UERANSIM (5G UE & RAN (gNodeB) implementation) supports IPv4 of PDU Session Type from 2020.11.17 version, and the Data Plane facility has been enabled. Therefore, in order to use U-Plane's DN (Data Network) as a trial, I built a simulation environment for the 5GC mobile network. This briefly describes the overall and configuration files.
I created a 5GC mobile network (Internet reachable) for simulation with the aim of creating an environment in which packets can be sent end-to-end with different DNs for each DNN.
The following minimum configuration was set as a condition.
The built simulation environment is as follows.
The 5GC / UE / RAN used are as follows.
Each VMs are as follows. | VM # | SW & Role | IP address | OS | Memory (Min) | HDD (Min) |
---|---|---|---|---|---|---|
VM1 | free5GC 5GC C-Plane | 192.168.0.141/24 | Ubuntu 22.04 | 2GB | 20GB | |
VM2 | free5GC 5GC U-Plane1 | 192.168.0.142/24 | Ubuntu 22.04 | 1GB | 20GB | |
VM3 | free5GC 5GC U-Plane2 | 192.168.0.143/24 | Ubuntu 22.04 | 1GB | 20GB | |
VM4 | UERANSIM RAN (gNodeB) | 192.168.0.131/24 | Ubuntu 22.04 | 1GB | 10GB | |
VM5 | UERANSIM UE | 192.168.0.132/24 | Ubuntu 22.04 | 1GB | 10GB |
Subscriber Information (other information is the same) is as follows. Note. Please select OP or OPc according to the setting of UERANSIM UE configuration files. |
UE # | IMSI | DNN | OP/OPc |
---|---|---|---|---|
UE0 | 001010000000000 | internet | OPc | |
UE1 | 001010000000001 | internet2 | OPc | |
UE2 | 001010000000002 | internet2 | OPc | |
UE3 | 001010000000003 | ims | OPc | |
UE4 | 001010000000004 | ims | OPc |
I registered these information with the free5GC WebUI. In addition, 3GPP TS 35.208 "4.3 Test Sets" is published by 3GPP as test data for the 3GPP authentication and key generation functions (MILENAGE).
Each DNs are as follows. | DN | TUNnel interface of DN | DNN | TUNnel interface of UE | U-Plane # |
---|---|---|---|---|---|
10.60.0.0/16 | upfgtp | internet | uesimtun0 | U-Plane1 | |
10.61.0.0/16 | upfgtp | internet2 | uesimtun1, uesimtun2 | U-Plane1 | |
10.62.0.0/16 | upfgtp | ims | uesimtun3, uesimtun4 | U-Plane2 |
Additional information.
free5GC 5GC U-Plane worked fine on Raspberry Pi 4 Model B. I used Ubuntu 20.04 (64bit) for Raspberry Pi 4 as the OS. I think it would be convenient to place a compact U-Plane in the edge environment and use it as an end-point for DN.
In addition, I have not confirmed the communication performance.
Please refer to the following for building free5GC and UERANSIM respectively.
The combination of DNN and S-NSSAI parameters can be used in the logic that selects UPF as the connection destination by PFCP.
For the sake of simplicity, This time, only DNN will be changed. S-NSSAI of all UEs is fixed as SST=1
and SD=010203
.
free5gc/config/amfcfg.yaml
--- amfcfg.yaml.orig 2024-03-30 10:35:10.534612278 +0900
+++ amfcfg.yaml 2024-03-31 17:58:26.446351600 +0900
@@ -5,7 +5,7 @@
configuration:
amfName: AMF # the name of this AMF
ngapIpList: # the IP list of N2 interfaces on this AMF
free5gc/config/ausfcfg.yaml
--- ausfcfg.yaml.orig 2024-03-30 10:35:10.534612278 +0900
+++ ausfcfg.yaml 2024-03-30 10:48:53.470630936 +0900
@@ -16,10 +16,8 @@
nrfUri: http://127.0.0.10:8000 # a valid URI of NRF
nrfCertPem: cert/nrf.pem # NRF Certificate
plmnSupportList: # the PLMNs (Public Land Mobile Network) list supported by this AUSF
- `free5gc/config/nrfcfg.yaml`
```diff
--- nrfcfg.yaml.orig 2024-03-30 10:35:10.534612278 +0900
+++ nrfcfg.yaml 2024-03-31 12:34:36.380715909 +0900
@@ -15,8 +15,8 @@
key: cert/nrf.key # NRF TLS Private key
oauth: true
DefaultPlmnId:
- mcc: 208 # Mobile Country Code (3 digits string, digit: 0~9)
- mnc: 93 # Mobile Network Code (2 or 3 digits string, digit: 0~9)
+ mcc: 001 # Mobile Country Code (3 digits string, digit: 0~9)
+ mnc: 01 # Mobile Network Code (2 or 3 digits string, digit: 0~9)
serviceNameList: # the SBI services provided by this NRF, refer to TS 29.510
- nnrf-nfm # Nnrf_NFManagement service
- nnrf-disc # Nnrf_NFDiscovery service
free5gc/config/nssfcfg.yaml
--- nssfcfg.yaml.orig 2024-03-30 10:35:10.535609025 +0900
+++ nssfcfg.yaml 2024-03-31 15:19:58.888726629 +0900
@@ -18,12 +18,12 @@
nrfUri: http://127.0.0.10:8000 # a valid URI of NRF
nrfCertPem: cert/nrf.pem # NRF Certificate
supportedPlmnList: # the PLMNs (Public land mobile network) list supported by this NSSF
free5gc/config/smfcfg.yaml
--- smfcfg.yaml.orig 2024-03-30 10:35:10.535609025 +0900
+++ smfcfg.yaml 2024-03-31 19:01:41.778778017 +0900
@@ -24,32 +24,29 @@
- dnn: internet # Data Network Name
dns: # the IP address of DNS
ipv4: 8.8.8.8
t3591: enable: true # true or false @@ -93,6 +109,7 @@ urrPeriod: 10 # default usage report period in seconds urrThreshold: 1000 # default usage report threshold in bytes requestedUnit: 1000
free5gc/config/upfcfg.yaml
--- upfcfg.yaml.orig 2024-03-30 11:20:35.082415729 +0900
+++ upfcfg.yaml 2024-03-31 18:35:01.879349232 +0900
@@ -3,8 +3,8 @@
# The listen IP and nodeID of the N4 interface on this UPF (Can't set to 0.0.0.0)
pfcp:
@@ -13,7 +13,7 @@
ifList:
@@ -22,8 +22,10 @@
dnnList:
cidr: 10.61.0.0/16
logger: # log output setting enable: true # true or false
free5gc/config/upfcfg.yaml
--- upfcfg.yaml.orig 2024-03-30 11:20:35.082415729 +0900
+++ upfcfg.yaml 2024-03-31 18:36:09.891565119 +0900
@@ -3,8 +3,8 @@
# The listen IP and nodeID of the N4 interface on this UPF (Can't set to 0.0.0.0)
pfcp:
@@ -13,7 +13,7 @@
ifList:
@@ -21,8 +21,8 @@
dnnList:
cidr: 10.62.0.0/16 # Classless Inter-Domain Routing for assigned IPv4 pool of UE
logger: # log output setting
UERANSIM/config/free5gc-gnb.yaml
--- free5gc-gnb.yaml.orig 2021-02-11 11:03:28.000000000 +0900
+++ free5gc-gnb.yaml 2022-04-01 21:43:08.519802520 +0900
@@ -1,17 +1,17 @@
-mcc: '208' # Mobile Country Code value
-mnc: '93' # Mobile Network Code value (2 or 3 digits)
+mcc: '001' # Mobile Country Code value
+mnc: '01' # Mobile Network Code value (2 or 3 digits)
nci: '0x000000010' # NR Cell Identity (36-bit)
idLength: 32 # NR gNB ID length in bits [22...32]
tac: 1 # Tracking Area Code
-linkIp: 127.0.0.1 # gNB's local IP address for Radio Link Simulation (Usually same with local IP) -ngapIp: 127.0.0.1 # gNB's local IP address for N2 Interface (Usually same with local IP) -gtpIp: 127.0.0.1 # gNB's local IP address for N3 Interface (Usually same with local IP) +linkIp: 192.168.0.131 # gNB's local IP address for Radio Link Simulation (Usually same with local IP) +ngapIp: 192.168.0.131 # gNB's local IP address for N2 Interface (Usually same with local IP) +gtpIp: 192.168.0.131 # gNB's local IP address for N3 Interface (Usually same with local IP)
amfConfigs:
First, copy free5gc-ue0.yaml
from free5gc-ue.yaml
.
# cd UERANSIM/config
# cp free5gc-ue.yaml free5gc-ue0.yaml
Next, edit free5gc-ue0.yaml
.
UERANSIM/config/free5gc-ue0.yaml
--- free5gc-ue.yaml.orig 2024-03-02 20:20:59.000000000 +0900
+++ free5gc-ue0.yaml 2024-03-31 19:05:03.392731111 +0900
@@ -1,9 +1,9 @@
# IMSI number of the UE. IMSI = [MCC|MNC|MSISDN] (In total 15 digits)
-supi: 'imsi-208930000000001'
+supi: 'imsi-001010000000000'
# Mobile Country Code value of HPLMN
-mcc: '208'
+mcc: '001'
# Mobile Network Code value of HPLMN (2 or 3 digits)
-mnc: '93'
+mnc: '01'
# SUCI Protection Scheme : 0 for Null-scheme, 1 for Profile A and 2 for Profile B
protectionScheme: 0
# Home Network Public Key for protecting with SUCI Profile A
@@ -28,7 +28,7 @@
# List of gNB IP addresses for Radio Link Simulation
gnbSearchList:
uacAic:
First, copy free5gc-ue1.yaml
from free5gc-ue.yaml
.
# cd UERANSIM/config
# cp free5gc-ue.yaml free5gc-ue1.yaml
Next, edit free5gc-ue1.yaml
.
UERANSIM/config/free5gc-ue1.yaml
--- free5gc-ue.yaml.orig 2024-03-02 20:20:59.000000000 +0900
+++ free5gc-ue1.yaml 2024-03-31 19:06:05.255776012 +0900
@@ -1,9 +1,9 @@
# IMSI number of the UE. IMSI = [MCC|MNC|MSISDN] (In total 15 digits)
-supi: 'imsi-208930000000001'
+supi: 'imsi-001010000000001'
# Mobile Country Code value of HPLMN
-mcc: '208'
+mcc: '001'
# Mobile Network Code value of HPLMN (2 or 3 digits)
-mnc: '93'
+mnc: '01'
# SUCI Protection Scheme : 0 for Null-scheme, 1 for Profile A and 2 for Profile B
protectionScheme: 0
# Home Network Public Key for protecting with SUCI Profile A
@@ -28,7 +28,7 @@
# List of gNB IP addresses for Radio Link Simulation
gnbSearchList:
uacAic: @@ -47,7 +47,7 @@
sessions:
First, copy free5gc-ue2.yaml
from free5gc-ue.yaml
.
# cd UERANSIM/config
# cp free5gc-ue.yaml free5gc-ue2.yaml
Next, edit free5gc-ue2.yaml
.
UERANSIM/config/free5gc-ue2.yaml
--- free5gc-ue.yaml.orig 2024-03-02 20:20:59.000000000 +0900
+++ free5gc-ue2.yaml 2024-03-31 19:06:25.760730615 +0900
@@ -1,9 +1,9 @@
# IMSI number of the UE. IMSI = [MCC|MNC|MSISDN] (In total 15 digits)
-supi: 'imsi-208930000000001'
+supi: 'imsi-001010000000002'
# Mobile Country Code value of HPLMN
-mcc: '208'
+mcc: '001'
# Mobile Network Code value of HPLMN (2 or 3 digits)
-mnc: '93'
+mnc: '01'
# SUCI Protection Scheme : 0 for Null-scheme, 1 for Profile A and 2 for Profile B
protectionScheme: 0
# Home Network Public Key for protecting with SUCI Profile A
@@ -28,7 +28,7 @@
# List of gNB IP addresses for Radio Link Simulation
gnbSearchList:
uacAic: @@ -47,7 +47,7 @@
sessions:
First, copy free5gc-ue3.yaml
from free5gc-ue.yaml
.
# cd UERANSIM/config
# cp free5gc-ue.yaml free5gc-ue3.yaml
Next, edit free5gc-ue3.yaml
.
UERANSIM/config/free5gc-ue3.yaml
--- free5gc-ue.yaml.orig 2024-03-02 20:20:59.000000000 +0900
+++ free5gc-ue3.yaml 2024-03-31 19:06:52.455837558 +0900
@@ -1,9 +1,9 @@
# IMSI number of the UE. IMSI = [MCC|MNC|MSISDN] (In total 15 digits)
-supi: 'imsi-208930000000001'
+supi: 'imsi-001010000000003'
# Mobile Country Code value of HPLMN
-mcc: '208'
+mcc: '001'
# Mobile Network Code value of HPLMN (2 or 3 digits)
-mnc: '93'
+mnc: '01'
# SUCI Protection Scheme : 0 for Null-scheme, 1 for Profile A and 2 for Profile B
protectionScheme: 0
# Home Network Public Key for protecting with SUCI Profile A
@@ -28,7 +28,7 @@
# List of gNB IP addresses for Radio Link Simulation
gnbSearchList:
uacAic: @@ -47,7 +47,7 @@
sessions:
First, copy free5gc-ue4.yaml
from free5gc-ue.yaml
.
# cd UERANSIM/config
# cp free5gc-ue.yaml free5gc-ue4.yaml
Next, edit free5gc-ue4.yaml
.
UERANSIM/config/free5gc-ue4.yaml
--- free5gc-ue.yaml.orig 2024-03-02 20:20:59.000000000 +0900
+++ free5gc-ue4.yaml 2024-03-31 19:07:16.237839132 +0900
@@ -1,9 +1,9 @@
# IMSI number of the UE. IMSI = [MCC|MNC|MSISDN] (In total 15 digits)
-supi: 'imsi-208930000000001'
+supi: 'imsi-001010000000004'
# Mobile Country Code value of HPLMN
-mcc: '208'
+mcc: '001'
# Mobile Network Code value of HPLMN (2 or 3 digits)
-mnc: '93'
+mnc: '01'
# SUCI Protection Scheme : 0 for Null-scheme, 1 for Profile A and 2 for Profile B
protectionScheme: 0
# Home Network Public Key for protecting with SUCI Profile A
@@ -28,7 +28,7 @@
# List of gNB IP addresses for Radio Link Simulation
gnbSearchList:
uacAic: @@ -47,7 +47,7 @@
sessions:
First, uncomment the next line in the /etc/sysctl.conf
file and reflect it in the OS.
net.ipv4.ip_forward=1
# sysctl -p
Next, configure NAPT.
# iptables -t nat -A POSTROUTING -s 10.60.0.0/16 ! -o upfgtp -j MASQUERADE
# iptables -t nat -A POSTROUTING -s 10.61.0.0/16 ! -o upfgtp -j MASQUERADE
First, uncomment the next line in the /etc/sysctl.conf
file and reflect it in the OS.
net.ipv4.ip_forward=1
# sysctl -p
Next, configure NAPT.
# iptables -t nat -A POSTROUTING -s 10.62.0.0/16 ! -o upfgtp -j MASQUERADE
Note. It is recommended to use go1.18.x according to the commit to free5gc/openapi on 2022.10.26.
Please refer to the following for building free5GC and UERANSIM respectively.
Install MongoDB on free5GC 5GC C-Plane machine. It is not necessary to install MongoDB on free5GC 5GC U-Plane machines. MongoDB Compass is a convenient tool to look at the MongoDB database.
Note. The installation guide also includes instructions on building the latest committed version.
First run the 5GC, then UERANSIM (UE & RAN implementation).
First, run free5GC 5GC U-Planes. Please see here for the reason.
Note. It was improved on 2022.11.08, and you don't have to worry about the startup order of C-Plane and U-Plane.
# cd free5gc
# bin/upf
# cd free5gc
# bin/upf
Next, run free5GC 5GC C-Plane.
Create the following shell script and run it.
#!/usr/bin/env bash
PID_LIST=()
NF_LIST="nrf amf smf udr pcf udm nssf ausf chf"
export GIN_MODE=release
for NF in ${NF_LIST}; do
./bin/${NF} &
PID_LIST+=($!)
sleep 1
done
function terminate()
{
sudo kill -SIGTERM ${PID_LIST[${#PID_LIST[@]}-2]} ${PID_LIST[${#PID_LIST[@]}-1]}
sleep 2
}
trap terminate SIGINT
wait ${PID_LIST}
Here, the case of UE1 (IMSI-001010000000001 set as DNN=internet2) & RAN is described. First, do an NG Setup between gNodeB and 5GC, then register the UE with 5GC and establish a PDU session.
Please refer to the following for usage of UERANSIM.
https://github.com/aligungr/UERANSIM/wiki/Usage
Start gNB as follows.
# ./nr-gnb -c ../config/free5gc-gnb.yaml
UERANSIM v3.2.6
[2024-03-31 19:33:25.375] [sctp] [info] Trying to establish SCTP connection... (192.168.0.141:38412)
[2024-03-31 19:33:25.386] [sctp] [info] SCTP connection established (192.168.0.141:38412)
[2024-03-31 19:33:25.387] [sctp] [debug] SCTP association setup ascId[19]
[2024-03-31 19:33:25.388] [ngap] [debug] Sending NG Setup Request
[2024-03-31 19:33:25.395] [ngap] [debug] NG Setup Response received
[2024-03-31 19:33:25.395] [ngap] [info] NG Setup procedure is successful
The free5GC C-Plane log when executed is as follows.
2024-03-31T19:33:25.666463472+09:00 [INFO][AMF][Ngap] [AMF] SCTP Accept from: 192.168.0.131:51132
2024-03-31T19:33:25.668265575+09:00 [INFO][AMF][Ngap] Create a new NG connection for: 192.168.0.131:51132
2024-03-31T19:33:25.670575746+09:00 [INFO][AMF][Ngap][ran_addr:192.168.0.131:51132] Handle NGSetupRequest
2024-03-31T19:33:25.671393145+09:00 [INFO][AMF][Ngap][ran_addr:192.168.0.131:51132] Send NG-Setup response
Start UE (UE1) as follows. This will register the UE with 5GC and establish a PDU session.
# ./nr-ue -c ../config/free5gc-ue1.yaml
UERANSIM v3.2.6
[2024-03-31 19:33:28.319] [nas] [info] UE switches to state [MM-DEREGISTERED/PLMN-SEARCH]
[2024-03-31 19:33:28.321] [rrc] [debug] New signal detected for cell[1], total [1] cells in coverage
[2024-03-31 19:33:28.322] [nas] [info] Selected plmn[001/01]
[2024-03-31 19:33:28.323] [rrc] [info] Selected cell plmn[001/01] tac[1] category[SUITABLE]
[2024-03-31 19:33:28.323] [nas] [info] UE switches to state [MM-DEREGISTERED/PS]
[2024-03-31 19:33:28.324] [nas] [info] UE switches to state [MM-DEREGISTERED/NORMAL-SERVICE]
[2024-03-31 19:33:28.324] [nas] [debug] Initial registration required due to [MM-DEREG-NORMAL-SERVICE]
[2024-03-31 19:33:28.328] [nas] [debug] UAC access attempt is allowed for identity[0], category[MO_sig]
[2024-03-31 19:33:28.329] [nas] [debug] Sending Initial Registration
[2024-03-31 19:33:28.330] [rrc] [debug] Sending RRC Setup Request
[2024-03-31 19:33:28.331] [nas] [info] UE switches to state [MM-REGISTER-INITIATED]
[2024-03-31 19:33:28.332] [rrc] [info] RRC connection established
[2024-03-31 19:33:28.332] [rrc] [info] UE switches to state [RRC-CONNECTED]
[2024-03-31 19:33:28.333] [nas] [info] UE switches to state [CM-CONNECTED]
[2024-03-31 19:33:28.456] [nas] [debug] Authentication Request received
[2024-03-31 19:33:28.456] [nas] [debug] Received SQN [000000000025]
[2024-03-31 19:33:28.456] [nas] [debug] SQN-MS [000000000000]
[2024-03-31 19:33:28.485] [nas] [debug] Security Mode Command received
[2024-03-31 19:33:28.486] [nas] [debug] Selected integrity[2] ciphering[0]
[2024-03-31 19:33:28.652] [nas] [debug] Registration accept received
[2024-03-31 19:33:28.652] [nas] [info] UE switches to state [MM-REGISTERED/NORMAL-SERVICE]
[2024-03-31 19:33:28.652] [nas] [debug] Sending Registration Complete
[2024-03-31 19:33:28.652] [nas] [info] Initial Registration is successful
[2024-03-31 19:33:28.652] [nas] [debug] Sending PDU Session Establishment Request
[2024-03-31 19:33:28.653] [nas] [debug] UAC access attempt is allowed for identity[0], category[MO_sig]
[2024-03-31 19:33:28.856] [nas] [debug] Configuration Update Command received
[2024-03-31 19:33:29.010] [nas] [debug] PDU Session Establishment Accept received
[2024-03-31 19:33:29.014] [nas] [info] PDU Session establishment is successful PSI[1]
[2024-03-31 19:33:29.038] [app] [info] Connection setup for PDU session[1] is successful, TUN interface[uesimtun0, 10.61.0.1] is up.
The free5GC C-Plane log when executed is as follows.
2024-03-31T19:33:28.258767199+09:00 [INFO][AMF][Ngap][ran_addr:192.168.0.131:51132] Handle InitialUEMessage
2024-03-31T19:33:28.259558253+09:00 [INFO][AMF][Ngap][amf_ue_ngap_id:RU:1,AU:1(3GPP)][ran_addr:192.168.0.131:51132] New RanUe [RanUeNgapID:1][AmfUeNgapID:1]
2024-03-31T19:33:28.260704996+09:00 [INFO][AMF][Ngap][ran_addr:192.168.0.131:51132] 5GSMobileIdentity ["SUCI":"suci-0-001-01-0000-0-0-0000000001", err: <nil>]
2024-03-31T19:33:28.263909138+09:00 [INFO][AMF][CTX] New AmfUe [supi:][guti:00101cafe0000000001]
2024-03-31T19:33:28.264775777+09:00 [INFO][AMF][Gmm] Handle event[Gmm Message], transition from [Deregistered] to [Deregistered]
2024-03-31T19:33:28.265567716+09:00 [INFO][AMF][Gmm][amf_ue_ngap_id:RU:1,AU:1(3GPP)][supi:SUPI:] Handle Registration Request
2024-03-31T19:33:28.266342185+09:00 [INFO][AMF][Gmm][amf_ue_ngap_id:RU:1,AU:1(3GPP)][supi:SUPI:] RegistrationType: Initial Registration
2024-03-31T19:33:28.267122083+09:00 [INFO][AMF][Gmm][amf_ue_ngap_id:RU:1,AU:1(3GPP)][supi:SUPI:] MobileIdentity5GS: SUCI[suci-0-001-01-0000-0-0-0000000001]
2024-03-31T19:33:28.267846747+09:00 [INFO][AMF][Gmm] Handle event[Start Authentication], transition from [Deregistered] to [Authentication]
2024-03-31T19:33:28.268560289+09:00 [INFO][AMF][Gmm][amf_ue_ngap_id:RU:1,AU:1(3GPP)][supi:SUPI:] Authentication procedure
2024-03-31T19:33:28.271546294+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.278373243+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.290084507+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.294592255+09:00 [INFO][NRF][DISC] Handle NFDiscoveryRequest
2024-03-31T19:33:28.298010845+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | GET | /nnrf-disc/v1/nf-instances?requester-nf-type=AMF&target-nf-type=AUSF |
2024-03-31T19:33:28.300047503+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.304425186+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.313466711+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.318074355+09:00 [INFO][AUSF][UeAuth] HandleUeAuthPostRequest
2024-03-31T19:33:28.318500437+09:00 [INFO][AUSF][UeAuth] Serving network authorized
2024-03-31T19:33:28.320053910+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.322462439+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.328761349+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.330994701+09:00 [INFO][NRF][DISC] Handle NFDiscoveryRequest
2024-03-31T19:33:28.333364361+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | GET | /nnrf-disc/v1/nf-instances?requester-nf-type=AUSF&service-names=nudm-ueau&target-nf-type=UDM |
2024-03-31T19:33:28.334494688+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.336094648+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.342043719+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.344869808+09:00 [INFO][UDM][UEAU] Handle GenerateAuthDataRequest
2024-03-31T19:33:28.346055878+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.348981982+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.354849039+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.356862956+09:00 [INFO][UDM][Suci] suciPart: [suci 0 001 01 0000 0 0 0000000001]
2024-03-31T19:33:28.357006992+09:00 [INFO][UDM][Suci] scheme 0
2024-03-31T19:33:28.357228882+09:00 [INFO][UDM][Suci] SUPI type is IMSI
http://127.0.0.10:8000
2024-03-31T19:33:28.358934617+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.360447803+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.363914207+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.365147082+09:00 [INFO][NRF][DISC] Handle NFDiscoveryRequest
2024-03-31T19:33:28.366209780+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | GET | /nnrf-disc/v1/nf-instances?requester-nf-type=UDM&target-nf-type=UDR |
2024-03-31T19:33:28.368320931+09:00 [INFO][UDR][DataRepo] Handle QueryAuthSubsData
2024-03-31T19:33:28.370149001+09:00 [INFO][UDR][GIN] | 200 | 127.0.0.1 | GET | /nudr-dr/v1/subscription-data/imsi-001010000000001/authentication-data/authentication-subscription |
2024-03-31T19:33:28.371160802+09:00 [INFO][UDM][UEAU] Nil Op
2024-03-31T19:33:28.373316190+09:00 [INFO][UDR][DataRepo] Handle ModifyAuthentication
2024-03-31T19:33:28.375414110+09:00 [INFO][UDR][GIN] | 204 | 127.0.0.1 | PATCH | /nudr-dr/v1/subscription-data/imsi-001010000000001/authentication-data/authentication-subscription |
2024-03-31T19:33:28.375892475+09:00 [INFO][UDM][GIN] | 200 | 127.0.0.1 | POST | /nudm-ueau/v1/suci-0-001-01-0000-0-0-0000000001/security-information/generate-auth-data |
2024-03-31T19:33:28.376335751+09:00 [INFO][AUSF][UeAuth] Add SuciSupiPair (suci-0-001-01-0000-0-0-0000000001, imsi-001010000000001) to map.
2024-03-31T19:33:28.376500027+09:00 [INFO][AUSF][UeAuth] Use 5G AKA auth method
2024-03-31T19:33:28.376751096+09:00 [INFO][AUSF][5gAka] XresStar = 3336653933656232363730653032346265666566363237326335303634333863
2024-03-31T19:33:28.377086716+09:00 [INFO][AUSF][GIN] | 201 | 127.0.0.1 | POST | /nausf-auth/v1/ue-authentications |
2024-03-31T19:33:28.377620044+09:00 [INFO][AMF][Gmm][amf_ue_ngap_id:RU:1,AU:1(3GPP)][supi:SUPI:] Send Authentication Request
2024-03-31T19:33:28.377784414+09:00 [INFO][AMF][Ngap][amf_ue_ngap_id:RU:1,AU:1(3GPP)][ran_addr:192.168.0.131:51132] Send Downlink Nas Transport
2024-03-31T19:33:28.378204132+09:00 [INFO][AMF][Gmm][amf_ue_ngap_id:RU:1,AU:1(3GPP)][supi:SUPI:] Start T3560 timer
2024-03-31T19:33:28.380192934+09:00 [INFO][AMF][Ngap][ran_addr:192.168.0.131:51132] Handle UplinkNASTransport
2024-03-31T19:33:28.380398519+09:00 [INFO][AMF][Ngap][amf_ue_ngap_id:RU:1,AU:1(3GPP)][ran_addr:192.168.0.131:51132] Handle UplinkNASTransport (RAN UE NGAP ID: 1)
2024-03-31T19:33:28.380655555+09:00 [INFO][AMF][Gmm] Handle event[Gmm Message], transition from [Authentication] to [Authentication]
2024-03-31T19:33:28.380869584+09:00 [INFO][AMF][Gmm][amf_ue_ngap_id:RU:1,AU:1(3GPP)][supi:SUPI:] Handle Authentication Response
2024-03-31T19:33:28.381038811+09:00 [INFO][AMF][Gmm][amf_ue_ngap_id:RU:1,AU:1(3GPP)][supi:SUPI:] Stop T3560 timer
2024-03-31T19:33:28.381814319+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.383444915+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.386912773+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.388409693+09:00 [INFO][AUSF][5gAka] Auth5gAkaComfirmRequest
2024-03-31T19:33:28.388920514+09:00 [INFO][AUSF][5gAka] res*: 3336653933656232363730653032346265666566363237326335303634333863
Xres*: 3336653933656232363730653032346265666566363237326335303634333863
2024-03-31T19:33:28.389783991+09:00 [INFO][AUSF][5gAka] 5G AKA confirmation succeeded
2024-03-31T19:33:28.390434027+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.391615323+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.395319481+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.396978533+09:00 [INFO][UDM][UEAU] Handle ConfirmAuthDataRequest
2024-03-31T19:33:28.397733672+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.399231735+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.402355322+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.404224212+09:00 [INFO][UDR][DataRepo] Handle CreateAuthenticationStatus
2024-03-31T19:33:28.405250503+09:00 [INFO][UDR][GIN] | 204 | 127.0.0.1 | PUT | /nudr-dr/v1/subscription-data/imsi-001010000000001/authentication-data/authentication-status |
2024-03-31T19:33:28.405684217+09:00 [INFO][UDM][GIN] | 201 | 127.0.0.1 | POST | /nudm-ueau/v1/imsi-001010000000001/auth-events |
2024-03-31T19:33:28.406127744+09:00 [INFO][AUSF][GIN] | 200 | 127.0.0.1 | PUT | /nausf-auth/v1/ue-authentications/suci-0-001-01-0000-0-0-0000000001/5g-aka-confirmation |
2024-03-31T19:33:28.406425325+09:00 [INFO][AMF][Gmm] Handle event[Authentication Success], transition from [Authentication] to [SecurityMode]
2024-03-31T19:33:28.406507887+09:00 [INFO][AMF][Gmm][amf_ue_ngap_id:RU:1,AU:1(3GPP)][supi:SUPI:imsi-001010000000001] Send Security Mode Command
2024-03-31T19:33:28.406724788+09:00 [INFO][AMF][Ngap][amf_ue_ngap_id:RU:1,AU:1(3GPP)][ran_addr:192.168.0.131:51132] Send Downlink Nas Transport
2024-03-31T19:33:28.407424398+09:00 [INFO][AMF][Gmm][amf_ue_ngap_id:RU:1,AU:1(3GPP)][supi:SUPI:imsi-001010000000001] Start T3560 timer
2024-03-31T19:33:28.409386874+09:00 [INFO][AMF][Ngap][ran_addr:192.168.0.131:51132] Handle UplinkNASTransport
2024-03-31T19:33:28.409586823+09:00 [INFO][AMF][Ngap][amf_ue_ngap_id:RU:1,AU:1(3GPP)][ran_addr:192.168.0.131:51132] Handle UplinkNASTransport (RAN UE NGAP ID: 1)
2024-03-31T19:33:28.409805232+09:00 [INFO][AMF][Gmm] Handle event[Gmm Message], transition from [SecurityMode] to [SecurityMode]
2024-03-31T19:33:28.410012780+09:00 [INFO][AMF][Gmm][amf_ue_ngap_id:RU:1,AU:1(3GPP)][supi:SUPI:imsi-001010000000001] Handle Security Mode Complete
2024-03-31T19:33:28.410174089+09:00 [INFO][AMF][Gmm][amf_ue_ngap_id:RU:1,AU:1(3GPP)][supi:SUPI:imsi-001010000000001] Stop T3560 timer
2024-03-31T19:33:28.410373104+09:00 [INFO][AMF][Gmm] Handle event[SecurityMode Success], transition from [SecurityMode] to [ContextSetup]
2024-03-31T19:33:28.410552580+09:00 [INFO][AMF][Gmm][amf_ue_ngap_id:RU:1,AU:1(3GPP)][supi:SUPI:imsi-001010000000001] Handle InitialRegistration
2024-03-31T19:33:28.411292692+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.413008165+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.415750365+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.416939660+09:00 [INFO][NRF][DISC] Handle NFDiscoveryRequest
2024-03-31T19:33:28.418111096+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | GET | /nnrf-disc/v1/nf-instances?requester-nf-type=AMF&supi=imsi-001010000000001&target-nf-type=UDM |
2024-03-31T19:33:28.418924705+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.420214462+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.423775869+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.425371138+09:00 [INFO][UDM][SDM] Handle GetNssai
2024-03-31T19:33:28.426319676+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.427516474+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.430990022+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.432315457+09:00 [INFO][UDR][DataRepo] Handle QueryAmData
2024-03-31T19:33:28.433138529+09:00 [INFO][UDR][GIN] | 200 | 127.0.0.1 | GET | /nudr-dr/v1/subscription-data/imsi-001010000000001/00101/provisioned-data/am-data |
2024-03-31T19:33:28.433553313+09:00 [INFO][UDM][GIN] | 200 | 127.0.0.1 | GET | /nudm-sdm/v1/imsi-001010000000001/nssai?plmn-id=%7B%22mcc%22%3A%22001%22%2C%22mnc%22%3A%2201%22%7D |
2024-03-31T19:33:28.434107454+09:00 [INFO][AMF][Gmm] RequestedNssai: &{Iei:47 Len:5 Buffer:[4 1 1 2 3]}
2024-03-31T19:33:28.434167163+09:00 [INFO][AMF][Gmm][amf_ue_ngap_id:RU:1,AU:1(3GPP)][supi:SUPI:imsi-001010000000001] RequestedNssai - ServingSnssai: &{Sst:1 Sd:010203}, HomeSnssai: <nil>
2024-03-31T19:33:28.435124786+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.436739859+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.439625982+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.440898379+09:00 [INFO][NRF][DISC] Handle NFDiscoveryRequest
2024-03-31T19:33:28.442287775+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | GET | /nnrf-disc/v1/nf-instances?requester-nf-type=AMF&supi=imsi-001010000000001&target-nf-type=UDM |
2024-03-31T19:33:28.442928749+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.444372946+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.447899087+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.450621825+09:00 [INFO][UDM][UECM] Handle RegistrationAmf3gppAccess
2024-03-31T19:33:28.450897291+09:00 [INFO][UDM][UECM] UEID: imsi-001010000000001
2024-03-31T19:33:28.451600755+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.453473450+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.458367909+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.460979344+09:00 [INFO][UDR][DataRepo] Handle CreateAmfContext3gpp
2024-03-31T19:33:28.462351560+09:00 [INFO][UDR][GIN] | 204 | 127.0.0.1 | PUT | /nudr-dr/v1/subscription-data/imsi-001010000000001/context-data/amf-3gpp-access |
2024-03-31T19:33:28.462659377+09:00 [INFO][UDM][GIN] | 201 | 127.0.0.1 | PUT | /nudm-uecm/v1/imsi-001010000000001/registrations/amf-3gpp-access |
2024-03-31T19:33:28.463655624+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.465137749+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.468697968+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.470186985+09:00 [INFO][UDM][SDM] Handle GetAmData
2024-03-31T19:33:28.471146031+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.472423198+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.475604464+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.476978329+09:00 [INFO][UDR][DataRepo] Handle QueryAmData
2024-03-31T19:33:28.477787245+09:00 [INFO][UDR][GIN] | 200 | 127.0.0.1 | GET | /nudr-dr/v1/subscription-data/imsi-001010000000001/00101/provisioned-data/am-data?supported-features=%7B%22mcc%22%3A%22001%22%2C%22mnc%22%3A%2201%22%7D |
2024-03-31T19:33:28.478241056+09:00 [INFO][UDM][GIN] | 200 | 127.0.0.1 | GET | /nudm-sdm/v1/imsi-001010000000001/am-data?plmn-id=%7B%22mcc%22%3A%22001%22%2C%22mnc%22%3A%2201%22%7D |
2024-03-31T19:33:28.479111702+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.480765366+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.484161881+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.485543447+09:00 [INFO][UDM][SDM] Handle GetSmfSelectData
2024-03-31T19:33:28.486437335+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.487589369+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.490676356+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.492080270+09:00 [INFO][UDR][DataRepo] Handle QuerySmfSelectData
2024-03-31T19:33:28.492839328+09:00 [INFO][UDR][GIN] | 200 | 127.0.0.1 | GET | /nudr-dr/v1/subscription-data/imsi-001010000000001/00101/provisioned-data/smf-selection-subscription-data |
2024-03-31T19:33:28.493333784+09:00 [INFO][UDM][GIN] | 200 | 127.0.0.1 | GET | /nudm-sdm/v1/imsi-001010000000001/smf-select-data?plmn-id=%7B%22mcc%22%3A%22001%22%2C%22mnc%22%3A%2201%22%7D |
2024-03-31T19:33:28.494115893+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.495415010+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.498889434+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.500374373+09:00 [INFO][UDM][SDM] Handle GetUeContextInSmfData
2024-03-31T19:33:28.501251281+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.502439539+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.505545390+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.506835125+09:00 [INFO][UDR][DataRepo] Handle QuerySmfRegList
2024-03-31T19:33:28.507475338+09:00 [INFO][UDR][GIN] | 200 | 127.0.0.1 | GET | /nudr-dr/v1/subscription-data/imsi-001010000000001/context-data/smf-registrations |
2024-03-31T19:33:28.507944314+09:00 [INFO][UDM][GIN] | 200 | 127.0.0.1 | GET | /nudm-sdm/v1/imsi-001010000000001/ue-context-in-smf-data |
2024-03-31T19:33:28.508654895+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.510449784+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.513642662+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.515002938+09:00 [INFO][UDM][SDM] Handle Subscribe
2024-03-31T19:33:28.515953830+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.517093645+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.520071106+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.521662145+09:00 [INFO][UDR][DataRepo] Handle CreateSdmSubscriptions
2024-03-31T19:33:28.521986986+09:00 [INFO][UDR][GIN] | 201 | 127.0.0.1 | POST | /nudr-dr/v1/subscription-data/imsi-001010000000001/context-data/sdm-subscriptions |
2024-03-31T19:33:28.522406209+09:00 [INFO][UDM][GIN] | 201 | 127.0.0.1 | POST | /nudm-sdm/v1/imsi-001010000000001/sdm-subscriptions |
2024-03-31T19:33:28.523136507+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.524769664+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.527470720+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.528593577+09:00 [INFO][NRF][DISC] Handle NFDiscoveryRequest
2024-03-31T19:33:28.529835859+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | GET | /nnrf-disc/v1/nf-instances?preferred-locality=area1&requester-nf-type=AMF&supi=imsi-001010000000001&target-nf-type=PCF |
2024-03-31T19:33:28.530540045+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.531884052+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.537223999+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.539428440+09:00 [INFO][PCF][AmPol] Handle AM Policy Create Request
2024-03-31T19:33:28.540598609+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.542034819+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.544573422+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.545724807+09:00 [INFO][NRF][DISC] Handle NFDiscoveryRequest
2024-03-31T19:33:28.546584729+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | GET | /nnrf-disc/v1/nf-instances?requester-nf-type=PCF&target-nf-type=UDR |
2024-03-31T19:33:28.547064556+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.548322891+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.551457516+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.552792436+09:00 [INFO][UDR][DataRepo] Handle PolicyDataUesUeIdAmDataGet
2024-03-31T19:33:28.553515370+09:00 [INFO][UDR][GIN] | 200 | 127.0.0.1 | GET | /nudr-dr/v1/policy-data/ues/imsi-001010000000001/am-data |
2024-03-31T19:33:28.554704352+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.556125352+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.558703722+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.562655661+09:00 [INFO][NRF][DISC] Handle NFDiscoveryRequest
2024-03-31T19:33:28.563933959+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | GET | /nnrf-disc/v1/nf-instances?guami=%7B%22plmnId%22%3A%7B%22mcc%22%3A%22001%22%2C%22mnc%22%3A%2201%22%7D%2C%22amfId%22%3A%22cafe00%22%7D&requester-nf-type=PCF&target-nf-type=AMF |
2024-03-31T19:33:28.564533351+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.565887792+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.569407057+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.570857709+09:00 [INFO][AMF][Comm] Handle AMF Status Change Subscribe Request
2024-03-31T19:33:28.571208429+09:00 [INFO][AMF][Comm] new AMF Status Subscription[1]
2024-03-31T19:33:28.571416642+09:00 [INFO][AMF][GIN] | 201 | 127.0.0.1 | POST | /namf-comm/v1/subscriptions |
2024-03-31T19:33:28.571841925+09:00 [INFO][PCF][GIN] | 201 | 127.0.0.1 | POST | /npcf-am-policy-control/v1/policies |
2024-03-31T19:33:28.572387253+09:00 [INFO][AMF][Gmm][amf_ue_ngap_id:RU:1,AU:1(3GPP)][supi:SUPI:imsi-001010000000001] Send Registration Accept
2024-03-31T19:33:28.572432637+09:00 [INFO][AMF][Ngap][amf_ue_ngap_id:RU:1,AU:1(3GPP)][ran_addr:192.168.0.131:51132] Send Initial Context Setup Request
2024-03-31T19:33:28.573435182+09:00 [INFO][AMF][Gmm][amf_ue_ngap_id:RU:1,AU:1(3GPP)][supi:SUPI:imsi-001010000000001] Start T3550 timer
2024-03-31T19:33:28.574177623+09:00 [INFO][AMF][Ngap][ran_addr:192.168.0.131:51132] Handle InitialContextSetupResponse
2024-03-31T19:33:28.574344397+09:00 [INFO][AMF][Ngap][amf_ue_ngap_id:RU:1,AU:1(3GPP)][ran_addr:192.168.0.131:51132] Handle InitialContextSetupResponse (RAN UE NGAP ID: 1)
2024-03-31T19:33:28.775747229+09:00 [INFO][AMF][Ngap][ran_addr:192.168.0.131:51132] Handle UplinkNASTransport
2024-03-31T19:33:28.775970791+09:00 [INFO][AMF][Ngap][amf_ue_ngap_id:RU:1,AU:1(3GPP)][ran_addr:192.168.0.131:51132] Handle UplinkNASTransport (RAN UE NGAP ID: 1)
2024-03-31T19:33:28.776167773+09:00 [INFO][AMF][Gmm] Handle event[Gmm Message], transition from [ContextSetup] to [ContextSetup]
2024-03-31T19:33:28.776319476+09:00 [INFO][AMF][Gmm][amf_ue_ngap_id:RU:1,AU:1(3GPP)][supi:SUPI:imsi-001010000000001] Handle Registration Complete
2024-03-31T19:33:28.776538620+09:00 [INFO][AMF][Gmm][amf_ue_ngap_id:RU:1,AU:1(3GPP)][supi:SUPI:imsi-001010000000001] Stop T3550 timer
2024-03-31T19:33:28.776704248+09:00 [INFO][AMF][Gmm][amf_ue_ngap_id:RU:1,AU:1(3GPP)][supi:SUPI:imsi-001010000000001] Send Configuration Update Command
2024-03-31T19:33:28.777068130+09:00 [INFO][AMF][Ngap][amf_ue_ngap_id:RU:1,AU:1(3GPP)][ran_addr:192.168.0.131:51132] Send Downlink Nas Transport
2024-03-31T19:33:28.777766729+09:00 [INFO][AMF][Gmm] Handle event[ContextSetup Success], transition from [ContextSetup] to [Registered]
2024-03-31T19:33:28.779118930+09:00 [INFO][AMF][Ngap][ran_addr:192.168.0.131:51132] Handle UplinkNASTransport
2024-03-31T19:33:28.779289097+09:00 [INFO][AMF][Ngap][amf_ue_ngap_id:RU:1,AU:1(3GPP)][ran_addr:192.168.0.131:51132] Handle UplinkNASTransport (RAN UE NGAP ID: 1)
2024-03-31T19:33:28.779554636+09:00 [INFO][AMF][Gmm] Handle event[Gmm Message], transition from [Registered] to [Registered]
2024-03-31T19:33:28.779768078+09:00 [INFO][AMF][Gmm][amf_ue_ngap_id:RU:1,AU:1(3GPP)][supi:SUPI:imsi-001010000000001] Handle UL NAS Transport
2024-03-31T19:33:28.779942595+09:00 [INFO][AMF][Gmm][amf_ue_ngap_id:RU:1,AU:1(3GPP)][supi:SUPI:imsi-001010000000001] Transport 5GSM Message to SMF
2024-03-31T19:33:28.780096278+09:00 [INFO][AMF][Gmm][amf_ue_ngap_id:RU:1,AU:1(3GPP)][supi:SUPI:imsi-001010000000001] Select SMF [snssai: {Sst:1 Sd:010203}, dnn: internet2]
2024-03-31T19:33:28.781852411+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.783298306+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.786770625+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.787809714+09:00 [INFO][NRF][DISC] Handle NFDiscoveryRequest
2024-03-31T19:33:28.788760823+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | GET | /nnrf-disc/v1/nf-instances?requester-nf-type=AMF&target-nf-type=NSSF |
2024-03-31T19:33:28.789364097+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.790641170+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.793725734+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.795135811+09:00 [INFO][NSSF][NsSel] Handle NSSelectionGet
2024-03-31T19:33:28.795735557+09:00 [INFO][NSSF][GIN] | 200 | 127.0.0.1 | GET | /nnssf-nsselection/v1/network-slice-information?nf-id=6255998b-76e8-478e-8892-fc369c678ae5&nf-type=AMF&slice-info-request-for-pdu-session=%7B%22sNssai%22%3A%7B%22sst%22%3A1%2C%22sd%22%3A%22010203%22%7D%2C%22roamingIndication%22%3A%22NON_ROAMING%22%7D |
2024-03-31T19:33:28.796557114+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.797928486+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.800621449+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.801501815+09:00 [INFO][NRF][DISC] Handle NFDiscoveryRequest
2024-03-31T19:33:28.802960949+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | GET | /nnrf-disc/v1/nf-instances?dnn=internet2&preferred-locality=area1&requester-nf-type=AMF&service-names=nsmf-pdusession&snssais=%7B%22sst%22%3A1%2C%22sd%22%3A%22010203%22%7D&target-nf-type=SMF&target-plmn-list=%7B%22mcc%22%3A%22001%22%2C%22mnc%22%3A%2201%22%7D |
2024-03-31T19:33:28.803433246+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.804845356+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.807958824+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.809697045+09:00 [INFO][SMF][PduSess] Receive Create SM Context Request
2024-03-31T19:33:28.810329281+09:00 [INFO][SMF][PduSess] In HandlePDUSessionSMContextCreate
2024-03-31T19:33:28.810703619+09:00 [INFO][SMF][CTX] UrrPeriod: 10s
2024-03-31T19:33:28.810808275+09:00 [INFO][SMF][CTX] UrrThreshold: 1000
2024-03-31T19:33:28.811715680+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.812900695+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.815427825+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.816494750+09:00 [INFO][NRF][DISC] Handle NFDiscoveryRequest
2024-03-31T19:33:28.817499114+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | GET | /nnrf-disc/v1/nf-instances?requester-nf-type=SMF&target-nf-type=UDM |
2024-03-31T19:33:28.817968098+09:00 [INFO][SMF][PduSess][pdu_session_id:1][supi:imsi-001010000000001] Send NF Discovery Serving UDM Successfully
2024-03-31T19:33:28.818376775+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.819858859+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.824373319+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.826963142+09:00 [INFO][UDM][SDM] Handle GetSmData
2024-03-31T19:33:28.827598852+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.828784970+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.831872102+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.832240375+09:00 [INFO][UDM][SDM] getSmDataProcedure: SUPI[imsi-001010000000001] PLMNID[00101] DNN[internet2] SNssai[{"sst":1,"sd":"010203"}]
2024-03-31T19:33:28.833500963+09:00 [INFO][UDR][DataRepo] Handle QuerySmData
2024-03-31T19:33:28.834530469+09:00 [INFO][UDR][GIN] | 200 | 127.0.0.1 | GET | /nudr-dr/v1/subscription-data/imsi-001010000000001/00101/provisioned-data/sm-data?single-nssai=%7B%22sst%22%3A1%2C%22sd%22%3A%22010203%22%7D |
2024-03-31T19:33:28.834977425+09:00 [INFO][UDM][GIN] | 200 | 127.0.0.1 | GET | /nudm-sdm/v1/imsi-001010000000001/sm-data?dnn=internet2&plmn-id=%7B%22mcc%22%3A%22001%22%2C%22mnc%22%3A%2201%22%7D&single-nssai=%7B%22sst%22%3A1%2C%22sd%22%3A%22010203%22%7D |
2024-03-31T19:33:28.835742723+09:00 [INFO][SMF][GSM] In HandlePDUSessionEstablishmentRequest
2024-03-31T19:33:28+09:00 [INFO][NAS][Convert] ProtocolOrContainerList: [0xc000308f20 0xc000308f40]
2024-03-31T19:33:28.836053184+09:00 [INFO][SMF][GSM] Protocol Configuration Options
2024-03-31T19:33:28.836394843+09:00 [INFO][SMF][GSM] &{[0xc000308f20 0xc000308f40]}
2024-03-31T19:33:28.836532547+09:00 [INFO][SMF][GSM] Didn't Implement container type IPAddressAllocationViaNASSignallingUL
2024-03-31T19:33:28.837736373+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.838849056+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.841463162+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.842376694+09:00 [INFO][NRF][DISC] Handle NFDiscoveryRequest
2024-03-31T19:33:28.843601033+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | GET | /nnrf-disc/v1/nf-instances?requester-nf-type=SMF&target-nf-instance-id=6255998b-76e8-478e-8892-fc369c678ae5&target-nf-type=AMF |
2024-03-31T19:33:28.843979913+09:00 [INFO][SMF][Consumer] SendNFDiscoveryServingAMF ok
2024-03-31T19:33:28.844275005+09:00 [INFO][SMF][CTX] Allocated UE IP address: 10.61.0.1
2024-03-31T19:33:28.844385182+09:00 [INFO][SMF][CTX] Selected UPF: UPF1
2024-03-31T19:33:28.844575296+09:00 [INFO][SMF][PduSess][pdu_session_id:1][supi:imsi-001010000000001] Allocated PDUAdress[10.61.0.1]
2024-03-31T19:33:28.845042213+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.846011604+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.848569839+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.849936088+09:00 [INFO][NRF][DISC] Handle NFDiscoveryRequest
2024-03-31T19:33:28.851296434+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | GET | /nnrf-disc/v1/nf-instances?preferred-locality=area1&requester-nf-type=SMF&target-nf-type=PCF |
2024-03-31T19:33:28.851819827+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.852874966+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.856264500+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.858696588+09:00 [INFO][PCF][SMpolicy] Handle CreateSmPolicy
2024-03-31T19:33:28.859413700+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.860831184+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.865049556+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.866587580+09:00 [INFO][UDR][DataRepo] Handle PolicyDataUesUeIdSmDataGet
2024-03-31T19:33:28.868338783+09:00 [INFO][UDR][GIN] | 200 | 127.0.0.1 | GET | /nudr-dr/v1/policy-data/ues/imsi-001010000000001/sm-data?dnn=internet2&snssai=%7B%22sst%22%3A1%2C%22sd%22%3A%22010203%22%7D |
2024-03-31T19:33:28.874479422+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.875780715+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.879076285+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.880428281+09:00 [INFO][UDR][DataRepo] Handle ApplicationDataInfluenceDataGet
2024-03-31T19:33:28.881119821+09:00 [INFO][UDR][GIN] | 200 | 127.0.0.1 | GET | /nudr-dr/v1/application-data/influenceData?dnns=internet2&internal-Group-Ids=&snssais=%7B%22sst%22%3A1%2C%22sd%22%3A%22010203%22%7D&supis=imsi-001010000000001 |
2024-03-31T19:33:28.881423576+09:00 [INFO][PCF][SMpolicy] Matched [0] trafficInfluDatas from UDR
2024-03-31T19:33:28.882387404+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.883748922+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.886918928+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.888286685+09:00 [INFO][UDR][DataRepo] Handle ApplicationDataInfluenceDataSubsToNotifyPost
2024-03-31T19:33:28.888485389+09:00 [INFO][UDR][GIN] | 201 | 127.0.0.1 | POST | /nudr-dr/v1/application-data/influenceData/subs-to-notify |
2024-03-31T19:33:28.889567961+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.890998530+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.893576054+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.894656273+09:00 [INFO][NRF][DISC] Handle NFDiscoveryRequest
2024-03-31T19:33:28.895218103+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | GET | /nnrf-disc/v1/nf-instances?requester-nf-type=PCF&target-nf-type=BSF |
2024-03-31T19:33:28.895991828+09:00 [INFO][PCF][GIN] | 201 | 127.0.0.1 | POST | /npcf-smpolicycontrol/v1/sm-policies |
2024-03-31T19:33:28.896930579+09:00 [INFO][SMF][PduSess] CHF Selection for SMContext SUPI[imsi-001010000000001] PDUSessionID[1]
2024-03-31T19:33:28.897565384+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.898850393+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.901432476+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.902458163+09:00 [INFO][NRF][DISC] Handle NFDiscoveryRequest
2024-03-31T19:33:28.903320357+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | GET | /nnrf-disc/v1/nf-instances?requester-nf-type=SMF&target-nf-type=CHF |
2024-03-31T19:33:28.903656990+09:00 [INFO][SMF][Charging] Handle SendConvergedChargingRequest
2024-03-31T19:33:28.904047855+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.905065186+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.908041940+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.911879490+09:00 [INFO][CHF][ChargingPost] HandleChargingdataInitial
2024-03-31T19:33:28.912123700+09:00 [INFO][CHF][ChargingPost] SMF charging event
2024-03-31T19:33:28.912392305+09:00 [ERRO][CHF][ChargingPost] Charging gateway fail to send CDR to billing domain dial tcp 127.0.0.1:2122: connect: connection refused
2024-03-31T19:33:28.912546918+09:00 [INFO][CHF][ChargingPost] Open CDR for UE imsi-001010000000001
2024-03-31T19:33:28.912764192+09:00 [INFO][CHF][ChargingPost] NewChfUe imsi-001010000000001
2024-03-31T19:33:28.913224683+09:00 [INFO][CHF][GIN] | 201 | 127.0.0.1 | POST | /nchf-convergedcharging/v3/chargingdata |
2024-03-31T19:33:28.913757318+09:00 [INFO][SMF][Charging] Send Charging Data Request[Init] successfully
2024-03-31T19:33:28.914210997+09:00 [INFO][SMF][PduSess][pdu_session_id:1][supi:imsi-001010000000001] Install PCCRule[PccRuleId-1]
2024-03-31T19:33:28.914374465+09:00 [INFO][SMF][PduSess][pdu_session_id:1][supi:imsi-001010000000001] No srcTcData and tgtTcData. Nothing to do
2024-03-31T19:33:28.914548709+09:00 [INFO][SMF][PduSess][pdu_session_id:1][supi:imsi-001010000000001] Has no pre-config route. Has default path
2024-03-31T19:33:28.914817149+09:00 [INFO][SMF][GIN] | 201 | 127.0.0.1 | POST | /nsmf-pdusession/v1/sm-contexts |
2024-03-31T19:33:28.915277039+09:00 [INFO][SMF][PduSess] Sending PFCP Session Establishment Request
2024-03-31T19:33:28.915895100+09:00 [INFO][AMF][Gmm][amf_ue_ngap_id:RU:1,AU:1(3GPP)][supi:SUPI:imsi-001010000000001] create smContext[pduSessionID: 1] Success
2024-03-31T19:33:28.918486729+09:00 [INFO][SMF][PduSess] Received PFCP Session Establishment Accepted Response
2024-03-31T19:33:28.919820910+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.921136929+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.925188707+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.928397745+09:00 [INFO][AMF][Producer] Handle N1N2 Message Transfer Request
2024-03-31T19:33:28.929103702+09:00 [INFO][AMF][Ngap][amf_ue_ngap_id:RU:1,AU:1(3GPP)][ran_addr:192.168.0.131:51132] Send PDU Session Resource Setup Request
2024-03-31T19:33:28.930260926+09:00 [INFO][AMF][GIN] | 200 | 127.0.0.1 | POST | /namf-comm/v1/ue-contexts/imsi-001010000000001/n1-n2-messages |
2024-03-31T19:33:28.932534620+09:00 [INFO][AMF][Ngap][ran_addr:192.168.0.131:51132] Handle PDUSessionResourceSetupResponse
2024-03-31T19:33:28.932725472+09:00 [INFO][AMF][Ngap][amf_ue_ngap_id:RU:1,AU:1(3GPP)][ran_addr:192.168.0.131:51132] Handle PDUSessionResourceSetupResponse (RAN UE NGAP ID: 1)
2024-03-31T19:33:28.933386846+09:00 [INFO][NRF][Token] In HTTPAccessTokenRequest
2024-03-31T19:33:28.935032957+09:00 [WARN][NRF][Token] Certificate verify: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "free5gc")
2024-03-31T19:33:28.938619826+09:00 [INFO][NRF][GIN] | 200 | 127.0.0.1 | POST | /oauth2/token |
2024-03-31T19:33:28.940342604+09:00 [INFO][SMF][PduSess] Receive Update SM Context Request
2024-03-31T19:33:28.943219130+09:00 [INFO][SMF][PduSess] Received PFCP Session Modification Accepted Response from AN UPF
2024-03-31T19:33:28.943470937+09:00 [INFO][SMF][GIN] | 200 | 127.0.0.1 | POST | /nsmf-pdusession/v1/sm-contexts/urn:uuid:528afc3d-4d39-46d9-90a5-674d44a4df34/modify |
The free5GC U-Plane1 log when executed is as follows.
2024-03-31T19:33:28.852486271+09:00 [INFO][UPF][PFCP][LAddr:192.168.0.142:8805] handleSessionEstablishmentRequest
2024-03-31T19:33:28.852520091+09:00 [INFO][UPF][PFCP][LAddr:192.168.0.142:8805][CPNodeID:192.168.0.141][CPSEID:0x1][UPSEID:0x1] New session
2024-03-31T19:33:28.853271204+09:00 [INFO][UPF][Perio] recv event[TYPE_PERIO_ADD][{eType:1 lSeid:1 urrid:1 period:10000000000}]
2024-03-31T19:33:28.853691386+09:00 [INFO][UPF][Perio] recv event[TYPE_PERIO_ADD][{eType:1 lSeid:1 urrid:2 period:10000000000}]
2024-03-31T19:33:28.878135279+09:00 [INFO][UPF][PFCP][LAddr:192.168.0.142:8805] handleSessionModificationRequest
Looking at the console log of the nr-ue
command, UE1 has been assigned the IP address 10.61.0.1
from free5GC 5GC.
[2024-03-31 19:33:29.038] [app] [info] Connection setup for PDU session[1] is successful, TUN interface[uesimtun0, 10.61.0.1] is up.
Just in case, make sure it matches the IP address of the UE1's TUNnel interface. In this case, since UE1 was connected first, uesimtun0
was created as the TUNnel interface of UE1 instead of uesimtun1
.
# ip addr show
...
14: uesimtun0: <POINTOPOINT,PROMISC,NOTRAILERS,UP,LOWER_UP> mtu 1400 qdisc fq_codel state UNKNOWN group default qlen 500
link/none
inet 10.61.0.1/32 scope global uesimtun0
valid_lft forever preferred_lft forever
inet6 fe80::3436:9c3e:c4d3:58d2/64 scope link stable-privacy
valid_lft forever preferred_lft forever
...
Specify the UE1's TUNnel interface and try ping.
Please refer to the following for usage of TUNnel interface.
https://github.com/aligungr/UERANSIM/wiki/Usage
Execute tcpdump
on VM2 (U-Plane1) and check that the packet goes through if=upfgtp
.
ping google.com
on VM5 (UE1)
# ping google.com -I uesimtun0 -n
PING google.com (172.217.175.78) from 10.61.0.1 uesimtun0: 56(84) bytes of data.
64 bytes from 172.217.175.78: icmp_seq=1 ttl=61 time=18.5 ms
64 bytes from 172.217.175.78: icmp_seq=2 ttl=61 time=21.4 ms
64 bytes from 172.217.175.78: icmp_seq=3 ttl=61 time=17.4 ms
tcpdump
on VM2 (U-Plane1)
# tcpdump -i upfgtp -n
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on upfgtp, link-type RAW (Raw IP), capture size 262144 bytes
19:37:39.473782 IP 10.61.0.1 > 172.217.175.78: ICMP echo request, id 13, seq 1, length 64
19:37:39.491627 IP 172.217.175.78 > 10.61.0.1: ICMP echo reply, id 13, seq 1, length 64
19:37:40.474769 IP 10.61.0.1 > 172.217.175.78: ICMP echo request, id 13, seq 2, length 64
19:37:40.495414 IP 172.217.175.78 > 10.61.0.1: ICMP echo reply, id 13, seq 2, length 64
19:37:41.475712 IP 10.61.0.1 > 172.217.175.78: ICMP echo request, id 13, seq 3, length 64
19:37:41.492419 IP 172.217.175.78 > 10.61.0.1: ICMP echo reply, id 13, seq 3, length 64
You could specify the IP address assigned to the TUNnel interface to run almost any applications as in the following example using nr-binder
tool.
curl google.com
on VM5 (UE1)
# sh nr-binder 10.61.0.1 curl google.com
<HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8">
<TITLE>301 Moved</TITLE></HEAD><BODY>
<H1>301 Moved</H1>
The document has moved
<A HREF="http://www.google.com/">here</A>.
</BODY></HTML>
tcpdump
on VM2 (U-Plane1)
19:38:21.745776 IP 10.61.0.1.52363 > 172.217.175.78.80: Flags [S], seq 369238245, win 65280, options [mss 1360,sackOK,TS val 2987784873 ecr 0,nop,wscale 7], length 0
19:38:21.765751 IP 172.217.175.78.80 > 10.61.0.1.52363: Flags [S.], seq 9856001, ack 369238246, win 65535, options [mss 1460], length 0
19:38:21.767554 IP 10.61.0.1.52363 > 172.217.175.78.80: Flags [.], ack 1, win 65280, length 0
19:38:21.768166 IP 10.61.0.1.52363 > 172.217.175.78.80: Flags [P.], seq 1:75, ack 1, win 65280, length 74: HTTP: GET / HTTP/1.1
19:38:21.768463 IP 172.217.175.78.80 > 10.61.0.1.52363: Flags [.], ack 75, win 65535, length 0
19:38:21.829158 IP 172.217.175.78.80 > 10.61.0.1.52363: Flags [P.], seq 1:774, ack 75, win 65535, length 773: HTTP: HTTP/1.1 301 Moved Permanently
19:38:21.831260 IP 10.61.0.1.52363 > 172.217.175.78.80: Flags [.], ack 774, win 64507, length 0
19:38:21.834983 IP 10.61.0.1.52363 > 172.217.175.78.80: Flags [F.], seq 75, ack 774, win 64507, length 0
19:38:21.835254 IP 172.217.175.78.80 > 10.61.0.1.52363: Flags [.], ack 76, win 65535, length 0
19:38:21.853300 IP 172.217.175.78.80 > 10.61.0.1.52363: Flags [F.], seq 774, ack 76, win 65535, length 0
19:38:21.855237 IP 10.61.0.1.52363 > 172.217.175.78.80: Flags [.], ack 775, win 64507, length 0
Please note that the ping
tool does not work with nr-binder
. Please refer to here for the reason.
For UE0
and UE2
-UE4
as well, execute tcpdump
on each U-Plane and check the packets flowing through upfgtp
.
You could now create the end-to-end TUN interfaces on the DN and send any packets on the network.
In investigating 5G SA, I have built a simulation environment and can now use a very useful system for investigating 5GC and MEC of 5G SA mobile network. I would like to thank the excellent developers and all the contributors of free5GC and UERANSIM.