
▄Cisco ASR 5x00 Enhanced Charging Services Administration Guide
Fastpath .........................................................................................................................................48
Bulkstatistics Support.....................................................................................................................51
Limitations and Dependencies.......................................................................................................52
Support for WebSocket Protocol Identification...................................................................................52
How it Works..................................................................................................................................52
URL Filtering.......................................................................................................................................52
Implementation of AES Encryption.....................................................................................................53
TCP Proxy..........................................................................................................................................54
Flow Admission Control .................................................................................................................55
TCP Proxy Behavior and Limitations .............................................................................................55
Dynamic Disabling of TCP Proxy...................................................................................................58
X-Header Insertion and Encryption....................................................................................................59
License Requirements ...................................................................................................................59
X-Header Insertion.........................................................................................................................59
X-Header Encryption......................................................................................................................60
Limitations to the Header Insertion and Encryption Features........................................................61
Supported X-Headers ....................................................................................................................62
X-Header Enrichment Anti Spoofing..............................................................................................63
RAN Bandwidth Optimization.............................................................................................................64
Selective TFT Suppression for Default Bearer...................................................................................64
Accounting and Charging Interfaces ......................................................................................................65
GTPP Accounting...............................................................................................................................65
RADIUS Accounting and Credit Control.............................................................................................65
Diameter Accounting and Credit Control............................................................................................66
Gx Interface Support......................................................................................................................66
Gy Interface Support......................................................................................................................66
Event Detail Records (EDRs).........................................................................................................67
Usage Detail Records (UDRs).......................................................................................................69
Charging Methods and Interfaces......................................................................................................69
Prepaid Credit Control....................................................................................................................69
Postpaid .........................................................................................................................................69
Prepaid Billing in ECS ........................................................................................................................70
How ECS Prepaid Billing Works ....................................................................................................70
Credit Control Application (CCA) in ECS ...........................................................................................71
How Credit Control Application (CCA) Works for Prepaid Billing ..................................................71
Postpaid Billing in ECS.......................................................................................................................72
How ECS Postpaid Billing Works...................................................................................................73
External Storage System........................................................................................................................76
System Resource Allocation...................................................................................................................77
Redundancy Support in ECS..................................................................................................................78
Intra-chassis Session Recovery Interoperability ................................................................................78
Recovery from Task Failure...........................................................................................................78
Recovery from CPU or Packet Processing Card Failure...............................................................78
Inter-chassis Session Recovery Interoperability ................................................................................78
Inter-chassis Session Recovery Architecture ................................................................................79
Session Recovery Improvements ..................................................................................................79
Impact on xDR File Naming ...............................................................................................................79
Impact on xDR File Content ...............................................................................................................80
Enhanced Charging Service Configuration ................................................... 83
Initial Configuration.................................................................................................................................84
Creating the ECS Administrative User Account.................................................................................84
Installing the ECS License .................................................................................................................85
Enabling Enhanced Charging Service................................................................................................85
Configuring the Enhanced Charging Service .........................................................................................86