVPs. |
Reference Standards
3GPP TS 29.212 V9.7.0 clause 5.4.1
3GPP TS 29.229 V8.7.0 clause 6.3.29
Termination-Cause
Description of AVP
AVP |
Description |
---|---|
Termination-Cause |
The Termination-Cause AVP (AVP Code 295) is of type Enumerated and it is used to indicate the reason of a session termination on an access device. The following values are defined in RFC 3588:
NOTE:
device supports only the following value:
|
Reference Standards
RFC 3588 clause 8.15
Usage-Monitoring-Information AVP
Description of AVP
AVP |
Description |
---|---|
Usage-Monitoring-Information |
Usage-Monitoring-Information AVP (AVP code 1067) is of type Grouped, and it contains quota monitoring information and identifies a usage monitoring event.
AVP format: Usage-Monitoring-Information ::= <AVP Header: 1067 > [ Monitoring-Key ] [ Usage-Monitoring-Level ] [ Granted-Service-Unit ] [ Used-Service-Unit ] [ Usage-Monitoring-Report ] *[ AVP ] NOTE:
The Usage-Monitoring-Information AVP is a group AVP, which contains the gx-r9-usage-monitoring-key, granted-service-unit, and gx-r9-usage-monitoring-level sub-AVPs. An device receives but does not process *[AVP] in the message format description. This means that the device processes the AVPs described in this document but ignores other AVPs. |
Reference Standards
3GPP TS 29.212 V9.7.0 clause 5.3.60
Usage-Monitoring-Level AVP
Description of AVP
AVP |
Description |
---|---|
Usage-Monitoring-Level |
The Usage-Monitoring-Level AVP (AVP code 1068) is of type Enumerated and it contains quota monitoring information and identifies a quota monitoring event. This AVP is included in an RAR or CCA message delivered by the PCRF. The following values are defined:
|
Reference Standards
3GPP TS 29.212 V9.7.0 clause 5.3.61
Usage-Monitoring-Report AVP
Description of AVP
AVP |
Description |
---|---|
Usage-Monitoring-Report |
The Usage-Monitoring-Report AVP (AVP code 1069) is of type Enumerated and it is used by the PCRF to indicate the accumulated usage to be reported by the PCEF, regardless of whether a usage threshold is reached for certain quota monitoring key. If no monitoring key is specified, the PCRF instructs the PCEF to report session-level usage. The following values are defined in 3GPP
TS 29.212:
NOTE:
On device, BOD service does not support this AVP. The Usage-Monitoring AVP is a sub-AVP, which is used in the group AVP gx-r9-usage-monitoring-info. |
Reference Standards
3GPP TS 29.212 V9.7.0 clause 5.3.62
User-Equipment-Info AVP
Description of AVP
AVP |
Description |
---|---|
User-Equipment-Info |
The User-Equipment-Info AVP (AVP Code 458) is of type Grouped and is used to report a user's MAC address. It is defined as follows (per the grouped-avp-def of RFC 3588 [DIAMBASE]): User-Equipment-Info ::= < AVP Header: 458 > { User-Equipment-Info-Type } { User-Equipment-Info-Value } NOTE:
The User-Equipment-Info AVP is a group AVP, which contains the user-equipment-info-type and user-equipment-info-value sub-AVPs. It is used by the device to report MAC addresses of users. |
Reference Standards
RFC 4006 clause 8.49
User-Equipment-Info-Type AVP
Description of AVP
AVP |
Description |
---|---|
User-Equipment-Info-Type |
The User-Equipment-Info-Type AVP is of type Enumerated (AVP Code 459) and defines the type of user equipment information contained in the User-Equipment-Info-Value AVP. This specification defines the following user equipment types.
NOTE:
The User-Equipment-Info-Type AVP is a sub-AVP, which is used in the group AVP user-equipment-info. The device uses the User-Equipment-Info-Type AVP to report MAC addresses of users. This AVP is permanently set to MAC (1). |
Reference Standards
RFC 4006 clause 8.50
User-Equipment-Info-Value AVP
Description of AVP
AVP |
Description |
---|---|
User-Equipment-Info-Value |
The User-Equipment-Info-Value AVP (AVP Code 460) is of type OctetString. The User-Equipment-Info-Type AVP defines which type of identifier is used. The maximum length supported is 6 bytes. |
Reference Standards
RFC 4006 clause 8.51
Used-Service-Unit AVP
Description of AVP
AVP |
Description |
---|---|
Used-Service-Unit |
The Used-Service-Unit AVP is of type Grouped (AVP Code 446) and it indicates the used quotas measured from the last report, which are sent from the PCEF to the PCRF. The Used-Service-Unit AVP is defined as follows (per the grouped-avp-def of RFC 3588 [DIAMBASE]): Used-Service-Unit ::= <AVP Header: 446> [ CC-Time ] [ CC-Total-Octets ] NOTE:
The Used-Service-Unit AVP is a sub-AVP, which is used in the group AVP gx-r9-usage-monitoring-info. The Used-Service-Unit AVP is also a group AVP, which contains the cc-time and cc-total-octets sub-AVPs. The PCEF reports upstream traffic and downstream traffic separately, and the PCRF is required to sum the traffic. The device supports duration reporting. An device receives but does not process *[AVP] in the message format description. This means that the device processes the AVPs described in this document but ignores other AVPs. |
Reference Standards
RFC 4006 clause 8.19
Vendor-Id AVP
Description of AVP
AVP |
Description |
---|---|
Vendor-Id |
The Vendor-Id AVP (AVP Code 266) is of type Unsigned32 and contains the IANA "SMI Network Management Private Enterprise Codes" [ASSIGNNO] value assigned to the vendor of the Diameter application. In combination with the Supported-Vendor-Id AVP, this may be used in order to know which vendor specific attributes may be sent to the peer. It is also envisioned that the combination of the Vendor-Id, Product-Name and the Firmware-Revision AVPs may provide very useful debugging information. A Vendor-Id value of zero in the CER or CEA messages is reserved and indicates that this field is ignored. NOTE:
The Vendor-Id AVP is a sub-AVP, which is used in the group AVP vendor-specific-application-id. |
Reference Standards
RFC 4006 clause 5.3.3
Vendor-Specific-Application-Id AVP
Description of AVP
AVP |
Description |
---|---|
Feature-List-ID AVP |
The Vendor-Specific-Application-Id AVP (AVP Code 260) is of type Grouped and is used to advertise support of a vendor-specific Diameter Application. Exactly one of the Auth-Application-Id and Acct-Application-Id AVPs MAY be present. This AVP MUST also be present as the first AVP in all experimental commands defined in the vendor-specific application. This AVP SHOULD be placed as close to the Diameter header as possible. AVP Format: <Vendor-Specific-Application-Id> ::=< AVP Header: 260 > 1*[ Vendor-Id ] 0*1{Auth-Application-Id } 0*1{ Acct-Application-Id } NOTE:
The Vendor-Specific-Application-Id AVP is a group AVP, which contains the vendor-id and auth-application-id sub-AVPs. |
References
RFC 3588 clause 6.11
X-HW-User-Physical-Info-Value AVP
Description of AVP
AVP |
Description |
---|---|
X-HW-User-Physical-Info-Value |
The X-HW-User-Physical-Info-Value AVP (Code 2025) is of type UTF8String and it indicates physical information such as slot ID, sub-slot ID, port ID, and VLAN ID. The HW-User-Physical-Info-Value AVP format is similar to that of the Diameter NAS-PORT-ID AVP. An example of the HW-User-Physical-Info-Value AVP is: {atm|eth|trunk} NAS_slot/NAS_subslot/NAS_port:XPI.XCI. This AVP is defined as follows: <avpEntry name="X-HW-User-Physical-Info-Value" code="2025" flag="May_M" vendorId="2011" datatype="UTF8String" avpname="240"/> |
Reference Standards
This AVP is a private AVP, so there are no reference standards.
X-HW-MS-Group-Name AVP
Description of AVP
AVP |
Description |
---|---|
X-HW-MS-Group-Name |
The X-HW-MS-Group-Name AVP (Code 2021) is of type UTF8String and the maximum length is 31 bytes. It indicates a multicast group name. The PCRF sends this AVP based on its configurations. This AVP is defined as follows: <avpEntry name="X-HW-MS-Group-Name" code="2021" flag="May_M" vendorId="2011" datatype="UTF8String" avpname="243"/> |
Reference Standards
This AVP is a private AVP, so there are no reference standards.
X-HW-ACL-Group-Name AVP
Description of AVP
AVP |
Description |
---|---|
X-HW-ACL-Group-Name |
The X-HW-ACL-Group-Name AVP (Code 2022) is of type UTF8String and the maximum length is 31 bytes. It indicates an ACL group name configured on the PCEF (device). An ACL user group can be modified to implement ACL-based traffic behaviors. This AVP is defined as follows: <avpEntry name="X-HW-ACL-Group-Name" code="2022" flag="May_M" vendorId="2011" datatype="UTF8String" avpname="244"/> |
Reference Standards
This AVP is a private AVP, so there are no reference standards.
X-HW-Interim-Interval AVP
Description of AVP
AVP |
Description |
---|---|
X-HW-Interim-Interval |
The X-HW-Interim-Interval AVP is of type Unsigned32 (Code 2023) and has a length of 4 bytes. The HW-Interim-Interval AVP indicates a real-time charging interval (in seconds) of the PCEF (device). Setting its value to more than or equal to 60 is recommended. The HW-Interim-Interval AVP value ranges from 0 to 3932100. The value 0 indicates that real-time charging is not required, and a value greater than 3932100 indicates that a user fails to go online. The PCRF sends this AVP based on its configurations. This AVP is defined as follows: <avpEntry name="X-HW-Interim-Interval" code="2023" flag="May_M" vendorId="2011" datatype="Unsigned32" avpname="245"/> |
Reference Standards
This AVP is a private AVP, so there are no reference standards.
X-HW-Service-Type AVP
Description of AVP
AVP |
Description |
---|---|
X-HW-Service-Type |
The X-HW-Service-Type AVP (Code 2024) is
of type Enumerated. The PCEF supports BOD, and DAA services. The X-HW-Service-Type
AVP is defined as follows:
This AVP is defined as follows: <avpEntry name="X-HW-Service-Type" code="2024" flag="M" vendorId="2011" datatype="Enumerated" avpname="246"> NOTE:
The name of a static policy must be unique on the PCEF, that is, the service can be identified according to the static policy name. The X-HW-Service-Type AVP is a sub-AVP, which is used in the group AVP charging-rule-definition. |
Reference Standards
This AVP is a private AVP, so there are no reference standards.
Synchronization Conventions for Message Processing
Session Establishment
Scenario 1
A user who has subscribed to a service is configured on the PCRF. When the user goes online, the PCEF is requested to send a CCR-Initial message to the PCRF.
Processing
When the PCRF detects the subscription information about the user and a session is established successfully, the PCRF returns a CCA-Initial message carrying the PCC rule for the user.
Scenario 2
A user is not configured on the PCRF. When the user goes online, the PCEF is requested to send a CCR-Initial message to the PCRF.
Processing
When the PCRF does not detect the subscription information about the user and a session fails to be established, the PCRF returns a CCA-Initial message carrying the Result-Code AVP whose value is DIAMETER_UNKNOWN_SESSION_ID.
Response to the RAR Message
Scenario 1
A session is established successfully and a user who has subscribed to a service updates the service or a trigger enables the new service to be effective.
Processing
The PCRF sends an RAR message to the PCEF. Upon receiving the RAR message, the PCEF immediately returns an RAA message to the PCRF, and then activates, deactivates, deploys, or removes the rule in the RAR message. If the operation fails, the PCEF sends a CCR-Update message to the PCRF.
Scenario 2
A session is established successfully and a user who has subscribed to a service updates the service or a trigger enables the new service to be effective. Upon receiving an RAR message, the PCEF returns an RAA message and detects that the link status is down.
Processing
The PCEF does not send an RAA message but remove the local session. In this case, the PCEF notifies the service module of the link status and the service module determines when to initiate a request for bringing a user online. If the PCRF does not receive the RAA message, the PCRF removes the local session.
Error Code of the Gx Interface
Table 1-1667 lists the common error codes.
Code Value |
Meaning |
Possible Causes |
---|---|---|
4 |
GW_PCEF_MALFUNCTION |
The device internal processing is incorrect, for example, the PCRF delivers a policy that is not defined on the server, the service type of BOD services is incorrect, or the dynamic policy to be deleted is not installed. |
1004 |
QOS_CONTENT_ERROR |
The configured QoS content is incorrect. |
5002 |
DIAMETER_UNKNOWN_SESSION_ID |
The request contains an unknown Session-Id. |
5012 |
DIAMETER_UNABLE_TO_COMPLY |
The request is rejected. |
Compliance Information for Standards
Compliance Information of CCR Command
Message Format (AVP) |
AVP Code |
AVP Type |
Standard |
device Compliance |
Max length supported in device(Unit: bytes) |
---|---|---|---|---|---|
<CC-Request> ::= < Diameter Header: 272, REQ, PXY > |
- |
- |
3GPP TS 29.212 V9.7.0 clause 5.6.2 |
√ |
- |
< Session-Id > |
263 |
UTF8String |
RFC 3588 clause 8.8 |
√ |
127+8+4 |
{ Auth-Application-Id } |
258 |
Unsigned32 |
RFC 3588 clause 6.8 |
√ |
4 |
{ Origin-Host } |
264 |
DiameterIdentity |
RFC 3588 clause 6.3 |
√ |
127 |
{ Origin-Realm } |
296 |
DiameterIdentity |
RFC 3588 clause 6.4 |
√ |
127 |
{ Destination-Realm } |
283 |
DiameterIdentity |
RFC 3588 clause 6.6 |
√ |
127 |
{ CC-Request-Type } |
416 |
Enumerated |
RFC 4006 clause 8.3 |
√ |
4 |
{ CC-Request-Number } |
415 |
Unsigned32 |
RFC 4006 clause 8.2 |
√ |
4 |
[ Destination-Host ] |
293 |
DiameterIdentity |
RFC 3588 clause 6.5 |
√ |
127 |
[ Origin-State-Id ] |
278 |
Unsigned32 |
RFC 3588 clause 8.16 |
× |
- |
*[ Subscription-Id ] |
443 |
Grouped |
RFC 4006 clause 8.46 |
√ |
2048 |
{ Subscription-Id-Type } |
450 |
Enumerated |
RFC 4006 clause 8.47 |
√ |
4 |
{ Subscription-Id-Data } |
444 |
UTF8String |
RFC 4006 clause 8.48 |
√ |
253 |
*[ Supported-Features ] |
628 |
Grouped |
3GPP TS 29.229 V8.7.0 clause 6.3.29 |
√ |
2048 |
{ Vendor-Id } |
266 |
Unsigned32 |
RFC 3588 clause 5.3.3 |
√ |
4 |
{ Feature-List-ID } |
629 |
Unsigned32 |
3GPP TS 29.229 V8.7.0 clause 6.3.30 |
√ |
4 |
{ Feature-List } |
630 |
Unsigned32 |
3GPP TS 29.229 V8.7.0 clause 6.3.31 |
√ |
4 |
*[ AVP] |
- |
- |
- |
- |
- |
[ Network-Request-Support ] |
1024 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.24 |
× |
- |
*[ Packet-Filter-Information ] |
1061 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.56 |
× |
- |
[ Packet-Filter-Identifier ] |
1060 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.55 |
× |
- |
[ Packet-Filter-Content ] |
1059 |
IPFilterRule |
3GPP TS 29.212 V9.7.0 clause 5.3.54 |
× |
- |
[ ToS-Traffic-Class ] |
1014 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.15 |
× |
- |
[ Security-Parameter-Index ] |
1056 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.51 |
× |
- |
[ Flow-Label ] |
1057 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.52 |
× |
- |
*[ AVP ] |
- |
- |
- |
- |
- |
[ Packet-Filter-Operation ] |
1062 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.57 |
× |
- |
[ Bearer-Identifier ] |
1020 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.20 |
× |
- |
[ Bearer-Operation ] |
1021 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.21 |
× |
- |
[ Framed-IP-Address ] |
8 |
OctetString |
RFC 4005 clause 6.11.1 |
√ |
4 |
[ Framed-IPv6-Prefix ] |
97 |
OctetString |
RFC 4005 clause 6.11.6 |
√ |
18 |
[ IP-CAN-Type ] |
1027 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.27 |
√ |
4 |
[ 3GPP-RAT-Type ] |
21 |
OctetString |
3GPP TS 29.061 V8.2.0 clause 16.4.7 |
× |
- |
[ RAT-Type ] |
1032 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.31 |
× |
- |
[ Termination-Cause ] |
295 |
Enumerated |
RFC 3588 clause 8.15 |
√ |
4 |
[ User-Equipment-Info ] |
458 |
Grouped |
RFC 4006 clause 8.49 |
√ |
2048 |
{ User-Equipment-Info-Type } |
459 |
Enumerated |
RFC 4006 clause 8.47 |
√ |
4 |
{ User-Equipment-Info-Value } |
460 |
OctetString |
RFC 4006 clause 8.48 |
√ |
6 |
[ QoS-Information ] |
1016 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.16 |
√ |
2048 |
[ QoS-Class-Identifier ] |
1028 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.17 |
× |
- |
[ Max-Requested-Bandwidth-UL ] |
516 |
Unsigned32 |
3GPP TS 29.214 V8.3.0 clause 5.3.15 |
√ |
4 |
[ Max-Requested-Bandwidth-DL ] |
515 |
Unsigned32 |
3GPP TS 29.214 V8.3.0 clause 5.3.14 |
√ |
4 |
[ Guaranteed-Bitrate-UL ] |
1026 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.26 |
√ |
4 |
[ Guaranteed-Bitrate-DL ] |
1025 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.25 |
√ |
4 |
[ Bearer-Identifier ] |
1020 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.20 |
× |
- |
[ Allocation-Retention-Priority] |
1034 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.32 |
× |
- |
{Priority-Level} |
1046 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.45 |
× |
- |
[Pre-emption-Capability] |
1047 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.46 |
× |
- |
[Pre-emption-Vulnerability] |
1048 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.47 |
× |
- |
[ APN-Aggregate-Max-Bitrate-UL] |
1041 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.40 |
× |
- |
[ APN-Aggregate-Max-Bitrate-DL] |
1040 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.39 |
× |
- |
*[ AVP ] |
- |
- |
- |
- |
- |
[ QoS-Negotiation ] |
1029 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.28 |
× |
- |
[ QoS-Upgrade ] |
1030 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.29 |
× |
- |
[ Default-EPS-Bearer-QoS ] |
1049 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.48 |
× |
- |
[ QoS-Class-Identifier ] |
1028 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.17 |
× |
- |
[ Allocation-Retention-Priority] |
1034 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.32 |
× |
- |
{Priority-Level} |
1046 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.45 |
× |
- |
[Pre-emption-Capability] |
1047 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.46 |
× |
- |
[Pre-emption-Vulnerability] |
1048 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.47 |
× |
- |
*[ AVP ] |
- |
- |
- |
- |
- |
0*2[ AN-GW-Address ] |
1050 |
Address |
3GPP TS 29.212 V9.7.0 clause 5.3.49 |
× |
- |
[ 3GPP-SGSN-MCC-MNC ] |
18 |
UTF8String |
3GPP TS 29.061 V8.1.0 clause 16.4.7 |
× |
- |
[ 3GPP-SGSN-Address ] |
6 |
OctetString |
3GPP TS 29.061 V8.1.0 clause 16.4.7 |
× |
- |
[ 3GPP-SGSN-IPv6-Address ] |
15 |
OctetString |
3GPP TS 29.061 V8.1.0 |
× |
- |
[ RAI ] |
909 |
UTF8String |
3GPP TS 29.061 V8.1.0 clause 17.7.12 |
× |
- |
[ 3GPP-User-Location-Info] |
22 |
OctetString |
3GPP TS 29.061 V8.1.0 clause 16.4.7 |
× |
- |
[ 3GPP-MS-TimeZone ] |
23 |
OctetString |
3GPP TS 29.061 V8.1.0 clause 16.4.7 |
× |
- |
[ Called-Station-ID ] |
30 |
UTF8String |
RFC 4005 clause 4.5 |
× |
- |
[ PDN-Connection-ID ] |
1065 |
OctetString |
3GPP TS 29.212 clause 5.3.58 |
× |
- |
[ Bearer-Usage ] |
1000 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.1 |
× |
- |
*[ TFT-Packet-Filter-Information ] |
1013 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.14 |
× |
- |
[ TFT-Filter ] |
1012 |
IPFilterRule |
3GPP TS 29.212 V9.7.0 clause 5.3.13 |
× |
- |
[ ToS-Traffic-Class ] |
1014 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.15 |
× |
- |
[ Security-Parameter-Index ] |
1056 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.51 |
× |
- |
[ Flow-Label ] |
1057 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.52 |
× |
- |
*[ AVP ] |
- |
- |
- |
- |
- |
*[ Charging-Rule-Report ] |
1018 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.18 |
√ |
2048 |
*[ Charging-Rule-Name ] |
1005 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.6 |
√ |
67 |
[ PCC-Rule-Status ] |
1019 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.19 |
√ |
4 |
[ Rule-Failure-Code ] |
1031 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.38 |
√ |
4 |
[ Final-Unit-Indication ] |
430 |
Grouped |
RFC 4006 clause 8.34 |
× |
- |
{ Final-Unit-Action } |
449 |
Enumerated |
RFC 4006 clause 8.35 |
× |
- |
*[ Restriction-Filter-Rule ] |
438 |
IPFilterRule |
RFC 4006 clause 8.36 |
× |
- |
*[ Filter-Id ] |
11 |
UTF8String |
RFC 4005 clause 6.7 |
× |
- |
*[ AVP ] |
- |
- |
- |
- |
- |
*[ AVP ] |
- |
- |
- |
- |
- |
*[ Event-Trigger] |
1006 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.7 |
√ |
4 |
[ Event-Report-Indication ] |
1033 |
Grouped |
3GPP TS 29.212 V11.6.0 clause 5.3.30 |
× |
- |
*[Event-Trigger] |
1006 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.7 |
× |
- |
*[CSG-Information-Reporting] |
1071 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.64 |
× |
- |
[RAT-Type] |
1032 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.31 |
× |
- |
[QoS-Information] |
1016 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.16 |
- |
- |
[ QoS-Class-Identifier ] |
1028 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.17 |
× |
- |
[ Max-Requested-Bandwidth-UL ] |
516 |
Unsigned32 |
3GPP TS 29.214 V8.3.0 clause 5.3.15 |
× |
- |
[ Max-Requested-Bandwidth-DL ] |
515 |
Unsigned32 |
3GPP TS 29.214 V8.3.0 clause 5.3.14 |
× |
- |
[ Guaranteed-Bitrate-UL ] |
1026 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.26 |
× |
- |
[ Guaranteed-Bitrate-DL ] |
1025 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.25 |
× |
- |
[ Bearer-Identifier ] |
1020 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.20 |
× |
- |
[ Allocation-Retention-Priority] |
1034 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.32 |
× |
- |
{Priority-Level} |
1046 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.45 |
× |
- |
[Pre-emption-Capability] |
1047 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.46 |
× |
- |
[Pre-emption-Vulnerability] |
1048 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.47 |
× |
- |
[ APN-Aggregate-Max-Bitrate-UL] |
1041 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.40 |
× |
- |
[ APN-Aggregate-Max-Bitrate-DL] |
1040 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.39 |
× |
- |
*[ AVP ] |
- |
- |
- |
- |
- |
[ RAI ] |
909 |
UTF8String |
3GPP TS 29.061 V8.1.0 clause 17.7.12 |
× |
- |
[3GPP-User-Location-Info] |
22 |
OctetString |
3GPP TS 29.061 V8.1.0 clause 16.4.7 |
× |
- |
[Trace-Data] |
1458 |
Grouped |
3GPP TS 29.272 clause 7.3.63 |
× |
- |
[Trace-Reference] |
- |
OctetString |
3GPP TS 29.272 clause 7.3.64 |
× |
- |
[3GPP2-BSID] |
9010 |
UTF8String |
3GPP2 X.S0057-0 |
× |
- |
[3GPP-MS-TimeZone] |
23 |
OctetString |
3GPP TS 29.061 clause 16.4.7 |
× |
- |
[3GPP-SGSN-Address] |
6 |
OctetString |
3GPP TS 29.061 clause 16.4.7 |
× |
- |
[3GPP-SGSN-IPv6-Address] |
15 |
OctetString |
3GPP TS 29.061 clause 16.4.7 |
× |
- |
*[AVP] |
- |
- |
- |
- |
- |
[ Access-Network-Charging-Address ] |
501 |
Address |
3GPP TS 29.214 V8.3.0 clause 5.3.2 |
× |
- |
*[ Access-Network-Charging-Identifier-Gx ] |
1022 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.22 |
× |
- |
{ Access-Network-Charging-Identifier-Value} |
503 |
- |
3GPP TS 29.214 V8.3.0 clause 5.3.4 |
× |
- |
*[ Charging-Rule-Name ] |
1005 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.6 |
× |
- |
*[ CoA-Information ] |
1039 |
Grouped |
3GPP TS 29.212 clause 5.3.37 |
× |
- |
{ Tunnel-Information } |
1038 |
Grouped |
3GPP TS 29.212 clause 5.3.36 |
× |
- |
[ Tunnel-Header-Length ] |
1037 |
Unsigned32 |
3GPP TS 29.212 clause 5.3.35 |
× |
- |
2[ Tunnel-Header-Filter ] |
1036 |
IPFilterRule |
3GPP TS 29.212 clause 5.3.34 |
× |
- |
*[ AVP ] |
- |
- |
- |
- |
- |
{ CoA-IP-Address } |
1035 |
Address |
3GPP TS 29.212 clause 5.3.33 |
× |
- |
*[AVP] |
- |
- |
- |
- |
- |
*[ Usage-Monitoring-Information ] |
1067 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.60 |
√ |
2048 |
[ Monitoring-Key ] |
1066 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.59 |
√ |
32 |
[ Used-Service-Unit ] |
446 |
Grouped |
RFC 4006 clause 8.19 |
√ |
2048 |
[ Tariff-Change-Usage ] |
451 |
Time |
RFC 4006 clause 8.2 |
× |
- |
[ CC-Time ] |
420 |
Unsigned32 |
RFC 4006 clause 8.21 |
√ |
4 |
[ CC-Money ] |
413 |
Grouped |
RFC 4006 clause 8.22 |
× |
- |
{ Unit-Value } |
445 |
Grouped |
RFC 4006 clause 8.8 |
× |
- |
{ Value-Digits } |
447 |
Integer64 |
RFC 4006 clause 8.1 |
× |
- |
[ Exponent ] |
429 |
Integer32 |
RFC 4006 clause 8.9 |
× |
- |
[ Currency-Code ] |
425 |
Unsigned32 |
RFC 4006 clause 8.11 |
× |
- |
[ CC-Total-Octets ] |
421 |
Unsigned64 |
RFC 4006 clause 8.23 |
√ |
8 |
[ CC-Input-Octets ] |
412 |
Unsigned64 |
RFC 4006 clause 8.24 |
× |
- |
[ CC-Output-Octets ] |
414 |
Unsigned64 |
RFC 4006 clause 8.25 |
× |
- |
[ CC-Service-Specific-Units ] |
417 |
Unsigned64 |
RFC 4006 clause 9.26 |
× |
- |
*[ AVP ] |
- |
- |
- |
- |
- |
[ Usage-Monitoring-Level ] |
1068 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.61 |
√ |
4 |
[ Usage-Monitoring-Report ] |
1069 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.62 |
√ |
4 |
[ Usage-Monitoring-Support ] |
1070 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.63 |
√ |
4 |
*[ AVP ] |
- |
- |
- |
- |
- |
*[ Proxy-Info ] |
284 |
Grouped |
RFC 3588 clause 6.7.2 |
× |
- |
{ Proxy-Host } |
280 |
DiameterIdentity |
RFC 3588 clause 6.7.3 |
× |
- |
{ Proxy-State } |
33 |
OctetString |
RFC 3588 clause 6.7.4 |
× |
- |
*[ AVP ] |
- |
- |
- |
- |
- |
*[ Route-Record ] |
282 |
DiameterIdentity |
RFC 3588 clause 6.7.1 |
× |
- |
[ X-HW-User-Physical-Info-Value ] |
2025 |
UTF8String |
HUAWEI private AVP |
√ |
200 |
*[ AVP ] |
- |
- |
- |
- |
- |
Compliance Information of CCA Command
Message Format (AVP) |
AVP Code |
AVP Type |
Standard |
device Compliance |
Max length supported in device(Unit: Bytes) |
---|---|---|---|---|---|
<CC-Answer> ::= < Diameter Header: 272, PXY > |
- |
- |
3GPP TS 29.212 V9.7.0 clause 5.6.3 |
√ |
- |
< Session-Id > |
263 |
UTF8String |
RFC 3588 clause 8.8 |
√ |
127+8+4 |
{ Auth-Application-Id } |
258 |
Unsigned32 |
RFC 3588 clause 6.8 |
√ |
4 |
{ Origin-Host } |
264 |
DiameterIdentity |
RFC 3588 clause 6.3 |
√ |
128 |
{ Origin-Realm } |
296 |
DiameterIdentity |
RFC 3588 clause 6.4 |
√ |
128 |
[ Result-Code ] |
268 |
Unsigned32 |
RFC 3588 clause 7.1 |
√ |
4 |
[ Experimental-Result ] |
297 |
Grouped |
RFC 3588 clause 7.6 |
√ |
2048 |
{ Vendor-Id } |
266 |
Unsigned32 |
RFC 3588 clause 5.3.3 |
√ |
4 |
{ Experimental-Result-Code } |
298 |
Unsigned32 |
RFC 3588 clause 7.7 |
√ |
4 |
{ CC-Request-Type } |
416 |
Enumerated |
RFC 4006 clause 8.3 |
√ |
4 |
{ CC-Request-Number } |
415 |
Unsigned32 |
RFC 4006 clause 8.2 |
√ |
4 |
*[ Supported-Features ] |
628 |
Grouped |
3GPP TS 29.229 V8.7.0 clause 6.3.29 |
× |
- |
{ Vendor-Id } |
266 |
Unsigned32 |
RFC 3588 clause 5.3.3 |
× |
- |
{ Feature-List-ID } |
629 |
Unsigned32 |
3GPP TS 29.229 V8.7.0 clause 6.3.30 |
× |
- |
{ Feature-List } |
630 |
Unsigned32 |
3GPP TS 29.229 V8.7.0 clause 6.3.31 |
× |
- |
*[ AVP] |
- |
- |
- |
- |
- |
[ Bearer-Control-Mode ] |
1023 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.23 |
× |
- |
*[ Event-Trigger ] |
1006 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.7 |
√ |
4 |
[ Origin-State-Id ] |
278 |
Unsigned32 |
RFC 3588 clause 8.16 |
× |
- |
*[ Redirect-Host ] |
- |
- |
RFC 3588 clause 6.12 |
× |
- |
[ Redirect-Host-Usage ] |
261 |
Enumerated |
RFC 3588 clause 6.13 |
× |
- |
[ Redirect-Max-Cache-Time ] |
262 |
Unsigned32 |
RFC 3588 clause 6.14 |
× |
- |
*[ Charging-Rule-Remove ] |
1002 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.3 |
√ |
2048 |
*[ Charging-Rule-Name ] |
1005 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.6 |
√ |
67 |
*[ AVP ] |
- |
- |
- |
- |
- |
*[ Charging-Rule-Install ] |
1001 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.2 |
√ |
2048 |
*[ Charging-Rule-Definition ] |
1003 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.4 |
√ |
2048 |
{ Charging-Rule-Name } |
1005 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.6 |
√ |
12 |
[ Service-Identifier ] |
439 |
Unsigned32 |
RFC 4006 clause 8.28 |
× |
- |
[ Rating-Group ] |
432 |
Unsigned32 |
RFC 4006 clause 8.29 |
× |
- |
*[ Flow-Information ] |
1058 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.53 |
× |
- |
[ Flow-Description ] |
507 |
IPFilterRule |
3GPP TS 29.214 V8.3.0 clause 5.3.8 |
× |
- |
[ Packet-Filter-Identifier ] |
1060 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.55 |
× |
- |
[ Packet-Filter-Usage ] |
1072 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.66 |
× |
- |
[ ToS-Traffic-Class ] |
1014 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.15 |
× |
- |
[ Security-Parameter-Index ] |
1056 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.51 |
× |
- |
[ Flow-Label ] |
1057 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.52 |
× |
- |
[ Flow-Direction ] |
1080 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.65 |
× |
- |
*[ AVP ] |
- |
- |
- |
- |
- |
[ Flow-Status ] |
511 |
Enumerated |
3GPP TS 29.214 V8.3.0 clause 5.3.11 |
× |
- |
[ QoS-Information ] |
1016 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.16 |
√ |
2048 |
[ QoS-Class-Identifier ] |
1028 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.17 |
× |
- |
[ Max-Requested-Bandwidth-UL ] |
516 |
Unsigned32 |
3GPP TS 29.214 V8.3.0 clause 5.3.15 |
√ |
4 |
[ Max-Requested-Bandwidth-DL ] |
515 |
Unsigned32 |
3GPP TS 29.214 V8.3.0 clause 5.3.14 |
√ |
4 |
[ Guaranteed-Bitrate-UL ] |
1026 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.26 |
√ |
4 |
[ Guaranteed-Bitrate-DL ] |
1025 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.25 |
√ |
4 |
[ Bearer-Identifier ] |
1020 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.20 |
× |
- |
[ Allocation-Retention-Priority] |
1034 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.32 |
× |
- |
{Priority-Level} |
1046 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.45 |
× |
- |
[Pre-emption-Capability] |
1047 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.46 |
× |
- |
[Pre-emption-Vulnerability] |
1048 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.47 |
× |
- |
[ APN-Aggregate-Max-Bitrate-UL] |
1041 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.40 |
× |
- |
[ APN-Aggregate-Max-Bitrate-DL] |
1040 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.39 |
× |
- |
*[ AVP ] |
- |
- |
- |
- |
- |
[ Reporting-Level ] |
1011 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.12 |
× |
- |
[ AF-Charging-Identifier ] |
505 |
OctetString |
3GPP TS 29.214 V8.3.0 clause 5.3.6 |
× |
- |
*[ Flows ] |
510 |
Grouped |
3GPP TS 29.214 V8.3.0 clause 5.3.10 |
× |
- |
{ Media-Component-Number } |
518 |
Unsigned32 |
3GPP TS 29.214 V8.3.0 clause 5.3.17 |
× |
- |
*[ Flow-Number ] |
509 |
Unsigned32 |
3GPP TS 29.214 V8.3.0 clause 5.3.9 |
× |
- |
[ Final-Unit-Action ] |
449 |
Enumerated |
RFC 4006 clause 8.35 |
× |
- |
[ Monitoring-Key ] |
1066 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.59 |
√ |
32 |
[ AF-Signalling-Protocol ] |
529 |
Enumerated |
3GPP TS 29.214 V8.3.0 clause 5.3.26 |
× |
- |
[ X-HW-Service-Type ] |
2024 |
Enumerated |
HUAWEI private AVP |
√ |
4 |
[ X-HW-ACL-Group-Name ] |
2022 |
UTF8String |
HUAWEI private AVP |
√ |
31 |
[ X-HW-Interim-Interval ] |
2023 |
Unsigned32 |
HUAWEI private AVP |
√ |
4 |
*[ AVP ] |
- |
- |
- |
- |
- |
*[ Charging-Rule-Name ] |
1005 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.6 |
√ |
67 |
*[ AVP ] |
- |
- |
- |
- |
- |
[ Primary-Event-Charging-Function-Name ] |
619 |
DiameterURI |
3GPP TS 29.229 V8.6.0 clause 6.3.20 |
× |
- |
[ Secondary-Event-Charging-Function-Name ] |
620 |
DiameterURI |
3GPP TS 29.229 V8.6.0 clause 6.3.22 |
× |
- |
[ Primary-Charging-Collection-Function-Name ] |
621 |
DiameterURI |
3GPP TS 29.229 V8.6.0 clause 6.3.22 |
× |
- |
[ Secondary-Charging-Collection-Function-Name ] |
622 |
DiameterURI |
3GPP TS 29.229 V8.6.0 clause 6.3.23 |
× |
- |
*[ AVP] |
- |
- |
- |
- |
- |
*[ QoS-Information ] |
1016 |
Grouped |
3GPP TS 29.212 Va.6.0 clause 5.3.16 |
√ |
2048 |
[ QoS-Class-Identifier ] |
1028 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.17 |
× |
- |
[ Max-Requested-Bandwidth-UL ] |
516 |
Unsigned32 |
3GPP TS 29.214 V8.3.0 clause 5.3.15 |
√ |
4 |
[ Max-Requested-Bandwidth-DL ] |
515 |
Unsigned32 |
3GPP TS 29.214 V8.3.0 clause 5.3.14 |
√ |
4 |
[ Guaranteed-Bitrate-UL ] |
1026 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.26 |
√ |
4 |
[ Guaranteed-Bitrate-DL ] |
1025 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.25 |
√ |
4 |
[ Bearer-Identifier ] |
1020 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.20 |
× |
- |
[ Allocation-Retention-Priority] |
1034 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.32 |
× |
- |
{Priority-Level} |
1046 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.45 |
× |
- |
[Pre-emption-Capability] |
1047 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.46 |
× |
- |
[Pre-emption-Vulnerability] |
1048 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.47 |
× |
- |
[ APN-Aggregate-Max-Bitrate-UL] |
1041 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.40 |
× |
- |
[ APN-Aggregate-Max-Bitrate-DL] |
1040 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.39 |
× |
- |
*[ AVP ] |
- |
- |
- |
- |
- |
[ Default-EPS-Bearer-QoS ] |
1049 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.48 |
× |
- |
[ QoS-Class-Identifier ] |
1028 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.17 |
× |
- |
[ Allocation-Retention-Priority ] |
1034 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.32 |
× |
- |
{Priority-Level} |
1046 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.45 |
× |
- |
[Pre-emption-Capability] |
1047 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.46 |
× |
- |
[Pre-emption-Vulnerability] |
1048 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.47 |
× |
- |
*[ AVP ] |
- |
- |
- |
- |
- |
[ Bearer-Usage ] |
1000 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.1 |
× |
- |
[ 3GPP-User-Location-Info ] |
22 |
OctetString |
3GPP TS 29.061 V8.1.0 clause 16.4.7 |
× |
- |
*[ Usage-Monitoring-Information ] |
1067 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.60 |
√ |
2048 |
[ Monitoring-Key ] |
1066 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.59 |
√ |
32 |
[ Granted-Service-Unit ] |
431 |
Grouped |
RFC 4006 clause 8.17 |
√ |
2048 |
[ Tariff-Change-Usage ] |
451 |
Time |
RFC 4006 clause 8.2 |
× |
- |
[ CC-Time ] |
420 |
Unsigned32 |
RFC 4006 clause 8.21 |
√ |
4 |
[ CC-Money ] |
413 |
Grouped |
RFC 4006 clause 8.22 |
× |
- |
{ Unit-Value } |
445 |
Grouped |
RFC 4006 clause 8.8 |
× |
- |
{ Value-Digits } |
447 |
Integer64 |
RFC 4006 clause 8.1 |
× |
- |
[ Exponent ] |
429 |
Integer32 |
RFC 4006 clause 8.9 |
× |
- |
[ Currency-Code ] |
425 |
Unsigned32 |
RFC 4006 clause 8.11 |
× |
- |
[ CC-Total-Octets ] |
421 |
Unsigned64 |
RFC 4006 clause 8.23 |
√ |
8 |
[ CC-Input-Octets ] |
412 |
Unsigned64 |
RFC 4006 clause 8.24 |
× |
- |
[ CC-Output-Octets ] |
414 |
Unsigned64 |
RFC 4006 clause 8.25 |
× |
- |
[ CC-Service-Specific-Units ] |
417 |
Unsigned64 |
RFC 4006 clause 9.26 |
× |
- |
*[ AVP ] |
- |
- |
- |
- |
- |
[ Usage-Monitoring-Level ] |
1068 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.61 |
√ |
4 |
[ Usage-Monitoring-Report ] |
1069 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.62 |
√ |
4 |
[ Usage-Monitoring-Support ] |
1070 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.63 |
√ |
4 |
*[ AVP ] |
- |
- |
- |
- |
- |
*[ CSG-Information-Reporting ] |
1071 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.64 |
× |
- |
[ User-CSG-Information ] |
2319 |
Grouped |
3GPP TS 32.299 V12.6.0 |
× |
- |
[ Error-Message ] |
281 |
UTF8String |
RFC 3588 clause 7.3 |
× |
- |
*[ Failed-AVP ] |
279 |
Grouped |
RFC 3588 clause 7.5 |
× |
- |
1*{ AVP } |
- |
- |
- |
- |
- |
*[ Proxy-Info ] |
284 |
Grouped |
RFC 3588 clause 6.7.2 |
× |
- |
{ Proxy-Host } |
280 |
DiameterIdentity |
RFC 3588 clause 6.7.3 |
× |
- |
{ Proxy-State } |
33 |
OctetString |
RFC 3588 clause 6.7.4 |
× |
- |
*{ AVP } |
- |
- |
- |
- |
- |
*[ Route-Record ] |
268 |
Unsigned32 |
RFC 3588 clause 6.7.1 |
× |
- |
*[ AVP ] |
- |
- |
- |
- |
- |
Compliance Information of RAR Command
Message Format(AVP) |
AVP Code |
AVP Type |
Standard |
device Compliance |
Max length supported in device(Unit: Bytes) |
---|---|---|---|---|---|
<RA-Request> ::= < Diameter Header: 258, REQ, PXY > |
- |
- |
3GPP TS 29.212 V9.7.0 clause 5.6.4 |
√ |
- |
< Session-Id > |
263 |
UTF8String |
RFC 3588 clause 8.8 |
√ |
127+8+4 |
{ Auth-Application-Id } |
258 |
Unsigned32 |
RFC 3588 clause 6.8 |
√ |
4 |
{ Origin-Host } |
264 |
DiameterIdentity |
RFC 3588 clause 6.3 |
√ |
127 |
{ Origin-Realm } |
296 |
DiameterIdentity |
RFC 3588 clause 6.4 |
√ |
127 |
{ Destination-Realm } |
283 |
DiameterIdentity |
RFC 3588 clause 6.6 |
√ |
127 |
{ Destination-Host } |
293 |
DiameterIdentity |
RFC 3588 clause 6.5 |
√ |
127 |
{ Re-Auth-Request-Type } |
285 |
Enumerated |
RFC 3588 clause 8.12 |
× |
4 |
[ Session-Release-Cause ] |
1045 |
Enumerated |
3GPP TS 29.212 Vb.0.1 clause 5.3.44 |
× |
- |
[ Origin-State-Id ] |
278 |
Unsigned32 |
RFC 3588 clause 8.16 |
× |
- |
*[ Event-Trigger ] |
1006 |
Enumerated |
3GPP TS 29.212 V11.6.0 clause 5.3.7 |
√ |
4 |
[ Event-Report-Indication ] |
1033 |
Grouped |
3GPP TS 29.212 V11.6.0 clause 5.3.30 |
× |
- |
*[Event-Trigger] |
1006 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.7 |
× |
- |
*[CSG-Information-Reporting] |
1071 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.64 |
× |
- |
[RAT-Type] |
1032 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.31 |
× |
- |
[QoS-Information] |
1016 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.16 |
× |
- |
[ QoS-Class-Identifier ] |
1028 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.17 |
× |
- |
[ Max-Requested-Bandwidth-UL ] |
516 |
Unsigned32 |
3GPP TS 29.214 V8.3.0 clause 5.3.15 |
× |
- |
[ Max-Requested-Bandwidth-DL ] |
515 |
Unsigned32 |
3GPP TS 29.214 V8.3.0 clause 5.3.14 |
× |
- |
[ Guaranteed-Bitrate-UL ] |
1026 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.26 |
× |
- |
[ Guaranteed-Bitrate-DL ] |
1025 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.25 |
× |
- |
[ Bearer-Identifier ] |
1020 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.20 |
× |
- |
[ Allocation-Retention-Priority] |
1034 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.32 |
× |
- |
{Priority-Level} |
1046 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.45 |
× |
- |
[Pre-emption-Capability] |
1047 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.46 |
× |
- |
[Pre-emption-Vulnerability] |
1048 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.47 |
× |
- |
[ APN-Aggregate-Max-Bitrate-UL] |
1041 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.40 |
× |
- |
[ APN-Aggregate-Max-Bitrate-DL] |
1040 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.39 |
× |
- |
*[ AVP ] |
- |
- |
- |
- |
- |
[RAI] |
909 |
UTF8String |
3GPP TS 29.061 V8.1.0 clause 17.7.12 |
× |
- |
[3GPP-User-Location-Info] |
22 |
OctetString |
3GPP TS 29.061 V8.1.0 clause 16.4.7 |
× |
- |
[Trace-Data] |
1458 |
Grouped |
3GPP TS 29.272 |
× |
- |
[Trace-Reference] |
1459 |
OctetString |
3GPP TS 29.272 |
× |
- |
[3GPP2-BSID] |
9010 |
UTF8String |
3GPP2 X.S0057-0 |
× |
- |
[3GPP-MS-TimeZone] |
23 |
OctetString |
3GPP TS 29.061 clause 16.4.7 |
× |
- |
[3GPP-SGSN-Address] |
6 |
OctetString |
3GPP TS 29.061 clause 16.4.7 |
× |
- |
[3GPP-SGSN-IPv6-Address] |
15 |
OctetString |
3GPP TS 29.061 clause 16.4.7 |
× |
- |
*[ AVP ] |
- |
- |
- |
- |
- |
*[ Charging-Rule-Remove ] |
1002 |
Grouped |
3GPP TS 29.212 Va.6.0 clause 5.3.3 |
√ |
2048 |
*[ Charging-Rule-Name ] |
1005 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.6 |
√ |
67 |
*[ AVP ] |
- |
- |
- |
- |
- |
*[ Charging-Rule-Install ] |
1001 |
Grouped |
3GPP TS 29.212 Va.6.0 clause 5.3.2 |
√ |
- |
*[ Charging-Rule-Definition ] |
1003 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.4 |
√ |
2048 |
{ Charging-Rule-Name } |
1005 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.6 |
√ |
12 |
[ Service-Identifier ] |
439 |
Unsigned32 |
RFC 4006 clause 8.28 |
× |
- |
[ Rating-Group ] |
432 |
Unsigned32 |
RFC 4006 clause 8.29 |
× |
- |
*[ Flow-Information ] |
1058 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.53 |
× |
- |
[ Flow-Description ] |
507 |
IPFilterRule |
3GPP TS 29.214 V8.3.0 clause 5.3.8 |
× |
- |
[ Packet-Filter-Identifier ] |
1060 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.55 |
× |
- |
[ Packet-Filter-Usage ] |
1072 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.66 |
× |
- |
[ ToS-Traffic-Class ] |
1014 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.15 |
× |
- |
[ Security-Parameter-Index ] |
1056 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.51 |
× |
- |
[ Flow-Label ] |
1057 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.52 |
× |
- |
[ Flow-Direction ] |
1080 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.65 |
× |
- |
*[ AVP ] |
- |
- |
- |
- |
- |
[ Flow-Status ] |
511 |
Enumerated |
3GPP TS 29.214 V8.3.0 clause 5.3.11 |
× |
- |
[ QoS-Information ] |
1016 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.16 |
√ |
2048 |
[ QoS-Class-Identifier ] |
1028 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.17 |
× |
- |
[ Max-Requested-Bandwidth-UL ] |
516 |
Unsigned32 |
3GPP TS 29.214 V8.3.0 clause 5.3.15 |
√ |
4 |
[ Max-Requested-Bandwidth-DL ] |
515 |
Unsigned32 |
3GPP TS 29.214 V8.3.0 clause 5.3.14 |
√ |
4 |
[ Guaranteed-Bitrate-UL ] |
1026 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.26 |
√ |
4 |
[ Guaranteed-Bitrate-DL ] |
1025 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.25 |
√ |
4 |
[ Bearer-Identifier ] |
1020 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.20 |
× |
- |
[ Allocation-Retention-Priority] |
1034 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.32 |
× |
- |
{Priority-Level} |
1046 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.45 |
× |
- |
[Pre-emption-Capability] |
1047 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.46 |
× |
- |
[Pre-emption-Vulnerability] |
1048 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.47 |
× |
- |
[ APN-Aggregate-Max-Bitrate-UL] |
1041 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.40 |
× |
- |
[ APN-Aggregate-Max-Bitrate-DL] |
1040 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.39 |
× |
- |
*[ AVP ] |
- |
- |
- |
- |
- |
[ Reporting-Level ] |
1011 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.12 |
× |
- |
[ AF-Charging-Identifier ] |
505 |
OctetString |
3GPP TS 29.214 V8.3.0 clause 5.3.6 |
× |
- |
*[ Flows ] |
510 |
Grouped |
3GPP TS 29.214 V8.3.0 clause 5.3.10 |
× |
- |
{ Media-Component-Number } |
518 |
Unsigned32 |
3GPP TS 29.214 V8.3.0 clause 5.3.17 |
× |
- |
*[ Flow-Number ] |
509 |
Unsigned32 |
3GPP TS 29.214 V8.3.0 clause 5.3.9 |
× |
- |
[ Final-Unit-Action ] |
449 |
Enumerated |
RFC 4006 clause 8.35 |
× |
- |
[ Monitoring-Key ] |
1066 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.59 |
√ |
32 |
[ AF-Signalling-Protocol ] |
529 |
Enumerated |
3GPP TS 29.214 V8.3.0 clause 5.3.26 |
× |
- |
*[ Flow-Description ] |
507 |
IPFilterRule |
3GPP TS 29.214 V8.3.0 clause 5.3.8 |
× |
- |
[ X-HW-Service-Type ] |
2024 |
Enumerated |
HUAWEI private AVP |
√ |
4 |
[ X-HW-ACL-Group-Name ] |
2022 |
UTF8String |
HUAWEI private AVP |
√ |
31 |
[ X-HW-Interim-Interval ] |
2023 |
Unsigned32 |
HUAWEI private AVP |
√ |
4 |
*[ AVP ] |
- |
- |
- |
- |
- |
*[ Charging-Rule-Name ] |
1005 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.6 |
√ |
67 |
*[ AVP ] |
- |
- |
- |
- |
- |
[ Default-EPS-Bearer-QoS ] |
1049 |
Grouped |
3GPP TS 29.212 Va.6.0 clause 5.3.48 |
× |
- |
[ QoS-Class-Identifier ] |
1028 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.17 |
× |
- |
[ Allocation-Retention-Priority ] |
1034 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.32 |
× |
- |
{Priority-Level} |
1046 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.45 |
× |
- |
[Pre-emption-Capability] |
1047 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.46 |
× |
- |
[Pre-emption-Vulnerability] |
1048 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.47 |
× |
- |
*[ AVP ] |
- |
- |
- |
- |
- |
*[ QoS-Information ] |
1016 |
Grouped |
3GPP TS 29.212 Va.6.0 clause 5.3.16 |
√ |
2048 |
[ QoS-Class-Identifier ] |
1028 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.17 |
× |
- |
[ Max-Requested-Bandwidth-UL ] |
516 |
Unsigned32 |
3GPP TS 29.214 V8.3.0 clause 5.3.15 |
√ |
4 |
[ Max-Requested-Bandwidth-DL ] |
515 |
Unsigned32 |
3GPP TS 29.214 V8.3.0 clause 5.3.14 |
√ |
4 |
[ Guaranteed-Bitrate-UL ] |
1026 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.26 |
√ |
4 |
[ Guaranteed-Bitrate-DL ] |
1025 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.25 |
√ |
4 |
[ Bearer-Identifier ] |
1020 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.20 |
× |
- |
[ Allocation-Retention-Priority] |
1034 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.32 |
× |
- |
{Priority-Level} |
1046 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.45 |
× |
- |
[Pre-emption-Capability] |
1047 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.46 |
× |
- |
[Pre-emption-Vulnerability] |
1048 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.47 |
× |
- |
[ APN-Aggregate-Max-Bitrate-UL] |
1041 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.40 |
× |
- |
[ APN-Aggregate-Max-Bitrate-DL] |
1040 |
Unsigned32 |
3GPP TS 29.212 V9.7.0 clause 5.3.39 |
× |
- |
*[ AVP ] |
- |
- |
- |
- |
- |
*[ Usage-Monitoring-Information ] |
1067 |
Grouped |
3GPP TS 29.212 Va.6.0 clause 5.3.60 |
√ |
2048 |
[ Monitoring-Key ] |
1066 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.59 |
√ |
4 |
[ Granted-Service-Unit ] |
431 |
Grouped |
RFC 4006 clause 8.17 |
√ |
2048 |
[ Tariff-Change-Usage ] |
451 |
Time |
RFC 4006 clause 8.2 |
× |
- |
[ CC-Time ] |
420 |
Unsigned32 |
RFC 4006 clause 8.21 |
√ |
4 |
[ CC-Money ] |
413 |
Grouped |
RFC 4006 clause 8.22 |
× |
- |
{ Unit-Value } |
445 |
Grouped |
RFC 4006 clause 8.8 |
× |
- |
{ Value-Digits } |
447 |
Integer64 |
RFC 4006 clause 8.1 |
× |
- |
[ Exponent ] |
429 |
Integer32 |
RFC 4006 clause 8.9 |
× |
- |
[ Currency-Code ] |
425 |
Unsigned32 |
RFC 4006 clause 8.11 |
× |
- |
[ CC-Total-Octets ] |
421 |
Unsigned64 |
RFC 4006 clause 8.23 |
√ |
8 |
[ CC-Input-Octets ] |
412 |
Unsigned64 |
RFC 4006 clause 8.24 |
× |
- |
[ CC-Output-Octets ] |
414 |
Unsigned64 |
RFC 4006 clause 8.25 |
× |
- |
[ CC-Service-Specific-Units ] |
417 |
Unsigned64 |
RFC 4006 clause 9.26 |
× |
- |
*[ AVP ] |
- |
- |
- |
- |
- |
[ Usage-Monitoring-Level ] |
1068 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.61 |
√ |
4 |
[ Usage-Monitoring-Report ] |
1069 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.62 |
√ |
4 |
[ Usage-Monitoring-Support ] |
1070 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.63 |
√ |
4 |
*[ AVP ] |
- |
- |
- |
- |
- |
*[ Proxy-Info ] |
284 |
Grouped |
RFC 3588 clause 6.7.2 |
× |
- |
{ Proxy-Host } |
280 |
DiameterIdentity |
RFC 3588 clause 6.7.3 |
× |
- |
{ Proxy-State } |
33 |
OctetString |
RFC 3588 clause 6.7.4 |
× |
- |
*{ AVP } |
- |
- |
- |
- |
- |
*[ Route-Record ] |
268 |
Unsigned32 |
RFC 3588 clause 6.7.1 |
× |
- |
*[ AVP] |
- |
- |
- |
- |
- |
Compliance Information of RAA Command
Message Format(AVP) |
AVP Code |
AVP Type |
Standard |
device Compliance |
Max length supported in device(Unit: Bytes) |
---|---|---|---|---|---|
<RA-Answer> ::= < Diameter Header: 258, PXY > |
- | - | 3GPP TS 29.212 V9.7.0 clause 5.6.5 |
√ | - |
< Session-Id > |
263 |
UTF8String |
RFC 3588 clause 6.8 |
√ | 127+8+4 |
{ Auth-Application-Id } |
258 |
Unsigned32 |
RFC 3588 clause 6.8 |
√ | 4 |
{ Origin-Host } |
264 |
DiameterIdentity |
RFC 3588 clause 6.8 |
√ | 127 |
{ Origin-Realm } |
296 |
DiameterIdentity |
RFC 3588 clause 6.3 |
√ | 127 |
[ Result-Code ] |
268 |
Unsigned32 |
RFC 3588 clause 7.1 |
√ | 4 |
[ Experimental-Result ] |
297 |
Grouped |
RFC 3588 clause 7.6 |
√ | 2048 |
{ Vendor-Id } |
266 |
Unsigned32 |
RFC 3588 clause 5.3.3 |
√ | 4 |
{ Experimental-Result-Code } |
298 |
Unsigned32 |
RFC 3588 clause 7.7 |
√ | 4 |
[ Origin-State-Id ] |
278 |
Unsigned32 |
RFC 3588 clause 8.16 |
× | - |
[ IP-CAN-Type ] |
1027 |
Enumerated |
3GPP TS 29.212 Va.6.0 clause 5.3.27 |
× | - |
[ RAT-Type ] |
1032 |
Enumerated |
3GPP TS 29.212 Va.6.0 clause 5.3.31 |
× | - |
0*2[ AN-GW-Address ] |
1050 |
Address |
3GPP TS 29.212 Va.6.0 clause 5.3.49 |
× | - |
[ 3GPP-SGSN-MCC-MNC ] |
18 |
UTF8String |
3GPP TS 29.061 V8.1.0 clause 16.4.7 |
× | - |
[ 3GPP-SGSN-Address ] |
6 |
OctetString |
3GPP TS 29.061 V8.1.0 clause 16.4.7 |
× | - |
[ 3GPP-SGSN-IPv6-Address ] |
15 |
OctetString |
3GPP TS 29.061 V8.1.0 clause 16.4.7 |
× | - |
[ RAI ] |
909 |
UTF8String |
3GPP TS 29.061 V8.1.0 clause 17.7.12 |
× | - |
[ 3GPP-User-Location-Info ] |
22 |
OctetString |
3GPP TS 29.061 V8.1.0 clause 16.4.7 |
× | - |
[ 3GPP-MS-TimeZone ] |
23 |
OctetString |
3GPP TS 29.061 V8.1.0 clause 16.4.7 |
× | - |
*[ Charging-Rule-Report] |
1018 |
Grouped |
3GPP TS 29.212 Va.6.0 clause 5.3.18 |
√ | 2048 |
*[ Charging-Rule-Name ] |
1005 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.6 |
√ | 67 |
[ PCC-Rule-Status ] |
1019 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.19 |
√ | 4 |
[ Rule-Failure-Code ] |
1031 |
Enumerated |
3GPP TS 29.212 V9.7.0 clause 5.3.38 |
√ | 4 |
[ Final-Unit-Indication ] |
430 |
Grouped |
RFC 4006 clause 8.34 |
× | - |
{ Final-Unit-Action } |
449 |
Enumerated |
RFC 4006 clause 8.35 |
× | - |
*[ Restriction-Filter-Rule ] |
438 |
IPFilterRule |
RFC 4006 clause 8.36 |
× | - |
*[ Filter-Id ] |
11 |
UTF8String |
RFC 4005 clause 6.7 |
× | - |
*[ AVP ] |
- | - | - | - | - |
*[ AVP ] |
- | - | - | - | - |
[ Access-Network-Charging-Address ] |
501 |
Address |
3GPP TS 29.214 V8.3.0 clause 5.3.2 |
× | - |
*[ Access-Network-Charging-Identifier-Gx ] |
1022 |
Grouped |
3GPP TS 29.212 V9.7.0 clause 5.3.22 |
× | - |
{ Access-Network-Charging-Identifier-Value} |
503 |
OctetString |
3GPP TS 29.214 V8.3.0 clause 5.3.4 |
× | - |
*[ Charging-Rule-Name ] |
1005 |
OctetString |
3GPP TS 29.212 V9.7.0 clause 5.3.6 |
× | - |
[ Error-Message ] |
281 |
UTF8String |
RFC 3588 clause 7.3 |
× | - |
*[ Failed-AVP ] |
279 |
Grouped |
RFC 3588 clause 7.5 |
× | - |
1*{ AVP } |
- | - | - | - | - |
*[ Proxy-Info ] |
284 |
Grouped |
RFC 3588 clause 6.7.2 |
× | - |
{ Proxy-Host } |
280 |
DiameterIdentity |
RFC 3588 clause 6.7.3 |
× | - |
{ Proxy-State } |
33 |
OctetString |
RFC 3588 clause 6.7.4 |
× | - |
*{ AVP } |
- | - | - | - | - |
*[ AVP ] |
- | - | - | - | - |
Standard Compliance of ASR Messages
Message Format (AVP) |
AVP Code |
AVP Type |
Standard |
device Compliance |
Maximum Length Supported by the device (Bytes) |
---|---|---|---|---|---|
<ASR> ::= < Diameter Header: 274, REQ, PXY > |
- | - | Section 8.5.1 in RFC 3588 |
√ | - |
< Session-Id > |
263 |
UTF8String |
Section 8.8 in RFC 3588 |
√ | 127+8+4 |
{ Origin-Host } |
264 |
DiameterIdentity |
Section 6.3 in RFC 3588 |
√ | 127 |
{ Origin-Realm } |
296 |
DiameterIdentity |
Section 6.4 in RFC 3588 |
√ | 127 |
{ Destination-Realm } |
283 |
DiameterIdentity |
Section 6.6 in RFC 3588 |
√ | 127 |
{ Destination-Host } |
293 |
DiameterIdentity |
Section 6.5 in RFC 3588 |
√ | 127 |
{ Auth-Application-Id } |
258 |
Unsigned32 |
Section 6.8 in RFC 3588 |
√ | 4 |
[ User-Name ] |
1 |
UTF8String |
Section 8.14 in RFC 3588 |
x | - |
[ Origin-State-Id ] |
278 |
Unsigned32 |
Section 8.16 in RFC 3588 |
x | - |
*[ Proxy-Info ] |
284 |
Grouped |
Section 6.7.2 in RFC 3588 |
x | - |
{ Proxy-Host } |
280 |
DiameterIdentity |
Section 6.7.3 in RFC 3588 |
x | - |
{ Proxy-State } |
33 |
OctetString |
Section 6.7.4 in RFC 3588 |
x | - |
*{ AVP } |
- | - | - | - | - |
*[ Route-Record ] |
268 |
Unsigned32 |
Section 6.7.1 in RFC 3588 |
x | - |
*[ AVP] |
- | - | - | - | - |
Standard Compliance of ASA Messages
Message Format (AVP) |
AVP Code |
AVP Type |
Standard |
device Compliance |
Maximum Length Supported by the device (Bytes) |
---|---|---|---|---|---|
<ASA> ::= < Diameter Header: 274, PXY > |
- |
- |
Section 8.5.2 in RFC 3588 |
√ |
- |
< Session-Id > |
263 |
UTF8String |
Section 6.8 in RFC 3588 |
√ |
127+8+4 |
{ Result-Code } |
268 |
Unsigned32 |
Section 7.1 in RFC 3588 |
√ |
4 |
{ Origin-Host } |
264 |
DiameterIdentity |
Section 6.8 in RFC 3588 |
√ |
127 |
{ Origin-Realm } |
296 |
DiameterIdentity |
Section 6.3 in RFC 3588 |
√ |
127 |
[ User-Name ] |
1 |
UTF8String |
Section 8.14 in RFC 3588 |
x |
- |
[ Origin-State-Id ] |
278 |
Unsigned32 |
Section 8.16 in RFC 3588 |
x |
- |
[ Error-Message] |
281 |
UTF8String |
Section 7.3 in RFC 3588 |
x |
- |
[ Error-Reporting-Host ] |
294 |
DiameterIdentity |
Section 7.4 in RFC 3588 |
x |
- |
* [ Failed-AVP ] |
279 |
Grouped |
Section 7.5 in RFC 3588 |
x |
- |
*{ AVP } |
- |
- |
- |
- |
- |
*[ Redirect-Host ] |
- |
- |
Section 6.12 in RFC 3588 |
x |
- |
[ Redirect-Host-Usage ] |
261 |
Enumerated |
Section 6.13 in RFC 3588 |
x |
- |
[ Redirect-Max-Cache-Time ] |
262 |
Unsigned32 |
Section 6.14 in RFC 3588 |
x |
- |
*[ Proxy-Info ] |
284 |
Grouped |
Section 6.7.2 in RFC 3588 |
x |
- |
{ Proxy-Host } |
280 |
DiameterIdentity |
Section 6.7.3 in RFC 3588 |
x |
- |
{ Proxy-State } |
33 |
OctetString |
Section 6.7.4 in RFC 3588 |
x |
- |
*{ AVP } |
- |
- |
- |
- |
- |
*[ AVP] |
- |
- |
- |
- |
- |
- About This Document
- Description of the Gx Interface
- Description of the Gx Interface Messages
- Description of Associated AVPs
- AVP Format Convention
- Auth-Application-Id AVP
- CC-Output-Octets AVP
- CC-Request-Number AVP
- CC-Request-Type AVP
- CC-Time AVP
- CC-Total-Octets AVP
- Charging-Rule-Definition AVP
- Charging-Rule-Install AVP
- Charging-Rule-Name AVP
- Charging-Rule-Remove AVP
- Charging-Rule-Report AVP
- Destination-Host AVP
- Destination-Realm AVP
- Error-Message AVP
- Experimental-Result AVP
- Experimental-Result-Code AVP
- Event-Trigger AVP
- Feature-List AVP
- Feature-List-ID AVP
- Framed-IP-Address AVP
- Framed-IPv6-Prefix AVP
- Granted-Service-Unit AVP
- Guaranteed-Bitrate-DL AVP
- Guaranteed-Bitrate-UL AVP
- IP-CAN-Type AVP
- Max-Requested-Bandwidth-DL AVP
- Max-Requested-Bandwidth-UL AVP
- Monitoring-Key AVP
- Origin-Host AVP
- Origin-Realm AVP
- Origin-State-Id
- PCC-Rule-Status AVP
- QoS-Information AVP
- Re-Auth-Request-Type AVP
- Result-Code AVP
- Rule-Failure-Code AVP
- Session-Id AVP
- Session-Release-Cause AVP
- Subscription-Id AVP
- Subscription-Id-Data AVP
- Subscription-Id-Type AVP
- Supported-Features AVP
- Termination-Cause
- Usage-Monitoring-Information AVP
- Usage-Monitoring-Level AVP
- Usage-Monitoring-Report AVP
- User-Equipment-Info AVP
- User-Equipment-Info-Type AVP
- User-Equipment-Info-Value AVP
- Used-Service-Unit AVP
- Vendor-Id AVP
- Vendor-Specific-Application-Id AVP
- X-HW-User-Physical-Info-Value AVP
- X-HW-MS-Group-Name AVP
- X-HW-ACL-Group-Name AVP
- X-HW-Interim-Interval AVP
- X-HW-Service-Type AVP
- Synchronization Conventions for Message Processing
- Error Code of the Gx Interface
- Compliance Information for Standards