FastPCRF (BRAS integration by RADIUS) [Документация VAS Experts]

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
en:dpi:dpi_components:pcrf:start [2022/03/29 13:03] edrudichgmailcomen:dpi:dpi_components:pcrf:start [Unknown date] (current) – removed - external edit (Unknown date) 127.0.0.1
Line 1: Line 1:
-====== 2 PCRF Policy Server ====== 
-{{indexmenu_n>2}} 
- 
-PCRF provides proxying requests from fastDPI to the Radius server. 
-It is a part of the standard Stingray Service Gateway installation package, but if necessary, it can be used as a dedicated server. 
-===== Hardware Recommendations ===== 
- 
-In order to run PCRF you can use the following hardware or virtual machines matching the following characteristics: 
-  - CPU 2.5 GHz, 1 pcs 
-  - RAM 512 MB - 1 GB 
-  - HDD 50 GB - 250 GB 
-  - Operating system Cent OS 6.4+, 8+ 
-  - NIC ranging from 10 Mb/s 
- 
-===== Installation ===== 
-  - Install the Network Time Protocol daemon <code>yum install ntp -y 
-ntpdate pool.ntp.org 
-service ntpd start 
-chkconfig ntpd on</code> 
-  - Add vasexperts repository <code>rpm --import http://vasexperts.ru/centos/RPM-GPG-KEY-vasexperts.ru 
-rpm -Uvh http://vasexperts.ru/centos/6/x86_64/vasexperts-repo-2-1.noarch.rpm</code> 
-  - Install the fastPCRF <code>yum install fastpcrf</code> 
-  - Make sure the service is running <code>service fastpcrf start</code> 
-  - Сonfigure fastpcrf service to run at startup<code>chkconfig fastpcrf on</code> 
-  - Open firewall ports in order to access the fastDPI and Radius servers<code>vi /etc/sysconfig/iptables 
--A INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT 
-#Radius 
--A INPUT -m state --state NEW -m udp -p udp --dport 1812 -j ACCEPT 
--A INPUT -m state --state NEW -m udp -p udp --dport 1813 -j ACCEPT 
--A INPUT -m state --state NEW -m udp -p udp --dport 3799 -j ACCEPT 
-#fastDPI 
--A INPUT -m state --state NEW -m tcp -p tcp --dport 29002 -j ACCEPT 
-</code> 
-and restart firewall for the rules to take effect <code>service iptables restart</code> 
-  - Disable selinux ((temporary solution))<code>setenforce 0 
-vi /etc/selinux/config 
-SELINUX=disabled</code> 
-  
-