Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TS 29.212
Policy and Charging Control (PCC)
Reference Points

V19.1.0 (PDF)2025/12  … p.
V18.2.0  2024/09  302 p.
V17.3.0  2023/06  302 p.
V16.4.0  2020/09  297 p.
V15.9.0  2019/12  296 p.
V14.11.0  2019/09  289 p.
V13.13.0  2019/06  274 p.
V12.14.0  2019/06  231 p.
V11.19.0  2019/06  209 p.
V10.17.0  2016/06  139 p.
V9.19.0  2015/01  128 p.
V8.24.0  2015/01  109 p.
V7.16.0  2013/12  50 p.
Rapporteur:
Dr. Belling, Thomas
Nokia Networks

full Table of Contents for  TS 29.212  Word version:  19.0.0

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
1Scope  p. 16
2References  p. 16
3Definitions and abbreviations  p. 18
3.1Definitions  p. 18
3.2Abbreviations  p. 20
4Gx reference point  p. 21
4.1Overview  p. 21
4.2Gx Reference model  p. 21
4.3PCC Rules  p. 22
4.3.1PCC Rule Definition  p. 22
4.3.2Operations on PCC Rules  p. 24
4.3aIP flow mobility routing rules |R10|p. 24
4.3a.0General |R13|p. 24
4.3a.1Functional entities  p. 24
4.3a.2IP flow mobility routing rule definition  p. 24
4.3a.3Operations on Routing rules  p. 25
4.3a.4PCC procedures for IP flow mobility routing rule over Gx reference point  p. 25
4.3a.4.1Provisioning of IP flow mobility routing rules  p. 25
4.3bVoidp. …
4.3cNBIFOM routing rules |R13|p. 26
4.3c.1General  p. 26
4.3c.2NBIFOM routing rule definition  p. 26
4.3c.3Operations on NBIFOM Routing rules  p. 27
4.4Functional elements  p. 27
4.4.1PCRF  p. 27
4.4.2PCEF  p. 28
4.5PCC procedures over Gx reference point  p. 29
4.5.1Request for PCC rules  p. 29
4.5.2Provisioning of PCC rules  p. 32
4.5.2.0Overview |R11|p. 32
4.5.2.1Selecting a PCC rule for Uplink IP packets  p. 35
4.5.2.2Selecting a PCC rule and IP CAN Bearer for Downlink IP packets  p. 35
4.5.2.3Gate function  p. 36
4.5.2.4Policy enforcement for "Authorized QoS" per PCC Rule  p. 36
4.5.2.5Usage Monitoring Control |R9|p. 36
4.5.2.6Redirect function |R11|p. 36
4.5.2.7Support for DSCP marking of downlink packets at the TDF |R13|p. 37
4.5.2.8 Traffic Steering Control support |R13|p. 37
4.5.3Provisioning of Event Triggers  p. 38
4.5.4Provisioning of charging related information for the IP-CAN session  p. 38
4.5.4.1Provisioning of Charging Addresses  p. 38
4.5.4.2Provisioning of Default Charging Method  p. 38
4.5.4.3Voidp. …
4.5.4.4Provisioning of Access Network Charging Identifier |R9|p. 38
4.5.5Provisioning and Policy Enforcement of Authorized QoS  p. 39
4.5.5.0Overview  p. 39
4.5.5.0aProvisioning of authorized QoS per IP CAN bearer  p. 40
4.5.5.1Policy enforcement for authorized QoS per IP CAN bearer  p. 40
4.5.5.2Policy provisioning for authorized QoS per service data flow  p. 40
4.5.5.3Policy enforcement for authorized QoS per service data flow  p. 40
4.5.5.4Coordination of authorized QoS scopes in mixed mode  p. 41
4.5.5.5Provisioning of authorized QoS per QCI  p. 41
4.5.5.6Policy enforcement for authorized QoS per QCI  p. 41
4.5.5.7Provisioning of authorized QoS per APN |R8|p. 41
4.5.5.8Policy enforcement for authorized QoS per APN |R8|p. 42
4.5.5.9Provisioning of authorized QoS for the Default EPS Bearer |R8|p. 43
4.5.5.10Policy enforcement for authorized QoS of the Default EPS Bearer |R8|p. 43
4.5.5.11Policy provisioning and enforcement of authorized QoS for service data flows that share resources |R13|p. 43
4.5.5.12Provisioning and enforcement of time conditioned policy information |R14|p. 44
4.5.5.12.1General  p. 44
4.5.5.12.2Time conditioned authorized QoS per APN  p. 44
4.5.5.12.3Time conditioned authorized default EPS bearer QoS  p. 45
4.5.5.13Policy provisioning and enforcement of authorized QoS for service data flows that shall be bound to the default bearer |R14|p. 45
4.5.6Indication of IP-CAN Bearer Termination Implications  p. 46
4.5.7Indication of IP-CAN Session Termination  p. 46
4.5.8Request of IP-CAN Bearer Termination  p. 47
4.5.9Request of IP-CAN Session Termination  p. 47
4.5.10Bearer Control Mode Selection  p. 48
4.5.11Provisioning of Event Report Indication  p. 48
4.5.12PCC Rule Error Handling  p. 49
4.5.13Time of the day procedures |R8|p. 50
4.5.14Trace activation/deactivation |R8|p. 51
4.5.15IMS Emergency Session Support |R9|p. 51
4.5.15.1Functional Entities  p. 51
4.5.15.2PCC procedures for Emergency services over Gx reference point  p. 51
4.5.15.2.1Request for PCC Rules for Emergency services  p. 51
4.5.15.2.2Provisioning of PCC Rules for Emergency services  p. 52
4.5.15.2.2.1Provisioning of PCC Rules at Gx session establishment   p. 52
4.5.15.2.2.2Provisioning of PCC Rules for Emergency Services   p. 52
4.5.15.2.3Removal of PCC Rules for Emergency Services  p. 52
4.5.15.2.4Removal of PCC Rules at Gx session termination  p. 53
4.5.16Requesting Usage Monitoring Control |R9|p. 53
4.5.17Reporting Accumulated Usage |R9|p. 54
4.5.17.0General |R11|p. 54
4.5.17.1Usage Threshold Reached  p. 55
4.5.17.2PCC Rule Removal  p. 56
4.5.17.3Usage Monitoring Disabled  p. 56
4.5.17.4IP-CAN Session Termination  p. 56
4.5.17.5PCRF Requested Usage Report  p. 56
4.5.17.6Report in case of Monitoring Time provided |R11|p. 56
4.5.18IMS Restoration Support |R9|p. 57
4.5.18aP-CSCF Restoration Enhancement Support |R12|p. 57
4.5.19Multimedia Priority Support |R10|p. 57
4.5.19.1PCC Procedures for Multimedia Priority services over Gx reference point  p. 57
4.5.19.1.1Provisioning of PCC Rules for Multimedia Priority Services  p. 57
4.5.19.1.2Invocation/Revocation of Priority EPS Bearer Services  p. 58
4.5.19.1.3Invocation/Revocation of IMS Multimedia Priority Services  p. 59
4.5.19.1.4Invocation/Revocation of MPS for DTS |R17|p. 59
4.5.20Sponsored Data Connectivity |R10|p. 60
4.5.21PCRF Failure and Restoration |R10|p. 61
4.5.22Reporting Access Network Information |R11|p. 61
4.5.23Application Detection Information |R11|p. 62
4.5.24Group Communication Service Support |R12|p. 63
4.5.25NBIFOM Support |R13|p. 63
4.5.25.1General  p. 63
4.5.25.1.1PCRF procedures  p. 63
4.5.25.1.2PCEF procedures  p. 64
4.5.25.2NBIFOM impacts on PCC procedures over Gx  p. 65
4.5.25.2.1IP-CAN session establishment  p. 65
4.5.25.2.2Addition of an access  p. 65
4.5.25.2.3Removal of an access  p. 66
4.5.25.2.3.1UE/PCEF-initiated removal of an access  p. 66
4.5.25.2.3.2PCRF-initiated removal of an access  p. 66
4.5.25.2.4Network-initiated IP flow mobility within a PDN connection (Network-initiated NBIFOM mode)  p. 66
4.5.25.2.5UE-initiated IP flow mobility within a PDN connection (UE-initiated NBIFOM mode)  p. 67
4.5.25.2.6UE Requested IP Flow Mapping (Network-initiated NBIFOM mode)  p. 68
4.5.25.2.7An access becomes not available/available again  p. 70
4.5.25.2.8Access Network Information Reporting  p. 70
4.5.25.2.9Usage monitoring control  p. 70
4.5.25.2.10UE resource request for a multi-access IP-CAN session  p. 71
4.5.26Detection and handling of late arriving requests |R13|p. 71
4.5.26.1General  p. 71
4.5.26.2Detection and handling of requests which collide with an existing session context  p. 71
4.5.26.3Detection and handling of requests which have timed out at the originating entity  p. 72
4.5.27Resource reservation for services sharing priority |R13|p. 72
4.5.28Support for PCC rule versioning |R14|p. 73
4.5.293GPP PS Data Off Support |R14|p. 73
4.5.30Extended bandwidth support for EPC supporting Dual Connectivity (E-UTRAN and 5G NR) |R15|p. 75
4.5.31Policy update When UE suspends |R15|p. 75
4.5.32IMS Restricted Local Operator Services Support |R16|p. 76
4.6Voidp. …
4aGxx reference points |R8|p. 76
4a.1Overview  p. 76
4a.2Gxx Reference model  p. 77
4a.3Quality of Service Control Rules  p. 77
4a.3.1Quality of Service Control Rule Definition  p. 77
4a.3.2Operations on QoS Rules  p. 78
4a.4Functional elements  p. 79
4a.4.1PCRF  p. 79
4a.4.2BBERF  p. 79
4a.5PCC procedures over Gxx reference points  p. 80
4a.5.1Gateway control and QoS Rules Request  p. 80
4a.5.2Gateway control and QoS Rules Provision  p. 81
4a.5.2.1Overview  p. 81
4a.5.2.2Support for DSCP marking of downlink packets at the TDF |R13|p. 83
4a.5.3Gateway Control Session Termination  p. 83
4a.5.4Request of Gateway Control Session Termination  p. 83
4a.5.5QoS Control Rule error handling  p. 83
4a.5.6Gateway Control session to Gx session linking  p. 83
4a.5.7Multiple BBF support  p. 85
4a.5.7.1General |R10|p. 85
4a.5.7.2Handling of two BBFs associated with the same IP-CAN session during handover |R10|p. 85
4a.5.7.3Handling of multiple BBFs with flow mobility within IP-CAN session |R10|p. 86
4a.5.8Provisioning of Event Triggers  p. 87
4a.5.9Bearer Control Mode Selection  p. 87
4a.5.10Provisioning and Policy Enforcement of Authorized QoS  p. 88
4a.5.10.1Provisioning of authorized QoS for the Default EPS Bearer  p. 88
4a.5.10.2Policy enforcement for authorized QoS of the Default EPS Bearer  p. 88
4a.5.10.3Provisioning of authorized QoS per APN  p. 88
4a.5.10.4Policy provisioning for authorized QoS per service data flow  p. 88
4a.5.10.5Policy enforcement for authorized QoS per service data flow  p. 89
4a.5.10.6Policy provisioning and enforcement of authorized QoS for service data flows that share resources |R13|p. 89
4a.5.11Trace activation/deactivation  p. 89
4a.5.12IMS Emergency Session Support  p. 89
4a.5.12.1PCC procedures for Emergency services over Gxx reference point |R9|p. 89
4a.5.12.1.1Gateway control and QoS Rules request for Emergency services  p. 89
4a.5.12.1.2Provisioning of QoS Rules for Emergency services  p. 90
4a.5.12.1.2.1Provisioning of QoS Rules at Gxx session establishment   p. 90
4a.5.12.1.2.2Provisioning of QoS Rules for Emergency services   p. 90
4a.5.12.2Gateway Control Session to Gx session linking |R9|p. 90
4a.5.12.3Removal of QoS Rules for Emergency Services |R9|p. 91
4a.5.12.4Termination of Gateway Control session for Emergency Services |R9|p. 91
4a.5.13Time of the day procedures |R9|p. 91
4a.5.14Multimedia Priority Support |R10|p. 92
4a.5.14.1PCC Procedures for Multimedia Priority services over Gxx reference point  p. 92
4a.5.14.1.1Provisioning of QoS Rules for Multimedia Priority Services  p. 92
4a.5.14.1.2Invocation/Revocation of Priority EPS Bearer Services  p. 93
4a.5.14.1.3Invocation/Revocation of IMS Multimedia Priority Services  p. 93
4a.5.14.1.4Invocation/Revocation of Multimedia Priority Services for DTS |R17|p. 93
4a.5.15PCRF Failure and Restoration |R10|p. 93
4a.5.16Reporting Access Network Information |R11|p. 93
4a.5.17Resource reservation for services sharing priority |R13|p. 94
4a.5.18Support for QoS rule versioning |R14|p. 95
4a.5.19Extended bandwidth support for EPC supporting Dual Connectivity (E-UTRAN and 5G NR) |R15|p. 96
4bSd reference point |R11|p. 96
4b.1Overview  p. 96
4b.2Sd Reference model  p. 97
4b.3Application Detection and Control Rules  p. 97
4b.3.1Functional entities  p. 97
4b.3.2Application Detection and Control Rule Definition  p. 97
4b.3.3Operations on ADC Rules  p. 99
4b.4Functional elements  p. 100
4b.4.1PCRF  p. 100
4b.4.2TDF  p. 100
4b.5ADC procedures over Sd reference point for solicited application reporting  p. 101
4b.5.1Provisioning of ADC rules  p. 101
4b.5.1.1General  p. 101
4b.5.1.2Gate function  p. 103
4b.5.1.3Bandwidth limitation function  p. 103
4b.5.1.4Redirect function  p. 103
4b.5.1.5Usage Monitoring Control  p. 103
4b.5.1.6Marking of downlink packets |R13|p. 104
4b.5.2Request for ADC rules  p. 104
4b.5.3Provisioning of Event Triggers  p. 104
4b.5.4Request of TDF Session Termination  p. 104
4b.5.5ADC Rule Error Handling  p. 105
4b.5.6Requesting Usage Monitoring Control  p. 105
4b.5.7Reporting Accumulated Usage  p. 107
4b.5.7.1General  p. 107
4b.5.7.2Usage Threshold Reached  p. 108
4b.5.7.3ADC Rule Removal  p. 108
4b.5.7.4Usage Monitoring Disabled  p. 108
4b.5.7.5TDF Session Termination  p. 108
4b.5.7.6PCRF Requested Usage Report  p. 108
4b.5.7.7Report in case of Monitoring Time provided  p. 108
4b.5.8Provisioning of Event Report Indication  p. 109
4b.5.9Application Detection Information  p. 110
4b.5.10Time of the day procedures  p. 110
4b.5.11PCRF Failure and Restoration  p. 111
4b.5.12Bandwidth limitation function |R12|p. 111
4b.5.13Provisioning of charging related information for the TDF session |R12|p. 112
4b.5.13.1Provisioning of Charging Addresses  p. 112
4b.5.13.2Provisioning of Default Charging Method  p. 112
4b.5.13.3Provisioning of Charging Characteristics  p. 112
4b.5.14Downlink packet marking by the TDF |R13|p. 112
4b.5.15Traffic steering control support |R13|p. 113
4b.5.16Sponsored Data Connectivity |R14|p. 113
4b.5.17Extended bandwidth support for EPC supporting Dual Connectivity (E-UTRAN and 5G NR) |R15|p. 114
4b.5aADC procedures over Sd reference point for unsolicited application reporting  p. 114
4b.5a.1Provisioning of ADC rules  p. 114
4b.5a.1.1General  p. 114
4b.5a.2Application Detection Information  p. 114
4b.5a.3Request of TDF Session Termination  p. 115
4b.5a.4TDF session to Gx session linking  p. 115
4cSt reference point |R13|p. 115
4c.1Overview  p. 115
4c.2St Reference model  p. 115
4c.3Functional elements  p. 116
4c.3.1PCRF  p. 116
4c.3.2TSSF  p. 116
4c.4Procedures over St reference point  p. 116
4c.4.1Traffic Steering Control Information Provisioning  p. 116
4c.4.2St Session Termination  p. 118
4c.4.3ADC Rule Error Handling  p. 118
4c.4.4UE IPv4 Address Provisioning  p. 118
5Gx protocol  p. 118
5.1Protocol support  p. 118
5.2Initialization, maintenance and termination of connection and session  p. 119
5.3Gx specific AVPs  p. 119
5.3.0General |R13|p. 119
5.3.1Bearer-Usage AVP (3GPP-GPRS and 3GPP-EPS access types)  p. 125
5.3.2Charging-Rule-Install AVP (All access types)  p. 125
5.3.3Charging-Rule-Remove AVP (All access types)  p. 126
5.3.4Charging-Rule-Definition AVP (All access types)  p. 127
5.3.5Charging-Rule-Base-Name AVP (All access types)  p. 128
5.3.6Charging-Rule-Name AVP (All access types)  p. 128
5.3.7Event-Trigger AVP (All access types)  p. 128
5.3.8Metering-Method AVP (All access types)  p. 136
5.3.9Offline AVP (All access types)  p. 136
5.3.10Online AVP (All access types)  p. 137
5.3.11Precedence AVP (All access types)  p. 137
5.3.12Reporting-Level AVP (All access types)  p. 138
5.3.13TFT-Filter AVP (3GPP-GPRS access type only)  p. 138
5.3.14TFT-Packet-Filter-Information AVP (3GPP-GPRS access type only)  p. 139
5.3.15ToS-Traffic-Class AVP (All access types)  p. 139
5.3.16QoS-Information AVP (All access types)  p. 139
5.3.17QoS-Class-Identifier AVP (All access types)  p. 141
5.3.18Charging-Rule-Report AVP (All access types)  p. 143
5.3.19PCC-Rule-Status AVP (All access types)  p. 144
5.3.20Bearer-Identifier AVP (Applicable access type 3GPP-GPRS)  p. 144
5.3.21Bearer-Operation AVP (Applicable access type 3GPP-GPRS)  p. 144
5.3.22Access-Network-Charging-Identifier-Gx AVP (All access types)  p. 145
5.3.23Bearer-Control-Mode AVP  p. 145
5.3.24Network-Request-Support AVP  p. 145
5.3.25Guaranteed-Bitrate-DL AVP  p. 146
5.3.26Guaranteed-Bitrate-UL AVP  p. 146
5.3.27IP-CAN-Type AVP (All access types)  p. 146
5.3.28QoS-Negotiation AVP (3GPP-GPRS Access Type only)  p. 147
5.3.29QoS-Upgrade AVP (3GPP-GPRS Access Type only)  p. 147
5.3.30Event-Report-Indication AVP (All access types)  p. 148
5.3.31RAT-Type AVP  p. 149
5.3.32Allocation-Retention-Priority AVP (All access types)  p. 152
5.3.33CoA-IP-Address AVP (All access types)  p. 152
5.3.34Tunnel-Header-Filter AVP (All access types)  p. 152
5.3.35Tunnel-Header-Length AVP (All access types)  p. 152
5.3.36Tunnel-Information AVP (All access types)  p. 153
5.3.37CoA-Information AVP (All access types)  p. 153
5.3.38Rule-Failure-Code AVP (All access types) |R8|p. 153
5.3.39APN-Aggregate-Max-Bitrate-DL AVP |R8|p. 156
5.3.40APN-Aggregate-Max-Bitrate-UL AVP |R8|p. 156
5.3.41Revalidation-Time (ALL Access Types) |R8|p. 156
5.3.42Rule-Activation-Time (ALL Access Types) |R8|p. 156
5.3.43Rule-Deactivation-Time (ALL Access Types) |R8|p. 156
5.3.44Session-Release-Cause (All access types) |R8|p. 157
5.3.45Priority-Level AVP (All access types) |R8|p. 157
5.3.46Pre-emption-Capability AVP |R8|p. 157
5.3.47Pre-emption-Vulnerability AVP |R8|p. 158
5.3.48Default-EPS-Bearer-QoS AVP |R8|p. 158
5.3.49AN-GW-Address AVP (All access types) |R8|p. 158
5.3.50Resource-Allocation-Notification AVP (All access types) |R8|p. 158
5.3.51Security-Parameter-Index AVP (All access types) |R8|p. 159
5.3.52Flow-Label AVP (All access types) |R8|p. 159
5.3.53Flow-Information AVP (All access types) |R8|p. 159
5.3.54Packet-Filter-Content AVP |R8|p. 159
5.3.55Packet-Filter-Identifier AVP |R8|p. 160
5.3.56Packet-Filter-Information AVP |R8|p. 160
5.3.57Packet-Filter-Operation AVP |R8|p. 161
5.3.58PDN-Connection-ID AVP |R8|p. 161
5.3.59Monitoring-Key AVP |R9|p. 161
5.3.60Usage-Monitoring-Information AVP |R9|p. 161
5.3.61Usage-Monitoring-Level AVP |R9|p. 162
5.3.62Usage-Monitoring-Report AVP |R9|p. 162
5.3.63Usage-Monitoring-Support AVP |R9|p. 162
5.3.64CSG-Information-Reporting AVP |R9|p. 162
5.3.65Flow-Direction AVP |R9|p. 163
5.3.66Packet-Filter-Usage AVP (All access types) |R9|p. 163
5.3.67Charging-Correlation-Indicator AVP (All access types) |R9|p. 163
5.3.68Routing-Rule-Install AVP |R10|p. 164
5.3.69Routing-Rule-Remove AVP |R10|p. 164
5.3.70Routing-Rule-Definition AVP |R10|p. 164
5.3.71Routing-Rule-Identifier AVP |R10|p. 165
5.3.72Routing-Filter AVP |R10|p. 165
5.3.73Routing-IP-Address AVP |R10|p. 165
5.3.74Voidp. …
5.3.75Voidp. …
5.3.76Voidp. …
5.3.77TDF-Application-Identifier AVP |R11|p. 165
5.3.78TDF-Information AVP |R11|p. 165
5.3.79TDF-Destination-Realm AVP |R11|p. 166
5.3.80TDF-Destination-Host AVP |R11|p. 166
5.3.81TDF-IP-Address AVP |R11|p. 166
5.3.82Redirect-Information AVP |R11|p. 166
5.3.83Redirect-Support AVP |R11|p. 166
5.3.84PS-to-CS-Session-Continuity AVP (3GPP-EPS access type only) |R11|p. 167
5.3.85Voidp. …
5.3.86Voidp. …
5.3.87Voidp. …
5.3.88Voidp. …
5.3.89Voidp. …
5.3.90Voidp. …
5.3.91Application-Detection-Information AVP |R11|p. 167
5.3.92TDF-Application-Instance-Identifier AVP |R11|p. 168
5.3.93Voidp. …
5.3.94Voidp. …
5.3.95HeNB-Local-IP-Address AVP (3GPP-EPS access type only) |R11|p. 168
5.3.96UE-Local-IP-Address AVP (Non-3GPP-EPS access type only) |R11|p. 168
5.3.97UDP-Source-Port AVP (3GPP-EPS and Non-3GPP-EPS access types) |R11|p. 168
5.3.98Mute-Notification AVP |R11|p. 168
5.3.99Monitoring-Time AVP |R11|p. 168
5.3.100AN-GW-Status AVP (3GPP-EPS access type) |R11|p. 168
5.3.101User-Location-Info-Time AVP |R11|p. 169
5.3.102Credit-Management-Status AVP |R11|p. 169
5.3.103Default-QoS-Information AVP (FBA access type) |R12|p. 169
5.3.104Default-QoS-Name AVP (FBA access type) |R12|p. 170
5.3.105Conditional-APN-Aggregate-Max-Bitrate (All access types) |R12|p. 170
5.3.106RAN-NAS-Release-Cause AVP (3GPP-EPS and Non-3GPP-EPS access type) |R12|p. 170
5.3.107Presence-Reporting-Area-Elements-List AVP (3GPP-EPS access type) |R12|p. 170
5.3.108Presence-Reporting-Area-Identifier AVP (3GPP-EPS access type) |R12|p. 171
5.3.109Presence-Reporting-Area-Information AVP (3GPP-EPS access type) |R12|p. 171
5.3.110Presence-Reporting-Area-Status AVP (3GPP-EPS access type) |R12|p. 171
5.3.111NetLoc-Access-Support AVP |R12|p. 171
5.3.112Fixed-User-Location-Info AVP (FBA access type) |R12|p. 172
5.3.113PCSCF-Restoration-Indication AVP |R12|p. 172
5.3.114IP-CAN-Session-Charging-Scope AVP |R12|p. 172
5.3.115Monitoring-Flags AVP |R13|p. 172
5.3.116NBIFOM-Support AVP |R13|p. 172
5.3.117NBIFOM-Mode AVP |R13|p. 173
5.3.118Routing-Rule-Report AVP |R13|p. 173
5.3.119Routing-Rule-Failure-Code AVP |R13|p. 173
5.3.120Default-Access AVP |R13|p. 174
5.3.121Access-Availability-Change-Reason AVP |R13|p. 174
5.3.122RAN-Rule-Support AVP |R13|p. 174
5.3.123Traffic-Steering-Policy-Identifier-DL AVP |R13|p. 174
5.3.124Traffic-Steering-Policy-Identifier-UL AVP |R13|p. 174
5.3.125Resource-Release-Notification AVP (All access types) |R13|p. 175
5.3.126Removal-Of-Access AVP |R13|p. 175
5.3.127Execution-Time AVP (ALL Access Types) |R13|p. 175
5.3.128Conditional-Policy-Information AVP |R13|p. 175
5.3.129TCP-Source-Port AVP (Non-3GPP-EPS access type) |R13|p. 176
5.3.130PRA-Install AVP (3GPP-EPS access type) |R14|p. 176
5.3.131PRA-Remove AVP (3GPP-EPS access type) |R14|p. 176
5.3.132Default-Bearer-Indication AVP |R14|p. 176
5.3.1333GPP-PS-Data-Off-Status AVP (Applicable access type 3GPP-EPS) |R14|p. 176
5.3.134Extended-APN-AMBR-DL AVP |R15|p. 177
5.3.135Extended-APN-AMBR-UL AVP |R15|p. 177
5.3.136Extended-GBR-DL AVP |R15|p. 177
5.3.137Extended-GBR-UL AVP |R15|p. 177
5.3.138Max-PLR-DL AVP |R15|p. 177
5.3.139Max-PLR-UL AVP |R15|p. 177
5.3.140UE-Status AVP (3GPP-EPS access type) |R15|p. 177
5.3.141Presence-Reporting-Area-Node AVP (3GPP-EPS access type) |R15|p. 177
5.4Gx re-used AVPs  p. 178
5.4.0General |R13|p. 178
5.4.1Use of the Supported-Features AVP on the Gx reference point |R8|p. 185
5.4.2Flow-Description AVP |R11|p. 189
5.5Gx specific Experimental-Result-Code AVP values  p. 190
5.5.1General  p. 190
5.5.2Success  p. 190
5.5.3Permanent Failures  p. 190
5.5.4Transient Failures  p. 191
5.6Gx Messages  p. 192
5.6.1Gx Application  p. 192
5.6.2CC-Request (CCR) Command  p. 192
5.6.3CC-Answer (CCA) Command  p. 193
5.6.4Re-Auth-Request (RAR) Command  p. 194
5.6.5Re-Auth-Answer (RAA) Command  p. 195
5aGxx protocols |R8|p. 195
5a.1Protocol support  p. 195
5a.2Initialization, maintenance and termination of connection and session  p. 196
5a.3Gxx specific AVPs  p. 196
5a.3.0General |R13|p. 196
5a.3.1QoS-Rule-Install AVP (All access types)  p. 196
5a.3.2QoS-Rule-Remove AVP (All access types)  p. 197
5a.3.3QoS-Rule-Definition AVP (All access types)  p. 198
5a.3.4QoS-Rule-Name AVP (All access types)  p. 198
5a.3.5QoS-Rule-Report AVP (All access types)  p. 198
5a.3.6Session-Linking-Indicator AVP (All access types)  p. 199
5a.3.7QoS-Rule-Base-Name AVP (All access types) |R9|p. 199
5a.4Gxx re-used AVPs  p. 199
5a.4.0General |R13|p. 199
5a.4.1Use of the Supported-Features AVP on the Gxx reference point  p. 204
5a.5Gxx specific Experimental-Result-Code AVP values  p. 206
5a.6Gxx Messages  p. 206
5a.6.1Gxx Application  p. 206
5a.6.2CC-Request (CCR) Command  p. 206
5a.6.3CC-Answer (CCA) Command  p. 207
5a.6.4Re-Auth-Request (RAR) Command  p. 207
5a.6.5Re-Auth-Answer (RAA) Command  p. 208
5bSd protocol |R11|p. 208
5b.1Protocol support  p. 208
5b.2Initialization, maintenance and termination of connection and session  p. 209
5b.3Sd specific AVPs  p. 209
5b.3.0General |R13|p. 209
5b.3.1ADC-Rule-Install AVP  p. 209
5b.3.2ADC-Rule-Remove AVP  p. 210
5b.3.3ADC-Rule-Definition AVP  p. 210
5b.3.4ADC-Rule-Base-Name AVP  p. 211
5b.3.5ADC-Rule-Name AVP  p. 211
5b.3.6ADC-Rule-Report AVP  p. 211
5b.3.7Voidp. …
5b.4Sd re-used AVPs  p. 211
5b.4.0General |R13|p. 211
5b.4.1Use of the Supported-Features AVP on the Sd reference point  p. 220
5b.5Sd specific Experimental-Result-Code AVP values  p. 221
5b.5.1General  p. 221
5b.5.2Success  p. 221
5b.5.3Permanent Failures  p. 221
5b.5.4Transient Failures  p. 222
5b.6Sd Messages  p. 222
5b.6.1Sd Application  p. 222
5b.6.2TDF-Session-Request (TSR) Command  p. 222
5b.6.3TDF-Session-Answer (TSA) Command  p. 223
5b.6.4CC-Request (CCR) Command  p. 223
5b.6.5CC-Answer (CCA) Command  p. 224
5b.6.6Re-Auth-Request (RAR) Command  p. 225
5b.6.7Re-Auth-Answer (RAA) Command  p. 225
5cSt Diameter protocol |R13|p. 225
5c.1St Application  p. 225
5c.2Initialization, maintenance and termination of connection and session  p. 226
5c.3St specific AVPs  p. 226
5c.3.1General  p. 226
5c.3.2Request-Type AVP  p. 226
5c.4St re-used AVPs  p. 227
5c.4.1General  p. 227
5c.4.2Use of the Supported-Features AVP on the St reference point  p. 229
5c.5St specific Experimental-Result-Code AVP values  p. 230
5c.5.1General  p. 230
5c.5.2Success  p. 230
5c.5.3Permanent Failures  p. 230
5c.5.4Transient Failures  p. 231
5c.6St Messages  p. 231
5c.6.1General  p. 231
5c.6.2TDF-Session-Request (TSR) Command  p. 231
5c.6.3TDF-Session-Answer (TSA) Command  p. 232
5c.6.4Session-Termination-Request (STR) command  p. 232
5c.6.5Session-Termination-Answer (STA) command  p. 232
5c.6.6TSSF-Notification-Request (TNR) Command  p. 233
5c.6.7TSSF-Notification-Answer (TNA) Command  p. 233
A(Normative)  Access specific aspects (GPRS) |R8|p. 234
A.0Scope  p. 234
A.1Reference model  p. 234
A.2Functional elements  p. 234
A.2.1PCRF  p. 234
A.3PCC procedures  p. 234
A.3.1Request for PCC rules  p. 234
A.3.2Provisioning of PCC rules  p. 235
A.3.2.1PCC rule request for services not known to PCRF  p. 236
A.3.2.2Selecting a PCC rule and IP CAN Bearer for Downlink IP packets  p. 236
A.3.3Provisioning and Policy Enforcement of Authorized QoS  p. 236
A.3.3.0Overview  p. 236
A.3.3.1Provisioning of authorized QoS per IP CAN bearer  p. 236
A.3.3.2Policy enforcement for authorized QoS per IP CAN bearer  p. 238
A.3.3.2aPolicy provisioning for authorized QoS per service data flow  p. 238
A.3.3.3Policy enforcement for authorized QoS per service data flow  p. 238
A.3.3.3aCoordination of authorized QoS scopes in mixed mode  p. 238
A.3.3.3bProvisioning of authorized QoS per QCI  p. 238
A.3.3.4Policy enforcement for authorized QoS per QCI  p. 239
A.3.3.5Voidp. …
A.3.3.6Provisioning of authorized QoS per APN |R10|p. 239
A.3.4Indication of IP-CAN Bearer Termination Implications  p. 239
A.3.5Indication of IP-CAN Session Termination  p. 239
A.3.6Request of IP-CAN Bearer Termination  p. 239
A.3.7Request of IP-CAN Session Termination  p. 240
A.3.8Bearer Control Mode Selection  p. 240
A.3.9Bearer Binding Mechanism  p. 241
A.3.10Voidp. …
A.3.11PCC Rule Error Handling  p. 241
A.3.12IMS Emergency Session Support  p. 241
A.3.12.1Request of PCC Rules for an Emergency services |R9|p. 241
A.3.12.2Provisioning of PCC Rules for an Emergency services |R9|p. 241
A.3.13Removal of PCC Rules for Emergency Services |R9|p. 242
A.3.14Removal of PCC Rules at Gx session termination |R9|p. 242
A.3.15IMS Restoration Support |R9|p. 242
A.3.16Provisioning of CSG information reporting indication |R9|p. 242
A.3.17Packet-Filter-Usage AVP |R9|p. 242
A.3.18Precedence handling |R9|p. 242
A.3.19Reporting Access Network Information |R9|p. 243
A.3.20User CSG Information Reporting |R11|p. 243
A.3.21IMS RLOS Support |R16|p. 243
A.4QoS mapping  p. 243
A.4.1GPRS QCI to UMTS QoS parameter mapping  p. 243
A.4.2GPRS ARP to UMTS ARP parameter mapping |R9|p. 244
B(Normative)  Access specific aspects, 3GPP (GERAN/UTRAN/E-UTRAN) EPS |R8|p. 245
B.1Scope  p. 245
B.2Functional Elements  p. 245
B.2.1PCRF  p. 245
B.2.2PCEF  p. 245
B.2.3BBERF  p. 245
B.3PCC procedures  p. 245
B.3.1Request for PCC and/or QoS rules  p. 245
B.3.2Provisioning of PCC and/or QoS rules  p. 246
B.3.3Provisioning and Policy Enforcement of Authorized QoS  p. 247
B.3.3.1Provisioning of authorized QoS per APN  p. 247
B.3.3.2Policy enforcement for authorized QoS per APN  p. 247
B.3.3.3QoS handling for interoperation with Gn/Gp SGSN  p. 247
B.3.3.4Voidp. …
B.3.3.5Policy provisioning for authorized QoS per service data flow |R11|p. 250
B.3.3.6Policy enforcement for authorized QoS of the Default EPS Bearer |R12|p. 250
B.3.4Packet-Filter-Information AVP  p. 251
B.3.5Bearer Control Mode Selection  p. 251
B.3.6Trace activation/deactivation at P-GW  p. 251
B.3.7IMS Restoration Support  p. 251
B.3.8Provisioning of CSG information reporting indication |R9|p. 251
B.3.9Packet-Filter-Usage AVP |R9|p. 251
B.3.10User CSG Information Reporting |R9|p. 251
B.3.10.1GTP-based S5/S8  p. 251
B.3.10.2PMIP-based S5/S8  p. 251
B.3.11Request of IP-CAN Bearer Termination |R9|p. 252
B.3.12CS to PS handover |R9|p. 252
B.3.13Precedence handling |R11|p. 252
B.3.14S-GW Restoration Support |R11|p. 253
B.3.15Reporting Access Network Information |R11|p. 254
B.3.16Presence Reporting Area Information reporting |R12|p. 254
B.3.17Multiple Presence Reporting Area Information reporting |R14|p. 255
B.3.18RAN Information Support |R15|p. 256
CMapping table for type of access networks |R8|p. 257
D(Normative)  Access specific aspects (EPC-based Non-3GPP) |R8|p. 258
D.1Scope  p. 258
D.2EPC-based eHRPD Access  p. 258
D.2.1General  p. 258
D.2.2Gxa procedures  p. 258
D.2.2.1Request for QoS rules  p. 258
D.2.2.2Provisioning of QoS rules  p. 259
D.2.2.2.1QoS rule request for services not known to PCRF  p. 259
D.2.2.3Provisioning and Policy Enforcement of Authorized QoS  p. 259
D.2.2.3.1Provisioning of authorized QoS  p. 259
D.2.2.3.2Policy enforcement for authorized QoS  p. 259
D.2.3Bearer Control Mode selection  p. 259
D.2.4QoS Mapping  p. 260
D.2.4.1QCI to eHRPD QoS parameter mapping  p. 260
D.3EPC-based Trusted WLAN Access with S2a |R11|p. 260
D.4EPC-based Untrusted WLAN Access |R13|p. 260
E(Normative)  Access specific aspects, Fixed Broadband Access interworking with EPC |R11|p. 262
E.1Scope  p. 262
E.2Definitions and abbreviations  p. 262
E.2.1Definitions  p. 262
E.2.2Abbreviations  p. 262
E.3Reference points and Reference model  p. 262
E.3.0General  p. 262
E.3.1Gx Reference Point  p. 262
E.3.2Gxx Reference Point  p. 263
E.3.3S15 Reference Point  p. 263
E.3.3aSd Reference Point  p. 263
E.3.4Reference Model  p. 263
E.4Functional Elements  p. 266
E.4.1PCRF  p. 266
E.4.2PCEF  p. 267
E.4.3BBERF  p. 267
E.4.4HNB GW  p. 267
E.5PCC procedures  p. 267
E.5.1PCC procedures over Gx reference point  p. 267
E.5.2PCC procedures over Gxx reference point  p. 268
E.5.2.1Gateway Control Session Establishment  p. 268
E.5.2.2Gateway Control Session Modification  p. 268
E.5.2.3Gateway Control Session Termination  p. 268
E.5.2.4Request of Gateway Control Session Termination  p. 268
E.5.3S15 Procedures  p. 268
E.5.3.1S15 Session Establishment  p. 268
E.5.3.2S15 Session Modification  p. 269
E.5.3.2.1S15 Session Modification initiated by the HNB GW  p. 269
E.5.3.2.2S15 Session Modification initiated by the PCRF  p. 269
E.5.3.3S15 Session Termination  p. 269
E.5.4ADC procedures over Sd reference point for solicited application reporting  p. 269
E.5.4.1TDF session establishment  p. 269
E.5.5ADC procedures over Sd reference point for unsolicited application reporting  p. 270
E.5.5.1General  p. 270
E.5.5.2TDF session to S9a* session linking  p. 270
E.6S15 Protocol  p. 270
E.6.1Protocol support  p. 270
E.6.2Initialization, maintenance and termination of connection and session  p. 271
E.6.3S15 specific AVPs  p. 271
E.6.3.1General  p. 271
E.6.3.2CS-Service-QoS-Request-Identifier  p. 271
E.6.3.3CS-Service-QoS-Request-Operation  p. 271
E.6.3.4CS-Service-Resource-Result-Operation  p. 272
E.6.3.5CS-Service-Resource-Failure-Cause  p. 272
E.6.3.6CS-Service-Resource-Report  p. 272
E.6.4S15 re- used AVPs  p. 272
E.6.4.1General  p. 272
E.6.4.2Use of the Supported-Features AVP on the S15 reference point  p. 273
E.6.5S15 specific Experimental-Result-Code AVP values  p. 274
E.6.5.1General  p. 274
E.6.5.2Success  p. 274
E.6.5.3Permanent Failures  p. 274
E.6.5.4Transient Failures  p. 274
E.6.6S15 Messages  p. 274
E.6.6.1S15 Application  p. 274
E.6.6.2CC-Request (CCR) Command  p. 274
E.6.6.3CC-Answer (CCA) Command  p. 275
E.6.6.4Re-Auth-Request (RAR) Command  p. 275
E.6.6.5Re-Auth-Answer (RAA) Command  p. 276
FDisabling/re-enabling Usage Monitoring for a PCC/ADC rule |R12|p. 277
G(Normative)  Access specific aspects, Fixed Broadband Access network convergence |R12|p. 278
G.1Scope  p. 278
G.2Definitions and abbreviations  p. 278
G.2.1Definitions  p. 278
G.2.2Abbreviations  p. 278
G.3Reference points and Reference model  p. 279
G.3.1Reference architecture  p. 279
G.3.1.1General  p. 279
G.3.1.2Reference architecture  p. 279
G.3.2Gx Reference Point  p. 280
G.3.3Sd Reference Point  p. 280
G.4Functional Elements  p. 281
G.4.1PCRF  p. 281
G.4.2PCEF(IP Edge)  p. 281
G.4.3TDF  p. 281
G.5PCC procedures  p. 281
G.5.1Concept Adaptations for Fixed Broadband Access Network Convergence  p. 281
G.5.1.1General  p. 281
G.5.1.2IP-CAN session  p. 281
G.5.1.3IP-CAN bearer  p. 282
G.5.1.4PCC rule  p. 282
G.5.1.5ADC rule  p. 282
G.5.1.6Subscriber Identifier  p. 282
G.5.1.7Default QoS control  p. 282
G.5.2IP-CAN Session Establishment  p. 283
G.5.3IP-CAN Session Termination  p. 284
G.5.4IP-CAN Session Modification  p. 284
G.5.4.1PCEF-Initiated IP-CAN Session Modification  p. 284
G.5.4.2PCRF-Initiated IP-CAN Session Modification  p. 284
HPolicy Control for Remote UEs behind a ProSe UE-to-network relay UE |R13|p. 286
$Change history  p. 287

Up   Top