Table 10-15 Topology Hiding AVPs and Hiding Methods
Diameter Applications | AVP Name | Information Hiding Method | |
---|---|---|---|
Pseudo-Host Name Replacement | Encryption | ||
S6a, S6d, S9, Rx | Session-Id | X | |
S6a, S6d, S9, Rx | Origin-Host | X | |
Any | Route-Record | X | |
Any | Proxy-Host | X | |
Any | Error-Reporting-Host | X |