|Glossary of Terms and Acronyms Introduction|Terms|A-E|F-K|L-P|Q-T|U-Z|Glossary|$|1|2|2.1|2.2|2.3|2.4|2.5|3|
|Trademarks Used in Library|$|1|
|Free and Open Source Software Introduction|License Texts|BSD 2-clause License|BSD 3-clause License|BSD 4-clause License|Public Domain|Apache License Version 2.0|MIT License|Boost Software License 1.0, BSD like|ISC (Internet System Consortium)|Public Domain|GPL Version 2|LGPL Version 2.1|LGPL Version 3|GNU AFFERO GENERAL PUBLIC LICENSE version 3|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|2.10|2.11|2.12|2.13|
|Troubleshooting Introduction|Troubleshooting Tools|forall|immHelper|amfHelper|sapcHealthCheck|auto_provisioning|BackupFormatter|Troubleshooting Functions|Linux Consoles|Internal Database Command Line Tools|COM CLI|System Health Check|Processor Load (CPU and Memory)|Alarms and Notifications|Logging|Measurements|Core Files|System Messages|SAPC Reboot|Processor Lock and Unlock|Troubleshooting Procedure|Common Faulty Situations|General Failures|License Is Not Active|Processor Is Out of Service|Load Regulation|Provisioning Failures|Failures during the Initial Configuration and Provisioning in Cloud|Fair Usage Reporting Failures|Multi-access Failures|Diameter Connection Problems|Diameter Failures|DIAMETER RFC 6733 Messages Failures|Gx Failures|General Failures|Gx Access Control Failures|Gx QoS Control for the Default Bearer and the APN Failures|Gx Usage Reporting Failures|Rx Failures|Sy Failures|Smp Failures|End User Notifications Failures|External Database Failures|SOAP Notification Interface Failures|SC absence feature|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|3.10|3.11|3.12|4|5|5.1|5.1.1|5.1.2|5.1.3|5.2|5.3|5.4|5.5|5.5.1|5.5.2|5.5.2.1|5.5.3|5.5.3.1|5.5.3.2|5.5.3.3|5.5.3.4|5.5.4|5.5.5|5.5.6|5.6|5.7|5.8|5.9|
|Preventive Maintenance Introduction|Preventive Maintenance Tools|Maintenance Intervals|Maintenance Procedures|Check Active Alarms|Check the SAPC Status|Check High Availability State of a System Controller|Check PMF Measures|Check Core Files|Check CPU Load and Memory Usage|Check IMM Persistent Back End|Check Disk Space|Make System Data Backup|$|1|1.1|2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|
|Overview|Description|Prerequisites|Procedure|Creating SCTP Layer|Configuring SCTP|Recommended SS7 Parameters|SCTP Managed Object|SCTP End Point Profile Managed Object|Estimations of Userdata Transmit Buffer Size and Threshold of Userdata Transmit Buffer Size|Glossary|Reference List|$|1|1.1|1.2|2|2.1|2.2|3|3.1|3.2|3.3|4|5|
|Alarm Description|Procedure|Handle Alarm Certificate Management, a Valid Certificate Is Not Available|Install a Node Credential|Renew a Node Credential|Repair Automatic Configuration|$|1|2|2.1|2.2|2.3|2.4|
|Alarm Description|Procedure|Handle Alarm Local Authentication, Authentication Failure Limit Reached|$|1|2|2.1|
|Description|Cipher Filter String Format|Procedure|Configure TLS Ciphers|$|1|1.1|2|2.1|
|Maintenance Activities due to Faulty Blade Introduction|Prerequisites|Maintenance Activities due to Faulty Blade Procedure|System Controller Blades|Payload Blades|$|1|1.1|2|2.1|2.2|
|Introduction|Performance Measurement Groups|Measurements of Sctp PM Group|Measurements of SctpAssociation PM Group|$|1|2|3|4|
|Introduction|Measurement Report File|File Location|Filename Format|Time Format|File Format|Supported XML Elements and Attributes|Example File|Example File in UTC Format|$|1|2|2.1|2.2|2.3|2.4|3|4|5|
|Fair Usage Function|Fair Usage Overview|Fair Usage Control Options|Usage Limits Types|Fair Usage Control Granularity|Fair Usage Control Subscriptions Types|Usage Control at Subscriber or shared dataplan Level|Usage Limits Split in Intervals|Accumulate Usage Depending on Conditions|Usage Accumulators Life Cycle|Actions When Limit is Reached|Multiple Services Offering|Shared Subscriber Plans Support|Shared Devices Plans Support|Fair Usage Control Procedure|Usage Update|Selection of Reporting Groups|Status of Selected Reporting Groups|Quota Calculation|Quota Calculation for shared dataplans|Session Reauthorization|Force Usage Reporting from the PCEF|Access to Usage Information|Integration with an External Database|Usage Limits Aggregation|Fair Usage Network Deployment|Fair Usage Traffic Cases|Basic Traffic Case|Protocol Binding for Rel9 Gx onwards|Update subscriber profile|Update Usage Limits|Protocol Binding for Rel9 Gx onwards Update usage limits|Removal of Volume Limit|Protocol Binding Rel9 Gx onwards|Subscription Temporary Extension|Protocol Binding for Rel9 Gx onwards Subscription Temporary Extension|Update any subscriber data or subscriber qualification data|Conditional Accumulation Traffic Cases|Conditional Accumulation with Multiple IP-CAN Sessions|Protocol Binding for Rel 9 Gx|Accumulation based on time conditions and Bearer QoS change|Volume Usage at Reporting Group Level|Protocol Binding Rel 9 Gx|Time Usage Control|Protocol Binding Rel9 Gx onwards|Multiple Services Offering|Basic Turbo Button Traffic Case Based on Temporary Subscriber Groups|Protocol Binding for Rel9 Gx onwards|Advanced Turbo Button Traffic Case with Dynamic Group Selection Based on Usage Conditions|Multiple Packages Traffic Case|Shared Subscriber Plans|Prepaid and Postpaid Shared Subscriber Plans|Combination of individual and shared dataplan for a subscriber|Shared Devices Plans|Multi-SIM Data Plan with Shared Limit|Protocol Binding for Rel9 Gx onwards|Multi-SIM Data Plan with Device Limits|Protocol Binding for Rel9 Gx onwards|Interaction with External Database|Fair Usage Profile in External Database, Usage Accumulator in the SAPC Internal Database|Subscriber Information and Usage Accumulator in External Database|Reference List|$|1|1.1|1.2|1.2.1|1.2.2|1.2.3|1.2.4|1.2.5|1.3|1.4|1.5|1.6|1.7|1.8|1.9|1.9.1|1.9.2|1.9.2.1|1.9.3|1.9.3.1|1.9.4|1.9.4.1|1.10|1.11|1.12|2|3|3.1|3.1.1|3.2|3.2.1|3.2.1.1|3.2.2|3.2.2.1|3.2.3|3.2.3.1|3.2.4|3.3|3.3.1|3.3.1.1|3.3.2|3.4|3.4.1|3.5|3.5.1|3.6|3.6.1|3.6.1.1|3.6.2|3.6.3|3.7|3.7.1|3.7.2|3.8|3.8.1|3.8.1.1|3.8.2|3.8.2.1|3.9|3.9.1|3.9.2|4|
|Introduction|Functions and Concepts|Types of Operation|Managed Object Model|Configuration Management|$|1|2|2.1|3|4|
|Introduction|Notification Description|Notification Attributes|Procedure|$|1|2|2.1|3|
|Introduction|Notification Description|$|1|2|
|Introduction|Event Description|Information|Usage|Configuration|Subscription|$|1|2|2.1|2.2|2.3|2.4|
|Introduction|Document Purpose and Scope|Target Audience|SAPC Overview|Network Overview|SAPC Connected to the Gateway Routers of the External Network (Recommended)|SAPC Deployment Including VIP Gateway Routers to Interconnect the SAPC with the Gateway Routers of the External Network (To Be Deprecated)|Networks Description|Internal Networks|VIP Networks|External Networks|SysMGMT Network|Traffic Network Separation|VIP Address Allocation|Traffic Flows|Incoming Traffic|Outgoing Traffic|Security|$|1|1.1|1.2|2|3|3.1|3.2|4|4.1|4.2|4.3|4.4|5|6|7|7.1|7.2|8|
|$|
|Introduction|Typographic Conventions|General|SS7 CAF in CBA Environment|SS7 Stack System Overview|Control of SS7 CAF Component|Control of Processes within the SS7 CAF Component|SS7 CAF Packages|Backup and Restore operations|SS7 CAF and BRF|SS7 CAF and Scaling Operations|Scale-Out|Scale-In|Error Handling|SS7 CAF Configuration Interfaces|Signaling Manager|Configuring SS7 CAF|Defining New SS7 CAF Configuration|Multiple SCTP Processes per Blade|SCTP Only stack|SS7 CAF Configuration for Scaling Operations|Setup Parameters|ECM Active Host|Usage of IPv6|CP trace and logging facilities|ECM logging|SCTP Distributed End Points|eVIP Address as Common Parts Manager Address|LDE MIP Address as Common Parts Manager Address|NTF Alarms Configuration|General Configuration Recommendations|Save SS7 CAF Configuration|Generate (Export) SS7 CAF Configuration Files|Setting parameters for large eVIP configuration|SS7 CAF Performance Management|Network Examples|Software Development Kit|SDK Installation|SS7 CAF Troubleshooting|Reference List|$|1|1.1|2|2.1|2.2|2.3|2.4|2.5|3|3.1|4|4.1|4.2|4.3|5|5.1|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|6.8|6.9|6.10|6.11|6.12|6.13|6.14|6.15|6.16|6.17|7|8|9|9.1|10|11|
|Introduction|General|Starting the CLI|The User Interface|Shell Features|CLI Naming Conventions|Modifying MO Key Attributes|The Help System|Modes of Operation|Standards in Signaling Manager|File Versions in Signaling Manager|Common Use Cases|Creating Configuration|Activating Configuration|Process Handling|Monitoring|Migrating CLI Commands|Step-by-step Example|Reference List|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|3|3.1|3.2|3.3|3.4|3.5|4|5|
|Introduction|CPI Library Types|Document Formats|Active Library Explorer Variants|Active Library Explorer Functions|Active Library Explorer Window|Frames|Library Collections|Active Library Explorer Toolbar|Context Menu|Basic Functions|Back and Forward|Search|Document View Search Syntax|Instant Document Search|Advanced Search Options|Search Library Collections|Change Sort Order|Show All Titles and Show Context|Next Search Hit|Search in Document Frame|PDF and Excel Document Searches|Navigation|Library Front Page Images|Filter Displayed Contents|Set Filters|Hide Filter Library Contents|Reset Filters|Add Bookmarks|Copy Links to Clipboard|Copy Links to Clipboard in Microsoft Internet Explorer|Copy Links to Clipboard in Other Web Browser|Create and Display Annotations|Provide Feedback|Add Note|Edit Note|Delete Note|Print|Save Document to Local Disk|View PDF Version of Current Document|Open a Document in Separate Window|Get Help|Find Active Library Explorer Version|Active Library Explorer Server|Active Library Explorer for Windows|Download Latest Active Library Explorer Version|Access Active Library Explorer Libraries Using URL Hyperlinks|Internet Address and Parameters|Open Libraries|Search for Documents|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.2.1|3.2.2|3.2.3|3.2.4|3.2.5|3.2.6|3.2.7|3.2.8|3.2.9|3.3|3.4|3.5|3.5.1|3.5.2|3.5.3|3.6|3.7|3.7.1|3.7.2|3.8|3.9|3.9.1|3.9.2|3.9.3|3.10|3.11|3.12|3.13|4|5|5.1|5.2|5.3|6|6.1|6.2|6.3|
|Measurements Introduction|Measures|Gx Protocol Measures|Rx Protocol Measures|Sy Protocol Measures|Smp Protocol Measures|Fair Usage Control Measures|Notification Measures|Capacity Measures|Resources Measures|External Database Measures|Optional Measures|REST Provisioning Measures|Other Measures|Measurements Configuration|Managing Measurement Collection|Managing Threshold Monitoring|Performance Measurement Reports|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|2.10|2.11|2.12|3|3.1|3.2|4|
|General|Introduction|Terms|Concept|Compliance Lists|IETF - Stream Control Transmission Protocol|Notes|Reference List|$|1|1.1|1.2|1.3|2|2.1|3|4|
|Introduction|General Considerations|Scope, References and Abbreviations|Purpose and Scope|References and Terminology|Technical Report Impact|Business Requirements for Policy|Session-Based Policies|Wholesale Sessions|Application Admission Control|Session Resource Request initiation sources|Bandwidth|QoS|Security|IPv6 Support|Network Threat Detection|Multicast|Routing|Auditing, Service monitoring and Accounting|Charging|Deep Packet Inspection|Use Cases|Functional Architecture elements|BPC Framework Functional Architecture|Policy Enforcement Point (PEP)|Policy Decision Point (PDP)|Admission Control Function|Repository Function|Security Proxy/Gateway function|Application Function (AF)|AAA Server Function|BPC Framework Policy Control Framework Interfaces|BPC Framework PCF Deployment Functional Architecture Mapping onto TR-101 Functional Architecture|Informative AAA implementation examples|Informative PEP/PDP implementation examples|Policy Information Flows|Information Flow Objectives|Annex I (Informative). Relationship to other Broadband Techinical Reports|Annex II (Informative). Relationships with other Policy Control Standards|Annex III (Informative). Policy Information Objects Definitions|Reference List|$|1|2|3|3.1|3.2|4|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|5.9|5.10|5.11|5.12|5.13|5.14|6|7|7.1|7.2|7.3|7.4|7.5|7.6|7.7|7.8|7.9|7.10|7.11|7.12|8|8.1|9|10|11|12|
|$|
|System Administration Overview|Administration Interfaces and Tools|Interfaces|REST API|NETCONF|SSH|SFTP|SNMP|Tools|COM CLI|SSH|Configuration and Provisioning Overview|Configuration through COM|Performance Measures Management|Fault Management|Logging Management|Security Management|Startup and Shutdown|SAPC Restart|SAPC Stop|SAPC Start|Processor Restart|Directory Structure|Reference List|$|1|2|2.1|2.1.1|2.1.2|2.1.3|2.1.4|2.1.5|2.2|2.2.1|2.2.2|3|3.1|4|5|6|7|8|8.1|8.2|8.3|8.4|9|10|
|Introduction|Document Purpose and Scope|Disclaimer Note|Revision Information|Overview|Reference Architectures|3GPP Policy and Charging Control (PCC) Architecture|Broadband Forum (BBF) Broadband Policy Control Framework Architecture|3GPP and BBF Policy Convergence for Fixed Broadband and Mobile Broadband|ETSI Network Functions Virtualization (NFV) Framework|Naming Conventions|Solutions|SAPC in Ericsson Virtual Evolved Packet Core (Virtual EPC)|SAPC in Ericsson IMS|SAPC in Ericsson Wi-Fi Calling|SAPC in Ericsson Integrated Policy and Charging|SAPC in Ericsson SDN|Functions|Policy Management for Mobile, Fix, and Convergent Networks (Gx-based)|Policy Management for Wi-Fi Access|Subscription Management|Dynamic Policy Control|Integrated Policy and Charging - Policy Control Based on Spending Limits|Mobility Based Policy|External SPR Support|Time-Based Authorizations|Notifications to End-Subscribers or to External Systems|Reauthorization Upon Subscription Change|1+1 Geographical Redundancy|Flexible Output Protocol|UE Trace|Policy Studio|Fair Usage Policies|Other Supported Functions|Interfaces|Reference Model|Statement of Compliance|SW Architecture|Operation and Maintenance|Middleware|Provisioning|Node Configuration|Fault Management|Performance Management|Logging|Backup and Restore|Troubleshooting|License Management|Installation and Deployment|PNF Deployment|VNF Deployment|Glossary|Reference List|$|1|1.1|1.2|1.3|2|3|3.1|3.2|3.3|3.4|3.5|4|4.1|4.2|4.3|4.4|4.5|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|5.9|5.10|5.11|5.12|5.13|5.14|5.15|5.16|6|6.1|6.2|7|8|8.1|8.2|8.3|8.4|8.5|8.6|8.7|8.8|8.9|9|9.1|9.2|10|11|
|Description|Procedure|Disable SNMP Target|$|1|2|2.1|
|Description|Procedure|Cancel Backup and Restore Operation|$|1|2|2.1|
|Description|Procedure|Create Password Policy|$|1|2|2.1|
|Description|Procedure|View SSH Algorithms|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm Policy Control, Connection to External Repository Failed|$|1|2|2.1|
|Description|Prerequisites|Procedure|$|1|1.1|2|
|Smp Interface Overview|Document Content Conventions|Smp Message Exchange|Diameter Base Protocol Messages|Smp Capability Negotiation|Device Watchdog|Disconnect Peer|Smp Interface Messages Format|Smp Credit-Control-Request (CCR)|Smp Credit-Control-Answer (CCA)|Smp Interface AVPs|MIP6-Agent-Info AVP|Smp Error Handling|Smp Protocol Errors|Smp Application Errors|Reference List|$|1|1.1|2|3|3.1|3.2|3.3|4|4.1|4.2|5|5.1|6|6.1|6.2|7|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions and Abbreviations|Signalling Flows over Gx, Gxx, Rx, Sd, Sy, Np, Nt, St and S9|IP-CAN Session Establishment|IP-CAN Session Termination|IP-CAN Session Modification|Gateway Control Session Procedures|Multiple BBERF Signalling Flows|Application Detection and Enforcement Procedures|Spending Limits Procedures over Sy Reference Point|Call Flows for User Plane Congestion Management|Traffic Steering Control Procedures over St Reference Point|Negotiation for Future Background Data Transfer Procedure over Nt Reference Point|Binding Mechanism|Overview|Session Binding|PCC Rule Authorization and QoS Rule Generation|Bearer Binding|QoS Parameters Mapping|Overview|QoS Parameter Mapping Functions at AF|QoS Parameter Mapping Functions at PCRF|QoS Parameter Mapping Functions at PCEF|QoS Parameter Mapping Functions at UE for a UE-Initiated GPRS PDP Context|PCRF Addressing|General|DRA Definition|DRA Procedures|DRA Flows|Diameter Race Condition Handling|Overview|Procedures for Gx, Gxx, Sd and S9|Annex A (Informative): Examples of Deriving the Maximum Authorized Parameters from the SDP Parameters|Annex B (Normative): Signalling Flows for IMS|B.0 General|B.1 Subscription to Notification of Signalling Path Status at IMS Registration|B.1a Subscription to Notification of Change of IP-CAN Type at IMS Registration|B.1b Provisioning of SIP Signalling Flow Information at IMS Registration|B.2 IMS Session Establishment|B.3 IMS Session Modification|B.4 IMS Session Termination|B.5 P-CSCF Restoration|Annex C (Normative): NAT Related Procedures|C.1 Support for Media Traversal of NATs Using ICE|C.2 P-CSCF Procedures|C.3 PCRF Procedures|C.4 P_CSCF Procedures to Support Media Traversal through Hosted NAT without ICE|Annex D (Normative): Access Specific Procedures for GPRS|D.1 General|D.2 Binding Mechanisms|D.3 PCC Procedures|Annex E (Normative): Fixed Broadband Access Interworking with EPC|E.1 General|E.2 Definitions and Abbreviations|E.3 Binding Mechanisms|E.4 PCC Procedures|E.5 3GPP HNB Procedures  CS Support|E.6 PCRF Addressing|E.7 BPCF Addressing|E.8 Session Linking Function|Annex F (Normative): Access Specific Aspects, Fixed Broadband Access Network Convergence|Annex G (Normative): Diameter Overload Control Mechanism|Annex H (Normative): Access Specific Procedures for 3GPP EPS|Annex I (Normative): APN Matching Procedures|Annex J (Normative): Diameter Message Priority Mechanism|Annex K (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|4.8|4.9|4.10|5|5.1|5.2|5.3|5.4|6|6.1|6.2|6.3|6.4|6.5|7|7.1|7.2|7.3|7.4|8|8.1|8.2|9|10|10.1|10.2|10.3|10.4|10.5|10.6|10.7|10.8|11|11.1|11.2|11.3|11.4|12|12.1|12.2|12.3|13|13.1|13.2|13.3|13.4|13.5|13.6|13.7|13.8|14|15|16|17|18|19|20|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions and Abbreviations|Signalling Flows over Gx, Gxx, Rx, Sd, Sy, Np, Nt, St and S9|IP-CAN Session Establishment|IP-CAN Session Termination|IP-CAN Session Modification|Gateway Control Session Procedures|Multiple BBERF Signalling Flows|Application Detection and Enforcement Procedures|Spending Limits Procedures over Sy Reference Point|Call Flows for User Plane Congestion Management|Traffic Steering Control Procedures over St Reference Point|Negotiation for Future Background Data Transfer Procedure over Nt Reference Point|Binding Mechanism|Overview|Session Binding|PCC Rule Authorization and QoS Rule Generation|Bearer Binding|QoS Parameters Mapping|Overview|QoS Parameter Mapping Functions at AF|QoS Parameter Mapping Functions at PCRF|QoS Parameter Mapping Functions at PCEF|QoS Parameter Mapping Functions at UE for a UE-Initiated GPRS PDP Context|PCRF Addressing|General|DRA Definition|DRA Procedures|DRA Flows|Diameter Race Condition Handling|Overview|Procedures for Gx, Gxx, Sd and S9|Annex A (Informative): Examples of Deriving the Maximum Authorized Parameters from the SDP Parameters|Annex B (Normative): Signalling Flows for IMS|B.0 General|B.1 Subscription to Notification of Signalling Path Status at IMS Registration|B.1a Subscription to Notification of Change of IP-CAN Type at IMS Registration|B.1b Provisioning of SIP Signalling Flow Information at IMS Registration|B.1c Subscription to Notification of Change of PLMN Identifier at IMS Registration|B.2 IMS Session Establishment|B.3 IMS Session Modification|B.4 IMS Session Termination|B.5 P-CSCF Restoration|Annex C (Normative): NAT Related Procedures|C.1 Support for Media Traversal of NATs Using ICE|C.2 P-CSCF Procedures|C.3 PCRF Procedures|C.4 P_CSCF Procedures to Support Media Traversal through Hosted NAT without ICE|Annex D (Normative): Access Specific Procedures for GPRS|D.1 General|D.2 Binding Mechanisms|D.3 PCC Procedures|Annex E (Normative): Fixed Broadband Access Interworking with EPC|E.1 General|E.2 Definitions and Abbreviations|E.3 Binding Mechanisms|E.4 PCC Procedures|E.5 3GPP HNB Procedures  CS Support|E.6 PCRF Addressing|E.7 BPCF Addressing|E.8 Session Linking Function|Annex F (Normative): Access Specific Aspects, Fixed Broadband Access Network Convergence|Annex G (Normative): Diameter Overload Control Mechanism|Annex H (Normative): Access Specific Procedures for 3GPP EPS|Annex I (Normative): APN Matching Procedures|Annex J (Normative): Diameter Message Priority Mechanism|Annex K (Normative): Diameter Load Control Mechanism|Annex L (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|4.8|4.9|4.10|5|5.1|5.2|5.3|5.4|6|6.1|6.2|6.3|6.4|6.5|7|7.1|7.2|7.3|7.4|8|8.1|8.2|9|10|10.1|10.2|10.3|10.4|10.5|10.6|10.7|10.8|10.9|11|11.1|11.2|11.3|11.4|12|12.1|12.2|12.3|13|13.1|13.2|13.3|13.4|13.5|13.6|13.7|13.8|14|15|16|17|18|19|20|21|
|Alarm Description|Procedure|Handle Alarm License Management, Autonomous Mode Activated|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm License Management, Autonomous Mode Activated|Adjust License Management Configuration|Install New Capacity License|$|1|2|2.1|2.2|2.3|
|Alarm Description|Procedure|Handle Alarm License Management, Emergency Unlock Reset Key Required|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm License Management, Key File Fault|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm License Management, License Key Not Available|$|1|2|2.1|
|Introduction|Other Network Elements|General Impact|Capacity and Performance|Configuration|Changes in Upgrade Procedure|Upgrade Impact in UDC|BackupFormatter Tool|IP Network Design|Other Impacts|Impacts on Basic Functions|Event Triggers Selection|Flexible Output Protocol|PCEF Restart and PCEF Removal|Policy Studio Improvements in SAPC 1.0|Diameter Race Conditions and Concurrent Reauthorizations over Gx|Performance Data Collection Support|Virtualization and Cloud Improvements in SAPC 1.0|CNOM Support|NB-IoT RAT-Type Support|Virtualization and Cloud Improvements in SAPC 1.1|Session Release due to Subscription Removal|Policy Studio Improvements in SAPC 1.1|Extended QCI Support|Session Cleanup Mechanism Due to Inactivity|UE Trace Tool|Flexible ARP Mapping|CNOM Support Improvements in SAPC 1.1.1|UE Trace Improvements in SAPC 1.1.1|Security Management Improvements in SAPC 1.1.1|Policy Studio Improvements in SAPC 1.1.1|Virtualization and Cloud Improvements in SAPC 1.1.1|Impacts on Optional Functions|Presence Reporting Area|Emergency Services|External Database Redundancy Support (1+1+1)|Mobility Based Policy Control for Overlay Deployments|AF Restart|Overload Protection of Priority Services|IMS Restoration|Network Location Information for Untrusted WLAN|Notification of Signalling Path Status|Geographical Redundancy Active-Active|IP-CAN Type Change Notification|Usage Limits Aggregation|Delay PCC Rules Installation for Preliminary Service Information|$|1|1.1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|3.10|3.11|3.12|3.13|3.14|3.15|3.16|3.17|3.18|3.19|3.20|3.21|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|4.8|4.9|4.10|4.11|4.12|4.13|
|Description|Procedure|Enable SNMP Target|$|1|2|2.1|
|Description|Procedure|Create Backup|$|1|2|2.1|
|Description|Procedure|Install or Renew Node Credential by CSR|$|1|2|2.1|
|Description|Procedure|Change Password Policy|$|1|2|2.1|
|Description|Procedure|View Authentication Method Order|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm Policy Control, Number of AAAs Initial Sent Indicating Too Busy Reached|$|1|2|2.1|
|Integration with OCS for Monetary Spending Limit Reporting (Sy) Introduction|Integration with OCS Function|Overview|Policy Counter|Determination of Policy and Charging Control Information to Install in PCEF|Ericsson Sy: Integration with Charging System|Policy Group|Subscriber Data Distribution|Integration with Multiple Online Charging Systems|Network Deployments|Traffic Cases|Bill Shock Prevention|Use of Policy Counters Status during IP-CAN session Life Cycle|Policy Counter Status Change|Centralized Management of Operator Service Offering|Use of Policy Counters and Policy Group Information during IP-CAN session Life Cycle|Policy Counter Status Change|Counter Status Change, Bearer QoS Change|Policy Group Update: Turbo Button Purchase|New Policy Group Added|Operator Network Policies, Abusers Example|Connectivity with the Online Charging System|Failure Handling|SLR Failure|SNR Failure|STR Failure|Reference List|$|1|2|2.1|2.2|2.3|2.4|2.4.1|2.4.2|2.5|3|4|4.1|4.1.1|4.1.2|4.2|4.2.1|4.2.2|4.2.2.1|4.2.3|4.2.3.1|4.3|4.4|4.5|4.5.1|4.5.2|4.5.3|5|
|Introduction|Functions and Concepts|Types of Operation|Managed Object Model|Configuration Management|$|1|2|2.1|3|4|
|Introduction|Solution Description|Solution Overview|SAPC Data Model for UDC|Connection Handling|CUDB Geographical Redundancy (1+1+1) Support|Failure in LDAP Operations|Overload Protection on IP BB Delayed Responses|CUDB Overload|Interfaces Description|LDAP Interface|SOAP Interface|Operation and Maintenance|Configure Database Access in the SAPC|Configure SOAP Notifications in CUDB|Subscriber Data Extension in CUDB|LDAP Operations for Provisioning System|Alarms|Logging|Capabilities|Glossary|Reference List|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|3|3.1|3.2|4|4.1|4.2|4.3|4.4|4.5|4.6|5|6|7|
|Configuration and Provisioning Overview|Other Conventions|Configuration Prerequisites|Subscription and Policies Data Overview|Provision Subscribers|Provision Subscriber Groups|Provision Global Subscriber Group|Provision Subscribers|Subscriber Identifiers|Handling of Multiple Service Offerings|Configure Dynamic Group Selection|Handling of Unknown Subscribers|Autoprovisioning|Unknown Subscriber|Unknown Subscriber EDSources pointing to the SAPC internal database|Unknown and Autoprovisioning Precedence|Provision Policies|Policies Basic Concepts|Provisioning Policies|Policy Types|Policy Tags|Appendix A. Condition Policy Language|Condition Formula Examples|Condition Formula Language|Condition Formula Operators|Condition Formula Expressions|Reference List|$|1|1.1|2|3|4|4.1|4.1.1|4.2|4.2.1|4.3|4.4|4.5|4.5.1|4.5.2|4.5.3|4.5.4|5|5.1|5.2|5.3|5.4|6|6.1|6.2|6.2.1|6.2.2|7|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions and Abbreviations|High Level Requirements|General Requirements|Charging Related Requirements|Policy Control Requirements|Usage Monitoring Control|Application Detection and Control|RAN User Plane Congestion Detection, Reporting and Mitigation|Support for Service Capability Exposure|Traffic Steering Control|Architecture Model and Reference Points|Reference Architecture|Reference Points|Functional Description|Overall Description|Functional Entities|Policy and Charging Control Rule|IP-CAN Bearer and IP CAN Session Related Policy Information|Quality of Service Control Rule|Usage Monitoring Control Specific Information|S2c Based IP Flow Mobility Routing Rule|Application Detection and Control Rule|Policy Decisions Based on Spending Limits|Traffic Steering Control Information|NBIFOM Routing Rule|PCC Procedures and Flows|Introduction|IP-CAN Session Establishment|IP-CAN Session Termination|IP-CAN Session Modification|Update of the Subscription Information in the PCRF|PCRF Discovery and Selection|Gateway Control Session Procedures|Change in Subscription for MPS Priority Services|Procedures over Sy Reference Point|Procedures over Np Reference Point|Procedures over Nt reference point|Annex A (Normative): Access Specific Aspects (3GPP)|A.1 GPRS|A.2 Void|A.3 Void|A.4 3GPP Accesses (GERAN/UTRAN/E-UTRAN) - GTP-Based EPC|A.5 3GPP Accesses (GERAN/UTRAN/E-UTRAN) - PMIP-Based EPC|Annex B (Informative): Void|Annex C (Informative): Void|Annex D (Informative): Access Specific Aspects (Non-3GPP)|Annex E (Informative): Void|Annex F (Informative): Void|Annex G (Informative): PCC Rule Precedence Configuration|Annex H (Normative): Access Specific Aspects (EPC-Based Non-3GPP)|H.1 General|H.2 EPC-Based cdma2000 HRPD Access|H.3 EPC-Based Trusted WLAN Access with S2a|H.4 EPC-Based Untrusted Non-3GPP Access|Annex I (Informative): Void|Annex J (Informative): Standardized QCI Characteristics - Rationale and Principles|Annex K (Informative): Limited PCC Deployment|Annex L (Normative): Limited PCC Deployment|Annex M (Informative): Handling of UE or Network Responsibility for the Resource Management of Services|Annex N (Informative): PCC Usage for Sponsored Data Connectivity|Annex P (Normative): Fixed Broadband Access Interworking with EPC|Annex Q (Informative): How to Achieve Usage Monitoring via the OCS|Annex R (Informative): Disabling/Re-Enabling Usage Monitoring for a PCC/ADC Rule|Annex S (Normative): Fixed Broadband Access|Annex T (Informative): How to Accumulate PCC/ADC Rule Usage in Multiple Monitoring Groups|Annex U (Normative): Policy and Charging Control in the Downlink Direction for Traffic Marked with DSCP by the TDF|Annex V (Informative): Policy Control for Remote UEs behind a ProSe UE-to-Network Relay UE|Annex W (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|4.8|5|5.1|5.2|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|6.8|6.9|6.10|6.11|7|7.1|7.2|7.3|7.4|7.5|7.6|7.7|7.8|7.9|7.10|7.11|8|8.1|8.2|8.3|8.4|8.5|9|10|11|12|13|14|15|15.1|15.2|15.3|15.4|16|17|18|19|20|21|22|23|24|25|26|27|28|29|30|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions and Abbreviations|High Level Requirements|General Requirements|Charging Related Requirements|Policy Control Requirements|Usage Monitoring Control|Application Detection and Control|RAN User Plane Congestion Detection, Reporting and Mitigation|Support for Service Capability Exposure|Traffic Steering Control|Management of Packet Flow Descriptions in the PCEF/TDF Using the PFDF|Architecture Model and Reference Points|Reference Architecture|Reference Points|Functional Description|Overall Description|Functional Entities|Policy and Charging Control Rule|IP-CAN Bearer and IP CAN Session Related Policy Information|Quality of Service Control Rule|Usage Monitoring Control Specific Information|S2c Based IP Flow Mobility Routing Rule|Application Detection and Control Rule|Policy Decisions Based on Spending Limits|Traffic Steering Control Information|NBIFOM Routing Rule|PCC Procedures and Flows|Introduction|IP-CAN Session Establishment|IP-CAN Session Termination|IP-CAN Session Modification|Update of the Subscription Information in the PCRF|PCRF Discovery and Selection|Gateway Control Session Procedures|Change in Subscription for MPS Priority Services|Procedures over Sy Reference Point|Procedures over Np Reference Point|Procedures over Nt reference point|Procedures for Management of PFDs|Annex A (Normative): Access Specific Aspects (3GPP)|A.1 GPRS|A.2 Void|A.3 Void|A.4 3GPP Accesses (GERAN/UTRAN/E-UTRAN) - GTP-Based EPC|A.5 3GPP Accesses (GERAN/UTRAN/E-UTRAN) - PMIP-Based EPC|Annex B (Informative): Void|Annex C (Informative): Void|Annex D (Informative): Access Specific Aspects (Non-3GPP)|Annex E (Informative): Void|Annex F (Informative): Void|Annex G (Informative): PCC Rule Precedence Configuration|Annex H (Normative): Access Specific Aspects (EPC-Based Non-3GPP)|H.1 General|H.2 EPC-Based cdma2000 HRPD Access|H.3 EPC-Based Trusted WLAN Access with S2a|H.4 EPC-Based Untrusted Non-3GPP Access|Annex I (Informative): Void|Annex J (Informative): Standardized QCI Characteristics - Rationale and Principles|Annex K (Informative): Limited PCC Deployment|Annex L (Normative): Limited PCC Deployment|Annex M (Informative): Handling of UE or Network Responsibility for the Resource Management of Services|Annex N (Informative): PCC Usage for Sponsored Data Connectivity|Annex P (Normative): Fixed Broadband Access Interworking with EPC|Annex Q (Informative): How to Achieve Usage Monitoring via the OCS|Annex R (Informative): Disabling/Re-Enabling Usage Monitoring for a PCC/ADC Rule|Annex S (Normative): Fixed Broadband Access|Annex T (Informative): How to Accumulate PCC/ADC Rule Usage in Multiple Monitoring Groups|Annex U (Normative): Policy and Charging Control in the Downlink Direction for Traffic Marked with DSCP by the TDF|Annex V (Informative): Policy Control for Remote UEs behind a ProSe UE-to-Network Relay UE|Annex W (Informative): Void|Annex X (Informative): Encrypted Traffic Detection by Using Domain Name Matching|Annex Y (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|4.8|4.9|5|5.1|5.2|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|6.8|6.9|6.10|6.11|7|7.1|7.2|7.3|7.4|7.5|7.6|7.7|7.8|7.9|7.10|7.11|7.12|8|8.1|8.2|8.3|8.4|8.5|9|10|11|12|13|14|15|15.1|15.2|15.3|15.4|16|17|18|19|20|21|22|23|24|25|26|27|28|29|30|31|32|
|Description|Procedure|Create SNMP View|$|1|2|2.1|
|Description|Procedure|Restore Backup|$|1|2|2.1|
|Description|Procedure|Cancel Offline Enrollment|$|1|2|2.1|
|Description|Procedure|Delete Password Policy|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm Policy Control, Number of Gx CCAs Initial Sent Indicating Too Busy Reached|$|1|2|2.1|
|Description|Procedure|$|1|2|
|Introduction|Document Purpose and Scope|Target Groups|Prerequisite Knowledge|Overview|Getting Started|System Prerequisites|Software Prerequisites|Node.js|MongoDB|Downloading the Software and Preparing the Installation|Installation|User Roles|Administrator|Operator|Viewer|Connectivity and Security Management|Certificate between the Policy Studio and the SAPC|Certificate between the web browser and the Policy Studio|Working with The Policy Studio|Accessing The Policy Studio|Logon|System Administrator Logon|Operator and Viewer Logon|Improving Policy Studio Performance with NGINX|Operation And Maintenance|Backup and Data Restore|Backup Procedure|Restore Procedure|Logging Management|Troubleshooting|Administrator Password Recovery|Restart the Policy Studio|Upgrade|Rollback|SAPC Functionality Not Supported|REST resources|Functions|Contents|Dataplans|Subscribers|Rules|Policy Tags|Condition Formula Expressions|Condition Formula Operators|Limitations|Dataplans|Profiles|Global Policies|Export Functionality|Import Functionality|$|1|1.1|1.2|1.2.1|2|3|3.1|3.2|3.2.1|3.2.2|3.3|3.4|3.5|3.5.1|3.5.2|3.5.3|3.6|3.6.1|3.6.2|4|4.1|4.2|4.2.1|4.2.2|4.2.3|5|5.1|5.1.1|5.1.2|5.2|5.3|5.3.1|5.3.2|5.4|5.5|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|6.8|6.9|7|7.1|7.2|7.3|7.4|7.5|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions, Symbols, and Abbreviations|Rx Reference Point|Overview|Rx Reference Model|Functional Elements|PCC Procedures over Rx Reference Point|Rx Protocol|Protocol Support|Initialization, Maintenance and Termination of Connection and Session|Rx Specific AVPs|Rx Re-Used AVPs|Rx Specific Experimental-Result-Code AVP Values|Rx Messages|Annex A (Normative) IMS Related P-CSCF Procedures over Rx|A.1 Provision of Service Information at P-CSCF|A.2 Enabling of IP Flows|A.3 Support for SIP Forking|A.4 Notification of AF Signalling Transmission Path Status|A.5 Indication of Emergency Session|A.6 Notification IP-CAN Type Change|A.7 Support for Early Session Disposition SDP|A.8 Provision of Signalling Flow Information at P-CSCF|A.9 Handling of MPS Session|A.10 Retrieval of Network Provided Location Information|A.11 Handling of RAN/NAS Release Cause Values|A.12 Resource Sharing|A.13 Handling of MCPTT Priority Call|Annex B (Normative) Flow Identifiers: Format Definition and Examples|Annex C (Informative): Void|Annex D (Normative): Monitoring Related SCEF Procedures over Rx|Annex E (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|5|5.1|5.2|5.3|5.4|5.5|5.6|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|6.8|6.9|6.10|6.11|6.12|6.13|7|8|9|10|11|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions, Symbols, and Abbreviations|Rx Reference Point|Overview|Rx Reference Model|Functional Elements|PCC Procedures over Rx Reference Point|Rx Protocol|Protocol Support|Initialization, Maintenance and Termination of Connection and Session|Rx Specific AVPs|Rx Re-Used AVPs|Rx Specific Experimental-Result-Code AVP Values|Rx Messages|Annex A (Normative) IMS Related P-CSCF Procedures over Rx|A.1 Provision of Service Information at P-CSCF|A.2 Enabling of IP Flows|A.3 Support for SIP Forking|A.4 Notification of AF Signalling Transmission Path Status|A.5 Indication of Emergency Registration and Session Establishment|A.6 Notification IP-CAN Type Change|A.7 Support for Early Session Disposition SDP|A.8 Provision of Signalling Flow Information at P-CSCF|A.9 Handling of MPS Session|A.10 Retrieval of Network Provided Location Information|A.11 Handling of RAN/NAS Release Cause Values|A.12 Resource Sharing|A.13 Handling of MCPTT Priority Call|A.14 Notification of PLMN Change|Annex B (Normative) Flow Identifiers: Format Definition and Examples|Annex C (Informative): Void|Annex E (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|5|5.1|5.2|5.3|5.4|5.5|5.6|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|6.8|6.9|6.10|6.11|6.12|6.13|6.14|7|8|9|10|
|Introduction|Hazard Symbols and Admonitions|General Safety Precautions|Electric Shock Hazards|Safety Precautions for Working with Electrical Equipment|Energy Hazards|Fire Hazard|Fire Precautions|Heat Hazards|Mechanical Hazards|Radio Frequency Exposure Hazards|Laser Hazards|Chemical Hazards|Beryllium Oxide Hazard|Battery Acid Hazard|Gas Explosion Hazard|Refrigerant Hazard|Other Hazards|Handling Heavy Goods|Working at Height|$|1|2|3|4|4.1|5|6|6.1|7|8|9|10|11|11.1|11.2|11.3|11.4|12|12.1|12.2|
|Introduction|Target Group|Educational Requirements|Admonitions and Safety Symbols|Special Hazard Symbols|Batteries|Overheated Batteries|Treating Hazardous Waste from Leaks|Electrical Installation|Safety Precautions for Working with Electrical Installations|Electrostatic Discharge|Handling Printed Board Assemblies and IC Components|Storing and Transporting Printed Board Assemblies and IC Components|Equipment Handling|Ground Connection|Lightning Protection|System, Data, and Traffic Protection|$|1|1.1|1.2|2|2.1|3|3.1|3.2|4|4.1|5|5.1|5.2|6|7|8|9|
|Alarm Description|Procedure|Handle Alarm eVIP, Gateway Unavailable|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm eVIP, IKE Distribution Not Possible|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm eVIP, IPSEC Tunnel Fault|$|1|2|2.1|
|Description|Procedure|Check Alarm Status|$|1|2|2.1|
|Description|Procedure|Delete Backup|$|1|2|2.1|
|Description|Procedure|Install or Renew Node Credential by PKCS#12|$|1|2|2.1|
|Description|Procedure|Change Password Quality Configuration|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm Policy Control, Geographical Redundancy Unable To Reach Peer|$|1|2|2.1|
|Description|Procedure|Disable Active-Active Geographical Redundancy|Administrative Procedure|Enable Active-Active Geographical Redundancy|$|1|2|2.1|2.2|2.3|
|Active-Active Geographical Redundancy Introduction|Active-Active Geographical Redundancy Concepts|Active-Active Geographical Redundancy Function|Active-Active Geographical Redundancy Overview|Active-Active Geographical Redundancy Data Mirroring|Active-Active Geographical Redundancy Network traffic handling|Active-Active Geographical Redundancy States|Active-Active Geographical Redundancy Supervision and Control Functions|Active-Active Geographical Redundancy Traffic Cases|SAPC in Distributed state restarts|Replication Channel unavailable but Application Channel available|Both Replication Channel and Application Channel unavailable|Active-Active Geographical Redundancy Capabilities|Reference List|$|1|1.1|2|2.1|2.2|2.3|2.4|2.5|3|3.1|3.2|3.3|4|5|
|Alarm Description|Procedure|Handle Alarm LOTC Disk Replication Consistency|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm LOTC Disk Usage|Handle Partition '/' over Threshold Value|Handle Partition '/boot' over Threshold Value|Handle Partition '/var/log' over Threshold Value|Handle Partition '/cluster' over Threshold Value|$|1|2|2.1|2.2|2.3|2.4|2.5|
|Alarm Description|Procedure|Handle Alarm LOTC Ethernet Bonding|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm LOTC Memory Usage|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm LOTC Time Synchronization|Handle Reason Time Difference over Threshold|Handle Reason Unusable Time Servers|Handle Reason Rejected Time Servers|Handle Reason Unreachable Time Servers|$|1|2|2.1|2.2|2.3|2.4|2.5|
|Alarm Description|Procedure|Handle Alarm LOTC Disk Replication Communication|$|1|2|2.1|
|Description|Procedure|Change Alarm Type Severity|$|1|2|2.1|
|Description|Procedure|Generate Fingerprint for A File|$|1|2|2.1|
|Description|Procedure|Create Account Policy|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm Policy Control, Number of Sx CCAs Initial Sent Indicating Too Busy|$|1|2|2.1|
|Description|Prerequisites|Procedures|Change Preferred Role in Both SAPCs|$|1|1.1|2|2.1|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions, Symbols and Abbreviations|User Data Convergence Architecture|UDC System Architecture|Functional Entities|Reference Point Ud|Front-End Session|UDR Session|User Data Convergence Information Flows|General|Requirements|Querying Data from the UDR|Creating Data within the UDR|Deleting Data from the UDR|Updating Data within the UDR|Subscription to Notifications|Notification of Data Modification|Annex A (Informative): Information Flows|Annex B (Informative): Applicability of the UDC Concept to Network Nodes|Annex C (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|6|7|8|9|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions, Symbols and Abbreviations|User Data Convergence Architecture|UDC System Architecture|Functional Entities|Reference Point Ud|Front-End Session|UDR Session|User Data Convergence Information Flows|General|Requirements|Querying Data from the UDR|Creating Data within the UDR|Deleting Data from the UDR|Updating Data within the UDR|Subscription to Notifications|Notification of Data Modification|Annex A (Informative): Information Flows|Annex B (Informative): Applicability of the UDC Concept to Network Nodes|Annex C (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|6|7|8|9|
|Description|Procedure|View License Information|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm COM SA, MDF Detected Model Error|$|1|2|2.1|
|Description|Procedure|Check General System Attributes|$|1|2|2.1|
|Description|Procedure|View Progress Report|$|1|2|2.1|
|Description|Procedure|Change Account Policy|$|1|2|2.1|
|Active-Standby Geographical Redundancy Introduction|Active-Standby Geographical Redundancy Concepts|Active-Standby Geographical Redundancy Function|Active-Standby Geographical Redundancy Overview|Active-Standby Geographical Redundancy Data Mirroring|Redundant Data|Backlog|SAPC DBS Synchronization|Active-Standby Geographical Redundancy Network traffic handling|Hot Standby Concepts|Active SAPC|Standby SAPC|Preferred SAPC|Active-Standby Geographical Redundancy Network connectivity|Active-Standby Geographical Redundancy States|Transition between States|Transitions from Initial State|Transitions from Active State|Transitions from Standby State|Transitions from Halted State|Active-Standby Geographical Redundancy Supervision and Control Functions|Mated Peer Supervision|Fault Detection and Recovery|Split Brain Scenario|Simultaneous SAPC Restart|Temporary Differences between Databases|Handling of the SAPC Origin State Id|Active-Standby Geographical Redundancy Traffic Cases|Active SAPC Restarts|Standby SAPC Restarts|Replication Channel Unavailable|Active-Standby Geographical Redundancy Capabilities|Reference List|$|1|2|3|3.1|3.2|3.2.1|3.2.2|3.2.3|3.3|3.3.1|3.3.1.1|3.3.1.2|3.3.1.3|3.3.2|3.4|3.4.1|3.4.1.1|3.4.1.2|3.4.1.3|3.4.1.4|3.5|3.5.1|3.5.2|3.5.2.1|3.5.2.2|3.5.2.3|3.5.3|4|4.1|4.2|4.3|5|6|
|Configuration and Provisioning Overview|Other Conventions|Configuration Prerequisites|Configure Gx PCEFs for Usage Reporting|Configure Event-Triggers|Provision Fair Usage Profile|Provision Postpaid Subscriptions|Provision Prepaid Subscriptions|At Subscriber Level|At Subscriber Group Level|Intermediate Limits|Complementary Limits|Autoprovisioning and Fair Usage|Provision Shared Subscriber Plans|Configure Policy Control Based on Fair Usage|Provision Accumulation Policies|Complementary usage accumulators Based on Conditions|Usage Reporting Based on Multiple Gx|Monitor usage accumulators|Monitor Subscriber usage accumulators|Monitor Shared Dataplan usage accumulators|Configure Usage Limits Aggregation|Configuration Examples for Use Cases|Basic Turbo Button Based on Temporary Subscriber Groups|Advanced Turbo Button with Dynamic Group Selection Based on Fair Usage|Shared Subscriber Plans Use Cases|Shared and Individual Limits for Members|Category Limits for shared dataplan Members|Monitoring Shared Subscriber Plan Members|Combining Individual Plans and Shared Subscriber Plan|Individual and Shared Plans for Different Reporting Groups|Plans for the Same Reporting Group Prioritizing the Individual Plan|Plans for the Same Reporting Group Prioritizing the Shared Subscriber Plan|Usage Limits Aggregation|Appendix A. Fair Usage Policy Types|Appendix B. Fair Usage Policy Tags|Fair Usage Policy Tags in Dynamic Group Selection Policies|Reference List|$|1|1.1|2|3|4|5|5.1|5.2|5.2.1|5.2.2|5.3|5.4|5.5|6|7|8|8.1|9|10|10.1|10.2|11|12|12.1|12.2|12.3|12.3.1|12.3.2|12.3.3|12.3.4|12.3.4.1|12.3.4.2|12.3.4.3|12.4|13|14|14.1|15|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions and Abbreviations|Sy Reference Point|Overview|Sy Reference Model|Subscriber Spending Limits|Functional Elements|Spending Limits Procedures over Sy Reference Point|Sy Protocol|Protocol Support|Initialization and Maintenance of Connection and Session|Sy Specific AVPs|Sy Re-Used AVPs|Sy Specific Experimental-Result-Code AVP Values|Sy Messages|Annex A (Normative): User Identity for Fixed Broadband Access Network Convergence|Annex B (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|5|5.1|5.2|5.3|5.4|5.5|5.6|6|7|8|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions and Abbreviations|Sy Reference Point|Overview|Sy Reference Model|Subscriber Spending Limits|Functional Elements|Spending Limits Procedures over Sy Reference Point|Sy Protocol|Protocol Support|Initialization and Maintenance of Connection and Session|Sy Specific AVPs|Sy Re-Used AVPs|Sy Specific Experimental-Result-Code AVP Values|Sy Messages|Annex A (Normative): User Identity for Fixed Broadband Access Network Convergence|Annex B (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|5|5.1|5.2|5.3|5.4|5.5|5.6|6|7|8|
|General|Workflow|Mandatory Data|Data Collection|Data Collected Based on Specific Problem Types|Database General Problems in the SAPC|Active-Standby Geographical Redundancy Problems in the SAPC|Active-Active Geographical Redundancy Problems in the SAPC|Software License Problems in the SAPC|Other Useful Information|Performance Data Collector Reports|Appendix A: Severity/Priority|$|1|2|3|3.1|4|4.1|4.2|4.3|4.4|5|5.1|6|
|Introduction|Functions and Concepts|Types of Operation|Managed Object Model|Configuration Management|Fault Management|Security Management|$|1|2|2.1|3|4|5|6|
|Library Overview Introduction|Structure of the CPI Library|Contents of CPI Library|Safety and Environment|Library Overview|Product Overview|Planning|Operation and Maintenance|Fault Management|Configuration Management|Performance Management|Logging Management|Scaling Management|Security Management|Software Management|Hardware Management|Network Management|Geographical Redundancy|Managed Object Model (MOM)|Emergency|Interface|How to Read the CPI|$|1|2|3|3.1|3.2|3.3|3.4|3.5|3.5.1|3.5.2|3.5.3|3.5.4|3.5.5|3.5.6|3.5.7|3.5.8|3.5.9|3.5.10|3.5.11|3.6|3.7|4|
|Description|Procedure|List Supported XML Model Files|$|1|2|2.1|
|Description|Procedure|Schedule Single Backup|$|1|2|2.1|
|Description|Procedure|Delete Account Policy|$|1|2|2.1|
|Session Inactivity Cleanup Mechanism Overview|Session Inactivity Cleanup Mechanism Prerequisites|Session Inactivity Cleanup Mechanism Procedure|Enabling/disabling the mechanism|Scheduling the mechanism|Setting up the session inactivity time|Setting up the cleanup duration|Setting up cleaning mode|Showing the current configuration|$|1|2|3|3.1|3.2|3.3|3.4|3.5|3.6|
|Function|Overview|Smp Session Access Control|PDN-GW Selection|SPID Selection|Subscriber Profile Handling|Network Deployments|Traffic Cases|Smp Session Lifecycle at UE Attach or PDN Connectivity|Smp Session Lifecycle at Inter SGSN-MME TAU or Handover|Error Handling|Restrictions|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|2|3|3.1|3.2|3.3|4|5|
|Configure Access and Charging Overview|Other Conventions|Configuration Prerequisites|Configure Gx Diameter Network Data|Configure Gx PCEFs|Support for interoperability with PCEFs handling Gx Rel9 versions 9.1.0 or 9.0.0|Configure PCEFs for Interworking with Clustered Diameter Systems|Configure Multiple Gx Scenario|Configure Event Triggers Selection|Provision Unconditionally Event Triggers Selection|Provision Event Trigger Selection Policies|Combining Static Qualification and Policies for Event Triggers|Provision Services|Set PCC rules|Configure IP-CAN Session Access Control|Configure Service Access Control|Provision Policies for Service Authorization|Example of Service Authorization - Global policy for Chat service|Example of Service Authorization - Subscriber policy for Streaming service|Configure One Time Redirect|Provision Static Service Policies|Rule Spaces|Provision Rule Spaces|Policies for Rule Space Negotiation|Configure Service Charging Control|Static Services|Preconfigured Services|Provision Qualification Data for Subscriptions|Provision Qualification for Subscriber or Subscriber Group Unconditionally|Provision Qualification for Subscriber or Subscriber Group Conditionally (depending on policies)|Configure Subscriber Charging Control|Provision Charging System Profiles|Provision Subscriber Charging Profiles|Configure Charging Characteristics Information|Provision Unconditional Subscriber Charging Data to Subscriber or Subscriber Groups|Provision Conditional Subscriber Charging Data with Policies|Configure Content Filtering Control|Provision Content Filtering for Subscribers or Subscriber Groups.|Provision Content Filtering Policies|Configure Header Enrichment|Configure Presence Reporting Area|Provision Presence Reporting Area|Provision Unconditional Presence Reporting Area to Subscriber or Subscriber Groups|Provision Conditional Presence Reporting Area with Policies|Configure Event Triggers for Presence Reporting Area|Configuration Examples for Use Cases|Roaming Conditions|Cell Congestion|PDN Type and UE IP Address Conditions|Presence Area Status Conditions|Use Case 1: Campus Zone Mobile Broadband|Use Case 2: Home Zone Mobile Broadband|Appendix A. Access and Charging Policy Types|Appendix B. Policy Tags|Time and Date Tags|Tags Related to Access and Charging|Reference List|$|1|1.1|2|3|3.1|3.1.1|3.2|3.3|4|4.1|4.2|4.3|5|5.1|6|7|7.1|7.1.1|7.1.2|7.2|7.3|7.4|7.4.1|7.4.2|8|8.1|8.2|9|9.1|9.2|10|10.1|10.2|10.3|10.4|10.5|11|11.1|11.2|12|13|13.1|13.2|13.3|13.4|14|14.1|14.2|14.3|14.4|14.4.1|14.4.2|15|16|16.1|16.2|17|
|Alarm Description|Procedure|Handle Alarm DBS Memory Limit Reached|$|1|2|2.1|
|Description|Procedure|Push XML Model File to Remote File Location|$|1|2|2.1|
|Description|Procedure|Schedule Backups Based on Calendar Event|$|1|2|2.1|
|Description|Procedure|Create User Account|$|1|2|2.1|
|Emergency Services Introduction|Emergency Services Function|Emergency Services Overview|Emergency Subscriber Profile|Emergency Bearer Service|IMS Emergency Calls|Emergency Services Network Deployments|Emergency Services Traffic Cases|Protocol Binding for Rel9 Rx Onwards and standard Rel9 Gx Onwards|Emergency Services Error Handling|Emergency Services Restrictions|Reference List|$|1|2|2.1|2.2|2.3|2.4|3|4|4.1|4.2|5|6|
|Introduction|Functions and Concepts|Types of Operation|Managed Object Model|Configuration Management|Fault Management|Security Management|$|1|2|2.1|3|4|5|6|
|Configure Bearer QoS Control and Bandwidth Management Overview|Other Conventions|Configuration Prerequisites|Configure QoS Control for the Default Bearer and the APN|Diameter Node Control for QoS Control for the Default Bearer and the APN|Provision QoS Profiles for Default Bearer/APN|Configuration of Bearer/APN QoS Profiles for GPRS|Configuration of Bearer/APN QoS Profiles for EPS|Provision QoS Control for Default Bearer/APN selection|Configure Bandwidth Management for Services|Configure Static Services|Preconfigured and Dynamic Services|Provision Service QoS Profiles|Configuration for GPRS|Configuration for EPS|Provision QoS Control for Services|Appendix A. QoS Policy Types|Appendix B. QoS Policy Tags|Appendix C. QoS Selection Tags for Output Attributes Used in Policies|Appendix D Configuration Summary|Reference List|$|1|1.1|2|3|3.1|3.2|3.2.1|3.2.2|3.3|4|4.1|4.2|4.3|4.3.1|4.3.2|4.4|5|6|7|8|9|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions, Symbols and Abbreviations|Protocol Stack|General|Protocol Stack for Ud Data Access Messages|Protocol Stack for Ud Subscriptions/Notifications|General Messages|General|Open Link for a LDAP Session|Close Link for a LDAP Session|Transactions|SOAP Authentication|User Data Convergence Messages|General|Query|Create|Delete|Update|Subscribe|Notify|Abandon Operation|Information Elements|Information Element Types with LDAP|Information Elements for Subscriptions and Notifications|Security|Annex A (Normative): SOAP Subscription and Notification|Annex B (Informative): LDAP Message Flows and Transaction Flows for UDC|Annex C (Informative): Messages Based on SOAP|Annex D (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|5|5.1|5.2|5.3|5.4|5.5|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|6.8|7|7.1|7.2|8|9|10|11|12|13|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions, Symbols and Abbreviations|Protocol Stack|General|Protocol Stack for Ud Data Access Messages|Protocol Stack for Ud Subscriptions/Notifications|General Messages|General|Open Link for a LDAP Session|Close Link for a LDAP Session|Transactions|SOAP Authentication|User Data Convergence Messages|General|Query|Create|Delete|Update|Subscribe|Notify|Abandon Operation|Information Elements|Information Element Types with LDAP|Information Elements for Subscriptions and Notifications|Security|Annex A (Normative): SOAP Subscription and Notification|Annex B (Informative): LDAP Message Flows and Transaction Flows for UDC|Annex C (Informative): Messages Based on SOAP|Annex D (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|5|5.1|5.2|5.3|5.4|5.5|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|6.8|7|7.1|7.2|8|9|10|11|12|13|
|Description|Procedure|Fetch File in Logical File System|$|1|2|2.1|
|Description|Procedure|Schedule Backups Based on Periodic Event|$|1|2|2.1|
|Description|Procedure|Change User Account|$|1|2|2.1|
|Add Active-Active Geographical Redundancy Description|Add Active-Active Geographical Redundancy Prerequisites|Add Active-Active Geographical Redundancy Procedure|Procedure in Mated SAPC (SAPC2)|Procedure in Live SAPC (SAPC1)|Start Mated SAPC (SAPC2) in Active-Active Geographical Redundancy|$|1|1.1|2|2.1|2.2|2.3|
|Policy Control for Wi-Fi Calling Introduction|Policy Control for Wi-Fi Calling Function|Policy Control for Wi-Fi Calling Overview|Wi-Fi Calling|Use Case: Bill Shock Prevention|Policy Control for Wi-Fi Calling Network Deployments|Policy Control for Wi-Fi Calling Traffic Cases|Wi-Fi Calling Setup|Handover between VoLTE and Wi-Fi|Handover from Wi-Fi to VoLTE|Handover from VoLTE to Wi-Fi|Error Handling|Operational Conditions|External Conditions|Reference List|$|1|2|2.1|2.2|2.2.1|3|4|4.1|4.2|4.2.1|4.2.2|4.3|5|5.1|6|
|Configuration and Provisioning Overview|Typographic Conventions|Other Conventions|Configuration Prerequisites|Configure Notification Network Data|Configure Notifications Delivery|Configure Notification Servers|Configure SMS Centers|Configure Web Service End Points|Configure Notification Destinations|Notifications Sent to End Users|Notifications Sent to External Systems|Provisioning Notification Policies|Notifications Sent to End Users|Notifications Sent to External Systems|Configure SMS Notification Message|Configure SOAP Notification Message|Notification Sent to End Users and to External Systems|Dynamic Notification Message Content|Encoding Schemes in Notification Messages|Configuration Examples for Use Cases|Notifications Based on Fair Usage|Notifications to be sent to Subscribers|Notifications and Shared Dataplans|Notification to the Head Member of the Shared Dataplan|Notifications Based on Subscriber Group Activation or Deactivation|Appendix A. End User Notifications Policy Types|$|1|1.1|1.2|2|3|3.1|3.2|3.2.1|3.2.2|3.3|3.3.1|3.3.2|4|4.1|4.2|4.2.1|4.2.2|4.3|4.4|4.5|5|5.1|5.1.1|5.1.2|5.1.2.1|5.2|6|
|Description|Procedure|Add Virtual IP Equivalent Source Address|$|1|2|2.1|
|Description|Procedure|Add Virtual IP Address|$|1|2|2.1|
|Description|Procedure|Add Flow Policy|$|1|2|2.1|
|Graceful Scale-in Introduction|Graceful Scale-in Prerequisites|Graceful Scale-in Procedure|Internal Graceful Scale-In|VM Deletion from the Cloud Manager|VM Deletion in CEE using ECM|VM Deletion in CEE using Atlas|VM Deletion in VMware vCenter using vSphere Web Client|VM Deletion in VMware vCenter using vCloud Director|$|1|2|3|3.1|3.2|4|5|6|7|
|Description|Procedure|Delete File in Logical File System|$|1|2|2.1|
|Description|Procedure|Change Scheduled Backup Name|$|1|2|2.1|
|Description|Procedure|Delete User Account|$|1|2|2.1|
|Memory Dimensioning in PLs in a Live SAPC Introduction|Prerequisites|Memory Dimensioning in PLs in a Live SAPC Procedure|General Procedure|Memory Dimensioning in PLs in a Live SAPC Procedure in CEE|Memory Dimensioning in PLs in a Live SAPC Procedure in VMware|$|1|1.1|2|2.1|2.2|2.3|
|Application Detection and Control Introduction|Document Purpose and Scope|Concepts|ADC Function|ADC Overview|Service Access Control|ADC Redirection Control|ADC Mute Notification Control|Application Detection Reporting|ADC Network Deployments|ADC Traffic Cases|QoS Control Based on Application Traffic Detection|ADC Redirection Control|ADC Mute Notification|ADC Error Handling|Reference List|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|2.5|3|4|4.1|4.2|4.3|4.4|5|
|Introduction|Event Description|Information|Usage|Configuration|Subscription|$|1|2|2.1|2.2|2.3|2.4|
|Configuration File|General|Acronyms and Terms|References|Parameters|Examples|$|1|1.1|1.2|1.3|1.4|1.5|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|Introduction|Prerequisites|Procedure|VM Creation in CEE using ECM|VM Creation in CEE using Atlas|VM Creation in VMware vCenter using vSphere Web Client|VM Creation in VMware vCenter using vCloud Director|$|1|1.1|2|3|4|5|6|
|Description|Procedure|Change Maximum Transmission Unit Size|$|1|2|2.1|
|SAPC 16B to SAPC 1 Network Impact Report Introduction|General Impact|Capacity and Performance|Implementation|Platform|PNF Architecture|VNF Architecture|Upgrade|Interface|Operation|Other Network Elements|Additional Information|Subscription Management|Fair Usage Management|QoS Profile Management|Database Access Management|Policy Management|Time Zone|Impact on Value Packages|Base Package|Business Intelligence|Convergence|High Availability and Pooling|Monetize OTT|Money Aware|Network Assurance|Network Efficiency|Smart Personalized Broadband|Voice Optimization|Reference List|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|3|3.1|3.2|3.3|3.4|3.5|3.6|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|4.8|4.9|4.10|5|
|Description|Procedure|Add Named Virtual IP Address|$|1|2|2.1|
|Overview|Description|Prerequisite|Procedure|Reference List|$|1|1.1|1.2|2|3|
|Alarm Description|Procedure|Handle Alarm Certificate Management, the Certificate is to Expire|$|1|2|2.1|
|Description|Procedure|Create SSH Public Key|$|1|2|2.1|
|Description|Procedure|Show Supported and Enabled TLS Ciphers|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm Policy Control, Number of Usage Limits Surpassed Reached|$|1|2|2.1|
|Introduction|Related Information|Key Features of Ericsson NETCONF Interface|Prerequisites|NETCONF Session|Start a NETCONF Session over SSH|Start a NETCONF Session over TLS|Session Inactivity Timer|Session End|NETCONF RPC Messages|Message <hello>|Message <ok>|Error Messages|NETCONF Data Model|Model Definition|Namespaces|Configuration and State Data|Distinguished Names|MO Attributes|MO Instances|MO Actions|NETCONF Operations|Operation <get>|Operation <get-config>|Operation <editconfig>|Operation <action>|Operation <create-subscription>|Operation <close-session>|Operation <kill-session>|Operation <copy-config>|Operation <delete-config>|NETCONF Notifications|Notification <replayComplete>|Notification <notificationComplete>|Non-Standard Notifications|NETCONF Validation|Create MO Instance|Delete MO Instance|Change Single-Valued Attributes|Delete MO Attribute Values|Change Sequence Attributes|Change Struct Attributes|System-Created Property|NETCONF Visibility Control|NETCONF Transaction|Transaction Start|Locking|Transaction Commit|Abort|Transaction Time-Out|NETCONF Capability <action>|Overview|Dependencies|Capability Identifier|New Operations|Modifications to Existing Operations|NETCONF Capability <notification>|Overview|Dependencies|Capability Identifier|New Operations|Modifications to Existing Operations|New Notifications|XML Schema|RFC Compliance Latest|NETCONF Statement of Compliance|NETCONF Capabilities|NETCONF Compliance to RFC 4741 and RFC 6241|NETCONF Compliance to RFC 4742 and RFC 6242|NETCONF Compliance to RFC 5277|NETCONF Compliance to RFC 5539|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|5.9|6|6.1|6.2|6.3|7|7.1|7.2|7.3|7.4|7.5|7.6|7.7|8|9|9.1|9.2|9.3|9.4|9.5|10|10.1|10.2|10.3|10.4|10.5|11|11.1|11.2|11.3|11.4|11.5|11.6|11.7|12|13|13.1|13.2|13.3|13.4|13.5|
|Subscription and Policy Management Introduction|Subscription and Policy Management Function|Subscription Management|Handling of Multiple service offerings|Dynamic Group Selection Policies|Policy Management|Reauthorization Because of Time of Day Conditions|Header Enrichment|Subscription and Policy Management Traffic Cases|Update Subscriber Profile|Remove Subscriber Profile|Subscriber Group activation/deactivation Because of Time Conditions|Policy Result Change Because of Time Conditions|Failure Handling|Restrictions|Reference List|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|3|3.1|3.2|3.3|3.4|3.5|4|5|
|Introduction|Functions and Concepts|Types of Operation|Managed Object Model|Configuration Management|$|1|2|2.1|3|4|
|Introduction|Notification Description|$|1|2|
|Introduction|Event Description|Information|Usage|Configuration|Subscription|$|1|2|2.1|2.2|2.3|2.4|
|Introduction|Functions and Concepts|Types of Operation|Managed Object Model|Configuration Management|Fault Management|Security Management|$|1|2|2.1|3|4|5|6|
|$|
|Introduction|Target Groups|Managed Object Model|MOM Concepts|MOM Overview|MIB|Managed Objects|Managed Object Creation and Deletion|Managed Object Naming|Setting Attributes|Attribute Data Types|Calling Actions|Relationships between Managed Objects|Model Element Life Cycle|Presentation of MOM|Classes|Attribute Properties|Common Attributes|Deprecated Elements in MOM|$|1|1.1|2|2.1|2.2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|4|4.1|4.2|4.3|4.4|
|Log Overview|Log Types|Log Events|Configuration|Reported Data|SAPC Application Logs Record Output Format|$|1|2|3|4|5|5.1|
|Overview|DBN External Format|Primitive Types|External Types|Composed Values|Reference List|$|1|2|2.1|2.2|2.3|3|
|General|Introduction|Terms|Concept|Compliance Lists|IETF - Stream Control Transmission Protocol|Notes|Reference List|$|1|1.1|1.2|1.3|2|2.1|3|4|
|$|
|Introduction|Document Purpose and Scope|Revision Information|NFV Environment|NFVI|NFV Management and Orchestration System|VNF Manager|Virtual SAPC Architecture|Virtualization Architecture|Deployment Types|Resilience and Redundancy|Networking|Storage|Security|Management and Orchestration|Deployment|HW Management|Scaling|Decommissioning|VMware Tools|Characteristics and Dimensioning|Requirements on the Cloud System|Cloud Management System Requirements|Cloud Infrastructure Requirements|Compute Host HW Requirement|Additional considerations|Glossary|Reference List|$|1|1.1|1.2|2|2.1|2.2|2.3|3|3.1|3.2|3.3|3.4|3.5|3.6|4|4.1|4.2|4.3|4.4|4.5|5|6|6.1|6.2|6.3|6.4|7|8|
|Description|Procedure|List File Groups and File Information in Logical File System|$|1|2|2.1|
|Description|Procedure|Set Maximum Number of Scheduled Backups|$|1|2|2.1|
|Description|Procedure|Configure Enrollment Authority|$|1|2|2.1|
|Description|Procedure|Reset Password for User Account|$|1|2|2.1|
|Disable Promiscuous Mode and Forget Transmits Introduction|Prerequisites|Disable Promiscuous Mode and Forget Transmits Procedure|General Procedure|$|1|1.1|2|2.1|
|Overload Control Function|Load Regulation Mechanism|Massive Reauthorizations Mechanisms|$|1|1.1|1.2|
|Scaling Management Introduction|Scaling Management Functions and Concepts|Types of Operation|Managed Object Model|$|1|2|2.1|3|
|SAPC VNF Network Configuration Guide Introduction|SAPC VNF Network Configuration Guide Overview|Hardware Components|Gateway|Compute Hosts|Controller Hosts|Cloud Manager Hosts|Software Components|Mirantis OpenStack (MOS)|Ubuntu Hypervisor (KVM)|Open Virtual Switch|vSphere ESXi|vSphere Distributed Virtual Switch|Virtual Router|eVIP|Network|General Overview|External Connectivity|SAPC networks Designated for static routing|SAPC networks Designated for OSPF Discovery|Internal Connectivity|Preconfigured Values|Networks Configuration Solutions|Solution to Define Unique OAM and Traffic Networks|Internal Network Configuration|IP Addressing|Extra Services over Internal0 Network|External/VIP Networks Configuration|eVIP Configuration Overview|SAPC VIP Addresses|External Networks|IP Addressing of External Elements|Gateway Router Configuration|Solution to Define Unique OAM and Traffic Networks with virtual routers|Internal Network Configuration|VIP Networks Configuration|Networks for OSPF v2|SAPC VIP Addresses|eVIP Configuration|eVIP Configuration Overview|eVIP Elements|OSPF v2 Areas|Virtual Router Configuration|External Networks Configuration|External Networks|IP Addressing|Virtual Routers IP Addresses|IP Addresses of External Elements|Virtual Router Configuration|Solution to Define Unique OAM and Multiple Traffic Networks|Internal Network Configuration|External/VIP Networks Configuration|Networks for eVIP|SAPC VIP Addresses|eVIP Configuration|eVIP Configuration Overview|eVIP Elements|IP Addressing|IP Addresses of External Elements|Gateway Router Configuration|Solution to Define Unique OAM and Multiple Traffic Networks with Virtual Routers|Internal Network Configuration|VIP Networks Configuration|Networks for OSPF v2|SAPC VIP Addresses|eVIP Configuration|eVIP Configuration Overview|eVIP Elements|OSPF v2 Areas|Virtual Router Configuration|External Networks Configuration|External Networks|IP Addressing|Virtual Routers IP Addresses|IP Addresses of External Elements|Virtual Router Configuration|$|1|2|2.1|2.1.1|2.1.2|2.1.3|2.1.4|2.2|2.2.1|2.2.2|2.2.3|2.2.4|2.2.5|2.2.6|2.2.7|2.3|2.3.1|2.3.2|2.3.2.1|2.3.2.2|2.3.3|2.3.4|3|3.1|3.1.1|3.1.1.1|3.1.1.2|3.1.2|3.1.2.1|3.1.2.2|3.1.2.3|3.1.2.4|3.1.3|3.2|3.2.1|3.2.2|3.2.2.1|3.2.2.2|3.2.2.3|3.2.2.3.1|3.2.2.3.2|3.2.2.3.3|3.2.2.4|3.2.3|3.2.3.1|3.2.3.2|3.2.3.2.1|3.2.3.2.2|3.2.3.3|3.3|3.3.1|3.3.2|3.3.2.1|3.3.2.2|3.3.2.3|3.3.2.3.1|3.3.2.3.2|3.3.2.4|3.3.2.4.1|3.3.3|3.4|3.4.1|3.4.2|3.4.2.1|3.4.2.2|3.4.2.3|3.4.2.3.1|3.4.2.3.2|3.4.2.3.3|3.4.2.4|3.4.3|3.4.3.1|3.4.3.2|3.4.3.2.1|3.4.3.2.2|3.4.3.3|
|Description|Procedure|Activate Emergency Unlock Mode|$|1|2|2.1|
|Description|Procedure|Configure Preventive Maintenance Policy Deleting Files in Logical File System|$|1|2|2.1|
|Description|Procedure|Delete Scheduled Event|$|1|2|2.1|
|Description|Procedure|Configure Enrollment Server Group Together with Enrollment Servers|$|1|2|2.1|
|Description|Procedure|Set User Roles for User Account|$|1|2|2.1|
|Introduction|Document Purpose and Scope|Typographic Conventions|Other Conventions|Configuration Prerequisites|Configuration Prerequisites|Configure Sy Network Data|Configure Sy Diameter Data|Configure Connections to OCS with One Realm|Configure Connections to an OCS with Several Diameter Realms|Configure Online Charging Systems|Provision of Subscribers|Subscribers Provisioned Only in Charging Systems|Subscribers Provisioned in the SAPC and in the Charging System|Configure Selection of Charging System|Provisioning at Subscriber Profile|Avoiding Sy Interface Communication for Subscribers Provisioned in the SAPC|Configure Policies for Dynamic Charging System Selection|Configure Default Charging System|Configure Policy Control Based on Spending Limits Reporting|Appendix A. Policy Tags|Glossary|Reference List|$|1|1.1|1.2|1.3|2|2.1|3|3.1|3.2|3.3|3.4|4|4.1|4.2|5|5.1|5.2|5.3|5.4|6|7|8|9|
|Description|Procedure|Deactivate Emergency Unlock Mode|$|1|2|2.1|
|Description|Procedure|Configure Preventive Maintenance Policy Reporting Alarms for Logical File System|$|1|2|2.1|
|Description|Procedure|Lock Backup Scheduler|$|1|2|2.1|
|Description|Procedure|Change Enrollment Server|$|1|2|2.1|
|Description|Procedure|Lock User Account Administratively|$|1|2|2.1|
|Configuration and Provisioning Overview|Other Conventions|Configuration Prerequisites|Configuration|Configure Gx PCEF Nodes|Configure Gx PCEF Nodes using IP-Domain-Id|Provision Dynamic Services|Provision AF Signalling Path Profiles|Configure Classification of Dynamic Services|Configure Dynamic Service Authorization|Configure Dynamic Service Qualification|Configure Static Qualification for Dynamic Services|Configure Dynamic Qualification for Dynamic Services|Configure Bearer QoS Control  for Dynamic Services|Configure Access and Charging Policies Based on Dynamic Service Establishment|Configure Event Triggers|Configuration Examples for Use Cases|Prioritized Video Delivery|Multimedia Telephony over LTE|Notification of Signalling Path Status|Appendix A. Dynamic Policy Types|Appendix B. Policy Tags|Dynamic Policy Control Tags|Appendix C. Tags for Output Attributes Used in Policies|QoS and Charging Selection Tags|Reference List|$|1|1.1|2|3|3.1|3.1.1|3.2|3.3|3.4|3.5|3.6|3.6.1|3.6.2|3.7|3.8|3.9|4|4.1|4.2|4.3|5|6|6.1|7|7.1|8|
|Description|Procedure|Change NTP Server Address|$|1|2|2.1|
|Description|Procedure|Unlock Backup Scheduler|$|1|2|2.1|
|Description|Procedure|Install Node Credential Online|$|1|2|2.1|
|Description|Procedure|Unlock Administrative Lock for User Account|$|1|2|2.1|
|Active-Standby Geographical Redundancy Introduction|Active-Standby Geographical Redundancy|Procedures and States|Recommended Operating Conditions|Active-Standby Geographical Redundancy Procedures|Preconditions|Start Geographical Redundancy|Temporarily Disable Geographical Redundancy|Monitor Geographical Redundancy State|Check Geographical Redundancy Configuration|Change Preferred Role in Geographical Redundancy|Return Active State to Preferred Node|Maintenance Activities|Active-Standby Geographical Redundancy Fault Management|$|1|2|2.1|2.2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|4|
|$|
|Description|Procedure|Install License Key File Using the File Protocol|Install License Key File Using the SFTP Protocol|$|1|2|2.1|2.2|
|Description|Procedure|Change Maximum Number of Manual Backups|$|1|2|2.1|
|Description|Procedure|Renew Node Credential Online|$|1|2|2.1|
|Description|Procedure|Unlock Operational Lock for User Account|$|1|2|2.1|
|Description|Procedure|Replenish Emergency Unlock Activations|$|1|2|2.1|
|Description|Procedure|Enable Automatic Deletion of Manual Backups|$|1|2|2.1|
|Description|Procedure|Configure Renewal Mode of Node Credential|$|1|2|2.1|
|Introduction|Functions and Concepts|User Authentication|User Authorization|Backup and Restore of Local User Data|Types of Operation|Managed Object Model|Rules for Default Roles|Configuration Management|$|1|2|2.1|2.2|2.3|2.4|3|3.1|4|
|Introduction|Document Purpose and Scope|Revision Information|Typographic Conventions|Other Conventions|Configuration Prerequisites|Configuration|Configure Event Triggers|Configuration Examples for Use Cases|Configure Bill Shock Prevention|Appendix A. Policy Tags|Tags Related to Wi-Fi Calling|Glossary|Reference List|$|1|1.1|1.2|1.3|1.4|2|3|3.1|4|4.1|5|5.1|6|7|
|Description|Procedure|Disable Automatic Deletion of Manual Backups|$|1|2|2.1|
|Description|Procedure|Delete Enrollment Server|$|1|2|2.1|
|Introduction|Document Purpose and Scope|Overview|Networks Allocation|IP Addressing|Logical Network Assignment|Geographical Redundancy VIP Configuration for VNF Deployments|Geographical Redundancy VIP Configuration for PNF Deployments|$|1|1.1|2|3|3.1|4|4.1|4.2|
|Description|Procedure|Update License Information|$|1|2|2.1|
|Description|Procedure|Import Backup|$|1|2|2.1|
|Description|Procedure|Delete Enrollment Authority|$|1|2|2.1|
|Configuration and Provisioning Overview|Other Conventions|Configuration Prerequisites|Smp Diameter Data|Provision PDN-GW Selection|Provision PDN-GW Profiles|Provision PDN-GW List Profiles|Provision PDN-GW Lists to Subscribers or Subscriber Groups|Provision Conditional PDN-GW List with Policies|Provision SPID Selection|Provision SPIDs to Subscribers or Subscriber Groups|Provision Conditional SPID Selection Policies|Configure Smp Session Control|Appendix A. Policy Types|Appendix B. Tags Related to Mobility Based Policy Control|Reference List|$|1|1.1|2|3|4|4.1|4.2|4.3|4.4|5|5.1|5.2|6|7|8|9|
|Description|Procedure|Export Backup|$|1|2|2.1|
|Description|Procedure|Delete Enrollment Server Group|$|1|2|2.1|
|Privacy User Guide Introduction|Target Group|Notice|Consent|Choices and Personal Data Retention|Privacy Functionality Contained in the SAPC and Intended Purpose|Instructions for Operating the Privacy Functionality|Procedures for Maintaining the Privacy Configuration|Default Values of the Privacy Parameters|Listing and Classification of the Personal Data Processed by the Product|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|3|
|Description|Procedure|Change Prefix for Exported Backup Names|$|1|2|2.1|
|Description|Procedure|Delete Node Credential|$|1|2|2.1|
|Security Management Guide Introduction|Security Management Prerequisites|Security Management Environment|Security Management Definitions|Security Management Overview|Threats|Defense|Product Security Functionality|Network Security Level|Node Security Level|OAM Security Level|Security Configuration|Network Security Level|Node Security Level|OAM Security Level|Security in the Cloud|Default Parameter Values|Services, Ports, and Protocols|$|1|1.1|1.2|1.3|2|2.1|2.2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|5|6|7|
|Overview|Description|Prerequisite|Procedure|Reference List|$|1|1.1|1.2|2|3|
|Alarm Description|Procedure|Handling Alarm File Management, Number of Files in FileGroup Exceeded|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm Certificate Management, Automatic Enrollment Failed|$|1|2|2.1|
|Decription|Procedure|Change SSH Public Key|$|1|2|2.1|
|Description|Procedure|Add A Target Type Identifier|Delete A targetType Identifier|Delete All targetType Identifiers|$|1|2|2.1|2.2|2.3|
|Alarm Description|Procedure|Handle Alarm Policy Control, Connection to Notification Server Failed|$|1|2|2.1|
|Description|Prerequisites|Procedure|Start Preferred as Active|Start Non-Preferred as Standby|$|1|1.1|2|2.1|2.2|
|Gx Interface Overview|Document Content Conventions|Gx Interface Message Exchange|Diameter Base Protocol Messages|Gx Capability Negotiation|Device Watchdog|Disconnect Peer|Gx Interface Controls and AVP Relations|Gx Interface Message Format|Gx Credit-Control-Request (CCR)|Gx Credit-Control-Answer (CCA)|Gx Re-Authorization-Request (RAR)|Gx Re-Authorization-Answer (RAA)|Gx Interface AVPs|Gx Supported-Features|Charging-Rule-Install AVP|Charging-Rule-Definition AVP|Flow-Description AVP|Precedence AVP|Charging-Rule-Report AVP|QoS-Information AVP|Default-EPS-Bearer-QoS AVP|Usage-Monitoring-Information AVP|Presence-Reporting-Area-Information AVP|TDF-Information AVP|Ericsson Gx+ Message Format|Ericsson Gx+ Credit-Control-Request (CCR)|Ericsson Gx+ Credit-Control-Answer (CCA)|Ericsson Gx+ Re-Auth-Request (RAR)|Ericsson Gx+ AVPs|Charging-Rule-Authorization|Authorization-State AVP|One-Time-Redirect-Control AVP|Gx-Capability-List AVP|Gx Error Handling|Gx Protocol Errors|Gx Application Errors|Reference List|$|1|1.1|2|3|3.1|3.2|3.3|4|5|5.1|5.2|5.3|5.4|6|6.1|6.2|6.2.1|6.2.1.1|6.2.1.2|6.3|6.4|6.5|6.6|6.7|6.8|7|7.1|7.2|7.3|8|8.1|8.1.1|8.1.2|8.2|9|9.1|9.2|10|
|Bearer QoS and Bandwidth Management Introduction|Bearer QoS and Bandwidth Management Function|Bearer QoS and Bandwidth Management Overview|QoS in 3GPP Packet Networks|QoS Parameters|QoS Control for the Default Bearer and the APN|Detailed Procedure|Functions to Calculate QoS for the Default Bearer and QoS for APN|Default Bearer QoS Profile Comparison|QoS Control for Services|QoS Control for Preconfigured PCC rules|QoS Control for Static PCC rules|IP Flow Bandwidth Management for Static PCC rules|QoS Control for Dynamic PCC rules|Network Deployments|Bearer QoS and Bandwidth Management Protocol Bindings|QoS Control for the Default Bearer and the APN|Protocol Binding for standard Gx Rel9 onwards, GPRS Access|Protocol Binding for standard Gx Rel9 onwards EPS|Protocol Binding Summary|QoS Control for Services|QoS Control for Preconfigured and Dynamic PCC rules|QoS Control and IP Flow Bandwidth Management for Static PCC rules|Reference List|$|1|2|2.1|2.2|2.2.1|2.3|2.3.1|2.3.2|2.3.3|2.4|2.4.1|2.4.2|2.4.3|2.4.4|3|4|4.1|4.1.1|4.1.2|4.1.3|4.2|4.2.1|4.2.2|5|
|Introduction|Functions and Concepts|Modes of Operation|Types of Operation|Managed Object Model|Configuration Management|Fault Management|$|1|2|2.1|2.2|3|4|5|
|Introduction|Functions and Concepts|ECLI, NETCONF, and FTP Server IP Address|Session Parameters|SSH Authentication|TLS Authentication|SSH and TLS Transport Protocol Security|Types of Operations|Managed Object Model|Configuration Management|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|3|4|
|Introduction|Functions and Concepts|Types of Operation|Ericsson Definition of 3GPP Perceived Severity Values|Managed Object Model|Managed Object Model  SNMP|Managed Object Model  Fault Management|Configuration Management|Fault Management|File Management|$|1|2|2.1|2.2|3|3.1|3.2|4|5|6|
|$|
|BSP 8100 Network Configuration Guide Introduction|BSP 8100 Network Configuration Guide Overview|BSP 8100 Minimal Configuration. Four Physical Blades|BSP 8100 System Controller Blades Minimal Configuration|BSP 8100 Payload Blades Minimal Configuration|BSP 8100 Single Subrack Configuration. 12 Physical Blades|BSP 8100 System Controller Blades Subrack Configuration|BSP 8100 Traffic Blades Subrack Configuration|Traffic Payload Blades|External Database Payload Blades|GeoRed Payload Blades|Traffic Separation Payload Blades|Remaining Payload Blades|BSP 8100 Whole Rack Configuration. 36 Physical Blades|BSP 8100 Traffic Blades Whole Rack Configuration|Non-Front End Blades|Front End Payload Blades|BSP 8100 Networks Allocation|BSP 8100 VLANs|BSP 8100 IP Addressing|BSP 8100 IP Addresses of External Elements|$|1|2|2.1|2.1.1|2.1.2|2.2|2.2.1|2.2.2|2.2.2.1|2.2.2.2|2.2.2.3|2.2.2.4|2.2.2.5|2.3|2.3.1|2.3.1.1|2.3.1.2|3|3.1|3.2|3.2.1|
|$|
|Alarm Description|Procedure|Handle Alarm LemCDCLSv, Operation Execution Timeout|$|1|2|2.1|
|Description|Procedure|Set Automatic Export of Scheduled Backups|$|1|2|2.1|
|Description|Procedure|Install Trusted Certificate|$|1|2|2.1|
|Description|Procedure|Change Administrator Account|$|1|2|2.1|
|Description|Procedure|Change Manual Backup Name|$|1|2|2.1|
|Description|Procedure|Create Trust Category|$|1|2|2.1|
|Description|Procedure|Change Heartbeat Interval|$|1|2|2.1|
|Description|Procedure|Create Measurement Collection Job|$|1|2|2.1|
|Description|Procedure|Change Trust Category|$|1|2|2.1|
|Introduction|Document Purpose and Scope|Typographic Conventions|Other Conventions|Configuration Prerequisites|Configuration|Configuring Gx PCEFs|Provision ADC for Services|Configure ADC Redirection|Configure ADC Redirection Unconditionally|Configure ADC Redirection Conditionally|Configure ADC Mute Notification|Configure ADC Mute Notification Unconditionally|Configure ADC Mute Notification Conditionally|Configure Event Triggers|Configuration Examples for Use Cases|QoS Control based on Application Detection|Appendix A. ADC Policy Types|Appendix B. ADC Policy Tags|Glossary|Reference List|$|1|1.1|1.2|1.3|2|3|3.1|3.2|3.3|3.3.1|3.3.2|3.4|3.4.1|3.4.2|3.5|4|4.1|5|6|7|8|
|Description|Procedure|Configure Node Credential for ECLI|Configure Node Credential for NETCONF|Configure Node Credential for FTP|$|1|2|2.1|2.2|2.3|
|Description|Procedure|Create Threshold Monitoring Job|$|1|2|2.1|
|Description|Procedure|Delete Trust Category|$|1|2|2.1|
|Provisioning Tools Introduction|Provisioning Tools|Provisioning with Resty|Resty Usage Reference|Initialize Base URI|PUT|GET|DELETE|Operation Results|Prettify JSON Data|Edit Input JSON Data on an Editor|Reuse Base URI for Massive Provisioning|Provisioning with Postman|Installation|Authentication|PUT|GET|DELETE|Operation Results|TLS Certificate|Massive Data Retrieval|Operation and Maintenance|Security|Troubleshooting|$|1|2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|5|6|6.1|6.2|
|Description|Procedure|Configure Trust Category for ECLI|Configure Trust Category for NETCONF|Configure Trust Category for FTP|$|1|2|2.1|2.2|2.3|
|Description|Procedure|Delete Measurement Collection Job|$|1|2|2.1|
|Description|Procedure|Disable Trusted Certificate|$|1|2|2.1|
|Configuration and Provisioning Overview|Other Conventions|Configuration Prerequisites|Configure Emergency APNs|Configure Unauthenticated Emergency Services|Provision Emergency Subscriber|Emergency Subscriber Profile in External Repository|Configuration Examples for Use Cases|Emergency Services|IMS Emergency Services|Appendix A. Emergency Services Policy Tags|Reference List|$|1|1.1|2|3|4|5|6|7|7.1|7.2|8|9|
|Description|Procedure|Change Administrative State of ECLI over SSH|Change Administrative State of NETCONF over SSH|$|1|2|2.1|2.2|
|Description|Procedure|Delete Threshold Monitoring Job|$|1|2|2.1|
|Description|Procedure|Enabled Trusted Certificate|$|1|2|2.1|
|Backup and Restore Introduction|Backup and Restore Preconditions|Backup and Restore Overview|Backup and Restore Procedures|Create Backup|Restore Backup|Backup and Restore Restrictions|$|1|2|3|4|4.1|4.2|5|
|Description|Procedure|Change Administrative State of ECLI over TLS|Change Administrative State of NETCONF over TLS|Change Administrative State of FTP over TLS|$|1|2|2.1|2.2|2.3|
|Description|Procedure|List Performance Management Groups and Measurement Types|$|1|2|2.1|
|Description|Procedure|Delete Trusted Certificate|$|1|2|2.1|
|Configuration Prerequisites|Overload Control Configuration|Load Regulation Mechanism|Massive Reauthorizations Mechanisms|Overload Control Performance Management|Reference List|$|1|2|2.1|2.2|3|4|
|Description|Procedure|Change Port Number of FTP over TLS|$|1|2|2.1|
|Description|Procedure|List Performance Management Jobs|$|1|2|2.1|
|Description|Procedure|Change Session Idle Timer of FTP over TLS|$|1|2|2.1|
|Description|Procedure|Start Measurement Collection Job|$|1|2|2.1|
|Front End Management Tool Introduction|Front End Management Tool Prerequisites|Front End Management Tool|Front End Management Tool Purpose|Front End Management Tool Parameters|Front End Management Tool Modes|$|1|2|3|3.1|3.2|3.3|
|Description|Procedure|Start Threshold Monitoring Job|$|1|2|2.1|
|Description|Procedure|Delete SSH Public Key|$|1|2|2.1|
|Introduction|Related Information|Key Features of ECLI|Prerequisites|ECLI Version|CLI Concepts|CLI Modes|CLI Session|CLI Transaction|CLI Position|CLI Prompt|Context-Sensitive Help|Auto-Completion|Case Correction|Escaping of Special Characters|CLI Comments|Visibility Levels|Automatic Correction of ManagedElement ID|Limitations|CLI Commands|Summary of CLI Commands|Success and Error Indications|Display Information|Change and Display the Position in MO Tree|Change MO Attributes|Create MO|Reinitialize MO|Delete MO|MO Actions|Copy and Paste Configuration Data|Change Password Command|Display CLI Version|Pipe Utility Commands|Help Command|Deprecated Actions|Deprecated Options|CLI Commands Limitations|Terminal Properties|Terminal Types|Default Key Bindings|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|2.10|2.11|2.12|2.13|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|3.10|3.11|3.12|3.13|3.14|3.15|3.16|3.17|4|4.1|4.2|
|Sy Interface Overview|Document Content Conventions|Sy Interface Message Exchange|Diameter Base Protocol Messages|Sy Capability Negotiation|Device Watchdog|Disconnect Peer|Sy Interface Messages Format|Sy Spending-Limit-Request (SLR)|Sy Spending-Limit-Answer (SLA)|Sy Spending-Status-Notification-Request (SNR)|Sy Spending-Status-Notification-Answer (SNA)|Sy Session-Termination-Request (STR)|Sy Session-Termination-Answer (STA)|Ericsson Sy Messages Format|Ericsson Sy Spending-Limit-Request (SLR)|Ericsson Sy Spending-Limit-Answer (SLA)|Ericsson Sy Spending-Status-Notification-Request (SNR)|Ericsson Sy Spending-Status-Notification-Answer (SNA)|Ericsson Sy Session-Termination-Request (STR)|Ericsson Sy Session-Termination-Answer (STA)|Sy Error Handling|Sy Protocol Errors|Sy Application Errors|Reference List|$|1|1.1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|4.6|5|5.1|5.2|5.3|5.4|5.5|5.6|6|6.1|6.2|7|
|Access and Charging Control Introduction|Access and Charging Control Function|IP-CAN session Access Control|Service Access Control|Selection of Rule Space (Ericsson Added Value)|Service Selection|Service Authorization|Service Authorization Policies without Time of Day Conditions or with Time of Day Conditions where PCRF controls time|Service Authorization Policies with Time of Day Conditions where the PCEF controls time|One Time Redirect Control|Static Services Qualification|Static Service Qualification Policies with Time of Day Conditions|Service Authorization and Static Service Qualification Policies with Time of Day Conditions where the PCEF controls time|Notification of Errors in the Installation of Services|Service Charging Control|Charging Control for Static Services with the PCEF|Charging Control for Preconfigured Services with the PCEF|Subscriber Charging Control|Content Filtering|Event Triggers|Multiple Gx Support|Presence Reporting Area|Diameter Race Condition Handling|Handling of Concurrent Gx RAR and CCR messages|Handling of Concurrent SAPC-initiated Reauthorizations|Access and Charging Control Network Deployments|Access and Charging Control Traffic Cases|IP-CAN session Lifetime|Protocol Binding for Rel9 Gx/Gx+ onwards|Redirect Owing to non-authorized Static Service|One Time Redirect for Authorized Static Services|Service Authorization and Static Service Qualification Policies with Time of Day Conditions When the PCEF is Selected As Time Controller|Time of Day Conditions Applied Only to Service Authorization Policies|Time of Day Conditions Applied to Service Authorization and Static Service Qualification Policies|Presence Reporting Area|PCC Rule Error Handling|Protocol Binding for Rel9 Gx/Gx+ onwards Notification of Error in the Installation of PCC rules|Diameter Race Condition Handling|Access and Charging Control Error Handling|Reference List|$|1|2|2.1|2.2|2.2.1|2.2.2|2.2.3|2.2.3.1|2.2.3.2|2.2.3.3|2.2.4|2.2.4.1|2.2.5|2.2.6|2.3|2.3.1|2.3.2|2.4|2.5|2.6|2.7|2.8|2.9|2.9.1|2.9.2|3|4|4.1|4.1.1|4.2|4.3|4.4|4.4.1|4.4.2|4.5|4.6|4.6.1|4.7|4.8|5|
|Introduction|Functions and Concepts|SSH|TLS|Method of selecting algorithms or cipher suites|Types of Operations|Managed Object Model|Configuration Management|$|1|2|2.1|2.2|2.3|2.4|3|4|
|Introduction|Document Purpose and Scope|NSP 6.1 Network Configuration Guide Overview|NSP 6.1 Single Subrack Network Configuration|NSP 6.1 Extra Subracks Network Configuration|NSP 6.1 Networks Allocation|NSP 6.1 DMX Network Allocation|NSP 6.1 VLANs|NSP 6.1 IP Addressing Example|NSP 6.1 TSP Legacy Considerations|NSP 6.1 Network Configuration Guide Annex|NSP 6.1 VLANs and Ports, Overview|$|1|1.1|2|2.1|2.2|3|3.1|3.2|3.3|3.4|4|4.1|
|General|Introduction|Terms|Concept|Compliance Lists|IETF - Stream Control Transmission Protocol|Notes|Reference List|$|1|1.1|1.2|1.3|2|2.1|3|4|
|$|
|Description|Procedure|Stop Measurement Collection Job|$|1|2|2.1|
|Introduction|Document Purpose and Scope|Configuration Prerequisites|Performance Data Collection Function|PDC Operational Conditions|PDC Function Administration|PDC Configuration|PDC Fault Management|Other Operational Conditions|PDC Report Data Management|Daily and Monthly Reports|Health Check Reports|$|1|1.1|2|3|4|4.1|4.2|4.3|4.4|5|5.1|5.2|
|Description|Procedure|Stop Threshold Monitoring Job|$|1|2|2.1|
|UE Trace Tool Introduction|UE Trace Tool Function|Subscriber Identities for Tracing|Configuring the UE Trace Tool|UE Trace Procedures|View the Trace Results|Start a Trace|List Activated and Scheduled Traces|See a Trace in Real-Time|Stop a Trace|UE Trace Output Files|Event Record Examples|Message Traced on the Gx Interface|Message Traced on the Rx Interface|Troubleshooting|$|1|2|2.1|3|4|4.1|4.2|4.3|4.4|4.5|5|5.1|5.1.1|5.1.2|6|
|Alarm Description|Procedure|Handle Alarm COM SA, AMF Component Cleanup Failed|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm COM SA, AMF Component Instantiation Failed|$|1|2|2.1|
|Active-Active Geographical Redundancy Introduction|Active-Active Geographical Redundancy|Procedures and States|Active-Active Geographical Redundancy Procedures|Preconditions|Start Geographical Redundancy|Temporarily Disable Geographical Redundancy|Monitor Geographical Redundancy State|Check Geographical Redundancy Configuration|Change Preferred Role in Geographical Redundancy|Maintenance Activities|Active-Active Geographical Redundancy Fault Management|$|1|2|2.1|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|4|
|Alarm Description|Procedure|Handle Alarm COM SA, AMF SI Unassigned|$|1|2|2.1|
|Active-Active Geographical Redundancy Network Configuration Guide Introduction|Active-Active Geographical Redundancy Network Configuration Guide Overview|Networks Allocation|IP Addressing|IP Addresses|Network Configurations for Geographical Redundancy in VNF Deployments|Geographical Redundancy without Virtual Routers|Internal Network Configuration|External Networks Configuration|External Networks and IP Addresses|VIP Configuration for External Networks|IP Addresses of External Elements|Gateway Router Configuration|Geographical Redundancy with Virtual Routers|Internal Network Configuration|VIP Networks Configuration|Networks for OSPF v2|VIP Elements|OSPF v2 Areas|Virtual Router Configuration|External Networks Configuration|External Networks and IP Addresses|IP Addresses of External Elements|Gateway Router Configuration|Network Configurations for Geographical Redundancy in PNF Deployments|$|1|2|3|3.1|3.1.1|4|4.1|4.1.1|4.1.2|4.1.2.1|4.1.2.2|4.1.2.3|4.1.3|4.2|4.2.1|4.2.2|4.2.2.1|4.2.2.2|4.2.2.3|4.2.2.4|4.2.3|4.2.3.1|4.2.3.2|4.2.4|5|
|Alarm Description|Procedure|Handle Alarm COM SA, CLM Cluster Node Unavailable|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm COM SA, Proxy Status of a Component Changed to Unproxied|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm BRM, Auto Export Manual Backup Failed|Handle Reason Authentication Failure|Handle Reason Directory Not Exist|Handle Reason Server Unreachable|Handle Reason Permission Denied|Handle Undetermined Reason|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|
|Alarm Description|Procedure|Handle Alarm File Management, Max Size in FileGroup Exceeded|$|1|2|2.1|
|Description|Procedure|Remove Password from User Account|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm Policy Control, Number of Unknown Subscribers Reached|$|1|2|2.1|
|Description|Prerequisites|Procedure|Disable Active-Standby Geographical Redundancy|Administrative Procedure|Enable Active-Standby Geographical Redundancy|$|1|1.1|2|2.1|2.2|2.3|
|Dynamic Policy Control Introduction|Dynamic Policy Control Function|Dynamic Policy Control Overview|Negotiation of Rx Interface Version and Supported Features|Session Binding|Classification of Dynamic Services|Authorization of Dynamic Services|Qualification of Dynamic Services|Allocation of QoS Information to Dynamic Services|Allocation of Charging Parameters to Dynamic Services|Generation of Dynamic PCC Rules|IP-CAN Session Reauthorization|Notification of Bearer Events to the AF|IP-CAN Session Termination|Service Data Flow Deactivation|Successful Resources Allocation|Network Location Information|IP-CAN Type Change Notification|Notification of Signalling Path Status|IMS Related PCC Procedures over Rx|Gating Control|Support for SIP Forking|Single Radio Voice Call Continuity (SRVCC)|Provisioning of AF Signalling Flow Information|Handling of Race Conditions Related to Multiple AF Requests|Delay PCC Rules Installation for AF Sessions with Preliminary Service Information|Dynamic Policy Control Network Deployments|Dynamic Policy Control Traffic Cases|AF Session Lifetime|AF Session Establishment|AF Session Modification|AF Session Termination|Reauthorization of Dynamic Services|Notification of Bearer Events|Service Data Flow Deactivation|Successful Resources Allocation|Network Location Information (NetLoc)|Network Location Information (NetLoc) in Untrusted WLAN Access|IP-CAN Type Change Notification|Notification of Signalling Path Status|IMS Related Procedures|SIP Forking|Single Radio Voice Call Continuity|Provisioning of AF Signalling Flow Information|Dynamic Policy Control Triggered by Application Service Detection|Dynamic QoS Control based on Detected Service|Deactivation of IP-CAN Session on Detection of Tethering Traffic|Handling of Race Conditions Related to Multiple AF Requests|Delay PCC Rules Installation for AF Sessions with Preliminary Service Information|Delay installation of PCC rules for a Preliminary AF Session|Reception of a Gx Event for a Preliminary AF Session|Dynamic Policy Control Error Handling|Reference List|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.6.1|2.6.2|2.7|2.8|2.9|2.9.1|2.9.2|2.9.3|2.9.4|2.9.5|2.9.6|2.10|2.10.1|2.10.2|2.10.3|2.10.4|2.11|2.12|3|4|4.1|4.1.1|4.1.2|4.1.3|4.2|4.3|4.3.1|4.3.2|4.3.3|4.3.4|4.3.5|4.3.6|4.4|4.4.1|4.4.2|4.4.3|4.5|4.5.1|4.5.2|4.6|4.7|4.7.1|4.7.2|4.8|5|
|Introduction|Functions and Concepts|Types of Operation|Managed Object Model|Configuration Management|Fault Management|Security Management|$|1|2|2.1|3|4|5|6|
|Introduction|Document Purpose and Scope|Revision Information|Concepts|Solution Description|Solution Overview|Service Chaining|Use Case: Content Filtering|Restoration Procedures|Network Topology|Interface Description|Operation and Maintenance|Configuration Management|Configuring the subscriber data|Configuring BBSC Peers|Configuring the SOAP Notification Policies|Performance Management|Fault Management|Logging|Capabilities|Appendix A. Policy Tags|Glossary|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.2.1|2.3|3|4|5|5.1|5.1.1|5.1.2|5.1.3|5.2|5.3|5.4|6|7|8|9|
|Introduction|Audit Log|Syslog|Description of Syslog Entries|Audit Trail|Audit Trail in Syslog Example|$|1|2|2.1|2.2|3|3.1|
|$|
|Description|Procedure|Create SNMPv1 Target|$|1|2|2.1|
|Description|Procedure|Change Login Failure Delay|Remove Login Failure Delay|$|1|2|2.1|2.2|
|Alarm Description|Procedure|Handle Alarm Policy Control, Number of Gx Session Rejections Reached|$|1|2|2.1|
|Rx Interface Overview|Document Content Conventions|Rx Interface Message Exchange|Diameter Base Protocol Messages|Rx Capability Negotiation|Device Watchdog|Disconnect Peer|Rx Interface Messages Format|Rx AA-Request (AAR)|Rx AA-Answer (AAA)|Rx Re-Auth-Request (RAR)|Rx Re-Auth-Answer (RAA)|Rx Abort-Session-Request (ASR)|Rx Abort-Session-Answer (ASA)|Rx Session-Termination-Request (STR)|Rx Session-Termination-Answer (STA)|Rx Interface AVPS|Rx Supported-Features|Media-Component-Description AVP|Flow-Description AVP|Rx Error Handling|Rx Protocol Errors|Rx Application Errors|Reference List|$|1|1.1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|4.8|5|5.1|5.2|5.3|6|6.1|6.2|7|
|Introduction|Scope|Traffic Key Performance Indicators|Gx CCR Failure Ratio|Gx CCR Establishment Failure Ratio|Gx CCR Failure owing to Congestion Ratio|Gx CCR Failure owing to Unable to Comply Ratio|Gx CCR Failure owing to Unknown Session Ratio|Gx CCR Failure owing to Authorization Rejected|Gx CCR Failure owing to Invalid Information Ratio|Gx RAR Failure Ratio|Gx RAR Time-out Ratio|Rx AAR/STR Failure Ratio|Rx AAR/STR Failure owing to Congestion Ratio|Rx AAR Failure owing to Unable to Comply Ratio|Rx AAR Failure owing to Service Not Authorized Ratio|Rx AAR Failure owing to Invalid Information Ratio|Rx AAR Failure owing to Unknown Session Ratio|Rx RAR Failure Ratio|Rx RAR Time-out Ratio|Rx ASR Time-out Ratio|Sy SLR/STR Failure Ratio|Sy SNR Failure owing to Congestion Ratio|Sy SLR/STR Answered with Error Ratio|Sy SNR Failure Ratio|Sy SNR Answered with Error Ratio|Sy SLR Time-out Ratio|Sy STR Time-out Ratio|Smp CCR Failure Ratio|Smp CCR Establishment Failure Ratio|Smp CCR Establishment Failure owing to Congestion Ratio|LDAP search request Failure Ratio|LDAP modify requests Failure Ratio|External Database SOAP notification request Failure Ratio|External Database SOAP notification request Failure owing to Congestion Ratio|Capacity Key Performance Indicators|CPU Load|Memory Use|Subscribers|IP-CAN Mobile Sessions|IP-CAN Fixed Sessions|AF Sessions|Gx Transactions per Second|Rx Transactions per Second|Sy Transactions per Second|Smp Transactions per Second|$|1|1.1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|2.10|2.11|2.12|2.13|2.14|2.15|2.16|2.17|2.18|2.19|2.20|2.21|2.22|2.23|2.24|2.25|2.26|2.27|2.28|2.29|2.30|2.31|2.32|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|3.10|
|Introduction|Related Information|Key Features of ECLI|ECLI Modes|Start an ECLI Session|Use ECLI Online Features|Static Help|Information Model Help|Context-Sensitive Help|Auto-Completion|Navigate in MIB|Display ME Status|Change ME Configuration|Execute MO Actions|$|1|1.1|1.2|2|3|4|4.1|4.2|4.3|4.4|5|6|7|8|
|Database Access Introduction|Database Access Function|Database Access Function Overview|Supported external databases Technologies|Data Model Mapping|Write Operations|Data Combinations Use Cases|Performance Optimizations|Fallback Mechanism for Subscribers in External Databases|Database Access Operation and Maintenance|Configure Entity Data Sources|Configure LDAP User Authentication|Configure Use of LDAP Scope, Filter, Alias Dereferencing|Database Access Configuration Examples|Entity Data Definition Language|Database Access Fault Management|Database Access Logging|Database Access Performance Management|Reference List|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|4|
|Introduction|Overview|VNF-LCM|Prerequisites|Starting a Workflow|HEAT Workflows|Onboarding|Instantiation|Scale|Terminate|$|1|2|2.1|2.2|3|4|4.1|4.2|4.3|4.4|
|Description|Procedure|Create SNMPv2C Target|$|1|2|2.1|
|Description|Procedure|Configure SSH Algorithms|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm Policy Control, Number of Rx Failed Sessions Reached|$|1|2|2.1|
|Introduction|Provided Service|Standard Compliance|Client Requirements|FTP over TLS Support|Password Handling|Client Certificates|Client Example: LFTP|Configuration File|$|1|2|2.1|3|3.1|3.2|3.3|4|4.1|
|Availability and Scalability Introduction|Availability and Scalability Function|Availability|Scalability|Availability and Scalability Operational Conditions|Availability and Scalability External Conditions|Availability and Scalability Function Administration|Availability and Scalability Security|Reference List|$|1|2|2.1|2.2|3|3.1|3.2|3.3|4|
|Compatible Network Elements|$|1|
|Description|Procedure|Create SNMPv3 Target|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm BRM, Scheduled Backup Failed|$|1|2|2.1|
|Description|Procedure|Configure Legal Notice|$|1|2|2.1|
|Add Active-Standby Geographical Redundancy Description|Add Active-Standby Geographical Redundancy Prerequisites|Add Geographical Redundancy Procedure|Procedure in Mated SAPC (SAPC2)|Procedure in Live SAPC (SAPC1)|Start Mated SAPC (SAPC2) as Standby SAPC|$|1|1.1|2|2.1|2.2|2.3|
|Introduction|Related Information|Alarm Description|Procedure|$|1|1.1|2|3|
|SOAP Notification Interface Overview|SOAP Protocol|SOAP Message Structure|Notification WSDL Data Structures|Envelope XML Elements|Header XML Elements|Body XML Elements|SOAP Bindings|SOAP HTTP Request|SOAP HTTP Answer|SOAP Notification Error Handling|XML Schemas and WSDL|SOAP Notification Message Examples|Reference List|$|1|2|2.1|3|3.1|3.2|3.3|4|4.1|4.2|5|6|7|8|
|CNOM Overview|$|1|
|Description|Procedure|View Software Information|$|1|2|2.1|
|Description|Procedure|Delete SNMP Target|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm BRM, Auto Export Backup Failed|Handle Reason Authentication Failure|Handle Reason Directory Not Exist|Handle Reason Server Unreachable|Handle Reason Permission Denied|Handle Undetermined Reason|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|
|Description|Procedure|Delete Legal Notice|$|1|2|2.1|
|Description|Prerequisites|Procedures|Configure Active SAPC as Preferred|Configure Standby SAPC as Preferred|$|1|1.1|2|2.1|2.2|
|Provisioning REST API Introduction|$|1|
|User Notifications Introduction|User Notifications Concepts|User Notification Function|Notification Mechanism|Notification Policies|Events and Conditions Triggering Notifications|Notification Message Text|Notification Messages to Multiple Destinations|Notification Message Control|Notification Sending Procedure|Load Balancing Mechanism|User Notification Traffic Cases|SMS|SOAP|User Notification Capabilities|User Notification Restrictions|User Notification Security|Reference List|$|1|1.1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|3|3.1|3.2|4|5|6|7|
|Flexible Output Protocol Function|Flexible Output Protocol Overview|Flexible Output Policies|Message Transformation Orders|Supported Protocols|Flexible Output Dictionary|Flexible Protocol Configuration|Provision Flexible Output Policies|Configure Message Transformation Orders|Configure Flexible Output Dictionary Syntax|Configuration Examples for Flexible Output Use Cases|Flexible Output Protocol Language Syntax|Configure AVP Values of OctetString Type|Flexible Output Protocol Message Transformation Orders|Transformation and Matching Criteria Specification|Appendix A. Flexible Output Policy Types|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.2|2.3|2.4|3|3.1|3.2|4|5|
|Introduction|General Considerations|Scope, References and Abbreviations|3GPP TS 29.212 Scope|3GPP TS 29.212 References|3GPP TS 29.212 Definitions and Abbreviations|Gx Reference Point|Overview|Gx Reference Model|PCC Rules|Functional Elements|PCC Procedures over Gx Reference Point|Void|4a Gxx Reference Points|4b Sd Reference Point|4c St Reference Point|Gx Protocol|Protocol Support|Initialization, Maintenance and Termination of Connection and Session|Gx Specific AVPs|Gx Re-Used AVPs|Gx Specific Experimental-Result-Code AVP Values|Gx Messages|5a Gxx Protocols|5b Sd Protocol|5c St Diameter Protocol|Annex A (Normative): Access Specific Aspects (GPRS)|A.1 Scope|A.2 Reference Model|A.2 Functional Elements|A.3 PCC Procedures|A.4 QoS Mapping|Annex B (Normative): Access Specific Aspects, 3GPP (GERAN/UTRAN/E-UTRAN) EPS|B.1 Scope|B.2 Functional Elements|B.3 PCC Procedures|Annex C (Informative): Mapping Table for Type of Access Networks|Annex D (Normative): Access Specific Aspects (EPC-based Non-3GPP)|D.1Scope|D.2EPC-based eHRPD Access|D.3EPC-based Trusted WLAN Access with S2a|D.4EPC-based Untrusted WLAN Access|Annex E (Normative): Access Specific Aspects, Fixed Broadband Access Interworking with EPC|Annex F (Informative): Disabling/Re-Enabling Usage Monitoring for a PCC/ADC Rule|Annex G (Normative): Access Specific Aspects, Fixed Broadband Access Network Convergence|Annex H (Informative) Policy Control for Remote UEs behind a ProSe UE-to-network Relay UE|Annex I (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|4.8|4.9|5|5.1|5.2|5.3|5.4|5.5|5.6|6|7|8|9|9.1|9.2|9.3|9.4|9.5|10|10.1|10.2|10.3|11|12|12.1|12.2|12.3|12.4|13|14|15|16|17|18|
|Introduction|General Considerations|Scope, References and Abbreviations|3GPP TS 29.212 Scope|3GPP TS 29.212 References|3GPP TS 29.212 Definitions and Abbreviations|Gx Reference Point|Overview|Gx Reference Model|PCC Rules|Functional Elements|PCC Procedures over Gx Reference Point|Void|4a Gxx Reference Points|4b Sd Reference Point|4c St Reference Point|Gx Protocol|Protocol Support|Initialization, Maintenance and Termination of Connection and Session|Gx Specific AVPs|Gx Re-Used AVPs|Gx Specific Experimental-Result-Code AVP Values|Gx Messages|5a Gxx Protocols|5b Sd Protocol|5c St Diameter Protocol|Annex A (Normative): Access Specific Aspects (GPRS)|A.1 Scope|A.2 Reference Model|A.2 Functional Elements|A.3 PCC Procedures|A.4 QoS Mapping|Annex B (Normative): Access Specific Aspects, 3GPP (GERAN/UTRAN/E-UTRAN) EPS|B.1 Scope|B.2 Functional Elements|B.3 PCC Procedures|Annex C (Informative): Mapping Table for Type of Access Networks|Annex D (Normative): Access Specific Aspects (EPC-based Non-3GPP)|D.1Scope|D.2EPC-based eHRPD Access|D.3EPC-based Trusted WLAN Access with S2a|D.4EPC-based Untrusted WLAN Access|Annex E (Normative): Access Specific Aspects, Fixed Broadband Access Interworking with EPC|Annex F (Informative): Disabling/Re-Enabling Usage Monitoring for a PCC/ADC Rule|Annex G (Normative): Access Specific Aspects, Fixed Broadband Access Network Convergence|Annex H (Informative) Policy Control for Remote UEs behind a ProSe UE-to-network Relay UE|Annex I (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|4.8|4.9|5|5.1|5.2|5.3|5.4|5.5|5.6|6|7|8|9|9.1|9.2|9.3|9.4|9.5|10|10.1|10.2|10.3|11|12|12.1|12.2|12.3|12.4|13|14|15|16|17|18|
|Alarm Description|Procedure|Handle Alarm A Fallback Operation will soon be started|Cancel Upgrade Process|Continue from State WAITING_FOR_COMMIT|Continue from State ACTIVATION_STEP_COMPLETED|$|1|2|2.1|2.2|2.3|2.4|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
