Topology Hiding Supported AVPs
Table 9-15
shows the AVPs that are supported by Topology Hiding. The following information
hiding methods are supported:
- Pseudo Hostname Replacement: Actual Hostnames are replaced with Pseudo Hostnames.
- Encryption: AVP value is encrypted
Table 9-15 Topology Hiding AVPs and Hiding Methods
| Diameter Applications | AVP Name | Information Hiding Method | |
|---|---|---|---|
| Pseudo-Host Name Replacement | Encryption | ||
| S6a, S6d, S9, Rx | Session-Id | X | |
| S6a, S6d, S9, Rx | Origin-Host | X | |
| Any | Route-Record | X | |
| Any | Proxy-Host | X | |
| Any | Error-Reporting-Host | X | |