Sie sind auf Seite 1von 72

GSM BSS

GBSS16.0

Ciphering Feature Parameter


Description
Issue

01

Date

2014-04-30

HUAWEI TECHNOLOGIES CO., LTD.

Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved.


No part of this document may be reproduced or transmitted in any form or by any means without prior written
consent of Huawei Technologies Co., Ltd.

Trademarks and Permissions


and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.

Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.

Huawei Technologies Co., Ltd.


Address:

Huawei Industrial Base


Bantian, Longgang
Shenzhen 518129
People's Republic of China

Website:

http://www.huawei.com

Email:

support@huawei.com

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

GSM BSS
Ciphering Feature Parameter Description

Contents

Contents
1 About This Document..................................................................................................................1
1.1 Scope..............................................................................................................................................................................1
1.2 Intended Audience..........................................................................................................................................................1
1.3 Change History...............................................................................................................................................................1

2 Overview.........................................................................................................................................3
2.1 Introduction....................................................................................................................................................................3
2.2 NEs Supporting the Feature............................................................................................................................................4

3 Kc Generation.................................................................................................................................5
4 A5 Ciphering Algorithm..............................................................................................................6
5 Algorithm Selection......................................................................................................................8
6 Signaling for Ciphering Procedure..........................................................................................10
7 Enhancements to the A5 Ciphering Algorithm.....................................................................12
8 Impact on KPI...............................................................................................................................14
9 Related Features...........................................................................................................................16
10 Engineering Guidelines...........................................................................................................17
10.1 Deploying Ciphering..................................................................................................................................................17
10.1.1 Deployment Requirements......................................................................................................................................17
10.1.2 Activation................................................................................................................................................................18
10.1.3 Activation Observation............................................................................................................................................20
10.1.4 Deactivation.............................................................................................................................................................21
10.2 Deploying A5/1 Encryption Flow Optimization........................................................................................................22
10.2.1 Deployment Requirements......................................................................................................................................22
10.2.2 Activation................................................................................................................................................................22
10.2.3 Activation Observation............................................................................................................................................26
10.2.4 Deactivation.............................................................................................................................................................27

11 Parameters...................................................................................................................................31
12 Counters......................................................................................................................................65
13 Glossary.......................................................................................................................................67
Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

ii

GSM BSS
Ciphering Feature Parameter Description

Contents

14 Reference Documents...............................................................................................................68

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iii

GSM BSS
Ciphering Feature Parameter Description

1 About This Document

About This Document

1.1 Scope
This document describes Ciphering, including its technical principles, related features, and
engineering guidelines.
This document covers the following features:
l

GBFD-113501 A5/1 and A5/2 Ciphering Algorithm

GBFD-113503 A5/3 Ciphering Algorithm

GBFD-113521 A5/1 Encryption Flow Optimization

1.2 Intended Audience


This document is intended for personnel who:
l

Need to understand the features described herein

Work with Huawei products

1.3 Change History


This section provides information about the changes in different document versions. There are
two types of changes, which are defined as follows:
l

Feature change
Changes in features of a specific product version

Editorial change
Changes in wording or addition of information that was not described in the earlier version

01 (2014-04-30)
This issue does not include any changes.
Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

GSM BSS
Ciphering Feature Parameter Description

1 About This Document

Draft A (2014-01-23)
Compared with Issue 02 (2013-11-15) of GBSS15.0, Draft A (2014-01-23) of GBSS16.0
includes the following changes.

Issue 01 (2014-04-30)

Change Type

Change Description

Parameter Change

Feature change

None

None

Editorial change

Modified the descriptions in "Verifying


dummy bit randomization" in 10.2.3
Activation Observation.

None

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

GSM BSS
Ciphering Feature Parameter Description

2 Overview

Overview

2.1 Introduction
The information ciphered on the Um interface includes signaling, speech, and data. Ciphering
is implemented to guarantee information security and prevent user information or conversation
contents from unauthorized access.
The ciphering procedure is initiated on the network side. The BTS and MS cipher and decipher
information by using the A5 algorithm and the ciphering key (Kc) that is generated by the A8
algorithm based on MS and BTS capabilities. This processing ensures the security of the
information on the Um interface. The GSM authentication center (AuC) generates the Kc and
the MSC/VLR stores the Kc. The MSC/VLR sends the Kc to the BTS before the ciphering
procedure begins.
The MS and the network side use the A8 algorithm to generate the Kc with the same inputs of
identification key (Ki) and random number (RAND).
A ciphering or deciphering sequence is generated using the A5 algorithm based on the Kc stored
in the MS and the network and the frame number from the current pulse stream. The network
uses the same ciphering sequence in the uplink and downlink. For each burst, the data is ciphered
or deciphered as follows:
One sequence is used for MS ciphering and BTS deciphering.
The other sequence is used for BTS ciphering and MS deciphering.
GSM specifications define the following ciphering algorithms:
l

A5/0 Ciphering Algorithm

A5/1 Ciphering Algorithm

A5/2 Ciphering Algorithm

A5/3 Ciphering Algorithm

A5/4 Ciphering Algorithm

A5/5 Ciphering Algorithm

A5/6 Ciphering Algorithm

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

GSM BSS
Ciphering Feature Parameter Description

2 Overview

A5/7 Ciphering Algorithm


NOTE

A5/0 means no ciphering at all.

Huawei GBSS supports A5/1, A5/2, and A5/3 ciphering algorithms. It is recommended that the
same ciphering algorithm be used on the entire network. This prevents handover failures between
ciphering areas and non-ciphering areas due to the MS compatibility issues.
A network operator can use the A5 ciphering algorithm only after being granted by the 3GPP
Organizational Partners. As A5/1 and A5/2 ciphering algorithms have been decoded, it is
advisable that you use the more secure A5/3 ciphering algorithm or the A5/1 ciphering algorithm
with A5/1 Encryption Flow Optimization enabled.
Select ciphering algorithms according to the capabilities of the network and MSs. The ciphering
algorithms to be adopted must be allowed in ciphering commands delivered by the MSC and in
the BSC data configuration, and supported by the MSs. The BSC selects ciphering algorithms
based on the priorities of the algorithms. If the BSS does not support the ciphering algorithms
allowed in ciphering commands delivered by the MSC, it rejects the implementation of the
ciphering procedure.
To addresses the relatively weak data security of the A5 ciphering algorithm, the Ciphering
feature optimizes the ciphering procedure based on the characteristics of the Um interface
transmission on a GSM network. The feature enhances transmission security and provides better
protection against eavesdropping.

2.2 NEs Supporting the Feature


Table 2-1 NEs supporting the feature
Feature

BSC6900

BSC6910

GBTS

eGBTS

A5/1 and A5/2 Ciphering Algorithm

A5/3 Ciphering Algorithm

A5/1 Encryption Flow Optimization

NOTE

indicates that the NE supports this feature. indicates that the NE does not support this feature.

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

GSM BSS
Ciphering Feature Parameter Description

3 Kc Generation

Kc Generation

This section describes the generation of the ciphering key (Kc).


The MS and the network use the same Kc to cipher and decipher user data.
An MS is allocated an International Mobile Station Identity (IMSI) and Ki after it is registered
in the GSM network. The MS and the network store the same Ki and RAND for authentication.
The RAND is generated by the network and sent to the MS. Both the network and the MS use
the A8 algorithm to generate the ciphering key Kc. Figure 3-1 shows the generation of the Kc.
Figure 3-1 Generation of the Kc

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

GSM BSS
Ciphering Feature Parameter Description

4 A5 Ciphering Algorithm

A5 Ciphering Algorithm

This section describes the A5 ciphering algorithm which includes GBFD-113501 A5/1 and A5/2
Ciphering Algorithm and GBFD-113503 A5/3 Ciphering Algorithm. The A5 ciphering
algorithm is used to generate a pseudo-random sequence.
Based on the 64-bit Kc stored in the MS and the network and the 22-bit Link Logical Control
(LLC) frame number of the current pulse stream, the A5 ciphering algorithm generates a 114bit ciphering sequence or a 114-bit deciphering sequence. The A5 algorithm ciphers or deciphers
data by performing the Exclusive OR (XOR) operation between the ciphering/deciphering
sequence and the information bit in the data (ciphered or not ciphered).
The network uses the same ciphering sequence in the uplink and downlink. For each burst, one
sequence is used for MS ciphering and BTS deciphering while the other is used for BTS ciphering
and MS deciphering.
The ciphering or deciphering on the radio links is performed by the BTS and MS. Figure 4-1
shows the ciphering/deciphering process.

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

GSM BSS
Ciphering Feature Parameter Description

4 A5 Ciphering Algorithm

Figure 4-1 Ciphering/deciphering process

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

GSM BSS
Ciphering Feature Parameter Description

5 Algorithm Selection

Algorithm Selection

The ciphering algorithms are selected based on the capabilities of the network, BSS, and MS.
The ciphering algorithm supported by the BSS side is specified by the parameter ENCRY
(BSC6900,BSC6910).
The process of selecting the ciphering algorithms is as follows:
1.

In the call access procedure, the MS sends an Establish Indication message to the BSC.
l If the parameter ECSC(BSC6900,BSC6910) in the system information is set to No, the
MS reports Classmark 1 or Classmark 2 to the BSC to indicate support for the A5/1,
A5/2, and A5/3 ciphering algorithms.
l If the parameter ECSC(BSC6900,BSC6910) in the system information is set to Yes,
the MS reports Classmark 1, Classmark 2, and Classmark 3 to the BSC to indicate
support for the A5/1, A5/2, A5/3, A5/4, A5/5, A5/6, and A5/7 ciphering algorithms.

2.

Upon receiving the Cipher Mode Command message from the MSC, the BSC checks the
classmarks reported by the MS. If the BSC does not receive Classmark 3, it sends a
Classmark Enquiry message to the MS, asking for Classmark 3. Classmark 3 defines
whether an MS supports the A5/4, A5/5, A5/6, and A5/7 ciphering algorithms.

Ciphering algorithm selection complies with the following principles:


l

The ciphering algorithms to be adopted should be those supported by the MSC, allowed in
the BSC data configuration, and supported by the MS.

The priorities of the ciphering algorithms are specified by EncryptionAlgorithm1st


(BSC6900,BSC6910), EncryptionAlgorithm2nd(BSC6900,BSC6910),
EncryptionAlgorithm3rd(BSC6900,BSC6910), EncryptionAlgorithm4th
(BSC6900,BSC6910), EncryptionAlgorithm5th(BSC6900,BSC6910),
EncryptionAlgorithm6th(BSC6900,BSC6910), and EncryptionAlgorithm7th
(BSC6900,BSC6910). If the ciphering algorithm priority is not set, the default priority is
used.

The BSC selects ciphering algorithms based on the priorities of the algorithms and sends
an Encryption Command message to the BTS.

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

GSM BSS
Ciphering Feature Parameter Description

5 Algorithm Selection

NOTE

l The default priorities of ciphering algorithms are A5/7 to A5/0, in descending order.
l For some MSs to be handed over from WCDMA cells to GSM cells, if the MSs are not enabled with
Ciphering in WCDMA cells, they cannot be enabled with Ciphering after being handed over to GSM
cells. To avoid MS handover failures in this situation, set HOCipherSw(BSC6900,BSC6910) and
JudgeRNCCipherState(BSC6900,BSC6910) to appropriate values.

NOTICE
l If the BSS does not support the ciphering algorithms specified in the Cipher Mode Command
message from the MSC, it sends the MSC a Ciphering Mode Reject message with cause
value "Ciphering Algorithms Not Supported".
l If the MSC requests to change the ciphering algorithms but the BSS has enabled the former
ciphering algorithms, the BSS sends a Ciphering Mode Reject message to the MSC.
l If the ciphering algorithms supported by the MSC, allowed in the BSC data configuration,
and supported by the MS are different, determine whether two MSs communicate with each
other in non-encryption mode based on the setting of the ENCRY_OPT_SWITCH
(BSC6900,BSC6910) parameter.

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

GSM BSS
Ciphering Feature Parameter Description

6 Signaling for Ciphering Procedure

Signaling for Ciphering Procedure

This section describes the signaling procedure for ciphering. The ciphering procedure is
generally triggered by location updates, service access, or inter-BSC handovers. To complete
the ciphering procedure, the BSC and MSC must be configured with ciphering algorithms and
the BTS and MS must have the codec capabilities associated with the ciphering algorithms.
Whether ciphering algorithms are used in the radio telecommunications system depends on the
entity that manages radio resources. Figure 6-1 shows the ciphering procedure, which is initiated
by the network and executed by the BTS.
Figure 6-1 Ciphering procedure

Initiating the Setting of the Ciphering Mode


When the authentication procedure is complete, the MSC sends a Ciphering Mode Command
message containing the Kc to the BSC. The BSC then sends a Ciphering Mode Command
message to the MS through the BTS over the Um interface. This message indicates whether the
ciphering will be performed by the MS and which ciphering algorithm will be used by the MS.

Completing the Setting of the Ciphering Mode


The following operations complete the setting of the ciphering mode:
Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

10

GSM BSS
Ciphering Feature Parameter Description

1.

6 Signaling for Ciphering Procedure

Upon receiving a valid Ciphering Mode Command message, the MS loads the Kc stored
in the SIM card. If the MS receives an invalid Ciphering Mode Command message, it
considers the message to be erroneous. In this case, the MS sends an RR Status message
with cause value "Protocol Error" and does not take any action.
A valid Ciphering Mode Command message can be one of the following:
l One that indicates "start ciphering" and is received by the MS in "not ciphered" mode.
l One that indicates "no ciphering" and is received by the MS in "not ciphered" mode.
l One that indicates "no ciphering" and is received by the MS in "ciphered" mode.

2.

After the MS receives the Ciphering Mode Command message and completes the ciphering,
it starts to send and receive messages in ciphered mode.
l If the MS has started the operations specified in the Ciphering Mode Command message,
it sends a Ciphering Mode Complete message to the network.
l If the "cipher response" field in the Ciphering Mode Command message is "IMEISV
request", the MS includes its IMEI in the Ciphering Mode Complete message.

3.

Upon receiving the Ciphering Mode Complete message from the MS, the network starts
information transmission in ciphered mode.

Rejecting the Ciphering Mode


If the BSS does not support the ciphering algorithms specified in the Cipher Mode Command
message from the MSC, it sends the MSC a Ciphering Mode Reject message with the cause
value "Ciphering Algorithms Not Supported".

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

11

GSM BSS
Ciphering Feature Parameter Description

7 Enhancements to the A5 Ciphering Algorithm

Enhancements to the A5 Ciphering


Algorithm

This section describes the enhancements to the A5 ciphering algorithm for better security. The
ciphering procedure is optimized based on the characteristics of the Um interface transmission
in GSM. The optimization enhances transmission security and provides better protection against
eavesdropping. (GBFD-113521 A5/1 Encryption Flow Optimization)
The ciphering procedure is optimized in the following aspects:
l

Quick SDCCH handover is adopted in the MS access process, thereby making it more
difficult to track a call.
In a quick SDCCH handover, the BTS initiates an intra-cell SDCCH handover immediately
after sending the ciphering command to the MS. The subsequent ciphered signaling can be
transmitted and received on a new SDCCH. SDFASTHOSWITCH(BSC6900,BSC6910)
specifies whether quick SDCCH handover is enabled. To avoid incompatibility with the
MS, the BSC sends the handover command after receiving the ciphering complete message
from the MS.

The timing TCH handover is introduced to make it more difficult to track a call.
Intra-cell handovers are performed at a specified time for speech calls.
TCHTIMEHOSWITCH(BSC6900,BSC6910) specifies whether the timing TCH
handover is enabled. If TCHTIMEHOSWITCH(BSC6900,BSC6910) is set to ON(On),
the handover timer is started and the length of the timer is TCHTIMEHOPERIOD
(BSC6900,BSC6910). When TCHTIMEHOPERIOD(BSC6900,BSC6910) expires, an
intra-cell forced handover is performed.

The Hopping Sequence Number (HSN) in the Flex Training Sequence Code (TSC) and
Flex Mobile Allocation Index Offset (MAIO) differentiates TCHs in a cell, making it
difficult for an intruder to track other TCHs according to the characteristics of a certain
TCH.
The parameter FLEXTSCSWITCH(BSC6900,BSC6910) enables or disables the Flex TSC
function. If FLEXTSCSWITCH(BSC6900,BSC6910) is set to ON(On), channels
participate in frequency hopping and each channel is randomly assigned a TSC, ranging
from 0 to 7.
For details about Flex MAIO, see Flex MAIO Feature Parameter Description.

Issue 01 (2014-04-30)

After sending the Ciphering Mode Command message to the MS, the BTS stops sending
system information 5, 5bis, and 5ter over the SACCH on the SDCCH.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

12

GSM BSS
Ciphering Feature Parameter Description

7 Enhancements to the A5 Ciphering Algorithm

STOPSI5SWITCH(BSC6900,BSC6910) specifies whether to stop sending System


Information 5, 5bis, and 5ter. If STOPSI5SWITCH(BSC6900,BSC6910) is set to ON
(On), the BTS stops sending System Information 5, 5bis, and 5ter over the SACCH on the
SDCCH after sending the ciphering command, and sends System Information 6 or L2 filling
frames instead.
l

The dummy bits are randomized.


DUMMYBITRANDSWITCH(BSC6900,BSC6910) specifies whether to randomize the
dummy bits. If DUMMYBITRANDSWITCH(BSC6900,BSC6910) is set to ON(On), the
BTS randomizes all the 0x2b dummy bits in the signaling and all the dummy bits in L2
filling frames. To avoid incompatibility with the MS, the BTS reserves the initial 0x2b
dummy bits when randomizing signaling.

Filling information of SI 6 is randomized.


The randomization of filling information of SI 6 is specified by SI6RandomBit
(BSC6900,BSC6910). If this parameter is set to YES(Yes), the BTS fills a random bit in
the idle spare bit following the valid information in SI 6 sent to the MS. The idle spare bit
is contained in the SI6 rest octets IE. The bit stream of SI 6 on the channel that carries the
ongoing call changes after the ciphering procedure starts. Therefore, intruders cannot
compare the bit streams and decipher the A5/1 ciphering algorithm.

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

13

GSM BSS
Ciphering Feature Parameter Description

8 Impact on KPI

Impact on KPI

Impact on System Capacity


None

Impact on System Performance


The use of ciphering algorithms increases the signaling exchange and access delay of a call. If
the BSS does not support the specified ciphering algorithm, call admissions or handovers may
fail, and the system performance (for example, assignment success rate and handover success
rate) is lowered.
Enabling A5/1 Encryption Flow Optimization has the following impacts on system performance:
l

Quick SDCCH handover


The success rate of intra-cell handovers increases. Consequently, the handover success
rate on the entire network increases.
The number of intra-cell handovers increases. Consequently, the number of call drops
and the call drop rate increase.

Timing TCH handover


The success rate of intra-cell handovers increases. Consequently, the handover success
rate on the entire network increases.
The number of intra-cell handovers increases. Consequently, the number of call drops
and the call drop rate increase. In addition, the increased number of TCH handovers
results in an MOS decrease.

Flex TSC
It is recommended that Flex TSC be enabled in an asynchronous network. This is because
enabling Flex TSC will impair link performance and therefore lead to call drop, crosstalk,
and noise in a synchronous network where Soft-Synchronized Network or IBCA is enabled.

Stopping sending system information 5, 5bis, and 5ter after encryption


If frequencies in the BA 1 and BA2 lists have been manually modified, the received system
information 5, 5bis, and 5ter may be incomplete. This decreases the handover success rate
and increases the SDCCH call drop rate.

l
Issue 01 (2014-04-30)

Dummy bit randomization


Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

14

GSM BSS
Ciphering Feature Parameter Description

8 Impact on KPI

The dummy bit randomization has a slight impact on KPIs. It can decrease the probability
of intermodulation interference generated when the MS receives signals and therefore
decreases the probability of downlink call drops due to sequence errors. However, such
call drops account for a small proportion of call drops on the live network. Therefore, the
KPIs will not be affected greatly.

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

15

GSM BSS
Ciphering Feature Parameter Description

9 Related Features

Related Features

Table 9-1 Related features


Feature

Prerequisite Feature

Mutually
Exclusive Feature

Impact
ed
Featur
e

A5/1 and A5/2 Ciphering


Algorithm

None

None

None

A5/3 Ciphering
Algorithm

None

None

None

A5/1 Encryption Flow


Optimization

GBFD-113501 A5/1 and


A5/2 Ciphering Algorithm

The Flex TSC


function is mutually
exclusive with the
GBFD-115830
VAMOS feature.

None

NOTE
A5/1 Encryption Flow
Optimization depends on the
A5/1 ciphering algorithm in this
feature.

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

16

GSM BSS
Ciphering Feature Parameter Description

10 Engineering Guidelines

10

Engineering Guidelines

10.1 Deploying Ciphering


10.1.1 Deployment Requirements
Table 10-1 Deployment requirements
Aspect

Requirement

Related features

See 9 Related Features.

BSC

None

BTS

None

GSM networking

None

MS

MSs support the ciphering feature.

MSC

The MSC supports the ciphering feature.

License

l GBFD-113501 A5/1 and A5/2 Ciphering Algorithm


None
l GBFD-113503 A5/3 Ciphering Algorithm
The license controlling this feature has been activated. For details
on how to activate the license, see License Management Feature
Parameter Description. For details about license items, see License
Control Item Description.

Others

Issue 01 (2014-04-30)

None

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

17

GSM BSS
Ciphering Feature Parameter Description

10 Engineering Guidelines

10.1.2 Activation
Using MML Commands
On the BSC LMT, perform the following steps:
Step 1 Run the SET BSCBASIC command with A Interface Tag, Um Interface Tag, and Abis
Interface Tag set to GSM_PHASE_2Plus.
Step 2 Run the SET GCELLBASICPARA command with Encryption Algorithm set to A5/0 and
A5/3.
NOTE

l This procedure uses the A5/3 ciphering algorithm as an example. The configuration procedures of other
ciphering algorithms are the same as this procedure.
l A5/0 must be selected in Encryption Algorithm of basic cell parameters.

Step 3 (Optional) Run the SET GCELLBASICPARA command to set the ciphering algorithm
priorities. In this step, set Encryption Algorithm 1 through Encryption Algorithm 7 as
follows:
l Set Encryption Algorithm 1 to A51(A5/1).
l Set Encryption Algorithm 2 to A52(A5/2).
l Set Encryption Algorithm 3 to A53(A5/3).
l Set Encryption Algorithm 4 to A54(A5/4).
l Set Encryption Algorithm 5 to A55(A5/5).
l Set Encryption Algorithm 6 to A56(A5/6).
l Set Encryption Algorithm 7 to A57(A5/7).
NOTE

l The default priorities of ciphering algorithms are A5/7 to A5/0, in descending order. If no priorities are
configured for ciphering algorithms, the default priorities apply.
l Each priority corresponds to an encryption algorithm, and different priorities cannot correspond to the same
ciphering algorithm.

----End

MML Command Examples


//Setting interface tags
SET BSCBASIC: AVer=GSM_PHASE_2Plus, UmVer=GSM_PHASE_2Plus,
AbisVer=GSM_PHASE_2Plus;
//Setting ciphering algorithms
SET GCELLBASICPARA: IDTYPE=BYID, CELLID=0,
ENCRY=A5/0-1&A5/1-0&A5/2-0&A5/3-1&A5/4-0&A5/5-0&A5/6-0&A5/7-0;
//Setting the encryption algorithm priority
SET GCELLBASICPARA: IDTYPE=BYID, CELLID=0, EncryptionAlgorithm1st=A51,
EncryptionAlgorithm2nd=A52, EncryptionAlgorithm3rd=A53,
Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

18

GSM BSS
Ciphering Feature Parameter Description

10 Engineering Guidelines

EncryptionAlgorithm4th=A54, EncryptionAlgorithm5th=A55, EncryptionAlgorithm6th=A57,


EncryptionAlgorithm7th=A56;

Using the CME


NOTE

When configuring the Ciphering feature on the CME, you must perform a single configuration first, and
then perform batch modifications if required.
You must perform a single configuration for a parameter before batch modifications of the parameter. You
are advised to perform batch modifications before logging out of the parameter setting interface.

Step 1 Configure a single object on the CME. (CME single configuration)


Set parameters on the CME configuration interface according to the operation sequence
described in Table 10-2. For the method of performing the CME single configuration, see CME
Single Configuration Operation Guide.
Step 2 (Optional) Modify objects in batches on the CME. (CME batch modification center)
To modify objects, such as BSCs, BTSs, cells, and TRXs, in batches, click the
icon on the
CME configuration interface to start the batch modification wizard. For the method of
performing batch modifications through the CME batch modification center, press F1 on the
wizard interface to obtain online help.
----End
Table 10-2 Configuring parameters on the CME

Issue 01 (2014-04-30)

SN

Managed Object
(MO)

NE

Paramet Paramet
er Name er ID

Configurable in
CME Batch
Modification
Center

BSCBASIC

BSC6900/
BSC6910

A
Interface
Tag

AVer

Yes

BSC6900/
BSC6910

Um
Interface
Tag

UmVer

BSC6900/
BSC6910

Abis
Interface
Tag

AbisVer

GCELLBASICPARA

BSC6900/
BSC6910

Encrypti
on
Algorith
m

ENCRY

Yes

GCELLBASICPARA

BSC6900/
BSC6910

Encrypti
on
Algorith
m1

Encryptio
nAlgorith
m1st

Yes

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

19

GSM BSS
Ciphering Feature Parameter Description

SN

10 Engineering Guidelines

Managed Object
(MO)

NE

Paramet Paramet
er Name er ID

NOTE
Configure this MO when
you set ciphering
algorithm priorities.

BSC6900/
BSC6910

Encrypti
on
Algorith
m2

Encryptio
nAlgorith
m2nd

BSC6900/
BSC6910

Encrypti
on
Algorith
m3

Encryptio
nAlgorith
m3rd

BSC6900/
BSC6910

Encrypti
on
Algorith
m4

Encryptio
nAlgorith
m4th

BSC6900/
BSC6910

Encrypti
on
Algorith
m5

Encryptio
nAlgorith
m5th

BSC6900/
BSC6910

Encrypti
on
Algorith
m6

Encryptio
nAlgorith
m6th

BSC6900/
BSC6910

Encrypti
on
Algorith
m7

Encryptio
nAlgorith
m7th

Configurable in
CME Batch
Modification
Center

10.1.3 Activation Observation


NOTE

This procedure uses the A5/3 ciphering algorithm as an example.

Step 1 On the BSC LMT, run the SET BSCBASIC command with A Interface Tag, Um Interface
Tag, and Abis Interface Tag set to GSM_PHASE_2Plus.
Step 2 Run the SET GCELLBASICPARA command with Cell Index set to the index of the test cell
and Encryption Algorithm set to A5/0 and A5/3.
Step 3 On the BSC LMT, double-click A Interface Trace to create a trace task. On the Basic tab,
specify the DPC of the test cell in the DPC(HEX) text box and select BSSAP in the Trace
Type area. Specify the ID of the test cell in the Cell ID (cell1, cell2, ...cell16): text box on the
BSSAP tab page. Then, click Submit.

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

20

GSM BSS
Ciphering Feature Parameter Description

10 Engineering Guidelines

Step 4 After the A Interface Trace window is displayed, use an MS to initiate a call in the test cell.
Expected result: The call is set up, and the chosen-encryption-algorithm IE in the Cipher
Mode Complete message is gsm-a5-3.
----End

10.1.4 Deactivation
Using MML Commands
Run the SET GCELLBASICPARA command with Cell Index set to the index of the test cell
and Encryption Algorithm to A5/0.

MML Command Examples


//Setting Encryption Algorithm to A5/0
SET GCELLBASICPARA: IDTYPE=BYID, CELLID=0,
ENCRY=A5/0-1&A5/1-0&A5/2-0&A5/3-0&A5/4-0&A5/5-0&A5/6-0&A5/7-0;

Using the CME


NOTE

When configuring the A5/3 Ciphering Algorithm feature on the CME, you must perform a single
configuration first, and then perform batch modifications if required.
You must perform a single configuration for a parameter before batch modifications of the parameter. You
are advised to perform batch modifications before logging out of the parameter setting interface.

Step 1 Configure a single object on the CME. (CME single configuration)


Set parameters on the CME configuration interface according to the operation sequence
described in Table 10-3. For the method of performing the CME single configuration, see CME
Single Configuration Operation Guide.
Step 2 (Optional) Modify objects in batches on the CME. (CME batch modification center)
icon on the
To modify objects, such as BSCs, BTSs, cells, and TRXs, in batches, click the
CME configuration interface to start the batch modification wizard. For the method of
performing batch modifications through the CME batch modification center, press F1 on the
wizard interface to obtain online help.
----End
Table 10-3 Configuring parameters on the CME

Issue 01 (2014-04-30)

SN

MO

NE

Parameter
Name

Paramet
er ID

Configurable in CME
Batch Modification
Center

GCELLBAS
ICPARA

BSC6900/
BSC6910

Cell Index

CELLID

Yes

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

21

GSM BSS
Ciphering Feature Parameter Description

SN

MO

10 Engineering Guidelines

NE

Parameter
Name

Paramet
er ID

BSC6900/
BSC6910

Encryption
Algorithm

ENCRY

Configurable in CME
Batch Modification
Center

10.2 Deploying A5/1 Encryption Flow Optimization


10.2.1 Deployment Requirements
Table 10-4 Deployment requirements
Aspect

Requirement

Related features

See 9 Related Features.

BSC

None

BTS

None

GSM networking

None

MS

MSs support the ciphering feature.

MSC

The MSC supports the ciphering feature.

License

The license controlling this feature has been activated. For details on
how to activate the license, see License Management Feature
Parameter Description. For details about license items, see License
Control Item Description.

Others

The A5/1 encryption algorithm has been enabled.

10.2.2 Activation
Using MML Commands
On the BSC LMT, perform the following steps:
l

l
Issue 01 (2014-04-30)

Activating quick SDCCH handover


1.

Run the SET GCELLHOBASI command with SDCCH HO Allowed set to YES
(Yes).

2.

Run the SET GCELLSOFT command with SD Quick HO set to ON(On).

Activating timing TCH handover


Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

22

GSM BSS
Ciphering Feature Parameter Description

10 Engineering Guidelines

1.

Run the SET GCELLHOBASIC command with Intracell HO Allowed set to YES
(Yes).

2.

Run the SET GCELLSOFT command with TCH Time Handover Switch set to
ON(On) and TCH Time Handover Period set to an appropriate value.

Activating Flex TSC


Run the SET GCELLSOFT command with Flex TSC Switch set to ON(On).

Activating dummy bit randomization


Run the SET GCELLSOFT command with Dummy Bit Randomization Switch set to
ON(On).

Activating the function of stopping sending system information 5, 5bis, and 5ter after
encryption
Run the SET GCELLSOFT command with Stop Send SI 5/5bis/5ter after Encrypt set
to ON(On).

Activating the randomization of the filling information of SI 6


Run the SET GCELLSOFT command with SI 6 Filling Random Bits After Cipher set
to YES(Yes).

MML Command Examples


//Activating quick SDCCH handover
SET GCELLHOBASIC: IDTYPE=BYID, CELLID=0, SIGCHANHOEN=YES;
SET GCELLSOFT: IDTYPE=BYID, CELLID=0, SDFASTHOSWITCH=ON;
//Activating timing TCH handover
SET GCELLHOBASIC: IDTYPE=BYID, CELLID=0, INTRACELLHOEN=YES;
SET GCELLSOFT: IDTYPE=BYID, CELLID=0, TCHTIMEHOSWITCH=ON,
TCHTIMEHOPERIOD=60;
//Activating Flex TSC
SET GCELLSOFT: IDTYPE=BYID, CELLID=0, FLEXTSCSWITCH=ON;
//Activating dummy bit randomization
SET GCELLSOFT: IDTYPE=BYID, CELLID=0, DUMMYBITRANDSWITCH=ON;
//Activating the function of stopping sending system information 5, 5bis, and 5ter after
encryption
SET GCELLSOFT: IDTYPE=BYID, CELLID=0, STOPSI5SWITCH=ON;
//Activating the randomization of the filling information of SI 6
SET GCELLSOFT: IDTYPE=BYID, CELLID=0, SI6RandomBit=YES;

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

23

GSM BSS
Ciphering Feature Parameter Description

10 Engineering Guidelines

Using the CME


NOTE

When configuring the A5/1 Encryption Flow Optimization feature on the CME, you must perform a single
configuration first, and then perform batch modifications if required.
You must perform a single configuration for a parameter before batch modifications of the parameter. You
are advised to perform batch modifications before logging out of the parameter setting interface.

Step 1 Configure a single object on the CME. (CME single configuration)


Set parameters on the CME configuration interface according to the operation sequence
described in Table 10-5 through Table 10-10. For the method of performing the CME single
configuration, see CME Single Configuration Operation Guide.
Step 2 (Optional) Modify objects in batches on the CME. (CME batch modification center)
icon on the
To modify objects, such as BSCs, BTSs, cells, and TRXs, in batches, click the
CME configuration interface to start the batch modification wizard. For the method of
performing batch modifications through the CME batch modification center, press F1 on the
wizard interface to obtain online help.
----End
l

Activating quick SDCCH handover

Table 10-5 Configuring parameters on the CME


SN

MO

NE

Parameter
Name

Parameter
ID

Configura
ble in CME
Batch
Modificati
on Center

GCELLHO
BASIC

BSC6900/
BSC6910

SDCCH HO
Allowed

SIGCHANH
OEN

Yes

GCELLSOF
T

BSC6900/
BSC6910

SD Quick
HO

SDFASTHO
SWITCH

Yes

Activating timing TCH handover

Table 10-6 Configuring parameters on the CME

Issue 01 (2014-04-30)

SN

MO

NE

Parameter
Name

Parameter
ID

Configura
ble in CME
Batch
Modificati
on Center

GCELLHO
BASIC

BSC6900/
BSC6910

Intracell HO
Allowed

INTRACEL
LHOEN

Yes

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

24

GSM BSS
Ciphering Feature Parameter Description

10 Engineering Guidelines

SN

MO

NE

Parameter
Name

Parameter
ID

Configura
ble in CME
Batch
Modificati
on Center

GCELLSOF
T

BSC6900/
BSC6910

TCH Time
Handover
Switch

TCHTIMEH
OSWITCH

Yes

Activating Flex TSC

Table 10-7 Configuring the parameter on the CME


SN

MO

NE

Parameter
Name

Parameter
ID

Configura
ble in CME
Batch
Modificati
on Center

GCELLSOF
T

BSC6900/
BSC6910

Flex TSC
Switch

FLEXTSCS
WITCH

Yes

Activating dummy bit randomization

Table 10-8 Configuring the parameter on the CME


SN

MO

NE

Parameter
Name

Parameter
ID

Configura
ble in CME
Batch
Modificati
on Center

GCELLSOF
T

BSC6900/
BSC6910

Dummy Bit
Randomizati
on Switch

DUMMYBI
TRANDSW
ITCH

Yes

Issue 01 (2014-04-30)

Activating the function of stopping sending system information 5, 5bis, and 5ter after
encryption

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

25

GSM BSS
Ciphering Feature Parameter Description

10 Engineering Guidelines

Table 10-9 Configuring the parameter on the CME


SN

MO

NE

Parameter
Name

Parameter
ID

Configura
ble in CME
Batch
Modificati
on Center

GCELLSOF
T

BSC6900/
BSC6910

Stop Send SI
5/5bis/5ter
after Encrypt

STOPSI5S
WITCH

Yes

Activating the randomization of the filling information of SI 6

Table 10-10 Configuring the parameter on the CME


SN

MO

NE

Parameter
Name

Parameter
ID

Configura
ble in CME
Batch
Modificati
on Center

GCELLSOF
T

BSC6900/
BSC6910

SI 6 Filling
Random Bits
After Cipher

SI6Random
Bit

Yes

10.2.3 Activation Observation


l

Verifying quick SDCCH handover


Use an MS to initiate a call. On the BSC LMT, trace BSSAP messages over the A interface.
Expected result: Handover Performed messages are observed.

Verifying timing TCH handover


Use an MS to initiate a call. On the BSC LMT, trace BSSAP messages over the A interface.
Expected result: The call is set up and Handover Performed messages are observed after a
period specified by TCH Time Handover Period.

Verifying Flex TSC


1.

Use an MS to initiate a call, trace CS messages over the Um interface on the BSC
LMT, and record the TSC values contained in Assignment Command messages.

2.

Terminate the call.

3.

Use the MS to initiate another call, trace CS messages over the Um interface on the
BSC LMT, and record the TSC values contained in Assignment Command messages.

4.

Compare the TSC values obtained from the two calls.


Expected result: The TSC values are different.

l
Issue 01 (2014-04-30)

Verifying dummy bit randomization


Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

26

GSM BSS
Ciphering Feature Parameter Description

10 Engineering Guidelines

Use MSs to initiate several calls. Use a drive tester to trace the Um interface messages.
Expected result: After the BTS sends a Um interface command to the MS, the drive tester
traces "RR-RSP" in layer 2 message. "Message dump" contained in "RR-RSP" shows that
some dummy bits are not 0x2B. This means that the dummy bits have been randomized.
l

Verifying the function of stopping sending system information 5, 5bis, and 5ter after
encryption
Use an MS to initiate a call. Then, use a drive test (DT) instrument to trace messages over
the Um interface.
Expected result: SI 5, 5bis, and 5ter is not found in Um interface messages over the SACCH
on the SDCCH after the BTS sends a Ciphering Mode Command message to the MS.

Verifying the randomization of the filling information of SI 6


Use an MS to initiate a call. Then, use a DT instrument to trace messages over the Um
interface.
Expected result: The tail filling bit of SI 6 in Um messages is not 2B. This indicates the
filling information of SI 6 is randomized.

10.2.4 Deactivation
Using MML Commands
On the BSC LMT, perform the following steps:
l

Deactivating quick SDCCH handover


Run the SET GCELLSOFT command with SD Quick HO set to OFF(Off).

Deactivating timing TCH handover


Run the SET GCELLSOFT command with TCH Time Handover Switch set to OFF
(Off).

Deactivating Flex TSC


Run the SET GCELLSOFT command with Flex TSC Switch set to OFF(Off).

Deactivating dummy bit randomization


Run the SET GCELLSOFT command with Dummy Bit Randomization Switch set to
OFF(Off).

Deactivating the function of stopping sending system information 5, 5bis, and 5ter after
encryption
Run the SET GCELLSOFT command with Stop Send SI 5/5bis/5ter after Encrypt set
to OFF(Off).

Deactivating the randomization of the filling information of SI 6


Run the SET GCELLSOFT command with SI 6 Filling Random Bits After Cipher set
to NO(No).

MML Command Examples


//Deactivating quick SDCCH handover
SET GCELLSOFT: IDTYPE=BYID, CELLID=0, SDFASTHOSWITCH=OFF;
//Deactivating timing TCH handover
Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

27

GSM BSS
Ciphering Feature Parameter Description

10 Engineering Guidelines

SET GCELLSOFT: IDTYPE=BYID, CELLID=0, TCHTIMEHOSWITCH=OFF;


//Deactivating Flex TSC
SET GCELLSOFT: IDTYPE=BYID, CELLID=0, FLEXTSCSWITCH=OFF;
//Deactivating dummy bit randomization
SET GCELLSOFT: IDTYPE=BYID, CELLID=0, DUMMYBITRANDSWITCH=OFF;
//Deactivating the function of stopping sending system information 5, 5bis, and 5ter after
encryption
SET GCELLSOFT: IDTYPE=BYID, CELLID=0, STOPSI5SWITCH=OFF;
//Deactivating the randomization of the filling information of SI 6
SET GCELLSOFT: IDTYPE=BYID, CELLID=0, SI6RandomBit=NO;

Using the CME


NOTE

When configuring the A5/1 Encryption Flow Optimization feature on the CME, you must perform a single
configuration first, and then perform batch modifications if required.
You must perform a single configuration for a parameter before batch modifications of the parameter. You
are advised to perform batch modifications before logging out of the parameter setting interface.

Step 1 Configure a single object on the CME. (CME single configuration)


Set parameters on the CME configuration interface according to the operation sequence
described in Table 10-11 through Table 10-16. For the method of performing the CME single
configuration, see CME Single Configuration Operation Guide.
Step 2 (Optional) Modify objects in batches on the CME. (CME batch modification center)
To modify objects, such as BSCs, BTSs, cells, and TRXs, in batches, click the
icon on the
CME configuration interface to start the batch modification wizard. For the method of
performing batch modifications through the CME batch modification center, press F1 on the
wizard interface to obtain online help.
----End
l

Deactivating quick SDCCH handover


Table 10-11 Configuring the parameter on the CME

Issue 01 (2014-04-30)

SN

MO

NE

Parameter
Name

Parameter
ID

Configura
ble in
CME
Batch
Modificati
on Center

GCELLSO
FT

BSC6900/
BSC6910

SD Quick
HO

SDFASTH
OSWITCH

Yes

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

28

GSM BSS
Ciphering Feature Parameter Description

10 Engineering Guidelines

Deactivating timing TCH handover


Table 10-12 Configuring the parameter on the CME

SN

MO

NE

Parameter
Name

Parameter
ID

Configura
ble in
CME
Batch
Modificati
on Center

GCELLSO
FT

BSC6900/
BSC6910

TCH Time
Handover
Switch

TCHTIME
HOSWITC
H

Yes

Deactivating Flex TSC


Table 10-13 Configuring the parameter on the CME

SN

MO

NE

Parameter
Name

Parameter
ID

Configura
ble in
CME
Batch
Modificati
on Center

GCELLSO
FT

BSC6900/
BSC6910

Flex TSC
Switch

FLEXTSCS
WITCH

Yes

Deactivating dummy bit randomization


Table 10-14 Configuring the parameter on the CME

Issue 01 (2014-04-30)

SN

MO

NE

Parameter
Name

Parameter
ID

Configura
ble in
CME
Batch
Modificati
on Center

GCELLSO
FT

BSC6900/
BSC6910

Dummy Bit
Randomizat
ion Switch

DUMMYB
ITRANDS
WITCH

Yes

Deactivating the function of stopping sending system information 5, 5bis, and 5ter after
encryption

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

29

GSM BSS
Ciphering Feature Parameter Description

10 Engineering Guidelines

Table 10-15 Configuring the parameter on the CME

SN

MO

NE

Parameter
Name

Parameter
ID

Configura
ble in
CME
Batch
Modificati
on Center

GCELLSO
FT

BSC6900/
BSC6910

Stop Send
SI 5/5bis/
5ter after
Encrypt

STOPSI5S
WITCH

Yes

Deactivating the randomization of the filling information of SI 6


Table 10-16 Configuring the parameter on the CME

Issue 01 (2014-04-30)

SN

MO

NE

Parameter
Name

Parameter
ID

Configura
ble in
CME
Batch
Modificati
on Center

GCELLSO
FT

BSC6900/
BSC6910

SI 6 Filling
Random
Bits After
Cipher

SI6Random
Bit

Yes

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

30

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

11

Parameters

Table 11-1 Parameter description


Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

HOCipherSw

BSC6900

SET
BSCEXSOFTP
ARA

None

None

Meaning:Wheth
er the BSC
selects an afterhandover
encryption
algorithm based
on the
encryption
algorithm
carried in the
Chosen
Encryption
Algorithm
(Serving) IE if
this IE is carried
in the Handover
Request
message during
a handover. This
parameter is
invalid if the
Handover
Request
message does
not carry the IE.
If this parameter
is set to ON, and
the target cell
supports the
encryption
algorithm

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

31

GSM BSS
Ciphering Feature Parameter Description

Parameter ID

NE

11 Parameters

MML
Command

Feature ID

Feature Name

Description
carried in the
Chosen
Encryption
Algorithm
(Serving) IE, the
BSC selects this
algorithm as the
after-handover
encryption
algorithm.
Otherwise, the
BSC selects an
after-handover
encryption
algorithm based
on the target cell
configurations.
If this parameter
is set to OFF, the
BSC selects the
after-handover
encryption
algorithm based
on the target cell
configurations.
GUI Value
Range:OFF
(Off), ON(On)
Unit:None
Actual Value
Range:OFF, ON
Default
Value:OFF(Off)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

32

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

HOCipherSw

BSC6910

SET
BSCEXSOFTP
ARA

None

None

Meaning:Wheth
er the BSC
selects an afterhandover
encryption
algorithm based
on the
encryption
algorithm
carried in the
Chosen
Encryption
Algorithm
(Serving) IE if
this IE is carried
in the Handover
Request
message during
a handover. This
parameter is
invalid if the
Handover
Request
message does
not carry the IE.
If this parameter
is set to ON, and
the target cell
supports the
encryption
algorithm
carried in the
Chosen
Encryption
Algorithm
(Serving) IE, the
BSC selects this
algorithm as the
after-handover
encryption
algorithm.
Otherwise, the
BSC selects an
after-handover
encryption
algorithm based
on the target cell
configurations.

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

33

GSM BSS
Ciphering Feature Parameter Description

Parameter ID

NE

11 Parameters

MML
Command

Feature ID

Feature Name

Description
If this parameter
is set to OFF, the
BSC selects the
after-handover
encryption
algorithm based
on the target cell
configurations.
GUI Value
Range:OFF
(Off), ON(On)
Unit:None
Actual Value
Range:OFF, ON
Default
Value:OFF(Off)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

34

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

JudgeRNCCip
herState

BSC6900

SET
BSCEXSOFTP
ARA

None

None

Meaning:Wheth
er the BSC
determines the
after-handover
encryption
status based on
the encryption
status carried in
the RNC when
the Handover
Request
message does
not carry the
Chosen
Encryption
Algorithm
(Serving) IE
during an interRAT incoming
external intercell handover. If
this parameter is
set to ON, and
the Handover
Request
message carries
the Old BSS to
New BSS
information IE,
which carries
the UE security
information, the
BSC selects the
after-handover
encryption
algorithm based
on the
encryption
algorithm
configured for
the target cell
and starts
encrypting data.
Otherwise, the
BSC does not
start encrypting
data. If this
parameter is set

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

35

GSM BSS
Ciphering Feature Parameter Description

Parameter ID

NE

11 Parameters

MML
Command

Feature ID

Feature Name

Description
to OFF, the BSC
determines
whether to start
data encryption
based on the
encryption
algorithm
configured for
the target cell
instead of the
encryption
status carried in
the original
RNC.
GUI Value
Range:OFF
(Off), ON(On)
Unit:None
Actual Value
Range:OFF, ON
Default
Value:OFF(Off)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

36

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

JudgeRNCCip
herState

BSC6910

SET
BSCEXSOFTP
ARA

None

None

Meaning:Wheth
er the BSC
determines the
after-handover
encryption
status based on
the encryption
status carried in
the RNC when
the Handover
Request
message does
not carry the
Chosen
Encryption
Algorithm
(Serving) IE
during an interRAT incoming
external intercell handover. If
this parameter is
set to ON, and
the Handover
Request
message carries
the Old BSS to
New BSS
information IE,
which carries
the UE security
information, the
BSC selects the
after-handover
encryption
algorithm based
on the
encryption
algorithm
configured for
the target cell
and starts
encrypting data.
Otherwise, the
BSC does not
start encrypting
data. If this
parameter is set

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

37

GSM BSS
Ciphering Feature Parameter Description

Parameter ID

NE

11 Parameters

MML
Command

Feature ID

Feature Name

Description
to OFF, the BSC
determines
whether to start
data encryption
based on the
encryption
algorithm
configured for
the target cell
instead of the
encryption
status carried in
the original
RNC.
GUI Value
Range:OFF
(Off), ON(On)
Unit:None
Actual Value
Range:OFF, ON
Default
Value:OFF(Off)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

38

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

ENCRY

BSC6900

SET
GCELLBASIC
PARA

GBFD-113503

A5/3 Ciphering
Algorithm

Meaning:Encry
ption algorithm
supported by the
BSS side

GBFD-113501

A5/1 and A5/2


Ciphering
Algorithm

GUI Value
Range:A5/0,
A5/1, A5/2,
A5/3, A5/4,
A5/5, A5/6,
A5/7
Unit:None
Actual Value
Range:A5/0,
A5/1, A5/2,
A5/3, A5/4,
A5/5, A5/6,
A5/7
Default
Value:A5/0:1,A
5/1:0,A5/2:0,A5
/
3:0,A5/4:0,A5/5
:
0,A5/6:0,A5/7:0

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

39

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

ENCRY

BSC6910

SET
GCELLBASIC
PARA

GBFD-113503

A5/3 Ciphering
Algorithm

Meaning:Encry
ption algorithm
supported by the
BSS side

GBFD-113501

A5/1 and A5/2


Ciphering
Algorithm

GUI Value
Range:A5/0,
A5/1, A5/2,
A5/3, A5/4,
A5/5, A5/6,
A5/7
Unit:None
Actual Value
Range:A5/0,
A5/1, A5/2,
A5/3, A5/4,
A5/5, A5/6,
A5/7
Default
Value:A5/0:1,A
5/1:0,A5/2:0,A5
/
3:0,A5/4:0,A5/5
:
0,A5/6:0,A5/7:0

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

40

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

ECSC

BSC6900

SET
GCELLCCBA
SIC

GBFD-114302

GSM/TDSCDMA
Interoperability

Meaning:The
early classmark
sending control
(ECSC)
parameter
specifies
whether the MSs
in a cell use early
classmark
sending. After a
successful
immediate
assignment, the
MS sends
additional
classmark
information to
the network as
early as
possible. The
additional
classmark
information
mainly contains
the CM3
(classmark 3)
information.
The CM3
(classmark 3)
information
contains the
frequency band
support
capability of the
MS (used for the
future channel
assignment),
power
information
about each
frequency band
supported by the
MS (used for the
handover
between
different
frequency
bands), and

GBFD-111101

System
Information
Sending

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

41

GSM BSS
Ciphering Feature Parameter Description

Parameter ID

NE

11 Parameters

MML
Command

Feature ID

Feature Name

Description
encryption
capability of the
MS.
GUI Value
Range:NO(No),
YES(Yes)
Unit:None
Actual Value
Range:NO, YES
Default
Value:YES
(Yes)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

42

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

ECSC

BSC6910

SET
GCELLCCBA
SIC

GBFD-114302

GSM/TDSCDMA
Interoperability

Meaning:The
early classmark
sending control
(ECSC)
parameter
specifies
whether the MSs
in a cell use early
classmark
sending. After a
successful
immediate
assignment, the
MS sends
additional
classmark
information to
the network as
early as
possible. The
additional
classmark
information
mainly contains
the CM3
(classmark 3)
information.
The CM3
(classmark 3)
information
contains the
frequency band
support
capability of the
MS (used for the
future channel
assignment),
power
information
about each
frequency band
supported by the
MS (used for the
handover
between
different
frequency
bands), and

GBFD-111101

System
Information
Sending

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

43

GSM BSS
Ciphering Feature Parameter Description

Parameter ID

NE

11 Parameters

MML
Command

Feature ID

Feature Name

Description
encryption
capability of the
MS.
GUI Value
Range:NO(No),
YES(Yes)
Unit:None
Actual Value
Range:NO, YES
Default
Value:YES
(Yes)

EncryptionAlg
orithm1st

BSC6900

SET
GCELLBASIC
PARA

GBFD-113503
GBFD-113501
GBFD-113521

A5/3 Ciphering
Algorithm
A5/1 and A5/2
Ciphering
Algorithm
A5/1 Encryption
Flow
Optimization

Meaning:Encry
ption algorithm
with priority 1.
GUI Value
Range:A51
(A5/1), A52
(A5/2), A53
(A5/3), A54
(A5/4), A55
(A5/5), A56
(A5/6), A57
(A5/7)
Unit:None
Actual Value
Range:A51,
A52, A53, A54,
A55, A56, A57
Default
Value:A57
(A5/7)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

44

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

EncryptionAlg
orithm1st

BSC6910

SET
GCELLBASIC
PARA

GBFD-113503

A5/3 Ciphering
Algorithm

Meaning:Encry
ption algorithm
with priority 1.

GBFD-113501
GBFD-113521

A5/1 and A5/2


Ciphering
Algorithm
A5/1 Encryption
Flow
Optimization

GUI Value
Range:A51
(A5/1), A52
(A5/2), A53
(A5/3), A54
(A5/4), A55
(A5/5), A56
(A5/6), A57
(A5/7)
Unit:None
Actual Value
Range:A51,
A52, A53, A54,
A55, A56, A57
Default
Value:A57
(A5/7)

EncryptionAlg
orithm2nd

BSC6900

SET
GCELLBASIC
PARA

GBFD-113503
GBFD-113501
GBFD-113521

A5/3 Ciphering
Algorithm
A5/1 and A5/2
Ciphering
Algorithm
A5/1 Encryption
Flow
Optimization

Meaning:Encry
ption algorithm
with priority 2.
GUI Value
Range:A51
(A5/1), A52
(A5/2), A53
(A5/3), A54
(A5/4), A55
(A5/5), A56
(A5/6), A57
(A5/7)
Unit:None
Actual Value
Range:A51,
A52, A53, A54,
A55, A56, A57
Default
Value:A56
(A5/6)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

45

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

EncryptionAlg
orithm2nd

BSC6910

SET
GCELLBASIC
PARA

GBFD-113503

A5/3 Ciphering
Algorithm

Meaning:Encry
ption algorithm
with priority 2.

GBFD-113501
GBFD-113521

A5/1 and A5/2


Ciphering
Algorithm
A5/1 Encryption
Flow
Optimization

GUI Value
Range:A51
(A5/1), A52
(A5/2), A53
(A5/3), A54
(A5/4), A55
(A5/5), A56
(A5/6), A57
(A5/7)
Unit:None
Actual Value
Range:A51,
A52, A53, A54,
A55, A56, A57
Default
Value:A56
(A5/6)

EncryptionAlg
orithm3rd

BSC6900

SET
GCELLBASIC
PARA

GBFD-113503
GBFD-113501
GBFD-113521

A5/3 Ciphering
Algorithm
A5/1 and A5/2
Ciphering
Algorithm
A5/1 Encryption
Flow
Optimization

Meaning:Encry
ption algorithm
with priority 3.
GUI Value
Range:A51
(A5/1), A52
(A5/2), A53
(A5/3), A54
(A5/4), A55
(A5/5), A56
(A5/6), A57
(A5/7)
Unit:None
Actual Value
Range:A51,
A52, A53, A54,
A55, A56, A57
Default
Value:A55
(A5/5)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

46

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

EncryptionAlg
orithm3rd

BSC6910

SET
GCELLBASIC
PARA

GBFD-113503

A5/3 Ciphering
Algorithm

Meaning:Encry
ption algorithm
with priority 3.

GBFD-113501
GBFD-113521

A5/1 and A5/2


Ciphering
Algorithm
A5/1 Encryption
Flow
Optimization

GUI Value
Range:A51
(A5/1), A52
(A5/2), A53
(A5/3), A54
(A5/4), A55
(A5/5), A56
(A5/6), A57
(A5/7)
Unit:None
Actual Value
Range:A51,
A52, A53, A54,
A55, A56, A57
Default
Value:A55
(A5/5)

EncryptionAlg
orithm4th

BSC6900

SET
GCELLBASIC
PARA

GBFD-113503
GBFD-113501
GBFD-113521

A5/3 Ciphering
Algorithm
A5/1 and A5/2
Ciphering
Algorithm
A5/1 Encryption
Flow
Optimization

Meaning:Encry
ption algorithm
with priority 4.
GUI Value
Range:A51
(A5/1), A52
(A5/2), A53
(A5/3), A54
(A5/4), A55
(A5/5), A56
(A5/6), A57
(A5/7)
Unit:None
Actual Value
Range:A51,
A52, A53, A54,
A55, A56, A57
Default
Value:A54
(A5/4)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

47

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

EncryptionAlg
orithm4th

BSC6910

SET
GCELLBASIC
PARA

GBFD-113503

A5/3 Ciphering
Algorithm

Meaning:Encry
ption algorithm
with priority 4.

GBFD-113501
GBFD-113521

A5/1 and A5/2


Ciphering
Algorithm
A5/1 Encryption
Flow
Optimization

GUI Value
Range:A51
(A5/1), A52
(A5/2), A53
(A5/3), A54
(A5/4), A55
(A5/5), A56
(A5/6), A57
(A5/7)
Unit:None
Actual Value
Range:A51,
A52, A53, A54,
A55, A56, A57
Default
Value:A54
(A5/4)

EncryptionAlg
orithm5th

BSC6900

SET
GCELLBASIC
PARA

GBFD-113503
GBFD-113501
GBFD-113521

A5/3 Ciphering
Algorithm
A5/1 and A5/2
Ciphering
Algorithm
A5/1 Encryption
Flow
Optimization

Meaning:Encry
ption algorithm
with priority 5.
GUI Value
Range:A51
(A5/1), A52
(A5/2), A53
(A5/3), A54
(A5/4), A55
(A5/5), A56
(A5/6), A57
(A5/7)
Unit:None
Actual Value
Range:A51,
A52, A53, A54,
A55, A56, A57
Default
Value:A53
(A5/3)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

48

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

EncryptionAlg
orithm5th

BSC6910

SET
GCELLBASIC
PARA

GBFD-113503

A5/3 Ciphering
Algorithm

Meaning:Encry
ption algorithm
with priority 5.

GBFD-113501
GBFD-113521

A5/1 and A5/2


Ciphering
Algorithm
A5/1 Encryption
Flow
Optimization

GUI Value
Range:A51
(A5/1), A52
(A5/2), A53
(A5/3), A54
(A5/4), A55
(A5/5), A56
(A5/6), A57
(A5/7)
Unit:None
Actual Value
Range:A51,
A52, A53, A54,
A55, A56, A57
Default
Value:A53
(A5/3)

EncryptionAlg
orithm6th

BSC6900

SET
GCELLBASIC
PARA

GBFD-113503
GBFD-113501
GBFD-113521

A5/3 Ciphering
Algorithm
A5/1 and A5/2
Ciphering
Algorithm
A5/1 Encryption
Flow
Optimization

Meaning:Encry
ption algorithm
with priority 6.
GUI Value
Range:A51
(A5/1), A52
(A5/2), A53
(A5/3), A54
(A5/4), A55
(A5/5), A56
(A5/6), A57
(A5/7)
Unit:None
Actual Value
Range:A51,
A52, A53, A54,
A55, A56, A57
Default
Value:A52
(A5/2)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

49

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

EncryptionAlg
orithm6th

BSC6910

SET
GCELLBASIC
PARA

GBFD-113503

A5/3 Ciphering
Algorithm

Meaning:Encry
ption algorithm
with priority 6.

GBFD-113501
GBFD-113521

A5/1 and A5/2


Ciphering
Algorithm
A5/1 Encryption
Flow
Optimization

GUI Value
Range:A51
(A5/1), A52
(A5/2), A53
(A5/3), A54
(A5/4), A55
(A5/5), A56
(A5/6), A57
(A5/7)
Unit:None
Actual Value
Range:A51,
A52, A53, A54,
A55, A56, A57
Default
Value:A52
(A5/2)

EncryptionAlg
orithm7th

BSC6900

SET
GCELLBASIC
PARA

GBFD-113503
GBFD-113501
GBFD-113521

A5/3 Ciphering
Algorithm
A5/1 and A5/2
Ciphering
Algorithm
A5/1 Encryption
Flow
Optimization

Meaning:Encry
ption algorithm
with priority 7.
GUI Value
Range:A51
(A5/1), A52
(A5/2), A53
(A5/3), A54
(A5/4), A55
(A5/5), A56
(A5/6), A57
(A5/7)
Unit:None
Actual Value
Range:A51,
A52, A53, A54,
A55, A56, A57
Default
Value:A51
(A5/1)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

50

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

EncryptionAlg
orithm7th

BSC6910

SET
GCELLBASIC
PARA

GBFD-113503

A5/3 Ciphering
Algorithm

Meaning:Encry
ption algorithm
with priority 7.

GBFD-113501
GBFD-113521

A5/1 and A5/2


Ciphering
Algorithm
A5/1 Encryption
Flow
Optimization

GUI Value
Range:A51
(A5/1), A52
(A5/2), A53
(A5/3), A54
(A5/4), A55
(A5/5), A56
(A5/6), A57
(A5/7)
Unit:None
Actual Value
Range:A51,
A52, A53, A54,
A55, A56, A57
Default
Value:A51
(A5/1)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

51

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

ENCRY_OPT_
SWITCH

BSC6900

SET
AITFOTHPA
RA

GBFD-113501

A5/1 and A5/2


Ciphering
Algorithm

Meaning:This
parameter
specifies the
transmission
mode when the
BSS does not
support the
encryption
algorithm of the
MSC. When this
parameter is set
to Yes, the BSS
uses nonencryption
transmission
mode. When this
parameter is set
to No, the BSS
rejects the call.
GUI Value
Range:NO(No),
YES(Yes)
Unit:None
Actual Value
Range:NO, YES
Default
Value:YES
(Yes)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

52

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

ENCRY_OPT_
SWITCH

BSC6910

SET
AITFOTHPA
RA

GBFD-113501

A5/1 and A5/2


Ciphering
Algorithm

Meaning:This
parameter
specifies the
transmission
mode when the
BSS does not
support the
encryption
algorithm of the
MSC. When this
parameter is set
to Yes, the BSS
uses nonencryption
transmission
mode. When this
parameter is set
to No, the BSS
rejects the call.
GUI Value
Range:NO(No),
YES(Yes)
Unit:None
Actual Value
Range:NO, YES
Default
Value:YES
(Yes)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

53

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

SDFASTHOS
WITCH

BSC6900

SET
GCELLSOFT

GBFD-113521

A5/1 Encryption
Flow
Optimization

Meaning:Wheth
er to enable the
SDCCH quick
handover
function. If this
parameter is set
to ON, the BSC
hands over an
MS to another
SDCCH after
sending an
encrypted
command to the
MS. This
ensures that
subsequent
encrypted
commands can
be sent and
received on the
SDCCH,
increasing
network
security.
GUI Value
Range:OFF
(Off), ON(On)
Unit:None
Actual Value
Range:OFF, ON
Default
Value:OFF(Off)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

54

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

SDFASTHOS
WITCH

BSC6910

SET
GCELLSOFT

GBFD-113521

A5/1 Encryption
Flow
Optimization

Meaning:Wheth
er to enable the
SDCCH quick
handover
function. If this
parameter is set
to ON, the BSC
hands over an
MS to another
SDCCH after
sending an
encrypted
command to the
MS. This
ensures that
subsequent
encrypted
commands can
be sent and
received on the
SDCCH,
increasing
network
security.
GUI Value
Range:OFF
(Off), ON(On)
Unit:None
Actual Value
Range:OFF, ON
Default
Value:OFF(Off)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

55

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

TCHTIMEHO
SWITCH

BSC6900

SET
GCELLSOFT

GBFD-113521

A5/1 Encryption
Flow
Optimization

Meaning:This
parameter
specifies
whether to
perform
periodic intracell handover
for speech
services on
TCH.
GUI Value
Range:OFF
(Off), ON(On)
Unit:None
Actual Value
Range:OFF, ON
Default
Value:OFF(Off)

TCHTIMEHO
SWITCH

BSC6910

SET
GCELLSOFT

GBFD-113521

A5/1 Encryption
Flow
Optimization

Meaning:This
parameter
specifies
whether to
perform
periodic intracell handover
for speech
services on
TCH.
GUI Value
Range:OFF
(Off), ON(On)
Unit:None
Actual Value
Range:OFF, ON
Default
Value:OFF(Off)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

56

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

TCHTIMEHO
PERIOD

BSC6900

SET
GCELLSOFT

GBFD-113521

A5/1 Encryption
Flow
Optimization

Meaning:This
parameter
specifies the
interval at which
the speech
service on a
TCH is handed
over.
GUI Value
Range:1~600
Unit:s
Actual Value
Range:1~600
Default Value:
60

TCHTIMEHO
PERIOD

BSC6910

SET
GCELLSOFT

GBFD-113521

A5/1 Encryption
Flow
Optimization

Meaning:This
parameter
specifies the
interval at which
the speech
service on a
TCH is handed
over.
GUI Value
Range:1~600
Unit:s
Actual Value
Range:1~600
Default Value:
60

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

57

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

FLEXTSCSWI
TCH

BSC6900

SET
GCELLSOFT

GBFD-118201

SoftSynchronized
Network

Meaning:Wheth
er to enable the
function of the
Flex training
sequence code
(TSC). If the
value of this
parameter is ON
and the BTS
supports the
Flex TSC
function, the
BSS
dynamically
allocates TSCs
to hopping
frequencies for
improving the
security of calls.

GBFD-117001
GBFD-113521

Flex MAIO
A5/1 Encryption
Flow
Optimization

GUI Value
Range:OFF
(Off), ON(On)
Unit:None
Actual Value
Range:OFF, ON
Default
Value:OFF(Off)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

58

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

FLEXTSCSWI
TCH

BSC6910

SET
GCELLSOFT

GBFD-118201

SoftSynchronized
Network

Meaning:Wheth
er to enable the
function of the
Flex training
sequence code
(TSC). If the
value of this
parameter is ON
and the BTS
supports the
Flex TSC
function, the
BSS
dynamically
allocates TSCs
to hopping
frequencies for
improving the
security of calls.

GBFD-117001
GBFD-113521

Flex MAIO
A5/1 Encryption
Flow
Optimization

GUI Value
Range:OFF
(Off), ON(On)
Unit:None
Actual Value
Range:OFF, ON
Default
Value:OFF(Off)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

59

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

STOPSI5SWI
TCH

BSC6900

SET
GCELLSOFT

GBFD-113521

A5/1 Encryption
Flow
Optimization

Meaning:This
parameter
specifies
whether the
sending of
system
information 5,
5bis, and 5ter
can be stopped
on the SACCH
on the SDCCH
after the BTS
issues a
ciphering
command.
GUI Value
Range:OFF
(Off), ON(On)
Unit:None
Actual Value
Range:OFF, ON
Default
Value:OFF(Off)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

60

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

STOPSI5SWI
TCH

BSC6910

SET
GCELLSOFT

GBFD-113521

A5/1 Encryption
Flow
Optimization

Meaning:This
parameter
specifies
whether the
sending of
system
information 5,
5bis, and 5ter
can be stopped
on the SACCH
on the SDCCH
after the BTS
issues a
ciphering
command.
GUI Value
Range:OFF
(Off), ON(On)
Unit:None
Actual Value
Range:OFF, ON
Default
Value:OFF(Off)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

61

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

DUMMYBITR
ANDSWITCH

BSC6900

SET
GCELLSOFT

GBFD-113521

A5/1 Encryption
Flow
Optimization

Meaning:Wheth
er a BTS
randomizes the
dummy bits in
all messages
except system
information that
are sent to MSs
on dedicated
channels. If this
parameter is set
to OFF, dummy
bits are filled by
0x2B. If this
parameter is set
to ON, dummy
bits are filled by
random values.
GUI Value
Range:OFF
(Off), ON(On)
Unit:None
Actual Value
Range:OFF, ON
Default
Value:OFF(Off)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

62

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

DUMMYBITR
ANDSWITCH

BSC6910

SET
GCELLSOFT

GBFD-113521

A5/1 Encryption
Flow
Optimization

Meaning:Wheth
er a BTS
randomizes the
dummy bits in
all messages
except system
information that
are sent to MSs
on dedicated
channels. If this
parameter is set
to OFF, dummy
bits are filled by
0x2B. If this
parameter is set
to ON, dummy
bits are filled by
random values.
GUI Value
Range:OFF
(Off), ON(On)
Unit:None
Actual Value
Range:OFF, ON
Default
Value:OFF(Off)

SI6RandomBit

BSC6900

SET
GCELLSOFT

GBFD-113521

A5/1 Encryption
Flow
Optimization

Meaning:Wheth
er to fill random
bits in system
information (SI)
6 after a
ciphering
command is
sent.
GUI Value
Range:NO(No),
YES(Yes)
Unit:None
Actual Value
Range:NO, YES
Default
Value:NO(No)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

63

GSM BSS
Ciphering Feature Parameter Description

11 Parameters

Parameter ID

NE

MML
Command

Feature ID

Feature Name

Description

SI6RandomBit

BSC6910

SET
GCELLSOFT

GBFD-113521

A5/1 Encryption
Flow
Optimization

Meaning:Wheth
er to fill random
bits in system
information (SI)
6 after a
ciphering
command is
sent.
GUI Value
Range:NO(No),
YES(Yes)
Unit:None
Actual Value
Range:NO, YES
Default
Value:NO(No)

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

64

GSM BSS
Ciphering Feature Parameter Description

12 Counters

12

Counters

Table 12-1 Counter description


Counter ID

Counter Name

Counter
Description

NE

Feature ID

Feature Name

1282432419

CELL.SPT.CIP
HER.CMD.A5.
3

A3413C:Numbe
r of Cipher
Commands
(A5/3)

BSC6900

GBFD-113503

A5/3 Ciphering
Algorithm

1282432420

CELL.SPT.CIP
HER.SUCC.A5.
3

A3433S:Numbe
r of Successful
Cipher Times
(A5/3)

BSC6900

GBFD-113503

A5/3 Ciphering
Algorithm

1282436790

BS.MSC.CIPH
ER.MOD.CMD
.NUM

L0059B:Numbe
r of Ciphering
Commands

BSC6900

GBFD-113501

A5/1 and A5/2


Ciphering
Algorithm

GBFD-113503
GBFD-113521

A5/3 Ciphering
Algorithm
A5/1 Encryption
Flow
Optimization

1282432419

CELL.SPT.CIP
HER.CMD.A5.
3

A3413C:Numbe
r of Cipher
Commands
(A5/3)

BSC6910

GBFD-113503

A5/3 Ciphering
Algorithm

1282432420

CELL.SPT.CIP
HER.SUCC.A5.
3

A3433S:Numbe
r of Successful
Cipher Times
(A5/3)

BSC6910

GBFD-113503

A5/3 Ciphering
Algorithm

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

65

GSM BSS
Ciphering Feature Parameter Description

12 Counters

Counter ID

Counter Name

Counter
Description

NE

Feature ID

Feature Name

1282436790

BS.MSC.CIPH
ER.MOD.CMD
.NUM

L0059B:Numbe
r of Ciphering
Commands

BSC6910

GBFD-113501

A5/1 and A5/2


Ciphering
Algorithm

GBFD-113503
GBFD-113521

A5/3 Ciphering
Algorithm
A5/1 Encryption
Flow
Optimization

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

66

GSM BSS
Ciphering Feature Parameter Description

13 Glossary

13

Glossary

For the acronyms, abbreviations, terms, and definitions, see Glossary.

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

67

GSM BSS
Ciphering Feature Parameter Description

14 Reference Documents

14

Reference Documents

3GPP 48.058: "Base Station Controller - Base Transceiver Station (BSC-BTS) Interface Layer
3 Specification"

Issue 01 (2014-04-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

68

Das könnte Ihnen auch gefallen