Problem description
The current API allows configuring the application server network with prefixes of any size.
As a result, an API consumer can set 0.0.0.0/0 or ::/0 without specifying ports. In this case, the selected QoD profile applies to all uplink and downlink traffic, regardless of the actual application.
This creates problematic behavior when the API consumer does not make a reasonable effort to identify a specific application server (for example, by resolving a domain name or configuring a sufficiently narrow network prefix).
Issues
- End-user confusion
When multiple applications share the same QoD-affected traffic, users may not understand why unrelated applications are influenced by a QoD profile intended for a single service.
- Conflicts between API consumers
If different API consumers (e.g. different companies) create QoD sessions for the same device, and one of them uses the entire address space or a very large network segment, other consumers may receive QoD conflict errors.
The current QoD implementation detects overlapping network filters between sessions and rejects configurations that are ambiguous.
Possible evolution
The documentation should explicitly restrict the allowed size of the application server network.
Proposed maximum network sizes:
- IPv4: /16 (65 536 addresses)
- IPv6: /32 (2^96 addresses)
This would encourage consumers to properly identify application servers while reducing unintended traffic sharing and session conflicts.
Problem description
The current API allows configuring the application server network with prefixes of any size.
As a result, an API consumer can set 0.0.0.0/0 or ::/0 without specifying ports. In this case, the selected QoD profile applies to all uplink and downlink traffic, regardless of the actual application.
This creates problematic behavior when the API consumer does not make a reasonable effort to identify a specific application server (for example, by resolving a domain name or configuring a sufficiently narrow network prefix).
Issues
When multiple applications share the same QoD-affected traffic, users may not understand why unrelated applications are influenced by a QoD profile intended for a single service.
If different API consumers (e.g. different companies) create QoD sessions for the same device, and one of them uses the entire address space or a very large network segment, other consumers may receive QoD conflict errors.
The current QoD implementation detects overlapping network filters between sessions and rejects configurations that are ambiguous.
Possible evolution
The documentation should explicitly restrict the allowed size of the application server network.
Proposed maximum network sizes:
This would encourage consumers to properly identify application servers while reducing unintended traffic sharing and session conflicts.