Go to primary content
User Data Repository Diameter User's Guide
Release 12.4
E92984-01
Go To Table Of Contents
Contents

Previous
Previous
Next
Next

S6a/S6d HSS Topology Hiding Configuration Sets

S6a/S6d HSS Topology Hiding Configuration Sets provide information that is used to perform S6a/S6d HSS Topology Hiding for Protected Networks. Each Protected Network can reference a single S6a/S6d HSS Topology Hiding Configuration SetHSS.

The fields are described in Diameter S6a/S6d HSS Topology Hiding Configuration Set elements.

Each S6a/S6d HSS Topology Hiding Configuration Set contains the following information:
  • S6a/S6d HSS Topology Hiding Configuration Set Name - Unique name for this Configuration Set.
  • Use S6a/S6d Single HSS Pseudo Hostname - If checked, then Single HSS Pseudo Hostname are used for all HSS actual hostnames.

    Note:

    When the Use S6a/S6d Single HSS Pseudo Host NameHSS field is configured, all HSS TH Configuration Set fields associated with multiple pseudo-host names must not be configured
  • S6a/S6d Single HSS Pseudo Hostname - S6a/S6d HSS Pseudo Hostname
  • Pseudo Hostname Generation - Attributes to control the format and generation of Pseudo Hostnames corresponding to an Actual Hostname.

    Note:

    In order to support multiple pseudo hostnames for each HSS real hostname, each S6a/S6d TH Configuration set includes the following attributes:
    • Count - The maximum number of Pseudo Hostnames associated with an Actual Hostname.
    • Randomize Count - Allows random number of Pseudo Hostnames between 1 and Count to be associated with an Actual Hostname.
    • Auto Generate - Allows Pseudo Hostnames to be automatically generated corresponding to an Actual Hostname.
    • Prefix - Prefix for the auto-generated Pseudo Hostname.
    • Suffix - Suffix for the auto-generated Pseudo Hostname.
    • Length - Length of the random number used in the auto-generated Pseudo Hostname.
  • Hostnames - List of Actual Hostnames and their Pseudo Hostnames in this S6a/S6d HSS Topology Hiding Configuration Set.
  • S6a/S6d HSS Actual Hostname Not Found Action - Action to be performed when the Orig-Host in the Diameter message is not configured as Actual Hostname in this S6a/S6d HSS Topology Hiding Configuration Set.
  • S6a/S6d HSS Actual Hostname Not Found Answer Result-Code Value - Value to be placed in the Result-Code AVP of the Answer message.
  • S6a/S6d HSS Actual Hostname Not Found Vendor ID - Vendor ID is placed in Vendor ID AVP.
  • S6a/S6d HSS Actual Hostname Not Found Answer Error Message - String to be placed in the Error-Message AVP of the Answer message.
On the Diameter > Configuration > Topology Hiding > S6a/S6d HSS Topology Hiding Configuration SetsHSS page, you can perform the following actions:
  • Filter the list of S6a/S6d HSS Topology Hiding Configuration Sets to display only the desired S6a/S6d HSS Topology Hiding Configuration Sets.
  • Sort the list by column contents, in ascending or descending order (except Hostname Suffixes), by clicking the column heading. The default order is by S6a/S6d HSS Topology Hiding Configuration Set NameHSS in ascending ASCII order.
  • Click Insert.

    You can add a new S6a/S6d HSS Topology Hiding Configuration Set and its elements. See Adding an S6a/S6d HSS Topology Hiding Configuration Set.

    If the maximum number of S6a/S6d HSS Topology Hiding Configuration Sets (500) already exists in the system, then the Diameter > Configuration > Topology Hiding > S6a/S6d HSS Topology Hiding Configuration Sets [Insert] page does not open and an error message is displayed.

  • Select a S6a/S6d HSS Topology Hiding Configuration Set Name in the list and click Edit.

    You can edit the selected S6a/S6d HSS Configuration Set. See Editing an S6a/S6d HSS Topology Hiding Configuration Set.

  • Select a S6a/S6d HSS Topology Hiding Configuration Set Name in the list and click Delete to remove the selected S6a/S6d HSS Topology Hiding Configuration Set. See Deleting an S6a/S6d HSS Topology Hiding Configuration Set.

    If the selected S6a/S6d HSS Topology Hiding Configuration Set is used in a Protected Network, then the Configuration Set is not deleted.