MiniCore is designed as a test Core Network in a single box/server. This means that Yate equipment needed in a Core Network is already installed and preconfigured:
-
LTE Core - YateUCN as MME, SGW, PGW, PCEF
-
GSM/GPRS Core - YateUCN as MSC/VLR, GMSC, SGSN, GGSN
-
YateHSS/HLR as HSS and HLR
-
YateSMSC as SMSC
-
YateSTP and YateDRA as STP and DRA
S1AP interface
Standard interface where eNodeBs connect to the Core Network
YateUCN (more exactly, the MME function) waits for an eNodeB equipment (SatSite/LTE LabKit/Other vendor eNodeB) connection over S1AP protocol:
- S1AP listens on IP: 10.0.4.1 of the MiniCore and eNodeB issues the connection from IP 10.0.4.140* (on the LTE LabKit)
* depends on the RAN equipment IP, here I supposed will be 10.0.4.140 because MiniCore gives IPs from 10.0.4.129/25 network
S5 interface
Internal interface between SGW and PGW
S5 interface listens on IP 10.0.4.2
S8 interface
Standard interface between SGW and PGW when roaming between network operators
S8 interface listens on IP 10.0.4.3, you can see the messages (trafic) from that interface even from YateUCN console: telnet 0 5039, with command: debug ucn_pgw level 9).
S11 interface
Internal interface inside YateUCN
S11 interface trafic can be seen also from UCN console: telnet 0 5039 (with the command: debug ucn_mme_sgsn level 9).
MiniCore
YateHSS/HLR & YateUCN in a box for testing & research
See the product here ››
How to capture interfaces traffic inside MiniCore
To capture interfaces trafic inside MiniCore, you can install a tcpdump wrapper called tcpdump-cap.
From linux console, as root type:
urpmi.update Yate;urpmi tcpdump-cap
Edit configuration file with:
vi /etc/tcpdump-cap.conf
Uncomment these lines in the config file:
directory /home/capture
capture ran eth-ran udp port 4729 or udp port 9999 or udp port 23234
capture s1 eth-ran sctp port 36412 or udp port 2123 or udp port 5060 or udp port 2152
capture dra lo sctp port 3868
capture stp lo sctp and not port 3868
Create /home/capture directory with the command:
mkdir /home/capture
In /home/capture directory you will find .pcap files, their name will start in ran, s1, dra and stp. These can be visualized using Wireshark, tshark or any other packet analyzer.
Regarding capture for a certain Subscriber/SIM/IMSI (“IP packet capture for YateUCN PGW/GGSN”), you can use the pcap php script in the YateUCN console with command: pcap add IMSI
Usage: ” pcap {add|del} {IMSI|MSISDN|IMEI|IMEISV}”
” pcap end IP-ADDRESS”
” pcap filter on/off”
MiniCore
YateHSS/HLR & YateUCN in a box for testing & research
See the product here ››