Bsc nat VTY » History » Version 16
Anonymous, 02/19/2016 10:48 PM
1 | 16 | {{>toc}} |
|
---|---|---|---|
2 | 1 | ||
3 | 5 | laforge | This page is a reference fo all VTY commands that you can use interactively on the bsc_nat VTY telnet interface. |
4 | 1 | ||
5 | In addition, the same commands are used for the configuration file. |
||
6 | |||
7 | |||
8 | 16 | h2. configuration reference |
|
9 | |||
10 | |||
11 | |||
12 | h3. nat level |
||
13 | |||
14 | 1 | Configure the nat. Global settings |
|
15 | |||
16 | |||
17 | 16 | h4. msc ip A.B.C.D |
|
18 | 1 | ||
19 | 16 | * Set the MSC IP address used to connect to the MSC. |
|
20 | 1 | ||
21 | |||
22 | 16 | h4. msc port <1-65500> |
|
23 | 1 | ||
24 | 16 | * Set the MSC Port used to connect to the MSC. |
|
25 | |||
26 | |||
27 | h4. timeout auth NR |
||
28 | |||
29 | * Time in seconds to wait for the authentication reponse of a BSC. |
||
30 | |||
31 | |||
32 | h4. timeout ping NR |
||
33 | |||
34 | * Time in seconds to wait between two PING messages |
||
35 | |||
36 | |||
37 | h4. timeout pong NR |
||
38 | |||
39 | * Time in seconds to wait for a reply of a PING before closing the connection |
||
40 | |||
41 | |||
42 | h4. token STR |
||
43 | |||
44 | * Authentication token used to authenticate the BSC. Currently this is transfered |
||
45 | 1 | in clear text. |
|
46 | |||
47 | |||
48 | 16 | h4. ip-dscp TOS |
|
49 | 1 | ||
50 | 16 | * Set the IP Type of Service (ToS) for the incoming BSC connections. |
|
51 | |||
52 | |||
53 | h4. access-list-name |
||
54 | |||
55 | * The name of the access-list to use on the NAT. Only the deny rules will be evaluated. |
||
56 | |||
57 | |||
58 | h4. no access-list-name |
||
59 | |||
60 | 1 | * Stop using an access-list on the NAT. |
|
61 | |||
62 | |||
63 | 16 | h3. bsc BSC_NR |
|
64 | 1 | ||
65 | 16 | * Configure the BSC with the number |
|
66 | 1 | ||
67 | |||
68 | 16 | h4. location_area_code <0-65535> |
|
69 | 1 | ||
70 | 16 | * Set the location area code that this BSC is handling |
|
71 | 1 | ||
72 | 16 | ||
73 | h4. token TOKEN |
||
74 | |||
75 | * A token for the BSC. The real bsc needs to send this token to use the lac and other filters. This is no real authentication or security scheme. |
||
76 | |||
77 | |||
78 | h4. paging forbidden (0|1) |
||
79 | |||
80 | * Decide if paging messages should be forwarded to the BSC. |
||
81 | |||
82 | |||
83 | h4. description STR. |
||
84 | |||
85 | * A description for the BSC. |
||
86 | |||
87 | |||
88 | h4. access-list-name STR |
||
89 | |||
90 | * Use the access-list for the BSC. First the allow rules will be evaluated, then the deny rules. |
||
91 | |||
92 | |||
93 | h4. no access-list-name |
||
94 | |||
95 | 11 | * Do not use an access-list forthe BSC. |
|
96 | |||
97 | |||
98 | 16 | h3. access lists |
|
99 | 11 | ||
100 | 16 | * Configuration for access-lists controling which IMSIs are allowed to connect |
|
101 | |||
102 | |||
103 | h4. access-list NAME allow REGEXP |
||
104 | |||
105 | * Add a regexp for the to be allowed IMSI list. |
||
106 | |||
107 | |||
108 | h4. access-list NAME deny REGEXP |
||
109 | |||
110 | * Add a regext for the to be denied IMSI list. |