S9 PCRF Topology Hiding is concerned with hiding the identities of a Protected Network's PCRFs, as well as the number of PCRFs in the network, when it exchanges messages with Untrusted Networks. A PCRF's identity is embedded in the Origin-Host and Session-Id AVPs sent in Request messages and the Origin-Host AVP sent in Answer messages. This capability (and "S9 AF/pCSCF Topology Hiding") is associated with the Diameter S9 and Rx application message set.
S9 PCRF topology hiding is concerned with all S9 messages and Rx messages when AF/pCSCF is deployed in client/server mode. If the PCRF is deployed in client/server mode for Rx messages, then "S9 AF/pCSCF TH Configuration Set" should not be enable for the protected network.
Note: All S9 messages initiated by hPCRF or vPCRF will have S9 PCRF Topology Hiding applied (if enabled). If S9 AF/pCSCF TH is not enabled, then all Rx messages initiated by hPCRF or vPCRF will have S9 PCRF Topology Hiding applied (if enabled). If S9 AF/pCSCF TH is enabled (i.e. if vPCRF is proxying AF/pCSCF messages to hPCRF), then only AAA/STA/RAR and ASR Rx messages will have PCRF TH applied.
PCRF identities are hidden by replacing the actual host name portion of the Origin-Host and Session-Id AVPs with a PCRF pseudo-host name. The Origin-Hose and Session-Id AVPs may have different PCRF host names. A unique pseudo- name must be created for each PCRF in a Protected Network. When the vPCRF initiates a transaction to the hPCRF, the hPCRF saves the vPCRF's identity for use in subsequent hPCRF-to-vPCRF transactions. This vPCRF pseudo-host name must not only be unique, but the DEA must be able to convert the vPCRF's pseudo-name to an actual vPCRF host name for these subsequent hPCRF to vPCRF transactions.
In order to hide the number of PCRFs in a network, each PCRF will be assigned either a random or fixed number of pseudo-host names (the maximum is defined by an "S9 PCRF TH Configuration Set" attribute called "Maximum Pseudo-Host Names per PCRF"). The GUI will create the randomized PCRF pseudo-host names and assign them to actual pseudo-host names to be used by DRL. The "TH Host Names" will allow DRL to map a Protected-PCRF actual-host name to a set of PCRF pseudo-host names as well as map a PCRF pseudo-host named received from an Untrusted Network to a Protected-PCRF actual-host name.
Protected-vPCRF to Untrusted-hPCRF Transactions
When vPCRF is in a Protected Network, S9 Diameter sessions are initiated by vPCRF in a Protected Network on behalf of an inbound roamer to request PCC or QoS rules to the hPCRF.
When AF/pCSCF and PCRF are in a Protected Network and AF/pCSCF uses vPCRF in client/server mode to communicate Rx messages initiated by vAF/pCSCF to hPCRF in an Untrusted network, then S9 PCRF TH is used to hide PCRF host names to an Untrusted Network.
For Protected-vPCRF to Untrusted-hPCRF S9 Diameter transactions, S9 PCRF TH is concerned with the following topology information hiding and restoral issues:
- The AVPs containing a PCRF's actual-host name in Request messages must be hidden with one of the pseudo-host names assigned to the PCRF at TH trigger point "RTH"
- The Untrusted network's PCRF (hPCRF in this case) will save the subscriber's location using the Origin-Host AVP contents containing a pseudo-host name. This has the following impact:
- In subsequent hPCRF-vPCRF transactions(e.g RAR/ASR), the vPCRF may be addressed by one of its pseudo-host names requiring a pseudo-to-actual name restoral
- All vPCRF-to-hPCRF transactions associated with a particular session must use the same vPCRF pseudo-host name. The Session is identified by Session-Id AVP, a mandatory AVP in all S9/Rx messages.
Note: Although the Origin-Host and Session-Id AVPs both have actual PCRF host names, they may be different. Because S9/Rx is a session based application , actual PCRF host names must be restored in subsequent hPCRF-vPCRF transactions. Hence both Origin-Host and Session-Id AVPs must be selected from Actual Host Names in S9 PCRF TH.
- The hPCRF will send an Answer response to the transaction with the Session-Id received in the Request (also containing a PCRF pseudo-host name). Because the Session-Id value returned in the Answer must match the Request, the PCRF pseudo-host name in the Session-Id AVP must be replaced with its corresponding value received in the Request message. This value is restored at TH trigger point "ATR". This will require saving the host name portion of the Session-Id AVP value in the PTR. This host name restoral procedure is not required for Answers initiated by DSR internal nodes (e.g., DRL, DSR Application) as these Answer responses are based upon the original Request message content
An example of a Protected-vPCRF to Untrusted-hPCRF Diameter transaction is shown as follows.
Protected-vPCRF to Untrusted-hPCRF Transaction
To ensure all S9/Rx messages for the same session are modified using the same pseudo-name, the Session-Id AVP can be used as a key to select a Pseudo Host Name for an Actual Host Name.
Untrusted-hPCRF to Protected-vPCRF Transactions
For Protected-vPCRF to Untrusted-hPCRF S9/Rx transactions, PCRF topology hiding is only required on Request messages which meet the following criteria:
- The message was a candidate for topology hiding as defined by topology trigger point "RTH" and
- "S9 PCRF TH" is enabled for the Protected network ("S9 PCRF TH Configuration Set" is assigned to the Protected Network) and
- The Request message is a member of the S9 message and was initiated by a PCRF or
- The Request message is a member of the Rx message set and was initiated by a PCRF and S9 AF/pCSCF TH is not enabled and
- The Origin-Host and/or Session-Id AVPs in the Request contain an actual PCRF host name assigned to the Protected Network via the "S9 PCRF Configuration Set".
For Protected-vPCRF to Untrusted-hPCRF transactions, PCRF topology information restoral is only performed on Answer messages which meet the following criteria:
- At topology trigger point "ATR", the PCRF TH ATR" flag in the PTR associated with the Answer message is set to "Enabled".
When an Untrusted-hPCRF initiates a transaction to a Protected-vPCRF, it will most likely be addressed to one of the vPCRF pseduo-host names that the hPCRF saved in a previous vPCRF-to-hPCRF transaction for which S9 PCRF TH was applied. For Untrusted-hPCRF to Protected-vPCRF Diameter transactions (RAR, ASR etc.), S9 PCRF TG is concerned with the following topology information hiding and restoral issues:
- The Destination-Host AVP contains a vPCRF pseudo-host name. This pseudo-host name must be replaced with the vPCRF's actual-host name at TH trigger point RTR. Pseudo-to-actual host name mapping is performed using the internal "TH Host Names". It's perfectly acceptable that an Untrusted-hPCRF to Protected-vPCRF Request message does not contain a PCRF pseudo-host name. If the Destination-Host AVP value does not match an entry in the "TH Pseudo-Host Name", then no host name conversion is required and the Request message will be routed as normal. Destination-Host name conversion is performed to prevent the following problems:
- Certain vPCRFs will not accept messages that do not contain its actual host name
- DSR routing problems associated with pseudo-host names. For example, DRL "Implicit Routing" currently only works with actual host names (for example, the FQDN assigned to the Peer Node and used for the Capabilities Exchange procedure [CER/CEA]).
- The host portion of Session-Id AVP containing a PCRF pseudo-host name must be replaced back with vPCRF's actual host name at TH trigger point "RTR". Pseudo-to-actual host name mapping is performed using the internal "TH Host Names".
- An Origin-Host AVP containing a vPCRF's actual-host name in the Answer response from the Protected-vPCRF must be hidden with one of the pseudo-host names assigned to that PCRF . This procedure is done at TH trigger point "ATH".
- Session-Id AVP containing a vPCRF's actual-host name in the Answer response from the Protected-vPCRF must be hidden with one of the pseudo-host names assigned to that PCRF . This is done at TH trigger point "ATH".
An example of an Untrusted-hPCRF to Protected-vPCRF Diameter transaction is shown as follows.
Untrusted-hPCRF to Protected-vPCRF Diameter Transaction
For Untrusted-hPCRF to Protected-vPCRF transactions, S9 PCRF TH is only invoked on Request messages at topology trigger point "RTR" which meet the following criteria:
- The message was a candidate for topology hiding as defined by topology trigger point "RTR" and
- "S9 PCRF TH" is enabled for the Protected Network ("S9 PCRF TH Configuration Set" is assigned to the Protected Network) and
- The Request message is a member of the S9 message set and was initiated by a PCRF or
- The Request message is a member of Rx message set and was initiated by a PCRF and S9 AF/pCSCF TH is not enabled and
- The Destination-Host AVP or host portion of Session-Id AVP contains a PCRF pseudo-host name that is assigned to the Protected Network as determined from the internal "Pseudo-Host Name"
For Untrusted-hPCRF to Protected-vPCRF transactions, S9 PCRF HSS topology hiding is only invoked on Answer messages at topology trigger point "ATH" which meet the following criteria:
- Message was a candidate for topology hiding as defined by topology trigger point "ATH"
- "S9 PCRF TH" is enabled for the Protected Network ("S9 PCRF TH Configuration Set" is assigned to the Protected Network)
- The Answer message is a member of the S9 message set and was initiated by a PCRF or
- The Answer message is a member of Rx message set and was initiated by a PCRF and S9 AF/pCSCF TH is not enabled and
- The Origin-Host AVP or host portion of Session-Id AVP contains an actual PCRF host name that is assigned to the Protected Network via the "S9 PCRF TH Configuration Set"
Protected-hPCRF to Untrusted-vPCRF Transactions
When an hPCRF is in Protected Network, S9 Diameter sessions are initiated by a vPCRF in an Untrusted Network on behalf of an outbound roamer to request PCC or QoS rules to the hPCRF. hPCRF can send RAR in the session initiated by vPCRF.
When AF/pCSCF and PCRF is in an Untrusted network and AF/pCSCF uses vPCRF in client/server mode to communicate Rx messages initiated by vAF/pCSCF to hPCRF in a Protected Network, then S9 PCRF TH is used to hide PCRF host names from an Untrusted Network. hPCRF can send RAR or ASR messages in the session intiated vPCRF.
For Protected-hPCRF to Untrusted-vPCRF S9 Diameter transactions, S9 PCRF TH is concerned with the following topology information hiding and restoral issues:
- S9 Sessions are initiated from untrusted network using CCR and Rx Sessions are initiated from untrusted network using AAR . Hence the host portion of Session-Id AVP will contain the host of untrusted network which does not need to be hidden.
- The Origin-Host AVP containing an PCRF's actual-host name in Request messages must be hidden with one of the pseudo-host names assigned to the PCRF at TH trigger point "RTH".
An example of a Protected-hPCRF to Untrusted-vPCRF Diameter transaction is shown as follows.
Protected-hPCRF to Untrusted-vPCRF Transaction
To ensure all S9/Rx messages for same session are modified using same pseudo-name , Session-Id AVP can be used as key to select a Pseudo Host Name for an Actual Host Name.
For Protected-hPCRF to Untrusted-vPCRF S9/Rx transactions, PCRF topology hiding is only required on Request messages which meet the following criteria:
- The message was a candidate for topology hiding as defined by topology trigger point "RTH" and
- "S9 PCRF TH" is enabled for the Protected Network ("S9 PCRF TH Configuration Set" is assigned to the Protected Network) and
- The Request message is a member of the S9/Rx message set and was initiated by a PCRF and
- The Origin-Host AVP in the Request contain an actual PCRF host name assigned to the Protected Network via the "S9 PCRF TH Configuration Set"
Untrusted-vPCRF to Protected-hPCRF Transactions
When an Untrusted-vPCRF initiates a transaction to a Protected-hPCRF, it will most likely be addressed to one of the hPCRF pseudo-host names that the vPCRF saved in a previous hPCRF-to-vPCRF transaction for which PCRF TH was applied. For Untrusted-vPCRF to Protected-hPCRF Diameter transactions (CCR, AAR/STR etc.) , PCRF TH is concerned with the following topology information hiding and restoral issues:
- The Destination-Host AVP contains a PCRF pseudo-host name. This pseudo-host name must be replaced with the hPCRF's actual-host name at TH trigger point RTR. Pseudo-to-actual host name mapping is performed using the internal "TH Host Names" table. It's perfectly acceptable that an Untrusted-vPCRF to Protected-hPCRF Request message does not contain a PCRF pseudo-host name. If the Destination-Host AVP value does not match an "Pseudo-Host Name" entry in the "TH Host Names", then no host name conversion is required and the Request message will be routed as normal. Destination-Host name conversion is performed to prevent the following problems:
- Certain hPCRFs will not accept messages that do not contain its actual host name
- DSR routing problems associated with pseudo-host names. For example, DRL "Implicit Routing" currently only works with actual host names (i.e., the FQDN assigned to the Peer Node and used for the Capabilities Exchange procedure (CER/CEA))
- An Origin-Host AVP containing an vPCRF's actual-host name in the Answer response from the Protected-hPCRF must be hidden with one of the pseudo-host names assigned to that PCRF . This is done at TH trigger point "ATH".
An example of an Untrusted-vPCRF to Protected-hPCRF Diameter transaction is shown as follows.
Untrusted-vPCRF to Protected-hPCRF Transaction
For Untrusted-vPCRF to Protected-hPCRF transactions, S9 PCRF HSS topology hiding is only invoked on Request messages at topology trigger point "RTR" which meet the following criteria:
- Message was a candidate for topology hiding as defined by topology trigger point "RTR" and
- "S9 PCRF TH" is enabled for the Protected Network ("S9 PCRF TH Configuration Set" is assigned to the Protected Network) and
- The Request message is a member of the S9 message set and was initiated by a PCRF as determined and
- The Request message is a member of Rx message set and was initiated by a PCRF and S9 AF/pCSCF TH is not enabled and
- The Destination-Host AVP contains a PCRF pseudo-host name that is assigned to the Protected Network as determined from the internal "Pseudo-Host Name"
For Untrusted-vPCRF to Protected-hPCRF transactions, S9 PCRF HSS topology hiding is only invoked on Answer messages at topology trigger point "ATH" which meet the following criteria:
- Message was a candidate for topology hiding as defined by topology trigger point "ATH"
- "S9 PCRF TH" is enabled for the Protected Network ("S9 PCRF TH Configuration Set" is assigned to the Protected Network)
- The Answer message is a member of the S9 message set and was initiated by a PCRF
- The Origin-Host AVP contains an actual PCRF host name that is assigned to the Protected Network via the "S9 PCRF TH Configuration Set"