Ultra Gateway Platform System Administration Guide, Release 6.4

Total Page:16

File Type:pdf, Size:1020Kb

Ultra Gateway Platform System Administration Guide, Release 6.4 Ultra Gateway Platform System Administration Guide, Release 6.4 First Published: 2018-11-02 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com go trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R) © 2018 Cisco Systems, Inc. All rights reserved. CONTENTS PREFACE About this Guide xxix Conventions Used xxix Related Documentation xxxi Contacting Customer Support xxxi CHAPTER 1 Ultra Services Platform (USP) Introduction 1 USP Introduction 1 USP Architecture 2 USP VNF Architecture 3 Ultra Element Manager (UEM) 3 Life Cycle Manager 6 Service Configuration Manager 7 Service Level Agreement Manager 8 Control Function 10 Service Function 11 Network Function 12 Application Function 13 USP VNF Types 14 Ultra Gateway Platform 15 Ultra Service Framework 15 Ultra Automation Services 16 AutoIT-NFVI 18 AutoIT-VNF 19 AutoIT 19 AutoDeploy 22 AutoVNF 24 Ultra Gateway Platform System Administration Guide, Release 6.4 iii Contents Ultra Web Services 27 USP VNF Component Redundancy and Availability 28 Platform Requirements 28 UEM Redundancy 28 CF Redundancy 29 SF Redundancy 29 NF Redundancy 30 AF Redundancy 30 Ultra Service Component (USC) Redundancy 30 ICSR Support 30 CHAPTER 2 Introduction to UGP 31 Product Description 31 Hypervisor Requirements 31 Underlying Infrastructure for the System 31 DI Network 33 Network Requirements 34 Jumbo Frames 35 Record Storage 36 Orchestration Network 36 Service Network 36 Packet Flows 36 Packets Received on SF Demux VM 36 Packets Received on SF Session VM 37 DPDK Internal Forwarder 38 Bandwidth Requirements 39 Feature Set 40 Interfaces and Addressing 40 Encryption 41 Security 41 Orchestration 41 Provisioning 42 Boot Sequence 42 CF Boot Sequence 42 Ultra Gateway Platform System Administration Guide, Release 6.4 iv Contents SF Boot Sequence 43 Capacity, CEPS and Throughput 43 Diagnostics and Monitoring 43 Cisco Prime Analytics 43 StarOS UGP Build Components 44 Software Installation and Network Deployment 44 CHAPTER 3 System Operation and Configuration 45 Terminology 45 Contexts 45 Logical Interfaces 45 Management Interface 46 Bindings 46 Services 46 AAA Servers 47 Subscribers 47 How the System Selects Contexts 48 Context Selection for Context-level Administrative User Sessions 48 Context Selection for Subscriber Sessions 51 Understanding Configuration Files 51 IP Address Notation 52 IPv4 Dotted-Decimal Notation 52 IPv6 Colon-Separated-Hexadecimal Notation 53 CIDR Notation 53 Alphanumeric Strings 54 Character Set 54 Quoted Strings 55 CHAPTER 4 Getting Started 57 Initial StarOS Configuration 57 Using the StarOS CLI for Initial Configuration 57 Configuring System Administrative Users 59 Limiting the Number of Concurrent CLI Sessions 59 Automatic Logout of CLI Sessions 60 Ultra Gateway Platform System Administration Guide, Release 6.4 v Contents Configuring the System for Remote Access 60 Configuring SSH Options 62 SSH Host Keys 63 Setting SSH Key Size 63 Configuring SSH Key Generation Wait Time 64 Specifying SSH Encryption Ciphers 64 Generating SSH Keys 65 Setting SSH Key Pair 65 Authorized SSH User Access 66 Authorizing SSH User Access 66 SSH User Login Restrictions 66 Creating an Allowed Users List 67 SSH User Login Authentication 67 Secure Session Logout 68 Changing Default sshd Secure Session Logout Parameters 69 SSH Client Login to External Servers 69 Setting SSH Client Ciphers 69 Setting Preferred Authentication Methods 70 Generating SSH Client Key Pair 71 Pushing an SSH Client Public Key to an External Server 71 Enabling NETCONF 72 Configuring the Management Interface with a Second IP Address 72 VM Hardware Verification 73 CHAPTER 5 System Settings 75 Verifying and Saving Your Interface and Port Configuration 75 Configuring System Timing 76 Setting the System Clock and Time Zone 76 Verifying and Saving Your Clock and Time Zone Configuration 76 Configuring Network Time Protocol Support 77 Configuring NTP Servers with Local Sources 78 Using a Load Balancer 78 Verifying the NTP Configuration 78 Configuring Software RSS 80 Ultra Gateway Platform System Administration Guide, Release 6.4 vi Contents DI-Network RSS Encryption 80 Feature Summary and Revision History 80 Feature Changes 81 Command Changes 81 Configuring SF Boot Configuration Pause 81 Enabling CLI Timestamping 82 Configuring CLI Confirmation Prompts 82 Enabling Automatic Confirmation 82 Requiring Confirmation for autoconfirm and configure Commands 83 Requiring Confirmation for Specific Exec Mode Commands 83 Configuring System Administrative Users 84 User Name Character Restrictions 85 Configuring Context-level Administrative Users 85 Configuring Context-level Security Administrators 85 Configuring Context-level Administrators 86 Configuring Context-level Operators 86 Configuring Context-level Inspectors 87 Segregating System and LI Configurations 87 Verifying Context-level Administrative User Configuration 88 Configuring Local-User Administrative Users 89 Verifying Local-User Configuration 89 Updating Local-User Database 89 Updating and Downgrading the local-user Database 90 Restricting User Access to a Specified Root Directory 91 Configuring an SFTP root Directory 91 Associating an SFTP root Directory with a Local User 91 Associating an SFTP root Directory with an Administrator 91 Associating an SFTP root Directory with a Config Administrator 92 Configuring TACACS+ for System Administrative Users 92 Operation 92 User Account Requirements 93 TACACS+ User Account Requirements 93 StarOS User Account Requirements 94 Configuring TACACS+ AAA Services 94 Ultra Gateway Platform System Administration Guide, Release 6.4 vii Contents Configuring TACACS+ for Non-local VPN Authentication 95 Verifying the TACACS+ Configuration 95 Separating Authentication Methods 96 Disable TACACS+ Authentication for Console 96 Disable AAA-based Authentication for Console 97 Disable TACACS+ Authentication at the Context Level 97 Limit local-user Login on Console/vty Lines 97 Limit Console Access for AAA-based Users 98 Verify Configuration Changes 98 Configuring a Chassis Key 99 Overview 99 Configuring a New Chassis Key Value 99 CLI Commands 99 Quick Setup Wizard 100 Enabling Automatic Reset of FSC Fabric 100 CHAPTER 6 Config Mode Lock Mechanisms 103 Overview of Config Mode Locking 103 Requesting an Exclusive-Lock 104 Effect of Config Lock on URL Scripts 105 Saving a Configuration File 106 Reload and Shutdown Commands 106 show administrators Command 107 CHAPTER 7 Management Settings 109 SNMP MIB Browser 109 SNMP Support 111 Configuring SNMP and Alarm Server Parameters 112 Verifying SNMP Parameters 113 Controlling SNMP Trap Generation 114 CHAPTER 8 Verifying and Saving Your Configuration 115 Verifying the Configuration 115 Feature Configuration 115 Ultra Gateway Platform System Administration Guide, Release 6.4 viii Contents Service Configuration 116 Context Configuration 116 System Configuration 116 Finding Configuration Errors 116 Synchronizing File Systems 117 Saving the Configuration 117 CHAPTER 9 System Interfaces and Ports 119 Contexts 119 Creating Contexts 119 Viewing and Verifying Contexts 119 Ethernet Interfaces
Recommended publications
  • INAP); Part 1: Protocol Specification for Camel Phase 2 2 Draft ETSI EN 301 668-1 V1.1.1 (1999-07
    Draft ETSI EN 301 668-1 V1.1.1 (1999-07) European Standard (Telecommunications series) Intelligent Network (IN); Intelligent Network Capability Set 1 (CS1) extension; Intelligent Network Application Protocol (INAP); Part 1: Protocol specification for Camel Phase 2 2 Draft ETSI EN 301 668-1 V1.1.1 (1999-07) Reference DEN/SPS-03053-1 (fg090ico.PDF) Keywords IN, INAP, ISDN, mobile, protocol ETSI Postal address F-06921 Sophia Antipolis Cedex - FRANCE Office address 650 Route des Lucioles - Sophia Antipolis Valbonne - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Internet [email protected] Individual copies of this ETSI deliverable can be downloaded from http://www.etsi.org If you find errors in the present document, send your comment to: [email protected] Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. © European Telecommunications Standards Institute 1999. All rights reserved. ETSI 3 Draft ETSI EN 301 668-1 V1.1.1 (1999-07) Contents Intellectual Property Rights ............................................................................................................................... 6 Foreword............................................................................................................................................................ 6 1 Scope.......................................................................................................................................................
    [Show full text]
  • Release Notes Release 10.3.0.2 E98788-01
    Oracle® Communications Performance Intelligence Center Oracle Communications Performance Intelligence Center Release Notes Release 10.3.0.2 E98788-01 November 2019 Oracle® Communications Performance Intelligence Center Oracle Communications Performance Intelligence Center Release Notes, Release 10.3.0.2 Copyright © 2003, 2019 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notices are applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • N2SCP CAMEL/INAP Conformance
    N-Squared Software N2SCP CAP/INAP Protocol Conformance Statement Version 2020-08 N2SCP CAP/INAP Protocol Conformance Statement Version 2020-08 1 Document Information 1.1 Scope and Purpose This document describes the implementation of the CAMEL (including INAP variants) protocol for real- time SCP flows for voice interaction control using the N-Squared Service Control Point (N2SCP) family of applications. The N2SCP family of applications includes: • N2DSG-SCP (CAMEL/Diameter Signalling Gateway) • N2NP-SCP (Number Portability translation application) • N2ACD-SCP (Advanced Call Distribution application for Toll-Free and other routing services) • …plus other custom SCP services that may be developed. All of these applications use the N2SCP framework. They do not typically use all of the framework. Please refer to the relevant technical guide ([R-N2-DSG-TG], [R-N2-NP-TG], [R-N2-ACD-TG]) for application-specific scenarios and configuration parameters. This document assumes a working knowledge of the relevant CAP/INAP and other telephony concepts, including the standard CAP/INAP interactions between an SCP, an SSP, and an SRP (or Intelligent Peripheral). 1.2 Definitions, Acronyms, and Abbreviations Term Meaning AC Apply Charging ACR Apply Charging Report ARI Assist Request Instructions ASN.1 Abstract Syntax Notation One AT Activity Test BCSM Basic Call State Model CAMEL Customized Applications for Mobile Network Enhanced Logic CAP CAMEL Application Part CIR Call Information Request/Report CTR Connect To Resource CWA Continue With Argument DFC
    [Show full text]
  • CAMEL User's Guide Contains the Following Information: No Title Description 1 Introduction to CAMEL Overview of CAMEL Protocols
    Document Part Number: P_EXCL_CAMEL_UG_2.5 COPYRIGHT Copyright © 2003 IntelliNet Technologies, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or any means electronic or mechanical, including photocopying and recording for any purpose other than the reader’s personal use without the written permission of IntelliNet Technologies, Inc. Information in this document is subject to change without notice. IntelliNet Technologies 1990 W. New Haven Ave., Suite 307 Melbourne, FL 32904 U.S.A. Phone: +1 321 726 0686 Fax: +1 321 726 0683 Web site: www.intellinet-tech.com TRADEMARKS IntelliNet Technologies and the IntelliNet Technologies logo are trademarks of IntelliNet Technologies, Inc. Other brands and their products are registered trademarks or trademarks of their respective owners. 2 CAMEL User’s Guide Revision History Revision Date Notes Rev. 1.0 7-9-2003 Begin document modification for Lucent Excel (P. Arteaga) Rev. 2.0 7-30-2003 Contents of the document reorganized per Gururaj and Santanu (Shobha). Rev. 2.1 9-10-2003 Added details of every message (Invoke and Response) along with the associated parameters and the header files in Chapter 3 (Shobha). Rev. 2.2 9-11-2003 Updated Chapter 5 (Shobha). Rev. 2.3 9-15-2003 Added licensing section (Shobha). Rev. 2.4 11-07-2003 Added section Building and Running CAMEL Application on HP-UX (Shobha). Rev. 2.5 11-10-2003 Added section Building and Running CAMEL Application on Linux (Shobha). 3 CAMEL User’s Guide Contents Revision
    [Show full text]
  • MAPS™ Brochure from Brochures.Html Website, Or Refer to Webpage
    Message Automation & Protocol Simulation (MAPS™) Multi-Interface, Multi-Protocol Simulator - TDM, IP, 2G, 3G, 4G, 5G Overview GL's Message Automation & Protocol Simulation (MAPS™) is a protocol simulation/ emulation and conformance test tool that supports a variety of protocols such as MGCP, SIP, MEGACO, SS7, ISDN, GSM, CAS, MC- MLPPP, MAP, LTE, UMTS, SS7 SIGTRAN, ISDN SIGTRAN, SIP I, Diameter, MAP IP, 5G N1 N2, N4 and others. This protocol emulation tool covers solutions for both protocol simulation and analysis. The product also supports RTP, TDM, TRAU GSM, and Mobile traffic simulation over various network. The application includes various test plans and test cases to support the testing of real- time entities. Along with automation capability, the application gives users the unlimited ability to edit messages and control call scenarios (message sequences). "Call Scenarios" are generated through scripts. MAPS™ is designed to work on TDM interfaces as well as on the Ethernet interfaces. TDM signaling protocols such as SS7, ISDN, CAS, MC-MLPPP, MAP, IUP, CAP, INAP, GSM, and FXO/FXS operate over TDM networks, whereas SIP, MEGACO, and MGCP operate over IP networks. MAPS™ supports 3G & 4G mobile protocol simulation such as LTE (S1, eGTP) interfaces, LTE Diameter [S6a, S6d, S13, Cx/Dx, Gx, Rx, SLg, SLh], INAP IP (ANSI, ITU), CAP IP (ANSI, ITU), GSM A over IP, SKINNY, MAP IP, BICC IP, GPRS, and UMTS (IuCS, IuPS, IuH) over IP. MAPS™ architecture supports both Binary and Text Based Protocol Simulation. MAPS™ also supports Location Services (LCS) simulation for positioning mobile devices. Simulates SLg, SLh interfaces (GMLC, MME, HSS), Lg, Lh interfaces (GMLC, MSC, SGSN, HLR), SLs interface (MME, E-SMLC) and Lb interface (MME, SMLC) and interfaces implementing positioning functionality in a cellular network.
    [Show full text]
  • IDP and Analyzed Information Features 910-5805-001 Revision a December 2009
    Tekelec EAGLE® 5 Integrated Signaling System Feature Manual - IDP and Analyzed Information Features 910-5805-001 Revision A December 2009 Copyright 2009 Tekelec. All Rights Reserved. Printed in USA. Legal Information can be accessed from the Main Menu of the optical disc or on the Tekelec Customer Support web site in the Legal Information folder of the Product Support tab. Table of Contents Chapter 1: Introduction.......................................................................9 Introduction.............................................................................................................................10 Scope and Audience...............................................................................................................10 Manual Organization..............................................................................................................10 Related Publications...............................................................................................................11 Documentation Availability, Packaging, and Updates.....................................................11 Documentation Admonishments..........................................................................................12 Customer Care Center............................................................................................................12 Emergency Response..............................................................................................................14 Locate Product Documentation on the Customer
    [Show full text]
  • SS7 Signalling in Mobile Networks – 3 Days
    SS7 Signalling in Mobile Networks – 3 days CONTENTS The SS7 Signalling in Mobile Networks course explains and describes the world’s most widespread inter-exchange signalling system used in fixed and mobile telecommunication today: Signalling System No 7. It provides the basic ideas and structure of the SS7 protocol stack. Different aspects of various signalling protocols and signalling applications in the telecommunications world are covered. There are a few detailed examples from both mobile and fixed networks. The course focus is on ITU SS7 and GSM/UMTS core network protocols that are based on SS7 system. The participants will also gain a general understanding on how to interpret log files and traces taken from live networks. PREREQUISITES General telecom and basic signalling knowledge is recommended. For background knowledge, we recommend the Apis’ course 3GPP Mobile Systems Overview. SS7 Introduction • The overview of the SS7 system • The definition and structure of the SS7 signalling network: SP, STP, SL, LS, etc. • The logical division of SS7: MTP and User Parts • Use of SS7 protocol in 2G and 3G mobile networks and fixed networks • Overview of various SS7 protocols MTP - Message Transfer Part • The functions of the different MTP levels • The structure and functions of MTP signal units, signalling link states and link management functions • MTP 3 message handling – addressing, routing, load sharing, and distribution • The overview of Signalling Network Management and Testing functions ISUP - ISDN User Part • Use and functions of
    [Show full text]
  • TR 129 903 V5.0.0 (2001-12) Technical Report
    ETSI TR 129 903 V5.0.0 (2001-12) Technical Report Universal Mobile Telecommunications System (UMTS); Feasibility study on SS7 signalling transportation in the core network with SCCP-User Adaptation (SUA) (3GPP TR 29.903 version 5.0.0 Release 5) 3 GPP TR 29.903 version 5.0.0 Release 5 1 ETSI TR 129 903 V5.0.0 (2001-12) Reference DTR/TSGN-0429903v500 Keywords UMTS ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, send your comment to: [email protected] Copyright Notification No part may be reproduced except as authorized by written permission.
    [Show full text]
  • EN 301 668-1 V1.1.2 (2000-05) European Standard (Telecommunications Series)
    Final draft ETSI EN 301 668-1 V1.1.2 (2000-05) European Standard (Telecommunications series) Intelligent Network (IN); Intelligent Network Capability Set 1 (CS1) extension; Intelligent Network Application Protocol (INAP); Part 1: Protocol specification for Camel Phase 2 2 Final draft ETSI EN 301 668-1 V1.1.2 (2000-05) Reference DEN/SPS-03053-1 Keywords IN, INAP, ISDN, mobile, protocol ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.:+33492944200 Fax:+33493654716 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://www.etsi.org/tb/status/ If you find errors in the present document, send your comment to: [email protected] Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media.
    [Show full text]
  • SS7 Vulnerabilities
    Contents 1. Introduction ..................................................................................... 3 2. Market Drivers and Business Challenges ..................................5 2.1 History of SS7 ..................................................................................................................... 5 2.2 Evolution to Diameter ......................................................................................................... 6 3. SS7 Security Threats .....................................................................8 3.1 Requirements for carrying out an attack .................................................................. 8 3.2 Who is the Attacker? ........................................................................................................ 8 3.3 Types of Network / Subscriber Attacks ..................................................................... 9 3.3.1 Subscriber Identity Disclosure ......................................................................................... 9 3.3.2 Discovery of Subscribers Location .............................................................................. 13 3.3.3 Disruption of Subscribers Availability ........................................................................ 16 3.3.4 Intercepting SMS Messages ........................................................................................... 20 3.3.5 Manipulation of USSD Request ..................................................................................... 23 3.3.6 Manipulation
    [Show full text]
  • PIC 9.0.4 Release Notice
    Oracle® Communications Performance Intelligence Center Release Notice Release 9.0.4 910-6618-01 Revision K January 2015 Oracle Communications Performance Intelligence Center Release Notice, Release 9.0.4 Copyright © 2000, 2015, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notices are applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • IN@Vantage in Introduction V7a
    Intelligent Network IN@vantage IN Introduction V7a IN Training Center Intelligent Network Training Center Vienna IN Introduction V7a Edition 9/02 Technical modifcations possible. Technical specifications and features are binding only insofar as they are specifically and ex- pressly agreed upon in a written contract. The software and hardware names used in this document are registered trademarks and are thus subject to the legal provisions thereof. The reproduction, transmission or use of this document or its contents is not permitted without express written authority. Offenders will be liable for damages. All rights, including rights created by patent grant or registrations of a utility model or design, are reserved. Intelligent Network IN Introduction V7a Contents 1 What is an Intelligent Network? ................................................................................... 1-3 1.1 Example: Prepaid Service (PPS) ........................................................................................1-4 1.1.1 Life Cycle ..........................................................................................................................1-4 1.1.2 Additional Features............................................................................................................1-6 1.1.3 PPS – Service Logic for Online Charging..........................................................................1-10 1.2 IN Goals ..........................................................................................................................1-12
    [Show full text]