Applies To:Show Versions
- 11.5.10, 11.5.9, 11.5.8, 11.5.7, 11.5.6, 11.5.5, 11.5.4, 11.5.3, 11.5.2, 11.5.1
Overview: Configuring quota management
You can use the Policy Enforcement Manager to provision prepaid charging per subscriber or application that communicates with the quota protocol endpoint (QPE), such as online charging system (OCS), over the 3GPP Gy interface. The Gy endpoint allows online credit control for service data flow-based charging. This type of policing is called quota management; this feature ensures that subscribers do not consume resources that are not authorized.
About Gy support and rating groups
The Gy interface in 3GPP architecture facilitates communication between the online charging system (OCS) and the PCEF. In turn, this communication supports the advanced credit authorization and quota-specific reporting. Policy Enforcement Manager provides online credit control, through user configuration, for service data flow-based charging. The BIG-IP system logically links between Gx and Gy.
The subscriber traffic contains allocated quota that is based on applications, category, or a group of them and is measured in terms of volume, time, and events. You can create a rating group, which is the same as a quota bucket. A rating group is identified by a service-identifier AVP that gathers a set of services, which has the same costs and rating type. Once you create a rating group, you can assign it to multiple rules inside the policy. For all the traffic matching the rule, quota is consumed from this bucket to make sure there is no over-subscription of resources. For example, you can have a rating group assigned to managing video traffic of 500 MB. This rating group needs to be assigned to a rule that matches the video traffic, to ensure that there is no over-subscription of subscriber traffic.
Creating a listener for quota management
- On the Main tab, click The Listeners screen opens. .
- Click Create. The New Listener screen opens.
- In the Name field, type a unique name for the listener.
For the Destination setting, select Host
or Network, and type the IP address or network and netmask to
Tip: You can use a catch-all virtual server (0.0.0.0) to specify all traffic that is routed to the BIG-IP system.The system will create a virtual server using the address or network you specify.
- For the Service Port setting, type or select the service port for the virtual server.
- From the Protocol list, select the protocol of the traffic for which to deploy enforcement policies (TCP, UDP, or TCP and UDP). The system will create a virtual server for each protocol specified.
- To use network address translation, from the Source Address Translation list, select Auto Map. The system treats all of the self IP addresses as translation addresses.
- For the VLANs and Tunnels setting, move the VLANs and tunnels that you want to monitor from the Available list to the Selected list.
- For subscriber provisioning using RADIUS, ensure that Subscriber Identity Collection is set to RADIUS.
- For the VLANs and Tunnels setting, move the VLANs and tunnels that you want to monitor for RADIUS traffic from the Available list to the Selected list.
In the Policy Provisioning area, select enforcement policies to apply to the
For Global Policy, move policies to apply to all subscribers
to High Precedence or Low Precedence.
Note: For URL categorization to take effect, you need to associate the enforcement policy with a classification profile.
- For Unknown Subscriber Policy, move policies to use if the subscriber is unknown to Selected.
- For Global Policy, move policies to apply to all subscribers to High Precedence or Low Precedence.
- To connect to a PCRF, from the Diameter Endpoint list, select Enabled and select Gy from the Supported Apps options.
- In the Product Name field, type the product name which is used to communicate with the OCS.
- In the Origin Host field, type the fully qualified domain name of the OCS, for example, ocs.xnet.com.
- In the Origin Realm field, type the realm name or network in which the OCS resides, for example, xnet.com.
- In the Destination Host field, type the destination host name of the OCS, for example, ocsdest.net.com.
- In the Destination Realm field, type the realm name or network of the OCS, for example, net.com.
- For the Pool Member Configuration setting, add the OCS servers that are to be members of the Gy endpoint pool. Type the Member IP Address and Port number, then click Add.
- In the Message Retransmit Delay field, type the number of milliseconds to wait before retransmitting unanswered messages in case of failure from the BIG-IP system to the OCS over the Gy interface. The default value is 1500.
- In the Message Max Retransmit field, type the maximum number of times that messages can be retransmitted from the BIG-IP system to the OCS. The default value is 2.
- In the Fatal Grace Time field, type the time period in seconds that a diameter connection can remain disconnected before the system terminates all sessions associated with that diameter endpoint. The default value is 500.
- Click Finished. The Policy Enforcement Manager creates a listener, and displays the listener list.
Creating rating groups
- On the Main tab, click The Rating Groups List screen opens. .
- Click Create. The New Rating Group screen opens.
- In the Name field, type a name for the rating group.
- In the Description field, type optional descriptive text for the rating group.
- In the Rating Group ID field, type an unique identifier (integer). This Rating Group ID is used by the quota managing endpoint, such as, Gy.
- In the Initial Quota setting, specify Volume in octets, the initial quota to receive and send from the OCS, and the total quota volume.
- In the Initial Quota setting, specify Time in seconds, the initial time for quota.
- In the Default Quota setting, specify Volume in octets, the default quota to receive and send from the OCS, and the total quota volume.
- In the Threshold field, type a default threshold level you want to use for a sending quota replenishment request. The default value is 0, which indicates that there is no threshold.
- In the Usage Time field, type the quota for how long the traffic can be used.
- In the Consumption Time field, type the maximum idle time that is accounted as quota usage. This is the default value of quota for time and specifies time units for charging as well.
- In the Validity Time field, type the duration for which the quota is used, if the online charging system (OCS) does not specify the validity time.
In the Holding Time field, type the holding time (in
seconds), for which the quota is valid without any usage, if the time is not
specified by the OCS.
Note: The default values for consumption time, validity time and holding time are used, when the OCS does not specify them.
From the Breach Action list, select the appropriate
action to be taken when default quota expires or OCS does not provide new quota
or breach action.
Breach Action Description Terminate The system stops traffic when quota is breached. Allow The system allows traffic to go through even when the quota is breached. Redirect The system redirects traffic to the forwarding endpoint, when quota is breached.
- From the Request on Install list, select Yes if the quota has to be requested from the Gy, when the policy is installed for a subscriber. Otherwise, select No for quota to be requested when one of the applications associated with the rating group is detected.