Internal Message Trace Guide - Training Slide: Security Level

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 46

Security Level:

Internal Message Trace


Guide - Training Slide
2011-03-25

www.huawei.com

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential


After completing this course, you will understand:
 CSCF architecture: internal module (PID) and its functions
 PIDs through which the basic message processing flow passes
 Procedure of locating problems by using internal messages
 Typical cases about locating problems by using internal
messages

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 3


Chapter 1 CSCF Architecture: Internal
Module (PID) and Its Functions
Chapter 2 Functions of the PIDs in the
Basic Message Flow
Chapter 3 Procedure of Locating Problems
by Using Internal Messages
Chapter 4 Typical Cases

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 4


Chapter 1 CSCF Architecture: Internal Module
(PID) and Its Functions

1.1 CSCF Architecture

1.2 Processes of the CSCF NE and Their


Functions

1.3 Diagrams of the Application Layers of the


P-CSCF, I-CSCF, and S-CSCF NEs

1.4 Main PID Functions of Different Processes

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 5


1.1 CSCF Architecture
Call Session Control Function (CSCF)
 Based on locations and functions, CSCFs can be classified into three types: P-CSCF, S-CSCF,
and I-CSCF:
 P-CSCF (Proxy CSCF): As the first interaction point between the IMS network and users, the
P-CSCF provides the proxy function. That is, the P-CSCF accepts and forwards service
requests but cannot modify the Request URI field in an INVITE message. The P-CSCF also
provides the user agent (UA) function, that is, interrupting and independently generating SIP
sessions when a fault occurs.
 S-CSCF (Serving CSCF): As the core of the IMS core network, the S-CSCF performs the
registration authentication, session control of UEs, and the implements the basic session
routing functions for the IMS users on the calling side and called side. In addition, based on the
IMS triggering rules to which the user have subscribed, the S-CSCF triggers value-added
service routes to ASs and completes service control interaction when the conditions are met.
 I-CSCF (Interrogating CSCF): Similar to a gateway node on the IMS network, the I-CSCF
allocates service nodes to the users in the current domain, queries routes, and hides
topologies between IMS domains.
 The P-CSCF, S-CSCF, and I-CSCF can be physically integrated. In the actual networking, factors
such as the IMS service access mode, positions of IMS access points, CSCF capacities and
capabilities, and user traffic requirements, need to be considered for the division and deployment of
CSCFs. The network topology hiding and interconnection requirements of the operator also need to
be considered.

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 6


1.1 CSCF Architecture

Processing on Processing on Processing on Processing on Processing on


the P-CSCF the S-CSCF the I-CSCF the BCF the MRFC

Protocol processing and ... Protocol processing and


message distribution message distribution

IPv4 and IPv6 packet distribution


and processing

IP Core

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 7


1.1 CSCF Architecture
 IPv4 and IPv6 packet distribution and processing layer:
 Provides the function of converging multiple IP addresses.
 Supports the IPv4 and IPv6 dual-stack
 Distributes IP packets according to the quintuple (source IP address, destination IP
address, source port number, destination port number, and protocol ID) or IPSec
SA.
 Protocol processing and message distribution layer:
 Supports network layer processing, for example, IPSec processing.
 Supports the processing of transport layer protocols, such as the SCTP, TCP, and
UDP.
 Supports the coding and decoding in the DNS/ENUM, Diameter, and COPS
protocols.
 Supports the upward distribution and downward forwarding of protocol messages.
 Application processing layer:
 Supports the coding and decoding of SIP messages and transaction-layer
processing of protocols.
 Completes the application processing on the P-CSCF, I-CSCF, S-CSCF, and BCF.

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 8


Chapter 1 CSCF Architecture: Internal Module
(PID) and Its Functions

1.1 CSCF Architecture

1.2 Processes of the CSCF NE and Their


Functions

1.3 Diagrams of the Application Layers of the


P-CSCF, I-CSCF, and S-CSCF NEs

1.4 Main PID Functions of Different Processes

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 9


1.2 Processes of the CSCF NE and Their
Functions
 Functions of the processes:
 Dispatch Unit (DPU): As the system egress, the DPU receives IP packets from external
systems and forwards the IP packets to the corresponding BSU and out of the system.
 Broadband Signaling Unit (BSU): As the signaling processing process, the BSU
terminates TCP/SCTP connections, completes the coding and decoding in the COPS
and Diameter protocols, and converts the coded and decoded messages into internal
messages before forwarding the messages to the SCU and ASU.
 Session Control Unit (SCU): As the call control process, the SCU completes functions
such as SIP processing, DIAMETER coding/decoding and protocol processing, call
connection and service triggering, service logic control, and charging. The SCU and ASU
complete the service logic functions of the P-CSCF, I-CSCF, S-CSCF, BCF, MRFC, and
GT-AS.
 Central Database (CDB): As the central database process, the CDB maintains the
global data and user distribution data in the system.

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 10


1.2 Processes of the CSCF NE and Their
Functions
CDB  As a global database,
the CDB centrally
(central database)
controls the distribution.

 The SCU completes the


SCU SCU secondary distribution
(service processing) of SIP signaling and
(service processing)
service processing.

 The BSU establishes,


manages, and deletes
BSU BSU BSU connection-oriented
(protocol processing) (protocol processing) (protocol processing) links, including the TCP
links carrying SIP
signaling.

DPU  The DPU distributes IP


DPU kernel messages, including
(IP packet distribution)
UDP messages and
connection-oriented
messages, to the BSU
and SCU.

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 11


Chapter 1 CSCF Architecture: Internal Module
(PID) and Its Functions

1.1 CSCF Architecture

1.2 Processes of the CSCF NE and Their


Functions

1.3 Diagrams of the Application Layers of the


P-CSCF, I-CSCF, and S-CSCF NEs

1.4 Main PID Functions of Different Processes

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 12


Related Tasks on the Application Layer of the
P-CSCF

P registration P subscription
P session processing P P/IM processing
processing processing

P user data
SIPCB Charging QoS
management
NAT

SCU SIP transaction layer DIAMETER RM

P user index
management SIP distribution DIAMETER
distribution
COPS DNS
SIP TPT, CODEC
COMPRESS, IPSec DIAMETER CM
DPU
UDP/IP TCP/IP

BSU
HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 13
Related Tasks on the Application Layer of the
I-CSCF

Processing on the I-CSCF

SIPCB Charging Cx/Dx

SIP transaction layer DIAMETER RM


SCU

SIP distribution DIAMETER


distribution
DNS
SIP TPT, CODEC
DIAMETER CM

UDP/IP TCP/IP

BSU
HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 14
Related Tasks on the Application Layer of the
S-CSCF
S calling party S called party
processing processing
S registration SP/IM S subscription
processing processing processing
S ILCM S OLCM

S subscription
SIPCB Charging Cx/Dx
data management
ENUM transaction

SCU SIP transaction layer DIAMETER RM

S user index
management SIP distribution DIAMETER
distribution
DNS/ENUM
SIP TP, CODEC
DIAMETER CM
CDB
UDP/IP TCP/IP

BSU
HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 15
Chapter 1 CSCF Architecture: Internal Module
(PID) and Its Functions

1.1 CSCF Architecture

1.2 Processes of the CSCF NE and Their


Functions

1.3 Diagrams of the Application Layers of the


P-CSCF, I-CSCF, and S-CSCF NEs

1.4 Main PID Functions of Different Processes

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 16


1.4 Main PID Functions of Different Processes
 PID-SIPC: It is the SIPC module and the adaptation layer of the SIP protocol stack. All the
SIP messages, for example, the request and response messages exchanged between the
PReg module and the SIPC module, are reported by the PID-SIPC to the service layer.
 PID-DBMS: Queries the configuration and static configuration related to user access.
 PID-PREG: Module that the P-CSCF uses to process the registration flow
 PID-IMSG: Service processing module of the I-CSCF
 PID-PCALL: Module that the P-CSCF uses to process the call flow
 PID-SCALL: Module that the S-CSCF uses to process the call flow
 PID-DiamRM: Diameter protocol stack
 PID-MRC: Internal processing control module of the MRC
 PID-CRO: Module responsibility or H.248 processing and distribution

Remarks:
PID: In this document, a PID refers to the sub-module of a process (module). A PID is the
basic unit used for message communication.
For example, the PREG, PCALL, SREG, and SCALL are the sub-modules of the SCU
process.

MID: It indicates the module ID. In this document, the internal message trace mainly involves
the SCU and CDB processes.

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 17


Chapter 1 CSCF Architecture: Internal
Module (PID) and Its Functions
Chapter 2 Functions of the PIDs in the
Basic Message Flow
Chapter 3 Procedure of Locating Problems
by Using Internal Messages
Chapter 4 Typical Cases

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 18


Chapter 2 Functions of the PIDs in the
Basic Message Flow

2.1 Internal Message Format

2.2 Registration Process

2.3 Basic Call Flow

2.4 Flow of Tone Playing and Number


Receiving on the MRFC

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 19


2.1 Internal Message Format
User message trace information:

Column No. Content Meaning


1 NO Message sequence number
It indicates the sequence in which the message is generated (In the case of network delay, a message
sent later may arrive beforehand).
2 Time Stamp Timestamp
It indicates the message generation time, which is the same as the host time.

3 Source It indicates the source IP address of the message and has a value only for an external (inter-NE)
Address message.
4 Source port It indicates the source port number of the message and has a value only for an external (inter-NE)
message.

5 Destination It indicates the destination IP address of the message and has a value only for an external (inter-NE)
Address message.
6 Destination It indicates the destination port number of the message and has a value only for an external (inter-NE)
port message.
7 Message Message interface type: Indicates the message that module A sends to module B.
Interface Type For example, TRC_MI_SIPC_P indicates the message that the SIPC sends to the PREG and PCALL.
CSCF_TRACE_MI_PREG_SIPC indicates the message that the PREG sends to the SIPC.
8 Message Type Message type name
For example, SIG_TRACE_MSG_INVITE_REQ indicates the INVITE message that the SIPC sends to
the PCALL.
CSCF_TRACE_MSG_ANID_QUERY indicates the message that the PREG sends to the DBMS to query
the access network ID.
9 Hex Message Hexadecimal code stream data of the message

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 20


2.1 Internal Message Format
Focus on the messages in the first eight columns:

Message interface type: Specifies whether the message is between two modules (PIDs) or between NEs.
For example:
TRC_MI_SIPC_P: Indicates a message sent by the SIPC to the PREG and PCALL.
CSCF_TRACE_MI_IMSG_DBMS: Indicates a message sent by the IMSG to the DBMS for data query.
Remarks: On the message trace interface, Diameter messages and SIP messages are identified in different
colors.

Message Type: Describes the type of the message.


For example:
CSCF_TRACE_MSG_AN_INFO_QUERY: Indicates a request message that the PREG and PCALL send to the
DBMS to query the access network information.
CSCF_TRACE_MSG_DIAM_USER_AUTHORIZATION: Indicates a message that the IMSG sends to the
DIAMRM to query the user registration status.

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 21


Examples of Inter-NE Message Interface Types
 SIP-based message interface type:
TRC_MI_SIPC_UP, TRC_MI_SIPC_DOWN: external message interaction between a UE and
P-CSCF TRC_MI_SIPC_SHORT: external message interaction among the P-CSCF, I-CSCF,
and S-CSCF
 DIAMETER-based message interface type:
TRC_MI_DIAM_CXDX_ACCT: external message interaction among the I-CSCF, S-CSCF, and
HSS based on the Cx and Dx interfaces, including message types such as UAR, UAA, MAR,
MAA, SAR, SAA, LIR, and LIA
TRC_MI_DIAM_GQ: external message interaction among the P-CSCF, BCF, and PDF based
on the Gq interface, including message types such as the AAR, AAA, STR, and STA
 H.248-based message interface type:
BCCOMP_TRACE_MI_H248_MGW: interaction of the external messages that the P-CSCF
and BCF send to the MGW based on the Ia interface, including message types, such as the
ADD_REQ, MOD_REQ, SUB_REQ, and NTFY_REQ
BCCOMP_TRACE_MI_MGW_H248: interaction of the external messages that the MGW sends
to the P-CSCF and BCF based on the Ia interface, including message types, such as the
ADD_REPLY, MOD_REPLY, SUB_REPLY, and NTFY_REPLY

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 22


Chapter 2 Functions of the PIDs in the
Basic Message Flow

2.1 Internal Message Format

2.2 Registration Process

2.3 Basic Call Flow

2.4 Flow of Tone Playing and Number


Receiving on the MRFC

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 23


2.2 Registration Process
Caller UE P-CSCF DNS I-CSCF S-CSCF HSS

1.REGISTER
2.DNS Query
3.DNS Query
Resp
4. REGISTER
5. Diameter: UAR
6. Diameter: UAA
7.REGISTER
8.Diameter: MAR
10. 401 9.Diameter: MAA
Unauthorized
12. 401 11. 401 Unauthorized
Unauthorized
13.REGISTER
14.DNS Query
15.DNS Query
Resp
16. REGISTER
17. Diameter: UAR
18. Diameter: UAA

19.REGISTER
20.Diameter: SAR
21.Diameter: SAA
22. 200 OK
23. 200 OK AS
24. 200 OK
25.REGISTER
26. 200 OK

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 24


Example of the Interaction Between PIDs
in the Registration Flow
PREG SIPC DBMS IMSG SREG

1.REGISTER(req)

2.DBMS_QUERY(req)

3.DBMS_QUERY(rsp)

4.REGISTER(rsp)
5.REGISTER(req)

6.DBMS_QUERY(req)

7.DBMS_QUERY(rsp)

8.REGISTER(rsp)

9.REGISTER(req)

10.DBMS_QUERY(req)

11.DBMS_QUERY(rsp)

12.REGISTER(rsp)

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 25


PIDs in the Registration Flow
 PID-SIPC: It is the SIPC module and the adaptation layer of the SIP protocol stack. All the SIP messages, for
example, the request and response messages exchanged between the PReg module and the SIPC module, are
reported by the PID-SIPC to the service layer.
 PID-PREG: Module that the P-CSCF uses to process the registration flow
 PID-SREG: Module that the S-CSCF uses to process the registration flow
 PID-IMSG: Service processing module of the I-CSCF
 PID-PSDB: This module stores the dynamic data of users, including the P user data. The PReg module interacts
with this module to create, query, update, and delete user data.
 PID-BILL: This module is used for charging.
 PID-NAT: This module is used by the PReg module to update the users after NAT translation or create NAT
mappings.
 PID-DiamRM: This module is used by the PReg module to query the location information about fixed users,
instruct the CLF to release the user subscription, and process the IP information release request messages
reported by the CLF.
 PID-PSA: This module is used by the PReg module to exchange SA-related information with the PSDB, including
creating, querying, deleting, and updating SAs.
 PID-HTMAIL: This module is used by the PReg module to query the location information about fixed users by
using HTMAIL.
 PID-LI: This module is used to support monitoring, including the functions such as obtaining the monitoring
handle and sending monitoring reports.
 PID-DBMS: Queries the configuration and P static configuration related to user access.

Message capture: ×¢²áÁ÷³Ì

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 26


Chapter 2 Functions of the PIDs in the
Basic Message Flow

2.1 Internal Message Format

2.2 Registration Process

2.3 Basic Call Flow

2.4 Flow of Tone Playing and Number


Receiving on the MRFC

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 27


2.3 Basic Call Flow
Caller UE P-CSCF S-CSCF I-CSCF S-CSCF P-CSCF Callee UE

INVITE
INVITE
INVITE
INVITE
INVITE
INVITE
INVITE183
INVITE183
INVITE183
INVITE183
INVITE183
INVITE183

PRACK
PRACK
PRACK
PRACK
PRACK

PRACK200 PRACK200
PRACK200 INVITE180
PRACK200 INVITE180
PRACK200 INVITE180
INVITE200
INVITE180 INVITE200
INVITE180 INVITE200
INVITE180 INVITE200
INVITE200
INVITE200
ACK
ACK
ACK
BYE ACK
BYE ACK
BYE
BYE
BYE
BYE200
BYE200 BYE200

BYE200
BYE200

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 28


PIDs in the Basic Call Flow
 PID-SIPC: It is the SIPC module and the adaptation layer of the SIP protocol stack. All the SIP
messages, for example, the request and response messages exchanged between the PReg module
and the SIPC module, are reported by the PID-SIPC to the service layer.
 PID-DBMS: Data management module used to query static databases.
 PID-PCALL: Module that the P-CSCF uses to process the call flow
 PID-SCALL: Module that the S-CSCF uses to process the call flow
 PID-IMSG: Service processing module of the I-CSCF
 PID-PSDB, SSDB: This module stores user dynamic data, including the P user data.
 PID-BILL: This module is used for charging.
 PID-NAT: This module is used by the Pcall module to update the users after NAT translation or
create NAT mappings.
 PID-DiamRM: Diameter protocol stack
 PID-PSA: This module manages SA data.
 PID-LI: This module is used to support monitoring, including the functions such as obtaining the
monitoring handle and sending monitoring reports.
 PID-DBMS: Queries the configuration information and P static configuration related to user access.

Message capture: »ù±¾ºô½ÐÁ÷³Ì

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 29


Chapter 2 Functions of the PIDs in the
Basic Message Flow

2.1 Internal Message Format

2.2 Registration Process

2.3 Basic Call Flow

2.4 Flow of Tone Playing and Number


Receiving on the MRFC

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 30


2.4 Flow of Tone Playing and Number Receiving
on the MRFC The MP interface is an H.248 interface. On the Mr interface, the tone playing and
number receiving functions can be implemented according to the MSML standards .
AS PID_SIPC PID_MRC CDB::PID_DBMS PID_CRO MRFP
R1: INVITE(S1)
R2: 100
R3: INVITE_REQ
R4: FEED_BACK
R5: APPLY_REQ
R6: APPLY_RSP
R7: PREPARE-BEARER-REQ
R8: ADD_REQ
R9:ADD_RLY
R10: PREPARE-BEARER-RSP
R11: INVITE_2XX_RSP
R12: 200 OK
R13: ACK
R14: ACK_REQ

R15: INFO
R16: INFO_REQ
R17: INFO_RSP
R18: PLAY-MEDIA-REQ
R19: 200 OK
R20: MOD_REQ
R21: MOD_REPLY
R22: PLAY-MEDIA-RSP
R23: NTFY_REQ
R24: NTFY_REPLY
R25: MEDIA-COMPLETED-IND
R26: STOP-MEDIA-REQ
R27: : MOD_REQ
R28: MOD_REPLY
R29: STOP-MEDIA-RSP

R30: DETECT-DTMF-REQ
R31: MOD_REQ
R32: MOD_REPLY
R33: DETECT-DTMF-RSP
R34: NTFY_REQ
R35: NTFY_REPLY
R36: REPORT-DTMF-IND

R37: STOP-DTMF-DETECT-REQ
R38: MOD_REQ
R39: MOD_REPLY
R40: STOP-DTMF-DETECT-RSP
R41: INFO-REQ
R42: INFO

R43: 200 OK
R44: INFO-RSP
R45: BYE
R46: BYE-REQ
R47: BYE-RSP
R48: REL-SIPC-REQ R49: DB-MRFP-
RELEASE-REQ
R50: RELEASE-TERM-REQ
R51: 200 OK
R53: DB-MRFP- R52: SUB_REQ
RELEASE-RSP
R54: SUB_REPLY
R55: RELEASE-TERM-RSP

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 31


PIDs in the Flow of Tone Playing and
Number Receiving on the MRFC
 AS: service NE
 PID-SIPC: SIP protocol stack
 PID-MRC: internal processing control module of the MRC
 CDB::PID-DBMS: multimedia center data module on the CDB
 PID-CRO: module responsible or H.248 processing and distribution
 MRFP: multimedia resource processing module

Message capture:

MRFC·ÅÒôÊÕºÅÁ÷³Ì

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 32


Chapter 1 CSCF Architecture: Internal
Module (PID) and Its Functions
Chapter 2 Functions of the PIDs in the
Basic Message Flow
Chapter 3 Procedure of Locating
Problems by Using Internal Messages
Chapter 4 Typical Cases

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 33


Chapter 3 Procedure of Locating
Problems by Using Internal Messages

3.1 Warning Header Field

3.2 Procedure of Locating Problems

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 34


3.1 Warning Header Field
The following describes the structure of the warning header field by using two examples:
Example 1:
Warning: 399 0154601493.P.huawei.com.204.020.011.0000361D "Fail to validate the user“
Structure analysis:
Attention Required
Item Value Description
or Not
Internal information
File name 01546 PID_PCALL_PCALLSIP, specifically pcallsip.c that does not require
attention
Internal information
Line No. 1493 Line 943 of pcallsip.c that does not require
attention
CSCF host
P.huawei.com Host name of the configured P-CSCF Attention required
name
It refers to PID_PCALL. Find out the PID corresponding to the PID
PID name 204 Attention required
name. Then, locate the problem based on the PID function.

Module It corresponds to the SCU module No. The module No. can be
011 Attention required
number displayed on the Module Management interface on the OMU client.

Internal information
It refers to the failure to compare the received SIP message from the
Error cause 0000361d that does not require
access side with the contact address specified during the registration.
attention

The contents enclosed within quotation marks "" are the error
Error Fail to validate information. Currently, most errors are represented by Server internal
error, which provides no information about the error. A user can find Attention required
description the user
out the error only after querying codes. This problem needs to be
solved.

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 35


3.1 Warning Header Field
Example 2:
Warning: 399 154.12.17.1 "SS010006F06580L00289[0000] No Response From Network“

After a message is sent, if no response is received within the timeout time, the protocol stack reports an error response to inform
the service NE of the timeout.

Structure analysis:

Item Value Description Attention Required or Not

CSCF Address of the service NE to which the


154.12.17.1 Attention required
address protocol stack sends the error response
Position of the code for the protocol stack to Internal information that
Code line No. SS010006F06580L00289[0000
report the error does not require attention
It refers to no response from the peer
Error network. Generally, the cause is that the
No Response From Network Attention required
description address carried in the sent message is
incorrect.

The following attachment summarizes the release points of the CSCF service processing:

F:\IMSÖúÊÖ\
CSCFÒµÎñ´¦ÀíÊͷŵã»ã×Ü.rar

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 36


Chapter 3 Procedure of Locating
Problems by Using Internal Messages

3.1 Warning Header Field

3.2 Procedure of Locating Problems

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 37


3.2 Procedure of Locating Problems
Step 1: Capture internal traced messages.
Generally, if the registration and call flow fails, an important method of locating problems is user message
trace.
Remarks: For details about capturing user trace message, see section 2.1 in CSC3300 V100R006C03 Internal
Message Trace Guide.doc. This document does not detail the message capture procedure. In addition, during
the capture of user message trace when a problem occurs, it is recommended to select the Log option so that
certain user data information is recorded.

Step 2: Based on the contents in the Warning header field, check which NE sends the error response.
According to the message flows before and after the error response is returned, locate the message
that the NE receives before sending the failure response. Then, according to the main functions of the
NEs in the flow, infer the possible causes of the release.

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 38


3.2 Procedure of Locating Problems
Step 3: Analyze the contents of the release message. Focus on the information such as the release status code and
release cause description.
As shown in the following message and log output, the PID_IMSG fails to query the HSS address.

Step 4: Based on the functions of the PID and release cause prompt text, analyze the possible causes.
Generally, possible causes can be classified into the following types:
1. The system configuration is incorrect.
Incorrect system configuration causes basic call and number analysis flow failures. In this case, check whether the related data
configuration is correct, for example, whether the link is Up.
Check whether the terminal is connected to a correct access network.
2. The user is not defined.
The user information carried in the SIP message that the user sends for registration is inconsistent with the user definition information
on the HSS.
3. The message does not conform to the protocol specifications. For example, the media negotiation does not conform to the protocol
specifications and a mandatory header field is missing.
In this case, in addition to checking whether the processing on the CSCFs is correct, analyze whether the messages sent by the
terminals and other NEs are correct.
Step 5: Based on the analysis result obtained in Step 4, check the related configuration.
Remarks: If the cause of the problem fails to be located after careful configuration check by performing the preceding procedure, save
the internal trace messages and contact the R&D personnel for locating the problem.

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 39


Chapter 1 CSCF Architecture: Internal
Module (PID) and Its Functions
Chapter 2 Functions of the PIDs in the
Basic Message Flow
Chapter 3 Procedure of Locating
Problems by Using Internal Messages
Chapter 4 Typical Cases

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 40


Chapter 4 Typical Cases

4.1 Typical Problems in the Registration Flow

4.2 Typical Problems in the Call Flow

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 41


4.1 Typical Problems in the Registration Flow

Symptom Possible Cause Troubleshooting Key Parameter Key Message


Line Parameter Capture

The I-CSCF The peer HSS of Check the traced Lines 47 and ulErrorCode
returns a 500 the I-CSCF is messages. Check whether 57 in line 47 and
response faulty. the I-CSCF sends any UAR. Warning in IHSSÁ´Â·DOWN
during If not, check whether the line 57
registration. IHSSL link is Up.

The P-CSCF The P-CSCF fails Check the traced messages Lines 11 and ulErrorCode
returns a 403 to query the between the Preg and 22 in line 11 and
response PACN table. DBMS. Check whether the Warning in
during PACN query is successful. If line 22 ×¢²áʱ½ÓÈëÍøµÄip
µØÖ·ÅäÖôíÎó£¬P»Ø403.rar.
registration. not, check whether the IP
address of the terminal
belongs to the network
segment configured on the
PACN.

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 42


4.1 Typical Problems in the Registration Flow

Symptom Possible Cause Troubleshooting Key Parameter Key Parameter Message


Line Capture

The S-CSCF During the registration, the Check whether Lines 6, 173, integrity-
returns a 403 P-CSCF fails to set the access security is and 189 protected,
response during integrity-protected field to configured in the Warning in line PACN
ÖнÓÈë²à°²È«²ßÂÔÅäÖôíÎó,×¢²áS»Ø40
registration. Yes. Therefore, the S- access network 189, and
CSCF considers the security policy of ucAccessSecuri
registration request as the PACN. ty in line 6
invalid.
During registration, The P-CSCF, I-CSCF, or Check whether Lines 28, 29, Warning in line
the protocol stack S-CSCF fails to locate the the DNSSRV and 30, 31, and 56 56 and DNSÅäÖôíÎó£¬PÕÒ
²»µ½I--ptmf.rar
reports a 408 nexthop route or locates an DNSRESA are ulIpAddress in
timeout response. incorrect route. configured line 31
correctly.

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 43


Chapter 4 Typical Cases

4.1 Typical Problems in the Registration Flow

4.2 Typical Problems in the Call Flow

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 44


4.2 Typical Problems in the Call Flow

Symptom Possible Cause Troubleshooting Key Parameter Key Parameter Message


Line Capture

During the The Contact address If the P-CSCF fails to Lines 210, 228, acPIpDispatchKey
call flow, used during the query the user data, 233, and 254 in line 210,
the P- registration carries check whether the query ulErrorCode and
CSCF Userinfo, whereas the keyword and the user acPDispatchKey in
×¢²áʱCONTACTµØ
returns a Contact address in the keyword saved during the line 233, and Ö·ÀïЯ´øUSRINFO£¬µ«INVITEÎ

403 INVITE message of registration are different. ucAccessSecurity


message. the call does not carry If the Userinfo in line 228
Userinfo. According to information is different,
the PACN check whether the PACN
configuration, table is configured to
however, users need differentiate users
to be differentiated according to Userinfo.
according to Userinfo.
As a result, the P-
CSCF fails to query
the user data.

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 45


4.2 Typical Problems in the Call Flow
Symptom Possible Causes Troubleshooting Key Parameter Key Message
Line Parameter Capture
During the call The calling S-CSCF fails to Check the number type of Lines 336, 337, Warning in
flow, the calling locate the called I-CSCF. A the called number in the and 357 line 357 and
S-CSCF possible cause is that the INVITE message. If the tEnumRspRe
returns a 404 called number is a TEL number type is TEL, cord in line
message. number and number check whether the 337 S»Ø404£¬Ã»ÓÐÅäÖÃ
TELºÅÂë.rar
analysis is not configured. SNRTANA, SRTADDR,
and SRTANA
configuration is correct.
During the The PADA configuration or Run command LST PLNI Lines 179 and ulErrorCode
bearer control PLNI configuration of the to check whether the 215 in line 179 and
flow, the P- access network on which local domain network Warning in
CSCF returns a the user resides is incorrect. attribute is configured. line 215
500 message. Then, check whether the
P-CSCF queries the PDF
device successfully. If
not, run command LST ³ÐÔØ¿ØÖÆ---PADA
ÅäÖôíÎó
PADA to check whether
the PDF device is
attached to the correct
access network.

HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential Page 46


Thanks
www.huawei.com

You might also like