Cisco Prime Nerk 43 User Guide
Here you can view all the pages of manual Cisco Prime Nerk 43 User Guide. The Cisco manuals for Network Hardware are available online for free. You can easily download all the documents as PDF.
Page 801
27-67 Cisco Prime Network 4.3.2 User Guide EDCS-1524415 Chapter 27 Managing Mobile Networks GPRS/UMTS Networks Modify Iucontext>Mobile>HNB GW > expand the hnb gw service > right-click Iu node > Commands > ConfigurationUse this command to modify Iu Interface details for the selected HNB service. Modify Pagingcontext>Mobile>HNB GW >expand the hnb gw service > right-click Paging node > Commands > ConfigurationUse this command to modify the paging configuration for a HNB GW service....
Page 802
27-68 Cisco Prime Network 4.3.2 User Guide EDCS-1524415 Chapter 27 Managing Mobile Networks GPRS/UMTS Networks Working with Wireless Security Gateway The Wireless Security Gateway (WSG) is a highly scalable solution for tunneling femtocell, Unlicensed Mobile Access (UMA)/Generic Access Network (GAN), and 3G/4G macrocell voice and data traffic over fixed broadband networks back to the mobile operator’s core network. In a femtocell deployment, WSG uses IP Security (IPsec) to secure the...
Page 803
27-69 Cisco Prime Network 4.3.2 User Guide EDCS-1524415 Chapter 27 Managing Mobile Networks GPRS/UMTS Networks Table 27-47 describes the Sec GW service details. Table 27-47 Sec-GW Service Details Field Description Sec GW Lookup tab Priority The priority value for the source and destination subnet size combination, which can be any value between 1 and 6. Source Net Mask The subnet size of the source net mask, which can be any value between 1 and 128. Destination Net Mask The subnet size of...
Page 804
27-70 Cisco Prime Network 4.3.2 User Guide EDCS-1524415 Chapter 27 Managing Mobile Networks GPRS/UMTS Networks Viewing the Connected Applications Configuration Details Connected Applications (CA) provide the ability to host third party applications on or adjacent to Cisco networking infrastructure, and enable programmatic access to networking services in a controlled and consistent manner. Enabling CA will allow the ability to host applications on forge blade on an ASR9K platform. The WSG...
Page 805
27-71 Cisco Prime Network 4.3.2 User Guide EDCS-1524415 Chapter 27 Managing Mobile Networks GPRS/UMTS Networks The following nodes in Prime Network are also configured for WSG: Crypto Template—A Crypto Template is a master file that is used to configure an IKEv2 IPSec policy. It includes most of the IPSec parameters and IKEv2 dynamic parameters for cryptographic and authentication algorithms. A security gateway service will not function without a configured crypto template and you can...
Page 806
27-72 Cisco Prime Network 4.3.2 User Guide EDCS-1524415 Chapter 27 Managing Mobile Networks GPRS/UMTS Networks Step 2In the Logical Inventory window, choose Logical Inventory > Context> Security Association > Crypto Template > Double click on any template name and check NATT attributes. Choose > Context> Security Association > Crypto Template > Double-click on any Crypto Template> Payload Tab > Double Click on any entries and check remaining attributes here. The Vision client displays the...
Page 807
27-73 Cisco Prime Network 4.3.2 User Guide EDCS-1524415 Chapter 27 Managing Mobile Networks GPRS/UMTS Networks Table 27-50 describes the Crypto Template configuration details. Table 27-50 Crypto Template Properties in Logical Inventory Field Description Type Indicates the version of the Internet Key Exchange protocol that is configured, which can be IKE v1 or IKE v2. Status The completion status of the template, which indicates whether the template is configured with the required properties...
Page 808
27-74 Cisco Prime Network 4.3.2 User Guide EDCS-1524415 Chapter 27 Managing Mobile Networks GPRS/UMTS Networks Dead Peer Detection Indicates whether the Dead Peer Detection for the crypto template is enabled or disabled. NoteThe Dead Peer Detection method detects a dead Internet Key Exchange peer and reclaims the lost resource. This method uses IPSec traffic patterns to minimize the number of messages required to confirm the availability of a peer. It is also used to perform IKE peer...
Page 809
27-75 Cisco Prime Network 4.3.2 User Guide EDCS-1524415 Chapter 27 Managing Mobile Networks GPRS/UMTS Networks Viewing the Crypto Map Configuration Details To view the crypto map configuration details: Step 1Right-click the required device in the Vision client and choose Inventory. Step 2In the Logical Inventory window, choose Logical Inventory > Context> Security Association > Crypto Map > Crypto Maps. The Vision client displays the map details in the content pane. Table 27-51 describes the...
Page 810
27-76 Cisco Prime Network 4.3.2 User Guide EDCS-1524415 Chapter 27 Managing Mobile Networks GPRS/UMTS Networks Step 3In the Crypto map Payload tab, right-click a Payload name and select Properties. The Crypto Map Payload Properties window is displayed. Table 27-52 describes the crypto map configuration details. Local Authentication The local authentication method to be used by the crypto map, which can be Certificate, Pre-shared-key, or EAP_Profile. Remote Authentication The remote...