HRPD Serving Gateway Overview
â–€ Features and Functionality - Optional Enhanced Feature Software
â–„ Cisco ASR 5000 Series Product Overview
Traffic Shaping
Traffic Shaping is a rate limiting method similar to the Traffic Policing, but provides a buffer facility for packets
exceeded the configured limit. Once the packet exceeds the data-rate, the packet queued inside the buffer to be delivered
at a later time.
The bandwidth enforcement can be done in the downlink and the uplink direction independently. If there is no more
buffer space available for subscriber data system can be configured to either drop the packets or kept for the next
scheduled traffic session.
Important: For more information on traffic policing and shaping, refer to the Traffic Policing and Shaping
chapter in the System Enhanced Feature Configuration Guide.
Layer 2 Traffic Management (VLANs)
Virtual LANs (VLANs) provide greater flexibility in the configuration and use of contexts and services.
IP Security (IPSec) is a suite of protocols that interact with one another to provide secure private communications across
IP networks. These protocols allow the system to establish and maintain secure tunnels with peer security gateways. For
IPv4, IKEv1 is used and for IPv6, IKEv2 is supported. IPSec can be implemented on the system for the following
applications:
PDN Access: Subscriber IP traffic is routed over an IPSec tunnel from the system to a secure gateway on the
packet data network (PDN) as determined by access control list (ACL) criteria.
Mobile IP: Mobile IP control signals and subscriber data is encapsulated in IPSec tunnels that are established
between foreign agents (FAs) and home agents (HAs) over the Pi interfaces.
Important: Once an IPSec tunnel is established between an FA and HA for a particular subscriber, all new
Mobile IP sessions using the same FA and HA are passed over the tunnel regardless of whether or not IPSec is
supported for the new subscriber sessions. Data for existing Mobile IP sessions is unaffected.
Important: For more information on IPSec support, refer to the IP Security chapter in the System Enhanced
Feature Configuration Guide.