Applies To:Show Versions
- 11.6.5, 11.6.4, 11.6.3, 11.6.2, 11.6.1
Configuring Quota Management using Rating Groups
Overview: Configuring quota management
You can use the Policy Enforcement Manager™ to implement quota management process for prepaid subscribers per session and per application. You can provision prepaid charging per subscriber or application that communicates with the quota protocol endpoint (QPE), such as online charging system (OCS), over the 3GPP Gy interface. The Gy endpoint allows online credit control for Layer 4 to 7 service data flow-based charging. This type of policing is called quota management; this feature ensures that subscribers do not consume resources that are not authorized.
About Gy support and rating groups
The Gy interface in 3GPP architecture facilitates communication between the online charging system (OCS) and the PCEF. In turn, this communication supports the advanced credit authorization and quota-specific reporting. Policy Enforcement Manager™ provides online credit control, through user configuration, for Layer 4 to 7 service data flow-based charging.
The subscriber traffic contains consumed based on allocated quota that is based on applications, category, or a group of them and is measured in terms of volume, time, and events. A rating group, which is the same as a quota bucket, can be created. A rating group is identified by a service-identifier AVP that gathers a set of services, which has the same costs and rating type. Once you create a rating group, you can assign it to multiple rules inside the policy. For all the traffic matching the rule, quota is consumed from this bucket to make sure there is no over-subscription of resources. For example, you can have a rating group assigned to managing video traffic of 500 MB. This rating group needs to be assigned to a rule that matches the video traffic, to ensure that there is no over-subscription of subscriber video traffic.
Creating a listener for quota management
- On the Main tab, click .The Control Plane Listeners page opens.
- In the Policy Provisioning and Online Charging Virtuals area, click Add.The New Configure Diameter Endpoint Provisioning and Online Charging screen opens.
- In the Name Prefix field, type a unique name for the listener.
- In the Description field, type a description of the listener.
- From the VLAN and Tunnel Traffic list, select Enabled on. Then, for the VLANs and Tunnels setting, move the VLAN or VLANs on which you want to allow the virtual servers to share traffic from the Available list to the Selected list.
- For the VLANs and Tunnels setting, move the VLANs and tunnels that you want to monitor from the Available list to the Selected list.
- To connect to a PCRF, from the Diameter Endpoint Provisioning list, select Gy from the Supported Apps options.
- In the Product Name field, type the product name which is used to communicate with the OCS.
- In the Origin Host field, type the fully qualified domain name of the OCS, for example, ocs.xnet.com.
- In the Origin Realm field, type the realm name or network in which the OCS resides, for example, xnet.com.
- In the Destination Host field, type the destination host name of the OCS, for example, ocsdest.net.com.
- In the Destination Realm field, type the realm name or network of the OCS, for example, net.com.
- For the Pool Member Configuration setting, add the OCS servers that are to be members of the Gy endpoint pool. Type the Member IP Address and Port number, then click Add.
- In the Message Retransmit Delay field, type the number of milliseconds to wait before retransmitting unanswered messages in case of failure from the BIG-IP system to the OCS over the Gy interface. The default value is 1500.
- In the Message Max Retransmit field, type the maximum number of times that messages can be retransmitted from the BIG-IP system to the OCS. The default value is 2.
- In the Fatal Grace Time field, type the time period in seconds that a diameter connection can remain disconnected before the system terminates all sessions associated with that diameter endpoint. The default value is 500.
- Click Finished.The Policy Enforcement Manager creates a listener.
Creating rating groups
- On the Main tab, click .The Rating Groups List screen opens.
- Click Create.The New Rating Group screen opens.
- In the Name field, type a name for the rating group.
- In the Description field, type optional descriptive text for the rating group.
- In the Rating Group ID field, type an unique identifier (integer). This Rating Group ID is used by the quota managing endpoint, such as, Gy.
- In the Initial Quota setting, specify Volume in octets, the initial quota to receive and send from the OCS, and the total quota volume.
- In the Initial Quota setting, specify Time in seconds, the initial time for quota.
- In the Default Quota setting, specify Volume in octets, the default quota to receive and send from the OCS, and the total quota volume.
- In the Threshold field, type a default threshold level you want to use for a sending quota replenishment request.The default value is 0, which indicates that there is no threshold.
- In the Usage Time field, type the quota for how long the traffic can be used.
- In the Consumption Time field, type the maximum idle time that is accounted as quota usage. This is the default value of quota for time and specifies time units for charging as well.
- In the Validity Time field, type the duration for which the quota is used, if the online charging system (OCS) does not specify the validity time.
- In the Holding Time field, type the holding time (in seconds), for which the quota is valid without any usage, if the time is not specified by the OCS.Note: The default values for consumption time, validity time and holding time are used, when the OCS does not specify them.
- From the Breach Action list, select the appropriate action to be taken when default quota expires or OCS does not provide new quota or breach action.
Breach Action Description Terminate The system stops traffic when quota is breached. Allow The system allows traffic to go through even when the quota is breached. Redirect The system redirects traffic to the forwarding endpoint, when quota is breached.
- From the Request on Install list, select Yes if the quota has to be requested from the Gy, when the policy is installed for a subscriber. Otherwise, select No for quota to be requested when one of the applications associated with the rating group is detected.