|Introduction|Purpose and Scope|Target Groups|Terms|Glossary|Reference List|$|1|1.1|1.2|2|3|4|
|Trademarks Used in Library|$|1|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Overview|Network Security Configuration|Allowed Ports|Switch and Router Configuration for Native Deployment|VM Network Configuration for Virtual and Cloud Deployment|User Management|System Users|Locking Mechanism|User Policies|Password Expiration Policy|Password Strength Policy|Dynamic Activation Users|GUI Users|External GUI Users|Provisioning Clients|General Password Recommendations|Log Files|Configuring Firewall and IPtables Rules|Activating and Deactivating - Native Deployment Only|Custom IPtables Rules - Native Deployment Only|IPtables - Virtual and Cloud Deployment Only|Certificate Handling|Configuring SSL|Privacy|Notice|Consent|Reference List|$|1|1.1|1.2|1.3|2|3|3.1|3.2|3.3|4|4.1|4.1.1|4.1.2|4.1.3|4.1.4|4.2|4.2.1|4.2.2|4.2.3|4.3|5|6|6.1|6.2|6.3|7|7.1|8|8.1|8.2|9|
|Introduction|Prerequisites|Related Information|Revision Information|Preparing to Install LDEwS|Network Configuration|Four or More Switches with TIPC|Installation Media|Updating Cluster Configuration File|Preparing to Install or Upgrade LDEwS with Core MW|Manual Installation of LDEwS|Installing First Control Node|Installing Second Control Node|Installing Payload Nodes|Installing a Single Node System|Automatic installation of LDEwS|Preparing the installation server or the flash media|File structure under tftp root in the installation server|Configuration files|Hooks|Application repository|Interacting with the automatic installation|Installing LDEwS using AIT|Initial installation|Campaign installation|Installing LDEwS with Core MW|Installing BRF Participants|Upgrading LDEwS with Core MW 3.2 or greater (BFU Upgrade)|Upgrading the BRF participant|Upgrading BRF Participant to BRF Script Participant|Upgrading LDEwS with Core MW prior to version 3.2 (non-BFU)|Downgrading LDEwS with Core MW|Upgrading the BRF participant|LDEwS System Recovery via secondary media|Prerequisites|Preparing Installation Repository|Installing LDEwS from Repository|Restoring Application from BRF backup|Adding, Removing, and Replacing a Node|Adding a Second Control Node|Adding Payload Nodes|Removing a Node|Replacing a Node|Backup Restore|Restoring a Backup|Post Installation Activities|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|2.4|2.5|3|3.1|3.2|3.3|3.4|4|4.1|4.2|4.3|4.4|4.5|4.6|5|5.1|5.2|6|6.1|7|7.1|7.2|8|8.1|8.2|9|9.1|9.2|9.3|9.4|10|10.1|10.2|10.3|10.4|11|11.1|12|13|
|Introduction|Typographic Conventions|Prerequisites|Installation Process|Installation|Prerequisites for Installing Dynamic Activation|Installing Software|Installation Verification|Installing HSS Validator Plug-in (Optional)|Creating Administrative Users|SSL Configuration (Optional)|Configurations|Modify Notification Rules (Optional)|Set Initial License Counters|External OpenID Connect Provider Configuration (Optional)|SNMP Configuration|Backup|Update and Rollback|Update Preparations|Update Instructions|All Nodes with Downtime|Node by Node without Downtime|Upgrade LDEwS and Evip|Rollback Instructions|Uninstall|Uninstallation of Software|Reference List|$|1|1.1|1.2|2|3|3.1|3.2|3.2.1|3.2.2|3.2.3|3.2.4|3.2.5|3.2.6|3.2.7|3.2.8|3.3|3.4|4|4.1|4.2|4.2.1|4.2.2|4.2.3|4.3|5|5.1|6|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites|Pre-Upgrade Checklist (Native Deployment)|General Upgrade Information|Hardware Migration|Upgrade Paths|From Native Deployment|From Virtual Multi Activation Deployment|Upgrading from Native Multi Activation 16.0 Using SCXB2, NWI-E, GEP3, and DMX 3.1, to Native Dynamic Activation 1, Keeping the GEP3 Blades|General Upgrade Process|Generate License Key Values|Backup|System Backup|Hardware Configuration Backup|SSL Certificate Backup (Optional)|Upgrade Procedure|Upgrade Preparations|Adapt cluster.conf, and evip.xml for Dynamic Activation 1|BSP 8100 Installation and Configuration|Network Setup Check|Dynamic Activation Upgrade Instructions|Upgrade Cassandra|Creating Administrative Users|Rollback to Multi Activation 16.0 on Native Deployment, using SCXB2, NWI-E, GEP3, and DMX 3.1|Rollback Cassandra|Rollback the Multi Activation Software|Rollback cluster.conf and evip.xml|Hardware Replacement|Health Check|Upgrading from Native Multi Activation 16.0 Using SCXB2, NWI-E, GEP3, and DMX 3.1, to Native Dynamic Activation 1, Upgrading to GEP5 Blades|General Upgrade Process|Migrate/Backup|Migrate/Backup Configuration from existing Multi Activation 16.0 System|System Backup|Hardware Configuration Backup|SSL Certificate Backup (Optional)|Hardware Configuration|CMXB3, SCXB3, and GEP5 Hardware|Software Installation|Restore Configuration|Rollback to Multi Activation 16.0 on Native Deployment, using SCXB2, NWI-E, GEP3 (downgrading from GEP5 to GEP3 Blades), and DMX 3.1|Upgrading from Native Multi Activation 16.0 Using SCXB3, CMXB3, GEP3, and DMX 3.1, to Native Dynamic Activation 1, Keeping the GEP3 Blades|General Upgrade Process|Backup|System Backup|Hardware Configuration Backup|Upgrade Procedure|Upgrade Preparations|Adapt cluster.conf, and evip.xml for Dynamic Activation 1|BSP 8100 Installation and Configuration|Network Setup Check|Dynamic Activation Upgrade Instructions|Upgrade Cassandra|Creating Administrative Users|Rollback to Multi Activation 16.0 on Native Deployment, using SCXB3, CMXB3, GEP3, and DMX 3.1|Rollback Cassandra|Rollback the Multi Activation Software|Rollback cluster.conf and evip.xml|Hardware Replacement|Restore DMX|Health Check|Upgrading from Native Multi Activation 16.0 Using SCXB3, CMXB3, GEP3, and DMX 3.1, to Native Dynamic Activation 1, Upgrading to GEP5 Blades|General Upgrade Process|Migrate/Backup|Migrate/Backup Configuration from existing Multi Activation 16.0 System|System Backup|Hardware Configuration Backup|SSL Certificate Backup (Optional)|Hardware Configuration|CMXB3, SCXB3, and GEP5 Hardware|Software Installation|Restore Configuration|Rollback to Multi Activation 16.0 on Native Deployment, using SCXB3, CMXB3, GEP3 (downgrading from GEP5 to GEP3 Blades), and DMX 3.1|Hardware Replacement|Restore DMX|Upgrading from Native Multi Activation 16.0 Using SCXB3, CMXB3, GEP5, and DMX 3.1, to Native Dynamic Activation 1, Keeping the GEP5 Blades|General Upgrade Process|Backup|System Backup|Hardware Configuration Backup|Upgrade Procedure|Upgrade Preparations|Adapt cluster.conf, and evip.xml for Dynamic Activation 1|BSP 8100 Installation and Configuration|Network Setup Check|Dynamic Activation Upgrade Instructions|Upgrade Cassandra|Creating Administrative Users|Rollback to Multi Activation 16.0 on Native Deployment, using SCXB3, CMXB3, GEP5, and DMX 3.1|Rollback Cassandra|Rollback the Multi Activation Software|Rollback cluster.conf and evip.xml|Hardware Replacement|Restore DMX|Health Check|Upgrading from Native Multi Activation 16.0 Using SCXB3, CMXB3, GEP5, and BSP 8100, to Native Dynamic Activation 1, Keeping the GEP5 Blades|General Upgrade Process|Backup|System Backup|Backup of evip.xml|Upgrade Procedure|Upgrade Preparations|BSP 8100 Upgrade Instructions|Dynamic Activation Upgrade Instructions|Network Setup Check|Upgrade Cassandra|Creating Administrative Users|Rollback to Multi Activation 16.0 on Native Deployment, using SCXB3, CMXB3, GEP5, and BSP 8100|Rollback Cassandra|Rollback the Multi Activation Software|Health Check|Upgrading from Native Multi Activation 16.1 or 16.2 Using SCXB3, CMXB3, GEP3/GEP5, and BSP 8100, to Native Multi Activation 1, Keeping the GEP3/GEP5 Blades|General Upgrade Process|Backup|System Backup|Backup of evip.xml|Upgrade Procedure|Upgrade Preparations|BSP 8100 Upgrade Instructions|Dynamic Activation Upgrade Instructions|Creating Administrative Users|Rollback to Multi Activation 16.1 or 16.2 on Native Deployment, using SCXB3, CMXB3, GEP3/GEP5, and BSP 8100|Health Check|Cassandra Upgrade (Alternative 1)|Cassandra System File-Backup (Optional - Downtime)|Upgrade to Cassandra 2.1.13|Logconsolidation Data Retention|Upgrade Cassandra to Version 2.1.13 (Without Downtime)|Preparation of Upgrade to Cassandra 2.2.5|Logconsolidation Data Retention|Upgrade Cassandra (Without Downtime)|Cassandra Upgrade (Alternative 2)|Remove all Processing Logs in Cassandra|Upgrade Cassandra to Version 2.1.13|Upgrade to Cassandra 2.1.13|Upgrade Cassandra to Cassandra 2.2.5|Upgrade to Cassandra 2.2.5|Rollback Cassandra With Processing Logs Backup|Rollback Cassandra Without Processing Logs Backup|Upgrading from Virtual Multi Activation 16.0, 16.1 or 16.2 to Virtual Dynamic Activation 1|Prerequisites|General Upgrade Process|Upgrade Multi Activation 16.0, 16.1 or 16.2 to Dynamic Activation 1|Data Migration|Upgrade Process|Creating Administrative Users|Upgrading from CEE Multi Activation 16.2 to CEE Dynamic Activation 1|Prerequisites|General Upgrade Process|Upgrade Multi Activation 16.2 to Dynamic Activation 1|Data Migration|Upgrade Process|Creating Administrative Users|Configuration Data Migration|Migrate Configuration|Restore Configuration|CUDB Configuration|Generate Sentinel License Key Values|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.2|2.2.1|2.2.2|3|3.1|3.2|3.3|3.3.1|3.3.2|3.3.3|3.4|3.4.1|3.4.2|3.4.3|3.4.4|3.4.5|3.5|3.6|3.7|3.7.1|3.7.2|3.7.3|3.7.4|3.7.5|4|4.1|4.2|4.2.1|4.2.2|4.2.3|4.2.4|4.3|4.3.1|4.4|4.5|4.6|5|5.1|5.2|5.2.1|5.2.2|5.3|5.3.1|5.3.2|5.3.3|5.3.4|5.3.5|5.4|5.5|5.6|5.6.1|5.6.2|5.6.3|5.6.4|5.6.5|5.6.6|6|6.1|6.2|6.2.1|6.2.2|6.2.3|6.2.4|6.3|6.3.1|6.4|6.5|6.6|6.6.1|6.6.2|7|7.1|7.2|7.2.1|7.2.2|7.3|7.3.1|7.3.2|7.3.3|7.3.4|7.3.5|7.4|7.5|7.6|7.6.1|7.6.2|7.6.3|7.6.4|7.6.5|7.6.6|8|8.1|8.2|8.2.1|8.2.2|8.3|8.3.1|8.3.2|8.3.3|8.4|8.5|8.6|8.7|8.7.1|8.7.2|8.7.3|9|9.1|9.2|9.2.1|9.2.2|9.3|9.3.1|9.3.2|9.3.3|9.4|9.5|9.5.1|10|10.1|10.2|10.2.1|10.2.2|10.3|10.3.1|10.3.2|11|11.1|11.2|11.2.1|11.3|11.3.1|12|13|14|14.1|14.2|14.3|14.3.1|14.3.2|14.3.3|15|15.1|15.2|15.3|15.3.1|15.3.2|15.3.3|16|16.1|16.2|16.3|17|18|
|Introduction|Target Group|Typographic Conventions|Overview|Physical Hardening|Computer Room|System|Software Hardening|Performed Operating System Hardening|Network and IP Traffic Hardening|Possible Additional Hardening Options|Create an LDE Global User|Time-out of SSH Sessions|Set Password Change Minimum Number of Days|Limit Password Reuse|Password Creation Requirement Parameters|Logging Hardening|User Handling|Passwords|Connectivity|MML Interface|CLI/Telnet Interface|Customer Network|Reference List|$|1|1.1|1.2|2|3|3.1|3.2|4|4.1|4.2|5|5.1|5.2|5.3|5.4|5.5|6|7|7.1|8|8.1|8.2|9|10|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|System Information|System Architecture|Dynamic Activation Configurations|Directory Structure|Description of /opt|Description of /var|Description of /cluster|Description of /usr|Log Files|Operating System|Dynamic Activation Application Logs|Ericsson SNMP Agent|Processing Log File Format|Ports|Traffic Ports|Operation and Maintenance Ports|Version Identification|Software Version|BSP Version|Users|System Users|Dynamic Activation Users|Crontab|User Privileges|Administrator in activation Group|Administrator in wheel Group|Operations|Operation Commands|Dynamic Activation Property Configuration|Dynamic Activation System Status|All Nodes Status for 3PP Processes|Single Node Status for 3PP Processes|Status of Dynamic Activation Applications|Status of License Agent|GEP Blade Management|Blade Power Off|Blade Startup|Controlled Blade Reboot|Enabling and Disabling Provisioning Traffic and CAI3G Test Traffic|Enabling and Disabling Provisioning Traffic|Enabling and Disabling CAI3G Test Traffic Ports and Provisioning Traffic|Starting and Stopping|Dynamic Activation Application Processes|Starting and Stopping 3PP Processes|Dynamic Activation Modules|Increasing Startup Time-out|System Checks|Health Check on Dynamic Activation|Network Setup Check|Maintaining SSL Certificates|Changing Timezone|System Administration|eVIP Cluster Configuration Administration|eVIP Configuration File|Login to the eVIP CLI|Logging|Configuring ESA|Alarms|Fault Management Agent|CPU Load Monitoring|Configuring Internal Heartbeat Monitoring|Firewall|Activating and Deactivating|Custom Iptables Rules|DiffServ|Configuring SSL|General Information|Remarks and Deviations|Configuration Instruction|Configuring Authentication Rules of GUI Users|Brute Force Protection Algorithm|View Authentication Parameters|Modify An Authentication Parameter|Restore An Authentication Parameter|License Keys Administration|Requesting New License Key|Installing License Key|Back up License Keys|Restoring a Backup of License Keys|Removing a License Key|Cassandra Administration|Cassandra Data Consistency|Cassandra Performance Monitoring|PC Keys|Installing a PC Key|Rolling Back a PC Key|Processing Log Admin Tool|Using Processing Log Admin Tool|Configuring Processing Log Admin Tool|Daily Export of Processing Logs|Log File Maintenance|Removal of Old Processing Logs|Configuration of the Retained Amount of Processing log days|Configuration of Processing Logs|Configuration of Flat Processing Log Files|Other Log Files|Automatic Queue Cleanup for Resilient Activation|How the Cleanup Function Works|Configure the Cleanup Function|Enabling and Disabling Hostname in CAI3G Error Details|Configuring CAI3G Max Sessions|Configuring MDV Timeout|Synchronization Among Clusters|Verification of Connections|Exchanging SSH Key between Clusters|Forward SSH Key to New Cluster|Exchanging SSH Key When Replacing a Cluster|Update Password for Cluster Synchronization|License Counters Synchronization|Remove Clusters from Synchronization|Dynamic Activation Application Custom Log4j Settings|Deploy Custom Log Settings|Undeploy Custom Log Settings|List Active Custom Log Settings|Asynchronous Request Handler Setting|Configuration of Asynchronous CAI3G 1.2 Interface|Batch Handler Settings|Configuring External OpenID Connect Provider|Pre-request for External OpenID Connect Provider|Setting External OpenID Connect Provider Configuration in Dynamic Activation|Removing External OpenID Connect Provider Configuration|UDC Specific Information|UDC Specific Operations|Installing and Upgrading HSS Validator Plug-in|Uninstalling and Rolling Back HSS Validator Plug-in|UDC Specific System Administration|Activating CLI|Notification Rules File Administration|Error Mapping File Administration|Configuring HTTP Max Connections|Configuration of MML Interface|Configuration of MML over SSH Interface|Configuration of CAI Interface|Configuration of EDIFACT Interface|Load Default NE Groups and Routing Methods|UDC Data Durability|Manual Replay Operation|Operational Instruction in the Event of a Failed Replay Operation|Maintenance Routines|Daily Maintenance|Weekly Maintenance|Monthly Maintenance|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.1.1|2.2|2.2.1|2.2.2|2.2.3|2.2.4|2.3|2.3.1|2.3.2|2.3.3|2.3.4|2.4|2.4.1|2.4.2|2.5|2.5.1|2.5.2|2.6|2.6.1|2.6.2|2.7|3|3.1|3.2|4|4.1|4.2|4.3|4.3.1|4.3.2|4.3.3|4.3.4|4.4|4.4.1|4.4.2|4.5|4.6|4.6.1|4.6.2|4.7|4.7.1|4.7.2|4.7.3|4.7.4|4.8|4.8.1|4.8.2|4.8.3|4.9|5|5.1|5.1.1|5.1.2|5.1.3|5.2|5.2.1|5.2.2|5.2.3|5.2.4|5.3|5.3.1|5.3.2|5.4|5.5|5.5.1|5.5.2|5.5.3|5.6|5.6.1|5.6.2|5.6.3|5.6.4|5.7|5.7.1|5.7.2|5.7.3|5.7.4|5.7.5|5.8|5.8.1|5.8.2|5.9|5.9.1|5.9.2|5.10|5.10.1|5.10.2|5.11|5.12|5.12.1|5.12.2|5.12.3|5.12.4|5.12.5|5.13|5.13.1|5.13.2|5.14|5.15|5.16|5.17|5.17.1|5.17.2|5.17.3|5.17.4|5.17.5|5.17.6|5.17.7|5.18|5.18.1|5.18.2|5.18.3|5.19|5.19.1|5.20|5.21|5.21.1|5.21.2|5.21.3|6|6.1|6.1.1|6.1.2|6.2|6.2.1|6.2.2|6.2.3|6.2.4|6.2.5|6.2.6|6.2.7|6.2.8|6.2.9|6.3|6.3.1|6.3.2|7|7.1|7.2|7.3|8|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Web Service Interface|MOType|MOId|Company|Creating a Company|Deleting a Company|Setting a Company|Getting a Company|OrganizationUnit|Creating an OrganizationUnit|Deleting an OrganizationUnit|Setting an OrganizationUnit|Getting an OrganizationUnit|Users|Creating a User|Deleting a User|Setting a User|Getting a User|Auto Attendant|Creating an Auto Attendant|Deleting an Auto Attendant|Setting an Auto Attendant|Getting an Auto Attendant|Audio Conference|Creating an Audio Conference|Deleting an Audio Conference|Setting an Audio Conference|Getting an Audio Conference|Call Distribution Group|Creating a Call Distribution Group|Deleting a Call Distribution Group|Setting a Call Distribution Group|Getting a Call Distribution Group|Call Barring Profile|Creating a Call Barring Profile|Deleting a Call Barring Profile|Setting a Call Barring Profile|Getting a Call Barring Profile|Connection Profile|Creating a Connection Profile|Deleting a Connection Profile|Setting a Connection Profile|Getting a Connection Profile|BCE File|Deleting a BCE File|Setting a BCE File|Getting a BCE File|Company File|Creating a Company File|Deleting a Company File|Getting a Company File|Error Code|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.3|3.4|4|4.1|4.2|4.3|4.4|5|5.1|5.2|5.3|5.4|6|6.1|6.2|6.3|6.4|7|7.1|7.2|7.3|7.4|8|8.1|8.2|8.3|8.4|9|9.1|9.2|9.3|9.4|10|10.1|10.2|10.3|11|11.1|11.2|11.3|12|13|
|Introduction|Purpose and Scope|In Scope|Out of Scope|Target Groups|Typographic Conventions|Reader&rsquo;s Guideline|Networks|Dual Stack|External Physical Connectivity|Physical and Logical Network Setup|IP Allocation|Load Balancing|Keepalived and HAProxy|Keepalived/HAProxy Router|Real Server|High Availability|Firewall Configuration|Node Configuration|Reference List|$|1|1.1|1.1.1|1.1.2|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.3|4|5|6|7|
|Introduction|Prerequisites|Related Information|Revision Information|System Configuration|Overview|The lde-config and cluster.conf|The Etc-Overlay-Framework|Kickstart Management (for LDEfR)|Overview|Creating Kickstart structure for a blade|Software Configuration (for LDEfS and LDEfR)|Overview|Repository Management|Software Management|Upgrading To New System Version|Software Configuration (for LDEwS)|Adding an Application Package|Removing an Application Package|Upgrading an Application Package|Upgrading an LDEwS Package|Listing Packages|Synchronizing Packages|Activating Packages|User and Group Management|Overview|Adding/Removing/Modifying Users and Groups|Make a User or Group Global|Changing Password|Account and Password Aging|Forced Password Change|Allowing Login Users (for LDEwS)|Login Information|Inactivity Logout|Logging In Remotely|SSH|Backup|Overview|Creating a Backup|Restoring a Backup|Local Snapshot|Overview|Creating a Local Snapshot on LDEfS|Creating a Local Snapshot on LDEwS|Restoring a Local Snapshot on LDEfS|Restoring a Local Snapshot on LDEwS|Delete a Local Snapshot on LDEfS|BRF (for LDEwS)|Reboot|Overview|Reboot a Single blade|Reboot the Whole Cluster|Bypass the BIOS When Rebooting|Power|Overview|Configuration|Power On|Power Off|Power Reset|Power Status|Alarms|Overview|Alarm Status|Configuration Management (for LDEwS)|Example|Cluster tool|Network Services|Listening Services|List Services|SSH server|Preventive Maintenance|System Check|Logs|Copying large files to shared replicated storage|Maintenance Mode|Trouble Reporting|Reference List|$|1|2|3|4|5|5.1|5.2|5.3|6|6.1|6.2|7|7.1|7.2|7.3|7.4|8|8.1|8.2|8.3|8.4|8.5|8.6|8.7|9|9.1|9.2|9.3|9.4|9.5|9.6|9.7|9.8|9.9|10|10.1|11|11.1|11.2|11.3|12|12.1|12.2|12.3|12.4|12.5|12.6|12.7|13|13.1|13.2|13.3|13.4|14|14.1|14.2|14.3|14.4|14.5|14.6|15|15.1|15.2|16|16.1|17|18|18.1|18.2|18.3|19|19.1|19.2|19.3|19.4|19.5|20|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites|General|Logging in|Logging in Using Internal Authentication|Logging in Using External Authentication|Launchpad|Slide-in Navigation Column|User Profile|Resilient Activation Configuration|Asynchronous Control|Configure Functions|CAI3G DC|Create CAI3G DC Routing|Edit CAI3G DC Routing|Delete CAI3G DC Routing|Cluster Strategies|Create Cluster Strategy Instance|Parameters|Edit Cluster Strategy Instance|Delete Cluster Strategy Instance|MO Type and NE Type Mapping|Mapping and Unmapping in Southbound MO Types List|Mapping and Unmapping in Graph|Notification Rule Configuration|Configure Notifications|Management|General|GUI Overview|GUI Icons|Activation Logic Control|Activation Logic|Options|Network Elements Control|Network Elements|Network Element Groups|Routing|System|Licenses|Options|Notification Email Configuration|Synchronize Configuration|Access Control|Users|Policies|Attribute Rules - Restriction Rules|Administration Domains|Walkthroughs Control|Initial Setup|Priority Configuration|Add or Edit a Priority Rule|Delete a Priority Rule|Retry Rule Configuration|Create Retry Rule|Manage Retry Rules|View Retry Rule Details|Change Retry Rule Priority|Edit Retry Rule|Copy Retry Rule|Delete Retry Rule|Asynchronous Request Management|Search by Condition|View Details of the Search Result|Delete Pending Items|Result of Delete Operation|Request Management|Search in Request Queues|Monitor and Manage Sub-requests|Monitoring Operations|View Details of a Sub-Request|Reschedule Expired Sub-requests|Add a Scheduled Retry Job|Manage Scheduled Retry Jobs|Processing Queue|Browser Processing Queues|Manage Processing Queues|Change Status for Selected Sub-requests|Change Status for All Sub-requests|Dashboard|General Settings|Refresh Dashboard|Select Monitoring Period|Choose Widgets|View Statistics Details|Change Table Settings|Northbound Performance|Southbound Performance|User Management|Create a User|Edit a User|Unlock a User|Log Management|Invoke a Log Search|Filter Search|Sort Search|Cancel Search|View Detailed Northbound and Southbound Information|Loose Error Handling Management|Rule Parameters|Adding a Rule|Removing rules|Editing a Rule|Duplicating a Rule|Appendix A - Standard Product Activation Logic|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.1.1|2.1.2|2.2|2.3|2.4|2.5|3|3.1|4|4.1|4.2|4.3|5|5.1|5.1.1|5.2|5.3|6|6.1|6.2|7|7.1|8|8.1|8.1.1|8.1.2|8.2|8.2.1|8.2.2|8.3|8.3.1|8.3.2|8.3.3|8.4|8.4.1|8.4.2|8.4.3|8.4.4|8.5|8.5.1|8.5.2|8.5.3|8.5.4|8.6|8.6.1|9|9.1|9.2|10|10.1|10.2|10.2.1|10.2.2|10.2.3|10.2.4|10.2.5|11|11.1|11.2|11.3|11.3.1|12|12.1|12.2|12.2.1|12.2.2|12.3|12.3.1|12.3.2|13|13.1|13.2|13.2.1|13.2.2|14|14.1|14.1.1|14.1.2|14.1.3|14.1.4|14.1.5|14.2|14.3|15|15.1|15.2|15.3|16|16.1|16.2|16.3|16.4|16.5|17|17.1|17.2|17.3|17.4|17.5|18|19|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites|Tools|GEP Blade Requirement|Blade Replacement|GEP5 Blade Replacement|GEP3 Blade Replacement|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|3|3.1|3.2|4|
|Introduction|Target Group|Typographic Conventions|Dynamic Activation|Embedded Software and Versions|Non-Embedded Software and Versions|Consistency Checker|Embedded Software and Versions|Non-Embedded Software and Versions|Reference List|$|1|1.1|1.2|2|2.1|2.2|3|3.1|3.2|4|
|Introduction|Target Group|Typographic Conventions|Overview|Licenses|Deployments|Redundant Load Sharing Systems|Active-Cold Standby Systems|Load Sharing Systems|Multi Purpose Systems|Setting the Used Capacity Value|Non-Synced System|Synced System|Glossary|Reference List|$|1|1.1|1.2|2|3|4|4.1|4.2|4.3|4.4|5|5.1|5.2|6|7|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Data Type Definitions|Basic Service|Basic Service Group|BSG Identifiers|Applicability of SS to BSGs|CAMEL Profile Data|Supplementary Service|SS Identifiers|Supplementary Information for SS|SUD|RID|SUD|TDP Types and Values|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.2.1|2.2.2|2.3|2.4|2.4.1|2.4.2|2.5|2.5.1|2.5.2|2.6|3|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Northbound Interface Adapter APIs|Northbound|Service List|AlarmService|AuthenticationService|MBeanService|ProcLogService|ProvisionService|NBINotifyService|Data Model|ProcLogEntry|Request|Response|SessionData|Acknowledge|AsyncRequestMetaData|AsyncResponse|Exception|NBIException|NBIExternalException|NBIInternalException|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.2.1|2.2.2|2.2.3|2.2.4|2.2.5|2.2.6|2.3|2.3.1|2.3.2|2.3.3|2.3.4|2.3.5|2.3.6|2.3.7|2.4|2.4.1|2.4.2|2.4.3|3|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Charging System|Overview|AIR Provisioning|Multiple AIR|AF Provisioning|Atomicity and Integrity Handling|Charging and Billing in One Solution Overview|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.2.1|2.3|2.4|3|4|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|General|Administration of Multi Regions|Management of Administration Domains|Use of Administration Domains in Provisioning|Individual Provisioning|Massive Provisioning|Administration of BSS Capacity|Connection Restriction Control|Sustainable Provisioning Throughput Restriction Control|Reference List|$|1|1.1|1.2|1.3|2|3|3.1|3.2|3.2.1|3.2.2|4|4.1|4.2|5|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Namespaces|Legends|Operations|Web Service Interface|MOType|MOId|Create AVGMultiSC|Request Data|Parameters|Examples|Set AVGMultiSC|Request Data|Parameters|Examples|Get AVGMultiSC|Request Data|Parameters|Response Data|Parameters|Examples|Delete AVGMultiSC|Request Data|Parameters|Examples|Faults and Errors|Subordinate AVG Error Codes|CAI3G Error Message Example|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|1.8|1.9|1.10|2|2.1|2.1.1|2.2|3|3.1|3.1.1|3.2|4|4.1|4.1.1|4.2|4.2.1|4.3|5|5.1|5.1.1|5.2|6|6.1|6.2|7|
|Introduction|Purpose and Scope|Target Groups|Prerequisites|Typographic Conventions|Important Release Note|Functional Overview|Concepts|Solution Overview|Designer Studio|Relation to Dynamic Activation System|Key Functions|Data Model Transformation|Execution Plan|Data Integrity|Designer Studio Use Cases|Installing Designer Studio|Configuration|Upgrading Designer Studio|Preparation|Upgrading from Multi Activation 16.0 CP2|Upgrading from Earlier than Multi Activation 16.0 CP2|Install the Latest Version of Designer Studio|Migrate the Service Models Manually|Roll Back to the Previous Version|Updating Southbound Interface|Update for Resource Configuration Services|Update for Off-the-shelf Supported Subscriber Activation Services|Update for Customer Adaptations and Existing Service Models|Preparing Northbound Interface|WSDL and XSD Examples|Configuring a Service Model|Initiate a New Service Model|Add Task to an Operation|Delete or Rename a Task|Assign Parameters for a Task|Slide-in Panel|Parameter Assignment Setting|Parameter Assignment Condition|Define Response for a Task|Define Condition for a Task|Define Error Handling for a Task|Accept Error Codes|Enable Rollback|Error Handling Task|Condition After|Update of Northbound Interface for a Service Model|Service Model Examples|Example FTTH|Example Voice over LTE|Optional Operations|Export a Service Model|Copy, Rename, or Delete a Service Model|Deploying and Undeploying a Service Model|Prerequisites|Deploy a Service Model|Undeploy a Service Model|Service Model Error Response|Verifying a Service Model|Maintenance of Designer Studio|Troubleshooting A Service Model|Clean up Temporary Files|Help Center|Learn More|User Guide|Support|Appendix|Known Limitations and Solutions|Transformation Expression Functions|CONCAT|SUBSTR|CHOICE|LOOKUP|MATCH|SKIP|Reference List|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.2|3.2.1|3.2.2|3.3|3.3.1|3.3.2|3.3.3|4|5|5.1|6|6.1|6.2|6.3|6.3.1|6.3.2|6.4|7|7.1|7.2|7.3|8|8.1|9|9.1|9.2|9.2.1|9.3|9.3.1|9.3.2|9.3.3|9.4|9.5|9.6|9.6.1|9.6.2|9.7|9.7.1|9.8|9.9|9.9.1|9.9.2|10|10.1|10.2|11|11.1|11.2|11.3|12|13|14|14.1|14.2|15|15.1|15.2|15.3|16|16.1|16.2|16.2.1|16.2.2|16.2.3|16.2.4|16.2.5|16.2.6|17|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Supported NEs and Solutions|Installation and Upgrade Information|Installation|System Upgrade|System Expansions|Features to be Phased Out in Future Releases|Highlights in Dynamic Activation 1|Capacity and Limitations|Hardware and Software|Virtualized/Cloud Deployment|Interfaces|Operation|Functions|Customization|Customer Product Information|Glossary|Reference List|$|1|1.1|1.2|1.3|2|3|3.1|3.2|3.3|4|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|6|7|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|PGM Provisioning Solution|Overview|PGM Provisioning|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|3|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Namespaces|Legends|Operations|Web Service Interface|MOType|MOId|Create EPSMultiSC|Request Data|Parameters|Examples|Get EPSMultiSC|Request Data|Parameters|Response Data|Parameters|Examples|Set EPSMultiSC|Request Data|Parameters|Examples|Delete EPSMultiSC|Request Data|Parameters|Example|Faults and Errors|Subordinate EPS Error Codes|CAI3G Error Message Example|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|1.8|1.9|1.10|2|2.1|2.1.1|2.2|3|3.1|3.1.1|3.2|3.2.1|3.3|4|4.1|4.1.1|4.2|5|5.1|5.1.1|5.2|6|6.1|6.2|7|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites|General|Logging in|GUI Overview|Service Visualization|Service Visualization Overview|Filtering of Services|Comparison of Resource Configurations|Restoring a Resource Configuration|Device Management|Management Tab|Configuration Tab|Reconciliation Tab|Candidate Store Tab|Filtering of Devices|Adding a Device|Importing Device Information|Editing Device Information|Exporting Device Information|Deleting a Device|Adding a Configuration to a Device|Filtering Configurations on a Device|Get Initial Configuration of a Device|Comparison of Device Configurations|Restoring a Device Configuration|Loose Error Handling|Feature Models|Feature Models Overview|Importing Model|Exporting Model|Deleting Model|Disabling Model|Enabling Model|Creating or Updating Feature Model Interface|Vendor Templates|XML Vendor Templates|YANG Vendor Templates|Common Operations for XML and YANG Templates|Log Management|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|3|3.1|3.2|3.3|3.4|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|4.8|4.9|4.10|4.11|4.12|4.13|4.14|4.15|4.16|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|6|6.1|6.2|6.3|7|8|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Overview|Data Model DSC/ILF|ILF Provisioning|Subscription|SLFSubscription|WS-Security|Reference List|$|1|1.1|1.2|1.3|2|3|4|4.1|4.2|5|6|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Namespaces|Operations|Web Service Interface|MOType|MOId|Set Subscription|Request Data|Example|Get Subscription|Request Data|Response Data|Example|Set SLFSubscription|Request Data|Example|Get SLFSubscription|Request Data|Response Data|Example|Faults or Errors|Dynamic Activation Internal Errors|Subordinate ILF Error Codes|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|1.8|1.9|2|2.1|2.2|3|3.1|3.2|3.3|4|4.1|4.2|5|5.1|5.2|5.3|6|6.1|6.2|7|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites|General|Get Started|Batch File|Scheme File|Create Batch Job|Batch Job Management|New Batch Jobs|Scheduled Batch Jobs|Running Batch Jobs|Paused Batch Jobs|Finished Batch Jobs|Batch Job Operations|Batch File Management|Upload Batch File|Filter Batch Files|Appendix A - Batch Handler GUI Operations in Log Management|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.1.1|2.1.2|2.1.3|2.2|2.2.1|2.2.2|2.2.3|2.2.4|2.2.5|2.2.6|2.3|2.3.1|2.3.2|3|4|
|Introduction|Target Group|Educational Requirements|Hazard Symbols and Admonitions|Personal Health and Safety Admonitions|Special Hazard Symbols|General Safety Precautions|Electric Shock Hazards|Safety Precautions for Working with Electrical Equipment|Energy Hazards|Batteries|Capacitors and Uninterruptible Power Systems|Safety Precautions for Avoiding Energy Hazards|Fire Hazard|Fire Precautions|Heat Hazards|Mechanical Hazards|Radio Frequency Exposure Hazards|General RF Safety Information|RF Safety for Installation and Maintenance Personnel|Laser Hazards|Class 1 Laser|Class 3 Laser|Chemical Hazards|Beryllium Oxide Hazard|Battery Acid Hazard|Gas Explosion Hazard|Refrigerant Hazard|Other Hazards|Handling Heavy Goods|Working at Height|$|1|1.1|1.2|2|2.1|2.2|3|4|4.1|5|5.1|5.2|5.3|6|6.1|7|8|9|9.1|9.2|10|10.1|10.2|11|11.1|11.2|11.3|11.4|12|12.1|12.2|
|Introduction|Target Group|Educational Requirements|Admonitions and Safety Symbols|Special Hazard Symbols|Batteries|Overheated Batteries|Treating Hazardous Waste from Leaks|Electrical Installation|Safety Precautions for Working with Electrical Installations|Electrostatic Discharge|Handling Printed Board Assemblies and IC Components|Storing and Transporting Printed Board Assemblies and IC Components|Equipment Handling|Ground Connection|Lightning Protection|System, Data, and Traffic Protection|$|1|1.1|1.2|2|2.1|3|3.1|3.2|4|4.1|5|5.1|5.2|6|7|8|9|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Overview|Data Model DAE|Data Model Management|DAE Functionality|DAE Provisioning Functions|DAE Subscription|Device Group Profile|Notifications|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|2.4|2.4.1|2.4.2|2.4.3|3|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites|Namespaces|Legends|Operations|Web Service Interface|MOType|MOId|Create IMSAssociation|Request Data|Parameters|Examples|Get IMSAssociation|Request Data|Parameters|Response Data|Parameters|Examples|Set IMSAssociation|Request Data|Parameters|Examples|Delete IMSAssociation|Request Data|Parameters|Examples|Faults and Errors|Subordinate IMS Error Codes|CAI3G Error Message Example|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|1.8|1.9|1.10|2|2.1|2.1.1|2.2|3|3.1|3.1.1|3.2|3.2.1|3.3|4|4.1|4.1.1|4.2|5|5.1|5.1.1|5.2|6|6.1|6.2|7|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|VoLTE Service Model Overview|VoLTE Decision Service Model|VoLTE Decision Service Model Design Base Projects|VoLTE Execution Service Model|VoLTE Execution Service Model Design Base Project|VoLTE Basic Services Data Model|IMS|MMTel|ENUM|EPS|SAPC|HLR|Preparing for VoLTE Service Model Development|Preparing for CA Development Environment|VoLTE Decision Service Model Development Workflow|VoLTE Execution Service Model Development Workflow|VoLTE Service Model Development|Analyzing the VoLTE Service Model Application|Defining the VoLTE Service Model|Defining the VoLTE Service Model Access Control Model|Initializing the VoLTE Service Model Project|Importing the VoLTE Service Model Design Base Project|Renaming the VoLTE Service Model Design Base Project (Optional)|Handling the VoLTE Decision Service Model Business Operations|Handling CAI3G Data Validation|Handling VoLTE Auto Provisioning Criteria|Handling Concurrent Requests|Mapping Default Service Profiles|Mapping Error Codes|Integrating with UPG (Optional)|Notifying Results|Handling the VoLTE Execution Service Model Business Operations|Handling CAI3G Data Validation|Mapping Request Data|Handling Exceptions|Handling Data Inconsistency|Building and Deployment|Deploying DPHelper JDV|Preparing for CA Package|Installing DPHelper JDV|Uninstalling DPHelper JDV|Deploying and Undeploying a CA Service Model|Configuring Dynamic Activation for VoLTE Provisioning|Configuring NE in Dynamic Activation|Configuring Notification Endpoint in CUDB|Testing and Provisioning over CAI3G|Testing Tools for Sending Requests &ndash; SoapUI|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|2.5|2.5.1|2.5.2|2.5.3|2.5.4|2.5.5|2.5.6|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.4.1|4.4.2|4.5|4.5.1|4.5.2|4.5.3|4.5.4|4.5.5|4.5.6|4.5.7|4.6|4.6.1|4.6.2|4.6.3|4.6.4|5|5.1|5.1.1|5.1.2|5.1.3|5.2|6|6.1|6.2|7|7.1|8|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Overview|Data Model|Validation|Notification|IMSI Changeover|Interfaces|Provisioning Handling|Functions|Create IMSI Changeover|Set IMSI Changeover|Delete IMSI Changeover|Get IMSI Changeover|Create IMSI Changeover Removal|Exceptions|Provisioning Sequences|Impact of Upgrade|MSISDN Changeover|Interfaces|Provisioning Handling|Functions|Create MSISDN Changeover|Exception|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|3|3.1|3.2|3.3|3.3.1|3.3.2|3.3.3|3.3.4|3.3.5|3.4|3.5|3.6|4|4.1|4.2|4.3|4.3.1|4.4|5|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Web Service Interface|MOType|MOId|Voice over Wi-Fi Subscription|Create VoWifiService|Request Data|Response Data|Example|Set VoWifiService|Request Data|Example|Delete VoWifiService|Request Data|Example|NonSIM HSS User Subscription|Create NonSIMHSSUser|Request Data|Example|Set NonSIMHSSUser|Request Data|Example|Delete NonSIMHSSUser|Request Data|Example|HSS ISM Subscription|Create IMPI|Request Data|Example|Delete IMPI|Request Data|Example|Set IMPI|Request Data|Example|Get IMPI|Request Data|Response Data|Example|IPWorks NonSiM AAA User Subscription|Create AAANSDUser|Request Data|Example|Set AAANSDUser|Request Data|Example|Delete AAANSDUser|Request Data|Example|Get AAANSDUser|Request Data|Response Data|Example|Ercisson Certificate Authority Server Subscription|Create ECASCertificate|Request Data|Response Data|Example|Set ECASCertificate|Request Data|Response Data|Example|Delete ECASCertificate|Request Data|Example|Get ECASCertificate|Request Data|Response Data|Example|Error Codes|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|2|2.1|2.1.1|2.1.2|2.1.3|2.2|2.2.1|2.2.2|2.3|2.3.1|2.3.2|3|3.1|3.1.1|3.1.2|3.2|3.2.1|3.2.2|3.3|3.3.1|3.3.2|4|4.1|4.1.1|4.1.2|4.2|4.2.1|4.2.2|4.3|4.3.1|4.3.2|4.4|4.4.1|4.4.2|4.4.3|5|5.1|5.1.1|5.1.2|5.2|5.2.1|5.2.2|5.3|5.3.1|5.3.2|5.4|5.4.1|5.4.2|5.4.3|6|6.1|6.1.1|6.1.2|6.1.3|6.2|6.2.1|6.2.2|6.2.3|6.3|6.3.1|6.3.2|6.4|6.4.1|6.4.2|6.4.3|7|8|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Resource Configuration Overview|Integrating New Features and Devices|Network Configuration|Relation Between Feature Instance and Service Instance|Parameter Assignment of ServiceInstanceId|Feature Models|Model Catalog|Importing New Models|Importing New Templates|Introduction|Importing and Editing Vendor Templates|Format of Vendor Template|Template Header|Globals|Before Section|After Section|Feature|Bindings|XPath|Device Parameter and Credentials|Def|Match|Match All|CLI Commands|Request|Response|Runtime Parameters|NETCONF Commands|Request|Response|Runtime Parameters|SNMP Commands|Request|Response|Runtime Parameters|HTTP Commands|Request|Response|Repeat|Definitions|Vendor Template Definitions|Definition Header|Definition Bindings|Def|Vendor Template Transformers|Transformer Header|Transformer Bindings|Function|Template Functions and Primitives|Naming Conventions|Error Handling|Parameter Bindings|Parsing Output|Matching|Current Configuration|Runtime Parameters|Save Runtime Parameter|Use Runtime Parameter|Importing Devices|Import Device JSON Format|Import Device CSV Format (Deprecated)|Configuring HTTPS Access Point|Additional Parameters|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|3|3.1|4|4.1|4.2|5|5.1|5.2|6|6.1|6.2|6.3|6.4|6.5|6.6|6.6.1|6.6.2|6.6.3|6.6.4|6.6.5|6.7|6.7.1|6.7.2|6.7.3|6.8|6.8.1|6.8.2|6.8.3|6.9|6.9.1|6.9.2|6.9.3|6.10|6.10.1|6.10.2|6.11|6.12|7|7.1|7.2|7.2.1|8|8.1|8.2|8.2.1|9|9.1|9.2|9.2.1|9.3|9.3.1|9.4|9.5|9.5.1|9.5.2|10|10.1|10.2|11|11.1|12|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Overview|Deployment Scenarios|Data Model|Multiple M2M Subscription|M2M Subscription and M2M Service Profile|Other Profiles|Service Associated Data|Provisioning Functions|M2M Profile Management|Initiate an M2M Profile|Print M2M Profiles|Change an M2M Profile|End an M2M Profile|M2M Service Profile Management|Create an M2M Service Profile|Get an M2M Service Profile|Print All M2M Service Profiles|Delete an M2M Service Profile|Modification of an M2M Service Profile|M2M Subscription Management|Create an M2M Subscription|Get an M2M Subscription|Set an M2M Subscription|Delete an M2M Subscription|Multiple M2M Subscription Management|Create a Multiple M2M Subscription|Get a Multiple M2M Subscription|Set a Multiple M2M Subscription|Delete a Multiple M2M Subscription|IMSI Changeover|MSISDN Changeover|Customization|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.2.1|2.2.2|2.2.3|2.2.4|3|3.1|3.1.1|3.1.2|3.1.3|3.1.4|3.2|3.2.1|3.2.2|3.2.3|3.2.4|3.2.5|3.3|3.3.1|3.3.2|3.3.3|3.3.4|3.4|3.4.1|3.4.2|3.4.3|3.4.4|3.5|3.6|4|5|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Communication Protocol|Direct Socket|TELNET|SSL|Ports|Login Procedure|Concurrent Sessions|Concurrent Jobs|About the Commands|Command Syntax|Delimiters|Command Descriptions|Request and Response Flow|Command with File Response|Command with Direct Client Response|Errors|Control Commands|Connect|Cancel|Status|Remove File|Exit|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|3|3.1|3.1.1|3.1.2|3.2|3.2.1|3.2.2|3.2.3|4|4.1|4.2|4.3|4.4|4.5|5|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|MO Namespace|MO Key Attributes|MO Attribute Restrictions|Fault Message|WSDL and XSD Examples|Reference List|$|1|1.1|1.2|1.3|1.4|2|3|4|5|6|7|
|Introduction|Target Group|Typographic Conventions|Dynamic Activation Overview|Mediation|Handling of Customer Service Orders|Data Integrity Assurance|External Connectivity Robustness|Resilient Activation|Ease of BSS/OSS Integration|Single Point of Entry|Decoupling of Network Data Model|Decoupling of Network Topology and Provisioning Needs|Decoupling of Network Element Implementation and Network Element Service|Provisioning Orchestration and Abstraction|Bulk Provisioning|Model Driven Configuration|Off-the-Shelf Support|Adaptability|Visibility of System Status|Execution Environment|Dynamic Activation Execution Environment|Open Execution Environments|Features Deployed on Dynamic Activation Execution Environment|Common Features|NBIA|Asynchronous Request Handler and Scheduling|Model Driven Asynchronous Activation Engine|Batch Handler|Resource Activation Specific Features|Multi-Vendor Network Element Support|Replayer|GSM/UMTS|MNP|VoLTE Auto Provisioning|LTE EPC|M2M|IMS Core|Ericsson SAPC|Multimedia Telephony|Ericsson Equipment Identity Register|IPWorks/AAA|IPWorks/ENUM|DSC/ILF|Charging and CBiO|Wi-Fi Calling for Multi-Device|Resource Configuration Specific Features|Service Visualization|Model Catalog with Feature Models|Vendor Templates|Device Repository|Features Deployed on Open Execution Environment|Designer Studio|Consistency Checker|Solution Scenarios|Resource Activation Provisioning Solution|VoLTE|Revenue Management|Residential Broadband|Quadruple Play|Deployment|Virtualized and Cloud Deployment|Native Deployment|Migration from Classic Multi Activation to Dynamic Activation|Reference List|$|1|1.1|1.2|2|2.1|2.1.1|2.1.2|2.1.3|2.1.4|2.2|2.2.1|2.2.2|2.2.3|2.2.4|2.2.5|2.2.6|2.3|2.4|2.5|2.6|3|3.1|3.2|4|4.1|4.1.1|4.1.2|4.1.3|4.1.4|4.2|4.2.1|4.2.2|4.2.3|4.2.4|4.2.5|4.2.6|4.2.7|4.2.8|4.2.9|4.2.10|4.2.11|4.2.12|4.2.13|4.2.14|4.2.15|4.2.16|4.3|4.3.1|4.3.2|4.3.3|4.3.4|5|5.1|5.2|6|6.1|6.2|6.3|6.4|6.5|7|7.1|7.2|8|9|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|MTAS Provisioning Solution|Overview|Data Model MTAS|MTAS Provisioning|MMTel Subscription Service|MMTel Shared Profile Service|MMTel Service Number Service|MMTel Scheduled Conference Service|SIP Trunking Service|SIP Trunking Referral Service|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|2.3.1|2.3.2|2.3.3|2.3.4|2.3.5|2.3.6|3|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites|Scheduling Procedures|Initiate Scheduled Procedure (PGSPI)|PGSPI Request|Print Scheduled Procedure (PGSPP)|PGSPP Request|PGSPP Result|Change Scheduled Procedure (PGSPC)|PGSPC Request|End Scheduled Procedure (PGSPE)|PGSPE Request|Operations and Procedure Types|LOCATION and HESPLSP|HESPLSP Request|HESPLSP Result File Schema|MMELOCATION and HSSPMLP|HSSPMLP Request|HSSPMLP Result File Schema|Faults or Errors|General CLI Errors|Command Mapped Errors|HLR Errors|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.1.1|2.2|2.2.1|2.2.2|2.3|2.3.1|2.4|2.4.1|3|3.1|3.1.1|3.1.2|3.2|3.2.1|3.2.2|4|4.1|4.2|4.3|5|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|CBiO Solution Integration Overview|Generic EDIFACT Service Model|Northbound|Southbound|Action Service Model|Northbound|Southbound|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.1.1|2.1.2|2.2|2.2.1|2.2.2|3|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|BCE Provisioning Solution|Overview|BCE Provisioning|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|3|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|EIR Conditional Search Commands|Print Cloned Handset Users (EEMSCLP)|EEMSCLP Request|EEMSCLP Result File Schema|Print Equipment (EEMSEQP)|EEMSEQP Request|EEMSEQP Result File Schema|Print Search Order (EEMSSOP)|EEMSSOP Request|EEMSSOP Result File Schema|Print Fixed SIMs (EEMSFSP)|EEMSFSP Request|EEMSFSP Result File Schema|Faults or Errors|General CLI Errors|Command Mapped Errors|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.1.1|2.1.2|2.2|2.2.1|2.2.2|2.3|2.3.1|2.3.2|2.4|2.4.1|2.4.2|3|3.1|3.2|4|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Basic Information|Data Collecting Workflow in Dynamic Activation|CSR Entry Criteria|Mandatory Enclosures for All CSRs|Reference List|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.1.1|4|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|General|Dynamic Activation&ndash; IMS Provisioning|DLA HSS Overview|IMS Data Provisioning in HSS|Overview|Data Model HSS-FE IMS|Handling of Identities|Data Model Management|Atomicity and Integrity Handling|Support CUDB Backup|Hosted Validation|Notification|HSS-FE Provisioning Flow|Provisioning of AVG and IMS|Provisioning AVG Activation Interface|Provisioning IMS Activation Interface|Multiple Administration Area Support for IMS|Enforcement of Subscriber Licensing|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|3|3.1|3.1.1|3.2|3.3|3.4|3.5|3.6|3.7|4|4.1|4.2|4.2.1|5|6|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites|Namespaces|Legends|Operations|Web Service Interface|MOType|MOId|Create Equipment|Request Data|Examples|Get Equipment|Request Data|Response Data|Examples|Set Equipment|Request Data|Examples|Delete Equipment|Request Data|Examples|Create Equipments|Request Data|Examples|Delete Equipments|Request Data|Examples|Create Cloned Handset User|Request Data|Examples|Get Cloned Handset User|Request Data|Response Data|Examples|Set Cloned Handset User|Request Data|Examples|Delete Cloned Handset User|Request Data|Examples|Create Mobile Station|Request Data|Examples|Get Mobile Station|Request Data|Response Data|Examples|Delete Mobile Station|Request Data|Examples|Create Search Order|Request Data|Examples|Get Search Order|Request Data|Response Data|Examples|Set Search Order|Request Data|Examples|Delete Search Order|Request Data|Examples|Get Equipment Status|Request Data|Response Data|Examples|Create Fixed SIM|Request Data|Examples|Get Fixed SIM|Request Data|Response Data|Examples|Delete Fixed SIM|Request Data|Examples|Faults and Errors|Subordinate EIR Error Codes|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|1.8|1.9|1.10|2|2.1|2.2|3|3.1|3.2|3.3|4|4.1|4.2|5|5.1|5.2|6|6.1|6.2|7|7.1|7.2|8|8.1|8.2|9|9.1|9.2|9.3|10|10.1|10.2|11|11.1|11.2|12|12.1|12.2|13|13.1|13.2|13.3|14|14.1|14.2|15|15.1|15.2|16|16.1|16.2|16.3|17|17.1|17.2|18|18.1|18.2|19|19.1|19.2|19.3|20|20.1|20.2|21|21.1|21.2|21.3|22|22.1|22.2|23|23.1|24|
|Introduction|Purpose and Scope|Target Groups|Description of Target Groups|Typographic Conventions|Dynamic Activation Library|Generic Documents|Safety and Environment|Library Overview|Product Overview|Overview|Function Specifications|Planning|Native Deployment|Virtual and Cloud Deployment|Installation|Native Deployment|Initial|System Upgrade and Expansion|Reference|Virtual and Cloud Deployment|Initial|System Upgrade and Expansion|Integration|IDE/Customization|Northbound Interface Adaptation|DUP Migration|OSS/BSS Integration|Operation and Maintenance|Native Deployment|Fault Management|Configuration Management|Security Management|Virtual and Cloud Deployment|Fault Management|Configuration Management|Security Management|Interface|Resource Activation|Overview|Platform|2G 3G|LTE EPC|IMS Core|Policy Control|Multimedia Telephony|Subscriber Services|Charging and CBiO|Wi-Fi Calling|UDC Common Services|Initial Configuration|Integration|Operation and Maintenance|Fault Management|Configuration Management|Interface|2G 3G|LTE EPC|IMS Core|Policy Control|Multimedia Telephony|Subscriber Services|Charging and CBiO|Wi-Fi Calling|UDC Common Services|Resource Configuration|Overview|Integration|Operation and Maintenance|Interface|Consistency Checker|Overview|Installation|Integration|Operation and Maintenance|Designer Studio|Batch Handler|Reference List|$|1|1.1|1.2|1.2.1|1.3|2|2.1|2.1.1|2.1.2|2.1.3|2.1.3.1|2.1.3.2|2.1.4|2.1.4.1|2.1.4.2|2.1.5|2.1.5.1|2.1.5.1.1|2.1.5.1.2|2.1.5.1.3|2.1.5.2|2.1.5.2.1|2.1.5.2.2|2.1.6|2.1.6.1|2.1.6.2|2.1.6.3|2.1.6.4|2.1.7|2.1.7.1|2.1.7.1.1|2.1.7.1.2|2.1.7.1.3|2.1.7.2|2.1.7.2.1|2.1.7.2.2|2.1.7.2.3|2.1.8|2.2|2.2.1|2.2.1.1|2.2.1.2|2.2.1.3|2.2.1.4|2.2.1.5|2.2.1.6|2.2.1.7|2.2.1.8|2.2.1.9|2.2.1.10|2.2.2|2.2.3|2.2.4|2.2.4.1|2.2.4.2|2.2.5|2.2.5.1|2.2.5.2|2.2.5.3|2.2.5.4|2.2.5.5|2.2.5.6|2.2.5.7|2.2.5.8|2.2.5.9|2.3|2.3.1|2.3.2|2.3.3|2.3.4|2.4|2.4.1|2.4.2|2.4.3|2.4.4|2.5|2.6|3|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Overview|Architecture Overview|Service Realization|Network Abstraction|Key Features|Simplified Service Managed by Service Visualization|Network Abstraction Engine Provides Vendor Agnostic Solution|Simplified Integration by Leveraging on A Model Driven Solution|Automatic Generation of Southbound Commands|Fault Tolerant Solution with Automatic Rollback|Efficient Device Configuration Management|Data Synchronization to Remove Data Inconsistencies|Network Abstraction|Network Abstraction Engine|Support for Parallel Commands toward Southbound|Rollback Logic|Model Catalog|Manage Feature Model|Generation of Interface Models|Template Management|XML Template|YANG Templates|Southbound Interfaces|CLI/SSH|CLI/Telnet|NETCONF|HTTP(S)|SNMP|SDN Adapters|Additional Southbound Protocols|Device Management|Device Repository|General Information|Access Points|Managing Devices|Import of Devices|Device Filtering|Management of Device Configuration|Revert to Previous Device Configuration|Candidate Store|Loose Error Handling|Synchronization of Data Models|Configuration Validation|Discovery of Device Configuration|Comparison of Device Configurations|Reconcile Data Repository Inconsistencies|Synchronization of Replaced Devices|Service Realization|Service Visualization|Filtering of Services|Service data in Device Repository|Service Modelling|Service Models|Tasks|Assign Parameters|Dependencies|Rollbacks|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.1.1|2.1.2|2.2|2.2.1|2.2.2|2.2.3|2.2.4|2.2.5|2.2.6|2.2.7|3|3.1|3.1.1|3.1.2|3.2|3.2.1|3.2.2|3.3|3.3.1|3.3.2|3.4|3.4.1|3.4.2|3.4.3|3.4.4|3.4.5|3.4.6|3.4.7|4|4.1|4.1.1|4.1.2|4.2|4.2.1|4.2.2|4.3|4.3.1|4.3.2|4.3.3|4.4|4.4.1|4.4.2|4.4.3|4.4.4|4.4.5|5|5.1|5.1.1|5.1.2|5.2|5.2.1|5.2.2|5.2.3|5.2.4|5.2.5|6|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites|Namespaces|Legends|Operations|Web Service Interface|MOType|MOId|Create AAA User|Request Data|Examples|Get AAA User|Request Data|Response Data|Examples|Set AAA User|Request Data|Examples|Delete AAA User|Request Data|Examples|Create AAA Group|Request Data|Examples|Get AAA Group|Request Data|Response Data|Examples|Set AAA Group|Request Data|Examples|Create AAA Policy|Request Data|Examples|Get AAA Policy|Request Data|Response Data|Examples|Set AAA Policy|Request Data|Examples|Faults and Errors|Subordinate AAA Error Codes|CAI3G Error Message Example|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|1.8|1.9|1.10|2|2.1|2.2|3|3.1|3.2|3.3|4|4.1|4.2|5|5.1|5.2|6|6.1|6.2|7|7.1|7.2|7.3|8|8.1|8.2|9|9.1|9.2|10|10.1|10.2|10.3|11|11.1|11.2|12|12.1|12.2|13|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|DUP Migration Overview|DUP Migration Workflow|Preparing for CA Development Environment|CA DUP Migration|Converting DUP to JDV|MVNE DUP Conversion|SV DUP Conversion|Fixing Grammar Issues and Other Issues|Difference between DUP and Java|Runtime Error|Expand JDV to Support More Functions|API and Primitive Type Support|Error Mapping|Configuration Data Support|Configuration Data Support in Service JDV|Configuration Data Support in Resource JDV|CAI3G Interface Definition|Access Control Support|Special Routing Attribute (Optional)|Loose Error Handling Support (Optional)|CAI3G DC Support|Handling CAI3G DC External Fault|Building and Deploying a CA JDV|Building a CA JDV|Deploying a CA JDV|Undeploying a CA JDV|CA Development for Connector|Preparing for a Connector Project|Creating a Connector Project|Importing Files into a Connector Project|Creating a ConnectorFactory Class|Building and Deploying a CA Connector|Building a CA Connector|Deploying a CA Connector|Undeploying a CA Connector|Configuring Dynamic Activation for CA Provisioning|Testing and Provisioning over CAI3G|Existing JDVs and Connectors Supporting Multiple Versions|CA DUP Migration|Preparing for a JDV Project|Building and Deploying a CA JDV|CA Development for Connector|Preparing for a Connector Project|Building and Deploying a CA Connector|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|3|4|4.1|4.1.1|4.1.2|4.2|4.2.1|4.2.2|4.2.3|4.2.4|4.3|4.4|4.4.1|4.4.2|4.5|4.6|4.7|4.8|4.9|4.9.1|4.10|4.10.1|4.10.2|4.10.3|5|5.1|5.1.1|5.1.2|5.1.3|5.2|5.2.1|5.2.2|5.2.3|6|7|8|8.1|8.1.1|8.1.2|8.2|8.2.1|8.2.2|9|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Software Porting|AS specific deployment descriptors|System property|Java Message Service|Security|Deployment|Logging|Documentation Porting|Glossary|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|2.5|2.6|3|4|5|
|$|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites and Preparations|Hardware and Software Required|Hardware|Software|Documentation|Tools|Conditions|Installation|Hardware Installation|Site Inspection|Site Preparation|Visual Inspection of Mechanical Parts|Installing the Cabinet|Power and Grounding|Cabling and Wiring|Power-on and Check|Final Assembly|Console Access Settings|Installation Tools Preparation|Installation and Configuration|Installing BSP Software|Prepare the EDA Native BSP8100 Config Generator Tool|Accessing Hardware Specific Information|Preparing Deployment Artifacts|BSP Configuration|GEP3 BIOS Settings|LDEwS Installation|GEP3 LDEwS Installation|SNMP Configuration|Dynamic Activation Software Installation|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.1.1|2.1.2|2.2|2.3|2.4|3|3.1|3.1.1|3.1.2|3.1.3|3.1.4|3.1.5|3.1.6|3.1.7|3.1.8|3.1.9|3.2|3.3|3.3.1|3.3.2|3.3.3|3.3.4|3.3.5|3.3.6|3.4|3.4.1|3.5|3.6|4|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Tools|License Prerequisites for Expanding a Dynamic Activation Cluster|Blade Insertion|Expansion of Dynamic Activation Using GEP3 Blades|Expansion - GEP3|Expansion of Dynamic Activation Using GEP 5 Blades|Expansion - GEP5|Reference List|$|1|1.1|1.2|1.3|2|3|4|5|5.1|6|6.1|7|
|Introduction|Target Group|Typographic Conventions|Overview|Physical Hardening|Computer Room|System|Software Hardening|Performed Operating System Hardening|Application Software Hardening|Network and IP Traffic Hardening|Possible Additional Hardening Options|Create a Linux User|Time-out of SSH Sessions|Set Password Change Minimum Number of Days|Password Creation Requirement Parameters|Logging Hardening|User Handling|Passwords|Customer Network|Reference List|$|1|1.1|1.2|2|3|3.1|3.2|4|4.1|4.2|4.3|5|5.1|5.2|5.3|5.4|6|7|7.1|8|9|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites|General Configuration|Configuration for HLR/AUC/MNP/M2M Provisioning|CUDB Configuration|HLR/AUC/MNP/M2M-FE Configuration|Create User|Administration Domain|Enabling of Administration Domain|Create Administration Domains|Assign the Administration Domain to a User|Configuration of Access Capacity|MML Connections|CAI3G Sessions|CSOs Rate Limit|Blocking CUDB for Backup|Activation Logic Properties|Configuration for Massive Change Operation|Configuration for CAI3G Corresponding to MML Family|Configuration for HSS Provisioning|Monolithic HSS/ISM Configuration|Layered HSS Provisioning|CUDB Configuration|HSS Provisioning Notification Configuration|Blocking CUDB for Backup|Creating User|Activation Logic Properties|Configuration for ECAS Provisioning|ECAS Configuration|Creating User|Activation Logics Properties|Configuration for Wi-Fi Calling|Wi-Fi Calling Configuration|Creating User|Activation Logics Properties|IPWorks AAACluster Fault Management|Error Log|Second AAA Inconsistent Data Handling|Configuration for EIR Provisioning|CUDB Configuration|Create User|Activation Logic Properties|Configuration for SAPC Provisioning|Layered SAPC Provisioning Configuration|CUDB Configuration|SAPC-FE Configuration|Create User|Blocking CUDB for Backup|Activation Logic Properties|Monolithic SAPC Provisioning Configuration|NE Configuration|Create User|Activation Logic Properties|Configuration for IPWorks/AAA Provisioning|Monolithic IPWorks/AAA (NSD) Configuration|Layered IPWorks/AAA (NSD) Configuration|CUDB Configuration|Layered IPWorks AAA (NSD)  Notification Configuration|Layered IPWorks/AAA Configuration|Create User|Activation Logic Properties|Monolithic IPWorks AAA (NSD) Properties|Layered IPWorks AAA (NSD) Properties|Layered IPWorks AAA Properties|Layered IPWorks/AAA AVP Configuration|AVP Loading|Configuration for DAE Provisioning|CUDB Configuration|DAE Provisioning Notification Configuration|Create User|Blocking CUDB for Backup|Activation Logic Properties|Configuration for MTAS Provisioning|MTAS Configuration|Create User|Activation Logic Properties|Configuration for BCE Provisioning|BCE Configuration|Create a User|Activation Logic Properties|Configuration for PGM Provisioning|PGM Configuration for Document Service|PGM Configuration for User Service|Create a User|Activation Logic Properties|Configuration for AIR Provisioning|AIR Configuration|Create User|Activation Logic Properties|Configuration for AF Provisioning|AF Configuration|Create User|Activation Logic Properties|Configuration for IPWorks/ENUM Provisioning|Monolithic IPWorks/ENUM Configuration|Layered IPWorks/ENUM Configuration|Create User|Activation Logic Properties|Configuration for DSC/ILF Provisioning|DSC/ILF Configuration|Create User|CUDB Configuration|Activation Logic Properties|Front End Configuration|Provisioning Notification NE Configuration|Standalone NE Configuration|Routing Configuration|Connection Robustness|Individual Provisioning of HLR Subscription in CUDB|Individual Provisioning of HLR Subscription in CUDB with Long Retry Time Interval|HLR Massive Update|Configuration of Network Element Retry|Configuration of Network Element Group Retry|Users|CUDB Blocking for Backup|Reference List|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.2|3.3|3.4|3.4.1|3.4.2|3.4.3|3.5|3.5.1|3.5.2|3.5.3|3.6|3.7|3.8|3.9|4|4.1|4.2|4.2.1|4.2.2|4.2.3|4.3|4.4|5|5.1|5.2|5.3|6|6.1|6.2|6.3|6.4|6.4.1|6.4.2|7|7.1|7.2|7.3|8|8.1|8.1.1|8.1.2|8.1.3|8.1.4|8.1.5|8.2|8.2.1|8.2.2|8.2.3|9|9.1|9.2|9.2.1|9.2.2|9.3|9.4|9.5|9.5.1|9.5.2|9.5.3|9.6|9.6.1|10|10.1|10.2|10.3|10.4|10.5|11|11.1|11.2|11.3|12|12.1|12.2|12.3|13|13.1|13.2|13.3|13.4|14|14.1|14.2|14.3|15|15.1|15.1.1|15.1.2|16|16.1|16.2|16.3|16.4|17|17.1|17.2|18|18.1|19|20|21|22|23|23.1|23.2|23.3|23.4|23.5|24|25|26|
|Introduction|Prerequisites|Connect Cluster to External Data Communication Networks|Containment of VIP Addresses|Front End|Interlink Networks|Configure eVIP with OSPF|OSPF between Cluster and eVIP Gateway Router|OSPF Supervision|OSPF Areas to Cluster|FEE Interface|FEE and OSPF Router ID|Configure eVIP with Static Routing and BFD|Interworking Rules, Recommendations, and Limitations|Rules|Recommendations|Limitation|eVIP Gateway Router to DCN|Examples of Networks with L2 Switches|$|1|1.1|2|2.1|2.2|2.3|3|3.1|3.2|3.3|3.4|3.5|4|5|5.1|5.2|5.3|6|7|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Web Service Interface|MOType|MOId|Document|Creating a Document|Deleting a Document|Setting a Document|Getting a Document|User|Deleting a User|Error Code|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|2|2.1|2.2|2.3|2.4|3|3.1|4|5|
|Introduction|Purpose and Scope|In Scope|Out of Scope|Target Groups|Typographic Conventions|Reader&rsquo;s Guideline|System Naming|Switches|Routers|Port Definitions|Networks|External Physical Connectivity|External Connectivity L2|External Connectivity L3|IP Subnet Allocation|IP Connectivity|IP Address Assignments|Backplane|Boot Network|OSPF Backbone|PG_PROV_SP1|PG_OM_SP2|Network Equipment|VLAN Design|SCX-0-0|SCX-0-25|CMX-0-26 VRRP|CMX-0-28 VRRP|CMX-0-26 BFD|CMX-0-28 BFD|Static Routing|Static Routing BFD CMX-0-26|Static Routing BFD CMX-0-28|Static Routing VRRP CMX-0-26|Static Routing VRRP CMX-0-28|Dynamic Routing|OSPF Area 0.0.0.0|OSPF Stub Area 10.0.0.5: VIP Traffic|OSPF Stub Area 10.0.0.4: VIP OAM|Example Configurations for External IP Addresses|External Addresses in VRRP Setup|External Addresses in BFD Setup|External Addresses in VRRP and BFD Setup|Firewall Configuration|Files for Installation and Configuration|eVIP Configuration|eVIP Configuration for VIP-TRAFFIC|eVIP Configuration for VIP-OAM|Network Figures|Internal Network Backplane|VIP Traffic VRRP|VIP OAM VRRP|VIP Traffic BFD|VIP OAM BFD|BFD Routing Principle|PG_OM_SP1 Tenant Setup|BSP_NBI Network|VLANS and Ports, Overview|Reference List|$|1|1.1|1.1.1|1.1.2|1.2|1.3|1.4|1.5|1.5.1|1.5.2|1.5.3|2|2.1|2.2|2.3|2.4|3|3.1|3.1.1|3.1.2|3.1.3|3.1.4|3.1.5|4|4.1|4.1.1|4.1.2|4.1.3|4.1.4|4.1.5|4.1.6|4.2|4.2.1|4.2.2|4.2.3|4.2.4|4.3|4.3.1|4.3.2|4.3.3|5|5.1|5.2|5.3|6|7|7.1|7.1.1|7.1.2|8|8.1|8.2|8.3|8.4|8.5|8.6|8.7|8.8|9|10|
|Introduction|Terminology|Notational Conventions|CAI3G Overview|CAI3G Web Service|Namespace|Synchronous Interface|Protocol Stack|SOAP|SOAP Message Exchange Model|SOAP Document Style|CAI3G Operations|Interface Data Model|MO Attributes|CAI3G Operation|Session Control Service|LOGIN Command|LOGOUT Command|Provisioning Service|CREATE Operation|GET Operation|SET Operation|DELETE Operation|SEARCH Operation|Notification Service|Subscribe Operation|Notify Operation|Unsubscribe Operation|Response and Fault Handling|Headerfault|CAI3G Fault Details|CAI3G Parameter|MOType|MOId|MO Attributes|Simple Parameter|Structured Parameter|Sub-object Parameter|Extension|Leaf Attributes|MO Schema File|CAI3G Integration|Version Control|CAI3G|CAI3G MO|Transaction Support|Security Considerations|Request Tracing Support|Appendix A (CAI3G Rule Description)|Rules|Recommendations|Appendix B (CAI3G Services WSDL Files)|Appendix C (Example of SOAP Message)|Appendix D (Development Instruction)|Development Process of CAI3G Server|Development Process of CAI3G Client|Appendix E (Change History)|Glossary|Reference List|$|1|1.1|1.2|2|2.1|2.2|2.3|3|3.1|3.1.1|3.1.2|3.2|3.3|3.4|4|4.1|4.1.1|4.1.2|4.2|4.2.1|4.2.2|4.2.3|4.2.4|4.2.5|4.3|4.3.1|4.3.2|4.3.3|4.4|4.4.1|4.4.2|5|5.1|5.2|5.3|5.3.1|5.3.2|5.3.3|5.4|5.5|5.6|6|7|7.1|7.2|8|9|10|11|11.1|11.2|12|13|14|14.1|14.2|15|16|17|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Backing Up and Restoring BSP Configuration|Dynamic Activation Backup and Restore|Scenario Mapping for Full System Backup|Scenario Mapping for Full System Restore|Backing Up and Restoring a Cluster LDEwS NFS|Backing Up a Cluster LDEwS NFS|Restoring a Cluster LDEwS NFS|Backing Up and Restoring Dynamic Activation NFS Specific Files|Backing Up NFS Specific Files|Restoring NFS Specific Files|Backing Up and Restoring Zookeeper|Backing Up Zookeeper|Restoring Zookeeper|Backing Up and Restoring Cassandra (OAuth Related Data)|Backing Up Cassandra|Restoring Cassandra|Reference List|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.2|3.3|3.3.1|3.3.2|3.4|3.4.1|3.4.2|3.5|3.5.1|3.5.2|3.6|3.6.1|3.6.2|4|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites|Data Type|Utilities Functions|ServiceContext|ResourceContext|RoutingUtils.registerNeTypes|TriggerMoRegister.addTriggerMoMapping|Cai3gMoMapping.unmarshallToMoBean|JAXBUtils.bean2Xml|DU Class|isDefined|IsOptional|SizeOf|Clear|DUString Class|checkString (Deprecated)|checkStr|convert2LowerCases|convert2UpperCases|currentTime|doubleQuote|findByTag|matchEre, getEreSubPattern, and undefineEre|getLine and removeFirstLine|int2str|length|matchRe|newline|readUntilFirstOfSeparators|readUntilRealToken|readUntilToken|replaceChar|replaceString|str2int|strip|subString|subStringByPos|NamedValue Class|print|newNamedValue|copy|delete|addValue|getValue|setValue|removeValue|getName|setName|addAttribute|getAttribute|setAttribute|attributes|getAttributeAt|addDu|get|getWithAttributes|entries|getAt|convert2ASN1|convert2Nv|buildFromString|convert2String|appendNamedValue|equal|ServiceLayer Class|process|lookup|ResourceLayer Class|doNeOperation|doNeRetrieveOperation|ResourceLayerGenerator Class|getFirstNamedValue|getFirstSubNamedValue|getNextNamedValue|getNextSubNamedValue|getValueWithName|ResourceLayerParser Class|setValue|setWholeNv|ConfigData Class|get|ConfigDataResourceLayer Class|get|Error Class|setCaiError|getCaiError|externalError|FDSStandardException|setErrorCode|getErrorCode|setReason|getReason|setHint|getHint|toJDVException|toFDSException|Misc Class|exIsDefined|Build Class|convertToCai3g12Request|convertToCai3gRequest|Reference List|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.2|3.3|3.4|3.5|3.6|4|4.1|4.2|4.3|4.4|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|5.9|5.10|5.11|5.12|5.13|5.14|5.15|5.16|5.17|5.18|5.19|5.20|5.21|5.22|6|6.1|6.2|6.3|6.4|6.5|6.6|6.7|6.8|6.9|6.10|6.11|6.12|6.13|6.14|6.15|6.16|6.17|6.18|6.19|6.20|6.21|6.22|6.23|6.24|6.25|6.26|7|7.1|7.2|8|8.1|8.2|9|9.1|9.2|9.3|9.4|9.5|10|10.1|10.2|11|11.1|12|12.1|13|13.1|13.2|13.3|14|14.1|14.2|14.3|14.4|14.5|14.6|14.7|14.8|15|15.1|16|16.1|16.2|17|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Requirements on Virtual and Cloud Infrastructure|Host CPU Requirements|Generic Requirements|Block Storage / Ephemeral Storage|vNICs|External Access|L2 Redundancy|L3 Redundancy|IP Address Allocation|Latency|Packet Loss|Dimensioning|Supported Virtualized and Cloud Infrastructure|KVM|VMWare|ECEE|OpenStack|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.2.1|2.2.2|2.2.3|2.2.4|2.2.5|2.2.6|2.2.7|2.2.8|2.2.9|2.3|2.3.1|2.3.2|2.3.3|2.3.4|3|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|VoLTE Solution Overview|VoLTE Provisioning Architecture|VoLTE Provisioning Data Model|VoLTE Provisioning Interface|Notification|Northbound Interface|Southbound Interface|VoLTE Provisioning Use Cases|Rollback|Create a VoLTE Subscription|Auto Provisioning|Initiate|Upgrade|Set a VoLTE Subscription|Get a VoLTE Subscription|Delete a VoLTE Subscription|Tools|License|Reference List|$|1|1.1|1.2|1.3|2|3|4|5|5.1|5.2|5.3|6|6.1|6.2|6.2.1|6.2.2|6.2.3|6.3|6.4|6.5|7|8|9|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|IPWorks/ENUM Provisioning Function|Overview|Data Model ENUM|Atomicity and Integrity Handling|Layered IPWorks/ENUM|Monolithic IPWorks/ENUM|IPWorks/ENUM Provisioning|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|2.3.1|2.3.2|2.4|3|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites|Namespaces|Legends|Operations|Web Service Interface|MOType|MOId|Create SAPC Subscription|Request Data|Examples|Get SAPC Subscription|Request Data|Response Data|Examples|Set SAPC Subscription|Request Data|Examples|Delete SAPC Subscription|Request Data|Examples|Create SAPC Family|Request Data|Examples|Get SAPC Family|Request Data|Response Data|Examples|Set SAPC Family|Request Data|Examples|Delete SAPC Family|Request Data|Examples|Create Data Plan|Request Data|Examples|Get Data Plan|Request Data|Response Data|Examples|Set Data Plan|Request Data|Examples|Delete Data Plan|Request Data|Examples|Faults and Errors|Subordinate SAPC Error Codes|CAI3G Error Message Example|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|1.8|1.9|1.10|2|2.1|2.2|3|3.1|3.2|3.3|4|4.1|4.2|5|5.1|5.2|6|6.1|6.2|7|7.1|7.2|7.3|8|8.1|8.2|9|9.1|9.2|10|10.1|10.2|11|11.1|11.2|11.3|12|12.1|12.2|13|13.1|13.2|14|14.1|14.2|15|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Overview|Northbound Adapters|Service Realization|Network Abstraction and Network Implementation|Model Driven Configuration|Java Business Logic|Southbound Adapters|Platform Function|Reference List|$|1|1.1|1.2|1.3|2|3|4|5|5.1|5.2|6|7|8|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Functional Overview|Consistency Checker Interfaces|Data Analysis Process|Data Collection|Analysis|Post-processing|Analysis Functions|Pattern Based Analysis|Rule Based Analysis|Offline Rule Based Analysis|Real Time Rule Based Analysis|Two Steps Analysis|Deployment|Logical Architecture|Integration|Operation and Maintenance|Security|Vocabulary|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.2.1|2.2.2|2.2.3|3|3.1|3.2|3.2.1|3.2.2|3.2.3|4|5|6|7|8|9|10|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Layered AAA Conditional Search Commands|Print AAA Users (AAMSUIP)|AAMSUIP Request|AAMSUIP Result File Schema|Print AAA Groups (AAMSUGP)|AAMSUGP Request|AAMSUGP Result File Schema|Print AAA Policies (AAMSUPP)|AAMSUPP Request|AAMSUPP Result File Schema|AAA Massive Update Commands|End Group (AAMSUGE)|AAMSUGE Request|AAMSUGE Result File Schema|End Policy (AAMSUPE)|AAMSUPE Request|AAMSUPE Result File Schema|Faults or Errors|General CLI Errors|Command Mapped Errors|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.1.1|2.1.2|2.2|2.2.1|2.2.2|2.3|2.3.1|2.3.2|3|3.1|3.1.1|3.1.2|3.2|3.2.1|3.2.2|4|4.1|4.2|5|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Multi Service Common Data Provisioning Solution|Overview|Multi Service Common Data Provisioning|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|3|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites|Namespaces|Legends|Operations|Web Service Interface|MOType|MOId|Create Subscription|Request Data|Examples|Get Subscription|Request Data|Response Data|Examples|Set Subscription|Request Data|Examples|Delete Subscription|Request Data|Examples|Create Device Group Profile|Request Data|Examples|Get Device Group Profile|Request Data|Response Data|Examples|Set Device Group Profile|Request Data|Examples|Delete Device Group Profile|Request Data|Examples|Faults and Errors|Subordinate DAE Error Codes|CAI3G Error Message Example|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|1.8|1.9|1.10|2|2.1|2.2|3|3.1|3.2|3.3|4|4.1|4.2|5|5.1|5.2|6|6.1|6.2|7|7.1|7.2|7.3|8|8.1|8.2|9|9.1|9.2|10|10.1|10.2|11|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Layered AAA NSD Provisioning Solution|Overview|Data Model AAA NSD|Atomicity and Integrity Handling|Notification|AAA NSD Provisioning Flow|AAA NSD Provisioning|AAA NSD User|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|2.4|2.5|3|3.1|4|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Response Types|Namespaces|Multiple Values|GPRS Profile|Change GPRS Profile|Print GPRS Profile|GSM Service Control Function Profile|Initiate GSM Service Control Function Profile|Print GSM Service Control Function Profile|Change GSM Service Control Function Profile|End GSM Service Control Function|M2M Profile|Initiate M2M Profile|Print M2M Profile|Change M2M Profile|End M2M Profile|M2M Service Profile|Print M2M Service Profile|End M2M Service Profile|Faults or Errors|General CLI Errors|Command Mapped Errors|HLR Errors|Appendix - HLR Classic and HLR-FE Layered Incompatibilities|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|2|2.1|2.2|3|3.1|3.2|3.3|3.4|4|4.1|4.2|4.3|4.4|5|5.1|5.2|6|6.1|6.2|6.3|7|8|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites|CAI Overview|General|Communication Protocol|General|Transport and Network Layer|Direct Socket Communication|Telnet|Session and Presentation Layer|Opening a Session|Closing a Session|Ending a Session|Message Formats|Character Representation|Examples|Message Request Format|Message Response Format|Control Commands|Login|Request Syntax|Response Syntax|Examples|Logout|Request Syntax|Response Syntax|Examples|Message Response|HLR Subscription|Composite Parameter Definitions|Customer Service Orders (CSO)|Subscriber Data|Profiles|Additional MSISDN|CAMEL|Closed User Groups|Mobility Management Related IN Triggering|Remove References of IMSI Changeover|GPRS|Gateway Mobile Location Center (GMLC) Address|Location Services (LOCSERVICES)|Spatial Trigger Support (SPATIALTRIGGER)|SMS Spam Control|Multiple SIM|Request and Response Parameters|HLR GPRS Quality of Service Parameters|HLR Message Waiting Parameters|HLR Subscriber Data Abbreviations|Bearer Services|Tele Services|Barring Services|Call Forwarding Services|Line Identification Services|Operator Determined barring Services|Subscription Options|Closed User Groups|CAMEL|GPRS Services|Location Print Services|GMLC Address|Location Services (LOCSERVICES)|Supplementary Service Groups|Others|HLRSUB Message Response|MNP Subscription|Customer Service Orders|NPSUB|FNSUB|Request and Response Parameters|NP Subscription Parameters|FN Subscription Parameters|MNP Subscriber Data Abbreviations|FNSUB and NPSUB Message Response|FNSUB and NPSUB|IMSI Changeover|Customer Service Orders|Create IMSICH|Set IMSICH|Get IMSICH|Delete IMSICH|Request and Response Parameters|IMSICH Message Response|AUC Subscription|Composite Parameter Definitions|Decrypting Algorithm|Authentication Algorithms|Customer Service Orders|Create AUCSUB|Set AUCSUB|Get AUCSUB|Delete AUCSUB|Request and Response Parameters|AUCSUB Message Response|Appendix|Graphical Structure|Example 1|Example 2|Error Recovery|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|3|3.1|3.2|3.2.1|3.2.2|3.3|3.3.1|3.3.2|3.3.3|4|4.1|4.1.1|4.2|4.3|5|5.1|5.1.1|5.1.2|5.1.3|5.2|5.2.1|5.2.2|5.2.3|5.3|6|6.1|6.1.1|6.1.2|6.1.3|6.1.4|6.1.5|6.1.6|6.1.7|6.1.8|6.1.9|6.1.10|6.1.11|6.1.12|6.1.13|6.1.14|6.2|6.2.1|6.2.2|6.3|6.3.1|6.3.2|6.3.3|6.3.4|6.3.5|6.3.6|6.3.7|6.3.8|6.3.9|6.3.10|6.3.11|6.3.12|6.3.13|6.3.14|6.3.15|6.4|7|7.1|7.1.1|7.1.2|7.2|7.2.1|7.2.2|7.3|7.4|7.4.1|8|8.1|8.1.1|8.1.2|8.1.3|8.1.4|8.2|8.3|9|9.1|9.1.1|9.1.2|9.2|9.2.1|9.2.2|9.2.3|9.2.4|9.3|9.4|10|10.1|10.1.1|10.1.2|10.2|11|
|Instruction|Target Group|Prerequisites|Getting Started|Logging In|Launch Page|A Basic Analysis Order|Use Cases|Recurrent Analysis with Data Extraction|Two-step Analysis|Working with Analysis Orders|Schedule Analysis Order|Specify Data Sources|Select Analysis Type|Define Rule Specification|Reading Analysis Report|Read a Report|Read a Definition|Read a Statistics|Appendix|Comparison Rules|Rule Conditions|Reference List|$|1|1.1|1.2|2|2.1|2.2|2.3|3|3.1|3.2|4|4.1|4.2|4.3|4.4|5|5.1|5.2|5.3|6|6.1|6.2|7|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|National Conventions|Web Service Interface|CAI3G Overview|CAI3G Definitions|MOType|MOId|MO Attributes|CAI3G Extension|CAI3G Example|HLR Subscription|Customer Service Orders|Create HLR Subscription|Set HLR Subscription|Delete HLR Subscription|Get HLR Subscription|Get HLRMWINFO|Composite Parameter Definitions|Subscriber Data|Profiles|Additional MSISDN|Customized Applications for Mobile Networks Enhanced Logic (CAMEL)|Closed User Groups|Mobility Management Related IN Triggering|GPRS|Gateway Mobile Location Center (GMLC) Address|Location Services (LOCSERVICES)|Spatial Trigger Support (SPATIALTRIGGER)|Multiple SIM|SpamSMS|IMSI Changeover|Customer Service Orders|Create IMSI Changeover|Set IMSI Changeover|Delete IMSI Changeover|Get IMSI Changeover|Remove References of IMSI Changeover|AUC Subscription|Customer Service Orders|Create AUC Subscription|Set AUC Subscription|Delete AUC Subscription|Get AUC Subscription|Mobile Number Portability|Customer Service Orders|Create Mobile Number Portability|Set Mobile Number Portability|Delete Mobile Number Portability|Get Mobile Number Portability|Faults and Errors|Subordinate Errors Codes|HLR Subscription Response Codes|IMSI Changeover Response Codes|AUC Subscription Response Codes|Mobile Number Portability Subscription Response Codes|CAI3G Error Message Example|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|2|2.1|2.1.1|2.1.2|2.1.3|2.1.4|2.2|3|3.1|3.1.1|3.1.2|3.1.3|3.1.4|3.1.5|3.2|3.2.1|3.2.2|3.2.3|3.2.4|3.2.5|3.2.6|3.2.7|3.2.8|3.2.9|3.2.10|3.2.11|3.2.12|4|4.1|4.1.1|4.1.2|4.1.3|4.1.4|4.2|5|5.1|5.1.1|5.1.2|5.1.3|5.1.4|6|6.1|6.1.1|6.1.2|6.1.3|6.1.4|7|7.1|7.1.1|7.1.2|7.1.3|7.1.4|7.2|8|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Deployment View|Architectural Principle|Package Name Convention|System Properties Adaptations|Commons Logging|Log Levels|Easy Adaptations|Logical Dependencies|Producing Large Files|Customization|Creating a New Rule|Prerequisites|Implementing the Rule|Code Examples|Deploying the Rule|Creating a New Data Model|Creating a New Off-line Data Model|Creating a New Online Data Model|Deploying the New Off-line Data Model|Deploying the New Online Data Model|Creating a New Off-line Data Parser|Prerequisites|Implementing the New Data Parser|Code Examples|Deploying the New Data Parser|Generic Extractors|Deploy the Generic Extraction Module|Place an Extraction Order with the Generic SQL Extraction Handler|Place an Extraction Order with the Generic LDAP Extraction Handler|Online Data Source Integration|Online Architecture Overview|Integration Scenarios|Developing Resource Adapter|Online Data Source Definition|Notification|GUI Language|Excel Reports|Disable the Export of Excel Reports|Customize Excel Reports|Definitions|Dump File Format|Rule Based Analysis|Rule Based Analysis Result File Format|Pattern Based Analysis|Pattern Based Analysis Result File Format|Reference List|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|4|4.1|4.1.1|4.1.2|4.1.3|4.1.4|4.2|4.2.1|4.2.2|4.2.3|4.2.4|4.3|4.3.1|4.3.2|4.3.3|4.3.4|4.4|4.4.1|4.4.2|4.4.3|4.5|4.5.1|4.5.2|4.5.3|4.5.4|4.6|4.7|4.8|4.8.1|4.8.2|5|5.1|5.2|5.2.1|5.3|5.3.1|6|
|Introduction|Extensions to CAI3G Interface|Deviations from the CAI3G Interface|SequenceId Is Not Enforced|TransactionId Is Not Enforced|Final Parameter|Element Instead of Type|CAI3G Implementation|CAI3G Versions|CAI3G Operation|Schema Validation|Security|User Authentication|Traffic Encryption|SOAP HTTP|SOAP Action|Content-Length|Keep-Alive|Response Status Codes|SOAP JMS|Session Id|CAI3G Fault Response|CAI3G Fault Codes|Dynamic Activation Fault Types|General Dynamic Activation Internal Error Codes|Reference List|$|1|2|3|3.1|3.2|3.3|3.4|4|4.1|4.2|4.3|4.4|4.4.1|4.4.2|4.5|4.5.1|4.5.2|4.5.3|4.5.4|4.6|4.7|5|5.1|5.2|5.3|6|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites|Tutorial Project Overview|Development Process of Adapted Northbound SSH CAI Interface|Preparing for NBIA Development Environment|IDE Installation|Customized NBIA Submodule Development|Importing the SSH CAI NBIA Project to Eclipse|SSH CAI Northbound Interface Implementation|Project Structure|Northbound Interface Implementation|Provisioning Services Implementation|Packaging Northbound Adapter|Deployment|Deploying the Customized NBIA Submodule|Installing the Customized NBIA Submodule|Activating the Customized NBIA Submodule|Checking the Submodule Status|Adjusting Load Balance Configuration for SSH CAI Submodule|Uninstalling the Customized NBIA Submodule|Updating the Customized NBIA Submodule|Setting Properties for the Customized NBIA Submodule|Properties for the SSH CAI Submodule|Adding/Changing Customized Properties for the Customized NBIA Submodule|Modifying Properties Values for the Customized NBIA Submodule|Restore the Default Value of the Property for the Customized NBIA Submodule|Key Store Configuration for the SSH CAI Submodule|Configuring Logs|Verifying the Northbound Adapter|Creating a User|Login Through SSH Protocol|Sending a CAI Request|Error Code|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|3|3.1|4|4.1|4.2|4.2.1|4.2.2|4.2.3|4.3|5|5.1|5.1.1|5.1.2|5.1.3|5.1.4|5.1.5|5.1.6|5.2|5.2.1|5.2.2|5.2.3|5.2.4|5.2.5|5.3|6|6.1|6.2|6.3|6.4|7|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Namespaces|Legends|Operations|CAI3G Request and Response|Web Service Interface|MOType|MOId|Create IMSI Changeover|Request Data|Examples|Get IMSI Changeover|Request Data|Response Data|Examples|Set IMSI Changeover|Request Data|Examples|Delete IMSI Changeover|Request Data|Examples|Create IMSI Changeover Removal|Request Data|Examples|Create MSISDN Changeover|Request Data|Examples|Faults and Errors|Subordinate IMSI Changeover Error Codes|Subordinate MSISDN Changeover Error Codes|CAI3G Error Message Example|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|1.8|1.9|1.10|1.11|2|2.1|2.2|3|3.1|3.2|3.3|4|4.1|4.2|5|5.1|5.2|6|6.1|6.2|7|7.1|7.2|8|8.1|8.2|8.3|9|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Namespaces|Legends|Operations|CAI3G Request and Response|Web Service Interface|MOType|MOId|CAI3G Extension|Parameters|Schemas|Subscription|Customer Service Orders|Create Subscription|Get Subscription|Set Subscription|Delete Subscription|Composite Parameter Definitions|Additional MSISDN|Mobility Management IN Triggering|Closed User Group|CUG BSG Options|Barring Supplementary Services|Call Forwarding Services|Single Personal Number|Call Waiting|Spatial Trigger|Message Waiting Service Type|Multiple Subscription|Create Multiple Subscription|Request Data|Examples|Get Multiple Subscription|Request Data|Response Data|Examples|Set Multiple Subscription|Request Data|Examples|Delete Multiple Subscription|Request Data|Examples|Faults and Errors|Subordinate M2M Subscription Error Codes|Subordinate M2M Multiple Subscription Error Codes|CAI3G Error Message Example|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|1.8|1.9|1.10|1.11|1.11.1|1.11.2|2|2.1|2.1.1|2.1.2|2.1.3|2.1.4|2.2|2.2.1|2.2.2|2.2.3|2.2.4|2.2.5|2.2.6|2.2.7|2.2.8|2.2.9|2.2.10|3|3.1|3.1.1|3.1.2|3.2|3.2.1|3.2.2|3.2.3|3.3|3.3.1|3.3.2|3.4|3.4.1|3.4.2|4|4.1|4.2|4.3|5|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|SAPC Conditional Search Command|Print Families and Corresponding Subscribers (PCMSFMP)|PCMSFMP Request|PCMSFMP Result File Schema|Faults or Errors|General CLI Errors|Command Mapped Errors|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.1.1|2.1.2|3|3.1|3.2|4|
|Introduction|Target Groups|Typographic Conventions|Parameters|Configuration|Disk Partitioning|Reference List|$|1|1.1|1.2|1.2.1|2|3|4|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites and Preparations|Hardware and Software Required|Hardware|Software|Documentation|Tools|Conditions|Installation|Hardware Installation|Site Inspection|Site Preparation|Visual Inspection of Mechanical Parts|Installing the Cabinet|Power and Grounding|Cabling and Wiring|Power-on and Check|Final Assembly|Console Access Settings|Installation Tools Preparation|Installation and Configuration|Installing BSP Software|Prepare the EDA Native BSP8100 Config Generator Tool|Accessing Hardware Specific Information|Preparing Deployment Artifacts|BSP Configuration|GEP5 BIOS Settings|LDEwS Installation|SNMP Configuration|Dynamic Activation Software Installation|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.1.1|2.1.2|2.2|2.3|2.4|3|3.1|3.1.1|3.1.2|3.1.3|3.1.4|3.1.5|3.1.6|3.1.7|3.1.8|3.1.9|3.2|3.3|3.3.1|3.3.2|3.3.3|3.3.4|3.3.5|3.3.6|3.4|3.5|3.6|4|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Expansion|Prerequisites for Expanding a Dynamic Activation Cluster|Guidelines for the Readers|Expansion of a Dynamic Activation Cluster|Expansion in Virtualized Deployment|Expansion in Cloud Deployment - ECEE|Expansion in Cloud Deployment - OpenStack|Installing HSS Validator Plug-in (Optional)|SSL Configuration (Optional)|Modify Notification Rules|Creating Administrative Users|Backup|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|2.3.1|2.3.2|2.3.3|2.4|2.5|2.6|2.7|3|4|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|System Information|System Architecture|Dynamic Activation Configurations|Directory Structure|Description of /opt|Description of /var|Description of /home|Description of /usr|Description of /etc|Log Files|Operating System|Dynamic Activation Application Logs|Ericsson SNMP Agent|Processing Log File Format|Ports|Traffic Ports|Operation and Maintenance Ports|Version Identification|Software Version|Users|System Users|Dynamic Activation Users|Crontab|User Privileges|Administrator in activation Group|Administrator in wheel Group|Operations|Operation Commands|Dynamic Activation Property Configuration|Dynamic Activation System Status|All Nodes Status for 3PP Processes|Status of Dynamic Activation Applications|Status of License Agent|VM Management|Remove VM from Load Balancer|Add VM from Load Balancer|VM Power Off|Controlled VM Reboot|Enabling and Disabling Provisioning Traffic and CAI3G Test Traffic|Enabling and Disabling Provisioning Traffic|Enabling and Disabling CAI3G Test Traffic Ports and Provisioning Traffic|Starting and Stopping|Dynamic Activation Application Processes|Starting and Stopping 3PP Processes|Dynamic Activation Modules|Increasing Startup Time-out|System Checks|Health Check on Dynamic Activation|Network Setup Check|Maintaining SSL Certificates|System Administration|Keepalived Cluster Configuration Administration|Keepalived Configuration File|Logging|HAProxy Configuration File|Set Up Persistent Block Storage on VMs (KVM/VMware)|Set Up Ephemeral Storage on VM Instances (CEE)|Configuring ESA|Alarms|Fault Management Agent|CPU Load Monitoring|Configuring Internal Heartbeat Monitoring|IPtables|DiffServ|Configuring SSL|General Information|Remarks and Deviations|Configuration Instruction|Configuring Authentication Rules of GUI Users|Brute Force Protection Algorithm|View Authentication Parameters|Modify an Authentication Parameter|Restore an Authentication Parameter|License Keys Administration|Requesting New License Key|Installing License Key|Back up License Keys|Restoring a Backup of License Keys|Removing a License Key|Cassandra Administration|Cassandra Data Consistency|Cassandra Performance Monitoring|PC Keys|Installing a PC Key|Rolling Back a PC Key|Processing Log Admin Tool|Using Processing Log Admin Tool|Configuring Processing Log Admin Tool|Daily Export of Processing Logs|Log File Maintenance|Removal of Old Processing Logs|Configuration of the Retained Amount of Processing log days|Configuration of Processing Logs|Configuration of Flat Processing Log Files|Other Log Files|Automatic Queue Cleanup for Resilient Activation|How the Cleanup Function Works|Configure the Cleanup Function|Enabling and Disabling Hostname in CAI3G Error Details|Configuring CAI3G Max Sessions|Configuring MDV Time-Out|Synchronization Among Clusters|Verification of Connections|Exchanging SSH Key between Clusters|Forward SSH Key to New Cluster|Exchanging SSH Key When Replacing a Cluster|Update Password for Cluster Synchronization|License Counters Synchronization|Remove Clusters from Synchronization|Dynamic Activation Application Custom Log4j Settings|Deploy Custom Log Settings|Undeploy Custom Log Settings|List Active Custom Log Settings|Configuring External OpenID Connect Provider|Pre-request for External OpenID Connect Provider|Setting External OpenID Connect Provider Configuration in Dynamic Activation|Removing External OpenID Connect Provider Configuration|Asynchronous Request Handler Settings|Configuration of Asynchronous CAI3G 1.2 Interface|Batch Handler Settings|UDC Specific Information|UDC Specific Operations|Installing and Upgrading HSS Validator Plug-in|Uninstalling and Rolling Back HSS Validator Plug-in|UDC Specific System Administration|Activating CLI|Notification Rules File Administration|Error Mapping File Administration|Configuring HTTP Max Connections|Configuration of MML Interface|Configuration of MML over SSH Interface|Configuration of CAI Interface|Configuration of EDIFACT Interface|Load Default NE Groups and Routing Methods|UDC Data Durability|Manual Replay Operation|Operational Instruction in the Event of a Failed Replay Operation|Resource Configuration Specific Information|Use Housekeeping Script to Remove Obsolete Device Configurations|How The Housekeeping Script Works|Remove Obsolete Device Configurations|Maintenance Routines|Daily Maintenance|Weekly Maintenance|Monthly Maintenance|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.1.1|2.2|2.2.1|2.2.2|2.2.3|2.2.4|2.2.5|2.3|2.3.1|2.3.2|2.3.3|2.3.4|2.4|2.4.1|2.4.2|2.5|2.5.1|2.6|2.6.1|2.6.2|2.7|3|3.1|3.2|4|4.1|4.2|4.3|4.3.1|4.3.2|4.3.3|4.4|4.4.1|4.4.2|4.4.3|4.5|4.6|4.6.1|4.6.2|4.7|4.7.1|4.7.2|4.7.3|4.7.4|4.8|4.8.1|4.8.2|4.8.3|5|5.1|5.1.1|5.1.2|5.1.3|5.2|5.3|5.4|5.4.1|5.4.2|5.4.3|5.4.4|5.5|5.6|5.7|5.7.1|5.7.2|5.7.3|5.8|5.8.1|5.8.2|5.8.3|5.8.4|5.9|5.9.1|5.9.2|5.9.3|5.9.4|5.9.5|5.10|5.10.1|5.10.2|5.11|5.11.1|5.11.2|5.12|5.12.1|5.12.2|5.13|5.14|5.14.1|5.14.2|5.14.3|5.14.4|5.14.5|5.15|5.15.1|5.15.2|5.16|5.17|5.18|5.19|5.19.1|5.19.2|5.19.3|5.19.4|5.19.5|5.19.6|5.19.7|5.20|5.20.1|5.20.2|5.20.3|5.21|5.21.1|5.21.2|5.21.3|5.22|5.22.1|5.23|6|6.1|6.1.1|6.1.2|6.2|6.2.1|6.2.2|6.2.3|6.2.4|6.2.5|6.2.6|6.2.7|6.2.8|6.2.9|6.3|6.3.1|6.3.2|7|7.1|7.1.1|7.1.2|8|8.1|8.2|8.3|9|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Function Overview|Inbound Interfaces|CAI and MML|CAI3G and Async CAI3G|CLI|EDIFACT|Business Logic|Standard Provisioning Business Logic|Customer Adaptation for Provisioning Business Logic|Standard Cluster Strategy|ActiveActive|ActiveActive-BestEffort|PrimaryBackup|ActiveActiveQueue|ActivePassive|MultipleAIR|Customer Adaptation for Cluster Strategy|Outbound Connectivity|Generic Protocol Support|Network Element Management|Connection Robustness|Authorization and Access Control|Provisioning Access Control|Fault Tolerance|Operations without Automatic Rollback Functionality|Operations without Fault Tolerance|Prevent Concurrent Subscriber Provisioning|Replay Operation|Automatic Replay Operation|Automatic Provisioning Block|RESTful Notification Interface|Manual Replay Operation|Configurable Loose Error Handling|CAI3G Distributed Configuration|Request Distribution|Distributing a Northbound Synchronous CAI3G Request|Distributing a Synchronous Request through SV|Routing Configuration|Faults or Errors|License Management|Enforcement of Subscriber Licensing|Expiration Notifications|Blocked Provisioning|Reference List|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.2|3.3|3.4|4|4.1|4.2|4.3|4.3.1|4.3.2|4.3.3|4.3.4|4.3.5|4.3.6|4.4|5|5.1|5.2|5.3|6|6.1|7|7.1|7.2|8|9|9.1|9.1.1|9.1.2|9.2|10|11|11.1|11.1.1|11.1.2|11.2|11.3|12|12.1|12.2|12.3|13|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|EDIFACT Interface Overview|Message Design|EDIFACT Messages|MDCMD - Mediation Device Command|MDRES - Response to Mediation Device Command|Service Segments|UNB Interchange Header Segment|UNH Message Header Segment|UNS Section Control Segment|UNT Message Trailer Segment|UNZ Interchange Trailer Segment|Data Segments|XCR Command Result Segment|XEV Event Type Segment|XEV Event Type Segment|XPM Parameter Segment|XSV Service Identification Segment|Supported Parameter Information Segments|Mediation Device specific Parameter Information Segments|Network Element Specific Parameter Information Segments|IMEI List Specific Parameter Information Segments|Contract sSpecific Parameter Information Segments|Carrier Specific Parameter Information Segments|Service Specific Parameter Information Segments|Micro Cell Specific Parameter Information Segments|Closed User Group Specific Parameter Information Segments|Resource specific Parameter Information Segments - Directory Numbers|Resource specific Parameter Information Segments - Storage Medium|Resource specific Parameter Information Segments - Port|Response Parameter Information Segments|Interprocess communication between GMD and Dynamic Activation|IPC between the GMD and Dynamic Activation|Sending an EDIFACT message|Message Structures|Provisioning System Acknowledgement Message (MVNO / MVNE integration)|Faults and Errors|EDIFACT NBIA Error Codes|Appendix A|Reference List|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.1.1|3.1.2|3.2|3.2.1|3.2.2|3.2.3|3.2.4|3.2.5|3.3|3.3.1|3.3.2|3.3.3|3.3.4|3.3.5|3.4|3.4.1|3.4.2|3.4.3|3.4.4|3.4.5|3.4.6|3.4.7|3.4.8|3.4.9|3.4.10|3.4.11|3.4.12|3.5|3.5.1|3.5.2|3.5.3|3.5.4|4|4.1|5|6|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Overview|Interfaces|Web Service Interface|Northbound Interface Adaptation|Applications per Interface|Communication Protocols|Security|SSL/TLS|SSH|Access Control|Redundant Setup|Active-Standby|Active-Active|Heartbeat Mechanism|Heartbeat Interval, Failure, and Response Time-out|Failover and Preemptive Fail-Back|VoLTE Auto Provisioning Setup|Fault Management|Error Codes, Messages, and Details|CAI3G Generic Error Codes and Messages|CAI3G Internal Errors and Messages|CAI3G External Errors and Messages|CAI3G Subordinate Error Details|Automatic Retries|Reference List|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.2|3.3|3.4|4|4.1|4.2|4.3|5|5.1|5.2|5.3|5.3.1|5.3.2|6|7|7.1|7.1.1|7.1.2|7.1.3|7.1.4|7.2|8|
|Introduction|Prerequisites|Basic Concepts|eVIP Concepts|Configuration Concepts|Configuration|General eVIP Configuration|ALB Configuration|Traffic Configuration|Configuration and Validation|eVIP CLI Framework|$|1|1.1|2|2.1|2.2|3|3.1|3.2|3.3|3.4|3.5|
|Introduction|Purpose|Target Groups|Typographic Conventions|Prerequisites|System Model|Alarm Formats|List of Alarms|Alarm Details|Module: ARH|Module: BatchHandler|Module: CPC|Module: Cassandra|Module: CommonService|Module: EMA|Module: LDEwS|Module: LOGGENERATION|Module: NAC|Module: NBIA|Module: PERFORMANCE|Module: PQ|Module: Platform|Module: REPLAY|Module: Reporter|Module: SM|Module: ZooKeeper|Severity, Event Type, and Probable Cause|Severity Levels|Event Types|Probable Causes|Reference List|$|1|1.1|1.2|1.3|1.4|2|3|4|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|5.9|5.10|5.11|5.12|5.13|5.14|5.15|5.16|5.17|6|6.1|6.2|6.3|7|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|SIP Trunking Solution Overview|SIP Trunking Provisioning Architecture|SIP Trunking Provisioning Data Model|Static Mode Connection|Dynamic Mode Connection|SIP Trunking Provisioning Interface|Northbound Interface|Southbound Interface|SIP Trunking Provisioning Use Cases|Rollback|Create a SIP Trunking Subscription|Set a SIP Trunking Subscription|Get a SIP Trunking Subscription|Delete a SIP Trunking Subscription|IDE|License|Reference List|$|1|1.1|1.2|1.3|2|3|4|4.1|4.2|5|5.1|5.2|6|6.1|6.2|6.3|6.4|6.5|7|8|9|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Namespaces|Legends|Web Service Interface|MOType|MOId|Create MMTel Subscription|Request Data|Example|Get MMTel Subscription|Request Data|Response Data|Example|Set MMTel Subscription|Request Data|Example|Delete MMTel Subscription|Request Data|Example|Create MMTel SharedProfileService|Request Data|Example|Get MMTel SharedProfileService|Request Data|Response Data|Example|Set MMTel SharedProfileService|Request Data|Example|Delete MMTel SharedProfileService|Request Data|Example|Create MMTel ServiceNumberService|Request Data|Example|Get MMTel ServiceNumberService|Request Data|Response Data|Example|Set MMTel ServiceNumberService|Request Data|Example|Delete MMTel ServiceNumberService|Request Data|Example|Create MMTel SchedConfService|Request Data|Example|Get MMTel SchedConfService|Request Data|Response Data|Example|Set MMTel SchedConfService|Request Data|Example|Delete MMTel SchedConfService|Request Data|Example|Create MMTel SipTrunkingService|Request Data|Example|Get MMTel SipTrunkingService|Request Data|Response Data|Example|Set MMTel SipTrunkingService|Request Data|Example|Delete MMTel SipTrunkingService|Request Data|Example|Create MMTel SipTrunkingReferralService|Request Data|Example|Get MMTel SipTrunkingReferralService|Request Data|Response Data|Example|Set MMTel SipTrunkingReferralService|Request Data|Example|Delete MMTel SipTrunkingReferralService|Request Data|Example|MTAS Attributes Definitions|Detailed Service Attributes Definition List|Generic Element Contents|Faults and Errors|Subordinate MTAS Error Codes|CAI3G Error Message Example|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|1.8|1.9|2|2.1|2.2|3|3.1|3.2|3.3|4|4.1|4.2|5|5.1|5.2|6|6.1|6.2|7|7.1|7.2|7.3|8|8.1|8.2|9|9.1|9.2|10|10.1|10.2|11|11.1|11.2|11.3|12|12.1|12.2|13|13.1|13.2|14|14.1|14.2|15|15.1|15.2|15.3|16|16.1|16.2|17|17.1|17.2|18|18.1|18.2|19|19.1|19.2|19.3|20|20.1|20.2|21|21.1|21.2|22|22.1|22.2|23|23.1|23.2|23.3|24|24.1|24.2|25|25.1|25.2|26|26.1|26.2|27|27.1|27.2|28|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites|Namespaces|Web Service Interface|MOType|MOId|Sub-objects|Common Data Types|BGP|Request Data|Parameters|Examples|MPLS|Request Data|Parameters|Examples|OSPF|Request Data|Parameters|Examples|Policy|Request Data|Parameters|Examples|VRF|Request Data|Parameters|Examples|Bridge Domain|Request Data|Parameters|Examples|EVC Bridge|Request Data|Parameters|Examples|IPPIM|Request Data|Parameters|Examples|VPLS|Request Data|Parameters|Examples|Xconnect|Request Data|Parameters|Examples|Ethernet Interface|Request Data|Parameters|Examples|Loopback Interface|Request Data|Parameters|Examples|NVE Interface|Request Data|Parameters|Examples|Serial Interface|Request Data|Parameters|Examples|UNI|Request Data|Parameters|Examples|DHCP Server|Request Data|Parameters|Examples|DHCP Relay Agent|Request Data|Parameters|Examples|Firewall|Request Data|Parameters|Examples|Faults and Errors|Subordinate Resource Configuration Error Codes|CAI3G Error Message Example|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|1.8|1.9|1.10|2|2.1|2.1.1|2.2|3|3.1|3.1.1|3.2|4|4.1|4.1.1|4.2|5|5.1|5.1.1|5.2|6|6.1|6.1.1|6.2|7|7.1|7.1.1|7.2|8|8.1|8.1.1|8.2|9|9.1|9.1.1|9.2|10|10.1|10.1.1|10.2|11|11.1|11.1.1|11.2|12|12.1|12.1.1|12.2|13|13.1|13.1.1|13.2|14|14.1|14.1.1|14.2|15|15.1|15.1.1|15.2|16|16.1|16.1.1|16.2|17|17.1|17.1.1|17.2|18|18.1|18.1.1|18.2|19|19.1|19.1.1|19.2|20|20.1|20.2|21|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites|Namespaces|Legends|Operations|Web Service Interface|MOType|MOId|Create DNS Subscription|Request Data|Examples|Get DNS Subscription|Request Data|Response Data|Examples|Set DNS Subscription|Request Data|Examples|Delete DNS Subscription|Request Data|Examples|Set DNS Domain|Request Data|Examples|Faults or Errors|Dynamic Activation Internal Errors|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|1.8|1.9|1.10|2|2.1|2.2|3|3.1|3.2|3.3|4|4.1|4.2|5|5.1|5.2|6|6.1|6.2|7|7.1|8|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites|Operations|Web Service Interface|Authentication|Example|Device Management Data|Device Management Operations|/scm-rest/device-repository/admin-states|/scm-rest/device-repository/device-categories|/scm-rest/device-repository/devices|/scm-rest/device-repository/devices/{identifier}|/scm-rest/device-repository/devices/{identifier}/config-sync|Faults or Errors|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|2|2.1|3|4|4.1|4.2|4.3|4.4|4.5|5|6|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Async CAI3G Overview|Async CAI3G Definition|Authentication|Correlation Requests and Notifications|Asynchronous Parameters|Request Tracing Support|Transactions|Security|Acknowledgement|Generating WSDL File|Request WSDL File|Notification WSDL File|Operation|Create Operation|Get Operation|Set Operation|Delete Operation|Appendix A Async CAI3G WSDL|Asynchronous Common WSDL|Fault WSDL|Request WSDL Template|Response WSDL Template|Intermediate Notification Template|Appendix B Async CAI3G Examples|Create Operation|Request Phase|Notification Phase|Get Operation|Request Phase|Notification Phase|Set Operation|Request Phase|Notification Phase|Delete Operation|Request Phase|Notification Phase|Reference List|$|1|1.1|1.2|1.3|1.4|2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.8.1|3.8.2|3.9|3.9.1|3.9.2|3.9.3|3.9.4|4|4.1|4.2|4.3|4.4|4.5|5|5.1|5.1.1|5.1.2|5.2|5.2.1|5.2.2|5.3|5.3.1|5.3.2|5.4|5.4.1|5.4.2|6|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Web Service Interface|Namespaces|Operations|MOType|MOId|Get MultiSCCat|Request Data|Example|Set MultiSCCat|Request Data|Example|Faults and Errors|MultiSCCat Interface Error Codes|MultiSCCat Error Message Example|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|1.8|1.9|2|2.1|2.2|3|3.1|3.2|4|4.1|4.2|5|
|$|
|Introduction|Typographic Conventions|Prerequisites|Installation Process|Installation|Prerequisites for Installing Dynamic Activation|Guidelines for the Readers|Deploying Virtual Machines|Deploying Dynamic Activation in Virtualized Environment|Deploying Dynamic Activation in Cloud - ECEE|Deploying Dynamic Activation in Cloud - OpenStack|Installing Licenses (Only ECEE and OpenStack)|Installing HSS Validator Plug-in (Optional)|Creating Administrative Users|SSL Configuration (Optional)|Configurations|Modify Notification Rules (Optional)|Set Initial License Counters|External OpenID Connect Provider Configuration (Optional)|SNMP Configuration|Update and Rollback of Dynamic Activation on Virtualized Deployment|Preparations|Update Instructions|All Nodes with Downtime|Node by Node without Downtime|Rollback Instructions|Backup|Reference List|$|1|1.1|1.2|2|3|3.1|3.2|3.3|3.3.1|3.3.2|3.3.3|3.3.4|3.3.5|3.3.6|3.3.7|3.3.8|3.3.9|3.3.10|3.3.11|4|5|5.1|5.2|5.2.1|5.2.2|5.3|6|7|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites|Configuration for UDC Data Durability|Network Element - Network Element Group Configuration|Replay User|RESTful Notification Interface|Replay Service|Disable Log Obfuscation|Connection Robustness Tuning|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|2.5|2.6|3|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Overview|Layered Provisioning Functions|Interfaces|MML|CAI3G|CAI|Provisioning Scenarios|Individual Subscriber Provisioning|HLR Subscriber with MNP Provisioning|IMSI Changeover|Massive Operation|Conditional Search|Massive Update|Administration of Profiles|Administration of Service Associated Data|Location Procedure|Data Model Extensibility|Multiple Administration Area Support for HLR|N+1 Redundancy Support|Data Consistency Assurance in Core Network and CUDB|Feature Operation|Parameters|End to End Provisioning Solution|Migration Support|Other Advanced Provisioning Features|Enforcement of Subscriber Licensing|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.2.1|2.2.2|2.2.3|3|3.1|3.2|3.3|3.4|3.4.1|3.4.2|3.5|3.6|3.7|3.8|3.9|3.10|3.11|3.11.1|3.11.2|4|4.1|4.2|5|6|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|AUC Conditional Search Commands|Print Authentication and Key Agreement Algorithm (AEMSAAP)|AEMSAAP Request|AEMSAAP Result File Schema|Print Subscription State (AEMSSSP)|AEMSSSP Request|AEMSSSP Result File Schema|Print Subscription (AEMSSUP)|AEMSSUP Request|AEMSSUP Result File Schema|HLR Conditional Search Commands|Print Access Point Name (HEMSAPP)|HEMSAPP Request|HEMSAPP Result File Schema|Print CAMEL Subscription List (HEMSCMP)|HEMSCMP Request|HEMSCMP Result File Schema|Print Extended Quality of Service (HEMSEQP)|HEMSEQP Request|HEMSEQP Result File Schema|Print Location Services Address (HEMSGLP)|HEMSGLP Request|HEMSGLP Result File Schema|Print GSM Service Control Function Address (HEMSGSP)|HEMSGSP Request|HEMSGSP Result File Schema|Print IMSI Changeover (HEMSICP)|HEMSICP Request|HEMSICP Result File Schema|Print Subscriber Location Services Data (HEMSLDP)|HEMSLDP Request|HEMSLDP Result File Schema|Print Conditional Subscriber List (HEMSLIP)|HEMSLIP Request|HEMSLIP Result File Schema|Print Monitoring Call Forwarding Registration Data (HEMSMRP)|HEMSMRP Request|HEMSMRP Result File Schema|Print Multiple Subscription Data (HEMSMSP)|HEMSMSP Request|HEMSMSP Result File Schema|Print Subscriber PDP Context (HEMSPDP)|HEMSPDP Request|HEMSPDP Result File Schema|Print PDP Context Profile (HEMSPPP)|HEMSPPP Request|HEMSPPP Result File Schema|Print Service Center Survey (HEMSSCP)|HEMSSCP Request|HEMSSCP Result File Schema|Print Subscriber Data (HEMSSDP)|HEMSSDP Request|HEMSSDP Result File Schema|Print Subscriber Location Services Address (HEMSSGP)|HEMSSGP Request|HEMSSGP Result File Schema|Print Subscriber Tracing (HEMSSTP)|HEMSSTP Request|HEMSSTP Result File Schema|Print PRP Data (HESDCDP)|HESDCDP Request|HESDCDP Result File Schema|Print Subscriber Roaming Data (HEMSRLP)|HEMSRLP Request|HEMSRLP Result File Schema|Print Subscribers Location Based on Geographic Area (HEMSSLP)|HEMSSLP Request|HEMSSLP Result File Schema|MNP Conditional Search Commands|Print MNP Subscriber Data (HEMSNTP)|HEMSNTP Request|HEMSNTP Result File Schema|AUC Massive Update Commands|Change Authentication and Key Agreement Algorithm (AEMSAAC)|AEMSAAC Request|AEMSAAC Result File Schema|Change Subscription (AEMSSUC)|AEMSSUC Request|AEMSSUC Result File Schema|HLR Massive Update Commands|Initiate Massive Change of Subscriber Data (HEMSMCI)|HEMSMCI Request|HEMSMCI Result File Schema|SUD and NEWSUD Rules for HEMSMCI|End Monitoring Call Forwarding Registration (HEMSMRE)|HEMSMRE Request|HEMSMRE Result File Schema|Initiate Monitoring Call Forwarding Registration (HEMSMRI)|HEMSMRI Request|HEMSMRI Result File Schema|Massive Change of Primary HLR Identity (HEMSPIC)|HEMSPIC Request|HEMSPIC Result File Schema|Faults or Errors|General CLI Errors|Command Mapped Errors|HLR Errors|AUC Errors|Appendix - HLR Classic and HLR-FE Layered Incompatibilities|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.1.1|2.1.2|2.2|2.2.1|2.2.2|2.3|2.3.1|2.3.2|3|3.1|3.1.1|3.1.2|3.2|3.2.1|3.2.2|3.3|3.3.1|3.3.2|3.4|3.4.1|3.4.2|3.5|3.5.1|3.5.2|3.6|3.6.1|3.6.2|3.7|3.7.1|3.7.2|3.8|3.8.1|3.8.2|3.9|3.9.1|3.9.2|3.10|3.10.1|3.10.2|3.11|3.11.1|3.11.2|3.12|3.12.1|3.12.2|3.13|3.13.1|3.13.2|3.14|3.14.1|3.14.2|3.15|3.15.1|3.15.2|3.16|3.16.1|3.16.2|3.17|3.17.1|3.17.2|3.18|3.18.1|3.18.2|3.19|3.19.1|3.19.2|4|4.1|4.1.1|4.1.2|5|5.1|5.1.1|5.1.2|5.2|5.2.1|5.2.2|6|6.1|6.1.1|6.1.2|6.1.3|6.2|6.2.1|6.2.2|6.3|6.3.1|6.3.2|6.4|6.4.1|6.4.2|7|7.1|7.2|7.3|7.4|8|9|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|General|Log File|EIR Repair Actions|EIR|Log File|IPWorks/AAA Repair Actions|IPWorks/AAA|Create AAA User|Delete AAA User|Set AAA User|Create AAA Shared Group|Log File|CUDB Repair Actions|CUDB Data Overview|CUDB Repair Routing Configuration|CUDB Subscriber Data Print (CUDBSUP)|CUDBSUP Request|CUDBSUP Result File|CUDBSUP Result File Schema|CUDB Subscriber Data Delete (CUDBSUE)|CUDBSUE Request|CUDBSUE Result File|CUDBSUE Result File Schema|CUDB Subscriber Authentication Repair Initiate (CUDBARI)|Authentication Service Repair Scenarios|Authentication Service Repair Identities|Authentication Service Repair Procedure|Authentication Service Repair Error Handling|CUDBARI Request|CUDBARI Result File|CUDBARI Result File Schema|Command Mapped Errors|Access Control|Reference List|$|1|1.1|1.2|1.3|2|3|4|4.1|4.1.1|5|5.1|5.1.1|5.1.2|5.1.3|5.1.4|5.2|6|6.1|6.2|6.3|6.3.1|6.3.2|6.3.3|6.4|6.4.1|6.4.2|6.4.3|6.5|6.5.1|6.5.2|6.5.3|6.5.4|6.5.5|6.5.6|6.5.7|6.6|6.7|7|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Solution Overview|General Concepts|Architecture|Provisioning Use Cases|Dynamic Activation Provisioning Solution|Interface|Provisioning Functions|Monolithic IPWorks Geographic Redundancy Provisioning|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|3|3.1|3.2|4|5|
|Introduction|Target Groups|Typographic Conventions|Parameters|Configuring Nodes and Installing LDEwS|Configuring Routers|Configuring Switches, BSP Common|Configuring cluster.conf|Disk Partitioning|Control Node Setup|Payload Node Setup|Configuring evip.xml|Reference List|$|1|1.1|1.2|1.2.1|2|2.1|2.2|2.3|2.4|2.4.1|2.4.2|2.5|3|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Installation|Installation Prerequisites|Installing Consistency Checker|Security Hardening|Configuration of connection to the Sentinel license server|Installation Verification|Uninstallation|Upgrade Consistency Checker|Glossary|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|3|4|5|6|7|8|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|System Information|System Anatomy|Directory Structure|&lt;CheckerHomeDir&gt;/bin|&lt;CheckerHomeDir&gt;/conf|&lt;CheckerHomeDir&gt;/var|&lt;CheckerHomeDir&gt;/licenses|Performing a System Start and Stop|Ports|Version Identification|License Information|Personal Data|Security|Authentication Mechanism|Configuration Management|Serving Units Configuration|Enterprise Application Deployment|Online Data Sources Integration Deployment|Deploy and Undeploy Resource Adapter|Create a Connection Pool towards an On-line Data Source|Make the Connection Pool Accessible via JNDI Name|Configure License Server's Port Number|Configure License Expiration Warning|Configure Dump Store Location|Update the License Cache Manually|Fault Management|Report Status Shows FAILED|Not Possible to View License Information|Maintenance|Check Disk Usage|Remove Dump Files|Remove Report and Result Files|Check Errors in Log Files|Glossary|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.2.1|2.2.2|2.2.3|2.2.4|2.3|2.4|2.5|2.6|2.7|2.8|2.9|3|3.1|3.2|3.3|3.3.1|3.3.2|3.3.3|3.4|3.5|3.6|3.7|4|4.1|4.2|5|5.1|5.2|5.3|5.4|6|7|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|General|Dynamic Activation - EPS Provisioning|DLA HSS Overview|LTE/SAE Support in HSS|Overview|Data Model HSS|Data Model Management|Atomicity and Integrity Handling|Support CUDB Backup|Hosted Validation|Notification|HSS Provisioning Flow|Provisioning of AVG and EPS|Provisioning AVG Activation Interface|Provisioning EPS Activation Interface|Flexible Profiles - Configured Profile versus Individual Profile|Multiple Administration Area Support for EPS|Location Procedure|Auto Provisioning|Dedicated Core Network|IMSI Changeover|Enforcement of Subscriber Licensing|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|4|4.1|4.2|4.2.1|4.2.2|4.2.3|4.2.4|4.2.5|4.3|5|6|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites|Communication Protocol|Direct Socket|TELNET|SSH|Ports|Login Procedure|Logout Procedure|Session and Presentation Layer|Queued Printouts|MML Command Syntax|Command Syntax|MML AUC Commands|AGAA: Authentication and Key Agreement Algorithm|AGSU: Subscription|MML HLR Commands|HGAP: Access Point Name|HGAM: Additional MSISDN|HGCM: CAMEL Subscription Data|HGCE: CAMEL Extended Information|HGCS: Closed User Group Basic Service Group Options|HGCT: CAMEL Triggering Criteria|HGCU: Closed User Group|HGIC: IMSI Changeover|HGIR: IMSI Changeover Removal|HGLD: HLR Subscriber Location Services Data|HGMW: Subscriber Message Waiting Data List|HGMS: Multiple Subscription|HGPD: Subscriber PDP Context|HGPP: PDP Context Profile|HGSD: Subscriber Data|HGSG: Subscriber Location Services Address|HGSL: Mobile Subscriber Location|HGSN: Subscriber Network Access Mode|HGSP: Subscriber Profile|HGSS: Supplementary Service|HGSU: Subscription|HGPS: Subscriber Spam SMS Data|HGMA: Mobility Management in Triggering Subscription Data Activation|HGMM: Mobility Management in Triggering Subscription Data|HGTE: Spatial Triggers Data|MML Flexible Numbering Register Commands|FGNT: Subscriber Number Translation|Faults or Errors|MML AUC Errors|MML FNR Errors|MML HLR Errors|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|3|3.1|4|4.1|4.2|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|5.9|5.10|5.11|5.12|5.13|5.14|5.15|5.16|5.17|5.18|5.19|5.20|5.21|5.22|5.23|5.24|5.25|6|6.1|7|7.1|7.2|7.3|8|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Dynamic Activation Overview|Limitations|JDV Overview|Northbound Interfaces|CAI Interfaces|CAI3G Interface Files|JDV Configuration Files|javadataview-descriptor.xml|managedobjects-descriptor.xml|looseerror-descriptor.xml|Business Logic Files|JDV Factory File|JDV File|Provisioning BL Files|JCA Overview|Connector Framework Overview|NE Management Overview|CA Application Types|CUDB Layered Data NE Provisioning|CUDB Layered Data Provisioning Overview|Data Model|CA DLA Wizard and Base Projects|Monolithic Data NE Provisioning|Monolithic Data Provisioning Overview|Data Model|CA Monolithic Wizard and Design Base Projects|Migration of Existing JDVs|Cluster Strategy|Cluster Strategy CA Development Overview|Subscriber View Provisioning|Subscriber View Overview|Data Model|CA Subscriber View Wizard and Design Base Projects|Monolithic Data NE Provisioning for non UDC Solutions|Monolithic Data Provisioning Overview|CA Design Base Projects|Developing Monolithic Data NE Provisioning for non UDC solutions|Preparing for CA Development Environment|JDK|Maven|Maven Repository|IDE|Eclipse|Wizard|Installation of Wizard|Initializing Design Base Projects|Importing the Project|Renaming the JDV and JCA Projects (Optional)|CA Development Workflow|CA Development for CUDB Layered Data Provisioning|Preparations|Project Creation|Interface Specification|Define the JDV Access Control Model|Handling the JDV Business Operations|Transforming Request and Response Data|BL Implementation for CUDB Layered NE Provisioning|Checking Whether CUDB Is in the Backup Process|CUDB Data Inconsistency Alarm|CUDB Data Inconsistency During the Create and Delete Operation|Implementation of Customized Error Code|CA Development for Monolithic Data Provisioning|Preparations|Project Creation|Interface Specification|Define the JDV Access Control Model|Define JDV Resource Key Attribute (Optional)|Define JDV Loose Error Handling (Optional)|Handling the JDV Business Operations|Transforming Request and Response Data|BL Implementation for Monolithic NE Provisioning|Implementation of Customized Error Code|CA Development for Java Connector Architecture|Preparations|Project Creation|Configuring the Resource Adapter Description File|Implementing ManangedConnectionFactory|Implementing ManagedConnection|Implementing StatisticsReporter for Dashboard|CA Development for Cluster Strategy|Implementing CA Cluster Strategy by Wizard|Cluster Strategy APIs|Customizing Off-the-shelf Cluster Strategy|CA Development for Subscriber View|Preparations|Project Creation|Interface Specification|Define the JDV Access Control Model|Handling the JDV Business Operations|Transforming Request and Response Data|BL Implementation for Subscriber View|SV Mapping and Ignoring Error Messages|SV Data Inconsistency During Create Operation|Implementing CAI3G DC|Implementation of Customized Error Code|Building and Deployment|Building, Deploying, and Undeploying a CA JDV|Building JDV|Deploying JDV|Undeploying JDV|Updating JDV|Building, Deploying, and Undeploying a CA JCA|Building JCA|Deploying JCA|Undeploying JCA|Updating JCA|Building, Deploying, and Undeploying a CA Cluster Strategy|Packaging and Deployment|Add 3pp Jar Files to the System|Configuring Dynamic Activation for CA Provisioning|Checking JDV Information|Configuring NE|Configuring Cluster Strategy|Configuration and Testing|Configuring Routing|Configuring Loose Error Handling (Optional)|Granting Authority to Provisioning User|Configuring Logging|Manage Custom Processing Log Settings|Deploy New Processing Log Settings|Undeploy Processing Log Settings|List Custom Processing Log Settings|Testing and Provisioning over CAI3G|Testing Tools for Sending Requests &ndash; SoapUI|LDAP Simulator &ndash; OpenLDAP|Application Data Browser &ndash; Apache Directory Studio|HTTP Test Server|Appendix A &ndash; CUDB Data Model in CUDB Configuration Files|XML Tags in CUDB Configuration Files|LDAP Attribute Entry|LDAP Attribute staticattr|Element attr|Appendix B &ndash; Version History|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|3|3.1|3.1.1|3.1.2|3.2|3.2.1|3.2.2|3.2.3|3.3|3.3.1|3.3.2|3.3.3|4|5|6|7|7.1|7.1.1|7.1.2|7.1.3|7.2|7.2.1|7.2.2|7.2.3|7.2.4|7.3|7.3.1|7.4|7.4.1|7.4.2|7.4.3|7.5|7.5.1|7.5.2|7.5.3|8|8.1|8.2|8.2.1|8.3|8.3.1|8.4|8.4.1|8.5|8.5.1|8.5.2|9|9.1|9.1.1|9.1.2|9.1.3|9.1.4|9.1.5|9.1.6|9.1.7|9.1.8|9.1.9|9.1.10|9.1.11|9.2|9.2.1|9.2.2|9.2.3|9.2.4|9.2.5|9.2.6|9.2.7|9.2.8|9.2.9|9.2.10|9.3|9.3.1|9.3.2|9.3.3|9.3.4|9.3.5|9.3.6|9.4|9.4.1|9.4.2|9.4.3|9.5|9.5.1|9.5.2|9.5.3|9.5.4|9.5.5|9.5.6|9.5.7|9.5.8|9.5.9|9.5.10|9.5.11|10|10.1|10.1.1|10.1.2|10.1.3|10.1.4|10.2|10.2.1|10.2.2|10.2.3|10.2.4|10.3|10.3.1|10.4|11|11.1|11.2|11.3|11.3.1|11.4|11.5|11.6|11.7|11.8|11.8.1|11.8.2|11.8.3|12|12.1|12.2|12.3|12.4|13|13.1|13.1.1|13.1.2|13.1.3|14|15|
|Introduction|Target Groups|Typographic Conventions|Parameters|Configuration|Disk Partitioning|Reference List|$|1|1.1|1.2|1.2.1|2|3|4|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Application Functions|Northbound Interfaces|Authentication|License Management|Event Service|Logging Service|Southbound Connectivity|Asynchronous Request Handler and Scheduling|Resilient Activation|Graphical User Interface|Batch Handler|Customization|System Characteristics|Deployment|Operation and Maintenance|Expansion of Dynamic Activation|Synchronization between Clusters|Synchronization of License Counters|Synchronization of Configuration|Limitations|Appendix A - Licenses Deployed on Dynamic Activation|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|2.10|2.11|3|3.1|3.2|3.3|4|4.1|4.2|5|6|7|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites|Response Types|Namespace|Access Point Name|Initiate Access Point Name (HECDAPI)|HECDAPI Request|HECDAPI Response|Print Access Point Name (HECDAPP)|HECDAPP Request|HECDAPP Response|Change Access Point Name (HECDAPC)|HECDAPC Request|HECDAPC Response|End Access Point Name (HECDAPE)|HECDAPE Request|HECDAPE Response|Bearer Capability Data|Initiate Bearer Capability Data (HECDBDI)|HECDBDI Request|HECDBDI Response|Print Bearer Capability Data (HECDBDP)|HECDBDP Request|HECDBDP Response|Change Bearer Capability Data (HECDBDC)|HECDBDC Request|HECDBDC Response|End Bearer Capability Data (HECDBDE)|HECDBDE Request|HECDBDE Response|Extended Quality of Service|Initiate Extended Quality of Service (HECDEQI)|HECDEQI Request|HECDEQI Response|Print Extended Quality of Service (HECDEQP)|HECDEQP Request|HECDEQP Response|Request Change Extended Quality of Service (HECDEQC)|HECDEQC Request|HECDEQC Response|End Extended Quality of Service (HECDEQE)|HECDEQE Request|HECDEQE Response|Interexchange Carrier|Initiate Interexchange Carrier (HECDIXI)|HECDIXI Request|HECDIXI Response|Print Interexchange Carrier (HECDIXP)|HECDIXP Request|HECDIXP Response|Change Interexchange Carrier (HECDIXC)|HECDIXC Request|HECDIXC Response|End Interexchange Carrier (HECDIXE)|HECDIXE Request|HECDIXE Response|Location Service Address|Initiate Location Service Address (HECDGLI)|HECDGLI Request|HECDGLI Response|Print Location Service Address (HECDGLP)|HECDGLP Request|HECDGLP Response|End Location Service Address (HECDGLE)|HECDGLE Request|HECDGLE Response|Zone Code Set|Initiate Zone Code Set (HECDZNI)|HECDZNI Request|HECDZNI Response|Print Zone Code Set (HECDZNP)|HECDZNP Request|HECDZNP Response|Change Zone Code Set (HECDZNC)|HECDZNC Request|HECDZNC Response|End Zone Code Set (HECDZNE)|HECDZNE Request|HECDZNE Response|GSM Service Control Function Address|Initiate GSM Service Control Function Address (HECDGSI)|HECDGSI Request|HECDGSI Response|Print GSM Service Control Function Address (HECDGSP)|HECDGSP Request|HECDGSP Response|Change GSM Service Control Function Address (HECDGSC)|HECDGSC Request|HECDGSC Response|End GSM Service Control Function Address (HECDGSE)|HECDGSE Request|HECDGSE Response|Roaming Service Areas|Change Roaming Service Area (HECDRAC)|HECDRAC Request|HECDRAC Response|Print Roaming Service Area (HECDRAP)|HECDRAP Request|HECDRAP Response|Roaming Service Profiles|Change Roaming Service Profiles (HECDRPC)|HECDRPC Request|HECDRPC Response|Print Roaming Service Profiles (HECDRPP)|HECDRPP Request|HECDRPP Response|Faults or Errors|General CLI Errors|Command Mapped Errors|HLR Errors|Appendix - HLR Classic and HLR-FE Layered Incompatibilities|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|2|2.1|2.1.1|2.1.2|2.2|2.2.1|2.2.2|2.3|2.3.1|2.3.2|2.4|2.4.1|2.4.2|3|3.1|3.1.1|3.1.2|3.2|3.2.1|3.2.2|3.3|3.3.1|3.3.2|3.4|3.4.1|3.4.2|4|4.1|4.1.1|4.1.2|4.2|4.2.1|4.2.2|4.3|4.3.1|4.3.2|4.4|4.4.1|4.4.2|5|5.1|5.1.1|5.1.2|5.2|5.2.1|5.2.2|5.3|5.3.1|5.3.2|5.4|5.4.1|5.4.2|6|6.1|6.1.1|6.1.2|6.2|6.2.1|6.2.2|6.3|6.3.1|6.3.2|7|7.1|7.1.1|7.1.2|7.2|7.2.1|7.2.2|7.3|7.3.1|7.3.2|7.4|7.4.1|7.4.2|8|8.1|8.1.1|8.1.2|8.2|8.2.1|8.2.2|8.3|8.3.1|8.3.2|8.4|8.4.1|8.4.2|9|9.1|9.1.1|9.1.2|9.2|9.2.1|9.2.2|10|10.1|10.1.1|10.1.2|10.2|10.2.1|10.2.2|11|11.1|11.2|11.3|12|13|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Backup and Restore|Backing Up and Restoring VM (KVM/VMware)|VM Backup|Restore VM Backup|Creating and Restoring VM Instance Snapshots (CEE)|Create Mandatory VM Instance Snapshot|Create Additional VM Instance Snapshot|Restore Mandatory VM Instance Snapshot|Restore Additional VM Instance Snapshot|Creating and Rebuilding VM Instance Snapshots (OpenStack)|Create VM Instance Snapshot|Rebuild VM Instance Snapshot|Backing Up and Restoring Dynamic Activation Software|Backing Up Dynamic Activation Software|Restoring Dynamic Activation Software|Backing Up and Restoring Zookeeper|Backing Up Zookeeper|Restoring Zookeeper|Backing Up and Restoring Cassandra (OAuth or Resource Configuration Related Data)|Backing Up Cassandra|Restoring Cassandra|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.1.1|2.1.2|2.2|2.2.1|2.2.2|2.2.3|2.2.4|2.3|2.3.1|2.3.2|2.4|2.4.1|2.4.2|2.5|2.5.1|2.5.2|2.6|2.6.1|2.6.2|3|
|Introduction|Target Groups|Typographic Conventions|Parameters|Configuration|Disk Partitioning|Reference List|$|1|1.1|1.2|1.2.1|2|3|4|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Layered EIR Provisioning Solution|Overview|Data Model EIR-FE|Atomicity and Integrity Handling|EIR Provisioning|Equipment / Equipments|Search Order|Equipment Status|Mobile Station|Cloned Handset User|Fixed SIM|EIR Massive Searches|Equipment|Search Orders|Cloned Handset Users|Fixed SIM|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|2.4|2.4.1|2.4.2|2.4.3|2.4.4|2.4.5|2.4.6|2.5|2.5.1|2.5.2|2.5.3|2.5.4|3|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites|Namespaces|Legends|Operations|Web Service Interface|MOType|MOId|Delete Association|Request Data|Examples|Create Identifier|Request Data|Examples|Set Identifier|Request Data|Examples|Delete Identifier|Request Data|Examples|Delete MultipleSubscriptionAssociationData|Request Data|Examples|Delete MultipleSubscriptionData|Request Data|Examples|Set MultipleSubscriptionPrimaryMSISDN|Request Data|Examples|Delete MultipleSubscriptionSecondaryMSISDN|Request Data|Examples|Delete MultiServiceConsumer|Request Data|Examples|Faults and Errors|Subordinate HLR AUC Subscription Error Codes|CAI3G Error Message Example|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|1.8|1.9|1.10|2|2.1|2.2|3|3.1|3.2|4|4.1|4.2|5|5.1|5.2|6|6.1|6.2|7|7.1|7.2|8|8.1|8.2|9|9.1|9.2|10|10.1|10.2|11|11.1|11.2|12|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Prerequisites|Preparing for NBIA Development Environment|IDE Installation|Prerequisites|Eclipse|Wizard|Installation of Wizard|Tutorial Project Overview|Adapted Northbound SOAP Interface|High-Level Use Cases|Creating a Subscription|Getting a Subscription|Setting a Subscription|Deleting a Subscription|Northbound Interface Adapter Development|Creating a Northbound Interface Wizard Project|Implementing the Northbound Interface|Project Structure|Northbound Interface Implementation|Web Services Implementation|Using Statistics Service|Packaging Northbound Adapter|Deployment|Administrating the Northbound Interface Adapter|Installing the Northbound Interface Adapter|Activate the Northbound Interface Adapter|Checking the Submodule Status|Uninstalling the Northbound Interface Adapter|Updating the Northbound Interface Adapter|Setting Properties for the Northbound Interface Adapter|Creating Properties for the Cluster Northbound Interface Adapter|Modifying Properties for the Cluster Northbound Interface Adapter|Restore the Default Value of the Property for the Cluster Northbound Interface Adapter|Configuring ESA Alarms|Adding the Alarm Definition|Configuring Alarm Resource ID|Raising an Alarm|Configuring Logs|Configuring Security|Verifying the Northbound Adapter|Creating a Subscription|Setting a Subscription|Getting a Subscription|Deleting a Subscription|Faults or Errors|Reference List|$|1|1.1|1.2|1.3|1.4|2|2.1|2.1.1|2.1.2|2.2|2.2.1|3|3.1|3.2|3.2.1|3.2.2|3.2.3|3.2.4|4|4.1|4.2|4.2.1|4.2.2|4.2.3|4.2.4|4.2.5|5|5.1|5.1.1|5.1.2|5.1.3|5.1.4|5.1.5|5.2|5.2.1|5.2.2|5.2.3|5.3|5.3.1|5.3.2|5.3.3|5.4|5.5|6|6.1|6.2|6.3|6.4|6.5|7|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Layered AAA Provisioning Solution|Overview|Data Model AAA|Atomicity and Integrity Handling|AAA Provisioning|AAA User|AAA Group|AAA Policy|AAA Massive Operation|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|2.4|2.4.1|2.4.2|2.4.3|2.4.4|3|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Namespaces|Legends|Operations|Multiple Values|Web Service Interface|MOType|MOId|Get Subscriber Profile|Request Data|Parameters|Response Data|Parameters|Examples|Set Subscriber Profile|Request Data|Parameters|Examples|Create CAMEL Subscription Data|Request Data|Parameters|Examples|Get CAMEL Subscription Data|Request Data|Parameters|Response Data|Examples|Set CAMEL Subscription Data|Request Data|Parameters|Examples|Delete CAMEL Subscription Data|Request Data|Parameters|Examples|Set CAMEL Extended Information|Request Data|Parameters|Examples|Create CAMEL Triggering Criteria|Request Data|Parameters|Examples|Delete CAMEL Triggering Criteria|Request Data|Parameters|Examples|Get PDP Context Profile|Request Data|Parameters|Response Data|Parameters|Examples|Set PDP Context Profile|Request Data|Parameters|Examples|Create M2M Service Profile|Request Data|Parameters|Examples|Get M2M Service Profile|Request Data|Parameters|Response Data|Examples|Faults and Errors|Subordinate HLR Error Codes|CAI3G Error Message Example|Appendix - HLR Classic and HLR-FE Layered Incompatibilities|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|1.8|1.9|1.10|1.11|2|2.1|2.1.1|2.2|2.2.1|2.3|3|3.1|3.1.1|3.2|4|4.1|4.1.1|4.2|5|5.1|5.1.1|5.2|5.3|6|6.1|6.1.1|6.2|7|7.1|7.1.1|7.2|8|8.1|8.1.1|8.2|9|9.1|9.1.1|9.2|10|10.1|10.1.1|10.2|11|11.1|11.1.1|11.2|11.2.1|11.3|12|12.1|12.1.1|12.2|13|13.1|13.1.1|13.2|14|14.1|14.1.1|14.2|14.3|15|15.1|15.2|16|17|
|Introduction|Purpose and Scope|Target Group|Typographic Conventions|Overview|Layered SAPC|Monolithic SAPC|SAPC Configuration|Data Model|Layered SAPC|CUDB|SAPC-FE|Monolithic SAPC|Monolithic SAPC with LDAP Protocol|Monolithic SAPC with REST Protocol|Atomicity and Integrity Handling|CUDB|Monolithic SAPC and SAPC-FE|SAPC Provisioning|SAPC Subscription|SAPC Family|SAPC Data Plan|SAPC Massive Operation|Reference List|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|3|3.1|3.1.1|3.1.2|3.2|3.2.1|3.2.2|4|4.1|4.2|5|5.1|5.2|5.3|5.4|6|
|Introduction|Purpose and Scope|Target Groups|Typographic Conventions|Prerequisites|Namespaces|Legends|Operations|Web Service Interface|MOType|MOId|Create AIR Subscription|Request Data|Response Data|Examples|Get AIR Subscription|Request Data|Response Data|Examples|Set AIR Subscription|Request Data|Response Data|Examples|Delete AIR Subscription|Request Data|Response Data|Examples|Get AIR Offer|Request Data|Response Data|Examples|Set AIR Offer|Request Data|Response Data|Examples|Delete AIR Offer|Request Data|Response Data|Examples|Set AIR refill|Request Data|Response Data|Examples|Set AIR Communication ID|Request Data|Response Data|Examples|Get Accumulators|Request Data|Response Data|Examples|Set Accumulators|Request Data|Response Data|Examples|Delete Accumulators|Request Data|Response Data|Examples|Set AIR Run Periodic Account Management|Request Data|Response Data|Examples|Get AIR Capabilities|Request Data|Response Data|Examples|Create AF Subscription|Request Data|Examples|Set AF Subscription|Request Data|Examples|Get AF Subscription|Request Data|Response Data|Examples|Delete AF Subscription|Request Data|Examples|Create AF Identifier|Request Data|Examples|Set AF Identifier|Request Data|Examples|Get AF Identifier|Request Data|Response Data|Examples|Delete AF Identifier|Request Data|Examples|Set PredefinedOffer|Request Data|Response Data|Examples|Get PredefinedOffer|Request Data|Response Data|Examples|Delete PredefinedOffer|Request Data|Response Data|Examples|Faults and Errors|AIR Error Codes|AF Error Codes|CAI3G Error Message Example|Reference List|$|1|1.1|1.2|1.3|1.4|1.5|1.6|1.7|1.8|1.9|1.10|2|2.1|2.2|2.3|3|3.1|3.2|3.3|4|4.1|4.2|4.3|5|5.1|5.2|5.3|6|6.1|6.2|6.3|7|7.1|7.2|7.3|8|8.1|8.2|8.3|9|9.1|9.2|9.3|10|10.1|10.2|10.3|11|11.1|11.2|11.3|12|12.1|12.2|12.3|13|13.1|13.2|13.3|14|14.1|14.2|14.3|15|15.1|15.2|15.3|16|16.1|16.2|17|17.1|17.2|18|18.1|18.2|18.3|19|19.1|19.2|20|20.1|20.2|21|21.1|21.2|22|22.1|22.2|22.3|23|23.1|23.2|24|24.1|24.2|24.3|25|25.1|25.2|25.3|26|26.1|26.2|26.3|27|27.1|27.2|27.3|28|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
