- Configure ADC based on PCC rules (Gx) Overview
- Configuration Prerequisites
- Configuration for ADC based on PCC rules (Gx)
- Configuration Examples for Use Cases
- Appendix A. ADC Policy Types
- Appendix B. ADC Policy Tags
- Reference List
1 Configure ADC based on PCC rules (Gx) Overview
Next figure, shows the main parts related to configuration and provisioning in the SAPC.
The purpose of this document is to provide guidelines to configure the SAPC node for Application Detection and Control (ADC) by providing configuration examples.
The configuration for ADC is an extension to Service Access Control, covered in Configuration Guide for Access and Charging Control (Gx).
The complete parameter list and details of all configured options of the SAPC are included in separate documents, refer to Managed Object Model (MOM) and Provisioning REST API.
Examples in this document cover the case of data configured in the SAPC internal repository. If an external repository is used, refer to Database Access.
1.1 Typographic Conventions
The following typographic and document conventions are used:
|
Convention |
Description |
Example |
|---|---|---|
|
Representational State Transfer (REST) |
Exact REST resources, methods, attibutes, or their corresponding values. |
PUT /dataplans/Silver { "dataplanName" : "Silver", "notification" : "sms" } |
|
Managed Object Class (MOC) or Attributes value |
Exact COM model object, classes names, attributes, or their corresponding values. |
SmsCenter enableDelivery=true |
|
NETCONF |
<edit-config> <target> <running /> </target> <config> <ManagedElement xmlns="urn:com:ericsson:ecim:ComTop"> <managedElementId> 1 </managedElementId> <PolicyControlFunction xmlns="urn:com:ericsson:ecim:sapcmom"> <policyControlFunctionId> 1 </policyControlFunctionId> <NotificationConfig xmlns="urn:com:ericsson: ecim:notificationconfigmom"> <notificationConfigId> 1 </notificationConfigId> <enableDelivery> true </enableDelivery> </NotificationConfig> </PolicyControlFunction> </ManagedElement> </config> </edit-config> |
2 Configuration Prerequisites
Before configuring the SAPC in an operational network, assure that:
3 Configuration for ADC based on PCC rules (Gx)
3.1 Configuring Gx PCEFs
To support ADC for some PCEFs, set the adcSupport attribute to true at the DiameterNode level.
The SAPC downloads preconfigured PCC rules enhanced with ADC only to the PCEF with both adcSupport and dynamicServiceSupport attributes set to true. Static PCC rules enhanced with ADC are activated in all the PCEFs with adcSupport attribute set to true.
| Note: |
In multiple Gx scenarios where an IP-CAN session is controlled
by several PCEFs, ADC support can be configured for more than one PCEF.
But each PCEF may report application status and perform enforcement
independently. |
3.2 Provision ADC for Services
To indicate the application identifier for application detection to the PCEF, provision the value of the tdfAppId attribute using the content URI in the provisioning REST API.
| Note: |
For static PCC rules, the tdfAppId attribute is optional. Even if it is configured, the SAPC does
not send the TDF-Application-Identifier AVP to the PCEF. |
PUT /contents/Skype
{
"contentName" : "Skype",
"pccRuleName" : "8001",
"pccRuleType" : 2,
"tdfAppId" : "appSkype"
}
| Note: |
Same tdfAppId can be provisioned
in different services, but if this is the case, take care that only
one PCC rule with same TDF-Application-Identifier should be active at any time. |
3.3 Configure ADC Redirection
ADC Redirection is only applicable to preconfigured PCC rules enhanced with ADC.
Provision the ADC Redirection profiles using content-adc-redirect URI in the provisioning REST API.
Example:
PUT /profiles/content-adc-redirect/AdcRedirectProfile1
{
"profileId" : "AdcRedirectProfile1",
"addressType" : "IPv6_ADDRESS",
"address": "4055:0db8:85a3::1319:8a2e:0370:1111"
}
3.3.1 Configure ADC Redirection Unconditionally
To assign the ADC Redirection profile unconditionally to a service, use the contentAdcRedirectProfileId inside staticQualification JSON attribute of the content URI in the provisioning REST API.
Example 1 ADC Redirection Using Unconditional Configuration
PUT /contents/Torrent
{
"contentName" : "Torrent",
"pccRuleName" : "2003",
"pccRuleType" : 0,
"tdfAppId" : "appTorrent",
"staticQualification":
{
"contentAdcRedirectProfileId": "AdcRedirectProfile1"
}
}
PUT /profiles/content-adc-redirect/AdcRedirectProfile1
{
"profileId" : "AdcRedirectProfile1",
"addressType" : "IPv6_ADDRESS",
"address": "4055:0db8:85a3::1319:8a2e:0370:1111"
}
3.3.2 Configure ADC Redirection Conditionally
Using policies, it is possible to use dynamic conditions to assign ADC Redirection to services. This can be done in addition to unconditional service qualification explained in Configure ADC Redirection Unconditionally . The policy types related to ADC Redirection which can be used and configured in the SAPC are shown in Table 2:
|
Policy Type |
Policy Locator |
Output Attributes |
Comments |
||
|---|---|---|---|---|---|
|
Context |
Resource |
Subject |
|||
|
ADC Redirect |
adc-redirect |
<contentId> |
<subscriberId> <dataplanId> |
permit adc-redirect AdcRedirectProfile[\"<redirectProfileName>"] permit adc-redirect "doNotRedirect" |
Type II = Mixing policies and qualification Gx Conditions: Access Data Subscriber ToD |
| Note: |
The values configured using policies prevail over the unconditional
profiles provisioned in the service. The SAPC considers qualification
data provisioned unconditionally, only if no policy for ADC redirection
is applicable to a service or if the policies do not return any result. |
Example 2 ADC Redirection Using Dynamic Conditions
PUT /subscribers/34615700002
{
"subscriberId" : "34615700002",
"subscribedContents" :
[
{
"contentName" : "Skype"
}
]
}
PUT /contents/Skype
{
"contentName" : "Skype",
"pccRuleName" : "2001",
"pccRuleType" : 2,
"tdfAppId" : "appSkype"
}
PUT /profiles/content-adc-redirect/RedirectProfileForSkype
{
"profileId" : "RedirectProfileForSkype",
"addressType" : "IPv6_ADDRESS",
"address": "4055:0db8:85a3::1319:8a2e:0370:1111"
}
PUT /rules/rRedirectForSkype
{
"ruleName" : "rRedirectForSkype",
"condition" : "((now.time>\"08:05\")&&(now.time<\"08:10\"))",
"outputAttributes" :
[
{
"attrName" : "adc-redirect",
"attrValue" : "AdcRedirectProfile[\"RedirectProfileForSkype\"]",
"result" : "permit"
}
]
}
PUT /policies/pRedirectForSkype
{
"policyName" : "pRedirectForSkype",
"ruleCombiningAlgorithm" : "permit-overrides",
"rules" : [ "rRedirectForSkype" ]
}
PUT /subscribers/34615700002/locators/resources/Skype/contexts/adc-redirect
{
"policies" : ["pRedirectForSkype"]
}
3.4 Configure ADC Mute Notification
ADC Mute Notification is only applicable to preconfigured PCC rules enhanced with ADC.
| Note: |
Once The SAPC sets a Mute Notification value, it
is persisted until the service is removed. |
3.4.1 Configure ADC Mute Notification Unconditionally
To indicate whether to mute notifications for a specific application associated with preconfigured PCC rules enhanced with ADC, use the contentAdcMuteNotification attribute inside staticQualification JSON attribute of the content URI in the provisioning REST API:
PUT /contents/WeChat
{
"contentName" : "WeChat",
"pccRuleName" : "9001",
"pccRuleType" : 2,
"tdfAppId" : "appWeChat",
"staticQualification":
{
"contentAdcMuteNotification": "\"muted\""
}
}
3.4.2 Configure ADC Mute Notification Conditionally
Using policies, it is possible to use dynamic conditions to assign Mute Notifications (applicable during the whole lifetime of the PCC rules). This can be done in addition to unconditional service qualification explained in Configure ADC Mute Notification Unconditionally . The policy types related to ADC which can be used and configured in the SAPC are shown in Table 3:
|
Policy Type |
Policy Locator |
Output Attributes |
Comments |
||
|---|---|---|---|---|---|
|
Context |
Resource |
Subject |
|||
|
ADC Mute |
adc-mute-notification |
<contentId> |
<subscriberId> <dataplanId> |
permit adc-mute-notification "muted" or "unmuted" |
Type II = Mixing policies and qualification Gx Conditions: Access Data Subscriber Time Conditions (but no ToD reauthorization) Used to return Redirect Mute-Notification AVP in Gx PCC Rules |
| Note: |
If time of day conditions are used in the policies, the SAPC does
not perform time-based reauthorization for Mute Notifications. The values configured using policies prevail over the Mute Notification value provisioned unconditionally in the service. The SAPC considers Mute Notification value provisioned unconditionally, only if no policy for Mute Notification is applicable to a service or if the policies do not return any result. |
Example 3 ADC Mute Notification
PUT /contents/Cmcc
{
"contentName" : "Cmcc",
"pccRuleName" : "2002",
"pccRuleType" : 2,
"tdfAppId" : "appCmcc"
}
PUT /rules/rMuteForCmcc
{
"ruleName" : "rMuteForCmcc",
"condition" : "(AccessData.subscriber.locationInfo.routingAreaCode == 11234)",
"outputAttributes" :
[
{
"attrName" : "adc-mute-notification",
"attrValue" : "\"muted\"",
"result" : "permit"
}
]
}
PUT /policies/pMuteForCmcc
{
"policyName" : "pMuteForCmcc",
"ruleCombiningAlgorithm" : "permit-overrides",
"rules" : [ "rMuteForCmcc" ]
}
PUT /locators/resources/Cmcc/contexts/adc-mute-notification
{
"policies" : [ "pMuteForCmcc" ]
}
3.5 Configure Event Triggers
To indicate to the PCEF that the SAPC is interested in application reporting, use the values APPLICATION_START and APPLICATION_STOP.
To know how to configure EventTriggers, refer to Configuration Guide for Access and Charging Control (Gx).
4 Configuration Examples for Use Cases
4.1 QoS Control based on Application Detection
The following example shows how Application Detection can be used to upgrade QoS for a dedicated bearer, when specific application traffic is detected by the PCEF and reported to the SAPC.
Example 4 QoS Upgrade
PUT /contents/WeChat
{
"contentName" : "WeChat",
"pccRuleName" : "2000",
"pccRuleType" : 2,
"tdfAppId" : "appWeChat",
"staticQualification" :
{
"contentQosProfileId" : "Qos_WeChat_Default"
}
}
PUT /profiles/content-qos/Qos_WeChat_Default
{
"arpPriorityLevel" : 3,
"mbrDownlink" : 512,
"mbrUplink" : 512,
"profileId" : "Qos_WeChat_Default",
"qci" : 8
}
PUT /profiles/content-qos/Qos_WeChat_High
{
"arpPriorityLevel" : 1,
"mbrDownlink" : 1024,
"mbrUplink" : 1024,
"profileId" : "Qos_WeChat_High",
"qci" : 6
}
PUT /rules/rQosUpgrade
{
"condition" : "(AccessData.tdfApp[\"appWeChat\"].isStarted)",
"outputAttributes" :
[
{
"attrName" : "qos",
"attrValue" : "ServiceQosProfile[\"Qos_WeChat_High\"]",
"result" : "permit"
}
],
"ruleName" : "rQosUpgrade"
}
PUT /policies/pQosUpgrade
{
"policyName" : "pQosUpgrade",
"ruleCombiningAlgorithm" : "permit-overrides",
"rules" : [ "rQosUpgrade" ]
}
PUT /locators/resources/WeChat/contexts/qos
{
"policies" : [ "pQosUpgrade" ]
}
5 Appendix A. ADC Policy Types
Table 4 shows the policy types related to ADC, which can be used and configured in the SAPC.
|
Policy Type |
Policy Locator |
Output Attributes |
Comments |
||
|---|---|---|---|---|---|
|
Context |
Resource |
Subject |
|||
|
ADC Redirect |
adc-redirect |
<contentId> |
<subscriberId> <dataplanId> |
permit adc-redirect AdcRedirectProfile[\"<redirectProfileName>"] permit adc-redirect "doNotRedirect" |
Type II = Mixing policies and qualification Gx Conditions: Access Data Subscriber ToD |
|
ADC Mute |
adc-mute-notification |
<contentId> |
<subscriberId> <dataplanId> |
permit adc-mute-notification "muted" or "unmuted" |
Type II = Mixing policies and qualification Gx Conditions: Access Data Subscriber Time Conditions (but no ToD reauthorization) Used to return Redirect Mute-Notification AVP in Gx PCC Rules |
6 Appendix B. ADC Policy Tags
The following ADC policy tag can be used in the condition formula of rules.
|
Tag |
Return Type |
Possible Values |
Comments |
|---|---|---|---|
|
AccessData.tdfApp["id"].isStarted (1) |
Boolean |
true false |
The current state for the TDF application:
|
| Note: |
When a PCC rule enhanced with ADC is not authorized, the
latest application status may not be reported by the PCEF. In this
case, the value of this tag is not up to date. |

Contents