|Glossary of Terms and Acronyms Introduction|Terms|A-E|F-K|L-P|Q-T|U-Z|Glossary|$|1|2|2.1|2.2|2.3|2.4|2.5|3|
|Trademarks Used in Library|$|1|
|Free and Open Source Software Introduction|License Texts|BSD 2-clause License|BSD 3-clause License|BSD 4-clause License|Public Domain|Apache License Version 2.0|MIT License|Boost Software License 1.0, BSD like|ISC (Internet System Consortium)|Public Domain|GPL Version 2|LGPL Version 2.1|LGPL Version 3|GNU AFFERO GENERAL PUBLIC LICENSE version 3|Python Software Foundation License Version 2|OCB License|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|2.10|2.11|2.12|2.13|2.14|2.15|
|SAPC Upgrade Information Introduction|SAPC Upgrade Information Prerequisites|Hardware Requirements|Software Requirements|Related Information|Upgrade Overview|Lead Times of Upgrade to SAPC 1.3|Downtime|Traffic Loss|Service Disturbances|$|1|1.1|1.1.1|1.1.2|1.2|2|2.1|2.2|2.3|2.4|
|Troubleshooting Introduction|Troubleshooting Tools|forall|immHelper|amfHelper|sapcHealthCheck|auto_provisioning|BackupFormatter|session-handler|Troubleshooting Functions|Linux Consoles|Internal Database Command Line Tools|COM CLI|System Health Check|Processor Load (CPU and Memory)|Alarms and Notifications|Logging|Measurements|Core Files|System Messages|SAPC Reboot|Processor Lock and Unlock|Troubleshooting Procedure|Common Faulty Situations|General Failures|License Is Not Active|Processor Is Out of Service|Load Regulation|Provisioning Failures|Failures during the Initial Configuration and Provisioning in Cloud|Fair Usage Reporting Failures|Multi-Access Failures|Diameter Connection Problems|Diameter Failures|DIAMETER RFC 6733 Messages Failures|Gx Failures|General Failures|Gx Access Control Failures|Gx QoS Control for the Default Bearer and the APN Failures|Gx Usage Reporting Failures|Rx Failures|Sy Failures|Smp Failures|End User Notifications Failures|External Database Failures|EBM Failures|SOAP Notification Interface Failures|SC Absence Feature|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|3.10|3.11|3.12|4|5|5.1|5.1.1|5.1.2|5.1.3|5.2|5.3|5.4|5.5|5.5.1|5.5.2|5.5.2.1|5.5.3|5.5.3.1|5.5.3.2|5.5.3.3|5.5.3.4|5.5.4|5.5.5|5.5.6|5.6|5.7|5.8|5.9|5.10|
|About This Guide|Intended Audience|Conventions Used in This Guide|Prerequisites|Comments About the Documentation|Overview|CLI Help|compare-configuration-file|Usage Syntax|Options|Examples|Automated Live Node Configuration Comparison|compare-local-configuration-files|Usage Syntax|Options|Examples|Working with a Comparison Options File|configuration-list|Usage Syntax|Options|Examples|configuration-revision-set-status|Usage Syntax|Options|Examples|configuration-revision-set-tag|Usage Syntax|Options|Examples|configuration-revision-unset-tag|Usage Syntax|Options|Examples|convert-configuration|Usage Syntax|Options|Examples|create-variables-file|Usage Syntax|Options|Examples|export-configuration|Usage Syntax|Options|Examples|import-configuration|Usage Syntax|Options|Examples|import-configuration-revision|Usage Syntax|Options|Examples|import-schema-revision|Usage Syntax|Options|Examples|node-create-revision|Usage Syntax|Options|Examples|node-revision-link-configuration-revision|Usage Syntax|Options|Examples|node-revision-link-schema-revision|Usage Syntax|Options|Examples|schema-compare|Usage Syntax|Options|Examples|schema-list|Usage Syntax|Options|Examples|schema-revision-set-ivl|Usage Syntax|Options|Examples|schema-revision-set-status|Usage Syntax|Options|Examples|schema-revision-unset-ivl|Usage Syntax|Options|Examples|ssl-export|Usage Syntax|Options|Examples|ssl-list|Usage Syntax|Options|Examples|ssl-list-variable|Usage Syntax|Options|Examples|ssl-set-variable|Usage Syntax|Options|Examples|ssl-unset-variable|Usage Syntax|Options|Examples|validate-local-configuration-files|Usage Syntax|Options|Examples|validate-mim|Usage Syntax|Options|Examples|validate-mpvl|Usage Syntax|Options|Examples|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|3|3.1|3.2|3.3|3.4|4|4.1|4.2|4.3|4.4|5|5.1|5.2|5.3|6|6.1|6.2|6.3|7|7.1|7.2|7.3|8|8.1|8.2|8.3|9|9.1|9.2|9.3|10|10.1|10.2|10.3|11|11.1|11.2|11.3|12|12.1|12.2|12.3|13|13.1|13.2|13.3|14|14.1|14.2|14.3|15|15.1|15.2|15.3|16|16.1|16.2|16.3|17|17.1|17.2|17.3|18|18.1|18.2|18.3|19|19.1|19.2|19.3|20|20.1|20.2|20.3|21|21.1|21.2|21.3|22|22.1|22.2|22.3|23|23.1|23.2|23.3|24|24.1|24.2|24.3|25|25.1|25.2|25.3|26|26.1|26.2|26.3|27|27.1|27.2|27.3|28|28.1|28.2|28.3|29|29.1|29.2|29.3|30|30.1|30.2|30.3|31|
|Preventive Maintenance Introduction|Preventive Maintenance Tools|Maintenance Intervals|Maintenance Procedures|Check Active Alarms|Check the SAPC Status|Check High Availability State of a System Controller|Check PMF Measures|Check Core Files|Check CPU Load and Memory Usage|Check IMM Persistent Back End|Check Disk Space|Check SAPC Backup|$|1|1.1|2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|
|Alarm Description|Procedure|Handle Alarm LOTC Time Synchronization|Handle Reason Time Difference over Threshold|Handle Reason Unusable Time Servers|Handle Reason Rejected Time Servers|Handle Reason Unreachable Time Servers|$|1|2|2.1|2.2|2.3|2.4|2.5|
|Alarm Description|Procedure|Handle Alarm License Management, Autonomous Mode Activated|$|1|2|2.1|
|Overview|Description|Prerequisites|Procedure|Creating SCTP Layer|Configuring SCTP|Recommended SS7 Parameters|SCTP Managed Object|SCTP End Point Profile Managed Object|Estimations of Userdata Transmit Buffer Size and Threshold of Userdata Transmit Buffer Size|Glossary|Reference List|$|1|1.1|1.2|2|2.1|2.2|3|3.1|3.2|3.3|4|5|
|Alarm Description|Procedure|Handle Alarm Certificate Management, a Valid Certificate Is Not Available|Install a Node Credential|Renew a Node Credential|Repair Automatic Configuration|$|1|2|2.1|2.2|2.3|2.4|
|Alarm Description|Procedure|Handle Alarm Local Authentication, Authentication Failure Limit Reached|$|1|2|2.1|
|Description|Cipher Filter String Format|Procedure|Configure TLS Ciphers|$|1|1.1|2|2.1|
|Maintenance Activities due to Faulty Blade Introduction|Prerequisites|Maintenance Activities due to Faulty Blade Procedure|System Controller Blades|Payload Blades|$|1|1.1|2|2.1|2.2|
|Alarm Description|Procedure|Handle Alarm DBS, Memory Limit Reached|$|1|2|2.1|
|Introduction|Performance Measurement Groups|Measurements of Sctp PM Group|Measurements of SctpAssociation PM Group|$|1|2|3|4|
|Introduction|Measurement Report File|File Location|Filename Format|Time Format|File Format|Supported XML Elements and Attributes|Example File|Example File in UTC Format|$|1|2|2.1|2.2|2.3|2.4|3|4|5|
|Fair Usage Function|Fair Usage Overview|Fair Usage Control Options|Usage Limits Types|Fair Usage Control Granularity|Fair Usage Control Subscriptions Types|Usage Control at Subscriber or shared dataplan Level|Usage Limits Split in Intervals|Accumulate Usage Depending on Conditions|Usage Accumulators Life Cycle|Actions When Limit is Reached|Multiple Services Offering|Shared Subscriber Plans Support|Shared Devices Plans Support|Fair Usage Control Procedure|Usage Update|Selection of Reporting Groups|Status of Selected Reporting Groups|Quota Calculation|Quota Calculation for shared dataplans|Session Reauthorization|Force Usage Reporting from the PCEF|Quota Rollover|Fair Usage Control Procedure|Quota Rollover Calculation on Reset|Usage Update|Quota Calculation|Notifications|Access to Usage Information|Integration with an External Database|Aggregable Dataplans for Fair Usage Policies|Stackable Dataplans|Fair Usage Network Deployment|Fair Usage Traffic Cases|Basic Traffic Case|Protocol Binding for Rel9 Gx onwards|Update subscriber profile|Update Usage Limits|Protocol Binding for Rel9 Gx onwards Update usage limits|Removal of Volume Limit|Protocol Binding Rel9 Gx onwards|Subscription Temporary Extension|Protocol Binding for Rel9 Gx onwards Subscription Temporary Extension|Update any subscriber data or subscriber qualification data|Conditional Accumulation Traffic Cases|Conditional Accumulation with Multiple IP-CAN Sessions|Protocol Binding for Rel 9 Gx|Accumulation based on time conditions and Bearer QoS change|Volume Usage at Reporting Group Level|Protocol Binding Rel 9 Gx|Time Usage Control|Protocol Binding Rel9 Gx onwards|Multiple Services Offering|Basic Turbo Button Traffic Case Based on Temporary Subscriber Groups|Protocol Binding for Rel9 Gx onwards|Advanced Turbo Button Traffic Case with Dynamic Group Selection Based on Usage Conditions|Multiple Packages Traffic Case|Shared Subscriber Plans|Prepaid and Postpaid Shared Subscriber Plans|Combination of individual and shared dataplan for a subscriber|Shared Devices Plans|Multi-SIM Data Plan with Shared Limit|Protocol Binding for Rel9 Gx onwards|Multi-SIM Data Plan with Device Limits|Protocol Binding for Rel9 Gx onwards|Interaction with External Database|Fair Usage Profile in External Database, Usage Accumulator in the SAPC Internal Database|Subscriber Information and Usage Accumulator in External Database|$|1|1.1|1.2|1.2.1|1.2.2|1.2.3|1.2.4|1.2.5|1.3|1.4|1.5|1.6|1.7|1.8|1.9|1.9.1|1.9.2|1.9.2.1|1.9.3|1.9.3.1|1.9.4|1.9.4.1|1.10|1.10.1|1.10.1.1|1.10.1.2|1.10.1.3|1.10.1.4|1.11|1.12|1.13|1.14|2|3|3.1|3.1.1|3.2|3.2.1|3.2.1.1|3.2.2|3.2.2.1|3.2.3|3.2.3.1|3.2.4|3.3|3.3.1|3.3.1.1|3.3.2|3.4|3.4.1|3.5|3.5.1|3.6|3.6.1|3.6.1.1|3.6.2|3.6.3|3.7|3.7.1|3.7.2|3.8|3.8.1|3.8.1.1|3.8.2|3.8.2.1|3.9|3.9.1|3.9.2|
|Understanding Infrastructure Adaptation|Key Infrastructure Adaptation Concepts|Change of NTP Server Address|Change of MTU Size|Basic Infrastructure Adaptation Procedures|$|1|1.1|1.2|1.3|2|
|Understanding Software Inventory Management|Key Software Inventory Management Concepts|Basic Software Inventory Management Procedures|$|1|1.1|2|
|Introduction|Notification Description|Notification Attributes|Procedure|$|1|2|2.1|3|
|Understanding License Management|Key License Management Concepts|Modes of Operation|Integration Unlock Mode|Normal Mode|Emergency Unlock Mode|Autonomous Mode|Locked Mode|Basic License Management Procedures|License Management-Related Alarms|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|2|3|
|Introduction|Notification Description|$|1|2|
|Event Description|Handle HeartBeat|Missing Heartbeat Event|Missing Alarm|Missing Alert|Configuration|Subscription|$|1|2|2.1|2.2|2.3|3|4|
|Understanding SSH and TLS Protocol Management|Key SSH and TLS Protocol Management Concepts|Method of Selecting Algorithms or Cipher Suites|Basic SSH and TLS Protocol Management Operations|$|1|1.1|1.2|2|
|Introduction|Target Audience|SAPC Overview|Network Overview|SAPC Connected to the Gateway Routers of the External Network (Recommended)|SAPC Deployment Including VIP Gateway Routers to Interconnect the SAPC with the Gateway Routers of the External Network (To Be Deprecated)|Network Description|Internal Networks|VIP Networks|VIP Gateway Routers|External Networks|Routing Protocols for External Networks|SysMGMT Network|Traffic Network Separation|VIP Address Allocation|OAM VIP|Provisioning VIP|Traffic VIPs|Replication VIP|External Database VIP|Event-Based Monitoring VIP|Traffic Flows|Incoming Traffic|Outgoing Traffic|Security|$|1|1.1|2|3|3.1|3.2|4|4.1|4.2|4.2.1|4.3|4.3.1|4.4|5|6|6.1|6.2|6.3|6.4|6.5|6.6|7|7.1|7.2|8|
|$|
|Introduction|Typographic Conventions|General|SS7 CAF in CBA Environment|SS7 Stack System Overview|Control of SS7 CAF Component|Control of Processes within the SS7 CAF Component|SS7 CAF Packages|Backup and Restore operations|SS7 CAF and BRF|SS7 CAF and Scaling Operations|Scale-Out|Scale-In|Error Handling|SS7 CAF Configuration Interfaces|Signaling Manager|Configuring SS7 CAF|Defining New SS7 CAF Configuration|Multiple SCTP Processes per Blade|SCTP Only stack|SS7 CAF Configuration for Scaling Operations|Setup Parameters|ECM Active Host|Usage of IPv6|CP trace and logging facilities|ECM logging|SCTP Distributed End Points|eVIP Address as Common Parts Manager Address|LDE MIP Address as Common Parts Manager Address|NTF Alarms Configuration|General Configuration Recommendations|Save SS7 CAF Configuration|Generate (Export) SS7 CAF Configuration Files|Setting parameters for large eVIP configuration|SS7 CAF Performance Management|Network Examples|Software Development Kit|SDK Installation|SS7 CAF Troubleshooting|Reference List|$|1|1.1|2|2.1|2.2|2.3|2.4|2.5|3|3.1|4|4.1|4.2|4.3|5|5.1|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|6.8|6.9|6.10|6.11|6.12|6.13|6.14|6.15|6.16|6.17|7|8|9|9.1|10|11|
|Introduction|General|Starting the CLI|The User Interface|Shell Features|CLI Naming Conventions|Modifying MO Key Attributes|The Help System|Modes of Operation|Standards in Signaling Manager|File Versions in Signaling Manager|Common Use Cases|Creating Configuration|Activating Configuration|Process Handling|Monitoring|Migrating CLI Commands|Step-by-step Example|Reference List|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|3|3.1|3.2|3.3|3.4|3.5|4|5|
|Introduction|CPI Library Types|Document Formats|Active Library Explorer Variants|Active Library Explorer Functions|Active Library Explorer Window|Frames|Library Collections|Active Library Explorer Toolbar|Context Menu|Basic Functions|Back and Forward|Search|Document View Search Syntax|Instant Document Search|Advanced Search Options|Search Library Collections|Change Sort Order|Show All Titles and Show Context|Next Search Hit|Search in Document Frame|PDF and Excel Document Searches|Navigation|Library Front Page Images|Filter Displayed Contents|Set Filters|Hide Filter Library Contents|Reset Filters|Add Bookmarks|Copy Links to Clipboard|Copy Links to Clipboard in Microsoft Internet Explorer|Copy Links to Clipboard in Other Web Browser|Create and Display Annotations|Provide Feedback|Add Note|Edit Note|Delete Note|Print|Save Document to Local Disk|View PDF Version of Current Document|Open a Document in Separate Window|Get Help|Find Active Library Explorer Version|Active Library Explorer Server|Active Library Explorer for Windows|Download Latest Active Library Explorer Version|Access Active Library Explorer Libraries Using URL Hyperlinks|Internet Address and Parameters|Open Libraries|Search for Documents|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.2.1|3.2.2|3.2.3|3.2.4|3.2.5|3.2.6|3.2.7|3.2.8|3.2.9|3.3|3.4|3.5|3.5.1|3.5.2|3.5.3|3.6|3.7|3.7.1|3.7.2|3.8|3.9|3.9.1|3.9.2|3.9.3|3.10|3.11|3.12|3.13|4|5|5.1|5.2|5.3|6|6.1|6.2|6.3|
|Measurements Introduction|Measures|Gx Protocol Measures|Rx Protocol Measures|Sy Protocol Measures|Smp Protocol Measures|Sd Protocol Measures|Fair Usage Control Measures|Notification Measures|Capacity Measures|Resources Measures|External Database Measures|EBM Measures|Optional Measures|REST Provisioning Measures|Other Measures|Measurements Configuration|Managing Measurement Collection|Managing Threshold Monitoring|Performance Measurement Reports|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|2.10|2.11|2.12|2.13|2.14|3|3.1|3.2|4|
|About This Guide|Intended Audience|Prerequisite Knowledge|How This Guide is Organized|Conventions Used in This Guide|Related Documents|Comments About the Documentation|Node Configuration Overview|Key Concepts|Workflow|Getting Started|PDB GUI|Using Tables|Defining and Deploying a Node Configuration|Selecting a Reference Configuration|Creating a Delta Configuration (Optional)|Defining Site Specific Information|Creating a New Site Specific List|Adding Site-Specific Variables from a Node Configuration|Reporting Site Specific Variable Usage|Defining Values for Site Specific Variables|Validating a Node Configuration|Exporting a Node Configuration|Deploying a Node Configuration|Customizing a Node Configuration|Creating a Delta Configuration|Modifying Node Configuration Data|Working With Parameter Groups|Adding Parameter Groups|Copying and Pasting a Parameter Group|Commenting a Parameter Group|Deleting a Parameter Group|Working with Parameters|Working with Site Specific Variables|Reference List|$|1|1.1|1.1.1|1.2|1.3|1.4|1.5|2|2.1|2.2|3|3.1|3.1.1|4|4.1|4.2|4.3|4.3.1|4.3.2|4.3.3|4.3.4|4.4|4.5|4.6|5|5.1|5.2|5.2.1|5.2.2|5.2.3|5.2.4|5.2.5|5.2.6|5.2.7|6|
|Overview|Installation|Backup Path|Backup Directory|BackupFormatter Command|list_classes|dump_class|list_instances|dump_instance|dump_mdp_instances|dump_class_instances|DBN Backup Formatter Tool Format|Primitive Types|External Types|Composed Values|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|2.4|2.5|2.6|3|3.1|3.2|3.3|4|
|Introduction|Prerequisites|Statement of Compliance Definitions|Statement of Compliance|$|1|1.1|2|3|
|General|Introduction|Terms|Concept|Compliance Lists|IETF - Stream Control Transmission Protocol|Notes|Reference List|$|1|1.1|1.2|1.3|2|2.1|3|4|##3_1f#####
|Introduction|General Considerations|Scope, References and Abbreviations|Purpose and Scope|References and Terminology|Technical Report Impact|Business Requirements for Policy|Session-Based Policies|Wholesale Sessions|Application Admission Control|Session Resource Request initiation sources|Bandwidth|QoS|Security|IPv6 Support|Network Threat Detection|Multicast|Routing|Auditing, Service monitoring and Accounting|Charging|Deep Packet Inspection|Use Cases|Functional Architecture elements|BPC Framework Functional Architecture|Policy Enforcement Point (PEP)|Policy Decision Point (PDP)|Admission Control Function|Repository Function|Security Proxy/Gateway function|Application Function (AF)|AAA Server Function|BPC Framework Policy Control Framework Interfaces|BPC Framework PCF Deployment Functional Architecture Mapping onto TR-101 Functional Architecture|Informative AAA implementation examples|Informative PEP/PDP implementation examples|Policy Information Flows|Information Flow Objectives|Policy Information Flow Structure|Network Logical Functions|Policy Information Model Elements and requirements|Policy Information Model Messages between PDP and PEP over R Interface|Abstract Policy Information Elements  PDP -> PEP direction parameters submitted for policy|Abstract Policy Information Elements  PEP -> PDP direction parameters submitted during subscriber login|Abstract Policy Information Elements  PEP -> PDP direction parameters submitted for Access Port Configuration|Abstract Policy Information Elements  Access Node -> BRAS/BNG direction parameters submitted for Access Resource Reporting|Abstract Policy Information Elements  BRAS/BNG -> AAA direction parameters submitted for Access Resource Reporting|Abstract Policy Information Elements  AAA -> PDP direction parameters submitted for policy|Abstract Policy Information Elements  PDP -> AAA direction parameters submitted for policy|Vendor propietary extensions|Annex I (Informative). Relationship to other Broadband Techinical Reports|Annex II (Informative). Relationships with other Policy Control Standards|Annex III (Informative). Policy Information Objects Definitions|Reference List|$|1|2|3|3.1|3.2|4|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|5.9|5.10|5.11|5.12|5.13|5.14|6|7|7.1|7.2|7.3|7.4|7.5|7.6|7.7|7.8|7.9|7.10|7.11|7.12|8|8.1|8.1.1|8.1.2|8.1.3|8.1.4|8.1.4.1|8.1.4.2|8.1.4.3|8.1.4.4|8.1.4.5|8.1.4.6|8.1.4.7|8.1.5|9|10|11|12|
|$|
|System Administration Overview|Administration Interfaces and Tools|Interfaces|REST API|NETCONF|SSH|SFTP|SNMP|Tools|Policy Studio|COM CLI|SSH|Configuration and Provisioning Overview|Configuration through COM|Performance Measures Management|Fault Management|Logging Management|Security Management|Startup and Shutdown|SAPC Restart|SAPC Stop|SAPC Start|Processor Restart|Directory Structure|$|1|2|2.1|2.1.1|2.1.2|2.1.3|2.1.4|2.1.5|2.2|2.2.1|2.2.2|2.2.3|3|3.1|4|5|6|7|8|8.1|8.2|8.3|8.4|9|
|Introduction|Document Purpose and Scope|Disclaimer Note|Revision Information|Overview|Reference Architectures|3GPP Policy and Charging Control (PCC) Architecture|Broadband Forum (BBF) Broadband Policy Control Framework Architecture|3GPP and BBF Policy Convergence for Fixed Broadband and Mobile Broadband|ETSI Network Functions Virtualization (NFV) Framework|Naming Conventions|Solutions|SAPC in Ericsson Virtual Evolved Packet Core (Virtual EPC)|SAPC in Ericsson IMS|SAPC in Ericsson Wi-Fi Calling|SAPC in Ericsson Integrated Policy and Charging|SAPC in Ericsson SDN|Functions|Policy Management for Mobile, Fix, and Convergent Networks (Gx-based)|Policy Management for Wi-Fi Access|Subscription Management|Dynamic Policy Control|Integrated Policy and Charging - Policy Control Based on Spending Limits|Mobility Based Policy|External SPR Support|Event-Based Monitoring (EBM)|Time-Based Authorizations|Notifications to End-Subscribers or to External Systems|Reauthorization Upon Subscription Change|1+1 Geographical Redundancy|Flexible Output Protocol|UE Trace|Policy Studio|Fair Usage Policies|Other Supported Functions|Interfaces|Reference Model|Statement of Compliance|SW Architecture|Operation and Maintenance|Middleware|Provisioning|Node Configuration|Fault Management|Performance Management|Logging|Security Management|Backup and Restore|Troubleshooting|License Management|Installation and Deployment|PNF Deployment|VNF Deployment|Glossary|Reference List|$|1|1.1|1.2|1.3|2|3|3.1|3.2|3.3|3.4|3.5|4|4.1|4.2|4.3|4.4|4.5|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|5.9|5.10|5.11|5.12|5.13|5.14|5.15|5.16|5.17|6|6.1|6.2|7|8|8.1|8.2|8.3|8.4|8.5|8.6|8.7|8.8|8.9|8.10|9|9.1|9.2|10|11|
|Description|Procedure|Replenish Emergency Unlock Activations|$|1|2|2.1|
|Description|Procedure|$|1|2|
|Description|Procedure|Disable SNMP Target|$|1|2|2.1|
|Description|Procedure|Cancel Backup and Restore Operation|$|1|2|2.1|
|Description|Procedure|Create Password Policy|$|1|2|2.1|
|Description|Procedure|View SSH Algorithms|$|1|2|2.1|
|Smp Interface Overview|Document Content Conventions|Smp Message Exchange|Diameter Base Protocol Messages|Smp Capability Negotiation|Device Watchdog|Disconnect Peer|Smp Interface Message Format|Smp Credit-Control-Request (CCR)|Smp Credit-Control-Answer (CCA)|Smp Interface AVPs|MIP6-Agent-Info AVP|Smp Error Handling|Smp Protocol Errors|Smp Application Errors|Reference List|$|1|1.1|2|3|3.1|3.2|3.3|4|4.1|4.2|5|5.1|6|6.1|6.2|7|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions and Abbreviations|Definitions|Abbreviations|Signalling Flows over Gx, Gxx, Rx, Sd, Sy, Np, Nt, St and S9|IP-CAN Session Establishment|IP-CAN Session Termination|UE-Initiated|AF Located in HPLMN|AF Located in VPLMN|PCEF-Initiated|AF Located in the HPLMN|AF Located in the VPLMN|PCRF-Initiated|AF Located in HPLMN|AF located in VPLMN|IP-CAN Session Modification|Network-Initiated IP-CAN Session Modification|Interactions between BBERF, PCEF, TDF, OCS, TSSF and PCRF(PCC/QoS/ADC Rule Provisioning in PUSH Mode)|Interactions between PCRF, AF and SPR|AF Session Establishment|AF Session Modification|AF Session Termination|PCEF-Initiated IP-CAN Session Modification (PCC Rule Provisioning in PULL Mode)|PCEF-Initiated IP-CAN Session Modification. AF Located in HPLMN.|PCEF-Initiated IP-CAN Session Modification, AF Located in the VPLMN|Gateway Control Session Procedures|Multiple BBERF Signalling Flows|Application Detection and Enforcement Procedures|TDF Session Establishment in Case of Solicited Reporting|TDF Session Termination|TDF Session Modification|Application Detection, Reporting and Control Rules Request|Application Detection and Control Rules Provision|Spending Limits Procedures over Sy Reference Point|Initial Spending Limit Report Request|Intermediate Spending Limit Report Request|Final Spending Limit Report Request|Spending Limit Report|Call Flows for User Plane Congestion Management|Traffic Steering Control Procedures over St Reference Point|Negotiation for Future Background Data Transfer Procedure over Nt Reference Point|Binding Mechanism|Overview|Session Binding|PCC Rule Authorization and QoS Rule Generation|Bearer Binding|QoS Parameters Mapping|Overview|UE-Initiated IP-CAN Bearers|Network-Initiated IP-CAN Bearers|QoS Parameter Mapping Functions at AF|QoS Parameter Mapping Functions at PCRF|QoS Parameter Mapping Functions at PCEF|GPRS|Authorized IP QoS Parameters per PDP Context to Authorized UMTS QoS Parameters Mapping in GGSN|Comparing UMTS QoS Parameters against the Authorized UMTS QoS Parameters in GGSN for UE Initiated PDP Context|3GPP-EPS|Authorized IP QoS Parameters per PDP Context to Authorized UMTS QoS Parameters Mapping in P-GW|Comparing UMTS QoS Parameters against the Authorized UMTS QoS Parameters in P-GW for UE Initiated PDP Context|QoS Parameter Mapping Functions at UE for a UE-Initiated GPRS PDP Context|SDP to UMTS QoS Parameter Mapping in UE|SDP Parameters to Authorized UMTS QoS Parameters Mapping in UE|PCRF Addressing|General|DRA Definition|DRA Procedures|DRA Flows|Diameter Race Condition Handling|Overview|Procedures for Gx, Gxx, Sd and S9|Annex A (Informative): Examples of Deriving the Maximum Authorized Parameters from the SDP Parameters|Annex B (Normative): Signalling Flows for IMS|B.0 General|B.1 Subscription to Notification of Signalling Path Status at IMS Registration|B.1a Subscription to Notification of Change of IP-CAN Type at IMS Registration|B.1b Provisioning of SIP Signalling Flow Information at IMS Registration|B.1c Subscription to Notification of Change of PLMN Identifier at IMS Registration|B.2 IMS Session Establishment|B.2.1 Provisioning of Service Information at Originating P-CSCF and PCRF|B.2.2 Provisioning of Service Information at Terminating P-CSCF and PCRF|B.3 IMS Session Modification|B.3.1 Provisioning of Service Information|B.3.2 Enabling of IP Flows|B.3.3 Disabling of IP Flows|B.3.4 Media Component Removal|B.4 IMS Session Termination|B.4.1 Mobile Initiated Session Release / Network Initiated Session Release|B.4.2 IP-CAN Bearer Release/Loss|B.5 P-CSCF Restoration|Annex C (Normative): NAT Related Procedures|C.1 Support for Media Traversal of NATs Using ICE|C.2 P-CSCF Procedures|C.3 PCRF Procedures|C.4 P_CSCF Procedures to Support Media Traversal through Hosted NAT without ICE|Annex D (Normative): Access Specific Procedures for GPRS|D.1 General|D.2 Binding Mechanisms|D.3 PCC Procedures|D.3.1 IP-CAN Session Modification|D.3.1.1 Network-Initiated IP-CAN Session Modification|D.3.1.2 PCEF-Initiated IP-CAN Session Modification|D.3.1.2.1 UE-Initiated IP-CAN Bearer Establishment or IP-CAN Bearer Modification|D.3.1.2.2 UE-Initiated IP-CAN Bearer Termination|Annex E (Normative): Fixed Broadband Access Interworking with EPC|E.1 General|E.2 Definitions and Abbreviations|E.3 Binding Mechanisms|E.3.1 EPC-Routed Traffic|E.3.2 NSWO traffic|E.4 PCC Procedures|E.4.1 Introduction|E.4.2 IP-CAN Session Establishment|E.4.3 IP-CAN Session Termination|E.4.4 IP-CAN Session Modification|E.5 3GPP HNB Procedures  CS Support|E.5.1 S9a CS Session Establishment|E.5.2 PCRF Initiated S9a CS Session Modification|E.5.3 S9a CS Session Termination|E.6 PCRF Addressing|E.7 BPCF Addressing|E.8 Session Linking Function|Annex F (Normative): Access Specific Aspects, Fixed Broadband Access Network Convergence|Annex G (Normative): Diameter Overload Control Mechanism|Annex H (Normative): Access Specific Procedures for 3GPP EPS|Annex I (Normative): APN Matching Procedures|Annex J (Normative): Diameter Message Priority Mechanism|Annex K (Normative): Diameter Load Control Mechanism|Annex L (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|3.3.1|3.3.2|4|4.1|4.2|4.2.1|4.2.1.1|4.2.1.2|4.2.2|4.2.2.1|4.2.2.2|4.2.3|4.2.3.1|4.2.3.2|4.3|4.3.1|4.3.1.1|4.3.1.2|4.3.1.2.1|4.3.1.2.2|4.3.1.2.3|4.3.2|4.3.2.1|4.3.2.2|4.4|4.5|4.6|4.6.1|4.6.2|4.6.3|4.6.3.1|4.6.3.2|4.7|4.7.1|4.7.2|4.7.3|4.7.4|4.8|4.9|4.10|5|5.1|5.2|5.3|5.4|6|6.1|6.1.1|6.1.2|6.2|6.3|6.4|6.4.1|6.4.1.1|6.4.1.2|6.4.2|6.4.2.1|6.4.2.2|6.5|6.5.1|6.5.2|7|7.1|7.2|7.3|7.4|8|8.1|8.2|9|10|10.1|10.2|10.3|10.4|10.5|10.6|10.6.1|10.6.2|10.7|10.7.1|10.7.2|10.7.3|10.7.4|10.8|10.8.1|10.8.2|10.9|11|11.1|11.2|11.3|11.4|12|12.1|12.2|12.3|12.3.1|12.3.1.1|12.3.1.2|12.3.1.2.1|12.3.1.2.2|13|13.1|13.2|13.3|13.3.1|13.3.2|13.4|13.4.1|13.4.2|13.4.3|13.4.4|13.5|13.5.1|13.5.2|13.5.3|13.6|13.7|13.8|14|15|16|17|18|19|20|21|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions and Abbreviations|Definitions|Abbreviations|Signalling Flows over Gx, Gxx, Rx, Sd, Sy, Np, Nt, St and S9|IP-CAN Session Establishment|IP-CAN Session Termination|UE-Initiated|AF Located in HPLMN|AF Located in VPLMN|PCEF-Initiated|AF Located in the HPLMN|AF Located in the VPLMN|PCRF-Initiated|AF Located in HPLMN|AF located in VPLMN|IP-CAN Session Modification|Network-Initiated IP-CAN Session Modification|Interactions between BBERF, PCEF, TDF, OCS, TSSF and PCRF(PCC/QoS/ADC Rule Provisioning in PUSH Mode)|Interactions between PCRF, AF and SPR|AF Session Establishment|AF Session Modification|AF Session Termination|PCEF-Initiated IP-CAN Session Modification (PCC Rule Provisioning in PULL Mode)|PCEF-Initiated IP-CAN Session Modification. AF Located in HPLMN.|PCEF-Initiated IP-CAN Session Modification, AF Located in the VPLMN|Gateway Control Session Procedures|Multiple BBERF Signalling Flows|Application Detection and Enforcement Procedures|TDF Session Establishment in Case of Solicited Reporting|TDF Session Termination|TDF Session Modification|Application Detection, Reporting and Control Rules Request|Application Detection and Control Rules Provision|Spending Limits Procedures over Sy Reference Point|Initial Spending Limit Report Request|Intermediate Spending Limit Report Request|Final Spending Limit Report Request|Spending Limit Report|Call Flows for User Plane Congestion Management|Traffic Steering Control Procedures over St Reference Point|Negotiation for Future Background Data Transfer Procedure over Nt Reference Point|Binding Mechanism|Overview|Session Binding|PCC Rule Authorization and QoS Rule Generation|Bearer Binding|QoS Parameters Mapping|Overview|UE-Initiated IP-CAN Bearers|Network-Initiated IP-CAN Bearers|QoS Parameter Mapping Functions at AF|QoS Parameter Mapping Functions at PCRF|QoS Parameter Mapping Functions at PCEF|GPRS|Authorized IP QoS Parameters per PDP Context to Authorized UMTS QoS Parameters Mapping in GGSN|Comparing UMTS QoS Parameters against the Authorized UMTS QoS Parameters in GGSN for UE Initiated PDP Context|3GPP-EPS|Authorized IP QoS Parameters per PDP Context to Authorized UMTS QoS Parameters Mapping in P-GW|Comparing UMTS QoS Parameters against the Authorized UMTS QoS Parameters in P-GW for UE Initiated PDP Context|QoS Parameter Mapping Functions at UE for a UE-Initiated GPRS PDP Context|SDP to UMTS QoS Parameter Mapping in UE|SDP Parameters to Authorized UMTS QoS Parameters Mapping in UE|PCRF Addressing|General|DRA Definition|DRA Procedures|DRA Flows|Diameter Race Condition Handling|Overview|Procedures for Gx, Gxx, Sd and S9|Annex A (Informative): Examples of Deriving the Maximum Authorized Parameters from the SDP Parameters|Annex B (Normative): Signalling Flows for IMS|B.0 General|B.1 Subscription to Notification of Signalling Path Status at IMS Registration|B.1a Subscription to Notification of Change of IP-CAN Type at IMS Registration|B.1b Provisioning of SIP Signalling Flow Information at IMS Registration|B.1c Subscription to Notification of Change of PLMN Identifier at IMS Registration|B.2 IMS Session Establishment|B.2.1 Provisioning of Service Information at Originating P-CSCF and PCRF|B.2.2 Provisioning of Service Information at Terminating P-CSCF and PCRF|B.3 IMS Session Modification|B.3.1 Provisioning of Service Information|B.3.2 Enabling of IP Flows|B.3.3 Disabling of IP Flows|B.3.4 Media Component Removal|B.4 IMS Session Termination|B.4.1 Mobile Initiated Session Release / Network Initiated Session Release|B.4.2 IP-CAN Bearer Release/Loss|B.5 P-CSCF Restoration|Annex C (Normative): NAT Related Procedures|C.1 Support for Media Traversal of NATs Using ICE|C.2 P-CSCF Procedures|C.3 PCRF Procedures|C.4 P_CSCF Procedures to Support Media Traversal through Hosted NAT without ICE|Annex D (Normative): Access Specific Procedures for GPRS|D.1 General|D.2 Binding Mechanisms|D.3 PCC Procedures|D.3.1 IP-CAN Session Modification|D.3.1.1 Network-Initiated IP-CAN Session Modification|D.3.1.2 PCEF-Initiated IP-CAN Session Modification|D.3.1.2.1 UE-Initiated IP-CAN Bearer Establishment or IP-CAN Bearer Modification|D.3.1.2.2 UE-Initiated IP-CAN Bearer Termination|Annex E (Normative): Fixed Broadband Access Interworking with EPC|E.1 General|E.2 Definitions and Abbreviations|E.3 Binding Mechanisms|E.3.1 EPC-Routed Traffic|E.3.2 NSWO traffic|E.4 PCC Procedures|E.4.1 Introduction|E.4.2 IP-CAN Session Establishment|E.4.3 IP-CAN Session Termination|E.4.4 IP-CAN Session Modification|E.5 3GPP HNB Procedures  CS Support|E.5.1 S9a CS Session Establishment|E.5.2 PCRF Initiated S9a CS Session Modification|E.5.3 S9a CS Session Termination|E.6 PCRF Addressing|E.7 BPCF Addressing|E.8 Session Linking Function|Annex F (Normative): Access Specific Aspects, Fixed Broadband Access Network Convergence|Annex G (Normative): Diameter Overload Control Mechanism|Annex H (Normative): Access Specific Procedures for 3GPP EPS|Annex I (Normative): APN Matching Procedures|Annex J (Normative): Diameter Message Priority Mechanism|Annex K (Normative): Diameter Load Control Mechanism|Annex L (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|3.3.1|3.3.2|4|4.1|4.2|4.2.1|4.2.1.1|4.2.1.2|4.2.2|4.2.2.1|4.2.2.2|4.2.3|4.2.3.1|4.2.3.2|4.3|4.3.1|4.3.1.1|4.3.1.2|4.3.1.2.1|4.3.1.2.2|4.3.1.2.3|4.3.2|4.3.2.1|4.3.2.2|4.4|4.5|4.6|4.6.1|4.6.2|4.6.3|4.6.3.1|4.6.3.2|4.7|4.7.1|4.7.2|4.7.3|4.7.4|4.8|4.9|4.10|5|5.1|5.2|5.3|5.4|6|6.1|6.1.1|6.1.2|6.2|6.3|6.4|6.4.1|6.4.1.1|6.4.1.2|6.4.2|6.4.2.1|6.4.2.2|6.5|6.5.1|6.5.2|7|7.1|7.2|7.3|7.4|8|8.1|8.2|9|10|10.1|10.2|10.3|10.4|10.5|10.6|10.6.1|10.6.2|10.7|10.7.1|10.7.2|10.7.3|10.7.4|10.8|10.8.1|10.8.2|10.9|11|11.1|11.2|11.3|11.4|12|12.1|12.2|12.3|12.3.1|12.3.1.1|12.3.1.2|12.3.1.2.1|12.3.1.2.2|13|13.1|13.2|13.3|13.3.1|13.3.2|13.4|13.4.1|13.4.2|13.4.3|13.4.4|13.5|13.5.1|13.5.2|13.5.3|13.6|13.7|13.8|14|15|16|17|18|19|20|21|
|Introduction|Other Network Elements|General Impact|Capacity and Performance|Subscriber Capacity and Network Performance|Configuration|Changes in Upgrade Procedure|SAPC 1.0|SAPC 1.1|SAPC 1.2|SAPC 1.3|Upgrade Impact in UDC|SAPC 1.0|SAPC 1.1|SAPC 1.2|BackupFormatter Tool|IP Network Design|SAPC 1.1|VNF|PNF - NSP|SAPC 1.2|SAPC 1.3|Other Impacts|SAPC 1.0|SAPC 1.1|SAPC 1.2|Impacts on Basic Functions|Event Triggers Selection|Description of Impacts|Interface|Operation|Flexible Output Protocol|Description of Impacts|Interface|Operation|PCEF Restart and PCEF Removal|Description of Impacts|Interface|Operation|Policy Studio Improvements in SAPC 1.0|Description of Impacts|Interface|Operation|Diameter Race Conditions and Concurrent Reauthorizations over Gx|Description of Impacts|Capacity and Performance|Interface|Operation|Performance Data Collection Support|Description of Impacts|Interface|Operation|Virtualization and Cloud Improvements in SAPC 1.0|Description of Impacts|Interface|Operation|CNOM Support|Description of Impacts|Interface|Operation|NB-IoT RAT-Type Support|Description of Impacts|Interface|Operation|Virtualization and Cloud Improvements in SAPC 1.1|Description of Impacts|Interface|Operation|Session Release due to Subscription Removal|Description of Impacts|Capacity and Performance|Interface|Operation|Policy Studio Improvements in SAPC 1.1|Description of Impacts|Interface|Operation|Other Impacts|Extended QCI Support|Description of Impacts|Interface|Operation|Session Cleanup Mechanism Due to Inactivity|Description of Impacts|Interface|Operation|UE Trace Tool|Description of Impacts|Interface|Operation|Flexible ARP Mapping|Description of Impacts|Interface|Operation|CNOM Support Improvements in SAPC 1.1.1|Description of Impacts|Interface|Operation|UE Trace Improvements in SAPC 1.1.1|Description of Impacts|Interface|Operation|Security Management Improvements in SAPC 1.1.1|Description of Impacts|Interface|Operation|Policy Studio Improvements in SAPC 1.1.1|Description of Impacts|Interface|Operation|Virtualization and Cloud Improvements in SAPC 1.1.1|Description of Impacts|Interface|Operation|Policy Studio Improvements in SAPC 1.2|Description of Impacts|Interface|Operation|Other Impacts|Virtualization and Cloud Improvements in SAPC 1.2|Description of Impacts|Interface|Operation|Diameter Stack Enhancements in SAPC 1.2|Description of Impacts|Interface|Operation|Default Dataplan Priority|Description of Impacts|Interface|Operation|Session Context Exposure in SAPC 1.2|Description of Impacts|Capacity and Performance|Interface|Operation|REST API to Translate Session IP Address to IMSI in SAPC 1.2|Description of Impacts|Capacity and Performance|Interface|Operation|Use Local Time and Ignore Received 3GPP-MS-TimeZone AVP|Description of Impacts|Capacity and Performance|Interface|Operation|Virtualization and Cloud Improvements in SAPC 1.3|Description of Impacts|Capacity and performance|Interface|Operation|Policy Studio Improvements in SAPC 1.3|Description of Impacts|Interface|Operation|Other Impacts|Security Management Improvements in SAPC 1.3|Description of Impacts|Interface|Operation|CNOM Support Improvements in SAPC 1.3|Description of Impacts|Interface|Operation|Session Handler Tool|Description of Impacts|Interface|Operation|Impacts on Optional Functions|Presence Reporting Area|Description of Impacts|Capacity and Performance|Interface|Operation|Emergency Services|Description of Impacts|Interface|Operation|External Database Redundancy Support (1+1+1)|Description of Impacts|Interface|Operation|Mobility Based Policy Control for Overlay Deployments|Description of Impacts|Capacity and Performance|Interface|Operation|AF Restart|Description of Impacts|Interface|Operation|Overload Protection of Priority Services|Description of Impacts|Interface|Operation|IMS Restoration|Description of Impacts|Capacity and Performance|Interface|Operation|Network Location Information for Untrusted WLAN|Description of Impacts|Interface|Operation|Notification of Signalling Path Status|Description of Impacts|Capacity and Performance|Interface|Operation|Geographical Redundancy Active-Active|Description of Impacts|Interface|Operation|Other Impacts|IP-CAN Type Change Notification|Description of Impacts|Capacity and Performance|Interface|Operation|Aggregable Dataplans for Fair Usage Policies|Description of Impacts|Interface|Operation|Delay PCC Rules Installation for Preliminary Service Information|Description of Impacts|Interface|Operation|Support of Sd for Application Detection and Control|Description of Impacts|Interface|Operation|Multimedia Priority Services|Description of Impacts|Interface|Operation|Extended Bit Rates over Gx/Rx|Description of Impacts|Interface|Operation|Quota Rollover|Description of Impacts|Interface|Operation|EBM Analytics|Description of Impacts|Capacity and Performance|Interface|Operation|Support of New QCI for Low Latency Services|Description of Impacts|Capacity and Performance|Interface|Operation|Stackable Dataplans|Description of Impacts|Interface|Operation|$|1|1.1|2|2.1|2.1.1|2.2|2.3|2.3.1|2.3.2|2.3.3|2.3.4|2.4|2.4.1|2.4.2|2.4.3|2.5|2.6|2.6.1|2.6.1.1|2.6.1.2|2.6.2|2.6.3|2.7|2.7.1|2.7.2|2.7.3|3|3.1|3.1.1|3.1.2|3.1.3|3.2|3.2.1|3.2.2|3.2.3|3.3|3.3.1|3.3.2|3.3.3|3.4|3.4.1|3.4.2|3.4.3|3.5|3.5.1|3.5.2|3.5.3|3.5.4|3.6|3.6.1|3.6.2|3.6.3|3.7|3.7.1|3.7.2|3.7.3|3.8|3.8.1|3.8.2|3.8.3|3.9|3.9.1|3.9.2|3.9.3|3.10|3.10.1|3.10.2|3.10.3|3.11|3.11.1|3.11.2|3.11.3|3.11.4|3.12|3.12.1|3.12.2|3.12.3|3.12.4|3.13|3.13.1|3.13.2|3.13.3|3.14|3.14.1|3.14.2|3.14.3|3.15|3.15.1|3.15.2|3.15.3|3.16|3.16.1|3.16.2|3.16.3|3.17|3.17.1|3.17.2|3.17.3|3.18|3.18.1|3.18.2|3.18.3|3.19|3.19.1|3.19.2|3.19.3|3.20|3.20.1|3.20.2|3.20.3|3.21|3.21.1|3.21.2|3.21.3|3.22|3.22.1|3.22.2|3.22.3|3.22.4|3.23|3.23.1|3.23.2|3.23.3|3.24|3.24.1|3.24.2|3.24.3|3.25|3.25.1|3.25.2|3.25.3|3.26|3.26.1|3.26.2|3.26.3|3.26.4|3.27|3.27.1|3.27.2|3.27.3|3.27.4|3.28|3.28.1|3.28.2|3.28.3|3.28.4|3.29|3.29.1|3.29.2|3.29.3|3.29.4|3.30|3.30.1|3.30.2|3.30.3|3.30.4|3.31|3.31.1|3.31.2|3.31.3|3.32|3.32.1|3.32.2|3.32.3|3.33|3.33.1|3.33.2|3.33.3|4|4.1|4.1.1|4.1.2|4.1.3|4.1.4|4.2|4.2.1|4.2.2|4.2.3|4.3|4.3.1|4.3.2|4.3.3|4.4|4.4.1|4.4.2|4.4.3|4.4.4|4.5|4.5.1|4.5.2|4.5.3|4.6|4.6.1|4.6.2|4.6.3|4.7|4.7.1|4.7.2|4.7.3|4.7.4|4.8|4.8.1|4.8.2|4.8.3|4.9|4.9.1|4.9.2|4.9.3|4.9.4|4.10|4.10.1|4.10.2|4.10.3|4.10.4|4.11|4.11.1|4.11.2|4.11.3|4.11.4|4.12|4.12.1|4.12.2|4.12.3|4.13|4.13.1|4.13.2|4.13.3|4.14|4.14.1|4.14.2|4.14.3|4.15|4.15.1|4.15.2|4.15.3|4.16|4.16.1|4.16.2|4.16.3|4.17|4.17.1|4.17.2|4.17.3|4.18|4.18.1|4.18.2|4.18.3|4.18.4|4.19|4.19.1|4.19.2|4.19.3|4.19.4|4.20|4.20.1|4.20.2|4.20.3|
|Description|Procedure|Enable SNMP Target|$|1|2|2.1|
|Description|Procedure|Create Backup|$|1|2|2.1|
|Description|Procedure|Install or Renew Node Credential by CSR|$|1|2|2.1|
|Description|Procedure|Change Password Policy|$|1|2|2.1|
|Description|Procedure|View Authentication Method Order|$|1|2|2.1|
|SAPC PNF Scale Out Introduction|SAPC PNF Scale Out Prerequisites|SAPC PNF Scale Out Automated Procedure|SAPC PNF Scale Out Step by Step Procedure|$|1|1.1|2|3|
|Sd Interface Overview|Document Content Conventions|Sd Interface Message Exchange|Diameter Base Protocol Messages|Sd Capability Negotiation|Device Watchdog|Disconnect Peer|Sd Interface Message Format|Sd TDF Session Request|Sd TDF Session Answer|Sd Credit Control Request|Sd Credit Control Answer|Sd Re-Authorization Request|Sd Re-Authorization Answer|Sd Interface AVPs|Sd Error Handling|Sd Protocol Errors|Sd Application Errors|Reference List|$|1|1.1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|4.6|5|6|6.1|6.2|7|
|Integration with OCS for Monetary Spending Limit Reporting (Sy) Introduction|Integration with OCS Function|Overview|Policy Counter|Determination of Policy and Charging Control Information to Install in PCEF|Ericsson Sy: Integration with Charging System|Policy Group|Subscriber Data Distribution|Integration with Multiple Online Charging Systems|Network Deployments|Traffic Cases|Bill Shock Prevention|Use of Policy Counters Status during IP-CAN session Life Cycle|Policy Counter Status Change|Centralized Management of Operator Service Offering|Use of Policy Counters and Policy Group Information during IP-CAN session Life Cycle|Policy Counter Status Change|Counter Status Change, Bearer QoS Change|Policy Group Update: Turbo Button Purchase|New Policy Group Added|Operator Network Policies, Abusers Example|Connectivity with the Online Charging System|Failure Handling|SLR Failure|SNR Failure|STR Failure|Reference List|$|1|2|2.1|2.2|2.3|2.4|2.4.1|2.4.2|2.5|3|4|4.1|4.1.1|4.1.2|4.2|4.2.1|4.2.2|4.2.2.1|4.2.3|4.2.3.1|4.3|4.4|4.5|4.5.1|4.5.2|4.5.3|5|
|Understanding Performance Management|Key Performance Management Concepts|Measurement Types|PM Groups|Measurement Jobs|Reported Data / Performance Measurement XML Files|Threshold Alarms|Used Interfaces|Basic Performance Management Procedures|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|2|
|Integration in User Data Consolidation Introduction|Integration in User Data Consolidation Solution Description|Solution Overview|SAPC Data Model for UDC|SAPC LDAP Directory Information Tree|SAPC Entries|Connection Handling|Clean up of Connections|CUDB Geographical Redundancy (1+1+1) Support|Failover|CUDB Failure Detection|Error Handling with CUDB|LDAP Operations Time-Out|Failover Execution|Failback|Connectivity Lost|Failure in LDAP Operations|Overload Protection on IP BB Delayed Responses|CUDB Overload|Interfaces Description|LDAP Interface|LDAP Messages between the SAPC and CUDB|LDAP between Provisioning System and CUDB|SOAP Interface|Operation and Maintenance|Configure Database Access in the SAPC|Subscriber|Detailed Values of Entity Data Sources to access data from CUDB|External Repository|Subscriber|Subscriber and SubscriberIdentity when Subscribers are provisioned with several Identifiers|Emergency Subscriber|Configure SOAP Notifications in CUDB|Subscriber Data Extension in CUDB|LDAP Operations for Provisioning System|Creation of Entries|Deletion of Entries|Addition/Removal of Traffic Identifiers|Alarms|Logging|Capabilities|Reference List|$|1|2|2.1|2.2|2.2.1|2.2.2|2.3|2.3.1|2.4|2.4.1|2.4.1.1|2.4.1.1.1|2.4.1.1.2|2.4.1.2|2.4.2|2.4.3|2.5|2.6|2.7|3|3.1|3.1.1|3.1.2|3.2|4|4.1|4.1.1|4.1.2|4.1.2.1|4.1.2.2|4.1.2.3|4.1.2.4|4.2|4.3|4.4|4.4.1|4.4.2|4.4.3|4.5|4.6|5|6|
|Configuration and Provisioning Overview|Other Conventions|Configuration Prerequisites|Subscription and Policies Data Overview|Provision Subscribers|Provision Subscriber Groups|Provision Global Subscriber Group|Provision Subscribers|Subscriber Identifiers|Handling of Multiple Service Offerings|Configure Dynamic Group Selection|Handling of Unknown Subscribers|Autoprovisioning|Unknown Subscriber|Unknown Subscriber EDSources pointing to the SAPC internal database|Unknown and Autoprovisioning Precedence|Provision Policies|Policies Basic Concepts|Rule Combining Algorithm in a Policy|Combining Algorithm in a Policy Locator|Combining Algorithm for the Subscriber Policies|Provisioning Policies|Subscriber Extension Data to Be Used in Policies|Policy Types|Policy Tags|Appendix A. Condition Policy Language|Condition Formula Examples|Reuse of Complex Expressions|Condition Formula Language|Condition Formula Operators|Condition Formula Expressions|Reference List|$|1|1.1|2|3|4|4.1|4.1.1|4.2|4.2.1|4.3|4.4|4.5|4.5.1|4.5.2|4.5.3|4.5.4|5|5.1|5.1.1|5.1.2|5.1.3|5.2|5.2.1|5.3|5.4|6|6.1|6.1.1|6.2|6.2.1|6.2.2|7|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions and Abbreviations|Definitions|Abbreviations|High Level Requirements|General Requirements|Charging Related Requirements|General|Charging Models|Examples of Service Data Flow Charging|Policy Control Requirements|General|Gating Control|QoS Control|QoS Control at Service Data Flow Level|QoS Control at IP CAN Bearer Level|QoS Conflict Handling|QoS Control at APN Level|Subscriber Spending Limits|Usage Monitoring Control|Application Detection and Control|RAN User Plane Congestion Detection, Reporting and Mitigation|Support for Service Capability Exposure|Traffic Steering Control|Management of Packet Flow Descriptions in the PCEF/TDF Using the PFDF|Architecture Model and Reference Points|Reference Architecture|Reference Points|Rx Reference Point|Gx Reference Point|Reference Points to Subscriber Databases|Sp Reference Point|Ud Reference Point|Gy Reference Point|Gz Reference Point|S9 Reference Point|Gxx Reference Point|Sd Reference Point|Sy Reference Point|Gyn Reference Point|Gzn Reference Point|Np Reference Point|Nt Reference Point|St Reference Point|Nu Reference Point|Gw Reference Point|Gwn Reference Point|Functional Description|Overall Description|Binding Mechanism|General|Session Binding|PCC Rule Authorization and QoS Rule Generation|Bearer Binding|Reporting|Credit Management|Event Triggers|Policy Control|Service (Data Flow) Prioritization and Conflict Handling|Standardized QoS Characteristics|General|Standardized QCI Characteristics|Allocation and Retention Priority Characteristics|Termination Action|Handling of Packet Filters Provided to the UE by PCEF/BBERF|IMS Emergency Session Support|Architecture Model and Reference Points|PCC Rule Authorization and QoS Rule Generation|Functional Entities|PCRF|PCEF|P-CSCF|PCC Procedures and Flows|Multimedia Priority Service Support|Architecture model and Reference points|PCC rule authorization and QoS rule generation|Priority EPS Bearer Service|Bearer priority for IMS Multimedia Priority Services|ADC Rule Authorization|Redirection|Resource Sharing for Different AF Sessions|Reporting of RAN User Plane Congestion Information|Negotiation for Future Background Data Transfer|Traffic Steering Control|PCC Support of NBIFOM|Resource Reservation for Services Sharing Priority|Management of Packet Flow Descriptions Using the PFDF|3GPP PS Data Off|Functional Entities|Policy Control and Charging Rules Function (PCRF)|Input for PCC Decisions|Subscription Information Management in the PCRF|V-PCRF|General|V-PCRF and Home Routed Access|V-PCRF and Visited Access (Local Breakout)|H-PCRF|General|H-PCRF and Home Routed Access|H-PCRF and Visited Access (Local Breakout)|Handling of Multiple BBFs Associated with the Same IP CAN Session|Handling of Two BBFs Associated with the Same IP-CAN Session during Handover|Handling of Multiple BBFs with IP-CAN Session Flow Mobility|Policy and Charging Enforcement Function (PCEF)|Application Function (AF)|Subscription Profile Repository (SPR)|Online Charging System|Offline Charging System (OFCS)|Bearer Binding and Event Reporting Function (BBERF)|User Data Repository (UDR)|Traffic Detection Function (TDF)|RAN Congestion Awareness Function (RCAF)|Service Capability Exposure Function (SCEF)|Traffic Steering Support Function (TSSF)|Packet Flow Description Function (PFDF)|Policy and Charging Control Rule|General|Policy and Charging Control Rule Operations|IP-CAN Bearer and IP-CAN Session Related Policy Information|TDF Session Related Policy Information|APN Related Policy Information|Quality of Service Control Rule|Usage Monitoring Control Specific Information|General|Usage Monitoring Control Operations|S2c Based IP Flow Mobility Routing Rule|Application Detection and Control Rule|General|Application Detection and Control Rule Operations over Sd|Policy Decisions Based on Spending Limits|Traffic Steering Control Information|NBIFOM Routing Rule|PCC Procedures and Flows|Introduction|IP-CAN Session Establishment|IP-CAN Session Termination|UE Initiated IP-CAN Session Termination|GW (PCEF) Initiated IP-CAN Session Termination|IP-CAN Session Modification|IP-CAN Session Modification; GW (PCEF) Initiated|IP-CAN Session Modification; PCRF Initiated|Void|Update of the Subscription Information in the PCRF|PCRF Discovery and Selection|General Principles|Solution Principles|Gateway Control Session Procedures|Change in Subscription for MPS Priority Services|Procedures over Sy Reference Point|Initial Spending Limit Report Request|Intermediate Spending Limit Report Request|Final Spending Limit Report Request|Spending Limit Report|Procedures over Np Reference Point|Procedures over Nt reference point|Procedures for Management of PFDs|Annex A (Normative): Access Specific Aspects (3GPP)|A.1 GPRS|A.1.0 General|A.1.1 High level requirements|A.1.1.1 General|A.1.1.2 Charging Related Requirements|A.1.1.3 Policy Control Requirements|A.1.1.4 QoS Control|A.1.2 Architecture Model and Reference Points|A.1.2.1 Reference Points|A.1.2.1.1 Gx Reference Point|A.1.2.2 Reference Architecture|A.1.3 Functional Description|A.1.3.1 Overall Description|A.1.3.1.1 Binding Mechanism|A.1.3.1.2 Reporting|A.1.3.1.3 Credit management|A.1.3.1.4 Event Triggers|A.1.3.1.5 Policy Control|A.1.3.2 Functional Entities|A.1.3.2.1 Policy Control and Charging Rules Function (PCRF)|A.1.3.2.2 Policy and Charging Enforcement Function (PCEF)|A.1.3.2.3 Application Function (AF)|A.1.3.3 Policy and Charging Control Rule|A.1.3.3.1 General|A.1.3.3.2 Policy and Charging Control Rule Operations|A.1.3.4 IP-CAN bearer and IP-CAN Session Related Policy Information|A.1.3.4a TDF Session Related Policy Information|A.1.3.5 Void|A.1.4 PCC Procedures and Flows|A.1.4.1 Introduction|A.1.4.2 IP-CAN Session Establishment|A.1.4.3 IP-CAN Session Termination|A.1.4.3.1 UE initiated IP-CAN Session Termination|A.1.4.3.2 GW initiated IP-CAN Session Termination|A.1.4.4 IP-CAN Session Modification|A.1.4.4.1 IP CAN Session Modification; GW (PCEF) Initiated|A.1.4.4.2 IP CAN Session Modification; PCRF Initiated|A.2 Void|A.3 Void|A.4 3GPP Accesses (GERAN/UTRAN/E-UTRAN) - GTP-Based EPC|A.4.0 General|A.4.1 High Level Requirements|A.4.1.1 Charging Related Requirements|A.4.1.2 QoS Control|A.4.2 Architectural Model and Reference Points|A.4.2.1 Reference Architecture|A.4.3 Functional Description|A.4.3.1 Overall Description|A.4.3.1.1 Credit Management|A.4.3.1.2 Event Triggers|A.4.3.1.3 Binding Mechanism|A.4.3.1.4 Policy Control|A.4.3.2 Functional Entities|A.4.3.2.1 Policy Control and Charging Rules Function (PCRF)|A.4.3.2.2 Policy and Charging Enforcement Function (PCEF)|A.4.3.2.3 Application Function (AF)|A.4.3.3 Void|A.4.3.4 IP-CAN Bearer and IP-CAN Session Related Policy Information|A.4.3.5 TDF Session Related Policy Information|A.4.4 PCC Procedures and Flows|A.4.4.1 Introduction|A.4.4.2 IP-CAN Session Establishment|A.4.4.3 GW (PCEF) Initiated IP CAN Session Termination|A.4.4.4 IP-CAN Session Modification|A.4.4.4.1 IP-CAN Session Modification; GW (PCEF) Initiated|A.4.4.4.2 IP-CAN Session Modification; PCRF Initiated|A.5 3GPP Accesses (GERAN/UTRAN/E-UTRAN) - PMIP-Based EPC|A.5.0 General|A.5.1 High Level Requirements|A.5.1.0 General|A.5.1.1 QoS Control|A.5.2 Architectural Model and Reference Points|A.5.2.1 Reference Architecture|A.5.3 Functional Description|A.5.3.1 Overall Description|A.5.3.1.1 Binding Mechanism|A.5.3.1.2 Credit Management|A.5.3.1.3 Event Triggers|A.5.3.2 Functional Entities|A.5.3.2.1 Policy Control and Charging Rules Function (PCRF)|A.5.3.2.2 Policy and Charging Enforcement Function (PCEF)|A.5.3.2.3 Bearer Binding and Event Reporting Function (BBERF)|A.5.3.3 Void|A.5.3.4 Void|A.5.3.5 IP-CAN Bearer and IP-CAN Session Related Policy Information|A.5.3.6 TDF Session Related Policy Information|A.5.4 PCC Procedures and Flows|A.5.4.1 Introduction|A.5.4.2 Gateway Control Session Establishment|A.5.4.3 Gateway Control and QoS Rules Request|A.5.4.4 Gateway Control and QoS Rules Provisioning|A.5.4.5 IP-CAN Session Establishment|A.5.4.6 IP CAN Session Modification|Annex B (Informative): Void|Annex C (Informative): Void|Annex D (Informative): Access Specific Aspects (Non-3GPP)|Annex E (Informative): Void|Annex F (Informative): Void|Annex G (Informative): PCC Rule Precedence Configuration|Annex H (Normative): Access Specific Aspects (EPC-Based Non-3GPP)|H.1 General|H.2 EPC-Based cdma2000 HRPD Access|H.3 EPC-Based Trusted WLAN Access with S2a|H.4 EPC-Based Untrusted Non-3GPP Access|Annex I (Informative): Void|Annex J (Informative): Standardized QCI Characteristics - Rationale and Principles|Annex K (Informative): Limited PCC Deployment|Annex L (Normative): Limited PCC Deployment|Annex M (Informative): Handling of UE or Network Responsibility for the Resource Management of Services|Annex N (Informative): PCC Usage for Sponsored Data Connectivity|Annex P (Normative): Fixed Broadband Access Interworking with EPC|Annex Q (Informative): How to Achieve Usage Monitoring via the OCS|Annex R (Informative): Disabling/Re-Enabling Usage Monitoring for a PCC/ADC Rule|Annex S (Normative): Fixed Broadband Access|Annex T (Informative): How to Accumulate PCC/ADC Rule Usage in Multiple Monitoring Groups|Annex U (Normative): Policy and Charging Control in the Downlink Direction for Traffic Marked with DSCP by the TDF|Annex V (Informative): Policy Control for Remote UEs behind a ProSe UE-to-Network Relay UE|Annex W (Informative): Void|Annex X (Informative): Encrypted Traffic Detection by Using Domain Name Matching|Annex Y (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|3.3.1|3.3.2|4|4.1|4.2|4.2.1|4.2.2|4.2.3|4.3|4.3.1|4.3.2|4.3.3|4.3.3.1|4.3.3.2|4.3.3.3|4.3.3.4|4.3.4|4.4|4.5|4.6|4.7|4.8|4.9|5|5.1|5.2|5.2.1|5.2.2|5.2.3|5.2.3.1|5.2.3.2|5.2.4|5.2.5|5.2.6|5.2.7|5.2.8|5.2.9|5.2.10|5.2.11|5.2.12|5.2.13|5.2.14|5.2.15|5.2.16|5.2.17|6|6.1|6.1.1|6.1.1.1|6.1.1.2|6.1.1.3|6.1.1.4|6.1.2|6.1.3|6.1.4|6.1.5|6.1.6|6.1.7|6.1.7.1|6.1.7.2|6.1.7.3|6.1.8|6.1.9|6.1.10|6.1.10.1|6.1.10.2|6.1.10.3|6.1.10.3.1|6.1.10.3.2|6.1.10.3.3|6.1.10.4|6.1.11|6.1.11.1|6.1.11.2|6.1.11.3|6.1.11.4|6.1.12|6.1.13|6.1.14|6.1.15|6.1.16|6.1.17|6.1.18|6.1.19|6.1.20|6.1.21|6.2|6.2.1|6.2.1.1|6.2.1.2|6.2.1.3|6.2.1.3.1|6.2.1.3.2|6.2.1.3.3|6.2.1.4|6.2.1.4.1|6.2.1.4.2|6.2.1.4.3|6.2.1.5|6.2.1.5.1|6.2.1.5.2|6.2.2|6.2.3|6.2.4|6.2.5|6.2.6|6.2.7|6.2.8|6.2.9|6.2.10|6.2.11|6.2.12|6.2.13|6.3|6.3.1|6.3.2|6.4|6.4.1|6.4.2|6.5|6.6|6.6.1|6.6.2|6.7|6.8|6.8.1|6.8.2|6.9|6.10|6.11|7|7.1|7.2|7.3|7.3.1|7.3.2|7.4|7.4.1|7.4.2|7.4.3|7.5|7.6|7.6.1|7.6.2|7.7|7.8|7.9|7.9.1|7.9.2|7.9.3|7.9.4|7.10|7.11|7.12|8|8.1|8.1.1|8.1.2|8.1.2.1|8.1.2.2|8.1.2.3|8.1.2.4|8.1.3|8.1.3.1|8.1.3.1.1|8.1.3.2|8.1.4|8.1.4.1|8.1.4.1.1|8.1.4.1.2|8.1.4.1.3|8.1.4.1.4|8.1.4.1.5|8.1.4.2|8.1.4.2.1|8.1.4.2.2|8.1.4.2.3|8.1.4.3|8.1.4.3.1|8.1.4.3.2|8.1.4.4|8.1.4.5|8.1.4.6|8.1.5|8.1.5.1|8.1.5.2|8.1.5.3|8.1.5.3.1|8.1.5.3.2|8.1.5.4|8.1.5.4.1|8.1.5.4.2|8.2|8.3|8.4|8.4.1|8.4.2|8.4.2.1|8.4.2.2|8.4.3|8.4.3.1|8.4.4|8.4.4.1|8.4.4.1.1|8.4.4.1.2|8.4.4.1.3|8.4.4.1.4|8.4.4.2|8.4.4.2.1|8.4.4.2.2|8.4.4.2.3|8.4.4.3|8.4.4.4|8.4.4.5|8.4.5|8.4.5.1|8.4.5.2|8.4.5.3|8.4.5.4|8.4.5.4.1|8.4.5.4.2|8.5|8.5.1|8.5.2|8.5.2.1|8.5.2.2|8.5.3|8.5.3.1|8.5.4|8.5.4.1|8.5.4.1.1|8.5.4.1.2|8.5.4.1.3|8.5.4.2|8.5.4.2.1|8.5.4.2.2|8.5.4.2.3|8.5.4.3|8.5.4.4|8.5.4.5|8.5.4.6|8.5.5|8.5.5.1|8.5.5.2|8.5.5.3|8.5.5.4|8.5.5.5|8.5.5.6|9|10|11|12|13|14|15|15.1|15.2|15.3|15.4|16|17|18|19|20|21|22|23|24|25|26|27|28|29|30|31|32|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions and Abbreviations|Definitions|Abbreviations|High Level Requirements|General Requirements|Charging Related Requirements|General|Charging Models|Examples of Service Data Flow Charging|Policy Control Requirements|General|Gating Control|QoS Control|QoS Control at Service Data Flow Level|QoS Control at IP CAN Bearer Level|QoS Conflict Handling|QoS Control at APN Level|Subscriber Spending Limits|Usage Monitoring Control|Application Detection and Control|RAN User Plane Congestion Detection, Reporting and Mitigation|Support for Service Capability Exposure|Traffic Steering Control|Management of Packet Flow Descriptions in the PCEF/TDF Using the PFDF|Architecture Model and Reference Points|Reference Architecture|Reference Points|Rx Reference Point|Gx Reference Point|Reference Points to Subscriber Databases|Sp Reference Point|Ud Reference Point|Gy Reference Point|Gz Reference Point|S9 Reference Point|Gxx Reference Point|Sd Reference Point|Sy Reference Point|Gyn Reference Point|Gzn Reference Point|Np Reference Point|Nt Reference Point|St Reference Point|Nu Reference Point|Gw Reference Point|Gwn Reference Point|Functional Description|Overall Description|Binding Mechanism|General|Session Binding|PCC Rule Authorization and QoS Rule Generation|Bearer Binding|Reporting|Credit Management|Event Triggers|Policy Control|Service (Data Flow) Prioritization and Conflict Handling|Standardized QoS Characteristics|General|Standardized QCI Characteristics|Allocation and Retention Priority Characteristics|Termination Action|Handling of Packet Filters Provided to the UE by PCEF/BBERF|IMS Emergency Session Support|Architecture Model and Reference Points|PCC Rule Authorization and QoS Rule Generation|Functional Entities|PCRF|PCEF|P-CSCF|PCC Procedures and Flows|Multimedia Priority Service Support|Architecture model and Reference points|PCC rule authorization and QoS rule generation|Priority EPS Bearer Service|Bearer priority for IMS Multimedia Priority Services|ADC Rule Authorization|Redirection|Resource Sharing for Different AF Sessions|Reporting of RAN User Plane Congestion Information|Negotiation for Future Background Data Transfer|Traffic Steering Control|PCC Support of NBIFOM|Resource Reservation for Services Sharing Priority|Management of Packet Flow Descriptions Using the PFDF|3GPP PS Data Off|Functional Entities|Policy Control and Charging Rules Function (PCRF)|Input for PCC Decisions|Subscription Information Management in the PCRF|V-PCRF|General|V-PCRF and Home Routed Access|V-PCRF and Visited Access (Local Breakout)|H-PCRF|General|H-PCRF and Home Routed Access|H-PCRF and Visited Access (Local Breakout)|Handling of Multiple BBFs Associated with the Same IP CAN Session|Handling of Two BBFs Associated with the Same IP-CAN Session during Handover|Handling of Multiple BBFs with IP-CAN Session Flow Mobility|Policy and Charging Enforcement Function (PCEF)|Application Function (AF)|Subscription Profile Repository (SPR)|Online Charging System|Offline Charging System (OFCS)|Bearer Binding and Event Reporting Function (BBERF)|User Data Repository (UDR)|Traffic Detection Function (TDF)|RAN Congestion Awareness Function (RCAF)|Service Capability Exposure Function (SCEF)|Traffic Steering Support Function (TSSF)|Packet Flow Description Function (PFDF)|Policy and Charging Control Rule|General|Policy and Charging Control Rule Operations|IP-CAN Bearer and IP-CAN Session Related Policy Information|TDF Session Related Policy Information|APN Related Policy Information|Quality of Service Control Rule|Usage Monitoring Control Specific Information|General|Usage Monitoring Control Operations|S2c Based IP Flow Mobility Routing Rule|Application Detection and Control Rule|General|Application Detection and Control Rule Operations over Sd|Policy Decisions Based on Spending Limits|Traffic Steering Control Information|NBIFOM Routing Rule|PCC Procedures and Flows|Introduction|IP-CAN Session Establishment|IP-CAN Session Termination|UE Initiated IP-CAN Session Termination|GW (PCEF) Initiated IP-CAN Session Termination|IP-CAN Session Modification|IP-CAN Session Modification; GW (PCEF) Initiated|IP-CAN Session Modification; PCRF Initiated|Void|Update of the Subscription Information in the PCRF|PCRF Discovery and Selection|General Principles|Solution Principles|Gateway Control Session Procedures|Change in Subscription for MPS Priority Services|Procedures over Sy Reference Point|Initial Spending Limit Report Request|Intermediate Spending Limit Report Request|Final Spending Limit Report Request|Spending Limit Report|Sy Session Termination|Procedures over Np Reference Point|Procedures over Nt reference point|Procedures for Management of PFDs|Annex A (Normative): Access Specific Aspects (3GPP)|A.1 GPRS|A.1.0 General|A.1.1 High level requirements|A.1.1.1 General|A.1.1.2 Charging Related Requirements|A.1.1.3 Policy Control Requirements|A.1.1.4 QoS Control|A.1.2 Architecture Model and Reference Points|A.1.2.1 Reference Points|A.1.2.1.1 Gx Reference Point|A.1.2.2 Reference Architecture|A.1.3 Functional Description|A.1.3.1 Overall Description|A.1.3.1.1 Binding Mechanism|A.1.3.1.2 Reporting|A.1.3.1.3 Credit management|A.1.3.1.4 Event Triggers|A.1.3.1.5 Policy Control|A.1.3.2 Functional Entities|A.1.3.2.1 Policy Control and Charging Rules Function (PCRF)|A.1.3.2.2 Policy and Charging Enforcement Function (PCEF)|A.1.3.2.3 Application Function (AF)|A.1.3.3 Policy and Charging Control Rule|A.1.3.3.1 General|A.1.3.3.2 Policy and Charging Control Rule Operations|A.1.3.4 IP-CAN bearer and IP-CAN Session Related Policy Information|A.1.3.4a TDF Session Related Policy Information|A.1.3.5 Void|A.1.4 PCC Procedures and Flows|A.1.4.1 Introduction|A.1.4.2 IP-CAN Session Establishment|A.1.4.3 IP-CAN Session Termination|A.1.4.3.1 UE initiated IP-CAN Session Termination|A.1.4.3.2 GW initiated IP-CAN Session Termination|A.1.4.4 IP-CAN Session Modification|A.1.4.4.1 IP CAN Session Modification; GW (PCEF) Initiated|A.1.4.4.2 IP CAN Session Modification; PCRF Initiated|A.2 Void|A.3 Void|A.4 3GPP Accesses (GERAN/UTRAN/E-UTRAN) - GTP-Based EPC|A.4.0 General|A.4.1 High Level Requirements|A.4.1.1 Charging Related Requirements|A.4.1.2 QoS Control|A.4.2 Architectural Model and Reference Points|A.4.2.1 Reference Architecture|A.4.3 Functional Description|A.4.3.1 Overall Description|A.4.3.1.1 Credit Management|A.4.3.1.2 Event Triggers|A.4.3.1.3 Binding Mechanism|A.4.3.1.4 Policy Control|A.4.3.2 Functional Entities|A.4.3.2.1 Policy Control and Charging Rules Function (PCRF)|A.4.3.2.2 Policy and Charging Enforcement Function (PCEF)|A.4.3.2.3 Application Function (AF)|A.4.3.3 Void|A.4.3.4 IP-CAN Bearer and IP-CAN Session Related Policy Information|A.4.3.5 TDF Session Related Policy Information|A.4.4 PCC Procedures and Flows|A.4.4.1 Introduction|A.4.4.2 IP-CAN Session Establishment|A.4.4.3 GW (PCEF) Initiated IP CAN Session Termination|A.4.4.4 IP-CAN Session Modification|A.4.4.4.1 IP-CAN Session Modification; GW (PCEF) Initiated|A.4.4.4.2 IP-CAN Session Modification; PCRF Initiated|A.5 3GPP Accesses (GERAN/UTRAN/E-UTRAN) - PMIP-Based EPC|A.5.0 General|A.5.1 High Level Requirements|A.5.1.0 General|A.5.1.1 QoS Control|A.5.2 Architectural Model and Reference Points|A.5.2.1 Reference Architecture|A.5.3 Functional Description|A.5.3.1 Overall Description|A.5.3.1.1 Binding Mechanism|A.5.3.1.2 Credit Management|A.5.3.1.3 Event Triggers|A.5.3.2 Functional Entities|A.5.3.2.1 Policy Control and Charging Rules Function (PCRF)|A.5.3.2.2 Policy and Charging Enforcement Function (PCEF)|A.5.3.2.3 Bearer Binding and Event Reporting Function (BBERF)|A.5.3.3 Void|A.5.3.4 Void|A.5.3.5 IP-CAN Bearer and IP-CAN Session Related Policy Information|A.5.3.6 TDF Session Related Policy Information|A.5.4 PCC Procedures and Flows|A.5.4.1 Introduction|A.5.4.2 Gateway Control Session Establishment|A.5.4.3 Gateway Control and QoS Rules Request|A.5.4.4 Gateway Control and QoS Rules Provisioning|A.5.4.5 IP-CAN Session Establishment|A.5.4.6 IP CAN Session Modification|Annex B (Informative): Void|Annex C (Informative): Void|Annex D (Informative): Access Specific Aspects (Non-3GPP)|Annex E (Informative): Void|Annex F (Informative): Void|Annex G (Informative): PCC Rule Precedence Configuration|Annex H (Normative): Access Specific Aspects (EPC-Based Non-3GPP)|H.1 General|H.2 EPC-Based cdma2000 HRPD Access|H.3 EPC-Based Trusted WLAN Access with S2a|H.4 EPC-Based Untrusted Non-3GPP Access|Annex I (Informative): Void|Annex J (Informative): Standardized QCI Characteristics - Rationale and Principles|Annex K (Informative): Limited PCC Deployment|Annex L (Normative): Limited PCC Deployment|Annex M (Informative): Handling of UE or Network Responsibility for the Resource Management of Services|Annex N (Informative): PCC Usage for Sponsored Data Connectivity|Annex P (Normative): Fixed Broadband Access Interworking with EPC|Annex Q (Informative): How to Achieve Usage Monitoring via the OCS|Annex R (Informative): Disabling/Re-Enabling Usage Monitoring for a PCC/ADC Rule|Annex S (Normative): Fixed Broadband Access|Annex T (Informative): How to Accumulate PCC/ADC Rule Usage in Multiple Monitoring Groups|Annex U (Normative): Policy and Charging Control in the Downlink Direction for Traffic Marked with DSCP by the TDF|Annex V (Informative): Policy Control for Remote UEs behind a ProSe UE-to-Network Relay UE|Annex W (Informative): Void|Annex X (Informative): Encrypted Traffic Detection by Using Domain Name Matching|Annex Y (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|3.3.1|3.3.2|4|4.1|4.2|4.2.1|4.2.2|4.2.3|4.3|4.3.1|4.3.2|4.3.3|4.3.3.1|4.3.3.2|4.3.3.3|4.3.3.4|4.3.4|4.4|4.5|4.6|4.7|4.8|4.9|5|5.1|5.2|5.2.1|5.2.2|5.2.3|5.2.3.1|5.2.3.2|5.2.4|5.2.5|5.2.6|5.2.7|5.2.8|5.2.9|5.2.10|5.2.11|5.2.12|5.2.13|5.2.14|5.2.15|5.2.16|5.2.17|6|6.1|6.1.1|6.1.1.1|6.1.1.2|6.1.1.3|6.1.1.4|6.1.2|6.1.3|6.1.4|6.1.5|6.1.6|6.1.7|6.1.7.1|6.1.7.2|6.1.7.3|6.1.8|6.1.9|6.1.10|6.1.10.1|6.1.10.2|6.1.10.3|6.1.10.3.1|6.1.10.3.2|6.1.10.3.3|6.1.10.4|6.1.11|6.1.11.1|6.1.11.2|6.1.11.3|6.1.11.4|6.1.12|6.1.13|6.1.14|6.1.15|6.1.16|6.1.17|6.1.18|6.1.19|6.1.20|6.1.21|6.2|6.2.1|6.2.1.1|6.2.1.2|6.2.1.3|6.2.1.3.1|6.2.1.3.2|6.2.1.3.3|6.2.1.4|6.2.1.4.1|6.2.1.4.2|6.2.1.4.3|6.2.1.5|6.2.1.5.1|6.2.1.5.2|6.2.2|6.2.3|6.2.4|6.2.5|6.2.6|6.2.7|6.2.8|6.2.9|6.2.10|6.2.11|6.2.12|6.2.13|6.3|6.3.1|6.3.2|6.4|6.4.1|6.4.2|6.5|6.6|6.6.1|6.6.2|6.7|6.8|6.8.1|6.8.2|6.9|6.10|6.11|7|7.1|7.2|7.3|7.3.1|7.3.2|7.4|7.4.1|7.4.2|7.4.3|7.5|7.6|7.6.1|7.6.2|7.7|7.8|7.9|7.9.1|7.9.2|7.9.3|7.9.4|7.9.5|7.10|7.11|7.12|8|8.1|8.1.1|8.1.2|8.1.2.1|8.1.2.2|8.1.2.3|8.1.2.4|8.1.3|8.1.3.1|8.1.3.1.1|8.1.3.2|8.1.4|8.1.4.1|8.1.4.1.1|8.1.4.1.2|8.1.4.1.3|8.1.4.1.4|8.1.4.1.5|8.1.4.2|8.1.4.2.1|8.1.4.2.2|8.1.4.2.3|8.1.4.3|8.1.4.3.1|8.1.4.3.2|8.1.4.4|8.1.4.5|8.1.4.6|8.1.5|8.1.5.1|8.1.5.2|8.1.5.3|8.1.5.3.1|8.1.5.3.2|8.1.5.4|8.1.5.4.1|8.1.5.4.2|8.2|8.3|8.4|8.4.1|8.4.2|8.4.2.1|8.4.2.2|8.4.3|8.4.3.1|8.4.4|8.4.4.1|8.4.4.1.1|8.4.4.1.2|8.4.4.1.3|8.4.4.1.4|8.4.4.2|8.4.4.2.1|8.4.4.2.2|8.4.4.2.3|8.4.4.3|8.4.4.4|8.4.4.5|8.4.5|8.4.5.1|8.4.5.2|8.4.5.3|8.4.5.4|8.4.5.4.1|8.4.5.4.2|8.5|8.5.1|8.5.2|8.5.2.1|8.5.2.2|8.5.3|8.5.3.1|8.5.4|8.5.4.1|8.5.4.1.1|8.5.4.1.2|8.5.4.1.3|8.5.4.2|8.5.4.2.1|8.5.4.2.2|8.5.4.2.3|8.5.4.3|8.5.4.4|8.5.4.5|8.5.4.6|8.5.5|8.5.5.1|8.5.5.2|8.5.5.3|8.5.5.4|8.5.5.5|8.5.5.6|9|10|11|12|13|14|15|15.1|15.2|15.3|15.4|16|17|18|19|20|21|22|23|24|25|26|27|28|29|30|31|32|#############################################################################################################################################################3_1f#############################################################################################################################
|Description|Procedure|$|1|2|
|Description|Procedure|Create SNMP View|$|1|2|2.1|
|Description|Procedure|Restore Backup|$|1|2|2.1|
|Description|Procedure|Cancel Offline Enrollment|$|1|2|2.1|
|Description|Procedure|Delete Password Policy|$|1|2|2.1|
|Event-Based Monitoring Interface Overview|Typographic Conventions|Description|Output Format Elements|XML File|General|Parameter Types|Structure Types|Events|Records|XML File Schema|Binary Stream Output Format|Logical Format|Data Format|Record Padding|Record Descriptions|Stream Header Record|Stream Error Record|Event Record|Directory Structure|$|1|1.1|2|3|4|4.1|4.2|4.3|4.4|4.5|5|6|6.1|6.2|6.3|6.4|6.4.1|6.4.2|6.4.3|7|
|Policy Studio Introduction|Target Groups|Prerequisite Knowledge|Policy Studio Overview|Getting Started|System Prerequisites|Software Prerequisites|Node.js|MongoDB|Downloading the Software and Preparing the Installation|Installation|User Roles|Administrator|Operator|Viewer|Connectivity and Security Management|Certificate between the web browser and the Policy Studio|Certificate between the Policy Studio and the SAPC|Working with The Policy Studio|Accessing The Policy Studio|Logon|System Administrator Logon|Operator and Viewer Logon|Improving Policy Studio Performance with NGINX|Downloading and Installing NGINX|Configuring NGINX|NGINX HTTP Configuration|NGINX HTTPs Configuration|Starting NGINX|Accessing Policy Studio through NGINX|Operation And Maintenance|Backup and Data Restore|Backup Procedure|Restore Procedure|Logging Management|Troubleshooting|Administrator Password Recovery|Restart The Policy Studio|Upgrade|Rollback|SAPC Functionality Not Supported|Functions|Contents|Dataplans|Subscribers|Rules|Policy Tags|Condition Formula Expressions|Condition Formula Operators|Limitations|Dataplans|Profiles|Global Policies|Export Functionality|Import Functionality|$|1|1.1|1.1.1|2|3|3.1|3.2|3.2.1|3.2.2|3.3|3.4|3.5|3.5.1|3.5.2|3.5.3|3.6|3.6.1|3.6.2|4|4.1|4.2|4.2.1|4.2.2|4.2.3|4.2.3.1|4.2.3.2|4.2.3.2.1|4.2.3.2.2|4.2.3.3|4.2.3.4|5|5.1|5.1.1|5.1.2|5.2|5.3|5.3.1|5.3.2|5.4|5.5|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|6.8|7|7.1|7.2|7.3|7.4|7.5|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions, Symbols, and Abbreviations|Rx Reference Point|Overview|Rx Reference Model|Functional Elements|AF|PCRF|PCC Procedures over Rx Reference Point|Initial Provisioning of Session Information|Modification of Session Information|Gate Related Procedures|AF Session Termination|Subscription to Notification of Signalling Path Status|Traffic Plane Events|IP-CAN Session Termination|Service Data Flow Deactivation|Notification of Signalling Path Status|IP-CAN Type Change Notification|Access Network Charging Information Notification|Reporting Usage for Sponsored Data Connectivity|Reporting Access Network Information|Temporary Network Failure Handling|PLMN Information Change Notification|P-CSCF Restoration Enhancement Support|Priority Sharing Request|Support for Media Component Versioning|Rx Protocol|Protocol Support|Initialization, Maintenance and Termination of Connection and Session|Rx Specific AVPs|Rx Re-Used AVPs|Use of the Supported-Features AVP on the Rx Reference Point|Rx Messages|Annex A (Normative) IMS Related P-CSCF Procedures over Rx|A.1 Provision of Service Information at P-CSCF|A.2 Enabling of IP Flows|A.3 Support for SIP Forking|A.3.1 PCC Rule Provisioning for Early Media for Forked Responses|A.3.2 Updating the Provisioned PCC Rules at the Final Answer|A.4 Notification of AF Signalling Transmission Path Status|A.5 Indication of Emergency Registration and Session Establishment|A.6 Notification IP-CAN Type Change|A.7 Support for Early Session Disposition SDP|A.7.1 General|A.7.2 Service Information Provisioning for Early Media|A.7.3 Updating the Provisioned Service Information when Dialogue is Established|A.8 Provision of Signalling Flow Information at P-CSCF|A.9 Handling of MPS Session|A.10 Retrieval of Network Provided Location Information|A.11 Handling of RAN/NAS Release Cause Values|A.12 Resource Sharing|A.13 Handling of MCPTT Priority Call|A.14 Notification of PLMN Change|Annex B (Normative) Flow Identifiers: Format Definition and Examples|Annex C (Informative): Void|Annex E (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.3.1|4.3.2|4.4|4.4.1|4.4.2|4.4.3|4.4.4|4.4.5|4.4.6|4.4.6.1|4.4.6.2|4.4.6.3|4.4.6.4|4.4.6.5|4.4.6.6|4.4.6.7|4.4.6.8|4.4.6.9|4.4.7|4.4.8|4.4.9|5|5.1|5.2|5.3|5.4|5.4.1|5.5|6|6.1|6.2|6.3|6.3.1|6.3.2|6.4|6.5|6.6|6.7|6.7.1|6.7.2|6.7.3|6.8|6.9|6.10|6.11|6.12|6.13|6.14|7|8|9|10|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions, Symbols, and Abbreviations|Rx Reference Point|Overview|Rx Reference Model|Functional Elements|AF|PCRF|PCC Procedures over Rx Reference Point|Initial Provisioning of Session Information|Modification of Session Information|Gate Related Procedures|AF Session Termination|Subscription to Notification of Signalling Path Status|Traffic Plane Events|IP-CAN Session Termination|Service Data Flow Deactivation|Notification of Signalling Path Status|IP-CAN Type Change Notification|Access Network Charging Information Notification|Reporting Usage for Sponsored Data Connectivity|Reporting Access Network Information|Temporary Network Failure Handling|PLMN Information Change Notification|P-CSCF Restoration Enhancement Support|Priority Sharing Request|Support for Media Component Versioning|Extended bandwidth support for EPC supporting Dual Connectivity (E-UTRAN and 5G NR)|Rx Protocol|Protocol Support|Initialization, Maintenance and Termination of Connection and Session|Rx Specific AVPs|Rx Re-Used AVPs|Use of the Supported-Features AVP on the Rx Reference Point|Rx Messages|Annex A (Normative) IMS Related P-CSCF Procedures over Rx|A.1 Provision of Service Information at P-CSCF|A.2 Enabling of IP Flows|A.3 Support for SIP Forking|A.3.1 PCC Rule Provisioning for Early Media for Forked Responses|A.3.2 Updating the Provisioned PCC Rules at the Final Answer|A.4 Notification of AF Signalling Transmission Path Status|A.5 Indication of Emergency Registration and Session Establishment|A.6 Notification IP-CAN Type Change|A.7 Support for Early Session Disposition SDP|A.7.1 General|A.7.2 Service Information Provisioning for Early Media|A.7.3 Updating the Provisioned Service Information when Dialogue is Established|A.8 Provision of Signalling Flow Information at P-CSCF|A.9 Handling of MPS Session|A.10 Retrieval of Network Provided Location Information|A.11 Handling of RAN/NAS Release Cause Values|A.12 Resource Sharing|A.13 Handling of MCPTT Priority Call|A.14 Notification of PLMN Change|Annex B (Normative) Flow Identifiers: Format Definition and Examples|Annex C (Informative): Void|Annex E (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.3.1|4.3.2|4.4|4.4.1|4.4.2|4.4.3|4.4.4|4.4.5|4.4.6|4.4.6.1|4.4.6.2|4.4.6.3|4.4.6.4|4.4.6.5|4.4.6.6|4.4.6.7|4.4.6.8|4.4.6.9|4.4.7|4.4.8|4.4.9|4.4.10|5|5.1|5.2|5.3|5.4|5.4.1|5.5|6|6.1|6.2|6.3|6.3.1|6.3.2|6.4|6.5|6.6|6.7|6.7.1|6.7.2|6.7.3|6.8|6.9|6.10|6.11|6.12|6.13|6.14|7|8|9|10|
|Introduction|Hazard Symbols and Admonitions|General Safety Precautions|Electric Shock Hazards|Safety Precautions for Working with Electrical Equipment|Energy Hazards|Fire Hazard|Fire Precautions|Heat Hazards|Mechanical Hazards|Radio Frequency Exposure Hazards|Laser Hazards|Chemical Hazards|Beryllium Oxide Hazard|Battery Acid Hazard|Gas Explosion Hazard|Refrigerant Hazard|Other Hazards|Handling Heavy Goods|Working at Height|$|1|2|3|4|4.1|5|6|6.1|7|8|9|10|11|11.1|11.2|11.3|11.4|12|12.1|12.2|
|Introduction|Target Group|Educational Requirements|Admonitions and Safety Symbols|Special Hazard Symbols|Batteries|Overheated Batteries|Treating Hazardous Waste from Leaks|Electrical Installation|Safety Precautions for Working with Electrical Installations|Electrostatic Discharge|Handling Printed Board Assemblies and IC Components|Storing and Transporting Printed Board Assemblies and IC Components|Equipment Handling|Ground Connection|Lightning Protection|System, Data, and Traffic Protection|$|1|1.1|1.2|2|2.1|3|3.1|3.2|4|4.1|5|5.1|5.2|6|7|8|9|
|Alarm Description|Procedure|Handle Alarm eVIP, Gateway Unavailable|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm eVIP, IKE Distribution Not Possible|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm eVIP, IPSEC Tunnel Fault|$|1|2|2.1|
|Description|Procedure|Disable Active-Active Geographical Redundancy|Administrative Procedure|Enable Active-Active Geographical Redundancy|$|1|2|2.1|2.2|2.3|
|Description|Procedure|Check Alarm Status|$|1|2|2.1|
|Description|Procedure|Delete Backup|$|1|2|2.1|
|Description|Procedure|Install or Renew Node Credential by PKCS#12|$|1|2|2.1|
|Description|Procedure|Change Password Quality Configuration|$|1|2|2.1|
|Analytics REST API Introduction|$|1|
|Active-Active Geographical Redundancy Introduction|Active-Active Geographical Redundancy Concepts|Active-Active Geographical Redundancy Function|Active-Active Geographical Redundancy Overview|Active-Active Geographical Redundancy Data Mirroring|Redundant Data|Backlog|SAPC DBS Synchronization|Active-Active Geographical Redundancy Network traffic handling|Active-Active Geographical Redundancy Requirements|Active-Active Geographical Redundancy Network connectivity|Active-Active Geographical Redundancy States|Transition between States|Transitions from Initial State|Transitions from Synchronizing State|Transitions from Distributed State|Transitions from Active State|Transitions from Standby State|Transitions from Halted State|Active-Active Geographical Redundancy Supervision and Control Functions|Mated Peer Supervision|Fault Detection and Recovery|Split Brain Scenario|Simultaneous SAPC Restart|Temporary Differences between Databases|Handling of the SAPC Origin State Id|Handling of the SAPC Origin-Host|Active-Active Geographical Redundancy Traffic Cases|SAPC in Distributed state restarts|Replication Channel unavailable but Application Channel available|SAPC in Active state restarts|Both Replication Channel and Application Channel unavailable|Active-Active Geographical Redundancy Capabilities|Reference List|$|1|2|3|3.1|3.2|3.2.1|3.2.2|3.2.3|3.3|3.3.1|3.3.2|3.4|3.4.1|3.4.1.1|3.4.1.2|3.4.1.3|3.4.1.4|3.4.1.5|3.4.1.6|3.5|3.5.1|3.5.2|3.5.2.1|3.5.2.2|3.5.2.3|3.5.3|3.5.4|4|4.1|4.2|4.2.1|4.3|5|6|
|Change Preferred Role in Active-Active Geographical Redundancy Description|Change Preferred Role in Active-Active Geographical Redundancy Prerequisites|Change Preferred Role in Active-Active Geographical Redundancy Procedures|Change Preferred Role in Both SAPCs|$|1|1.1|2|2.1|
|Description|Procedure|Change Alarm Type Severity|$|1|2|2.1|
|Description|Procedure|Generate Fingerprint for A File|$|1|2|2.1|
|Description|Procedure|Create Account Policy|$|1|2|2.1|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions, Symbols and Abbreviations|Definitions|Symbols|Abbreviations|User Data Convergence Architecture|UDC System Architecture|Functional Entities|Application Front Ends|Provisioning Front Ends|User Data Repository|Other Network Elements|Reference Point Ud|Front-End Session|UDR Session|User Data Convergence Information Flows|General|Requirements|Querying Data from the UDR|Creating Data within the UDR|Deleting Data from the UDR|Updating Data within the UDR|Subscription to Notifications|Notification of Data Modification|Description|Notifications and Transactions|Annex A (Informative): Information Flows|Annex B (Informative): Applicability of the UDC Concept to Network Nodes|Annex C (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|3.3.1|3.3.2|3.3.3|4|4.1|4.2|4.2.1|4.2.2|4.2.3|4.2.4|4.3|4.4|4.5|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|5.8.1|5.8.2|6|7|8|9|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions, Symbols and Abbreviations|Definitions|Symbols|Abbreviations|User Data Convergence Architecture|UDC System Architecture|Functional Entities|Application Front Ends|Provisioning Front Ends|User Data Repository|Other Network Elements|Reference Point Ud|Front-End Session|UDR Session|User Data Convergence Information Flows|General|Requirements|Querying Data from the UDR|Creating Data within the UDR|Deleting Data from the UDR|Updating Data within the UDR|Subscription to Notifications|Notification of Data Modification|Description|Notifications and Transactions|Annex A (Informative): Information Flows|Annex B (Informative): Applicability of the UDC Concept to Network Nodes|Annex C (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|3.3.1|3.3.2|3.3.3|4|4.1|4.2|4.2.1|4.2.2|4.2.3|4.2.4|4.3|4.4|4.5|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|5.8.1|5.8.2|6|7|8|9|
|Description|Procedure|Check General System Attributes|$|1|2|2.1|
|Description|Procedure|View Progress Report|$|1|2|2.1|
|Description|Procedure|Change Account Policy|$|1|2|2.1|
|EBM Buffer Overflow Alarm Description|EBM Buffer Overflow Procedure|Handle Alarm Policy Control, EBM Buffer Overflow|$|1|2|2.1|
|Active-Standby Geographical Redundancy Introduction|Active-Standby Geographical Redundancy Concepts|Active-Standby Geographical Redundancy Function|Active-Standby Geographical Redundancy Overview|Active-Standby Geographical Redundancy Data Mirroring|Redundant Data|Backlog|SAPC DBS Synchronization|Active-Standby Geographical Redundancy Network traffic handling|Hot Standby Concepts|Active SAPC|Standby SAPC|Preferred SAPC|Active-Standby Geographical Redundancy Network connectivity|Active-Standby Geographical Redundancy States|Transition between States|Transitions from Initial State|Transitions from Active State|Transitions from Standby State|Transitions from Halted State|Active-Standby Geographical Redundancy Supervision and Control Functions|Mated Peer Supervision|Fault Detection and Recovery|Split Brain Scenario|Simultaneous SAPC Restart|Temporary Differences between Databases|Handling of the SAPC Origin State Id|Active-Standby Geographical Redundancy Traffic Cases|Active SAPC Restarts|Standby SAPC Restarts|Replication Channel Unavailable|Active-Standby Geographical Redundancy Capabilities|Reference List|$|1|2|3|3.1|3.2|3.2.1|3.2.2|3.2.3|3.3|3.3.1|3.3.1.1|3.3.1.2|3.3.1.3|3.3.2|3.4|3.4.1|3.4.1.1|3.4.1.2|3.4.1.3|3.4.1.4|3.5|3.5.1|3.5.2|3.5.2.1|3.5.2.2|3.5.2.3|3.5.3|4|4.1|4.2|4.3|5|6|
|Configuration and Provisioning Overview|Other Conventions|Configuration Prerequisites|Configure Gx PCEFs for Usage Reporting|Configure Event-Triggers|Provision Fair Usage Profile|Provision Postpaid Subscriptions|Provision Prepaid Subscriptions|At Subscriber Level|At Subscriber Group Level|Intermediate Limits|Complementary Limits|Autoprovisioning and Fair Usage|Provision Shared Subscriber Plans|Configure Quota Rollover|Configure Policy Control Based on Fair Usage|Provision Accumulation Policies|Multiple Usage Accumulators Based on Conditions|Usage Reporting Based on Multiple Gx|Monitor Usage Accumulators|Monitor Subscriber Usage Accumulators|Monitor Shared Dataplan Usage Accumulators|Configure Aggregable Dataplans|Provision Durations for Stackable Dataplans|Configuration Examples for Use Cases|Basic Turbo Button Based on Temporary Subscriber Groups|Advanced Turbo Button with Dynamic Group Selection Based on Fair Usage|Shared Subscriber Plans Use Cases|Shared and Individual Limits for Members|Category Limits for Shared Dataplan Members|Monitoring Shared Subscriber Plan Members|Combining Individual Plans and Shared Subscriber Plan|Individual and Shared Plans for Different Reporting Groups|Plans for the Same Reporting Group Prioritizing the Individual Plan|Plans for the Same Reporting Group Prioritizing the Shared Subscriber Plan|Aggregable Dataplans for Fair Usage Policies|Stackable Dataplans|Appendix A. Fair Usage Policy Types|Appendix B. Fair Usage Policy Tags|Fair Usage Policy Tags in Dynamic Group Selection Policies|$|1|1.1|2|3|4|5|5.1|5.2|5.2.1|5.2.2|5.3|5.4|5.5|6|7|8|9|9.1|10|11|11.1|11.2|12|13|14|14.1|14.2|14.3|14.3.1|14.3.2|14.3.3|14.3.4|14.3.4.1|14.3.4.2|14.3.4.3|14.4|14.5|15|16|16.1|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions and Abbreviations|Sy Reference Point|Overview|Sy Reference Model|Subscriber Spending Limits|Functional Elements|PCRF|OCS|Spending Limits Procedures over Sy Reference Point|Initial/Intermediate Spending Limit Report Request|General|Detailed Behaviour of the PCRF|The Behaviour of the OCS|Spending Limit Report|General|The Behaviour of the OCS|Detailed Behaviour of the PCRF|Final Spending Limit Report Request|General|Detailed Behaviour of the PCRF|The Behaviour of the OCS|Sy Protocol|Protocol Support|Use of Diameter Base Protocol|Void|Accounting Functionality|Transport Protocol|Advertising Application Support|Use of the Supported-Features AVP|Initialization and Maintenance of Connection and Session|Sy Specific AVPs|Sy Re-Used AVPs|Sy Specific Experimental-Result-Code AVP Values|General|Permanent Failures|Transient Failures|Sy Messages|Command-Code Values|Spending-Limit-Request (SLR) Command|Spending-Limit-Answer (SLA) Command|Spending-Status-Notification-Request (SNR) Command|Spending-Status-Notification-Answer (SNA) Command|Session-Termination-Request (STR) Command|Session-Termination-Answer (STA) Command|Annex A (Normative): User Identity for Fixed Broadband Access Network Convergence|Annex B (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.4.1|4.4.2|4.5|4.5.1|4.5.1.1|4.5.1.2|4.5.1.3|4.5.2|4.5.2.1|4.5.2.2|4.5.2.3|4.5.3|4.5.3.1|4.5.3.2|4.5.3.3|5|5.1|5.1.1|5.1.2|5.1.3|5.1.4|5.1.5|5.1.6|5.2|5.3|5.4|5.5|5.5.1|5.5.2|5.5.3|5.6|5.6.1|5.6.2|5.6.3|5.6.4|5.6.5|5.6.6|5.6.7|6|7|8|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions and Abbreviations|Sy Reference Point|Overview|Sy Reference Model|Subscriber Spending Limits|Functional Elements|PCRF|OCS|Spending Limits Procedures over Sy Reference Point|Initial/Intermediate Spending Limit Report Request|General|Detailed Behaviour of the PCRF|The Behaviour of the OCS|Spending Limit Report|General|The Behaviour of the OCS|Detailed Behaviour of the PCRF|Final Spending Limit Report Request|General|Detailed Behaviour of the PCRF|The Behaviour of the OCS|Sy Protocol|Protocol Support|Use of Diameter Base Protocol|Void|Accounting Functionality|Transport Protocol|Advertising Application Support|Use of the Supported-Features AVP|Initialization and Maintenance of Connection and Session|Sy Specific AVPs|Sy Re-Used AVPs|Sy Specific Experimental-Result-Code AVP Values|General|Permanent Failures|Transient Failures|Sy Messages|Command-Code Values|Spending-Limit-Request (SLR) Command|Spending-Limit-Answer (SLA) Command|Spending-Status-Notification-Request (SNR) Command|Spending-Status-Notification-Answer (SNA) Command|Session-Termination-Request (STR) Command|Session-Termination-Answer (STA) Command|Annex A (Normative): User Identity for Fixed Broadband Access Network Convergence|Annex B (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.4.1|4.4.2|4.5|4.5.1|4.5.1.1|4.5.1.2|4.5.1.3|4.5.2|4.5.2.1|4.5.2.2|4.5.2.3|4.5.3|4.5.3.1|4.5.3.2|4.5.3.3|5|5.1|5.1.1|5.1.2|5.1.3|5.1.4|5.1.5|5.1.6|5.2|5.3|5.4|5.5|5.5.1|5.5.2|5.5.3|5.6|5.6.1|5.6.2|5.6.3|5.6.4|5.6.5|5.6.6|5.6.7|6|7|8|
|SAPC Upgrade Introduction|SAPC Upgrade Prerequisites|Upgrade General Requirements|HW Requirements|SW Requirements|Upgrade Deliverables|User Data Consolidation (UDC)|Software Upgrade for Stand Alone|Pre-Upgrade Installation|System Data Backup Creation|Obtain SAPC Upgrade Package|Upgrade BIOS Version in NSP 6.1 Hardware|Disable Session Inactivity Cleanup Mechanism|Memory dimensioning in PLs|SAPC State Verification|Host SLES12 Upgrade to SP2|Upgrade Reinstalling Blades with SLES12 SP2|Upgrade for Stand Alone|Cleanup Procedure|Post-Upgrade Installation|Enable Session Inactivity Cleanup Mechanism|Upgrade Verification|Entities Definition Upgrade|Software Upgrade for Active-Standby Geographical Redundancy|Prepare to Upgrade Active-Standby Geographical Redundancy|Software Upgrade in Active SAPC|Pre-Upgrade Installation|Host SLES Patches Update|Upgrade for Active SAPC|Post-Upgrade Installation|Clean up Procedure in Active SAPC|Software Upgrade in Halted SAPC|Pre-Upgrade Installation|Host SLES Patches Update|Upgrade for Halted SAPC|Post-Upgrade Installation|Clean up Procedure in Halted SAPC|Post-Upgrade Activities for Active-Standby Geographical Redundancy|Software Upgrade for Active-Active Geographical Redundancy|Prepare to Upgrade Active-Active Geographical Redundancy|Software Upgrade in SAPC Configured as Preferred|Pre-Upgrade Installation|Host SLES Patches Update|Upgrade for SAPC Configured as Preferred|Post-Upgrade Installation|Clean up Procedure in SAPC Configured as Preferred|Software Upgrade in SAPC Configured as Non Preferred|Pre-Upgrade Installation|Host SLES Patches Update|Upgrade for SAPC Configured as Non Preferred|Post-Upgrade Installation|Clean up Procedure in SAPC Configured as Non Preferred|Post-Upgrade Activities for Active-Active Geographical Redundancy|Clean up Procedure|Rollback Procedure|Upgrade Logs|$|1|2|2.1|2.1.1|2.1.2|2.2|2.3|3|3.1|3.1.1|3.1.2|3.1.3|3.1.4|3.1.5|3.1.6|3.2|3.2.1|3.3|3.3.1|3.4|3.4.1|3.4.2|3.4.3|4|4.1|4.2|4.2.1|4.2.2|4.2.3|4.2.4|4.3|4.4|4.4.1|4.4.2|4.4.3|4.4.4|4.5|4.6|5|5.1|5.2|5.2.1|5.2.2|5.2.3|5.2.4|5.3|5.4|5.4.1|5.4.2|5.4.3|5.4.4|5.5|5.6|6|7|8|
|General|Workflow|Mandatory Data|Data Collection|Collecting Application and Platform Logs|Data Collected Based on Specific Problem Types|Database General Problems in the SAPC|Active-Standby Geographical Redundancy Problems in the SAPC|Active-Active Geographical Redundancy Problems in the SAPC|Software License Problems in the SAPC|Other Useful Information|Performance Data Collector Reports|Daily Report|Monthly Report|Health Check Report|Appendix A: Severity/Priority|$|1|2|3|3.1|3.1.1|4|4.1|4.2|4.3|4.4|5|5.1|5.1.1|5.1.2|5.1.3|6|
|Understanding Certificate Management|Key Certificate Management Concepts|Chain Certificates|CSR-Based Offline Enrollment|PKCS#12 Container-Based Offline Enrollment|CMPv2-Based Online Enrollment|Trusted Certificate Installation|Basic Certificate Management Procedures|Certificate Management-Related Alarms|Security Management|$|1|1.1|1.2|1.3|1.4|1.5|1.6|2|3|4|
|Library Overview Introduction|Structure of the CPI Library|Contents of CPI Library|Safety and Environment|Library Overview|Product Overview|Planning|Operation and Maintenance|Fault Management|Configuration Management|Performance Management|Logging Management|Scaling Management|Security Management|Software Management|Hardware Management|Network Management|Geographical Redundancy|Managed Object Model (MOM)|Emergency|Interface|How to Read the CPI|$|1|2|3|3.1|3.2|3.3|3.4|3.5|3.5.1|3.5.2|3.5.3|3.5.4|3.5.5|3.5.6|3.5.7|3.5.8|3.5.9|3.5.10|3.5.11|3.6|3.7|4|
|Session Inactivity Cleanup Mechanism Overview|Session Inactivity Cleanup Mechanism Prerequisites|Session Inactivity Cleanup Mechanism Procedure|Enabling/disabling the mechanism|Scheduling the mechanism|Setting up the session inactivity time|Setting up the cleanup duration|Setting up cleaning mode|Showing the current configuration|$|1|2|3|3.1|3.2|3.3|3.4|3.5|3.6|
|Description|Procedure|List Supported XML Model Files|$|1|2|2.1|
|Description|Procedure|Schedule Single Backup|$|1|2|2.1|
|Description|Procedure|Delete Account Policy|$|1|2|2.1|
|EBM Communication Failure Alarm Description|EBM Communication Failure Procedure|Handle Alarm Policy Control, EBM Communication Failure|$|1|2|2.1|
|Mobility Based Policy Control for Overlay Deployments (Smp) Function|Mobility Based Policy Control for Overlay Deployments (Smp) Overview|Smp Session Access Control|PDN-GW Selection|SPID Selection|Subscriber Profile Handling|Network Deployments|Traffic Cases|Smp Session Lifecycle at UE Attach or PDN Connectivity|Smp Session Lifecycle at Inter SGSN-MME TAU or Handover|Error Handling|Restrictions|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|2|3|3.1|3.2|3.3|4|5|
|Configure Access and Charging Overview|Other Conventions|Configuration Prerequisites|Configure Gx Diameter Network Data|Configure Gx PCEFs|Support for Interoperability with PCEFs Handling Gx Rel9 Versions 9.1.0 or 9.0.0|Configure PCEFs for Interworking with Clustered Diameter Systems|Configure Multiple Gx Scenario|Configure Event Triggers Selection|Provision Unconditionally Event Triggers Selection|Provision Event Trigger Selection Policies|Combining Static Qualification and Policies for Event Triggers|Provision Services|Set PCC rules|Configure IP-CAN Session Access Control|Configure Service Access Control|Provision Policies for Service Authorization|Example of Service Authorization - Global Policy for Chat Service|Example of Service Authorization - Subscriber Policy for Streaming Service|Configure One Time Redirect|Provision Static Service Policies|Rule Spaces|Provision Rule Spaces|Policies for Rule Space Negotiation|Configure Service Charging Control|Static Services|Preconfigured Services|Provision Qualification Data for Subscriptions|Provision Qualification for Subscriber or Subscriber Group Unconditionally|Provision Qualification for Subscriber or Subscriber Group Conditionally (Depending on Policies)|Configure Subscriber Charging Control|Provision Charging System Profiles|Provision Subscriber Charging Profiles|Configure Charging Characteristics Information|Provision Unconditional Subscriber Charging Data to Subscriber or Subscriber Groups|Provision Conditional Subscriber Charging Data with Policies|Configure Content Filtering Control|Provision Content Filtering for Subscribers or Subscriber Groups|Provision Content Filtering Policies|Configure Header Enrichment|Configure Presence Reporting Area|Provision Presence Reporting Area|Provision Unconditional Presence Reporting Area to Subscriber or Subscriber Groups|Provision Conditional Presence Reporting Area with Policies|Configure Event Triggers for Presence Reporting Area|Configuration Examples for Use Cases|Roaming Conditions|Cell Congestion|PDN Type and UE IP Address Conditions|Presence Area Status Conditions|Use Case 1: Campus Zone Mobile Broadband|Use Case 2: Home Zone Mobile Broadband|Extended Event-Trigger for Tethering Detection Reporting over Gx|Appendix A. Access and Charging Policy Types|Appendix B. Policy Tags|Time and Date Tags|Tags Related to Access and Charging|Reference List|$|1|1.1|2|3|3.1|3.1.1|3.2|3.3|4|4.1|4.2|4.3|5|5.1|6|7|7.1|7.1.1|7.1.2|7.2|7.3|7.4|7.4.1|7.4.2|8|8.1|8.2|9|9.1|9.2|10|10.1|10.2|10.3|10.4|10.5|11|11.1|11.2|12|13|13.1|13.2|13.3|13.4|14|14.1|14.2|14.3|14.4|14.4.1|14.4.2|14.5|15|16|16.1|16.2|17|
|Installation Instruction for SAPC Application for UDC|UDC Installation Instruction Overview|Related Information|General Installation Preparations|UDC Maiden Installation and Configuration With SAPC|UDC Maiden Installation of SAPC Workflow|Prepare CUDB|CUDB License|CUDB Templates|CUDB Router Redundancy Mechanism|Common Schema Files for SAPC|SAPC Schema Files|Root Distinguished Name|CUDB Initial Configuration Preparation for UDC|SAPC SOAP Notifications|SAPC LDAP User|EDA/PG Users in CUDB|EDA/PG Backup Notification Configuration in CUDB|Provisioning Assurance Configuration in CUDB|SAPC Application Counters|Prepare EDA/PG|Customer Questionnaire|EDA/PG License|EDA/PG Templates|EDA/PG Router Redundancy Mechanism|CUDB Provisioning Network Elements, Groups and Routing|Data Durability Function in EDA/PG|CUDB Blocking for Backup|Prepare SAPC|SAPC License|SAPC Entities|SAPC VNF Descriptor|Install CUDB|Install EDA/PG|Install SAPC|Configure CUDB for UDC|Create and Configure LDAP Users|Configure EDA/PG Backup Notifications in CUDB|Configure CUDB for Provisioning Assurance|Configure SAPC Application Counters|Configure SAPC SOAP Notifications|Configure EDA/PG for UDC|Configure EDA/PG for SAPC|Configure SAPC|Configure SAPC Entities|Introduction of SAPC into an Existing UDC|Introduction of SAPC into UDC Workflow|Prepare CUDB|SAPC LDAP User|CUDB Network Routing Update|Prepare New Schema and SQL Files|SAPC Application Counters|SAPC SOAP Notifications|Prepare EDA/PG|SAPC Provisioning|Prepare SAPC|SAPC License|SAPC Entities|SAPC VNF Descriptor|Install SAPC|Configure CUDB for UDC|Create and Configure LDAP User for SAPC|Configure CUDB Network Routing|Configure BSP Virtual Routers|Configure eVIP for SAPC|Configure SAPC Application Counters|Configure SAPC SOAP Notifications|Add Schemas and Application Services|Configure EDA/PG for UDC|Update EDA/PG Configuration for SAPC|Configure SAPC|Configure SAPC Entities|Addition of SAPC in UDC|Adding a New SAPC in UDC Workflow|Prepare CUDB|CUDB Network Routing Update|SAPC SOAP Notifications|Prepare SAPC|SAPC License|SAPC Entities|SAPC VNF Descriptor|Install SAPC|Configure CUDB for UDC|Configure CUDB Network Routing|Configure BSP Virtual Routers|Configure eVIP for SAPC|Configure SAPC SOAP Notifications|Configure SAPC|Configure SAPC Entities|$|1|1.1|1.2|2|3|3.1|3.2|3.2.1|3.2.2|3.2.3|3.2.4|3.2.5|3.2.6|3.2.7|3.2.7.1|3.2.8|3.2.9|3.2.10|3.2.11|3.2.12|3.3|3.3.1|3.3.2|3.3.3|3.3.4|3.3.5|3.3.6|3.3.7|3.4|3.4.1|3.4.2|3.4.3|3.5|3.6|3.7|3.8|3.8.1|3.8.2|3.8.3|3.8.4|3.8.5|3.9|3.9.1|3.10|3.10.1|4|4.1|4.2|4.2.1|4.2.2|4.2.3|4.2.4|4.2.5|4.3|4.3.1|4.4|4.4.1|4.4.2|4.4.3|4.5|4.6|4.6.1|4.6.2|4.6.2.1|4.6.2.2|4.6.3|4.6.4|4.6.5|4.7|4.7.1|4.8|4.8.1|5|5.1|5.2|5.2.1|5.2.2|5.3|5.3.1|5.3.2|5.3.3|5.4|5.5|5.5.1|5.5.1.1|5.5.1.2|5.5.2|5.6|5.6.1|
|Add Neighbor Node with Multiple External Traffic Networks Introduction|Prerequisites|Add Neighbor Node with Multiple External Traffic Networks Procedure|Access the Virtual Routers Console|Check Configuration|Identify VR State|Add a Route for a New Node|Remove an Existing Route|$|1|1.1|2|2.1|2.2|2.3|2.4|2.5|
|Description|Procedure|Push XML Model File to Remote File Location|$|1|2|2.1|
|Description|Procedure|Schedule Backups Based on Calendar Event|$|1|2|2.1|
|Description|Procedure|Create User Account|$|1|2|2.1|
|Emergency and Multimedia Priority Services Introduction|Emergency Services Function|Emergency Services Overview|Emergency Subscriber Profile|Emergency Bearer Service|IMS Emergency Calls|Multimedia Priority Services Function|Multimedia Priority Services Overview|Subscription-based Multimedia Priority Services|MPS Subscription Data|EPS Bearer Priority Service|IMS Signalling Priority Service|IMS Multimedia Priority Service|Overload Protection for Emergency and Multimedia Priority Services|Emergency and Multimedia Priority Services Network Deployments|Emergency Services|Multimedia Priority Services|Emergency Services Traffic Cases|Protocol Binding for Rel9 Rx Onwards and standard Rel9 Gx Onwards|Multimedia Priority Services Traffic Cases|Subscription-based Multimedia Priority Services (Protocol Binding for Standard Rel9 Gx Onwards)|IP-CAN Session Lifetime for Service Users|Update MPS Subscription Data|IMS Multimedia Priority Services (Protocol Binding for Rel10 Rx Onwards)|Priority AF Session Establishment or Modification|Priority AF Session Termination|AF Session Establishment or Modification for Service Users|Emergency and Multimedia Priority Services Error Handling|Emergency Services Restrictions|Reference List|$|1|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.2.1|3.2.2|3.2.3|3.3|4|5|5.1|5.2|6|6.1|7|7.1|7.1.1|7.1.2|7.2|7.2.1|7.2.2|7.3|8|9|10|
|Configure Bearer QoS Control and Bandwidth Management Overview|Typographic Conventions|Other Conventions|Configuration Prerequisites|Configure QoS Control for the Default Bearer and the APN|Diameter Node Control for QoS Control for the Default Bearer and the APN|Provision QoS Profiles for Default Bearer/APN|Configuration of Bearer/APN QoS Profiles for GPRS|Configuration of Bearer/APN QoS Profiles for EPS|Provision QoS Control for Default Bearer/APN selection|Configure Bandwidth Management for Services|Configure Static Services|Preconfigured and Dynamic Services|Provision Service QoS Profiles|Configuration for GPRS|Configuration for EPS|Provision QoS Control for Services|Appendix A. QoS Policy Types|Appendix B. QoS Policy Tags|Appendix C. QoS Selection Tags for Output Attributes Used in Policies|Appendix D Configuration Summary|Reference List|$|1|1.1|1.2|2|3|3.1|3.2|3.2.1|3.2.2|3.3|4|4.1|4.2|4.3|4.3.1|4.3.2|4.4|5|6|7|8|9|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions, Symbols and Abbreviations|Definitions|Symbols|Abbreviations|Protocol Stack|General|Protocol Stack for Ud Data Access Messages|Protocol Stack for Ud Subscriptions/Notifications|General Messages|General|Open Link for a LDAP Session|Close Link for a LDAP Session|Transactions|SOAP Authentication|User Data Convergence Messages|General|Query|Create|Delete|Update|Subscribe|Notify|Abandon Operation|Information Elements|Information Element Types with LDAP|Information Elements for Subscriptions and Notifications|Security|Annex A (Normative): SOAP Subscription and Notification|Annex B (Informative): LDAP Message Flows and Transaction Flows for UDC|Annex C (Informative): Messages Based on SOAP|Annex D (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|3.3.1|3.3.2|3.3.3|4|4.1|4.2|4.3|5|5.1|5.2|5.3|5.4|5.5|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|6.8|7|7.1|7.2|8|9|10|11|12|13|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions, Symbols and Abbreviations|Definitions|Symbols|Abbreviations|Protocol Stack|General|Protocol Stack for Ud Data Access Messages|Protocol Stack for Ud Subscriptions/Notifications|General Messages|General|Open Link for a LDAP Session|Close Link for a LDAP Session|Transactions|SOAP Authentication|User Data Convergence Messages|General|Query|Create|Delete|Update|Subscribe|Notify|Abandon Operation|Information Elements|Information Element Types with LDAP|Information Elements for Subscriptions and Notifications|Security|Annex A (Normative): SOAP Subscription and Notification|Annex B (Informative): LDAP Message Flows and Transaction Flows for UDC|Annex C (Informative): Messages Based on SOAP|Annex D (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|3.3.1|3.3.2|3.3.3|4|4.1|4.2|4.3|5|5.1|5.2|5.3|5.4|5.5|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|6.8|7|7.1|7.2|8|9|10|11|12|13|
|Add Active-Active Geographical Redundancy Description|Add Active-Active Geographical Redundancy Prerequisites|Add Active-Active Geographical Redundancy Procedure|Procedure in Mated SAPC (SAPC2)|Procedure in Live SAPC (SAPC1)|Start Mated SAPC (SAPC2) in Active-Active Geographical Redundancy|$|1|1.1|2|2.1|2.2|2.3|
|Description|Procedure|Fetch File in Logical File System|$|1|2|2.1|
|Description|Procedure|Schedule Backups Based on Periodic Event|$|1|2|2.1|
|Description|Procedure|Change User Account|$|1|2|2.1|
|Policy Control for Wi-Fi Calling Introduction|Policy Control for Wi-Fi Calling Function|Policy Control for Wi-Fi Calling Overview|Wi-Fi Calling|Use Case: Bill Shock Prevention|Policy Control for Wi-Fi Calling Network Deployments|Policy Control for Wi-Fi Calling Traffic Cases|Wi-Fi Calling Setup|Handover between VoLTE and Wi-Fi|Handover from Wi-Fi to VoLTE|Handover from VoLTE to Wi-Fi|Error Handling|Operational Conditions|External Conditions|Reference List|$|1|2|2.1|2.2|2.2.1|3|4|4.1|4.2|4.2.1|4.2.2|4.3|5|5.1|6|
|Configuration and Provisioning Overview|Typographic Conventions|Other Conventions|Configuration Prerequisites|Configure Notification Network Data|Configure Notifications Delivery|Configure Notification Servers|Configure SMS Centers|Configure Web Service End Points|Configure Notification Destinations|Notifications Sent to End Users|Notifications Sent to External Systems|Provisioning Notification Policies|Notifications Sent to End Users|Notifications Sent to External Systems|Configure SMS Notification Message|Configure SOAP Notification Message|Notification Sent to End Users and to External Systems|Dynamic Notification Message Content|Encoding Schemes in Notification Messages|Configuration Examples for Use Cases|Notifications Based on Fair Usage|Notifications to be sent to Subscribers|Notifications and Shared Dataplans|Notification to the Head Member of the Shared Dataplan|Notifications Based on Subscriber Group Activation or Deactivation|Appendix A. End User Notifications Policy Types|$|1|1.1|1.2|2|3|3.1|3.2|3.2.1|3.2.2|3.3|3.3.1|3.3.2|4|4.1|4.2|4.2.1|4.2.2|4.3|4.4|4.5|5|5.1|5.1.1|5.1.2|5.1.2.1|5.2|6|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions and Abbreviations|Definitions|Abbreviations|Overview of VNF in the NFV Architecture|Introduction|VNF Architecture|Interfaces|VNF Design Patterns and Properties|VNF Design Patterns|VNF Update and Upgrade|VNF's Properties|Attributes describing VNF's Requirements|VNF States and Transitions|States and Transitions as Architectural Patterns|VNF Instantiation Overview|The VNF Descriptor's Role in VNF Instantiation|VNF Instantiation|VNFC Instantiation|VNFC Instance Termination|VNF Instance Termination|VNF Instance Scaling|Start and Stop VNF|VNF Instance Configuration|VNF Fault Management Overview|Introduction|Virtualised resource faults|VNF faults|Functional Requirements on Management and Orchestration|High Level Requirements to Management and Orchestration|General Management and Orchestration Requirements related to VNF|Management and Orchestration Requirements Related to VNF Lifecycle|Management and Orchestration Requirements Related to Scaling|Management and Orchestration Requirements Related to VNF Maintenance Tasks|Requirements for VNFD and VNF-FGD Template|General Requirements Related to VNF|General Requirements Related to VNF Forwarding Graphs|Requirements Related to VNF Creation and Termination|Requirements Related to Scaling|Functional Requirements on Infrastructure|Generic Domain Requirements|Hypervisor Requirements|Compute Resource Requirements|Network Resources Requirements|VNF Architecture Design Examples|Faster VNFC|VNFC to VNFC Communication|VNFC Memory to VNFC Memory|Faster Network Access|Fast Storage Access|Driver version, Software Updates|Distributed VNF|Generic VNFs|Annex A (informative): Relationship to SDN|A.1 Introduction to SDN|A.2 SDN in NFV Architecture|A.3 ETSI NFV Use Case and SDN|Annex B (informative): De/composition Study|B.1 MRF IMS Use Case|B.2 DPI Engine VNFC Use Case|B.3 Virtual Enterprise Gateway Use Case|B.4 TDF as VNF Use Case|Annex C (informative): Authors & contributors|Annex D (informative): Bibliography|$|1|2|3|3.1|3.2|3.3|3.3.1|3.3.2|4|4.1|4.2|4.3|5|5.1|5.2|5.3|5.4|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|6.8|6.9|6.10|7|7.1|7.2|7.3|8|8.1|8.1.1|8.1.2|8.1.3|8.1.4|8.2|8.2.1|8.2.2|8.2.3|8.2.4|9|9.1|9.2|9.3|9.4|10|10.1|10.2|10.3|10.4|10.5|10.6|10.7|10.8|11|11.1|11.2|11.3|12|12.1|12.2|12.3|12.4|13|14|
|Graceful Scale-in Introduction|Graceful Scale-in Prerequisites|Graceful Scale-in Procedure|Internal Graceful Scale-In|VM Deletion from the Cloud Manager|VM Deletion using ECM|VM Deletion using Atlas/Director|VM Deletion using VMware vSphere Web Client|VM Deletion using VMware vCloud Director|$|1|2|3|3.1|3.2|4|5|6|7|
|Memory Dimensioning in PLs in a Live SAPC Introduction|Prerequisites|Memory Dimensioning in PLs in a Live SAPC Procedure|General Procedure|Lock the PayLoad|Stop PL Virtual Machine|Resize the PL Memory|Start PL Virtual Machine|Unlock the Payload|Run Health Check|Memory Dimensioning in PLs in a Live SAPC Procedure in OpenStack|Log in OpenStack|Resize VM with New Flavor|Confirm Memory Size|Update Configuration for Scalability|Update Configuration in Atlas/Director|Update Configuration in ECM|Memory Dimensioning in PLs in a Live SAPC Procedure in VMware|$|1|1.1|2|2.1|2.1.1|2.1.2|2.1.3|2.1.4|2.1.5|2.1.6|2.2|2.2.1|2.2.2|2.2.3|2.2.4|2.2.4.1|2.2.4.2|2.3|
|Description|Procedure|Delete File in Logical File System|$|1|2|2.1|
|Description|Procedure|Change Scheduled Backup Name|$|1|2|2.1|
|Description|Procedure|Delete User Account|$|1|2|2.1|
|Application Detection and Control Introduction|ADC Function|ADC Overview|Service Access Control|ADC Redirection Control|ADC Mute Notification Control|Application Detection Reporting|ADC Network Deployments|ADC Traffic Cases|QoS Control Based on Application Traffic Detection|ADC Redirection Control|ADC Mute Notification|ADC Error Handling|PCC Rule Error Handling|Application Reporting Error Handling|Reference List|$|1|2|2.1|2.2|2.3|2.4|2.5|3|4|4.1|4.2|4.3|4.4|4.4.1|4.4.2|5|
|Event Description|Handle eVIP, Configuration Fault|Configuration|Subscription|$|1|2|3|4|
|Introduction|General Considerations|Scope, References and Abbreviations|Scope|References|Definitions and Abbreviations|Definitions|Abbreviations|NFV Management and Orchestration: objectives and concepts|Overview|Management and Orchestration aspects of Network Functions Virtualisation Infrastructure|Management and Orchestration aspects of Virtualised Network Functions|Management and Orchestration aspects of Network Services|Other management and orchestration aspects of NFV framework|Relation of NFV management and orchestration with existing operations and management systems|Administrative Domains|Management and Orchestration architectural framework|Overview|Principles of NFV-MANO|NFV-MANO architectural framework overview|NFV-MANO architectural framework functional blocks|Other functional blocks|Network Controllers|NFV-MANO reference points|Interfaces description approach|NFV management and orchestration information elements|Introduction|Network Service information elements|Virtualised Network Function information elements|VNF Descriptor (vnfd)|VNF Record (vnfr)|Virtual Link information elements|Virtualised Network Function Forwarding Graph information elements|Physical Network Function information elements|VNF Instantiation input parameter|Network Service Instantiation Input Parameters|NFV-MANO interfaces|Interfaces concerning Network Services|Interfaces concerning Virtualised Network Functions|Interfaces concerning virtualised resources|Policy administration interface|Network Forwarding Path management interface|NFVI hypervisor management interface|NFVI compute management interface|NFVI networking management interface|Interfaces exposed between different service providers|Annex A (informative): VNF Instance management and orchestration case study|A.1 IMS MRF management and orchestration case study|A.2 Network Service fault Management case study|Annex B (informative): VNF lifecycle management|B.1 Introduction|B.2 VNF Package on-boarding flows|B.3 VNF instantiation flows|B.4 VNF instance scaling flows|B.5 VNF instance termination flows|B.6 NFV fault management|Annex C (informative): Network Service lifecycle management flows|C.1 Introduction|C.2 Network Service on-boarding flows|C.3 Network Service instantiation flows|C.4 Network Service instance scaling|C.5 Network Service instance update flows due to VNF instance modification|C.6 Network Service instance termination flows|C.7 VNF Forwarding Graph lifecycle management flows|Annex D (informative): Orchestration flows|D.1 Introduction|D.2 NFVI-PoP setup and configuration|D.3 Resources provisioning/de-provisioning|Annex E (informative): VNFD/NSD representations using TOSCA|E.1 Describing IMS MRF with TOSCA|Annex F (informative): YANG/XML VNFD & NSD model|F.1 Use Cases of Network Service with Physical Network Functions|F.2 Examples|F.3 YANG schema|Annex G (informative): TM Forum SID service model|Annex H (informative): Open Virtualisation Format|Annex I (informative): Other information|I.1 OpenStack|Annex J (informative): Authors & contributors|$|1|2|3|3.1|3.2|3.3|3.3.1|3.3.2|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|6|6.1|6.2|6.3|6.3.1|6.3.2|6.4|6.5|6.6|6.7|6.8|7|7.1|7.2|7.3|7.4|7.5|7.6|7.7|7.8|7.9|8|8.1|8.2|9|9.1|9.2|9.3|9.4|9.5|9.6|10|10.1|10.2|10.3|10.4|10.5|10.6|10.7|11|11.1|11.2|11.3|12|12.1|13|13.1|13.2|13.3|14|15|16|16.1|17|
|Configuration File|General|Acronyms and Terms|References|Parameters|Examples|$|1|1.1|1.2|1.3|1.4|1.5|##3_1f#3_1f##
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|Configure Scale-Out Introduction|Configure Scale-Out Prerequisites|Configure Scale-Out Procedure|VM Creation using ECM|VM Creation using Atlas/Director|VM Creation using VMware vSphere Web Client|VM Creation in using VMware vCloud Director|$|1|1.1|2|3|4|5|6|
|Alarm Description|Procedure|Handle Alarm Policy Control, Number of Usage Limits Surpassed Reached|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm Policy Control, Connection to Notification Server Failed|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm Policy Control, Number of Unknown Subscribers Reached|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm Policy Control, Number of Gx Session Rejections Reached|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm Policy Control, Number of Rx Failed Sessions Reached|$|1|2|2.1|
|Event-Based Monitoring Cause Codes and Events Overview|Scope|Typographic Conventions|Cause Codes|Success Gx Protocol Cause Codes|Reject Gx Protocol Cause Codes|Success Rx Protocol Cause Codes|Reject Rx Protocol Cause Codes|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|
|SAPC 16B to SAPC 1 Network Impact Report Introduction|General Impact|Capacity and Performance|PNF Subscriber Capacity and Network Performance|PNF Memory|VNF Subscriber Capacity, Network Performance, and Memory|Implementation|PNF Implementation|VNF Implementation|Platform|PNF Architecture|PNF Supported HW|Supported HW When Upgrading from SAPC 16B CP04|Additional PNF Supported HW|PNF HW Not Supported|VNF Architecture|VNF Infrastructure|Upgrade|Interface|Traffic Interfaces|Operation and Maintenance Interfaces|Operation|Provisioning and Node Configuration|Provisioning Impacts|Node Configuration Impacts|Performance Management|Gx Protocol Measures|Rx Protocol Measures|Sy Protocol Measures|Smp Protocol Measures|Sd Protocol Measures|REST Protocol Measures|Fair Usage Control Measures|User Notification Measures|Capacity Measures|External Database Measures|EBM Protocol Measures|Other SAPC Measures|Resources Measures|Alarms|Fault Management Notifications|Logging Events|Security Management|Backup and Restore|License Management|Geographical Redundancy|Graphical User Interface|IP Network Design|Other Network Elements|Additional Information|Subscription Management|Fair Usage Management|QoS Profile Management|Database Access Management|Policy Management|Policy Types|Policy Tags|Tags Related to Access and Charging|Tags Related to Dynamic Services|Tags Related to Mobility Based Policy for Overlay Deployments|Tags Related to QoS|Tags Related to Quota Rollover|Tags Related to Sd for Application Detection and Control|Time Management|Impact on Value Packages|Base Package|3GPP Gx|Basic Policy Control|Dedicated Bearer QoS Control|Default QoS Control|Multiple PCEF Support|Policy Studio|Restful API for Provisioning|Usage Reporting for Gx|Flexible Output Protocol|Session Release Due to Subscription Removal|Session Cleanup Mechanism Due to Inactivity|CNOM|Session Context Exposure|REST API to Translate Session IP Address to IMSI|Session Handler Tool|Phased-out Functions|Unavailable Functions|Business Intelligence|SOAP Notifications|EBM|Convergence|Fixed Mobile Policy Control|High Availability and Pooling|Hot-Standby Geographical Redundancy|Active-Active Geographical Redundancy|Unavailable Function|Monetize OTT|Dynamic Policy Control|SOAP Notifications|Multimedia Priority Services - Rx (On-Demand)|Phased-out Functions|Money Aware|3GPP Sy|Advanced Sy Capabilities|Enhanced Subscription Handling|Network Assurance|EBM|Network Efficiency|External Database Access|Mobility-Based Policy for Overlay Deployments|Unavailable Functions|Smart Personalized Broadband|Application Detection and Control (ADC) over Gx|Enhanced Policy Control|Enhanced Subscription Handling|Policy Control for Mobile SDN|Shared Data Plans|SOAP Notifications|User Notifications|Presence Reporting Area|Aggregable Dataplans for Fair Usage Policies|Multimedia Priority Services - Gx (Subscription-Based)|Support of Sd for Application Detection and Control|Quota Rollover|Stackable Dataplans|Voice Optimization|Dynamic Policy Control|Network Location (NetLoc)|Smart Policy Control for Wi-Fi Calling|Notification of Signalling Path Status|IP-CAN Type Change Notification|Network Location Information for Untrusted WLAN|IMS Restoration|SRVCC|Multimedia Priority Services - Rx (On-Demand)|5G EPC|Extended Bit Rates over Gx/Rx|$|1|2|2.1|2.1.1|2.1.2|2.1.3|2.2|2.2.1|2.2.2|2.3|2.4|2.4.1|2.4.1.1|2.4.1.2|2.4.1.3|2.5|2.5.1|2.6|2.7|2.7.1|2.7.2|2.8|2.8.1|2.8.1.1|2.8.1.2|2.8.2|2.8.2.1|2.8.2.2|2.8.2.3|2.8.2.4|2.8.2.5|2.8.2.6|2.8.2.7|2.8.2.8|2.8.2.9|2.8.2.10|2.8.2.11|2.8.2.12|2.8.2.13|2.8.3|2.8.4|2.8.5|2.8.6|2.8.7|2.8.8|2.8.9|2.8.10|2.9|2.10|3|3.1|3.2|3.3|3.4|3.5|3.5.1|3.5.2|3.5.2.1|3.5.2.2|3.5.2.3|3.5.2.4|3.5.2.5|3.5.2.6|3.6|4|4.1|4.1.1|4.1.2|4.1.3|4.1.4|4.1.5|4.1.6|4.1.7|4.1.8|4.1.9|4.1.10|4.1.11|4.1.12|4.1.13|4.1.14|4.1.15|4.1.16|4.1.17|4.2|4.2.1|4.2.2|4.3|4.3.1|4.4|4.4.1|4.4.2|4.4.3|4.5|4.5.1|4.5.2|4.5.3|4.5.4|4.6|4.6.1|4.6.2|4.6.3|4.7|4.7.1|4.8|4.8.1|4.8.2|4.8.3|4.9|4.9.1|4.9.2|4.9.3|4.9.4|4.9.5|4.9.6|4.9.7|4.9.8|4.9.9|4.9.10|4.9.11|4.9.12|4.9.13|4.10|4.10.1|4.10.2|4.10.3|4.10.4|4.10.5|4.10.6|4.10.7|4.10.8|4.10.9|4.11|4.11.1|
|Alarm Description|Procedure|Handle Alarm LOTC Ethernet Bonding|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm License Management, Autonomous Mode Activated|Adjust License Management Configuration|Install New Capacity License|$|1|2|2.1|2.2|2.3|
|Alarm Description|Procedure|Handle Alarm Certificate Management, the Certificate is to Expire|$|1|2|2.1|
|Description|Procedure|Create SSH Public Key|$|1|2|2.1|
|Description|Procedure|Show Supported and Enabled TLS Ciphers|$|1|2|2.1|
|About This Guide|Intended Audience|How This Guide is Organized|Conventions Used in This Guide|Prerequisites|Comments About the Documentation|Overview|PDB GUI|PDB Server|User Accounts|Access Control|Configuring GlassFish and the PDB Server to Authenticate Against an LDAP Directory|Configuring PDB|PDB Settings Parameters|Auditing PDB|Configuring System Notifications|PDB Logging|Checking the Log File Using the GlassFish Administration GUI|Defining Component Log Levels for PDB|Starting and Stopping PDB|Stopping the GlassFish Application|Starting the GlassFish Application|Restarting the GlassFish Application|Stopping the PDB Application on GlassFish|Starting the PDB Application on GlassFish|Checking the GlassFish Application Server|Starting GlassFish Admin Console|Backing Up PDB|Automated Backup|Manual Backup|Restoring PDB|PDB Data Recovery|PDB Software Recovery|Configuring the PDB CLI|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.2|3|3.1|3.2|4|4.1|5|6|7|7.1|7.2|8|8.1|8.2|8.3|8.4|8.5|8.6|8.7|9|9.1|9.2|10|10.1|10.2|11|12|
|Alarm Description|Procedure|Handle Alarm DBS, NR, Unknown Object Type|$|1|2|2.1|
|Introduction|Related Information|Key Features of Ericsson NETCONF Interface|Prerequisites|NETCONF Session|Start a NETCONF Session over SSH|Start a NETCONF Session over TLS|Session Inactivity Timer|Session End|NETCONF RPC Messages|Message <hello>|Message <ok>|Error Messages|NETCONF Data Model|Model Definition|Namespaces|Configuration and State Data|Distinguished Names|MO Attributes|MO Instances|MO Actions|NETCONF Operations|Operation <get>|Operation <get-config>|Operation <editconfig>|Operation <action>|Operation <create-subscription>|Operation <close-session>|Operation <kill-session>|Operation <copy-config>|Operation <delete-config>|NETCONF Notifications|Notification <replayComplete>|Notification <notificationComplete>|Non-Standard Notifications|NETCONF Validation|Create MO Instance|Delete MO Instance|Change Single-Valued Attributes|Delete MO Attribute Values|Change Sequence Attributes|Change Struct Attributes|System-Created Property|NETCONF Visibility Control|NETCONF Transaction|Transaction Start|Locking|Transaction Commit|Abort|Transaction Time-Out|NETCONF Capability <action>|Overview|Dependencies|Capability Identifier|New Operations|Modifications to Existing Operations|NETCONF Capability <notification>|Overview|Dependencies|Capability Identifier|New Operations|Modifications to Existing Operations|New Notifications|XML Schema|RFC Compliance Latest|NETCONF Statement of Compliance|NETCONF Capabilities|NETCONF Compliance to RFC 4741 and RFC 6241|NETCONF Compliance to RFC 4742 and RFC 6242|NETCONF Compliance to RFC 5277|NETCONF Compliance to RFC 5539|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|5.9|6|6.1|6.2|6.3|7|7.1|7.2|7.3|7.4|7.5|7.6|7.7|8|9|9.1|9.2|9.3|9.4|9.5|10|10.1|10.2|10.3|10.4|10.5|11|11.1|11.2|11.3|11.4|11.5|11.6|11.7|12|13|13.1|13.2|13.3|13.4|13.5|
|Subscription and Policy Management Introduction|Subscription and Policy Management Function|Subscription Management|Subscriber Management|Subscribers not known by the SAPC. Internal Repository|Subscribers not known by the SAPC. External Database|Removal of Subscribers|Subscriber Group Management|External Database|Reauthorization Because of Subscription Change|Handling of Multiple service offerings|Temporary Subscriber Groups|Handling of Subscriber Group Priority|Dynamic Group Selection Policies|Policy Management|Selecting Applicable Policies|Language Used in Policies|Policy Evaluation Process|Data Used for Policy Evaluation|Selection of Data to Apply to the Subscriber|Solving Policies Conflicts|Policies Based on Time of Day Conditions|Reauthorization Because of Time of Day Conditions|Header Enrichment|Subscription and Policy Management Traffic Cases|Update Subscriber Profile|Remove Subscriber Profile|Remove Subscriber Profile using standard Rel9 Gx/Gx+ onwards|Subscriber Profile defined in Ericsson OCS and SAPC. Remove Subscriber Profile only from SAPC|Disabled massive reauthorizations|Emergency Services|Subscriber Group activation/deactivation Because of Time Conditions|Subscriber Group activation/deactivation Because of Temporary Subscription using Rel9 Gx/Gx+ onwards.|Subscriber Group activation/deactivation Because of Static and Dynamic conditions using standard Rel9 Gx onwards or Ericsson Rel9 Gx+ onwards.|Policy Result Change Because of Time Conditions|Failure Handling|Restrictions|Reference List|$|1|2|2.1|2.1.1|2.1.1.1|2.1.1.2|2.1.1.3|2.1.2|2.1.3|2.1.4|2.2|2.2.1|2.2.2|2.3|2.4|2.4.1|2.4.2|2.4.3|2.4.3.1|2.4.3.2|2.4.3.3|2.4.4|2.5|2.6|3|3.1|3.2|3.2.1|3.2.2|3.2.3|3.2.4|3.3|3.3.1|3.3.2|3.4|3.5|4|5|
|Understanding System Management|Key System Management Concepts|Basic System Management Procedures|$|1|1.1|2|
|Understanding Virtual IP Addressing|Key Virtual IP Addressing Concepts|Virtual IP Address|Abstract Load Balancer|Flow Policies|Named VIP Address|Equivalent Virtual IP Address|Basic Virtual IP Addressing Procedures|Virtual IP Addressing-related Alarms and Events|Security Management|$|1|1.1|1.2|1.3|1.4|1.5|1.6|2|3|4|
|Introduction|Notification Description|$|1|2|
|Event Description|Handle AlarmListRebuilt|Configuration|Subscription|$|1|2|3|4|
|Understanding Backup and Restore Management|Key Backup and Restore Management Concepts|Basic System Backup and Restore Procedures|Backup and Restore-Related Alarms|Security Management|$|1|1.1|2|3|4|
|Introduction|Target Groups|Managed Object Model|MOM Concepts|MOM Overview|MIB|Managed Objects|Managed Object Creation and Deletion|Managed Object Naming|Setting Attributes|Attribute Data Types|Calling Actions|Relationships between Managed Objects|Model Element Life Cycle|Presentation of MOM|Classes|Attribute Properties|Common Attributes|Deprecated Elements in MOM|$|1|1.1|2|2.1|2.2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|4|4.1|4.2|4.3|4.4|
|Log Overview|Log Types|Log Events|Configuration|Reported Data|SAPC Application Logs Record Output Format|$|1|2|3|4|5|5.1|
|About This Guide|Intended Audience|How This Guide is Organized|Conventions Used in This Guide|Prerequisites|Comments About the Documentation|PDB Overview|PDB GUI|PDB CLI|Authentication|Access Control Lists|Managing Applications|Adding a New Application|Modifying an Application|Managing Nodes|Adding Node Information|Modifying Node Information|Working with Solution Baselines|The Solution Baselines Workspace|Adding Baseline Information|Working with Baseline Revisions|Modifying Baseline Information|Working with Schemas|The Schemas Workspace|Importing a Schema|Working with Schema Revisions|Modifying Schema Properties|Exporting Schematron Rules|Deleting a Schema|Viewing Schema Elements|Comparing Two Schemas|Working with Node Configurations|The Configurations Workspace|Importing a Node Configuration|Creating a New Node Configuration|Creating a Delta Configuration|Working with Configuration Revisions|Modifying Configuration Properties|Migrating a Configuration to Another Schema|Validating a Configuration|Exporting a Node Configuration|Deleting a Node Configuration|Working with Configuration Data|The Configuration Browser|Working With Parameter Groups|Working with Parameters|Comparing Two Configurations|The Configuration Comparison Workspace|Performing a Comparison|Creating a Delta Configuration From Comparison Results|Working with Multi-Solution Configurations|The Multi-Solution Configurations Workspace|Creating a New Multi-Solution Configuration|Working with Multi-Solution Configuration Revisions|Working with Multi-Solution Configurations|Exporting a Multi-Solution Configuration|Working with Configuration Sets|Adding a New Configuration Set|Modifying a Configuration Set|Linking Node Configurations to a Configuration Set|Working with Site-Specific Lists|The Site-Specific Lists Workspace|Site-Specific Lists|Global Variables|Site-Specific Variables|Transferring PDB Data|The Data Transfer Workspace|Exporting PDB Data|Importing PDB Data|Export Criteria|LDIF Export Criteria|PVL Export Criteria|Configuration Validation Errors|Messages Applicable to All Configuration Formats|Messages Applicable to the LDIF Format|Messages Applicable to the NETCONF Format|Messages Applicable to the MPVL Format|MIM Validation Errors|Errors and Warnings Applicable to All CM MIM Formats|Errors and Warnings Applicable to the IS CM MIM Format|Errors and Warnings Applicable to the MP_DTD Format|Configuration Management Variables|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.2|3|3.1|4|4.1|4.2|5|5.1|5.2|6|6.1|6.2|6.3|6.4|7|7.1|7.2|7.3|7.4|7.5|7.6|7.7|7.8|8|8.1|8.2|8.3|8.4|8.5|8.6|8.7|8.8|8.9|8.10|9|9.1|9.2|9.3|10|10.1|10.2|10.3|11|11.1|11.2|11.3|11.4|11.5|12|12.1|12.2|12.3|13|13.1|13.2|13.3|13.4|14|14.1|14.2|14.3|15|15.1|15.2|16|16.1|16.2|16.3|16.4|17|17.1|17.2|17.3|18|
|General|Introduction|Terms|Concept|Compliance Lists|IETF - Stream Control Transmission Protocol|Notes|Reference List|$|1|1.1|1.2|1.3|2|2.1|3|4|##3_1f#####
|$|
|Introduction|Document Purpose and Scope|Revision Information|NFV Environment|NFVI|NFV Management and Orchestration System|VNF Manager|Virtual SAPC Architecture|Virtualization Architecture|Deployment Types|Resilience and Redundancy|Networking|Storage|Security|Management and Orchestration|Onboarding and Instantiation|HW Management|Scaling|Auto-healing|Live migration|Decommissioning|VMware Tools|Characteristics and Dimensioning|Requirements on the Cloud System|Cloud Management System Requirements|Cloud Infrastructure Requirements|Compute Host HW Requirement|Additional considerations|Glossary|Reference List|$|1|1.1|1.2|2|2.1|2.2|2.3|3|3.1|3.2|3.3|3.4|3.5|3.6|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|5|6|6.1|6.2|6.3|6.4|7|8|
|Disable Promiscuous Mode and Forget Transmits Introduction|Prerequisites|Disable Promiscuous Mode and Forget Transmits Procedure|General Procedure|Perform a System Backup|Configure eVIP for the Use of IPVLAN|Check Promiscuous Mode and Forget Transmits on the VMware vCenter|SAPC Reboot|Disable Promiscuous Mode and Forget Transmits on the VMware vCenter|Final Checks|Perform a System Backup|$|1|1.1|2|2.1|2.1.1|2.1.2|2.1.3|2.1.4|2.1.5|2.1.6|2.1.7|
|Description|Procedure|List File Groups and File Information in Logical File System|$|1|2|2.1|
|Description|Procedure|Set Maximum Number of Scheduled Backups|$|1|2|2.1|
|Description|Procedure|Configure Enrollment Authority|$|1|2|2.1|
|Description|Procedure|Reset Password for User Account|$|1|2|2.1|
|Overload Control Function|Load Regulation Mechanism|Massive Reauthorizations Mechanisms|Reference List|$|1|1.1|1.2|2|
|Scaling Management Introduction|Scaling Management Functions and Concepts|Types of Operation|Managed Object Model|$|1|2|2.1|3|
|SAPC VNF Network Configuration Guide Introduction|SAPC VNF Network Configuration Guide Overview|Hardware Components|Gateway|Compute Hosts|Controller Hosts|Cloud Manager Hosts|Software Components|Mirantis OpenStack (MOS)|Ubuntu Hypervisor (KVM)|Open Virtual Switch|vSphere ESXi|vSphere Distributed Virtual Switch|Virtual Router|VIP addresses|Network|General Overview|External Connectivity|SAPC Networks Designated for Static Routing|SAPC Networks Designated for OSPF Discovery|Internal Connectivity|Preconfigured Values|Network Configuration Solutions|Solution to Define Unique OAM and Traffic Networks|Internal Network Configuration|IP Addressing|Extra Services over the Internal0 Network|External/VIP Networks Configuration|eVIP Configuration Overview|SAPC VIP Addresses|External Networks|IP Addressing of External Elements|Gateway Router Configuration|Solution to Define Unique OAM and Traffic Networks with Virtual Routers|Internal Network Configuration|VIP Networks Configuration|Networks for OSPF v2|SAPC VIP Addresses|eVIP Configuration|eVIP Configuration Overview|eVIP Elements|OSPF v2 Areas|Virtual Router Configuration|External Network Configuration|External Networks|IP Addressing|Virtual Routers IP Addresses|IP Addresses of External Elements|Virtual Router Configuration|Solution to Define Multiple OAM and Traffic Networks|Internal Network Configuration|External/VIP Network Configuration|Networks for eVIP|SAPC VIP Addresses|eVIP Configuration|eVIP Configuration Overview|eVIP Elements|IP Addressing|IP Addresses of External Elements|Gateway Router Configuration|Solution to Define Multiple OAM and Traffic Networks with Virtual Routers|Internal Network Configuration|VIP Network Configuration|Networks for OSPF v2|SAPC VIP Addresses|eVIP Configuration|eVIP Configuration Overview|eVIP Elements|OSPF v2 Areas|External Network Configuration|External Networks|IP Addressing|Virtual Router IP Addresses|IP Addresses of External Elements|$|1|2|2.1|2.1.1|2.1.2|2.1.3|2.1.4|2.2|2.2.1|2.2.2|2.2.3|2.2.4|2.2.5|2.2.6|2.2.7|2.3|2.3.1|2.3.2|2.3.2.1|2.3.2.2|2.3.3|2.3.4|3|3.1|3.1.1|3.1.1.1|3.1.1.2|3.1.2|3.1.2.1|3.1.2.2|3.1.2.3|3.1.2.4|3.1.3|3.2|3.2.1|3.2.2|3.2.2.1|3.2.2.2|3.2.2.3|3.2.2.3.1|3.2.2.3.2|3.2.2.3.3|3.2.2.4|3.2.3|3.2.3.1|3.2.3.2|3.2.3.2.1|3.2.3.2.2|3.2.3.3|3.3|3.3.1|3.3.2|3.3.2.1|3.3.2.2|3.3.2.3|3.3.2.3.1|3.3.2.3.2|3.3.2.4|3.3.2.4.1|3.3.3|3.4|3.4.1|3.4.2|3.4.2.1|3.4.2.2|3.4.2.3|3.4.2.3.1|3.4.2.3.2|3.4.2.3.3|3.4.3|3.4.3.1|3.4.3.2|3.4.3.2.1|3.4.3.2.2|
|Alarm Description|Procedure|Handle Alarm Policy Control, Connection to External Repository Failed|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm Policy Control, Number of AAAs Initial Sent Indicating Too Busy Reached|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm Policy Control, Number of Gx CCAs Initial Sent Indicating Too Busy Reached|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm Policy Control, Geographical Redundancy Unable To Reach Peer|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm Policy Control, Number of Sx CCAs Initial Sent Indicating Too Busy|$|1|2|2.1|
|Configuration of Supervised Gateways for IPv6-only with OSPF Introduction|Configuration of Supervised Gateways for IPv6-only with OSPF Prerequisites|Configuration of Supervised Gateways|IPv6 Link-local Addresses Retrieval Procedure|Supervised Gateway Creation|$|1|1.1|2|2.1|2.2|
|Description|Procedure|Configure Preventive Maintenance Policy Deleting Files in Logical File System|$|1|2|2.1|
|Description|Procedure|Delete Scheduled Event|$|1|2|2.1|
|Description|Procedure|Configure Enrollment Server Group Together with Enrollment Servers|$|1|2|2.1|
|Description|Procedure|Set User Roles for User Account|$|1|2|2.1|
|Application Detection and Control Based on ADC Rules Introduction|Document Purpose and Scope|Application Detection and Control over Sd Function|TDF Overview|TDF Selection|Select TDF Conditionally|Select TDF Unconditionally|ADC over Sd Overview|Service Access Control in Sd|Service Selection|Service Authorization|Service Qualification|Application Detection Reporting|Dynamic Policy Control over Sd|Dynamic Policy Control over Sd Overview|Classification of Dynamic Services over Sd|Qualification of Dynamic Services over Sd|Allocation of QoS Information to Dynamic Services|Allocation of Charging Parameters to Dynamic Services|Dynamic PCC Rule Generation Based on Service Data Flow Received over Sd|IP-CAN Session Reauthorization|ADC Network Deployments over Sd|ADC Traffic Cases over the Sd Interface|Sd Session Life Cycle|Sd Session Establishment|Sd Session Modification|Sd Session Termination|QoS Control Based on Application Traffic Detection Upgrading Default Bearer|Session Establishment|Upgrade Default Bearer QoS at Application Start Detected|Downgrade Default Bearer QoS at Application Stop Detected|QoS Control Based on Application Traffic Detection Allocating Dedicated Bearer|Session Establishment|Download Dedicated Bearer at Application Start Detected|Remove Dedicated Bearer at Application Stop Detected|ADC over Sd Error Handling|Error Handling at Sd Session Establishment|Error Handling at Sd Session Modification|Error Handling at Sd Session Termination|Error Handling at Application Reporting|Error Handling at Dedicated Bearer Reported as Inactive by PCEF|$|1|1.1|2|2.1|2.1.1|2.1.1.1|2.1.1.2|2.2|2.3|2.3.1|2.3.2|2.3.3|2.4|2.5|2.5.1|2.5.2|2.5.3|2.5.3.1|2.5.3.2|2.5.4|2.6|3|4|4.1|4.1.1|4.1.2|4.1.3|4.2|4.2.1|4.2.2|4.2.3|4.3|4.3.1|4.3.2|4.3.3|4.4|4.4.1|4.4.2|4.4.3|4.4.4|4.4.5|
|Configuration and Provisioning Overview|Typographic Conventions|Other Conventions|Configuration Prerequisites|Charging System Configuration|Configure Online Charging Systems|Provision of Subscribers|Subscribers Provisioned Only in Charging Systems|Subscribers Provisioned in the SAPC and in the Charging System|Configure Selection of Charging System|Provisioning at Subscriber Profile|Avoiding Sy Interface Communication for Subscribers Provisioned in the SAPC|Configure Policies for Dynamic Charging System Selection|Configure Default Charging System|Configure Policy Control Based on Spending Limits Reporting|Appendix A. Charging System Policy Type|Appendix B. Policy Tags|Reference List|$|1|1.1|1.2|2|3|3.1|4|4.1|4.2|5|5.1|5.2|5.3|5.4|6|7|8|9|
|Description|Procedure|Configure Preventive Maintenance Policy Reporting Alarms for Logical File System|$|1|2|2.1|
|Description|Procedure|Lock Backup Scheduler|$|1|2|2.1|
|Description|Procedure|Change Enrollment Server|$|1|2|2.1|
|Description|Procedure|Lock User Account Administratively|$|1|2|2.1|
|Event-Based Monitoring Introduction|Document Purpose and Scope|Concepts|Typographic Conventions|Functional Overview|Events and Parameters|Supported Events for Gx Interface|Supported Events for Rx Interface|Event-Based Monitoring Key Performance Indicators|KPI Calculations|Traffic Case|$|1|1.1|1.2|1.3|2|2.1|2.1.1|2.1.2|2.2|2.2.1|3|
|Configuration and Provisioning Overview|Other Conventions|Configuration Prerequisites|Configuration|Configure Gx PCEF Nodes|Configure Gx PCEF Nodes using IP-Domain-Id|Provision Dynamic Services|Provision AF Signalling Path Profiles|Configure Classification of Dynamic Services|Configure Dynamic Service Authorization|Configure Dynamic Service Qualification|Configure Static Qualification for Dynamic Services|Configure Dynamic Qualification for Dynamic Services|Configure Bearer QoS Control  for Dynamic Services|Configure Access and Charging Policies Based on Dynamic Service Establishment|Configure Event Triggers|Configuration Examples for Use Cases|Prioritized Video Delivery|Multimedia Telephony over LTE|Notification of Signalling Path Status|Appendix A. Dynamic Policy Types|Appendix B. Policy Tags|Dynamic Policy Control Tags|Appendix C. Tags for Output Attributes Used in Policies|QoS and Charging Selection Tags|$|1|1.1|2|3|3.1|3.1.1|3.2|3.3|3.4|3.5|3.6|3.6.1|3.6.2|3.7|3.8|3.9|4|4.1|4.2|4.3|5|6|6.1|7|7.1|
|Description|Procedure|Unlock Backup Scheduler|$|1|2|2.1|
|Description|Procedure|View Roles and Rules|$|1|2|2.1|
|Description|Procedure|Install Node Credential Online|$|1|2|2.1|
|Description|Procedure|Unlock Administrative Lock for User Account|$|1|2|2.1|
|Active-Standby Geographical Redundancy Introduction|Active-Standby Geographical Redundancy|Procedures and States|Recommended Operating Conditions|Active-Standby Geographical Redundancy Procedures|Preconditions|Start Geographical Redundancy|Temporarily Disable Geographical Redundancy|Monitor Geographical Redundancy State|Check Geographical Redundancy Configuration|Change Preferred Role in Geographical Redundancy|Return Active State to Preferred Node|Maintenance Activities|Active-Standby Geographical Redundancy Fault Management|$|1|2|2.1|2.2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|4|
|$|
|Description|Procedure|Change Maximum Number of Manual Backups|$|1|2|2.1|
|Description|Procedure|Unlock Local Authorization Method|$|1|2|2.1|
|Description|Procedure|Renew Node Credential Online|$|1|2|2.1|
|Description|Procedure|Unlock Operational Lock for User Account|$|1|2|2.1|
|Description|Procedure|Enable Automatic Deletion of Manual Backups|$|1|2|2.1|
|Description|Procedure|Lock Local Authorization Method|$|1|2|2.1|
|Description|Procedure|Configure Renewal Mode of Node Credential|$|1|2|2.1|
|Understanding User Management|Key User Management Concepts|User Authentication|User Authorization|Permission Types|Default Roles|Backup and Restore of Local User Data|Basic User Management Procedures|User Management-Related Alarms|Rules for Default Roles|$|1|1.1|1.2|1.3|1.4|1.5|1.6|2|3|4|
|Introduction|Document Purpose and Scope|Typographic Conventions|Other Conventions|Configuration Prerequisites|Configuration|Configure Event Triggers|Configuration Examples for Use Cases|Configure Bill Shock Prevention|Appendix A. Policy Tags|Tags Related to Wi-Fi Calling|Reference List|$|1|1.1|1.2|1.3|2|3|3.1|4|4.1|5|5.1|6|
|Description|Procedure|Disable Automatic Deletion of Manual Backups|$|1|2|2.1|
|Description|Procedure|Create Custom Role|$|1|2|2.1|
|Description|Procedure|Delete Enrollment Server|$|1|2|2.1|
|Active-Standby Geographical Redundancy Network Configuration Guide Introduction|Active-Standby Geographical Redundancy Network Configuration Guide Overview|Networks Allocation|IP Addressing|IP Addresses|Logical Network Assignment|Geographical Redundancy VIP Configuration for VNF Deployments|Geographical Redundancy VIP Configuration for PNF Deployments|$|1|2|3|3.1|3.1.1|4|4.1|4.2|
|Description|Procedure|Import Backup|$|1|2|2.1|
|Description|Procedure|Change Custom Role|$|1|2|2.1|
|Description|Procedure|Delete Enrollment Authority|$|1|2|2.1|
|Configuration and Provisioning Overview|Typographic Conventions|Other Conventions|Configuration Prerequisites|Smp Diameter Data|Provision PDN-GW Selection|Provision PDN-GW Profiles|Provision PDN-GW List Profiles|Provision PDN-GW Lists to Subscribers or Subscriber Groups|Provision Conditional PDN-GW List with Policies|Provision SPID Selection|Provision SPIDs to Subscribers or Subscriber Groups|Provision Conditional SPID Selection Policies|Configure Smp Session Control|Appendix A. Policy Types|Appendix B. Tags Related to Mobility Based Policy Control|Reference List|$|1|1.1|1.2|2|3|4|4.1|4.2|4.3|4.4|5|5.1|5.2|6|7|8|9|
|Description|Procedure|Export Backup|$|1|2|2.1|
|Description|Procedure|Delete Custom Role|$|1|2|2.1|
|Description|Procedure|Delete Enrollment Server Group|$|1|2|2.1|
|Privacy User Guide Introduction|Target Group|Notice|Consent|Choices and Personal Data Retention|Privacy Functionality Contained in the SAPC and Intended Purpose|Instructions for Operating the Privacy Functionality|Procedures for Maintaining the Privacy Configuration|Default Values of the Privacy Parameters|Listing and Classification of the Personal Data Processed by the Product|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|3|
|Description|Procedure|Change Prefix for Exported Backup Names|$|1|2|2.1|
|Description|Procedure|Create Custom Rule|$|1|2|2.1|
|Description|Procedure|Delete Node Credential|$|1|2|2.1|
|Security Management Guide Introduction|Security Management Prerequisites|Security Management Environment|Security Management Definitions|Security Management Overview|Threats|Defense|Product Security Functionality|Network Security Level|Node Security Level|OAM Security Level|Security Configuration|Network Security Level|Node Security Level|OAM Security Level|Security in the Cloud|Default Parameter Values|Services, Ports, and Protocols|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|5|6|7|8|
|VNF Upgrade by Replacement Introduction|Prerequisites|Upgrade Overview|Stages of Upgrade by Replacement|Upgrade Impact in UDC|Upgrade Times|System Downtime|Traffic Loss|Service Disturbance|Network Connectivity|Upgrade Preparation|Access Management|Network Plan|NFV Infrastructure Resources|SAPC Virtual Delivery Package|Destination SAPC vAPP Descriptor Generation|Upgrade Environment Preparation|Upgrade Instructions|Instantiation of Destination SAPC vAPP|Upgrade Execution|Decommission of Origin SAPC vAPP|Post-Upgrade Activities|Update SAPC Version in OSS/ENM|Remove IP Routes|Entities with External Subscriber Repository|Rollback Procedure|Automatic Rollback|On-Demand Rollback|Execute Rollback Procedure|Troubleshooting|$|1|1.1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|3|3.1|3.2|3.3|3.4|3.5|3.6|4|4.1|4.2|4.3|5|5.1|5.2|5.3|6|6.1|6.2|6.3|7|
|Overview|General|ECM-OpenStack/OpenStack CLI|Accesses|SAPC VNF Descriptor Generation|Download the SAPC Virtual Delivery Package|Generate the SAPC VNF Descriptor|Deploy the SAPC for Standalone|Deployment with ECM|Flavors Addition|Upload the SAPC Images|Upload the SAPC OVF/HOT Package|Deploy the SAPC vAPP|Deployment with OpenStack CLI|Upload the SAPC HOT Package|Upload the SAPC Images CLI|Create Flavors|Create Flavors for OpenStack|Create Flavors for OpenStack Not Configured for CPU Pinning and NUMA Awareness|Deploy the SAPC Stack|Verify the SAPC Deployment|Install Additional SAPC Instances|Install Additional SAPC Instances from ECM|Customize the Additional SAPC Instance|Deploy Additional SAPC Instances|Install Additional Instances with OpenStack CLI|Deploy the SAPC for Geographical Redundancy|Configure the SAPC|SAPC Hardening after Deployment|Connectivity to External Networks|Configuration Example of OAM Border Gateway Routers (Extreme x670)|Configuration Example of Traffic Border Gateway Routers (Extreme x670)|Set the SAPC Licenses Configuration|Final Backup|$|1|1.1|1.2|1.3|2|2.1|2.2|3|3.1|3.1.1|3.1.2|3.1.3|3.1.4|3.2|3.2.1|3.2.2|3.2.3|3.2.3.1|3.2.3.2|3.2.4|3.3|4|4.1|4.1.1|4.1.2|4.2|5|6|6.1|6.2|6.2.1|6.2.2|6.3|6.4|
|Alarm Description|Procedure|Handle Alarm LOTC Disk Usage|Handle Partition '/' over Threshold Value|Handle Partition '/boot' over Threshold Value|Handle Partition '/var/log' over Threshold Value|Handle Partition '/cluster' over Threshold Value|$|1|2|2.1|2.2|2.3|2.4|2.5|
|Alarm Description|Procedure|Handle Alarm License Management, Emergency Unlock Reset Key Required|$|1|2|2.1|
|Description|Procedure|Start Preferred as Active|Start Non-Preferred as Standby|$|1|2|2.1|2.2|
|Alarm Description|Procedure|Handling Alarm File Management, Number of Files in FileGroup Exceeded|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm Certificate Management, Automatic Enrollment Failed|$|1|2|2.1|
|Decription|Procedure|Change SSH Public Key|$|1|2|2.1|
|Description|Procedure|Add A Target Type Identifier|Delete A targetType Identifier|Delete All targetType Identifiers|$|1|2|2.1|2.2|2.3|
|Alarm Description|Procedure|DBS, NR, Out of Sync|$|1|2|2.1|
|Gx Interface Overview|Document Content Conventions|Gx Interface Message Exchange|Diameter Base Protocol Messages|Gx Capability Negotiation|Device Watchdog|Disconnect Peer|Gx Interface Controls and AVP Relations|Gx Interface Message Format|Gx Credit-Control-Request (CCR)|Gx Credit-Control-Answer (CCA)|Gx Re-Authorization-Request (RAR)|Gx Re-Authorization-Answer (RAA)|Gx Interface AVPs|Gx Supported-Features|Charging-Rule-Install AVP|Charging-Rule-Definition AVP|Flow-Description AVP|Precedence AVP|Charging-Rule-Report AVP|QoS-Information AVP|Default-EPS-Bearer-QoS AVP|Usage-Monitoring-Information AVP|Presence-Reporting-Area-Information AVP|TDF-Information AVP|Ericsson Gx+ Message Format|Ericsson Gx+ Credit-Control-Request (CCR)|Ericsson Gx+ Credit-Control-Answer (CCA)|Ericsson Gx+ Re-Auth-Request (RAR)|Ericsson Gx+ AVPs|Charging-Rule-Authorization|Authorization-State AVP|One-Time-Redirect-Control AVP|Gx-Capability-List AVP|Gx Error Handling|Gx Protocol Errors|Gx Application Errors|Reference List|$|1|1.1|2|3|3.1|3.2|3.3|4|5|5.1|5.2|5.3|5.4|6|6.1|6.2|6.2.1|6.2.1.1|6.2.1.2|6.3|6.4|6.5|6.6|6.7|6.8|7|7.1|7.2|7.3|8|8.1|8.1.1|8.1.2|8.2|9|9.1|9.2|10|
|Bearer QoS and Bandwidth Management Introduction|Bearer QoS and Bandwidth Management Function|Bearer QoS and Bandwidth Management Overview|QoS Control for the Default Bearer|QoS Control for Network-Initiated Dedicated Bearers|IP Flow Bandwidth Management|QoS in 3GPP Packet Networks|QoS Parameters|QoS Class Identifier (QCI)|Allocation Retention Priority (ARP)|Maximum Bit Rate (MBR)|Guaranteed Bit Rate (GBR)|Aggregate Maximum Bit Rate (APN-MBR)|QoS Parameters for Network Initiated Dedicated Bearers in 3GPP Networks|QoS Control for the Default Bearer and the APN|Detailed Procedure|Functions to Calculate QoS for the Default Bearer and QoS for APN|Default Bearer QoS Profile Comparison|QoS Control for Services|QoS Control for Preconfigured PCC rules|QoS Control for Static PCC rules|IP Flow Bandwidth Management for Static PCC rules|QoS Control for Dynamic PCC rules|Network Deployments|Bearer QoS and Bandwidth Management Protocol Bindings|QoS Control for the Default Bearer and the APN|Protocol Binding for standard Gx Rel9 onwards, GPRS Access|Accept, Upgrade, Downgrade|QoS Functions|QoS Event Triggers|Bearer QoS and Bandwidth Management Protocol Bindings|QoS Control for the Default Bearer and the APN|Protocol Binding for standard Gx Rel9 onwards, GPRS Access|Protocol Binding for standard Gx Rel9 onwards EPS|QoS Comparison|QoS Event Triggers|Protocol Binding Summary|QoS Control for Services|QoS Control for Preconfigured and Dynamic PCC rules|QoS Control and IP Flow Bandwidth Management for Static PCC rules|Reference List|$|1|2|2.1|2.1.1|2.1.2|2.1.3|2.2|2.2.1|2.2.2|2.2.3|2.2.4|2.2.5|2.2.6|2.2.7|2.3|2.3.1|2.3.2|2.3.3|2.4|2.4.1|2.4.2|2.4.3|2.4.4|3|4|4.1|4.1.1|4.1.1.1|4.1.1.2|4.1.1.3|5|5.1|5.1.1|5.1.2|5.1.2.1|5.1.2.2|5.1.3|5.2|5.2.1|5.2.2|6|
|Introduction|Prerequisites|Related Information|Terminology and Acronyms|C-Diameter Managed Object Model|Graphical Representation|Configuration Lifecycle|C-Diameter Instance Configuration|AAA Service Configuration|Diameter Application Configuration|Peer Configuration|Transport Configuration|Routing Specification|Reference List|$|1|1.1|1.2|2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|4|
|BSP 8100 Network Configuration Guide Introduction|BSP 8100 Network Configuration Guide Overview|BSP 8100 Minimal Configuration. Four Physical Blades|BSP 8100 System Controller Blades Minimal Configuration|BSP 8100 Payload Blades Minimal Configuration|BSP 8100 Single Subrack Configuration. 12 Physical Blades|BSP 8100 System Controller Blades Subrack Configuration|BSP 8100 Traffic Blades Subrack Configuration|Traffic Payload Blades|External Database Payload Blades|GeoRed Payload Blades|Traffic Separation Payload Blades|Remaining Payload Blades|BSP 8100 Whole Rack Configuration. 36 Physical Blades|BSP 8100 Traffic Blades Whole Rack Configuration|Non-Front End Blades|Front End Payload Blades|BSP 8100 Networks Allocation|BSP 8100 VLANs|BSP 8100 IP Addressing|BSP 8100 IP Addresses of External Elements|$|1|2|2.1|2.1.1|2.1.2|2.2|2.2.1|2.2.2|2.2.2.1|2.2.2.2|2.2.2.3|2.2.2.4|2.2.2.5|2.3|2.3.1|2.3.1.1|2.3.1.2|3|3.1|3.2|3.2.1|
|$|
|Alarm Description|Procedure|Handle Alarm LemCDCLSv, Operation Execution Timeout|$|1|2|2.1|
|Description|Procedure|Set Automatic Export of Scheduled Backups|$|1|2|2.1|
|Description|Procedure|Change Custom Rule|$|1|2|2.1|
|Description|Procedure|Install Trusted Certificate|$|1|2|2.1|
|Description|Procedure|Change Administrator Account|$|1|2|2.1|
|SAPC VNF Descriptor Generator Tool Overview|SAPC VNF Descriptor Generator Tool Prerequisites|SAPC VNF Descriptor Generator Tool Preparations|Virtual Delivery Package|Cluster Adaptation|Initial Configuration and Provisioning|Descriptor Generator Tool Configuration File|SAPC VNF Descriptor Generation|Package Generation|OVF Package Generation Output|ECM over CEE|VMware vSphere Client|VMware vCloud Director|HOT Package Generation Output|OpenStack|SAPC VNF Descriptor Generator Tool Examples|Example of the adapt_cluster.cfg File|Example of the Initial Configuration File|Example of the Initial Provisioning File|Example of the SAPC.cfg Configuration File|Example of the ECM Flavors XML File|Example of the Script to Upload Flavors in OpenStack|$|1|2|3|3.1|3.2|3.3|3.4|4|4.1|4.2|4.2.1|4.2.2|4.2.3|4.3|4.3.1|5|5.1|5.2|5.3|5.4|5.5|5.6|
|Description|Procedure|Change Manual Backup Name|$|1|2|2.1|
|Description|Procedure|Delete Custom Rule|$|1|2|2.1|
|Description|Procedure|Create Trust Category|$|1|2|2.1|
|Configuration Guide for SAPC Application in UDC Introduction|SAPC Application in UDC Configuration|Configuring SAPC Application Counters in External Database (CUDB)|Configuring SAPC Notifications|UDC Maiden Installation|Introduction of SAPC to UDC|Adding New SAPC|SAPC Entities|Reference List|$|1|2|2.1|2.2|2.2.1|2.2.2|2.2.3|2.3|3|
|Description|Procedure|Change Heartbeat Interval|$|1|2|2.1|
|Description|Procedure|Create Measurement Collection Job|$|1|2|2.1|
|Description|Procedure|Change Trust Category|$|1|2|2.1|
|Configure ADC based on PCC rules (Gx) Overview|Typographic Conventions|Other Conventions|Configuration Prerequisites|Configuration for ADC based on PCC rules (Gx)|Configuring Gx PCEFs|Provision ADC for Services|Configure ADC Redirection|Configure ADC Redirection Unconditionally|Configure ADC Redirection Conditionally|Configure ADC Mute Notification|Configure ADC Mute Notification Unconditionally|Configure ADC Mute Notification Conditionally|Configure Event Triggers|Configuration Examples for Use Cases|QoS Control based on Application Detection|Appendix A. ADC Policy Types|Appendix B. ADC Policy Tags|Reference List|$|1|1.1|1.2|2|3|3.1|3.2|3.3|3.3.1|3.3.2|3.4|3.4.1|3.4.2|3.5|4|4.1|5|6|7|
|Description|Procedure|Configure Node Credential for ECLI|Configure Node Credential for NETCONF|Configure Node Credential for FTP|$|1|2|2.1|2.2|2.3|
|Description|Procedure|Create Threshold Monitoring Job|$|1|2|2.1|
|Description|Procedure|Delete Trust Category|$|1|2|2.1|
|Provisioning Tools Introduction|Provisioning Tools|Provisioning with Resty|Resty Usage Reference|Initialize Base URI|PUT|GET|DELETE|Operation Results|Prettify JSON Data|Edit Input JSON Data on an Editor|Reuse Base URI for Massive Provisioning|Provisioning with Postman|Installation|Authentication|PUT|GET|DELETE|Operation Results|TLS Certificate|Massive Data Retrieval|Operation and Maintenance|Security|Troubleshooting|$|1|2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|5|6|6.1|6.2|
|Description|Procedure|Configure Trust Category for ECLI|Configure Trust Category for NETCONF|Configure Trust Category for FTP|$|1|2|2.1|2.2|2.3|
|Description|Procedure|Delete Measurement Collection Job|$|1|2|2.1|
|Description|Procedure|Disable Trusted Certificate|$|1|2|2.1|
|Configuration and Provisioning Overview|Typographic Conventions|Other Conventions|Configuration Prerequisites|Configure Emergency APNs|Configure Unauthenticated Emergency Services|Provision Emergency Subscriber|Emergency Subscriber Profile in External Repository|Configure Multimedia Priority Services APNs|Provision MPS Profiles|Configuration Examples for Use Cases|Emergency Services|IMS Emergency Services|Subscription-based Multimedia Priority Services|Prioritizing the Default Bearer for IMS Signalling|Prioritizing Dynamic Services with EPS Bearer Subscription|IMS Multimedia Priority Services|Service QoS|Bearer QoS|Appendix A. Emergency Services Policy Tags|Appendix B. Multimedia Priority Services Policy Tags|Reference List|$|1|1.1|1.2|2|3|4|5|6|7|8|9|9.1|9.2|9.3|9.3.1|9.3.2|9.4|9.4.1|9.4.2|10|11|12|
|Description|Procedure|Change Administrative State of ECLI over SSH|Change Administrative State of NETCONF over SSH|$|1|2|2.1|2.2|
|Description|Procedure|Delete Threshold Monitoring Job|$|1|2|2.1|
|Description|Procedure|Enabled Trusted Certificate|$|1|2|2.1|
|Backup and Restore Introduction|Backup and Restore Preconditions|Backup and Restore Overview|Backup and Restore Procedures|Create Backup|Restore Backup|Backup and Restore Restrictions|$|1|2|3|4|4.1|4.2|5|
|Description|Procedure|Change Administrative State of ECLI over TLS|Change Administrative State of NETCONF over TLS|Change Administrative State of FTP over TLS|$|1|2|2.1|2.2|2.3|
|Description|Procedure|List Performance Management Groups and Measurement Types|$|1|2|2.1|
|Description|Procedure|Delete Trusted Certificate|$|1|2|2.1|
|Configuration Prerequisites|Overload Control Configuration|Load Regulation Mechanism|Check Load Regulation Thresholds|Modify CPU Threshold for Load Regulation|Modify Memory Threshold for Load Regulation|Massive Reauthorizations Mechanisms|Disable Massive Reauthorizations Based on Subscriber Update or Removal|Disable Massive Reauthorizations Associated to Time Conditions|Disperse Reauthorizations due to Fair Usage Reset on Specific Dates|Overload Configuration Related to Emergency and Multimedia Priority Services|Overload Control Performance Management|Reference List|$|1|2|2.1|2.1.1|2.1.2|2.1.3|2.2|2.2.1|2.2.2|2.2.3|2.3|3|4|
|Description|Procedure|Change Port Number of FTP over TLS|$|1|2|2.1|
|Description|Procedure|List Performance Management Jobs|$|1|2|2.1|
|Overview of the Adapt Cluster Tool|Prerequisites|Customization Tool Execution|PNF Deployments|VNF Deployments|Add Geographical Redundancy to a Live SAPC|Adapt Cluster Tool Execution Verification|Adapt Cluster Configuration File Parameters|Adapt Cluster Template Examples|Reference List|$|1|2|3|3.1|3.2|3.3|3.4|4|5|6|
|Overview of the Adapt Cluster Tool|Prerequisites|Customization Tool Execution|PNF Deployments|VNF Deployments|Add Geographical Redundancy to a Live SAPC|Adapt Cluster Tool Execution Verification|Adapt Cluster Configuration File Parameters|Adapt Cluster Template Examples|Reference List|$|1|2|3|3.1|3.2|3.3|3.4|4|5|6|
|Description|Procedure|Change Session Idle Timer of FTP over TLS|$|1|2|2.1|
|Description|Procedure|Start Measurement Collection Job|$|1|2|2.1|
|Front End Management Tool Introduction|Front End Management Tool Prerequisites|Front End Management Tool|Front End Management Tool Purpose|Front End Management Tool Parameters|Front End Management Tool Modes|$|1|2|3|3.1|3.2|3.3|
|Description|Procedure|Start Threshold Monitoring Job|$|1|2|2.1|
|Configuration Prerequisites|Diameter Configuration Overview|How To Apply Diameter Configuration Changes|Diameter Dictionary|How to Modify Diameter Dictionaries|Diameter Dictionary Format|Traffic Separation for Diameter Interfaces|Configure DRA Scenarios|Realm Routing Table|Troubleshooting|Configure Realm Routing Table as Diameter Server|Configure Realm Routing Table as Diameter Client|Configure Connections to OCS (Sy)|Direct Connection between the SAPC and the OCS with one realm|No Direct Connection between the SAPC and the OCS|Configure Connections to an OCS with Several Diameter Realms|Script to Automate Configuration Values|Configure SCTP Multihoming|Path Separation, Path Diversity and Multihoming|Reference List|$|1|2|3|4|4.1|4.2|5|6|6.1|6.1.1|6.2|6.3|7|7.1|7.2|7.3|7.4|8|8.1|9|
|SAPC VNF Deployment Instruction for VMware Introduction|SAPC VNF Deployment Instruction for VMware Overview|VMware|Access|Equipment|SAPC OVF Package Generation|Download the SAPC Virtual Delivery Package|Generate the SAPC Open Virtualization Format (OVF) Package|Deploy the SAPC for Standalone Deployments using VMware vSphere Web Client|Deploy the SAPC vApp|Post Deploy Activities|Power on the SAPC vApp|Configuration in vCenter|Deploy the SAPC for Standalone Deployments using VMware vCloud Director|Upload the SAPC vApp and PL Scale-Out Packages to the Catalogue|Deploy the SAPC vApp|Post Deploy Activities|Power on the SAPC vApp|Configuration in vCloud Director|Verify the SAPC Deployment|Install Additional SAPC Instances in the VMware Cluster Using VMware vSphere Web Client|Install Additional SAPC Instances in the VMware Cluster Using VMware vCloud Director|Deploy the SAPC for Geographical Redundancy Scenarios|Configure the SAPC|SAPC Hardening after Deployment|Connectivity to the External Networks|Setting the SAPC Licenses Configuration|Final Backup|$|1|2|2.1|2.2|2.3|3|3.1|3.2|4|4.1|4.2|4.3|4.4|5|5.1|5.2|5.3|5.4|5.5|6|7|8|9|10|10.1|10.2|10.3|10.4|
|Alarm Description|Procedure|Handle Alarm LOTC Disk Replication Communication|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm License Management, Key File Fault|$|1|2|2.1|
|Description|Procedure|Delete SSH Public Key|$|1|2|2.1|
|Change Geographical Redundancy to Active-Active Description|Change Geographical Redundancy to Active-Active Prerequisites|Change Geographical Redundancy to Active-Active Procedure|Procedure in Non Preferred SAPC (SAPC2)|Procedure in Preferred SAPC (SAPC1)|Start Mated SAPC (SAPC2) in Active-Active Geographical Redundancy|$|1|1.1|2|2.1|2.2|2.3|
|Alarm Description|Procedure|Handle Alarm DBS, NR, Synchronization Needed|$|1|2|2.1|
|Sy Interface Overview|Document Content Conventions|Sy Interface Message Exchange|Diameter Base Protocol Messages|Sy Capability Negotiation|Device Watchdog|Disconnect Peer|Sy Interface Message Format|Sy Spending-Limit-Request (SLR)|Sy Spending-Limit-Answer (SLA)|Sy Spending-Status-Notification-Request (SNR)|Sy Spending-Status-Notification-Answer (SNA)|Sy Session-Termination-Request (STR)|Sy Session-Termination-Answer (STA)|Ericsson Sy Message Format|Ericsson Sy Spending-Limit-Request (SLR)|Ericsson Sy Spending-Limit-Answer (SLA)|Ericsson Sy Spending-Status-Notification-Request (SNR)|Ericsson Sy Spending-Status-Notification-Answer (SNA)|Ericsson Sy Session-Termination-Request (STR)|Ericsson Sy Session-Termination-Answer (STA)|Sy Error Handling|Sy Protocol Errors|Sy Application Errors|Reference List|$|1|1.1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|4.6|5|5.1|5.2|5.3|5.4|5.5|5.6|6|6.1|6.2|7|
|Introduction|Related Information|Key Features of ECLI|Prerequisites|ECLI Version|CLI Concepts|CLI Modes|CLI Session|CLI Transaction|CLI Position|CLI Prompt|Context-Sensitive Help|Auto-Completion|Case Correction|Escaping of Special Characters|CLI Comments|Visibility Levels|Automatic Correction of ManagedElement ID|Limitations|CLI Commands|Summary of CLI Commands|Success and Error Indications|Display Information|Change and Display the Position in MO Tree|Change MO Attributes|Create MO|Reinitialize MO|Delete MO|MO Actions|Copy and Paste Configuration Data|Change Password Command|Display CLI Version|Pipe Utility Commands|Help Command|Deprecated Actions|Deprecated Options|CLI Commands Limitations|Terminal Properties|Terminal Types|Default Key Bindings|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|2.10|2.11|2.12|2.13|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|3.10|3.11|3.12|3.13|3.14|3.15|3.16|3.17|4|4.1|4.2|
|Access and Charging Control Introduction|Access and Charging Control Function|IP-CAN session Access Control|Service Access Control|Selection of Rule Space (Ericsson Added Value)|Service Selection|Service Authorization|Service Authorization Policies without Time of Day Conditions or with Time of Day Conditions where PCRF controls time|Service Authorization Policies with Time of Day Conditions where the PCEF controls time|One Time Redirect Control|Static Services Qualification|Static Service Qualification Policies with Time of Day Conditions|Service Authorization and Static Service Qualification Policies with Time of Day Conditions where the PCEF controls time|Notification of Errors in the Installation of Services|Service Charging Control|Charging Control for Static Services with the PCEF|Charging Control for Preconfigured Services with the PCEF|Subscriber Charging Control|Content Filtering|Event Triggers|Multiple Gx Support|Presence Reporting Area|Diameter Race Condition Handling|Handling of Concurrent Gx RAR and CCR messages|Handling of Concurrent SAPC-initiated Reauthorizations|Access and Charging Control Network Deployments|Access and Charging Control Traffic Cases|IP-CAN session Lifetime|Protocol Binding for Rel9 Gx/Gx+ onwards|Redirect Owing to non-authorized Static Service|One Time Redirect for Authorized Static Services|Service Authorization and Static Service Qualification Policies with Time of Day Conditions When the PCEF is Selected As Time Controller|Time of Day Conditions Applied Only to Service Authorization Policies|Time of Day Conditions Applied to Service Authorization and Static Service Qualification Policies|Presence Reporting Area|PCC Rule Error Handling|Protocol Binding for Rel9 Gx/Gx+ onwards Notification of Error in the Installation of PCC rules|Diameter Race Condition Handling|Extended Event-Trigger for Tethering Detection Reporting over Gx|Access and Charging Control Error Handling|Reference List|$|1|2|2.1|2.2|2.2.1|2.2.2|2.2.3|2.2.3.1|2.2.3.2|2.2.3.3|2.2.4|2.2.4.1|2.2.5|2.2.6|2.3|2.3.1|2.3.2|2.4|2.5|2.6|2.7|2.8|2.9|2.9.1|2.9.2|3|4|4.1|4.1.1|4.2|4.3|4.4|4.4.1|4.4.2|4.5|4.6|4.6.1|4.7|4.8|4.9|5|
|NSP 6.1 Network Configuration Guide Introduction|NSP 6.1 Network Configuration Guide Overview|NSP 6.1 Single Subrack Network Configuration|System Controller Blades|Payload Blades|Traffic Payload Blades|External Database Payload Blades|GeoRed Payload Blades|Traffic Separation Payload Blades|Remaining Payload Blades|Logical Traffic Separation|TIPC Networks|NSP 6.1 Extra Subracks Network Configuration|Traffic Blades|All Blades|FEE Payload Blades|TIPC Networks|NSP 6.1 Networks Allocation|NSP 6.1 DMX Network Allocation|NSP 6.1 VLANs|NSP 6.1 IP Addressing Example|NSP 6.1 IP Addresses of External Elements|NSP 6.1 Internal IP Addresses|NSP 6.1 TSP Legacy Considerations|NSP 6.1 Network Configuration Guide Annex|NSP 6.1 VLANs and Ports, Overview|$|1|2|2.1|2.1.1|2.1.2|2.1.2.1|2.1.2.2|2.1.2.3|2.1.2.4|2.1.2.5|2.1.2.6|2.1.3|2.2|2.2.1|2.2.1.1|2.2.1.2|2.2.2|3|3.1|3.2|3.3|3.3.1|3.3.2|3.4|4|4.1|
|General|Introduction|Terms|Concept|Compliance Lists|IETF - Stream Control Transmission Protocol|Notes|Reference List|$|1|1.1|1.2|1.3|2|2.1|3|4|##3_1f#####
|$|
|Description|Procedure|Stop Measurement Collection Job|$|1|2|2.1|
|Performance Data Collection Introduction|Configuration Prerequisites|Performance Data Collection Function|PDC Operational Conditions|PDC Function Administration|Enable Daily Data Collection and Monthly Aggregation|Disable Daily Data Collection and Monthly Aggregation|Manual Data Collection|Manual Collection by Default|Manual Data Collection by Date|Manual Data Collection by Report Type|Manual Data Collection by Date and Report Type|Data Packaging|Data Packaging by Default|Data Packaging by Date|Cleanup|Health Check|Health Check Full Report|Health Check Report|Node Information Report|Node Configuration Report|PDC Configuration|Modify Configuration|Configure Reported Counters|Configure PDC Execution Priority|Configure Daily Processing Hour|Configure PDC Traces|Configure PDC Health Check Traces|PDC Fault Management|Alarms|Notifications|Troubleshooting|Reports Are Not Generated|Newly Added Counter Does Not Appear|CPU Usage Is Too High|Reports Take Too Long to Be Generated|Other Applications Affect PDC Performance|PDC Execution Interrupted|Other Operational Conditions|Capabilities|External Capabilities|Security|PDC Report Data Management|Daily and Monthly Reports|Daily Reports|Monthly Reports|Health Check Reports|$|1|2|3|4|4.1|4.1.1|4.1.2|4.1.3|4.1.3.1|4.1.3.2|4.1.3.3|4.1.3.4|4.1.4|4.1.4.1|4.1.4.2|4.1.4.3|4.1.5|4.1.5.1|4.1.5.2|4.1.5.3|4.1.5.4|4.2|4.2.1|4.2.1.1|4.2.1.2|4.2.1.3|4.2.1.4|4.2.1.5|4.3|4.3.1|4.3.2|4.3.3|4.3.3.1|4.3.3.2|4.3.3.3|4.3.3.4|4.3.3.5|4.3.3.6|4.4|4.4.1|4.4.2|4.4.3|5|5.1|5.1.1|5.1.2|5.2|
|Description|Procedure|Stop Threshold Monitoring Job|$|1|2|2.1|
|UE Trace Tool Introduction|UE Trace Tool Function|Subscriber Identities for Tracing|Configuring the UE Trace Tool|UE Trace Procedures|View the Trace Results|Start a Trace|List Activated and Scheduled Traces|See a Trace in Real-Time|Stop a Trace|UE Trace Output Files|Event Record Examples|Message Traced on the Gx Interface|Message Traced on the Rx Interface|Troubleshooting|$|1|2|2.1|3|4|4.1|4.2|4.3|4.4|4.5|5|5.1|5.1.1|5.1.2|6|
|Configure ADC Based on ADC Rules (Sd) Overview|Typographic Conventions|Other Conventions|Configuration Prerequisites|Sd Diameter Data|Configure Gx PCEF Nodes|Configure Sd TDF Nodes|Configure TDF Selection|Select TDF Conditionally|Select TDF Unconditionally|Configure Event Triggers|Provision Services for ADC Rules|Set ADC rules|Configure Service Access Control|Provision Policies for Service Authorization|Provision Static Service Policies|Configure Service Charging Control|Provision Dynamic Services|Configure Dynamic Service Classification for Sd|Configure Dynamic Service Qualification in Sd|Configure Static Qualification for Dynamic Services in Sd|Configure Dynamic Qualification for Dynamic Services in Sd|Configure Bearer QoS Control for Dynamic Services|Configure Access and Charging Policies Based on Dynamic Service Establishment|Configuration Examples for Use Cases|Upgrade Default Bearer to Prioritize Streaming Delivery|Allocate Dedicated Bearer to Prioritize Streaming Delivery|Appendix A. ADC over Sd Policy Types|Appendix B. ADC over Sd Policy Tags|Reference List|$|1|1.1|1.2|2|3|3.1|3.2|3.3|3.3.1|3.3.2|3.4|3.5|3.5.1|3.6|3.6.1|3.6.2|3.7|3.8|3.9|3.10|3.10.1|3.10.2|3.11|3.12|4|4.1|4.2|5|6|7|
|Active-Active Geographical Redundancy Introduction|Active-Active Geographical Redundancy|Procedures and States|Active-Active Geographical Redundancy Procedures|Preconditions|Start Geographical Redundancy|Temporarily Disable Geographical Redundancy|Monitor Geographical Redundancy State|Check Geographical Redundancy Configuration|Change Preferred Role in Geographical Redundancy|Maintenance Activities|Active-Active Geographical Redundancy Fault Management|$|1|2|2.1|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|4|
|Active-Active Geographical Redundancy Network Configuration Guide Introduction|Active-Active Geographical Redundancy Network Configuration Guide Overview|Networks Allocation|IP Addressing|IP Addresses|Network Configurations for Geographical Redundancy in VNF Deployments|Geographical Redundancy without Virtual Routers|Internal Network Configuration|External Networks Configuration|External Networks and IP Addresses|VIP Configuration for External Networks|IP Addresses of External Elements|Gateway Router Configuration|Geographical Redundancy with Virtual Routers|Internal Network Configuration|VIP Networks Configuration|Networks for OSPF v2|VIP Elements|OSPF v2 Areas|Virtual Router Configuration|External Networks Configuration|External Networks and IP Addresses|IP Addresses of External Elements|Gateway Router Configuration|Network Configurations for Geographical Redundancy in PNF Deployments|$|1|2|3|3.1|3.1.1|4|4.1|4.1.1|4.1.2|4.1.2.1|4.1.2.2|4.1.2.3|4.1.3|4.2|4.2.1|4.2.2|4.2.2.1|4.2.2.2|4.2.2.3|4.2.2.4|4.2.3|4.2.3.1|4.2.3.2|4.2.4|5|
|Session Context Exposure Introduction|Session Context Exposure Function|Session Context Exposure Overview|Session Context Collection|Session Context in External Database|Update Session Context Triggered by External System|Automatic Removal of Closed Session Context|Retrieval of IMSI with IP Address Mechanism|Session Context Exposure Operation and Maintenance|Session Context Exposure Configuration|Enable or Disable Session Context Exposure|Configure Automatic Removal of Closed Session Context|Retrieval of IMSI with IP Address|Session Context Retrieval|Retrieval of Session Context from External Database|Retrieval of Session Context from SAPC Internal Database|Session Context Exposure Fault Management|Session Context Exposure Alarms|Session Context Exposure Notifications|Session Context Exposure Error Handling|Session Context Exposure Logging|Restrictions|Reference List|$|1|2|2.1|2.2|2.2.1|2.3|2.4|2.5|3|3.1|3.1.1|3.1.2|3.2|3.3|3.3.1|3.3.2|3.4|3.4.1|3.4.2|3.4.3|3.5|4|5|
|Configure Event-Based Monitoring Overview|Typographic Conventions|Other Conventions|Configuration Prerequisites|Configure EBM Function|Configure EBM Servers|Configure Reporting Events|$|1|1.1|1.2|2|3|4|5|
|Alarm Description|Procedure|Handle Alarm BRM, Auto Export Manual Backup Failed|Handle Reason Authentication Failure|Handle Reason Directory Not Exist|Handle Reason Server Unreachable|Handle Reason Permission Denied|Handle Undetermined Reason|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|
|SAPC VNF Decommissioning Instruction for OpenStack Introduction|How to Decommission the SAPC using ECM|Prerequisites|Procedure|Delete the SAPC Virtual Application|Delete the SAPC Virtual Networks (optional)|How to Decommission the SAPC using Atlas/Director|Prerequisites|Procedure|$|1|2|2.1|2.2|2.2.1|2.2.2|3|3.1|3.2|
|Alarm Description|Procedure|Handle Alarm LOTC Memory Usage|$|1|2|2.1|
|Description|Procedure|Add Virtual IP Address|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm License Management, License Key Not Available|$|1|2|2.1|
|Description|Procedure|Disable Active-Standby Geographical Redundancy|Administrative Procedure|Enable Active-Standby Geographical Redundancy|$|1|2|2.1|2.2|2.3|
|Alarm Description|Procedure|Handle Alarm File Management, Max Size in FileGroup Exceeded|$|1|2|2.1|
|Description|Procedure|Remove Password from User Account|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm DBS, NR, Initial Synchronization Needed|$|1|2|2.1|
|Dynamic Policy Control Introduction|Dynamic Policy Control Function|Dynamic Policy Control Overview|Negotiation of Rx Interface Version and Supported Features|Session Binding|Classification of Dynamic Services|Authorization of Dynamic Services|Qualification of Dynamic Services|Allocation of QoS Information to Dynamic Services|Allocation of Charging Parameters to Dynamic Services|Generation of Dynamic PCC Rules|IP-CAN Session Reauthorization|Notification of Bearer Events to the AF|IP-CAN Session Termination|Service Data Flow Deactivation|Successful Resources Allocation|Network Location Information|Network Location Information in Untrusted WLAN access|Network Location Information Reporting Failure Handling|IP-CAN Type Change Notification|Notification of Signalling Path Status|IMS Related PCC Procedures over Rx|Gating Control|Support for SIP Forking|Single Radio Voice Call Continuity (SRVCC)|Provisioning of AF Signalling Flow Information|Handling of Race Conditions Related to Multiple AF Requests|Delay PCC Rules Installation for AF Sessions with Preliminary Service Information|Extended bandwidth support for EPC supporting Dual Connectivity (E-UTRAN and 5G NR)|Dynamic Policy Control Network Deployments|Dynamic Policy Control Traffic Cases|AF Session Lifetime|AF Session Establishment|AF Session Modification|AF Session Termination|Reauthorization of Dynamic Services|Notification of Bearer Events|Service Data Flow Deactivation|Successful Resources Allocation|Network Location Information (NetLoc)|AF Session Creation or Modification to Add a Media Component|AF Session Modification to Remove a Media Component or Media Subcomponent|AF Session Termination|IP-CAN Session Termination|IP-CAN Bearer Release|Failure Handling of AF Session Creation or Modification|Failure Handling when the PCEF does not Support NetLoc|Failure Handling when the IP-CAN Session does not Support NetLoc|Failure Handling of AF Session Termination|Failure Handling when the PCEF does not Support NetLoc|Failure Handling when the IP-CAN Session does not Support NetLoc|Network Location Information (NetLoc) in Untrusted WLAN Access|AF Session Creation or Modification to Add a Media Component|AF Session Modification to Remove a Media Component or Media Subcomponent|AF Session Termination|IP-CAN Session Termination|IP-CAN Bearer Release|Failure Handling when the AF Session does not support NetLoc in Untrusted WLAN Access|IP-CAN Type Change Notification|Notification of Signalling Path Status|Notification of Release of AF Signalling Path|Notification Due to IP-CAN Session Termination|Cancellation of Subscription to Signalling Path Notification|IMS Related Procedures|SIP Forking|Single Radio Voice Call Continuity|Provisioning of AF Signalling Flow Information|Dynamic Policy Control Triggered by Application Service Detection|Dynamic QoS Control based on Detected Service|Deactivation of IP-CAN Session on Detection of Tethering Traffic|Handling of Race Conditions Related to Multiple AF Requests|Delay PCC Rules Installation for AF Sessions with Preliminary Service Information|Delay installation of PCC rules for a Preliminary AF Session|Reception of a Gx Event for a Preliminary AF Session|Dynamic Policy Control Error Handling|Reference List|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.6.1|2.6.2|2.7|2.8|2.9|2.9.1|2.9.2|2.9.3|2.9.4|2.9.4.1|2.9.4.2|2.9.5|2.9.6|2.10|2.10.1|2.10.2|2.10.3|2.10.4|2.11|2.12|2.13|3|4|4.1|4.1.1|4.1.2|4.1.3|4.2|4.3|4.3.1|4.3.2|4.3.3|4.3.3.1|4.3.3.2|4.3.3.3|4.3.3.4|4.3.3.5|4.3.3.6|4.3.3.6.1|4.3.3.6.2|4.3.3.7|4.3.3.7.1|4.3.3.7.2|4.3.4|4.3.4.1|4.3.4.2|4.3.4.3|4.3.4.4|4.3.4.5|4.3.4.6|4.3.5|4.3.6|4.3.6.1|4.3.6.2|4.3.6.3|4.4|4.4.1|4.4.2|4.4.3|4.5|4.5.1|4.5.2|4.6|4.7|4.7.1|4.7.2|4.8|5|
|Integration in Software Defined Network Introduction|Integration in Software Defined Network Solution Description|Solution Overview|Service Chaining|Use Case: Content Filtering|Restoration Procedures|Network Topology|Interface Description|Operation and Maintenance|Configuration Management|Configuring the subscriber data|Configuring BBSC Peers|Configuring the SOAP Notification Policies|Configuring SOAP Notification Policies for assignSubscriberProfile operation|Configuring SOAP Notification Policies for removeSubscriberProfile operation|Selecting Different BBSCs Depending on Network Topology|Performance Management|Fault Management|Logging|Capabilities|Appendix A. Policy Tags|Reference List|$|1|2|2.1|2.2|2.2.1|2.3|3|4|5|5.1|5.1.1|5.1.2|5.1.3|5.1.3.1|5.1.3.2|5.1.3.3|5.2|5.3|5.4|6|7|8|
|Understanding File Management|Key File Management Concepts|Basic File Management Procedures|Advanced File Management Procedures|Security Management|File Management-Related Alarms|$|1|1.1|2|3|3.1|4|
|Understanding Audit Information|Key Audit Information Concepts|Audit Log|Syslog|Audit Trail|Description of Syslog Entries|Ericsson Command-Line Interface Examples|NETCONF Interface Example|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|
|Introduction|Diameter Measurements|Egress Request Message related Measurements|Egress Answer Message related Measurements|Ingress Request Message related Measurements|Ingress Answer Message related Measurements|Diameter Measurement Object Classes|Measurement Loading for C-Diameter|$|1|2|2.1|2.2|2.3|2.4|3|4|
|$|
|Alarm Description|Procedure|Handle Alarm A Fallback Operation will soon be started|Cancel Upgrade Process|Continue from State WAITING_FOR_COMMIT|Continue from State ACTIVATION_STEP_COMPLETED|$|1|2|2.1|2.2|2.3|2.4|
|SAPC VNF Decommissioning Instruction for VMware Introduction|How to Decommission the SAPC in VMware vCenter using vSphere Client|Prerequisites|Procedure|How to Decommission the SAPC in VMware vCenter using vCloud Director|Prerequisites|Procedure|$|1|2|2.1|2.2|3|3.1|3.2|
|Alarm Description|Procedure|Handle Alarm LOTC Disk Replication Consistency|$|1|2|2.1|
|Description|Procedure|Add Named Virtual IP Address|$|1|2|2.1|
|Description|Procedure|Install License Key File Using the File Protocol|Install License Key File Using the SFTP Protocol|$|1|2|2.1|2.2|
|Description|Procedure|Create SNMPv1 Target|$|1|2|2.1|
|Description|Procedure|Change Login Failure Delay|Remove Login Failure Delay|$|1|2|2.1|2.2|
|Alarm Description|Procedure|Handle Alarm DBS, NR, Redundancy Disabled|$|1|2|2.1|
|Rx Interface Overview|Document Content Conventions|Rx Interface Message Exchange|Diameter Base Protocol Messages|Rx Capability Negotiation|Device Watchdog|Disconnect Peer|Rx Interface Message Format|Rx AA-Request (AAR)|Rx AA-Answer (AAA)|Rx Re-Auth-Request (RAR)|Rx Re-Auth-Answer (RAA)|Rx Abort-Session-Request (ASR)|Rx Abort-Session-Answer (ASA)|Rx Session-Termination-Request (STR)|Rx Session-Termination-Answer (STA)|Rx Interface AVPS|Rx Supported-Features|Media-Component-Description AVP|Flow-Description AVP|Rx Error Handling|Rx Protocol Errors|Rx Application Errors|Reference List|$|1|1.1|2|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|4.8|5|5.1|5.2|5.3|6|6.1|6.2|7|
|Understanding Fault Management|Key Fault Management Concepts|Resolving a Fault Reported by an Alarm|Active Alarm List|Alarm and Alert History|Alarm Information|Meaning of Alarm Severity|Basic Fault Management Procedures|Advanced Fault Management Concepts|SNMP Target|Advanced Fault Management Procedures|$|1|1.1|1.2|1.3|1.4|1.5|1.6|2|3|3.1|4|
|Key Performance Indicators Introduction|Traffic Key Performance Indicators|Gx CCR Failure Ratio|Gx CCR Establishment Failure Ratio|Gx CCR Failure owing to Congestion Ratio|Gx CCR Failure owing to Unable to Comply Ratio|Gx CCR Failure owing to Unknown Session Ratio|Gx CCR Failure owing to Authorization Rejected|Gx CCR Failure owing to Invalid Information Ratio|Gx RAR Failure Ratio|Gx RAR Time-out Ratio|Rx AAR/STR Failure Ratio|Rx AAR/STR Failure owing to Congestion Ratio|Rx AAR Failure owing to Unable to Comply Ratio|Rx AAR Failure owing to Service Not Authorized Ratio|Rx AAR Failure owing to Invalid Information Ratio|Rx AAR Failure owing to Unknown Session Ratio|Rx RAR Failure Ratio|Rx RAR Time-out Ratio|Rx ASR Time-out Ratio|Sy SLR/STR Failure Ratio|Sy SNR Failure owing to Congestion Ratio|Sy SLR/STR Answered with Error Ratio|Sy SNR Failure Ratio|Sy SNR Answered with Error Ratio|Sy SLR Time-out Ratio|Sy STR Time-out Ratio|Smp CCR Failure Ratio|Smp CCR Establishment Failure Ratio|Smp CCR Establishment Failure owing to Congestion Ratio|Sd TSR Failure Ratio|Sd TSR Answered with Error Ratio|Sd TSR Time-out Ratio|Sd RAR Failure Ratio|Sd RAR Time-out Ratio|Sd CCR Failure Ratio|LDAP Search Request Failure Ratio|LDAP Modify Requests Failure Ratio|External Database SOAP Notification Request Failure Ratio|External Database SOAP Notification Request Failure owing to Congestion Ratio|EBM Server Congestion Ratio|Capacity Key Performance Indicators|CPU Load|Memory Use|Subscribers|IP-CAN Mobile Sessions|IP-CAN Fixed Sessions|AF Sessions|Gx Transactions per Second|Rx Transactions per Second|Sy Transactions per Second|Smp Transactions per Second|Sd Transactions per Second|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|2.10|2.11|2.12|2.13|2.14|2.15|2.16|2.17|2.18|2.19|2.20|2.21|2.22|2.23|2.24|2.25|2.26|2.27|2.28|2.29|2.30|2.31|2.32|2.33|2.34|2.35|2.36|2.37|2.38|2.39|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|3.10|3.11|
|Database Access Introduction|Database Access Function|Database Access Function Overview|Supported external databases Technologies|Authenticated Connections to the external database|Data Model Mapping|Entities Relations|Entity Instance Searches|Use of Data to Evaluate Policy Conditions|Write Operations|Data Combinations Use Cases|Subscriber Data|Subscriber Data Extension in External Database|Data Extension in the SAPC internal database|Distributing Same Data in Different Repositories|Mixing Different Types of Repositories for An Application object|Conditions on external database Data Model|Performance Optimizations|LDAP Repositories|Fallback Mechanism for Subscribers in External Databases|Database Access Operation and Maintenance|Configure Entity Data Sources|Configure Keys for Application object Searches|Use of Arguments in Policy Conditions|Data Restrictions|Configure to Write|Configure Fallback for Subscribers|Configure LDAP User Authentication|Configure Use of LDAP Scope, Filter, Alias Dereferencing|Database Access Configuration Examples|Using Functions to Modify the Subscriber Identifier|Configure Extra Data In internal database|LDAP Configuration Examples|New Subscriber Data in an External LDAP Repository|New Entity Stored in an External LDAP Repository|Subscriber Distributed across Several LDAP Repositories|Configure New Entity with Constants|Configure Subscriber Data Extension In the SAPC internal database|Configure Fair usage accumulators for Read and Write|Configure Session Context for Read and Write|Examples of Policy Conditions Using Entity Data Source|Example Using Data Expanding Subscriber|Example Using New Entity|Example Using a Constant|Entity Data Definition Language|Database Access Fault Management|Database Access Alarms|Database Access Notifications|Database Access Logging|Database Access Performance Management|Reference List|$|1|2|2.1|2.2|2.2.1|2.3|2.3.1|2.3.2|2.3.3|2.4|2.5|2.5.1|2.5.1.1|2.5.2|2.5.3|2.5.4|2.5.5|2.6|2.6.1|2.7|3|3.1|3.1.1|3.1.1.1|3.1.2|3.1.3|3.1.4|3.2|3.3|3.4|3.4.1|3.4.2|3.4.3|3.4.3.1|3.4.3.2|3.4.3.3|3.4.4|3.4.5|3.4.6|3.4.7|3.4.8|3.4.8.1|3.4.8.2|3.4.8.3|3.5|3.6|3.6.1|3.6.2|3.7|3.8|4|
|Introduction|Related Information|Key Features of ECLI|ECLI Modes|Start an ECLI Session|Use ECLI Online Features|Static Help|Information Model Help|Context-Sensitive Help|Auto-Completion|Navigate in MIB|Display ME Status|Change ME Configuration|Execute MO Actions|$|1|1.1|1.2|2|3|4|4.1|4.2|4.3|4.4|5|6|7|8|
|Alarm Description|Procedure|Handle Alarm COM SA, AMF Component Cleanup Failed|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm COM SA, AMF Component Instantiation Failed|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm COM SA, AMF SI Unassigned|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm COM SA, CLM Cluster Node Unavailable|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm COM SA, Proxy Status of a Component Changed to Unproxied|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm COM SA, MDF Detected Model Error|$|1|2|2.1|
|SAPC VNF Lifecycle Manager Workflow Instruction for OpenStack Introduction|SAPC VNF Lifecycle Manager Workflow Instruction for OpenStack Overview|SAPC VNF Lifecycle Manager Workflow Instruction for OpenStack Installation|VNF-LCM Preparation for Workflow Installation|Workflow Installation on VNF-LCM|HEAT Workflows|Onboarding|Preconditions|Post-conditions|Workflow Execution|VIM and Tenant Selection|VDP Selection|VNF Descriptor Selection|Non-Interactive REST API Workflow Execution for Onboarding Process|Instantiation|Preconditions|Post-conditions|Post-configuration|Workflow execution|VIM and Tenant Selection|Template File Selection|Injection File Selection|Add Network Topology in ENM/OSS-RC|Enable SSH|Non-Interactive REST API Workflow Execution for Instantiation Process|Scale|Preconditions|Post-conditions|Workflow Execution|Stack Selection|Scale Type Selection|Scale-In: VDP Selection|Non-Interactive REST API Workflow Execution for Scaling Process|Auto-Scale Out|Terminatation|Preconditions|Post-conditions|Workflow Execution|Start Form|Stack Selection|Non-Interactive REST API Workflow Execution for Termination Process|$|1|2|3|3.1|3.2|4|4.1|4.1.1|4.1.2|4.1.3|4.1.3.1|4.1.3.2|4.1.3.3|4.1.4|4.2|4.2.1|4.2.2|4.2.3|4.2.4|4.2.4.1|4.2.4.2|4.2.4.3|4.2.4.4|4.2.4.5|4.2.5|4.3|4.3.1|4.3.2|4.3.3|4.3.3.1|4.3.3.2|4.3.3.2.1|4.3.4|4.3.5|4.4|4.4.1|4.4.2|4.4.3|4.4.3.1|4.4.3.2|4.4.4|
|Description|Procedure|Add Virtual IP Equivalent Source Address|$|1|2|2.1|
|Description|Procedure|View License Information|$|1|2|2.1|
|Description|Procedure|Create SNMPv2C Target|$|1|2|2.1|
|Description|Procedure|Configure SSH Algorithms|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm DBS, NR, Connection Lost|$|1|2|2.1|
|Introduction|Provided Service|Standard Compliance|Client Requirements|FTP over TLS Support|Password Handling|Client Certificates|Client Example: LFTP|Configuration File|$|1|2|2.1|3|3.1|3.2|3.3|4|4.1|
|Availability and Scalability Introduction|Availability and Scalability Function|Availability|Scalability|Availability and Scalability Operational Conditions|Availability and Scalability External Conditions|Availability and Scalability Function Administration|Availability and Scalability Security|Reference List|$|1|2|2.1|2.2|3|3.1|3.2|3.3|4|
|Understanding Security Management for ECLI, NETCONF, and FTP|Key Security Management Concepts|ECLI, NETCONF, and FTP Server IP Address|Session Parameters|SSH Authentication|TLS Authentication|SSH and TLS Transport Protocol Security|Basic Security Management Operations|Configuration Management|$|1|1.1|1.2|1.3|1.4|1.5|1.6|2|3|
|Compatible Network Elements|$|1|
|SAPC PNF Deployment Introduction|SAPC PNF Deployment Overview|SAPC PNF Installation Steps|SAPC PNF Deployment Prerequisites|PNF Deployment Requirements|PNF Deployment Network Requirements|SAPC PNF Deployment Deliverables|Installation for Standalone Deployment|Standalone Deployment Prerequisites|Hardware Requirements|Installation Server Requirements|Software Download|DMX Installation and Configuration|BSP 8100 Installation and Configuration|NSP 6.1 Installation and Configuration|Installation Server Preparation|Host Configuration|Remote Trust Connection|SAPC Deployment|SAPC Status Verification|SAPC Configuration|Performance Management|Hardening during the Installation|Fault Management Configuration|End-User Notifications Configuration|Licenses Configuration|Final Backups|System Data Backup|Emergency Recovery Backup|Installation for Geographical Redundancy Deployment|SAPC PNF Deployment Annex|Creating sapc_vm_CXP9030138.conf File|Modifying the File|$|1|2|2.1|2.2|2.2.1|2.2.2|2.3|3|3.1|3.1.1|3.1.2|3.2|3.3|3.3.1|3.3.2|3.4|3.5|3.5.1|3.6|3.6.1|3.7|3.7.1|3.7.2|3.7.3|3.7.4|3.7.5|3.8|3.8.1|3.8.2|4|5|5.1|5.1.1|
|Description|Procedure|Change NTP Server Address|$|1|2|2.1|
|Description|Procedure|Add Flow Policy|$|1|2|2.1|
|Description|Procedure|Activate Emergency Unlock Mode|$|1|2|2.1|
|Add Active-Standby Geographical Redundancy Description|Add Active-Standby Geographical Redundancy Prerequisites|Add Geographical Redundancy Procedure|Procedure in Mated SAPC (SAPC2)|Procedure in Live SAPC (SAPC1)|Start Mated SAPC (SAPC2) as Standby SAPC|$|1|1.1|2|2.1|2.2|2.3|
|Description|Procedure|Create SNMPv3 Target|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm BRM, Scheduled Backup Failed|$|1|2|2.1|
|Description|Procedure|Configure Legal Notice|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm DBS, NR, Configuration Invalid|Handle Both Clusters Are Configured as Preferred|Handle Peer Cluster's Configured Cluster ID and Used Cluster ID Do Not Match|$|1|2|2.1|2.2|2.3|
|SOAP Notification Interface Overview|SOAP Protocol|SOAP Message Structure|Notification WSDL Data Structures|Envelope XML Elements|Header XML Elements|Body XML Elements|Notification Request Messages|notificationEvent|additionalInformation|ldapAttribute|modificationInformation|affectedLdapAttribute|SOAP Notification Response Messages|SOAP Bindings|SOAP HTTP Request|SOAP HTTP Answer|SOAP Notification Error Handling|XML Schemas and WSDL|SOAP Notification Message Examples|Example of Notification SOAP Request|Example of Successful SOAP Response returned by the SAPC|Example of Erroneous SOAP Response returned by the SAPC|SOAP HTTP Answer Example|Reference List|$|1|2|2.1|3|3.1|3.2|3.3|3.3.1|3.3.1.1|3.3.1.2|3.3.1.2.1|3.3.1.3|3.3.1.3.1|3.3.2|4|4.1|4.2|5|6|7|7.1|7.2|7.3|7.4|8|
|CNOM Overview|$|1|
|Description|Procedure|View Software Information|$|1|2|2.1|
|SAPC VNF Lifecycle Manager Workflow Instruction for VMware Introduction|SAPC VNF Lifecycle Manager Workflow Instruction for VMware Overview|VNF-LCM|Prerequisites|Starting a Workflow|vCloud Director Workflows|Onboarding|Preconditions|Post-conditions|Workflow Execution|Select VDP|Set SAPC Information|Select Adapt Cluster Configuration File|Non-Interactive REST API Workflow Execution|Instantiation|Preconditions|Post-conditions|Post-configuration|Workflow execution|Input Stack Name|Select VDP|Set SAPC Information|Add Network Topology in ENM/OSS-RC|Enable SSH|Non-Interactive REST API Workflow Execution|Scale|Preconditions|Post-conditions|Workflow Execution|Select Scale Type|Select VDP|Set SAPC Information|Non-Interactive REST API Workflow Execution|Auto-Scale Out|Terminate|Preconditions|Post-conditions|Workflow Execution|Start form|Select VDP|Set SAPC Information|Non-Interactive REST API Workflow Execution|$|1|2|2.1|2.2|3|4|4.1|4.1.1|4.1.2|4.1.3|4.1.3.1|4.1.3.2|4.1.3.3|4.1.3.4|4.2|4.2.1|4.2.2|4.2.3|4.2.4|4.2.4.1|4.2.4.2|4.2.4.3|4.2.4.4|4.2.4.5|4.2.4.6|4.3|4.3.1|4.3.2|4.3.3|4.3.3.1|4.3.3.2|4.3.3.3|4.3.3.4|4.3.4|4.4|4.4.1|4.4.2|4.4.3|4.4.3.1|4.4.3.2|4.4.3.3|4.4.3.4|
|Description|Procedure|Change Maximum Transmission Unit Size|$|1|2|2.1|
|Description|Procedure|Deactivate Emergency Unlock Mode|$|1|2|2.1|
|Change Preferred Role in Active-Standby Geographical Redundancy Description|Change Preferred Role in Active-Standby Geographical Redundancy Prerequisites|Change Preferred Role in Active-Standby Geographical Redundancy Procedures|Configure Active SAPC as Preferred|Configure Standby SAPC as Preferred|$|1|1.1|2|2.1|2.2|
|Description|Procedure|Delete SNMP Target|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm BRM, Auto Export Backup Failed|Handle Reason Authentication Failure|Handle Reason Directory Not Exist|Handle Reason Server Unreachable|Handle Reason Permission Denied|Handle Undetermined Reason|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|
|Description|Procedure|Delete Legal Notice|$|1|2|2.1|
|Provisioning REST API Introduction|$|1|
|User Notifications Introduction|User Notification Function|Notification Mechanism|Notification Policies|Events and Conditions Triggering Notifications|Notification Message Text|Notification Messages to Multiple Destinations|Notification Messages Sent to End Users|Notification Messages Sent to External Systems|Notification Message Control|Notification Sending Procedure|Notification Queue Management|Notification Server Connection Management|Connection Error Handling|Load Balancing Mechanism|User Notification Traffic Cases|SMS|SOAP|User Notification Capabilities|User Notification Restrictions|User Notification Security|Reference List|$|1|2|2.1|2.2|2.3|2.4|2.5|2.5.1|2.5.2|2.6|2.7|2.7.1|2.7.2|2.7.3|2.8|3|3.1|3.2|4|5|6|7|
|Flexible Output Protocol Function|Flexible Output Protocol Overview|Flexible Output Policies|Message Transformation Orders|Supported Protocols|Flexible Output Dictionary|Flexible Protocol Configuration|Provision Flexible Output Policies|Command Level|Service Level|Configure Message Transformation Orders|Applying Flexible Output Protocol to a Specific Protocol|Adding an AVP at Command Level|Transformation for Preconfigured PCC Rules|Transformation for Dynamic PCC Rules|Transformation Containing Dynamic Content for AVP Values|Configure Flexible Output Dictionary Syntax|Configuration Examples for Flexible Output Use Cases|Downloading New Operator Specific Subscriber Data|Adding an Unsupported Standard AVP|PCRF-assisted APN selection|Flexible Output Protocol Language Syntax|Configure AVP Values of OctetString Type|Flexible Output Protocol Message Transformation Orders|Transformation Orders: Be as Much Specific as Possible|Transformation and Matching Criteria Specification|Appendix A. Flexible Output Policy Types|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.1.1|2.1.2|2.2|2.2.1|2.2.2|2.2.3|2.2.4|2.2.5|2.3|2.4|2.4.1|2.4.2|2.4.3|3|3.1|3.2|3.2.1|4|5|
|Introduction|General Considerations|Scope, References and Abbreviations|3GPP TS 29.212 Scope|3GPP TS 29.212 References|3GPP TS 29.212 Definitions and Abbreviations|Definitions|Abbreviations|Gx Reference Point|Overview|Gx Reference Model|PCC Rules|PCC Rule Definition|Operations on PCC Rules|4.3a IP Flow Mobility Routing Rules|4.3b Void|4.3c NBIFOM Routing Rules|Functional Elements|PCRF|PCEF|PCC Procedures over Gx Reference Point|Request for PCC Rules|Provisioning of PCC Rules|Selecting a PCC Rule for Uplink IP Packets|Selecting a PCC Rule and IP CAN Bearer for Downlink IP Packets|Gate Function|Policy Enforcement for "Authorized Qos" per PCC Rule|Usage Monitoring Control|Redirect Function|Support for DSCP Marking of Downlink Packets at the TDF|Traffic Steering Control Support|Provisioning of Event Triggers|Provisioning of Charging Related Information for the IP-CAN Session|Provisioning of Charging Addresses|Provisioning of Default Charging Method|Void|Provisioning of Access Network Charging Identifier|Provisioning and Policy Enforcement of Authorized QoS|Policy Enforcement for Authorized QoS per IP CAN Bearer|Policy Provisioning for Authorized QoS per Service Data Flow|Policy Enforcement for Authorized QoS per Service Data Flow|Coordination of Authorized QoS Scopes in Mixed Mode|Provisioning of Authorized QoS per QCI|Policy Enforcement for Authorized QoS per QCI|Provisioning of Authorized QoS per APN|Policy Enforcement for Authorized QoS per APN|Provisioning of Authorized QoS for the Default EPS Bearer|Policy Enforcement for Authorized QoS of the Default EPS Bearer|Provisioning and Enforcement of Time Conditioned Policy Information|Policy Provisioning and Enforcement of Authorized QoS for Service Data Flows that Shall Be Bound to the Default Bearer|Indication of IP-CAN Bearer Termination Implications|Indication of IP-CAN Session Termination|Request of IP-CAN Bearer Termination|Request of IP-CAN Session Termination|Bearer Control Mode Selection|Provisioning of Event Report Indication|PCC Rule Error Handling|Time of the Day Procedures|Trace activation/deactivation|IMS Emergency Session Support|Functional Entities|PCC Procedures for Emergency Services over Gx Reference Point|Request for PCC Rules for Emergency Services|Provisioning of PCC Rules for Emergency Services|Requesting Usage Monitoring Control|Reporting Accumulated Usage|Usage Threshold Reached|PCC Rule Removal|Usage Monitoring Disabled|IP-CAN Session Termination|PCRF Requested Usage Report|Report in case of Monitoring Time Provided|IMS Restoration Support|Multimedia Priority Support|Provisioning of PCC Rules for Multimedia Priority Services|Invocation/Revocation of Priority EPS Bearer Services|Invocation/Revocation of IMS Multimedia Priority Services|Sponsored Data Connectivity|PCRF Failure and Restoration|Reporting Access Network Information|Application Detection Information|Group Communication Service Support|NBIFOM Support|Detection and Handling of Late Arriving Requests|Resource Reservation for Services Sharing Priority|Support for PCC Rule Versioning|3GPP PS Data Off Support|Void|4a Gxx Reference Points|4b Sd Reference Point|4b1 Overview|4b2 Sd Reference Model|4b3 Application Detection and Control Rules|4b3.1 Functional Entities|4b.3.2 Application Detection and Control Rule Definition|4b.3.3 Operations on ADC Rules|4b.4 Functional Elements|4b.4.1 PCRF|4b.4.2 TDF|4b.5 ADC Procedures over Sd Reference Point for Solicited Application Reporting|4b.5.1 Provision of ADC Rules|4b.5.1.1 General|4b.5.1.2 Gate Function|4b.5.1.3 Bandwidth Limitation Function|4b.5.1.4 Redirect Function|4b.5.1.5 Usage Monitoring Control|4b.5.1.6 Marking of Downlink Packets|4b.5.2 Request for ADC Rules|4b.5.3 Provision of Event Triggers|4b.5.4 Request of TDF Session Termination|4b.5.5 ADC Rule Error Handling|4b.5.6 Requesting Usage Monitoring Control|4b.5.7 Reporting Accumulated Usage|4b.5.8 Provision of Event Report Indication|4b.5.9 Application Detection Information|4b.5.10 Time of the Day Procedures|4b.5.11 PCRF Failure Restoration|4b.5.12 Bandwidth Limitation Function|4b.5.13 Provision of Charging Related Information for the TDF Session|4b.5.14 Downlink Packet Marking by the TDF|4b.5.15 Traffic Steering Control Support|4b.5.16 Sponsored Data Connectivity|4b.5a ADC Procedures over Sd Reference Point for Unsolicited Application Reporting|4c St Reference Point|Gx Protocol|Protocol Support|Initialization, Maintenance and Termination of Connection and Session|Gx Specific AVPs|Gx Re-Used AVPs|Use of the Supported-Features AVP on the Gx Reference Point|Flow-Description AVP|Gx Specific Experimental-Result-Code AVP Values|General|Success|Permanent Failures|Transient Failures|Gx Messages|Gx Application|CC-Request (CCR) Command|CC-Answer (CCA) Command|Re-Auth-Request (RAR) Command|Re-Auth-Answer (RAA) Command|5a Gxx Protocols|5b Sd Protocol|5b.1 Protocol Support|5b.2 Initialization, Maintenance and Termination of Connection and Session|5b.3 Sd Specific AVPs|5b.4 Sd Re-Used AVPs|5b.4.1 Use of the Supported-Features AVP on the Sd Reference Point|5b.5 Sd Specific Experimental-Result-Code AVP Values|5b.5.1 General|5b.5.2 Success|5b.5.3 Permanent Failures|5b.5.4 Transient Failures|5b.6 Sd Messages|5b.6.1 Sd Application|5b.6.2 TDF-Session-Request (TSR) Command|5b.6.3 TDF-Session-Answer (TSA) Command|5b.6.4 CC-Request (CCR) Command|5b.6.5 CC-Answer (CCA) Command|5b.6.6 Re-Auth-Request (RAR) Command|5b.6.7 Re-Auth-Answer (RAA) Command|5c St Diameter Protocol|Annex A (Normative): Access Specific Aspects (GPRS)|A.1 Scope|A.2 Reference Model|A.2 Functional Elements|A.2.1 PCRF|A.3 PCC Procedures|A.3.1 Request for PCC Rules|A.3.2 Provisioning of PCC Rules|A.3.2.1 PCC Rule Request for Services not Known to PCRF|A.3.2.2 Selecting a PCC Rule and IP CAN Bearer for Downlink IP Packets|A.3.3 Provisioning and Policy Enforcement of Authorized QoS|A.3.3.0 Overview|A.3.3.1 Provisioning of Authorized QoS per IP CAN Bearer|A.3.3.2 Policy Enforcement for Authorized QoS per IP CAN Bearer|A.3.3.3 Policy Enforcement for Authorized QoS per Service Data Flow|A.3.3.4 Policy Enforcement for Authorized QoS per QCI|A.3.3.5 Void|A.3.3.6 Provisioning of Authorized QoS per APN|A.3.4 Indication of IP-CAN Bearer Termination Implications|A.3.5 Indication of IP-CAN Session Termination|A.3.6 Request of IP-CAN Bearer Termination|A.3.7 Request of IP-CAN Session Termination|A.3.8 Bearer Control Mode Selection|A.3.9 Bearer Binding Mechanism|A.3.10 Void|A.3.11 PCC Rule Error Handling|A.3.12 IMS Emergency Session Support|A.3.12.1 Request of PCC Rules for an Emergency Services|A.3.12.2 Provisioning of PCC Rules for an Emergency services|A.3.13 Removal of PCC Rules for Emergency Services|A.3.14 Removal of PCC Rules at Gx Session Termination|A.3.15 IMS Restoration Support|A.3.16 Provisioning of CSG Information Reporting Indication|A.3.17 Packet-Filter-Usage AVP|A.3.18 Precedence Handling|A.3.19 Reporting Access Network Information|A.3.20 User CSG Information Reporting|A.4 QoS Mapping|A.4.1 GPRS QCI to UMTS QoS Parameter Mapping|A.4.2 GPRS ARP to UMTS ARP Parameter Mapping|Annex B (Normative): Access Specific Aspects, 3GPP (GERAN/UTRAN/E-UTRAN) EPS|B.1 Scope|B.2 Functional Elements|B.2.1 PCRF|B.2.2 PCEF|B.2.3 BBERF|B.3 PCC Procedures|B.3.1 Request for PCC and/or QoS Rules|B.3.2 Provisioning of PCC and/or QoS Rules|B.3.3 Provisioning and Policy Enforcement of Authorized QoS|B.3.3.1 Provisioning of authorized QoS per APN|B.3.3.2 Policy Enforcement for Authorized QoS per APN|B.3.3.3 QoS Handling for Interoperation with Gn/Gp SGSN|B.3.3.4 Void|B.3.3.5 Policy Provisioning for Authorized QoS per Service Data Flow|B.3.3.6 Policy Enforcement for Authorized QoS of the Default EPS Bearer|B.3.4 Packet-Filter-Information AVP|B.3.5 Bearer Control Mode Selection|B.3.6 Trace Activation/Deactivation at P-GW|B.3.7 IMS Restoration Support|B.3.8 Provisioning of CSG Information Reporting Indication|B.3.9 Packet-Filter-Usage AVP|B.3.10 User CSG Information Reporting|B.3.11 Request of IP-CAN Bearer Termination|B.3.12 CS to PS Handover|B.3.13 Precedence Handling|B.3.14 S-GW Restoration Support|B.3.15 Reporting Access Network Information|B.3.16 Presence Reporting Area Information Reporting|B.3.17 Multiple Presence Reporting Area Information Reporting|Annex C (Informative): Mapping Table for Type of Access Networks|Annex D (Normative): Access Specific Aspects (EPC-based Non-3GPP)|D.1 Scope|D.2 EPC-based eHRPD Access|D.2.1 General|D.2.2 Gxa Procedures|D2.2.1 Request for QoS Rules|D.2.2.2 Provisioning of QoS Rules|D.2.2.3 Provisioning and Policy Enforcement of Authorized QoS|D.2.2.3.1 Provisioning of Authorized QoS|D.2.2.3.2 Policy Enforcement for Authorized QoS|D.2.3 Bearer Control Mode Selection|D.2.4 QoS Mapping|D.3 EPC-based Trusted WLAN Access with S2a|D.4 EPC-based Untrusted WLAN Access|Annex E (Normative): Access Specific Aspects, Fixed Broadband Access Interworking with EPC|Annex F (Informative): Disabling/Re-Enabling Usage Monitoring for a PCC/ADC Rule|Annex G (Normative): Access Specific Aspects, Fixed Broadband Access Network Convergence|Annex H (Informative) Policy Control for Remote UEs behind a ProSe UE-to-network Relay UE|Annex I (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|3.3.1|3.3.2|4|4.1|4.2|4.3|4.3.1|4.3.2|4.3.3|4.3.4|4.3.5|4.4|4.4.1|4.4.2|4.5|4.5.1|4.5.2|4.5.2.1|4.5.2.2|4.5.2.3|4.5.2.4|4.5.2.5|4.5.2.6|4.5.2.7|4.5.2.8|4.5.3|4.5.4|4.5.4.1|4.5.4.2|4.5.4.3|4.5.4.4|4.5.5|4.5.5.1|4.5.5.2|4.5.5.3|4.5.5.4|4.5.5.5|4.5.5.6|4.5.5.7|4.5.5.8|4.5.5.9|4.5.5.10|4.5.5.11|4.5.5.12|4.5.6|4.5.7|4.5.8|4.5.9|4.5.10|4.5.11|4.5.12|4.5.13|4.5.14|4.5.15|4.5.15.1|4.5.15.2|4.5.15.2.1|4.5.15.2.2|4.5.16|4.5.17|4.5.17.1|4.5.17.2|4.5.17.3|4.5.17.4|4.5.17.5|4.5.17.6|4.5.18|4.5.19|4.5.19.1|4.5.19.2|4.5.19.3|4.5.20|4.5.21|4.5.22|4.5.23|4.5.24|4.5.25|4.5.26|4.5.27|4.5.28|4.5.29|4.6|4.7|4.8|4.8.1|4.8.2|4.8.3|4.8.3.1|4.8.3.2|4.8.3.3|4.8.4|4.8.4.1|4.8.4.2|4.8.5|4.8.5.1|4.8.5.1.1|4.8.5.1.2|4.8.5.1.3|4.8.5.1.4|4.8.5.1.5|4.8.5.1.6|4.8.5.2|4.8.5.3|4.8.5.4|4.8.5.5|4.8.5.6|4.8.5.7|4.8.5.8|4.8.5.9|4.8.5.10|4.8.5.11|4.8.5.12|4.8.5.13|4.8.5.14|4.8.5.15|4.8.5.16|4.8.6|4.9|5|5.1|5.2|5.3|5.4|5.4.1|5.4.2|5.5|5.5.1|5.5.2|5.5.3|5.5.4|5.6|5.6.1|5.6.2|5.6.3|5.6.4|5.6.5|6|7|7.1|7.2|7.3|7.4|7.4.1|7.5|7.5.1|7.5.2|7.5.3|7.5.4|7.6|7.6.1|7.6.2|7.6.3|7.6.4|7.6.5|7.6.6|7.6.7|8|9|9.1|9.2|9.3|9.3.1|9.4|9.4.1|9.4.2|9.4.2.1|9.4.2.2|9.4.3|9.4.3.1|9.4.3.2|9.4.3.3|9.4.3.4|9.4.3.5|9.4.3.6|9.4.3.7|9.4.4|9.4.5|9.4.6|9.4.7|9.4.8|9.4.9|9.4.10|9.4.11|9.4.12|9.4.12.1|9.4.12.2|9.4.13|9.4.14|9.4.15|9.4.16|9.4.17|9.4.18|9.4.19|9.4.20|9.5|9.5.1|9.5.2|10|10.1|10.2|10.2.1|10.2.2|10.2.3|10.3|10.3.1|10.3.2|10.3.3|10.3.3.1|10.3.3.2|10.3.3.3|10.3.3.4|10.3.3.5|10.3.3.6|10.3.4|10.3.5|10.3.6|10.3.7|10.3.8|10.3.9|10.3.10|10.3.11|10.3.12|10.3.13|10.3.14|10.3.15|10.3.16|10.3.17|11|12|12.1|12.2|12.2.1|12.2.2|12.2.2.1|12.2.2.2|12.2.2.3|12.2.2.3.1|12.2.2.3.2|12.2.2.4|12.2.2.5|12.3|12.4|13|14|15|16|17|18|
|Introduction|General Considerations|Scope, References and Abbreviations|3GPP TS 29.212 Scope|3GPP TS 29.212 References|3GPP TS 29.212 Definitions and Abbreviations|Definitions|Abbreviations|Gx Reference Point|Overview|Gx Reference Model|PCC Rules|PCC Rule Definition|Operations on PCC Rules|4.3a IP Flow Mobility Routing Rules|4.3b Void|4.3c NBIFOM Routing Rules|Functional Elements|PCRF|PCEF|PCC Procedures over Gx Reference Point|Request for PCC Rules|Provisioning of PCC Rules|Selecting a PCC Rule for Uplink IP Packets|Selecting a PCC Rule and IP CAN Bearer for Downlink IP Packets|Gate Function|Policy Enforcement for "Authorized Qos" per PCC Rule|Usage Monitoring Control|Redirect Function|Support for DSCP Marking of Downlink Packets at the TDF|Traffic Steering Control Support|Provisioning of Event Triggers|Provisioning of Charging Related Information for the IP-CAN Session|Provisioning of Charging Addresses|Provisioning of Default Charging Method|Void|Provisioning of Access Network Charging Identifier|Provisioning and Policy Enforcement of Authorized QoS|Policy Enforcement for Authorized QoS per IP CAN Bearer|Policy Provisioning for Authorized QoS per Service Data Flow|Policy Enforcement for Authorized QoS per Service Data Flow|Coordination of Authorized QoS Scopes in Mixed Mode|Provisioning of Authorized QoS per QCI|Policy Enforcement for Authorized QoS per QCI|Provisioning of Authorized QoS per APN|Policy Enforcement for Authorized QoS per APN|Provisioning of Authorized QoS for the Default EPS Bearer|Policy Enforcement for Authorized QoS of the Default EPS Bearer|Provisioning and Enforcement of Time Conditioned Policy Information|Policy Provisioning and Enforcement of Authorized QoS for Service Data Flows that Shall Be Bound to the Default Bearer|Indication of IP-CAN Bearer Termination Implications|Indication of IP-CAN Session Termination|Request of IP-CAN Bearer Termination|Request of IP-CAN Session Termination|Bearer Control Mode Selection|Provisioning of Event Report Indication|PCC Rule Error Handling|Time of the Day Procedures|Trace activation/deactivation|IMS Emergency Session Support|Functional Entities|PCC Procedures for Emergency Services over Gx Reference Point|Request for PCC Rules for Emergency Services|Provisioning of PCC Rules for Emergency Services|Requesting Usage Monitoring Control|Reporting Accumulated Usage|Usage Threshold Reached|PCC Rule Removal|Usage Monitoring Disabled|IP-CAN Session Termination|PCRF Requested Usage Report|Report in case of Monitoring Time Provided|IMS Restoration Support|Multimedia Priority Support|Provisioning of PCC Rules for Multimedia Priority Services|Invocation/Revocation of Priority EPS Bearer Services|Invocation/Revocation of IMS Multimedia Priority Services|Sponsored Data Connectivity|PCRF Failure and Restoration|Reporting Access Network Information|Application Detection Information|Group Communication Service Support|NBIFOM Support|Detection and Handling of Late Arriving Requests|Resource Reservation for Services Sharing Priority|Support for PCC Rule Versioning|3GPP PS Data Off Support|Extended bandwidth support for EPC supporting Dual Connectivity (E-UTRAN and 5G NR)|Void|4a Gxx Reference Points|4b Sd Reference Point|4b1 Overview|4b2 Sd Reference Model|4b3 Application Detection and Control Rules|4b3.1 Functional Entities|4b.3.2 Application Detection and Control Rule Definition|4b.3.3 Operations on ADC Rules|4b.4 Functional Elements|4b.4.1 PCRF|4b.4.2 TDF|4b.5 ADC Procedures over Sd Reference Point for Solicited Application Reporting|4b.5.1 Provision of ADC Rules|4b.5.1.1 General|4b.5.1.2 Gate Function|4b.5.1.3 Bandwidth Limitation Function|4b.5.1.4 Redirect Function|4b.5.1.5 Usage Monitoring Control|4b.5.1.6 Marking of Downlink Packets|4b.5.2 Request for ADC Rules|4b.5.3 Provision of Event Triggers|4b.5.4 Request of TDF Session Termination|4b.5.5 ADC Rule Error Handling|4b.5.6 Requesting Usage Monitoring Control|4b.5.7 Reporting Accumulated Usage|4b.5.8 Provision of Event Report Indication|4b.5.9 Application Detection Information|4b.5.10 Time of the Day Procedures|4b.5.11 PCRF Failure Restoration|4b.5.12 Bandwidth Limitation Function|4b.5.13 Provision of Charging Related Information for the TDF Session|4b.5.14 Downlink Packet Marking by the TDF|4b.5.15 Traffic Steering Control Support|4b.5.16 Sponsored Data Connectivity|4b.5.17 Extended bandwidth support for EPC supporting Dual Connectivity (E-UTRAN and 5G NR)|4b.5a ADC Procedures over Sd Reference Point for Unsolicited Application Reporting|4c St Reference Point|Gx Protocol|Protocol Support|Initialization, Maintenance and Termination of Connection and Session|Gx Specific AVPs|Gx Re-Used AVPs|Use of the Supported-Features AVP on the Gx Reference Point|Flow-Description AVP|Gx Specific Experimental-Result-Code AVP Values|General|Success|Permanent Failures|Transient Failures|Gx Messages|Gx Application|CC-Request (CCR) Command|CC-Answer (CCA) Command|Re-Auth-Request (RAR) Command|Re-Auth-Answer (RAA) Command|5a Gxx Protocols|5b Sd Protocol|5b.1 Protocol Support|5b.2 Initialization, Maintenance and Termination of Connection and Session|5b.3 Sd Specific AVPs|5b.4 Sd Re-Used AVPs|5b.4.1 Use of the Supported-Features AVP on the Sd Reference Point|5b.5 Sd Specific Experimental-Result-Code AVP Values|5b.5.1 General|5b.5.2 Success|5b.5.3 Permanent Failures|5b.5.4 Transient Failures|5b.6 Sd Messages|5b.6.1 Sd Application|5b.6.2 TDF-Session-Request (TSR) Command|5b.6.3 TDF-Session-Answer (TSA) Command|5b.6.4 CC-Request (CCR) Command|5b.6.5 CC-Answer (CCA) Command|5b.6.6 Re-Auth-Request (RAR) Command|5b.6.7 Re-Auth-Answer (RAA) Command|5c St Diameter Protocol|Annex A (Normative): Access Specific Aspects (GPRS)|A.1 Scope|A.2 Reference Model|A.2 Functional Elements|A.2.1 PCRF|A.3 PCC Procedures|A.3.1 Request for PCC Rules|A.3.2 Provisioning of PCC Rules|A.3.2.1 PCC Rule Request for Services not Known to PCRF|A.3.2.2 Selecting a PCC Rule and IP CAN Bearer for Downlink IP Packets|A.3.3 Provisioning and Policy Enforcement of Authorized QoS|A.3.3.0 Overview|A.3.3.1 Provisioning of Authorized QoS per IP CAN Bearer|A.3.3.2 Policy Enforcement for Authorized QoS per IP CAN Bearer|A.3.3.3 Policy Enforcement for Authorized QoS per Service Data Flow|A.3.3.4 Policy Enforcement for Authorized QoS per QCI|A.3.3.5 Void|A.3.3.6 Provisioning of Authorized QoS per APN|A.3.4 Indication of IP-CAN Bearer Termination Implications|A.3.5 Indication of IP-CAN Session Termination|A.3.6 Request of IP-CAN Bearer Termination|A.3.7 Request of IP-CAN Session Termination|A.3.8 Bearer Control Mode Selection|A.3.9 Bearer Binding Mechanism|A.3.10 Void|A.3.11 PCC Rule Error Handling|A.3.12 IMS Emergency Session Support|A.3.12.1 Request of PCC Rules for an Emergency Services|A.3.12.2 Provisioning of PCC Rules for an Emergency services|A.3.13 Removal of PCC Rules for Emergency Services|A.3.14 Removal of PCC Rules at Gx Session Termination|A.3.15 IMS Restoration Support|A.3.16 Provisioning of CSG Information Reporting Indication|A.3.17 Packet-Filter-Usage AVP|A.3.18 Precedence Handling|A.3.19 Reporting Access Network Information|A.3.20 User CSG Information Reporting|A.4 QoS Mapping|A.4.1 GPRS QCI to UMTS QoS Parameter Mapping|A.4.2 GPRS ARP to UMTS ARP Parameter Mapping|Annex B (Normative): Access Specific Aspects, 3GPP (GERAN/UTRAN/E-UTRAN) EPS|B.1 Scope|B.2 Functional Elements|B.2.1 PCRF|B.2.2 PCEF|B.2.3 BBERF|B.3 PCC Procedures|B.3.1 Request for PCC and/or QoS Rules|B.3.2 Provisioning of PCC and/or QoS Rules|B.3.3 Provisioning and Policy Enforcement of Authorized QoS|B.3.3.1 Provisioning of authorized QoS per APN|B.3.3.2 Policy Enforcement for Authorized QoS per APN|B.3.3.3 QoS Handling for Interoperation with Gn/Gp SGSN|B.3.3.4 Void|B.3.3.5 Policy Provisioning for Authorized QoS per Service Data Flow|B.3.3.6 Policy Enforcement for Authorized QoS of the Default EPS Bearer|B.3.4 Packet-Filter-Information AVP|B.3.5 Bearer Control Mode Selection|B.3.6 Trace Activation/Deactivation at P-GW|B.3.7 IMS Restoration Support|B.3.8 Provisioning of CSG Information Reporting Indication|B.3.9 Packet-Filter-Usage AVP|B.3.10 User CSG Information Reporting|B.3.11 Request of IP-CAN Bearer Termination|B.3.12 CS to PS Handover|B.3.13 Precedence Handling|B.3.14 S-GW Restoration Support|B.3.15 Reporting Access Network Information|B.3.16 Presence Reporting Area Information Reporting|B.3.17 Multiple Presence Reporting Area Information Reporting|Annex C (Informative): Mapping Table for Type of Access Networks|Annex D (Normative): Access Specific Aspects (EPC-based Non-3GPP)|D.1 Scope|D.2 EPC-based eHRPD Access|D.2.1 General|D.2.2 Gxa Procedures|D2.2.1 Request for QoS Rules|D.2.2.2 Provisioning of QoS Rules|D.2.2.3 Provisioning and Policy Enforcement of Authorized QoS|D.2.2.3.1 Provisioning of Authorized QoS|D.2.2.3.2 Policy Enforcement for Authorized QoS|D.2.3 Bearer Control Mode Selection|D.2.4 QoS Mapping|D.3 EPC-based Trusted WLAN Access with S2a|D.4 EPC-based Untrusted WLAN Access|Annex E (Normative): Access Specific Aspects, Fixed Broadband Access Interworking with EPC|Annex F (Informative): Disabling/Re-Enabling Usage Monitoring for a PCC/ADC Rule|Annex G (Normative): Access Specific Aspects, Fixed Broadband Access Network Convergence|Annex H (Informative) Policy Control for Remote UEs behind a ProSe UE-to-network Relay UE|Annex I (Informative): Change History|Reference List|$|1|2|3|3.1|3.2|3.3|3.3.1|3.3.2|4|4.1|4.2|4.3|4.3.1|4.3.2|4.3.3|4.3.4|4.3.5|4.4|4.4.1|4.4.2|4.5|4.5.1|4.5.2|4.5.2.1|4.5.2.2|4.5.2.3|4.5.2.4|4.5.2.5|4.5.2.6|4.5.2.7|4.5.2.8|4.5.3|4.5.4|4.5.4.1|4.5.4.2|4.5.4.3|4.5.4.4|4.5.5|4.5.5.1|4.5.5.2|4.5.5.3|4.5.5.4|4.5.5.5|4.5.5.6|4.5.5.7|4.5.5.8|4.5.5.9|4.5.5.10|4.5.5.11|4.5.5.12|4.5.6|4.5.7|4.5.8|4.5.9|4.5.10|4.5.11|4.5.12|4.5.13|4.5.14|4.5.15|4.5.15.1|4.5.15.2|4.5.15.2.1|4.5.15.2.2|4.5.16|4.5.17|4.5.17.1|4.5.17.2|4.5.17.3|4.5.17.4|4.5.17.5|4.5.17.6|4.5.18|4.5.19|4.5.19.1|4.5.19.2|4.5.19.3|4.5.20|4.5.21|4.5.22|4.5.23|4.5.24|4.5.25|4.5.26|4.5.27|4.5.28|4.5.29|4.5.30|4.6|4.7|4.8|4.8.1|4.8.2|4.8.3|4.8.3.1|4.8.3.2|4.8.3.3|4.8.4|4.8.4.1|4.8.4.2|4.8.5|4.8.5.1|4.8.5.1.1|4.8.5.1.2|4.8.5.1.3|4.8.5.1.4|4.8.5.1.5|4.8.5.1.6|4.8.5.2|4.8.5.3|4.8.5.4|4.8.5.5|4.8.5.6|4.8.5.7|4.8.5.8|4.8.5.9|4.8.5.10|4.8.5.11|4.8.5.12|4.8.5.13|4.8.5.14|4.8.5.15|4.8.5.16|4.8.5.17|4.8.6|4.9|5|5.1|5.2|5.3|5.4|5.4.1|5.4.2|5.5|5.5.1|5.5.2|5.5.3|5.5.4|5.6|5.6.1|5.6.2|5.6.3|5.6.4|5.6.5|6|7|7.1|7.2|7.3|7.4|7.4.1|7.5|7.5.1|7.5.2|7.5.3|7.5.4|7.6|7.6.1|7.6.2|7.6.3|7.6.4|7.6.5|7.6.6|7.6.7|8|9|9.1|9.2|9.3|9.3.1|9.4|9.4.1|9.4.2|9.4.2.1|9.4.2.2|9.4.3|9.4.3.1|9.4.3.2|9.4.3.3|9.4.3.4|9.4.3.5|9.4.3.6|9.4.3.7|9.4.4|9.4.5|9.4.6|9.4.7|9.4.8|9.4.9|9.4.10|9.4.11|9.4.12|9.4.12.1|9.4.12.2|9.4.13|9.4.14|9.4.15|9.4.16|9.4.17|9.4.18|9.4.19|9.4.20|9.5|9.5.1|9.5.2|10|10.1|10.2|10.2.1|10.2.2|10.2.3|10.3|10.3.1|10.3.2|10.3.3|10.3.3.1|10.3.3.2|10.3.3.3|10.3.3.4|10.3.3.5|10.3.3.6|10.3.4|10.3.5|10.3.6|10.3.7|10.3.8|10.3.9|10.3.10|10.3.11|10.3.12|10.3.13|10.3.14|10.3.15|10.3.16|10.3.17|11|12|12.1|12.2|12.2.1|12.2.2|12.2.2.1|12.2.2.2|12.2.2.3|12.2.2.3.1|12.2.2.3.2|12.2.2.4|12.2.2.5|12.3|12.4|13|14|15|16|17|18|#######################################################################################3_1f####################################3_1f####################################################################################################################################
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
