Home > Cisco > Network Hardware > Cisco Prime Nerk 43 User Guide

Cisco Prime Nerk 43 User Guide

Here you can view all the pages of manual Cisco Prime Nerk 43 User Guide. The Cisco manuals for Network Hardware are available online for free. You can easily download all the documents as PDF.

Page 801

  
27-67
Cisco Prime Network 4.3.2 User Guide
EDCS-1524415
Chapter 27      Managing Mobile Networks
  GPRS/UMTS Networks
Modify Iucontext>Mobile>HNB GW > expand 
the hnb gw service  > right-click Iu node 
>  Commands > ConfigurationUse this command to modify Iu 
Interface details for the 
selected HNB service.
Modify Pagingcontext>Mobile>HNB GW >expand 
the hnb gw service > right-click Paging 
node >  Commands > ConfigurationUse this command to modify 
the paging configuration for a 
HNB GW service....

Page 802

  
27-68
Cisco Prime Network 4.3.2 User Guide
EDCS-1524415
Chapter 27      Managing Mobile Networks
  GPRS/UMTS Networks
Working with Wireless Security Gateway
The Wireless Security Gateway (WSG) is a highly scalable solution for tunneling femtocell, Unlicensed 
Mobile Access (UMA)/Generic Access Network (GAN), and 3G/4G macrocell voice and data traffic 
over fixed broadband networks back to the mobile operator’s core network. In a femtocell deployment, 
WSG uses IP Security (IPsec) to secure the...

Page 803

  
27-69
Cisco Prime Network 4.3.2 User Guide
EDCS-1524415
Chapter 27      Managing Mobile Networks
  GPRS/UMTS Networks
Table 27-47 describes the Sec GW service details.
Table 27-47 Sec-GW Service Details
Field Description
Sec GW Lookup tab
Priority The priority value for the source and destination subnet size combination, 
which can be any value between 1 and 6.
Source Net Mask The subnet size of the source net mask, which can be any value between 1 
and 128.
Destination  Net  Mask The subnet size of...

Page 804

  
27-70
Cisco Prime Network 4.3.2 User Guide
EDCS-1524415
Chapter 27      Managing Mobile Networks
  GPRS/UMTS Networks
Viewing the Connected Applications Configuration Details
Connected Applications (CA) provide the ability to host third party applications on or adjacent to Cisco 
networking infrastructure, and enable programmatic access to networking services in a controlled and 
consistent manner. Enabling CA will allow the ability to host applications on forge blade on an ASR9K 
platform. The WSG...

Page 805

  
27-71
Cisco Prime Network 4.3.2 User Guide
EDCS-1524415
Chapter 27      Managing Mobile Networks
  GPRS/UMTS Networks
The following nodes in Prime Network are also configured for WSG:
Crypto Template—A Crypto Template is a master file that is used to configure an IKEv2 IPSec 
policy. It includes most of the IPSec parameters and IKEv2 dynamic parameters for cryptographic 
and authentication algorithms. A security gateway service will not function without a configured 
crypto template and you can...

Page 806

  
27-72
Cisco Prime Network 4.3.2 User Guide
EDCS-1524415
Chapter 27      Managing Mobile Networks
  GPRS/UMTS Networks
Step 2In the Logical Inventory window, choose Logical Inventory > Context> Security Association > 
Crypto Template > Double click on any template name and check NATT attributes.
Choose > Context> Security Association > Crypto Template  > Double-click on any Crypto 
Template> Payload Tab > Double Click on any entries and check remaining attributes here. The Vision 
client displays the...

Page 807

  
27-73
Cisco Prime Network 4.3.2 User Guide
EDCS-1524415
Chapter 27      Managing Mobile Networks
  GPRS/UMTS Networks
Table 27-50 describes the Crypto Template configuration details.
Table 27-50 Crypto Template Properties in Logical Inventory
Field Description
Type Indicates the version of the Internet Key Exchange protocol that is 
configured, which can be IKE v1 or IKE v2.
Status The completion status of the template, which indicates whether the template 
is configured with the required properties...

Page 808

  
27-74
Cisco Prime Network 4.3.2 User Guide
EDCS-1524415
Chapter 27      Managing Mobile Networks
  GPRS/UMTS Networks
Dead  Peer  Detection Indicates whether the Dead Peer Detection for the crypto template is enabled 
or disabled.
NoteThe Dead Peer Detection method detects a dead Internet Key 
Exchange peer and reclaims the lost resource. This method uses 
IPSec traffic patterns to minimize the number of messages required 
to confirm the availability of a peer. It is also used to perform IKE 
peer...

Page 809

  
27-75
Cisco Prime Network 4.3.2 User Guide
EDCS-1524415
Chapter 27      Managing Mobile Networks
  GPRS/UMTS Networks
Viewing the Crypto Map Configuration Details
To view the crypto map configuration details:
Step 1Right-click the required device in the Vision client and choose Inventory.
Step 2In the Logical Inventory window, choose Logical Inventory > Context> Security Association > 
Crypto Map > Crypto Maps. The Vision client displays the map details in the content pane. 
Table 27-51 describes the...

Page 810

  
27-76
Cisco Prime Network 4.3.2 User Guide
EDCS-1524415
Chapter 27      Managing Mobile Networks
  GPRS/UMTS Networks
Step 3In the Crypto map Payload tab, right-click a Payload name and select Properties. The Crypto Map 
Payload Properties window is displayed.
Table 27-52 describes the crypto map configuration details. Local Authentication The local authentication method to be used by the crypto map, which can be 
Certificate, Pre-shared-key, or EAP_Profile.
Remote Authentication The remote...
Start reading Cisco Prime Nerk 43 User Guide

Related Manuals for Cisco Prime Nerk 43 User Guide

All Cisco manuals