Skip to content

Make application server network configuration more restrictive #528

@ilya-smirnov-berlin

Description

@ilya-smirnov-berlin

Problem description

The current API allows configuring the application server network with prefixes of any size.
As a result, an API consumer can set 0.0.0.0/0 or ::/0 without specifying ports. In this case, the selected QoD profile applies to all uplink and downlink traffic, regardless of the actual application.

This creates problematic behavior when the API consumer does not make a reasonable effort to identify a specific application server (for example, by resolving a domain name or configuring a sufficiently narrow network prefix).

Issues

  1. End-user confusion

 When multiple applications share the same QoD-affected traffic, users may not understand why unrelated applications are influenced by a QoD profile intended for a single service.

  1. Conflicts between API consumers

 If different API consumers (e.g. different companies) create QoD sessions for the same device, and one of them uses the entire address space or a very large network segment, other consumers may receive QoD conflict errors.
The current QoD implementation detects overlapping network filters between sessions and rejects configurations that are ambiguous.

Possible evolution

The documentation should explicitly restrict the allowed size of the application server network.

Proposed maximum network sizes:

  • IPv4: /16 (65 536 addresses)
  • IPv6: /32 (2^96 addresses)

This would encourage consumers to properly identify application servers while reducing unintended traffic sharing and session conflicts.

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or request

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions