|Glossary of Terms and Acronyms Introduction|Terms|A-E|F-K|L-P|Q-T|U-Z|Glossary|$|1|2|2.1|2.2|2.3|2.4|2.5|3|
|$|
|Introduction|License Texts|BSD 2-clause License|BSD 3-clause License|BSD 4-clause License|Public Domain|Apache License Version 2.0|MIT License|Boost Software License 1.0, BSD like|GPL Version 2|LGPL Version 2.1|LGPL Version 3|GNU AFFERO GENERAL PUBLIC LICENSE version 3|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|2.10|2.11|
|Introduction|Document Purpose and Scope|Tools|forall|immHelper|amfHelper|sapcHealthCheck|auto_provisioning|Troubleshooting Functions|Linux Consoles|Internal Database Command Line Tools|COM CLI|System Health Check|Processor Load (CPU and Memory)|Alarms and Notifications|Logging|Measurements|Core Files|System Messages|SAPC Reboot|Processor Lock and Unlock|Troubleshooting Procedure|Common Faulty Situations|General Failures|Provisioning Failures|Failures during the Initial Configuration and Provisioning in Cloud|Fair Usage Reporting Failures|Multi-access Failures|End User Notifications Failures|External Database Failures|SOAP Notification Interface Failures|SC absence feature|$|1|1.1|2|2.1|2.2|2.3|2.4|2.5|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|3.10|3.11|3.12|4|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|5.9|
|Introduction|Tools|Maintenance Intervals|Maintenance Procedures|Check Active Alarms|Check the SAPC Status|Check High Availability State of a System Controller|Check PMF Measures|Check Core Files|Check CPU Load and Memory Usage|Check IMM Persistent Back End|Check Disk Space|Make System Data Backup|$|1|1.1|2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|
|Overview|Description|Prerequisites|Procedure|Creating SCTP Layer|Configuring SCTP|Recommended SS7 Parameters|SCTP Managed Object|SCTP End Point Profile Managed Object|Estimations of Userdata Transmit Buffer Size and Threshold of Userdata Transmit Buffer Size|Glossary|Reference List|$|1|1.1|1.2|2|2.1|2.2|3|3.1|3.2|3.3|4|5|
|Introduction|Alarm Description|Prerequisites|Procedure|Analyzing Alarm|Actions for Installation|Actions for Renewal|Actions for Repairing Automatic Configuration|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Prerequisites|Procedure|Cipher Filter String Format|$|1|1.1|2|3|
|Introduction|Prerequisites|Procedure|System Controller Blades|Payload Blades|Glossary|$|1|1.1|2|2.1|2.2|3|
|Introduction|Measurement Report File|File Location|Filename Format|Time Format|File Format|Supported XML Elements and Attributes|Example File|Example File in UTC Format|$|1|2|2.1|2.2|2.3|2.4|3|4|5|
|Fair Usage Function|Fair Usage Overview|Fair Usage Control Options|Usage Limits Types|Fair Usage Control Granularity|Fair Usage Control Subscriptions Types|Usage Control at Subscriber or shared dataplan Level|Usage Limits Split in Intervals|Accumulate Usage Depending on Conditions|Usage Accumulators Life Cycle|Actions When Limit is Reached|Multiple Services Offering|Shared Subscriber Plans Support|Shared Devices Plans Support|Fair Usage Control Procedure|Usage Update|Selection of Reporting Groups|Quota Calculation|Session Reauthorization|Access to Usage Information|Integration with an External Database|Fair Usage Network Deployment|Fair Usage Traffic Cases|Basic Traffic Case|Protocol Binding for Rel9 Gx onwards|Update subscriber profile|Update Usage Limits|Removal of Volume Limit|Subscription Temporary Extension|Update any subscriber data or subscriber qualification data|Conditional Accumulation Traffic Cases|Conditional Accumulation with Multiple IP-CAN Sessions|Accumulation based on time conditions and Bearer QoS change|Volume Usage at Reporting Group Level|Protocol Binding Rel 9 Gx|Time Usage Control|Protocol Binding Rel9 Gx onwards|Multiple Services Offering|Basic Turbo Button Traffic Case Based on Temporary Subscriber Groups|Advanced Turbo Button Traffic Case with Dynamic Group Selection Based on Usage Conditions|Multiple Packages Traffic Case|Shared Subscriber Plans|Prepaid and Postpaid Shared Subscriber Plans|Combination of individual and shared dataplan for a subscriber|Shared Devices Plans|Multi-SIM Data Plan with Shared Limit|Multi-SIM Data Plan with Device Limits|Interaction with External Database|Fair Usage Profile in External Database, Usage Accumulator in the SAPC Internal Database|Subscriber Information and Usage Accumulator in External Database|Reference List|$|1|1.1|1.2|1.2.1|1.2.2|1.2.3|1.2.4|1.2.5|1.3|1.4|1.5|1.6|1.7|1.8|1.9|1.9.1|1.9.2|1.9.3|1.9.4|1.10|1.11|2|3|3.1|3.1.1|3.2|3.2.1|3.2.2|3.2.3|3.2.4|3.3|3.3.1|3.3.2|3.4|3.4.1|3.5|3.5.1|3.6|3.6.1|3.6.2|3.6.3|3.7|3.7.1|3.7.2|3.8|3.8.1|3.8.2|3.9|3.9.1|3.9.2|4|
|Introduction|Functions and Concepts|Types of Operation|Managed Object Model|Configuration Management|$|1|2|2.1|3|4|
|Introduction|Notification Description|Notification Attributes|Procedure|$|1|2|2.1|3|
|Introduction|Notification Description|$|1|2|
|Introduction|Event Description|Information|Usage|Configuration|Subscription|$|1|2|2.1|2.2|2.3|2.4|
|Introduction|Document Purpose and Scope|Target Audience|SAPC Overview|Network Overview|Internal Network|VIP Networks|External Networks|SysMGMT Network|Traffic Flows|Incoming Traffic|Outgoing Traffic|Security|$|1|1.1|1.2|2|3|3.1|3.2|3.3|3.4|4|4.1|4.2|5|
|$|
|Introduction|Typographic Conventions|General|SS7 CAF in CBA Environment|SS7 Stack System Overview|Control of SS7 CAF Component|Control of Processes within the SS7 CAF Component|SS7 CAF Packages|Backup and Restore operations|SS7 CAF and BRF|SS7 CAF and Scaling Operations|Scale-Out|Scale-In|Error Handling|SS7 CAF Configuration Interfaces|Signaling Manager|Configuring SS7 CAF|Defining New SS7 CAF Configuration|Multiple SCTP Processes per Blade|SCTP Only stack|SS7 CAF Configuration for Scaling Operations|Setup Parameters|ECM Active Host|Usage of IPv6|CP trace and logging facilities|ECM logging|SCTP Distributed End Points|eVIP Address as Common Parts Manager Address|LDE MIP Address as Common Parts Manager Address|NTF Alarms Configuration|General Configuration Recommendations|Save SS7 CAF Configuration|Generate (Export) SS7 CAF Configuration Files|Setting parameters for large eVIP configuration|SS7 CAF Performance Management|Network Examples|Software Development Kit|SDK Installation|SS7 CAF Troubleshooting|Reference List|$|1|1.1|2|2.1|2.2|2.3|2.4|2.5|3|3.1|4|4.1|4.2|4.3|5|5.1|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|6.8|6.9|6.10|6.11|6.12|6.13|6.14|6.15|6.16|6.17|7|8|9|9.1|10|11|
|Introduction|General|Starting the CLI|The User Interface|Shell Features|CLI Naming Conventions|Modifying MO Key Attributes|The Help System|Modes of Operation|Standards in Signaling Manager|File Versions in Signaling Manager|Common Use Cases|Creating Configuration|Activating Configuration|Process Handling|Monitoring|Migrating CLI Commands|Step-by-step Example|Reference List|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|3|3.1|3.2|3.3|3.4|3.5|4|5|
|Introduction|CPI Library Types|Document Formats|Active Library Explorer Variants|Active Library Explorer Functions|Active Library Explorer Window|Frames|Library Collections|Active Library Explorer Toolbar|Context Menu|Basic Functions|Back and Forward|Search|Document View Search Syntax|Instant Document Search|Advanced Search Options|Search Library Collections|Change Sort Order|Show All Titles and Show Context|Next Search Hit|Search in Document Frame|PDF and Excel Document Searches|Navigation|Library Front Page Images|Filter Displayed Contents|Set Filters|Hide Filter Library Contents|Reset Filters|Add Bookmarks|Copy Links to Clipboard|Copy Links to Clipboard in Microsoft Internet Explorer|Copy Links to Clipboard in Other Web Browser|Create and Display Annotations|Provide Feedback|Add Note|Edit Note|Delete Note|Print|Save Document to Local Disk|View PDF Version of Current Document|Open a Document in Separate Window|Get Help|Find Active Library Explorer Version|Active Library Explorer Server|Active Library Explorer for Windows|Download Latest Active Library Explorer Version|Access Active Library Explorer Libraries Using URL Hyperlinks|Internet Address and Parameters|Open Libraries|Search for Documents|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.2.1|3.2.2|3.2.3|3.2.4|3.2.5|3.2.6|3.2.7|3.2.8|3.2.9|3.3|3.4|3.5|3.5.1|3.5.2|3.5.3|3.6|3.7|3.7.1|3.7.2|3.8|3.9|3.9.1|3.9.2|3.9.3|3.10|3.11|3.12|3.13|4|5|5.1|5.2|5.3|6|6.1|6.2|6.3|
|Introduction|Document Purpose and Scope|Concepts|Measures|Gx Protocol Measures|Rx Protocol Measures|Sy Protocol Measures|Smp Protocol Measures|Fair Usage Control Measures|Notification Measures|Capacity Measures|Resources Measures|External Database Measures|Optional Measures|REST Provisioning Measures|Other Measures|Configuration|Managing Measurement Collection|Managing Threshold Monitoring|Performance Measurement Reports|Glossary|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|2.10|2.11|2.12|3|3.1|3.2|4|5|
|General|Introduction|Terms|Concept|Compliance Lists|IETF - Stream Control Transmission Protocol|Notes|Reference List|$|1|1.1|1.2|1.3|2|2.1|3|4|
|Purpose and scope|References and Terminology|Technical Report Impact|Business Requirements for Policy|Session-Based Policies|Wholesale Sessions|Application Admission Control|Session Resource Request initiation sources|Bandwidth|QoS|Security|IPv6 Support|Network Threat Detection|Multicast|Routing|Auditing, Service monitoring and Accounting|Charging|Deep Packet Inspection|Use Cases|Functional Architecture elements|BPC Framework Functional Architecture|Policy Enforcement Point (PEP)|Policy Decision Point (PDP)|Admission Control Function|Repository Function|Security Proxy/Gateway function|Application Function (AF)|AAA Server Function|BPC Framework Policy Control Framework Interfaces|BPC Framework PCF Deployment Functional Architecture Mapping onto TR-101 Functional Architecture|Informative AAA implementation examples|Informative PEP/PDP implementation examples|Policy Information Flows|Information Flow Objectives|Annex I (Informative). Relationship to other Broadband Techinical Reports|Annex II (Informative). Relationships with other Policy Control Standards|Annex III (Informative). Policy Information Objects Definitions|Reference List|$|1|2|3|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|4.8|4.9|4.10|4.11|4.12|4.13|4.14|5|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|6.8|6.9|6.10|6.11|6.12|7|7.1|8|9|10|11|
|$|
|System Administration Overview|Administration Interfaces and Tools|Interfaces|Tools|Configuration and Provisioning Overview|Configuration through COM|Performance Measures Management|Fault Management|Logging Management|Security Management|Startup and Shutdown|SAPC Restart|SAPC Stop|SAPC Start|Processor Restart|Directory Structure|Reference List|$|1|2|2.1|2.2|3|3.1|4|5|6|7|8|8.1|8.2|8.3|8.4|9|10|
|Introduction|Document Purpose and Scope|Disclaimer Note|Revision Information|Overview|Reference Architectures|3GPP Policy and Charging Control (PCC) Architecture|Broadband Forum (BBF) Broadband Policy Control Framework Architecture|3GPP and BBF Policy Convergence for Fixed Broadband and Mobile Broadband|ETSI Network Functions Virtualization (NFV) Framework|Naming Conventions|Solutions|SAPC in Ericsson Virtual Evolved Packet Core (Virtual EPC)|SAPC in Ericsson IMS|SAPC in Ericsson Wi-Fi Calling|SAPC in Ericsson Integrated Policy and Charging|SAPC in Ericsson SDN|Functions|Policy Management for Mobile, Fix, and Convergent Networks (Gx-based)|Policy Management for Wi-Fi Access|Subscription Management|Dynamic Policy Control|Integrated Policy and Charging - Policy Control Based on Spending Limits|Mobility Based Policy|External SPR Support|Time-Based Authorizations|Notifications to End-Subscribers or to External Systems|Reauthorization Upon Subscription Change|IP Geographical Redundancy|Flexible Output Protocol|Policy Studio|Fair Usage Policies|Other Supported Functions|Interfaces|Reference Model|Statement of Compliance|SW Architecture|Operation and Maintenance|Middleware|Provisioning|Node Configuration|Fault Management|Performance Management|Logging|Backup and Restore|Troubleshooting|License Management|Installation and Deployment|PNF Deployment|VNF Deployment|Glossary|Reference List|$|1|1.1|1.2|1.3|2|3|3.1|3.2|3.3|3.4|3.5|4|4.1|4.2|4.3|4.4|4.5|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|5.9|5.10|5.11|5.12|5.13|5.14|5.15|6|6.1|6.2|7|8|8.1|8.2|8.3|8.4|8.5|8.6|8.7|8.8|8.9|9|9.1|9.2|10|11|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|SSH Algorithm Format|$|1|1.1|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Smp Interface Overview|Document Content Conventions|Smp Message Exchange|Diameter Base Protocol Messages|Smp Capability Negotiation|Device Watchdog|Disconnect Peer|Smp Interface Messages Format|Smp Credit-Control-Request (CCR)|Smp Credit-Control-Answer (CCA)|Smp Interface AVPs|MIP6-Agent-Info AVP|Smp Error Handling|Smp Protocol Errors|Smp Application Errors|Reference List|$|1|1.1|2|3|3.1|3.2|3.3|4|4.1|4.2|5|5.1|6|6.1|6.2|7|
|Scope|References|Definitions and abbreviations|Definitions|Abbreviations|Signalling Flows over Gx, Gxx, Rx,Sd, Sy and S9|IP-CAN Session Establishment|IP-CAN Session Termination|IP-CAN Session Modification|Gateway Control Session Procedures|Multiple BBERF Signalling Flows|Application Detection and Enforcement Procedures|Spending limits Procedures over Sy reference point|Binding Mechanism|Overview|Session Binding|PCC Rule Authorization and QoS Rule Generation|Bearer Binding|QoS Parameters Mapping|Overview|QoS parameter mapping Functions at AF|QoS parameter mapping Functions at PCRF|QoS parameter mapping Functions at PCEF|QoS parameter mapping Functions at UE for a UE-initiated GPRS PDP Context|PCRF addressing|General|DRA Definition|DRA Procedures|DRA flows|Diameter race condition handling|Overview|Procedures for Gx, Gxx, Sd and S9|Annex A (Informative) Examples of deriving the Maximum Authorized parameters from the SDP parameters|Annex B (normative) Signalling Flows for IMS|B.0 General|B.1 Subscription to Notification of Signalling Path Status at IMS Registration|B.1a. Subscription to Notification of Change of IP-CAN Type at IMS Registration|B.1b Provisioning of SIP signalling flow information at IMS Registration|B.2 IMS Session Establishment|B.3 IMS Session Modification|B.4 IMS Session Termination|B.5P-CSCF Restoration|Annex C (normative) NAT Related Procedures|C.1 Support for media traversal of NATs using ICE|C.2 P-CSCF procedures|C.3 PCRF procedures|C.4P_CSCF procedures to support media traversal through hosted NAT without ICE|Annex D (normative) Access specific procedures for GPRS|Annex E(normative) Fixed Broadband Access Interworking with EPC|E.1 General|E.2 Definitions and abbreviations|E.3 Binding Mechanisms|E.4 PCC Procedures|E.4.1Introduction|E.4.2IP-CAN Session Establishment|E.4.3IP-CAN Session Termination|E.4.4IP-CAN Session Modification|E.5 3GPP HNB Procedures  CS Support|E.5.1S9a CS Session Establishment|E.5.2S9a CS Session Modification|E.5.3S9a CS Session Termination|E.6 PCRF Addressing|E.7 BPCF Addressing|E.8Session Linking Function|Annex F (normative): Access specific aspects, Fixed Broadband Access network convergence|Annex G (normative): Diameter overload control mechanism|Annex H (normative): Access specific procedures for 3GPP EPS|Reference List|$|1|2|3|3.1|3.2|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|5|5.1|5.2|5.3|5.4|6|6.1|6.2|6.3|6.4|6.5|7|7.1|7.2|7.3|7.4|8|8.1|8.2|9|10|10.1|10.2|10.3|10.4|10.5|10.6|10.7|10.8|11|11.1|11.2|11.3|11.4|12|13|13.1|13.2|13.3|14|14.1|14.2|14.3|14.4|15|15.1|15.2|15.3|16|17|18|19|20|21|22|
|Scope|References|Definitions and abbreviations|Definitions|Abbreviations|Signalling Flows over Gx, Gxx, Rx,Sd, Sy and S9|IP-CAN Session Establishment|IP-CAN Session Termination|IP-CAN Session Modification|Gateway Control Session Procedures|Multiple BBERF Signalling Flows|Application Detection and Enforcement Procedures|Spending limits Procedures over Sy reference point|Call flows for User Plane Congestion Management|Traffic Steering Control Procedures over St reference point|Negotiation for future background data transfer procedure over Nt reference point|Binding Mechanism|Overview|Session Binding|PCC Rule Authorization and QoS Rule Generation|Bearer Binding|QoS Parameters Mapping|Overview|QoS parameter mapping Functions at AF|QoS parameter mapping Functions at PCRF|QoS parameter mapping Functions at PCEF|QoS parameter mapping Functions at UE for a UE-initiated GPRS PDP Context|PCRF addressing|General|DRA Definition|DRA Procedures|DRA flows|Diameter race condition handling|Overview|Procedures for Gx, Gxx, Sd and S9|Annex A (Informative) Examples of deriving the Maximum Authorized parameters from the SDP parameters|Annex B (normative) Signalling Flows for IMS|B.0 General|B.1 Subscription to Notification of Signalling Path Status at IMS Registration|B.1a. Subscription to Notification of Change of IP-CAN Type at IMS Registration|B.1b Provisioning of SIP signalling flow information at IMS Registration|B.2 IMS Session Establishment|B.3 IMS Session Modification|B.4 IMS Session Termination|B.5P-CSCF Restoration|Annex C (normative) NAT Related Procedures|C.1 Support for media traversal of NATs using ICE|C.2 P-CSCF procedures|C.3 PCRF procedures|C.4P_CSCF procedures to support media traversal through hosted NAT without ICE|Annex D (normative) Access specific procedures for GPRS|Annex E(normative) Fixed Broadband Access Interworking with EPC|E.1 General|E.2 Definitions and abbreviations|E.3 Binding Mechanisms|E.4 PCC Procedures|E.4.1Introduction|E.4.2IP-CAN Session Establishment|E.4.3IP-CAN Session Termination|E.4.4IP-CAN Session Modification|E.5 3GPP HNB Procedures  CS Support|E.5.1S9a CS Session Establishment|E.5.2S9a CS Session Modification|E.5.3S9a CS Session Termination|E.6 PCRF Addressing|E.7 BPCF Addressing|E.8Session Linking Function|Annex F (normative): Access specific aspects, Fixed Broadband Access network convergence|Annex G (normative): Diameter overload control mechanism|Annex H (normative): Access specific procedures for 3GPP EPS|Annex I (normative): APN matching procedures|Annex J (normative): Diameter message priority mechanism|Reference List|$|1|2|3|3.1|3.2|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|4.8|4.9|4.10|5|5.1|5.2|5.3|5.4|6|6.1|6.2|6.3|6.4|6.5|7|7.1|7.2|7.3|7.4|8|8.1|8.2|9|10|10.1|10.2|10.3|10.4|10.5|10.6|10.7|10.8|11|11.1|11.2|11.3|11.4|12|13|13.1|13.2|13.3|14|14.1|14.2|14.3|14.4|15|15.1|15.2|15.3|16|17|18|19|20|21|22|23|24|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|Analyzing Alarm|Adjust License Management Configuration|Install New Capacity License|$|1|1.1|1.2|2|2.1|2.2|2.3|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Purpose|General Impact|Capacity and Performance|Upgrade Impact|Interface|Operation and Maintenance|Obsolete Functions|Other Impacts|Customer Product Information|Environment|Additional Information|Software Management|Summary of Impacts per Value Package|Impact of New or Enhanced Value Packages|Base Package|Convergence|Smart Personalized Broadband|Voice Optimization|Business Intelligence|High Availability and Pooling|Network Efficiency|Monetize OTT|Money Aware|For Coming Releases|$|1|1.1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|3|3.1|4|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|5.9|6|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Document Purpose and Scope|Revision Information|Concepts|Function|Overview|Policy Counter|Determination of Policy and Charging Control Information to Install in PCEF|Ericsson Sy: Integration with Charging System|Policy Group|Subscriber Data Distribution|Integration with Multiple Online Charging Systems|Network Deployments|Traffic Cases|Bill Shock Prevention|Use of Policy Counters Status during IP-CAN session Life Cycle|Policy Counter Status Change|Centralized Management of Operator Service Offering|Use of Policy Counters and Policy Group Information during IP-CAN session Life Cycle|Policy Counter Status Change|Policy Group Update: Turbo Button Purchase|Operator Network Policies, Abusers Example|Connectivity with the Online Charging System|Failure Handling|SLR Failure|SNR Failure|STR Failure|Glossary|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|2.4|2.4.1|2.4.2|2.5|3|4|4.1|4.1.1|4.1.2|4.2|4.2.1|4.2.2|4.2.3|4.3|4.4|4.5|4.5.1|4.5.2|4.5.3|5|6|
|Introduction|Functions and Concepts|Types of Operation|Managed Object Model|Configuration Management|$|1|2|2.1|3|4|
|Introduction|Solution Description|Solution Overview|SAPC Data Model for UDC|Connection Handling|CUDB Geographical Redundancy (1+1+1) Support|Failure in LDAP Operations|Overload Protection on IP BB Delayed Responses|CUDB Overload|Interfaces Description|LDAP Interface|SOAP Interface|Operation and Maintenance|Configure Database Access in the SAPC|Configure SOAP Notifications in CUDB|Subscriber Data Extension in CUDB|LDAP Operations for Provisioning System|Alarms|Logging|Capabilities|Glossary|Reference List|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|3|3.1|3.2|4|4.1|4.2|4.3|4.4|4.5|4.6|5|6|7|
|Configuration and Provisioning Overview|Other Conventions|Configuration Prerequisites|Subscription and Policies Data Overview|Provision Subscribers|Provision Subscriber Groups|Provision Global Subscriber Group|Provision Subscribers|Subscriber Identifiers|Handling of Multiple Service Offerings|Configure Dynamic Group Selection|Handling of Unknown Subscribers|Autoprovisioning|Unknown Subscriber|Unknown Subscriber EDSources pointing to the SAPC internal database|Unknown and Autoprovisioning Precedence|Provision Policies|Policies Basic Concepts|Provisioning Policies|Policy Types|Policy Tags|Appendix A. Condition Policy Language|Condition Formula Examples|Condition Formula Language|Condition Formula Operators|Condition Formula Expressions|Reference List|$|1|1.1|2|3|4|4.1|4.1.1|4.2|4.2.1|4.3|4.4|4.5|4.5.1|4.5.2|4.5.3|4.5.4|5|5.1|5.2|5.3|5.4|6|6.1|6.2|6.2.1|6.2.2|7|
|Scope|References|Definitions and abbreviations|Definitions|Abbreviations|High level requirements|General requirements|Charging related requirements|Policy control requirements|Usage Monitoring Control|Application Detection and Control|Architecture model and reference points|Reference architecture|Reference points|Functional Description|Overall description|Functional entities|Policy and charging control rule|IP CAN bearer and IP CAN session related policy information|Quality of Service Control rule|Usage Monitoring Control specific information|IP flow mobility Routing rule|Application Detection and Control Rule|Policy decisions based on spending limits|PCC Procedures and flows|Introduction|IP-CAN Session Establishment|IP-CAN Session Termination|IP-CAN Session Modification|Update of the subscription information in the PCRF|PCRF Discovery and Selection|Gateway Control Session Procedures|Change in subscription for MPS priority services|Procedures over Sy reference point|Annex A: Access specific aspects (3GPP)|A.1 GPRS|A.2 Void|A.3 Void|A.4 3GPP Accesses (GERAN/UTRAN/E-UTRAN) - GTP-based EPC|A.53GPP Accesses (GERAN/UTRAN/E-UTRAN) - PMIP-based EPC|Annex B (informative): Void|Annex C (informative): Void|Annex D (informative): Access specific aspects (Non-3GPP)|Annex E (informative): Reference Scenario for the evolution of QoS control|Annex E (informative): Void|Annex F (informative): Co-existence between SBLP based (Release 6) and PCC based (Release 7 and later) policy control|Annex F (informative): Void|Annex G (informative): PCC rule precedence configuration|Annex H (normative): Access specific aspects (EPC-based Non-3GPP)|H.1 General|H.2EPC-based cdma2000 HRPD Access|H.3EPC-based Trusted WLAN Access with S2a|H.4EPC-based untrusted non-3GPP Access|Annex I (informative): Void|Annex J (informative): Standardized QCI characteristics - rationale and principles|Annex K (informative): Limited PCC Deployment|Annex L (normative): Limited PCC Deployment|Annex M (informative): Handling of UE or network responsibility for the resource management of services|Annex N (informative): PCC usage for sponsored data connectivity|Annex P (normative): Fixed Broadband Access Interworking with EPC|Annex Q (informative): How to achieve Usage Monitoring via the OCS|Annex R (informative): Disabling/re-enabling Usage Monitoring for a PCC/ADC rule|Annex S (normative): Fixed Broadband Access|Annex T (informative): Charging using AAA signalling for Fixed Broadband AccessS|Reference List|$|1|2|3|3.1|3.2|4|4.1|4.2|4.3|4.4|4.5|5|5.1|5.2|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|6.8|6.9|7|7.1|7.2|7.3|7.4|7.5|7.6|7.7|7.8|7.9|8|8.1|8.2|8.3|8.4|8.5|9|10|11|12|13|14|15|16|17|17.1|17.2|17.3|17.4|18|19|20|21|22|23|24|25|26|27|28|29|
|Scope|References|Definitions and abbreviations|Definitions|Abbreviations|High level requirements|General requirements|Charging related requirements|Policy control requirements|Usage Monitoring Control|Application Detection and Control|RAN user plane congestion detection, reporting and mitigation|Support for service capability exposure|Architecture model and reference points|Reference architecture|Reference points|Functional Description|Overall description|Functional entities|Policy and charging control rule|IP CAN bearer and IP CAN session related policy information|Quality of Service Control rule|Usage Monitoring Control specific information|S2c based IP flow mobility Routing rule|Application Detection and Control Rule|Policy decisions based on spending limits|Traffic Steering Control Information|NBIFOM Routing rule|PCC Procedures and flows|Introduction|IP-CAN Session Establishment|IP-CAN Session Termination|IP-CAN Session Modification|Update of the subscription information in the PCRF|PCRF Discovery and Selection|Gateway Control Session Procedures|Change in subscription for MPS priority services|Procedures over Sy reference point|Procedures over Np reference point|Procedures over Nt reference point|Annex A: Access specific aspects (3GPP)|A.1 GPRS|A.2 Void|A.3 Void|A.4 3GPP Accesses (GERAN/UTRAN/E-UTRAN) - GTP-based EPC|A.53GPP Accesses (GERAN/UTRAN/E-UTRAN) - PMIP-based EPC|Annex B (informative): Void|Annex C (informative): Void|Annex D (informative): Access specific aspects (Non-3GPP)|Annex E (informative): Reference Scenario for the evolution of QoS control|Annex E (informative): Void|Annex F (informative): Co-existence between SBLP based (Release 6) and PCC based (Release 7 and later) policy control|Annex F (informative): Void|Annex G (informative): PCC rule precedence configuration|Annex H (normative): Access specific aspects (EPC-based Non-3GPP)|H.1 General|H.2EPC-based cdma2000 HRPD Access|H.3EPC-based Trusted WLAN Access with S2a|H.4EPC-based untrusted non-3GPP Access|Annex I (informative): Void|Annex J (informative): Standardized QCI characteristics - rationale and principles|Annex K (informative): Limited PCC Deployment|Annex L (normative): Limited PCC Deployment|Annex M (informative): Handling of UE or network responsibility for the resource management of services|Annex N (informative): PCC usage for sponsored data connectivity|Annex P (normative): Fixed Broadband Access Interworking with EPC|Annex Q (informative): How to achieve Usage Monitoring via the OCS|Annex R (informative): Disabling/re-enabling Usage Monitoring for a PCC/ADC rule|Annex S (normative): Fixed Broadband Access|Annex T(Informative): How to accumulate PCC/ADC Rule usage in multiple monitoring groups|Annex U (normative): Policy and charging control in the downlink direction for traffic marked with DSCP by the TDF|Annex V (Informative): Policy Control for Remote UEs behind a ProSe UE-to-Network Relay UE|Reference List|$|1|2|3|3.1|3.2|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|5|5.1|5.2|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|6.8|6.9|6.10|6.11|7|7.1|7.2|7.3|7.4|7.5|7.6|7.7|7.8|7.9|7.10|7.11|8|8.1|8.2|8.3|8.4|8.5|9|10|11|12|13|14|15|16|17|17.1|17.2|17.3|17.4|18|19|20|21|22|23|24|25|26|27|28|29|30|31|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Document Purpose and Scope|Target Groups|Prerequisite Knowledge|Overview|Getting Started|System Prerequisites|Software Prerequisites|Node.js|MongoDB|Downloading the Software and Preparing the Installation|Installation|User Roles|Administrator|Operator|Connectivity and Security Management|Certificate between the Policy Studio and the SAPC|Certificate between the web browser and the Policy Studio|Working with the Policy Studio|Accessing the Policy Studio|Login|System Administrator Login|Operator Login|Improving Policy Studio Performance with NGINX|Operation And Maintenance|Backup and Data Restore|Backup Procedure|Restore Procedure|Logging Management|Troubleshooting|Administrator Password Recovery|Restart the Policy Studio|Upgrade|SAPC Functionality Not Supported|REST resources|Functions|Contents|Dataplans|Subscribers|Rules|Policy Tags|Condition Formula Expressions|Condition Formula Operators|Limitations|Dataplans|Global Policies|Export Functionality|Import Functionality|Glossary|Reference List|$|1|1.1|1.2|1.2.1|2|3|3.1|3.2|3.2.1|3.2.2|3.3|3.4|3.5|3.5.1|3.5.2|3.6|3.6.1|3.6.2|4|4.1|4.2|4.2.1|4.2.2|4.2.3|5|5.1|5.1.1|5.1.2|5.2|5.3|5.3.1|5.3.2|5.4|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|6.8|6.9|7|7.1|7.2|7.3|7.4|8|9|
|Scope|References|Definitions, symbols and abbreviations|Rx reference point|Overview|Rx reference model|Functional elements|PCC procedures over Rx reference point|Rx protocol|Protocol support|Initialization, maintenance and termination of connection and session|Rx specific AVPs|Rx re-used AVPs|Rx specific Experimental-Result-code AVP values|Rx messages|Annex A (normative) IMS Related P-CSCF Procedures over Rx|Provision of Service Information at P-CSCF|Enabling of IP Flows|Support for SIP forking|Notification of AF Signalling Transmission Path Status|Indication of Emergency Session|Notification IP-CAN type change|Support for Early Session disposition SDP|Provision of Signalling Flow Information at P-CSCF|Handling of MPS Session|Retrieval of network provided location information|Handling of RAN/NAS release cause values|Annex B (normative) Flow identifiers: Format definition and examples|Annex C (informative): Void|Reference List|$|1|2|3|4|4.1|4.2|4.3|4.4|5|5.1|5.2|5.3|5.4|5.5|5.6|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|6.8|6.9|6.10|6.11|7|8|9|
|Scope|References|Definitions, symbols and abbreviations|Rx reference point|Overview|Rx reference model|Functional elements|PCC procedures over Rx reference point|Rx protocol|Protocol support|Initialization, maintenance and termination of connection and session|Rx specific AVPs|Rx re-used AVPs|Rx specific Experimental-Result-code AVP values|Rx messages|Annex A (normative) IMS Related P-CSCF Procedures over Rx|Provision of Service Information at P-CSCF|Enabling of IP Flows|Support for SIP forking|Notification of AF Signalling Transmission Path Status|Indication of Emergency Session|Notification IP-CAN type change|Support for Early Session disposition SDP|Provision of Signalling Flow Information at P-CSCF|Handling of MPS Session|Retrieval of network provided location information|Handling of RAN/NAS release cause values|Resource Sharing|Handling of MCPTT priority call|Annex B (normative) Flow identifiers: Format definition and examples|Annex C (informative): Void|Annex D (normative): Monitoring Related SCEF Procedures over Rx|Reference List|$|1|2|3|4|4.1|4.2|4.3|4.4|5|5.1|5.2|5.3|5.4|5.5|5.6|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|6.8|6.9|6.10|6.11|6.12|6.13|7|8|9|10|
|Introduction|Hazard Symbols and Admonitions|General Safety Precautions|Electric Shock Hazards|Safety Precautions for Working with Electrical Equipment|Energy Hazards|Fire Hazard|Fire Precautions|Heat Hazards|Mechanical Hazards|Radio Frequency Exposure Hazards|Laser Hazards|Chemical Hazards|Beryllium Oxide Hazard|Battery Acid Hazard|Gas Explosion Hazard|Refrigerant Hazard|Other Hazards|Handling Heavy Goods|Working at Height|$|1|2|3|4|4.1|5|6|6.1|7|8|9|10|11|11.1|11.2|11.3|11.4|12|12.1|12.2|
|Introduction|Target Group|Educational Requirements|Admonitions and Safety Symbols|Special Hazard Symbols|Batteries|Overheated Batteries|Treating Hazardous Waste from Leaks|Electrical Installation|Safety Precautions for Working with Electrical Installations|Electrostatic Discharge|Handling Printed Board Assemblies and IC Components|Storing and Transporting Printed Board Assemblies and IC Components|Equipment Handling|Ground Connection|Lightning Protection|System, Data, and Traffic Protection|$|1|1.1|1.2|2|2.1|3|3.1|3.2|4|4.1|5|5.1|5.2|6|7|8|9|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|Analyzing Alarm|Actions for Clearing Alarm|$|1|1.1|1.2|2|2.1|2.2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|Analyzing Alarm|Actions for /|Actions for /boot|Actions for /var/log|Actions for /cluster|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|2.5|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|Analyzing Alarm|Actions for Time Difference over Threshold|Actions for Unusable Time Servers|Actions for Rejected Time Servers|Actions for Unreachable Time Servers|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|2.5|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Scope|References|Definitions, symbols and abbreviations|Definitions|Symbols|Abbreviations|User Data Convergence architecture|UDC System architecture|Functional Entities|Reference point Ud|Front-End Session|UDR Session|User Data convergence information flows|General|Requirements|Querying data from the UDR|Creating data within the UDR|Deleting data from the UDR|Updating data within the UDR|Subscription to Notifications|Notification of data modification|Annex A (Informative)|Annex B (Informative)|Annex C (Informative)|Reference List|$|1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|6|7|8|9|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Revision Information|Concepts|Function|Overview|Data Mirroring|SAPC Network traffic handling|SAPC Geographical Redundancy States|Geographical Redundancy Supervision and Control Functions|Traffic Cases|SAPC Active Node Restart|SAPC Standby Node Restart|Replication Channel Unavailable|Capabilities|Glossary|Reference List|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|2.5|3|3.1|3.2|3.3|4|5|6|
|Configuration and Provisioning Overview|Typographic Conventions|Other Conventions|Configuration Prerequisites|Configure Gx PCEFs for Usage Reporting|Configure Event-Triggers|Provision Fair Usage Profile|Provision Postpaid Subscriptions|Provision Prepaid Subscriptions|At Subscriber Level|At Subscriber Group Level|Intermediate Limits|Complementary Limits|Autoprovisioning and Fair Usage|Provision Shared Subscriber Plans|Configure Policy Control Based on Fair Usage|Provision Accumulation Policies|Complementary usage accumulators Based on Conditions|Usage Reporting Based on Multiple Gx|Monitor usage accumulators|Monitor Subscriber usage accumulators|Monitor Shared Dataplan usage accumulators|Configuration Examples for Use Cases|Basic Turbo Button Based on Temporary Subscriber Groups|Advanced Turbo Button with Dynamic Group Selection Based on Fair Usage|Shared Subscriber Plans Use Cases|Shared and Individual Limits for Members|Category Limits for shared dataplan Members|Monitoring Shared Subscriber Plan Members|Combining Individual Plans and Shared Subscriber Plan|Appendix A. Fair Usage Policy Types|Appendix B. Fair Usage Policy Tags|Fair Usage Policy Tags in Dynamic Group Selection Policies|Glossary|Reference List|$|1|1.1|1.2|2|3|4|5|5.1|5.2|5.2.1|5.2.2|5.3|5.4|5.5|6|7|8|8.1|9|10|10.1|10.2|11|11.1|11.2|11.3|11.3.1|11.3.2|11.3.3|11.3.4|12|13|13.1|14|15|
|Scope|References|Definitionsand abbreviations|Sy reference point|Overview|Sy reference model|Subscriber Spending Limits|Functional elements|Spending Limits procedures over Sy reference point|Sy protocol|Protocol support|Initialization, maintenance of connection and session|Sy specific AVPs|Sy re-used AVPs|Sy specific Experimental-Result-code AVP values|Sy messages|Annex A (normative): User Identity for Fixed Broadband Access network convergence|Reference List|$|1|2|3|4|4.1|4.2|4.3|4.4|4.5|5|5.1|5.2|5.3|5.4|5.5|5.6|6|7|
|Scope|References|Definitionsand abbreviations|Sy reference point|Overview|Sy reference model|Subscriber Spending Limits|Functional elements|Spending Limits procedures over Sy reference point|Sy protocol|Protocol support|Initialization, maintenance of connection and session|Sy specific AVPs|Sy re-used AVPs|Sy specific Experimental-Result-code AVP values|Sy messages|Annex A (normative): User Identity for Fixed Broadband Access network convergence|Reference List|$|1|2|3|4|4.1|4.2|4.3|4.4|4.5|5|5.1|5.2|5.3|5.4|5.5|5.6|6|7|
|General|Product Scope|Typographic Conventions|Prerequisites|Related Data Collection Guidelines|Workflow|Mandatory Data|Data Collection|Data Collected Based on Specific Problem Types|Database General Problems in the SAPC|Geographical Redundancy Problems in the SAPC|Software License Problems in the SAPC|Other Useful Information|Performance Data Collector Reports|Appendix A: Severity/Priority|Glossary|$|1|1.1|1.2|1.3|1.4|2|3|3.1|4|4.1|4.2|4.3|5|5.1|6|7|
|Introduction|Functions and Concepts|Types of Operation|Managed Object Model|Configuration Management|Fault Management|Security Management|$|1|2|2.1|3|4|5|6|
|Introduction|Functions and Concepts|Types of Operations|Managed Object Model|Configuration Management|Fault Management|$|1|2|2.1|3|4|5|
|Introduction|Document Purpose and Scope|Send in Your Feedback|CPI Revision Information|Structure of the CPI Library|Contents of CPI Library|Safety and Environment|Library Overview|Product Overview|Planning|Operation and Maintenance|Emergency|Interface|How to Read the CPI|$|1|1.1|1.2|1.3|2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|4|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Function|Overview|Smp Session Access Control|PDN-GW Selection|SPID Selection|Subscriber Profile Handling|Network Deployments|Traffic Cases|Smp Session Lifecycle at UE Attach or PDN Connectivity|Smp Session Lifecycle at Inter SGSN-MME TAU or Handover|Error Handling|Restrictions|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|2|3|3.1|3.2|3.3|4|5|
|Configuration Prerequisites|Configure Access and Charging Overview|Other Conventions|Configure Gx Diameter Network Data|Configure Gx PCEFs|Configure PCEFs for Interworking with Clustered Diameter Systems|Configure Multiple Gx Scenario|Configure Event Triggers Selection|Provision Unconditionally Event Triggers Selection|Provision Event Trigger Selection Policies|Combining Static Qualification and Policies for Event Triggers|Provision Services|Set PCC rules|Configure IP-CAN Session Access Control|Configure Service Access Control|Provision Policies for Service Authorization|Configure One Time Redirect|Provision Static Service Policies|Rule Spaces|Provision Rule Spaces|Policies for Rule Space Negotiation|Configure Service Charging Control|Static Services|Preconfigured Services|Provision Qualification Data for Subscriptions|Provision Qualification for Subscriber or Subscriber Group Unconditionally|Provision Qualification for Subscriber or Subscriber Group Conditionally (depending on policies)|Configure Subscriber Charging Control|Provision Charging System Profiles|Provision Subscriber Charging Profiles|Configure Charging Characteristics Information|Provision Unconditional Subscriber Charging Data to Subscriber or Subscriber Groups|Provision Conditional Subscriber Charging Data with Policies|Configure Content Filtering Control|Provision Content Filtering for Subscribers or Subscriber Groups.|Provision Content Filtering Policies|Configure Header Enrichment|Configure Presence Reporting Area|Provision Presence Reporting Area|Provision Unconditional Presence Reporting Area to Subscriber or Subscriber Groups|Provision Conditional Presence Reporting Area with Policies|Configure Event Triggers for Presence Reporting Area|Configuration Examples for Use Cases|Roaming Conditions|Cell Congestion|PDN Type and UE IP Address Conditions|Presence Area Status Conditions|Appendix A. Access and Charging Policy Types|Appendix B. Policy Tags|Time and Date Tags|Tags Related to Access and Charging|Reference List|$|1|2|2.1|3|3.1|3.2|3.3|4|4.1|4.2|4.3|5|5.1|6|7|7.1|7.2|7.3|7.4|7.4.1|7.4.2|8|8.1|8.2|9|9.1|9.2|10|10.1|10.2|10.3|10.4|10.5|11|11.1|11.2|12|13|13.1|13.2|13.3|13.4|14|14.1|14.2|14.3|14.4|15|16|16.1|16.2|17|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Emergency Services Introduction|Emergency Services Function|Emergency Services Overview|Emergency Subscriber Profile|Emergency Bearer Service|IMS Emergency Calls|Emergency Services Network Deployments|Emergency Services Traffic Cases|Protocol Binding for Rel9 Rx Onwards and standard Rel9 Gx Onwards|Emergency Services Error Handling|Emergency Services Restrictions|Reference List|$|1|2|2.1|2.2|2.3|2.4|3|4|4.1|4.2|5|6|
|Introduction|Functions and Concepts|Types of Operation|Managed Object Model|Configuration Management|Fault Management|Security Management|$|1|2|2.1|3|4|5|6|
|Configuration Prerequisites|Configure Bearer QoS Control and Bandwidth Management Overview|Other Conventions|Configure QoS Control for the Default Bearer and the APN|Diameter Node Control for QoS Control for the Default Bearer and the APN|Provision QoS Profiles for Default Bearer/APN|Configuration of Bearer/APN QoS Profiles for GPRS|Configuration of Bearer/APN QoS Profiles for EPS|Provision QoS Control for Default Bearer/APN selection|Configure Bandwidth Management for Services|Configure Static Services|Preconfigured and Dynamic Services|Provision Service QoS Profiles|Configuration for GPRS|Configuration for EPS|Provision QoS Control for Services|Appendix A. QoS Policy Types|Appendix B. QoS Policy Tags|Appendix C. QoS Selection Tags for Output Attributes Used in Policies|Appendix D Configuration Summary|Reference List|$|1|2|2.1|3|3.1|3.2|3.2.1|3.2.2|3.3|4|4.1|4.2|4.3|4.3.1|4.3.2|4.4|5|6|7|8|9|
|Scope|References|Definitions, symbols and abbreviations|Definitions|Symbols|Abbreviations|Protocol Stack|General|Protocol Stack for Ud Data Access Messages|Protocol Stack for Ud Subscriptions/Notifications|General Messages|General|Open Link for a LDAP Session|Close Link for a LDAP Session|Transactions|User Data Convergence Messages|General|Query|Create|Delete|Update|Subscribe|Notify|Abandon operation|Information Elements|Information Element Types with LDAP|Information Elements for Subscriptions and Notifications|Security|Annex A|Annex B|Annex C|Annex D|Reference List|$|1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|5|5.1|5.2|5.3|5.4|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|6.8|7|7.1|7.2|8|9|10|11|12|13|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Document Purpose and Scope|Revision Information|Concepts|Function|Overview|Wi-Fi Calling|Use Case: Bill Shock Prevention|Network Deployments|Traffic Cases|Wi-Fi Calling Setup|Handover between VoLTE and Wi-Fi|Handover from Wi-Fi to VoLTE|Handover from VoLTE to Wi-Fi|Error Handling|Operational Conditions|External Conditions|Glossary|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.2.1|3|4|4.1|4.2|4.2.1|4.2.2|4.3|5|5.1|6|7|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|Other Conventions|Configuration Prerequisites|Configure Notification Network Data|Configure Notifications Delivery|Configure Notification Servers|Configure SMS Centers|Configure Web Service End Points|Configure Notification Destinations|Notifications Sent to End Users|Notifications Sent to External Systems|Provisioning Notification Policies|Notifications Sent to End Users|Notifications Sent to External Systems|Notification Sent to End Users and to External Systems|Dynamic Notification Message Content|Encoding Schemes in Notification Messages|Configuration Examples for Use Cases|Notifications Based on Fair Usage|Notifications to be sent to Subscribers|Notifications and Shared Dataplans|Notifications Based on Subscriber Group Activation or Deactivation|Appendix A. End User Notifications Policy Types|Glossary|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.2|3.2.1|3.2.2|3.3|3.3.1|3.3.2|4|4.1|4.2|4.3|4.4|4.5|5|5.1|5.1.1|5.1.2|5.2|6|7|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|Internal Graceful Scale-In|VM Deletion using the Cloud Manager|VM Deletion in CEE using ECM|VM Deletion in CEE using Atlas|VM Deletion in VMware vCenter using vSphere Client|VM Deletion in VMware vCenter using vCloud Director|$|1|1.1|2|2.1|2.2|3|4|5|6|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Application Detection and Control Introduction|Document Purpose and Scope|Concepts|ADC Function|ADC Overview|Service Access Control|ADC Redirection Control|ADC Mute Notification Control|Application Detection Reporting|ADC Network Deployments|ADC Traffic Cases|QoS Control Based on Application Traffic Detection|ADC Redirection Control|ADC Mute Notification|ADC Error Handling|Reference List|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|2.5|3|4|4.1|4.2|4.3|4.4|5|
|Introduction|Event Description|Information|Usage|Configuration|Subscription|$|1|2|2.1|2.2|2.3|2.4|
|Configuration File|General|Acronyms and Terms|References|Parameters|Examples|$|1|1.1|1.2|1.3|1.4|1.5|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|Introduction|Prerequisites|Procedure|VM Creation in CEE using ECM|VM Creation in CEE using Atlas|VM Creation in VMware vCenter using vSphere Client|VM Creation in VMware vCenter using vCloud Director|$|1|1.1|2|3|4|5|6|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Purpose|General Impact|Capacity and Performance|Implementation|Platform|PNF Architecture|VNF Architecture|Upgrade|Interface|Operation|Other Network Elements|Additional Information|Subscription Management|Fair Usage Management|QoS Profile Management|Database Access Management|Policy Management|Impact on Value Packages|Base Package|Business Intelligence|Convergence|High Availability and Pooling|Monetize OTT|Money Aware|Network Assurance|Network Efficiency|Smart Personalized Broadband|Voice Optimization|For Coming Releases|Reference List|$|1|1.1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|3|3.1|3.2|3.3|3.4|3.5|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|4.8|4.9|4.10|5|6|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Overview|Description|Prerequisite|Procedure|Reference List|$|1|1.1|1.2|2|3|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Related Information|Key Features of Ericsson NETCONF Interface|Prerequisites|NETCONF Session|Start a NETCONF Session over SSH|Start a NETCONF Session over TLS|Session Inactivity Timer|Session End|NETCONF RPC Messages|Message <hello>|Message <ok>|Error Messages|NETCONF Data Model|Model Definition|Namespaces|Configuration and State Data|Distinguished Names|MO Attributes|MO Instances|MO Actions|NETCONF Operations|Operation <get>|Operation <get-config>|Operation <editconfig>|Operation <action>|Operation <create-subscription>|Operation <close-session>|Operation <kill-session>|Operation <copy-config>|Operation <delete-config>|NETCONF Notifications|Notification <replayComplete>|Notification <notificationComplete>|Non-Standard Notifications|NETCONF Validation|Create MO Instance|Delete MO Instance|Change Single-Valued Attributes|Delete MO Attribute Values|Change Sequence Attributes|Change Struct Attributes|System-Created Property|NETCONF Visibility Control|NETCONF Transaction|Transaction Start|Locking|Transaction Commit|Abort|Transaction Time-Out|NETCONF Capability <action>|Overview|Dependencies|Capability Identifier|New Operations|Modifications to Existing Operations|NETCONF Capability <notification>|Overview|Dependencies|Capability Identifier|New Operations|Modifications to Existing Operations|New Notifications|XML Schema|RFC Compliance Latest|NETCONF Statement of Compliance|NETCONF Capabilities|NETCONF Compliance to RFC 4741 and RFC 6241|NETCONF Compliance to RFC 4742 and RFC 6242|NETCONF Compliance to RFC 5277|NETCONF Compliance to RFC 5539|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|5.9|6|6.1|6.2|6.3|7|7.1|7.2|7.3|7.4|7.5|7.6|7.7|8|9|9.1|9.2|9.3|9.4|9.5|10|10.1|10.2|10.3|10.4|10.5|11|11.1|11.2|11.3|11.4|11.5|11.6|11.7|12|13|13.1|13.2|13.3|13.4|13.5|
|Subscription and Policy Management Introduction|Subscription and Policy Management Function|Subscription Management|Handling of Multiple service offerings|Dynamic Group Selection Policies|Policy Management|Reauthorization Because of Time of Day Conditions|Header Enrichment|Subscription and Policy Management Traffic Cases|Update Subscriber Profile|Subscriber Group activation/deactivation Because of Time Conditions|Policy Result Change Because of Time Conditions|Failure Handling|Restrictions|Reference List|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|3|3.1|3.2|3.3|3.4|4|5|
|Introduction|Functions and Concepts|Types of Operation|Managed Object Model|Configuration Management|$|1|2|2.1|3|4|
|Introduction|Notification Description|$|1|2|
|Introduction|Event Description|Information|Usage|Configuration|Subscription|$|1|2|2.1|2.2|2.3|2.4|
|Introduction|Functions and Concepts|Types of Operation|Managed Object Model|Configuration Management|Fault Management|Security Management|$|1|2|2.1|3|4|5|6|
|$|
|Introduction|Target Groups|Managed Object Model|MOM Concepts|MOM Overview|MIB|Managed Objects|Managed Object Creation and Deletion|Managed Object Naming|Setting Attributes|Attribute Data Types|Calling Actions|Relationships between Managed Objects|Model Element Life Cycle|Presentation of MOM|Classes|Attribute Properties|Common Attributes|Deprecated Elements in MOM|$|1|1.1|2|2.1|2.2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|4|4.1|4.2|4.3|4.4|
|Log Overview|Log Types|Log Events|Configuration|Reported Data|SAPC Application Logs Record Output Format|$|1|2|3|4|5|5.1|
|General|Introduction|Terms|Concept|Compliance Lists|IETF - Stream Control Transmission Protocol|Notes|Reference List|$|1|1.1|1.2|1.3|2|2.1|3|4|
|$|
|Introduction|Document Purpose and Scope|Revision Information|NFV Environment|NFVI|NFV Management and Orchestration System|VNF Manager|Virtual SAPC Architecture|Virtualization Architecture|Deployment Types|Resilience and Redundancy|Networking|Storage|Security|Management and Orchestration|Deployment|HW Management|Scaling|Decommissioning|VMware Tools|Characteristics and Dimensioning|Requirements on the Cloud System|Cloud Management System Requirements|Cloud Infrastructure Requirements|Compute Host HW Requirement|Additional considerations|Glossary|Reference List|$|1|1.1|1.2|2|2.1|2.2|2.3|3|3.1|3.2|3.3|3.4|3.5|3.6|4|4.1|4.2|4.3|4.4|4.5|5|6|6.1|6.2|6.3|6.4|7|8|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Overload Control Function|Load Regulation Mechanism|Massive Reauthorizations Mechanisms|Reference List|$|1|1.1|1.2|2|
|Introduction|Document Purpose and Scope|Revision Information|Functions and Concepts|Types of Operation|Managed Object Model|$|1|1.1|1.2|2|2.1|3|
|Introduction|Document Purpose and Scope|Overview|Hardware Components|Software Components|Network|Networks Configuration Solutions|Solution to Define Unique OAM and Traffic Networks|Solution to Define Unique OAM and Multiple Traffic Networks|$|1|1.1|2|2.1|2.2|2.3|3|3.1|3.2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Document Purpose and Scope|Typographic Conventions|Other Conventions|Configuration Prerequisites|Configuration Prerequisites|Configure Sy Network Data|Configure Sy Diameter Data|Configure Connections to OCS with One Realm|Configure Connections to an OCS with Several Diameter Realms|Configure Online Charging Systems|Provision of Subscribers|Subscribers Provisioned Only in Charging Systems|Subscribers Provisioned in the SAPC and in the Charging System|Configure Selection of Charging System|Provisioning at Subscriber Profile|Avoiding Sy Interface Communication for Subscribers Provisioned in the SAPC|Configure Policies for Dynamic Charging System Selection|Configure Default Charging System|Configure Policy Control Based on Spending Limits Reporting|Appendix A. Policy Tags|Glossary|Reference List|$|1|1.1|1.2|1.3|2|2.1|3|3.1|3.2|3.3|3.4|4|4.1|4.2|5|5.1|5.2|5.3|5.4|6|7|8|9|
|Introduction|Document Purpose and Scope|Typographic Conventions|Other Conventions|Configuration Prerequisites|Configuration Prerequisites|Configure Sy Network Data|Configure Sy Diameter Data|Configure Connections to OCS with One Realm|Configure Connections to an OCS with Several Diameter Realms|Configure Online Charging Systems|Provision of Subscribers|Subscribers Provisioned Only in Charging Systems|Subscribers Provisioned in the SAPC and in the Charging System|Configure Selection of Charging System|Provisioning at Subscriber Profile|Avoiding Sy Interface Communication for Subscribers Provisioned in the SAPC|Configure Policies for Dynamic Charging System Selection|Configure Default Charging System|Configure Policy Control Based on Spending Limits Reporting|Appendix A. Policy Tags|Glossary|Reference List|$|1|1.1|1.2|1.3|2|2.1|3|3.1|3.2|3.3|3.4|4|4.1|4.2|5|5.1|5.2|5.3|5.4|6|7|8|9|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|Other Conventions|Configuration Prerequisites|Configuration|Configure Gx PCEF Nodes|Provision Dynamic Services|Configure Classification of Dynamic Services|Configure Dynamic Service Authorization|Configure Dynamic Service Qualification|Configure Static Qualification for Dynamic Services|Configure Dynamic Qualification for Dynamic Services|Configure Bearer QoS Control  for Dynamic Services|Configure Access and Charging Policies Based on Dynamic Service Establishment|Configure Event Triggers|Configuration Examples for Use Cases|Prioritized Video Delivery|Multimedia Telephony over LTE|Appendix A. Dynamic Policy Types|Appendix B. Policy Tags|Dynamic Policy Control Tags|Appendix C. Tags for Output Attributes Used in Policies|QoS and Charging Selection Tags|Glossary|Reference List|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.2|3.3|3.4|3.5|3.5.1|3.5.2|3.6|3.7|3.8|4|4.1|4.2|5|6|6.1|7|7.1|8|9|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|Geographical Redundancy Procedures and States|Geographical Redundancy Procedures and States|Recommended Operating Conditions|Geographical Redundancy Procedures|Preconditions|Start Geographical Redundancy|Temporarily Disable Geographical Redundancy|Monitor Geographical Redundancy State|Check Geographical Redundancy Configuration|Change Preferred Role in Geographical Redundancy|Return Active State to Preferred Node|Fault Management|Configuration|Heartbeat Configuration|DBS Replication Timers|Glossary|$|1|1.1|1.2|1.3|2|2.1|2.2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|4|5|5.1|5.2|6|
|$|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Functions and Concepts|User Authentication|User Authorization|Backup and Restore of Local User Data|Types of Operation|Managed Object Model|Rules for Default Roles|Configuration Management|$|1|2|2.1|2.2|2.3|2.4|3|3.1|4|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|Other Conventions|Configuration Prerequisites|Configuration|Configure Event Triggers|Configuration Examples for Use Cases|Configure Bill Shock Prevention|Appendix A. Policy Tags|Tags Related to Wi-Fi Calling|Glossary|Reference List|$|1|1.1|1.2|1.3|1.4|2|3|3.1|4|4.1|5|5.1|6|7|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|Overview|Networks Allocation|IP Addressing|Logical Network Assignment|Geographical Redundancy VIP Configuration for VNF Deployments|Geographical Redundancy VIP Configuration for PNF Deployments|Glossary|$|1|1.1|1.2|1.3|2|3|3.1|4|4.1|4.2|5|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Configuration and Provisioning Overview|Other Conventions|Configuration Prerequisites|Smp Diameter Data|Provision PDN-GW Selection|Provision PDN-GW Profiles|Provision PDN-GW List Profiles|Provision PDN-GW Lists to Subscribers or Subscriber Groups|Provision Conditional PDN-GW List with Policies|Provision SPID Selection|Provision SPIDs to Subscribers or Subscriber Groups|Provision Conditional SPID Selection Policies|Configure Smp Session Control|Appendix A. Policy Types|Appendix B. Tags Related to Mobility Based Policy Control|Reference List|$|1|1.1|2|3|4|4.1|4.2|4.3|4.4|5|5.1|5.2|6|7|8|9|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Document Purpose and Scope|Revision Information|Target Group|Notice|Consent|Choices and Personal Data Retention|Privacy Functionality Contained in the SAPC and Intended Purpose|Instructions for Operating the Privacy Functionality|Procedures for Maintaining the Privacy Configuration|Default Values of the Privacy Parameters|Listing and Classification of the Personal Data Processed by the Product|Glossary|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|2|2.1|2.2|2.3|2.4|3|4|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Document Purpose and Scope|Prerequisites|Target Groups|Definitions|Overview|Threats|Defense|Product Security Functionality|Network Security Level|Node Security Level|OAM Security Level|Security Configuration|Network Security Level|Node Security Level|OAM Security Level|Security in the Cloud|Default Parameter Values|Services, Ports, and Protocols|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|5|6|7|
|Overview|Description|Prerequisite|Procedure|Reference List|$|1|1.1|1.2|2|3|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Prerequisites|Procedure|Start Preferred as Active|Start Non-Preferred as Standby|$|1|1.1|2|2.1|2.2|
|Gx Interface Overview|Document Content Conventions|Gx Interface Message Exchange|Diameter Base Protocol Messages|Gx Capability Negotiation|Device Watchdog|Disconnect Peer|Gx Interface Controls and AVP Relations|Gx Interface Messages Format|Gx Credit-Control-Request (CCR)|Gx Credit-Control-Answer (CCA)|Gx Re-Authorization-Request (RAR)|Gx Re-Authorization-Answer (RAA)|Gx Interface AVPs|Gx Supported-Features|Charging-Rule-Install AVP|Charging-Rule-Report AVP|QoS-Information AVP|Default-EPS-Bearer-QoS AVP|Usage-Monitoring-Information AVP|Presence Reporting Area Information AVP|Ericsson Gx+ Messages Format|Ericsson Gx+ Credit-Control-Request (CCR)|Ericsson Gx+ Credit-Control-Answer (CCA)|Ericsson Gx+ Re-Auth-Request (RAR)|Ericsson Gx+ AVPs|Charging-Rule-Authorization|Gx-Capability-List AVP|Gx Error Handling|Gx Protocol Errors|Gx Application Errors|Reference List|$|1|1.1|2|3|3.1|3.2|3.3|4|5|5.1|5.2|5.3|5.4|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|7|7.1|7.2|7.3|8|8.1|8.2|9|9.1|9.2|10|
|Bearer QoS and Bandwidth Management Introduction|Bearer QoS and Bandwidth Management Function|Bearer QoS and Bandwidth Management Overview|QoS in 3GPP Packet Networks|QoS Parameters|QoS Control for the Default Bearer and the APN|Detailed Procedure|Functions to Calculate QoS for the Default Bearer and QoS for APN|Default Bearer QoS Profile Comparison|QoS Control for Services|QoS Control for Preconfigured PCC rules|QoS Control for Static PCC rules|IP Flow Bandwidth Management for Static PCC rules|QoS Control for Dynamic PCC rules|Network Deployments|Bearer QoS and Bandwidth Management Protocol Bindings|QoS Control for the Default Bearer and the APN|Protocol Binding for standard Gx Rel9 onwards, GPRS Access|Protocol Binding for standard Gx Rel9 onwards EPS|Protocol Binding Summary|QoS Control for Services|QoS Control for Preconfigured and Dynamic PCC rules|QoS Control and IP Flow Bandwidth Management for Static PCC rules|Reference List|$|1|2|2.1|2.2|2.2.1|2.3|2.3.1|2.3.2|2.3.3|2.4|2.4.1|2.4.2|2.4.3|2.4.4|3|4|4.1|4.1.1|4.1.2|4.1.3|4.2|4.2.1|4.2.2|5|
|Introduction|Functions and Concepts|Modes of Operation|Types of Operation|Managed Object Model|Configuration Management|Fault Management|$|1|2|2.1|2.2|3|4|5|
|Introduction|Functions and Concepts|ECLI and NETCONF Server IP Address|Session Parameters|SSH Authentication|TLS Authentication|SSH and TLS Transport Protocol Security|Types of Operations|Managed Object Model|Configuration Management|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|3|4|
|Introduction|Functions and Concepts|Types of Operation|Ericsson Definition of 3GPP Perceived Severity Values|Managed Object Model|Managed Object Model  SNMP|Managed Object Model  Fault Management|Configuration Management|Fault Management|File Management|$|1|2|2.1|2.2|3|3.1|3.2|4|5|6|
|$|
|Introduction|Document Purpose and Scope|BSP 8100 Network Configuration Guide Overview|BSP 8100 Minimal Configuration. Four Physical Blades|BSP 8100 Single Subrack Configuration. 12 Physical Blades|BSP 8100 Whole Rack Configuration. 36 Physical Blades|BSP 8100 Networks Allocation|BSP 8100 VLANs|BSP 8100 IP Addressing|$|1|1.1|2|2.1|2.2|2.3|3|3.1|3.2|
|$|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|Other Conventions|Configuration Prerequisites|Configuration|Configuring Gx PCEFs|Provision ADC for Services|Configure ADC Redirection|Configure ADC Redirection Unconditionally|Configure ADC Redirection Conditionally|Configure ADC Mute Notification|Configure ADC Mute Notification Unconditionally|Configure ADC Mute Notification Conditionally|Configure Event Triggers|Configuration Examples for Use Cases|QoS Control based on Application Detection|Appendix A. ADC Policy Types|Appendix B. ADC Policy Tags|Glossary|Reference List|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.2|3.3|3.3.1|3.3.2|3.4|3.4.1|3.4.2|3.5|4|4.1|5|6|7|8|
|Introduction|Prerequisites|Procedure|Configure Node Credential for ECLI|Configure Node Credential for NETCONF|$|1|1.1|2|2.1|2.2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|Preconditions|Overview|Provisioning with Resty|Resty Usage Reference|Initialize Base URI|PUT|GET|DELETE|Operation Results|Prettify JSON Data|Edit Input JSON Data on an Editor|Reuse Base URI for Massive Provisioning|Provisioning with Postman|Installation|Authentication|PUT|GET|DELETE|Operation Results|TLS Certificate|Massive Data Retrieval|Operation and Maintenance|Security|Troubleshooting|Glossary|$|1|1.1|1.2|1.3|2|3|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|4.8|4.9|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|6|7|7.1|7.2|8|
|Introduction|Prerequisites|Procedure|Configure Trust Category for ECLI|Configure Trust Category for NETCONF|$|1|1.1|2|2.1|2.2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Configuration and Provisioning Overview|Other Conventions|Configuration Prerequisites|Configure Emergency APNs|Configure Unauthenticated Emergency Services|Provision Emergency Subscriber|Emergency Subscriber Profile in External Repository|Configuration Examples for Use Cases|Emergency Services|IMS Emergency Services|Appendix A. Emergency Services Policy Tags|Reference List|$|1|1.1|2|3|4|5|6|7|7.1|7.2|8|9|
|Introduction|Prerequisites|Procedure|Configure Administrative State of ECLI over SSH|Configure Administrative State of NETCONF over SSH|$|1|1.1|2|2.1|2.2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Document Purpose and Scope|Revision Information|Preconditions|Backup and Restore Overview|Backup and Restore Procedures|Create Backup|Restore Backup|Restrictions|Glossary|$|1|1.1|1.2|2|3|4|4.1|4.2|5|6|
|Introduction|Prerequisites|Procedure|Configure Administrative State of ECLI over TLS|Configure Administrative State of NETCONF over TLS|$|1|1.1|2|2.1|2.2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Configuration Prerequisites|Overload Control Configuration|Load Regulation Mechanism|Massive Reauthorizations Mechanisms|Performance Management|Reference List|$|1|2|2.1|2.2|3|4|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|Overview|Prerequisites|Front End Management Tool|Tool Purpose|Front End Management Tool Parameters|Front End Management Tool Modes|Glossary|$|1|1.1|1.2|1.3|2|3|4|4.1|4.2|4.3|5|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Related Information|Key Features of ECLI|Prerequisites|ECLI Version|CLI Concepts|CLI Modes|CLI Session|CLI Transaction|CLI Position|CLI Prompt|Context-Sensitive Help|Auto-Completion|Case Correction|Escaping of Special Characters|CLI Comments|Visibility Levels|Automatic Correction of ManagedElement ID|Limitations|CLI Commands|Summary of CLI Commands|Success and Error Indications|Display Information|Change and Display the Position in MO Tree|Change MO Attributes|Create MO|Reinitialize MO|Delete MO|MO Actions|Copy and Paste Configuration Data|Change Password Command|Display CLI Version|Pipe Utility Commands|Help Command|Deprecated Actions|Deprecated Options|CLI Commands Limitations|Terminal Properties|Terminal Types|Default Key Bindings|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|2.10|2.11|2.12|2.13|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|3.10|3.11|3.12|3.13|3.14|3.15|3.16|3.17|4|4.1|4.2|
|Introduction|Document Purpose and Scope|Concepts|Typographic Conventions|Overview|Message Exchange|Diameter Base Protocol Messages|Sy Capability Negotiation|Device Watchdog|Disconnect Peer|Sy Interface Messages Format|Spending-Limit-Request (SLR)|Spending-Limit-Answer (SLA)|Spending-Status-Notification-Request (SNR)|Spending-Status-Notification-Answer (SNA)|Session-Termination-Request (STR)|Session-Termination-Answer (STA)|Ericsson Sy Messages Format|Ericsson Spending-Limit-Request (SLR)|Ericsson Spending-Limit-Answer (SLA)|Ericsson Spending-Status-Notification-Request (SNR)|Ericsson Spending-Status-Notification-Answer (SNA)|Ericsson Session-Termination-Request (STR)|Ericsson Session-Termination-Answer (STA)|Error Handling|Protocol Errors|Application Errors|Glossary|Reference List|$|1|1.1|1.2|1.3|2|3|4|4.1|4.2|4.3|5|5.1|5.2|5.3|5.4|5.5|5.6|6|6.1|6.2|6.3|6.4|6.5|6.6|7|7.1|7.2|8|9|
|Access and Charging Control Introduction|Access and Charging Control Function|IP-CAN session Access Control|Service Access Control|Service Charging Control|Subscriber Charging Control|Content Filtering|Event Triggers|Multiple Gx Support|Presence Reporting Area|Diameter Race Condition Handling|Access and Charging Control Network Deployments|Access and Charging Control Traffic Cases|IP-CAN session Lifetime|Redirect Owing to non-authorized Static Service|One Time Redirect for Authorized Static Services|Service Authorization and Static Service Qualification Policies with Time of Day Conditions When the PCEF is Selected As Time Controller|Presence Reporting Area|PCC Rule Error Handling|Diameter Race Condition Handling|Access and Charging Control Error Handling|Reference List|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|3|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|4.8|5|
|Introduction|Functions and Concepts|SSH|TLS|Method of selecting algorithms or cipher suites|Types of Operations|Managed Object Model|Configuration Management|$|1|2|2.1|2.2|2.3|2.4|3|4|
|Introduction|Document Purpose and Scope|NSP 6.1 Network Configuration Guide Overview|NSP 6.1 Minimal Network Configuration (TSP Legacy)|NSP 6.1 Single Subrack Network Configuration|NSP 6.1 Whole Rack Network Configuration|NSP 6.1 Networks Allocation|NSP 6.1 DMX Network Allocation|NSP 6.1 VLANs|NSP 6.1 IP Addressing Example|TSP Legacy Considerations|$|1|1.1|2|2.1|2.2|2.3|3|3.1|3.2|3.3|3.4|
|General|Introduction|Terms|Concept|Compliance Lists|IETF - Stream Control Transmission Protocol|Notes|Reference List|$|1|1.1|1.2|1.3|2|2.1|3|4|
|$|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Document Purpose and Scope|Configuration Prerequisites|Performance Data Collection Function|PDC Operational Conditions|PDC Function Administration|PDC Configuration|PDC Fault Management|Other Operational Conditions|PDC Report Data Management|Daily and Monthly Reports|Health Check Reports|$|1|1.1|2|3|4|4.1|4.2|4.3|4.4|5|5.1|5.2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|Analyzing Alarm|Actions for Authentication Failure|Actions for Directory Not Exist|Actions for Server Unreachable|Actions for Permission Denied|Actions for Undetermined Reason|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|2.5|2.6|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Prerequisites|Procedure|Disable Geographical Redundancy|Administrative Procedure|Enable Geographical Redundancy|$|1|1.1|2|2.1|2.2|2.3|
|Dynamic Policy Control Introduction|Dynamic Policy Control Function|Dynamic Policy Control Overview|Negotiation of Rx Interface Version and Supported Features|Session Binding|Classification of Dynamic Services|Authorization of Dynamic Services|Qualification of Dynamic Services|Allocation of QoS Information to Dynamic Services|Allocation of Charging Parameters to Dynamic Services|Generation of Dynamic PCC Rules|IP-CAN Session Reauthorization|Notification of Bearer Events to the AF|IP-CAN Session Termination|Service Data Flow Deactivation|Successful Resources Allocation|Network Location Information|IMS Related PCC Procedures over Rx|Gating Control|Support for SIP Forking|Single Radio Voice Call Continuity (SRVCC)|Handling of Race Conditions Related to Multiple AF Requests|Dynamic Policy Control Network Deployments|Dynamic Policy Control Traffic Cases|AF Session Lifetime|AF Session Establishment|AF Session Modification|AF Session Termination|Reauthorization of Dynamic Services|Notification of Bearer Events|Service Data Flow Deactivation|Successful Resources Allocation|Network Location Information (NetLoc)|IMS Related Procedures|SIP Forking|Single Radio Voice Call Continuity|Dynamic Policy Control Triggered by Application Service Detection|Dynamic QoS Control based on Detected Service|Deactivation of IP-CAN Session on Detection of Tethering Traffic|Handling of Race Conditions Related to Multiple AF Requests|Dynamic Policy Control Error Handling|Reference List|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.6.1|2.6.2|2.7|2.8|2.9|2.9.1|2.9.2|2.9.3|2.9.4|2.10|2.10.1|2.10.2|2.10.3|2.11|3|4|4.1|4.1.1|4.1.2|4.1.3|4.2|4.3|4.3.1|4.3.2|4.3.3|4.4|4.4.1|4.4.2|4.5|4.5.1|4.5.2|4.6|4.7|5|
|Introduction|Functions and Concepts|Types of Operation|Managed Object Model|Configuration Management|Fault Management|Security Management|$|1|2|2.1|3|4|5|6|
|Introduction|Document Purpose and Scope|Revision Information|Concepts|Solution Description|Solution Overview|Service Chaining|Use Case: Content Filtering|Restoration Procedures|Network Topology|Interface Description|Operation and Maintenance|Configuration Management|Configuring the subscriber data|Configuring BBSC Peers|Configuring the SOAP Notification Policies|Performance Management|Fault Management|Logging|Capabilities|Appendix A. Policy Tags|Glossary|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.2.1|2.3|3|4|5|5.1|5.1.1|5.1.2|5.1.3|5.2|5.3|5.4|6|7|8|9|
|Introduction|Audit Log|Syslog|Description of Syslog Entries|Audit Trail|Audit Trail in Syslog Example|$|1|2|2.1|2.2|3|3.1|
|$|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Rx Interface Overview|Document Content Conventions|Rx Interface Message Exchange|Diameter Base Protocol Messages|Rx Capability Negotiation|Device Watchdog|Disconnect Peer|Rx Interface Messages Format|Rx AA-Request (AAR)|Rx AA-Answer (AAA)|Rx Re-Auth-Request (RAR)|Rx Re-Auth-Answer (RAA)|Rx Abort-Session-Request (ASR)|Rx Abort-Session-Answer (ASA)|Rx Session-Termination-Request (STR)|Rx Session-Termination-Answer (STA)|Rx Interface AVPS|Rx Supported-Features|Media-Component-Description AVP|Flow-Description AVP|Rx Error Handling|Rx Protocol Errors|Rx Application Errors|Reference List|$|1|1.1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|4.8|5|5.1|5.2|5.3|6|6.1|6.2|7|
|Introduction|Scope|Traffic Key Performance Indicators|Gx CCR Failure Ratio|Gx CCR Establishment Failure Ratio|Gx CCR Failure owing to Congestion Ratio|Gx CCR Failure owing to Unable to Comply Ratio|Gx CCR Failure owing to Unknown Session Ratio|Gx CCR Failure owing to Authorization Rejected|Gx CCR Failure owing to Invalid Information Ratio|Gx RAR Failure Ratio|Gx RAR Time-out Ratio|Rx AAR/STR Failure Ratio|Rx AAR Failure owing to Congestion Ratio|Rx AAR Failure owing to Unable to Comply Ratio|Rx AAR Failure owing to Service Not Authorized Ratio|Rx AAR Failure owing to Invalid Information Ratio|Rx AAR Failure owing to Unknown Session Ratio|Rx RAR Failure Ratio|Rx RAR Time-out Ratio|Rx ASR Time-out Ratio|Sy SLR/STR Failure Ratio|Sy SLR/STR Answered with Error Ratio|Sy SNR Failure Ratio|Sy SNR Answered with Error Ratio|Sy SLR Time-out Ratio|Sy STR Time-out Ratio|Smp CCR Failure Ratio|Smp CCR Establishment Failure Ratio|Smp CCR Establishment Failure owing to Congestion Ratio|LDAP search request Failure Ratio|LDAP modify requests Failure Ratio|External Database SOAP notification request Failure Ratio|Capacity Key Performance Indicators|CPU Load|Memory Use|Subscribers|IP-CAN Mobile Sessions|IP-CAN Fixed Sessions|AF Sessions|Gx Transactions per Second|Rx Transactions per Second|Sy Transactions per Second|Smp Transactions per Second|$|1|1.1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|2.10|2.11|2.12|2.13|2.14|2.15|2.16|2.17|2.18|2.19|2.20|2.21|2.22|2.23|2.24|2.25|2.26|2.27|2.28|2.29|2.30|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|3.10|
|Introduction|Related Information|Key Features of ECLI|ECLI Modes|Start an ECLI Session|Use ECLI Online Features|Static Help|Information Model Help|Context-Sensitive Help|Auto-Completion|Navigate in MIB|Display ME Status|Change ME Configuration|Execute MO Actions|$|1|1.1|1.2|2|3|4|4.1|4.2|4.3|4.4|5|6|7|8|
|Database Access Introduction|Database Access Function|Database Access Function Overview|Supported external databases Technologies|Data Model Mapping|Write Operations|Data Combinations Use Cases|Performance Optimizations|Fallback Mechanism for Subscribers in External Databases|Database Access Operation and Maintenance|Configure Entity Data Sources|Configure LDAP User Authentication|Configure Use of LDAP Scope, Filter, Alias Dereferencing|Database Access Configuration Examples|Entity Data Definition Language|Database Access Fault Management|Database Access Logging|Database Access Performance Management|Reference List|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|4|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Availability and Scalability Introduction|Availability and Scalability Function|Availability|Scalability|Availability and Scalability Operational Conditions|Availability and Scalability External Conditions|Availability and Scalability Function Administration|Availability and Scalability Security|Reference List|$|1|2|2.1|2.2|3|3.1|3.2|3.3|4|
|Compatible Network Elements|$|1|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Overview|Description|Prerequisites|Procedure|Procedure in Mated SAPC (SAPC2)|Procedure in Live SAPC (SAPC1)|Start Mated SAPC (SAPC2) as Standby SAPC|$|1|1.1|1.2|2|2.1|2.2|2.3|
|Introduction|Related Information|Alarm Description|Procedure|$|1|1.1|2|3|
|Introduction|Document Purpose and Scope|Revision Information|Concepts|Overview|SOAP Protocol|SOAP Message Structure|Notification WSDL Data Structures|Envelope XML Elements|Header XML Elements|Body XML Elements|Bindings|SOAP HTTP Request|SOAP HTTP Answer|Error Handling|XML Schemas and WSDL|Message Examples|Glossary|Reference List|$|1|1.1|1.2|1.3|2|3|3.1|4|4.1|4.2|4.3|5|5.1|5.2|6|7|8|9|10|
|CNOM Overview|$|1|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Alarm Description|Prerequisites|Procedure|Analyzing Alarm|Actions for Authentication Failure|Actions for Directory Not Exist|Actions for Server Unreachable|Actions for Permission Denied|Actions for Undetermined Reason|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|2.5|2.6|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedures|Configure Active SAPC as Preferred|Configure Standby SAPC as Preferred|$|1|1.1|2|2.1|2.2|
|Introduction|Document Purpose and Scope|$|1|1.1|
|Introduction|Document Purpose and Scope|Concepts|Revision Information|Function|Overview|Notification Mechanism|Notification Policies|Events and Conditions Triggering Notifications|Notification Message Text|Notification Messages to Multiple Destinations|Notification Message Control|Notification Sending Procedure|Load Balancing Mechanism|Traffic Cases|SMS|SOAP|Capabilities|Restrictions|Security|Glossary|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|3|3.1|3.2|4|5|6|7|8|
|Flexible Output Protocol Function|Flexible Output Protocol Overview|Flexible Output Policies|Message Transformation Orders|Supported Protocols|Flexible Output Dictionary|Flexible Protocol Configuration|Provision Flexible Output Policies|Configure Message Transformation Orders|Configure Flexible Output Dictionary Syntax|Configuration Examples for Flexible Output Use Cases|Flexible Output Protocol Language Syntax|Configure AVP Values of OctetString Type|Flexible Output Protocol Message Transformation Orders|Transformation and Matching Criteria Specification|Appendix A. Flexible Output Policy Types|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.2|2.3|2.4|3|3.1|3.2|4|5|
|3GPP TS 29.212 Scope|3GPP TS 29.212 References|3GPP TS 29.212 Definitions and Abbreviations|Definitions|Abbreviations|Gx Reference Point|Overview|Gx Reference Model|PCC Rules|Functional Elements|PCC Procedures over Gx Reference Point|4a Gxx Reference Points|4b Sd Reference Point|Gx Protocol|Protocol Support|Initialization, Maintenance and Termination of Connection and Session|Gx Specific AVPs|Gx Re-Used AVPs|Gx Specific Experimental-Result-Code AVP Values|Gx Messages|5a Gxx Protocol|5b Sd Protocol|Annex A (Normative): Access specific aspects (GPRS)|A.1 Scope|A.2 Reference Model|A.2 Functional Elements|A.3 PCC Procedures|A.4 QoS Mapping|Annex B (Normative): Access Specific Aspects, 3GPP (GERAN/UTRAN/E-UTRAN) EPS|B.1 Scope|B.2 Functional Elements|B.3 PCC Procedures|Annex C (Informative)|Annex D (Normative): Access Specific Aspects (EPC-based Non-3GPP)|D.1Scope|D.2EPC-based eHRPD Access|D.3EPC-based Trusted WLAN Access with S2a|Annex E (Normative): Access Specific Aspects, Fixed Broadband Access Interworking with EPC|Annex G (Normative): Access Specific Aspects, Fixed Broadband Access Network Convergence|Annex E  F  H (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|5|5.1|5.2|5.3|5.4|5.5|5.6|6|7|8|8.1|8.2|8.3|8.4|8.5|9|9.1|9.2|9.3|10|11|11.1|11.2|11.3|12|13|14|15|
|3GPP TS 29.212 Scope|3GPP TS 29.212 References|3GPP TS 29.212 Definitions and Abbreviations|Definitions|Abbreviations|Gx Reference Point|Overview|Gx Reference Model|PCC Rules|Functional Elements|PCC Procedures over Gx Reference Point|4a Gxx Reference Points|4b Sd Reference Point|4c St Reference Point|Gx Protocol|Protocol Support|Initialization, Maintenance and Termination of Connection and Session|Gx Specific AVPs|Gx Re-Used AVPs|Gx Specific Experimental-Result-Code AVP Values|Gx Messages|5a Gxx Protocol|5b Sd Protocol|Annex A (Normative): Access specific aspects (GPRS)|A.1 Scope|A.2 Reference Model|A.2 Functional Elements|A.3 PCC Procedures|A.4 QoS Mapping|Annex B (Normative): Access Specific Aspects, 3GPP (GERAN/UTRAN/E-UTRAN) EPS|B.1 Scope|B.2 Functional Elements|B.3 PCC Procedures|Annex C (Informative)|Annex D (Normative): Access Specific Aspects (EPC-based Non-3GPP)|D.1Scope|D.2EPC-based eHRPD Access|D.3EPC-based Trusted WLAN Access with S2a|D.4EPC-based Untrusted WLAN Access|Annex E (Normative): Access Specific Aspects, Fixed Broadband Access Interworking with EPC|Annex G (Normative): Access Specific Aspects, Fixed Broadband Access Network Convergence|Annex H (Informative) Policy Control for Remote UEs behind a ProSe UE-to-network Relay UE|Annex E  F  I (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|4.8|5|5.1|5.2|5.3|5.4|5.5|5.6|6|7|8|8.1|8.2|8.3|8.4|8.5|9|9.1|9.2|9.3|10|11|11.1|11.2|11.3|11.4|12|13|14|15|16|
|Introduction|Alarm Description|Prerequisites|Procedure|Analyzing Alarm|Actions for Canceling Upgrade Process|Actions for Continuing from State WAITING_FOR_COMMIT|Actions for Continuing from State ACTIVATION_STEP_COMPLETED|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
