V200R002C01
03
Date
2013-11-22
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website:
http://www.huawei.com
Email:
support@huawei.com
Issue 03 (2013-11-22)
If the plaintext mode is used, a password is stored in plaintext in the configuration file. This
results in high security risks. The plaintext mode applies only to scenarios with special
requirements, such as compatibility and interworking requirements.
Related Version
The following table lists the product version related to this document.
Product Name
Version
ATN 905
V200R002C01
Intended Audience
This document is intended for:
l
Commissioning Engineer
Issue 03 (2013-11-22)
ii
Symbol Conventions
Symbol
Description
DANGER
WARNING
CAUTION
TIP
NOTE
Command Conventions
Issue 03 (2013-11-22)
Convention
Description
Boldface
Italic
[]
{ x | y | ... }
[ x | y | ... ]
{ x | y | ... }*
[ x | y | ... ]*
iii
GUI Conventions
Convention
Description
Boldface
>
Change History
Updates between document issues are cumulative. Therefore, the latest document issue contains
all updates made in previous issues.
Issue 03 (2013-11-22)
iv
Contents
Contents
About This Document.....................................................................................................................ii
1 Application Scenario Overview..................................................................................................1
1.1 Small-cell Base Station Bearer Scenario........................................................................................................................2
1.2 EDD Scenario.................................................................................................................................................................2
2 Configuration Overview..............................................................................................................5
2.1 Networking Models........................................................................................................................................................6
2.2 Configuration Overview.................................................................................................................................................7
2.2.1 Select Overall Solution..............................................................................................................................................13
2.2.2 Select Management Plane Configuration Solution....................................................................................................14
2.2.3 Select Service Solution..............................................................................................................................................16
2.3 Recommended Solutions..............................................................................................................................................19
Contents
vi
Contents
Issue 03 (2013-11-22)
vii
Issue 03 (2013-11-22)
Micro/Pico
IPRAN
Macro Cell
BSC
ATN 905
ATN 905
RNC
Micro/Pico
Micro/Pico
CSG
ASG
RSG
MME
/SGW
NOTE
The mobile bearer device at the macro base station may be a third-party device. In this topic, Huawei's
IPRAN solution (ATN + CX networking) on the macro base station side is used as an example to illustrate
the deployment configuration.
on the user side and connecting it to the CPE, the provider separates the customer network from
the provider network. As an EDD, Huawei's ATN 905 provides strong link OAM functions,
performs end-to-end fault monitoring and diagnosis, and automatically verifies the service level
agreement (SLA).
1.
BSC
ASG
EDD
RSG
CSG
RNC
ATN 905
2.
CPE
Provider Network
EDD
PE
User Network
PE
ATN 905
Issue 03 (2013-11-22)
EDD
CPE
ATN 905
As shown in Figure 3, an enterprise rents a 100M private line from a provider. However,
the enterprise user considers the bandwidth as lower than 100 M. In the case of a fault on
the enterprise user network, the enterprise user tends to call the provider and complain.
How can the provider divide the maintenance responsibilities? The provider can deploy an
EDD near the CPE and test the throughput using RFC 2544 before the deployment so as
to prove that the bandwidth meets the requirements. After services are provisioned, the
EDD monitors service packets in real time using IP FPM, obtains information such as the
throughput, packet loss rate, latency, and jitter, and periodically provides an SLA to the
enterprise user so as to prove the provider's network quality.
Figure 1-4 Enterprise private line network without the EDD
User Network
Provider Network
CPE
3.
PE
User Network
CPE
PE
Wholesale Network
Provider Network
EDD
PE
PE
ATN 905
B
A
NOTE
For easy description, the upstream network of the EDD is called aggregation network.
Issue 03 (2013-11-22)
2 Configuration Overview
Configuration Overview
Issue 03 (2013-11-22)
2 Configuration Overview
In both solutions, the ATN 905 is connected to the nearby network of the operator. If the
operator's network is regarded as an abstract "cloud", only the deployment and configuration of
the part (marked by the dotted rectangle on the left) on the access network need to be considered.
For the marked part of the access network, the configuration roadmaps and procedures in both
solutions are basically the same. Therefore, this topic only provides detailed configuration
description from the angle of the access technology. That is, scenarios are not differentiated
while only solutions are differentiated. The following typical networking models are provided
for the configuration example.
l
Native IP scenario: Layer 3 IP packets are forwarded between the ATN 905 and CSG.
Micro/Pico
Macro Cell
RNC/SGW
ATN 905
ATN 905
IPRAN
CSG
Micro/Pico
Native IP
Traffic flow
Issue 03 (2013-11-22)
Native Ethernet scenario: Layer 2 Ethernet packets are forwarded between the ATN 905
and CSG.
2 Configuration Overview
Micro/Pico
Macro Cell
RNC/SGW
ATN 905
ATN 905
IPRAN
CSG
Micro/Pico
Native Eth
Traffic flow
Overall solution selection: Determine the small-cell base station bearer solution or EDD
bearer solution based on the macro base station mobile bearer solution or aggregation
network bearer solution.
NOTE
Typical networking models are used in the following schematic diagrams, regardless of the small-cell base
station bearer solution or EDD bearer solution. For details, see Networking Models.
Scenario
Overall
Solution
Native IP
solution
Diagram
Macro Cell
Micro/Pico
ATN 905
ATN 905
IPRAN
RNC
CSG
Micro/Pico
Native IP
Scenario
Overall
Solution
l If a Layer 2 or Layer 2 +
Layer 3 access solution
(such as mixed VPN) is used
on the macro base station
side, you are advised to
deploy the native Ethernet
solution between the ATN
905 and CSG to
transparently transmit
packets from the small-cell
base station.
Native
Ethernet
solution
2 Configuration Overview
Diagram
Macro Cell
Micro/Pico
ATN 905
ATN 905
IPRAN
RNC
CSG
Micro/Pico
Native Eth
2.
Service solution selection: During actual service deployment, multiple feature solutions
are available. The following describes the applicable scenarios of these feature solutions.
You can choose an appropriate solution based on the actual networking requirements.
a.
Prerequisit
e
Scenario
Managemen
t Plane Mode
Advantage
Disadvantage
Native IP/
Native
Ethernet
solution
The network
scale is small.
Public network
static route
Issue 03 (2013-11-22)
Prerequisit
e
2 Configuration Overview
Scenario
Managemen
t Plane Mode
Advantage
1. The
network
scale is
large.
Public network
IGP
2. Upstream
devices
are
managed
using the
public
network
IGP.
Disadvantage
Private
network DCN
1. The configuration is
simple and management
routes do not need to be
configured by NE.
Micro/Pico
Macro Cell
ATN 905
ATN 905
IPRAN
CSG
RNC
Micro/Pico
Micro/Pico
b.
Issue 03 (2013-11-22)
management flow
Select a service plane access mode based on the overall solution selected in step 1
and the actual networking requirements.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
a.
2 Configuration Overview
Prerequisite
Scenario
Access Mode
Advantage
Disadvantage
Native IP
solution
Users or
services need
to be
separated.
VRF access
Users or
services do
not need to be
separated.
Entire public
network
access
VRF2
ATN 905
Macro Cell
ATN 905
IPRAN
CSG
VRF2
Issue 03 (2013-11-22)
VRF1
RNC
main interface
Dot1q sub-interface
VRF1 service flow
VRF2 service flow
10
2 Configuration Overview
VRF2
Macro Cell
ATN 905
IPRAN
ATN 905
RNC
CSG
VRF2
b.
Main interface
VRF1
Service flow
Prerequisite
Scenario
Access Mode
Advantage
Disadvantage
Native
Ethernet
solution
Users or
services do
not need to be
separated.
Hybrid
interface
access
Figure 2-4 Native Ethernet service access (hybrid interface access) configuration
diagram
port trunk allow-pass vlan 10 to 20
Macro Cell
VLAN10
VLAN20
IPRAN
ATN 905
ATN 905
VLAN20
c.
Issue 03 (2013-11-22)
VLAN10
CSG
RNC
Hybrid interface
Service flow
If the native IP solution is selected in step 1, select a service plane routing mode
based on the actual networking requirements. If the native Ethernet solution is selected
in step 1, skip this step.
11
2 Configuration Overview
Prerequisit
e
Scenario
Service plane
routing mode
Advantage
Disadvantage
Native IP
solution
The network
scale is small.
Static Route
1. The configuration is
simple.
IGP route
ATN 905
IPRAN
ATN 905
CSG
d.
Issue 03 (2013-11-22)
RNC
Service flow
Select the QoS deployment mode based on the actual networking requirements.
Scenario
QoS Mode
12
e.
2 Configuration Overview
Select the clock deployment mode based on the actual networking requirements.
Scenario
Clock Mode
Synchronous Ethernet
1588v2
Overall
Solution
Native IP
solution
Diagram
Macro Cell
Micro/Pico
ATN 905
ATN 905
IPRAN
RNC
CSG
Micro/Pico
Native IP
Issue 03 (2013-11-22)
13
Scenario
Overall
Solution
l If a Layer 2 or Layer 2 +
Layer 3 access solution
(such as mixed VPN) is used
on the macro base station
side, you are required to
deploy the native Ethernet
solution between the ATN
905 and CSG to
transparently transmit
packets from the small-cell
base station.
Native
Ethernet
solution
2 Configuration Overview
Diagram
Macro Cell
Micro/Pico
ATN 905
ATN 905
IPRAN
RNC
CSG
Micro/Pico
Native Eth
Scenario
Managemen
t Plane Mode
Advantage
Disadvantage
Native IP/
Native
Ethernet
solution
The network
scale is small.
Public network
static route
Issue 03 (2013-11-22)
14
Prerequisit
e
2 Configuration Overview
Scenario
Managemen
t Plane Mode
Advantage
1. The
network
scale is
large.
Public network
IGP
2. Upstream
devices
are
managed
using the
public
network
IGP.
The ATN 905
is networked
with Huawei
products.
Disadvantage
the VRF of
Private
network DCN
1. The configuration is
simple and management
routes do not need to be
configured by NE.
Micro/Pico
Macro Cell
ATN 905
ATN 905
IPRAN
CSG
RNC
Micro/Pico
Micro/Pico
Issue 03 (2013-11-22)
management flow
15
2 Configuration Overview
2.
3.
4.
Select a service plane access mode based on the overall solution selected in step 1 and the
actual networking requirements.
a.
Prerequisite
Scenario
Access Mode
Advantage
Disadvantage
Native IP
solution
Users or
services need
to be
separated.
VRF access
Users or
services do
not need to be
separated.
Issue 03 (2013-11-22)
Entire public
network
access
16
2 Configuration Overview
VRF1
ATN 905
Macro Cell
ATN 905
IPRAN
RNC
CSG
VRF2
main interface
Dot1q sub-interface
VRF1 service flow
VRF2 service flow
VRF1
Figure 2-8 Native IP service access (public network access) configuration diagram
VRF1
VRF2
Macro Cell
ATN 905
IPRAN
ATN 905
RNC
CSG
VRF2
b.
Main interface
VRF1
Service flow
Prerequisite
Scenario
Access Mode
Advantage
Disadvantage
Native
Ethernet
solution
Users or
services do
not need to be
separated.
Hybrid
interface
access
Issue 03 (2013-11-22)
17
2 Configuration Overview
Figure 2-9 Native Ethernet service access (hybrid interface access) configuration
diagram
port trunk allow-pass vlan 10 to 20
Macro Cell
VLAN10
VLAN20
IPRAN
ATN 905
ATN 905
VLAN20
2.
VLAN10
CSG
RNC
Hybrid interface
Service flow
If the native IP solution is selected in step 1, select a service plane routing mode based
on the actual networking requirements. If the native Ethernet solution is selected in step 1,
skip this step.
Prerequisit
e
Scenario
Service plane
routing mode
Advantage
Disadvantage
Native IP
solution
The network
scale is small.
Static Route
1. The configuration is
simple.
The network
scale is large.
Issue 03 (2013-11-22)
IGP route
18
2 Configuration Overview
ATN 905
IPRAN
ATN 905
CSG
3.
4.
RNC
Service flow
Select the QoS deployment mode based on the actual networking requirements.
Scenario
QoS Mode
Select the clock deployment mode based on the actual networking requirements.
Scenario
Clock Mode
Synchronous Ethernet
1588v2
Solution 1: Native IP + public network static management plane + VRF access + static
route
2.
3.
The preceding recommended solutions are only common ones and there are also other combination types.
Issue 03 (2013-11-22)
Solution 1: Native IP + public network static management plane + VRF access + static
route
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
19
2 Configuration Overview
Application Scope
Advantage
Constraint
1. The configuration is
simple. The basic native
IP feature is used,
dynamic protocols such
as the IGP are not
involved, and the IGP
does not need to be
planned.
Issue 03 (2013-11-22)
l When a small-cell
base station is added
to the network, static
routes need to be
added by hop for the
network segment
from the small-cell
base station to the
corresponding macro
base station.
l When a PE is added
to the network, static
routes need to be
added by hop for the
network segment
from the PE to the
EDD.
Advantage
Constraint
1. This solution is
recommended for
relatively large
networks.
NOTE
This solution applies to
networks built with Huawei
equipment only. Equipment
can be managed together
with the upstream
equipment using a DCN
private network, which is
convenient and effective.
20
2 Configuration Overview
Application Scope
Advantage
Constraint
1. This solution is
especially applicable to
scenarios in which the
ATN 905 is used as the
EDD.
1. A protocol needs to be
configured to prevent
loops and Layer 2
broadcast storms.
2. VLANs for customers
and operators do not
need to be separated.
Solution 1: Native IP
+ Public Network
Static Management
Plane + VRF Access +
Static Route
Solution 2: Native IP +
DCN Private Network
Management Plane +
VRF Access + Dynamic
Route
Solution 3: Native
Ethernet + Public
Network IGP
Management Plane +
Hybrid Interface Access
Mana
geme
nt
plane
confi
gurati
on
1. Use Layer 3
subinterfaces
between the ATN
905 and backhaul
device at the macro
base station to
establish public
network IP
connections.
1. Establish public
network IP
interconnections
between the ATN 905
and the CSG (or PE)
using Layer 3
subinterfaces.
Issue 03 (2013-11-22)
21
Opti
on
Solution 1: Native IP
+ Public Network
Static Management
Plane + VRF Access +
Static Route
Solution 2: Native IP +
DCN Private Network
Management Plane +
VRF Access + Dynamic
Route
Solution 3: Native
Ethernet + Public
Network IGP
Management Plane +
Hybrid Interface Access
Servi
ce
confi
gurati
on
1. Establish VRFinstance-based IP
connections between
the ATN 905 and the
CSG (or PE) using
Layer 3
subinterfaces.
1. Establish VRFinstance-based IP
connections between
the ATN 905 and the
CSG (or PE) using
Layer 3 subinterfaces.
Issue 03 (2013-11-22)
2 Configuration Overview
QoS
confi
gurati
on
Clock
confi
gurati
on
22
23
You can deploy quality of service (QoS) on a carrier network to provide differentiated QoS
assurance as required.
3.8 Deploying the Clock
You are advised to use a clock synchronization solution based on actual clock synchronization
requirements.
Issue 03 (2013-11-22)
24
Overview
Solution 1: Native IP VRF static route access (native IP + public network static
management plane + static route + VRF access)
Figure 3-1 Example network of Native IP VRF static route access
VRF1
VRF2
Macro Cell
ATN 905
IPRAN
ATN 905
CSG
VRF2
VRF1
Static route
Issue 03 (2013-11-22)
RNC
main interface
Dot1q sub-interface
public network
management plane
VRF1 service flow
VRF2 service flow
25
Applicable
Scenario
Solution
Advantage
Solution
Constraint
l Service
configurations
for small-cell
base stations:
Native IP
1. Scenario in which
the carrier
solution on the
macro base
station side
adopts the Layer
3 access solution
1. The
configurations
are very simple
and easy to
understand. Basic
features are
applied to this
solution, and
dynamic routing
protocols, for
example, the
Interior Gateway
Protocol (IGP),
are not included
in this solution.
1. This solution is
not applicable to
large-sized
networks.
l Management
plane:
Public network
static routes
l IP route:
Static routes
l Native IP access:
VRF access
2. Small-sized
network
3. Small-cell base
station providing
access for
multiple wireless
carriers (Services
of different
wireless carriers
are isolated from
each other.)
4. Huawei IPRAN
products or the
third-party NEs
deployed in the
upstream
direction of the
macro base
station
2. VRF instances
are created for
service isolation.
Wireless devices
are insensible to
the VRF
instances. The
VRF instances
are created on
transmission
equipment to
isolate services of
different wireless
users.
2. This solution is of
poor
expansibility.
Specifically, if
the service IP
address of the
small-cell base
station changes,
the static routes
configured on the
backhaul devices
need to be
changed
accordingly.
Configuration Roadmap
l
Configure a management plane (based on public network static routes) between the ATN
905 and the CSG in a macro base station.
1. When services need to be isolated at station access devices, create multiple VRFs on the ATN 905
and CSG devices so that different services use their own VRFs. The VRFs must be the same as those
configured on the macro base station.
2. When services do not need to be isolated at station access devices, create and configure only one VRF
on the ATN 905 and CSG devices so that different services use the same VRF.
Issue 03 (2013-11-22)
Hop by hop configure static routes from the ATN 905 and the CSG in a macro base station
to the small-cell base station and the RNC. Configure static routes between ATN 905 and
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
26
small-cell base stations that are directly connected to it, between ATN 905 and its
downstream ATN 905, and between ATN 905 and small-cell base stations that are directly
connected to the downstream ATN 905.
l
Data Planning
Item
Planning Guidelines
Basic configuration
parameters:
l NE name
l User login parameter
l SNMP
l AAA
Small-cell base station
data:
l Voice services IP
address
l Data services IP
address
l VRF
ATN 905 data:
l Management IP
address
l VRF
Static route:
l Destination IP
address
l Next-hop IP address
1. Static routes from the ATN 905 to the small-cell base station
need to be configured.
2. Static routes from the ATN 905 to the downstream ATN 905
and small-cell base station need to be configured.
3. The default route from the ATN 905 to the RNC needs to be
configured.
4. Static routes are imported into the BGP area configured on the
backhaul device in a macro device.
QoS
Issue 03 (2013-11-22)
27
Item
Planning Guidelines
Clock
SyncE and 1588v2 functions are enabled on the ATN 905 so that
the ATN 905 traces the clock and time of the upstream device
and transmits the clock signals to base stations.
network
SSH Client
SSH Server
Prerequisite
l
The ATN 905 has been logged in using the console interface and an IP address for each
interface has been configured on the ATN 905.
A direct or reachable route exists between the SSH client and the ATN 905.
NOTE
Perform the following configurations on the ATN 905 that serves as the SSH server. This section describes only
the SSH login by using the PuTTY program.
Procedure
Step 1 As shown in the following figure, set the IP address of the ATN 905 to 192.168.1.1 and the login
protocol to SSH.
Issue 03 (2013-11-22)
28
NOTE
After the ATN is powered on for the first time, you can log in to it in STelnet mode. The IP address of the
management network interface Ethernet0/0/0 (the console interface) is 129.0.0.1. If the ATN has accessed
the network when it is powered on for the first time, its IP address 129.0.0.1 will be automatically changed
to the IP address that DHCP obtains during the startup.
Step 2 Enter the user name root and the password Changeme_123.
NOTE
After the ATN is powered on for the first time, you can log in to it in STelnet mode. The user name and
password are root and Changeme_123 respectively. After logging in to the ATN, change the default
password in time.
Issue 03 (2013-11-22)
29
----End
Context
Figure 3-5 shows the networking diagram for logging in to the NE80E/40E by using the console
interface.
Figure 3-5 Networking diagram for logging in to the ATN 905 by using the console interface
PC
ATN
Prerequisite
l
Issue 03 (2013-11-22)
30
Procedure
Step 1 Use a serial cable to connect the serial interface on the PC and the console interface on the ATN
905.
For more information about the console interface, see the ATN 905Multi-service Access
EquipmentHardware Description.
Step 2 Start the HyperTerminal on the PC.
Choose Start > Programs > Accessories > Communications to start the HyperTerminal in
Windows.
Step 3 Set up a connection.
As shown in Figure 3-6, enter the name of the new connection in the Name text box, and select
an icon. Then, click OK.
Figure 3-6 Setting up a connection
Issue 03 (2013-11-22)
31
l Setting the COM1 properties according to the description in Figure 3-8 and setting them by clicking
Restore Defaults have the same effect. The default settings of the console interface will be used.
l When you log in to the ATN 905 by using the console interface, ensure that the COM1 properties on
the HyperTerminal are consistent with the interface attribute settings on the ATN 905. Otherwise, the
login will fail. This means that if default settings are not used for the interface attributes on the ATN
905, the COM1 properties on the HyperTerminal must be changed to be consistent with the interface
attribute settings on the ATN 905.
Issue 03 (2013-11-22)
32
----End
Commissioning Result
After the preceding configurations are complete, press Enter. An initial password is required
for the first login. Set an authentication password. The system automatically saves the set
password.
An initial password is required for the first login via the console.
Set a password and keep it safe! Otherwise you will not be able to login via the
console.
Please configure the login password (6-16)
Enter Password:
Confirm Password:
If the login fails, click Disconnect and then Call. If the login still fails, repeat Step 1 to check
whether the parameters or physical connections are correct. If they are correct, log in to the ATN
905 again.
Issue 03 (2013-11-22)
33
Data Planning
An NE name consists of the site name, device model, and device number. Each NE is named in
the format of AA-BB-CC. The following provides the meaning of the letters.
l
Value
Description
sysname
ATN905SmallCellSiteA-001
NOTE
All the NEs involved in this document are named as shown in the following figure.
SmallCellSiteA1
Macro Cell
Micro/Pico
ATN905SmallCellSiteB-002
Micro/Pico
Micro/Pico
ATN905SmallCellSiteA-001
IPRAN
ATN910MacroCellSite-003
RNC
Micro/Pico
SmallCellSiteA2
SmallCellSiteB2
Configuration Process
l
Issue 03 (2013-11-22)
34
Data Planning
To log in to an ATN device in telnet or Secure Shell (SSH) mode, you can configure the VTY
user interface to ensure equipment security. The following parameters are involved: the
maximum number of VTY user interfaces, user authentication mode, user privilege, and VTY
attributes.
l
By setting the maximum number of VTY user interfaces, you can limit the number of users
who can log in to the ATN device concurrently.
By setting the user authentication mode, you can enhance the equipment security. The user
authentication mode can be set to AAA authentication or password authentication.
1.
The AAA authentication mode is based on users, ensuring high security. To log in to
the ATN device, you need to enter the user name and password.
2.
By setting the user privilege, you can differentiate the access rights of different users on
the ATN device to enhance the management security. User privileges are divided into 16
levels, which are numbered 0 to 15. A larger value indicates a higher user privilege.
You can configure the VTY attributes of a VTY user interface, such as the timeout interval
of communication failure for login users. Each VTY attribute on the VTY user interface
has a default value on the ATN device. You can re-configure the terminal attributes as
required.
NOTE
Set these parameters based on the actual network conditions, such as network size and topology. The
following recommended values in this example are only for reference.
Parameter
Value
Description
user-interface
maximum-vty
15
Issue 03 (2013-11-22)
35
Parameter
Value
Description
user-interface
vty 0 14
authentication-mode
aaa
protocol inbound
ssh
user privilege
level 3
idle-timeout
50
Configuration Process
Perform the following configurations on all ATN devices:
1.
2.
Data Planning
If the user authentication mode is set to AAA authentication in an ATN device, a user needs to
keep the login user name and password properly, and uses them to log in to the ATN device.
The levels of commands that can be used by users logging in to an ATN device concurrently are
determined by the privileges of these users in the AAA configuration.
Issue 03 (2013-11-22)
36
NOTE
Set these parameters based on the actual network conditions, such as network size and topology. The
following recommended values in this example are only for reference.
Parameter
Value
Description
aaa
local-user XXX
password cipher XXX
USER01
local-user level
local-user xxx
service-type xxx
USER01
Hello@*#123
ssh
Configuration Process
Perform the following configurations on all ATN devices:
aaa
local-user USER01 password cipher Hello@*#123 //Add a local uer (USER01) and set
the password.
local-user USER01 level 3 //Set the user level of the local user.
local-user USER01 service-type ssh //Set the access type for the user.
NOTE
Requirements on user names and passwords for ATN products are as follows:
l A local user name contains 1 to 253 characters.
l A password must contain eight characters at least.
l A password must contain digits, upper-case and lower-case letters, and special characters, excluding
question marks (?) and spaces.
l The password cannot be the same as the user name or the user name in reverse order.
37
Data Planning
The SNMP is a standard network management protocol widely used on TCP/IP networks. The
NMS can manage NEs using the SNMP. Specifically, the SNMP defines several device
management operations that can be performed by the NMS and alarms that can be automatically
sent to the NMS when the ATN equipment is faulty. The NMS uses the management information
base (MIB) to identify and manage devices. The SNMP versions include SNMPv1, SNMPv2c,
and SNMPv3, which are all supported by the ATN 905.
The Link Layer Discovery Protocol (LLDP) is a Layer 2 discovery protocol defined in 802.1ab.
When the ATN and its neighbors are all enabled with LLDP, the ATN notifies the neighbors of
its status and obtains the status of the neighbors through LLDP packets. The NMS then can get
information about Layer 2 connection of the ATN. In this manner, the NMS can analyze the
network topology.
NOTE
Set these parameters based on the actual network conditions, such as network size and topology. The
following recommended values in this example are only for reference.
Issue 03 (2013-11-22)
Parameter
Value
Description
snmp-agent
snmp-agent sys-info
version
all
snmp-agent mib-view
included iso-view
iso
snmp-agent
community read
cipher
Huawei123!
snmp-agent
community write
cipher
Huawei@123
snmp-agent trap
enable
mib-view iso-view
mib-view iso-view
38
Parameter
Value
Description
snmp-agent trap
source
LoopBack0
address udp-domain
20.20.20.20
params securityname
Huawei@123 v2c privatenetmanager ext-vb
snmp-agent trap
enable feature-name
lldp
snmp-agent extend
error-code
enable
lldp enable
Application Process
Perform the following configurations on all ATN devices:
snmp-agent
snmp-agent sys-info version all //Enable SNMP of all versions for the system.
snmp-agent mib-view included iso-view iso //Include the iso subtree SNMP MIB
view.
snmp-agent community read cipher Huawei123! mib-view iso-view
snmp-agent community write cipher Huawei@123 mib-view iso-view //Set the read and
write permissions for the write attributes. When the read entity name and write
entity name are the same, the write attribute command will override the read
attribute command.
snmp-agent trap enable
snmp-agent target-host trap address udp-domain 20.20.20.20 params securityname
Huawei@123 v2c private-netmanager ext-vb //When the management plane is deployed
on public network routes, SNMP trap messages can be sent to the U2000 at management
IP address 20.20.20.20 using entity name Huawei@123. If an NMS provided by Huawei
is used, configure private-netmanager and ext-vb.
snmp-agent trap source LoopBack0 //Set the source interface for trap messages.
snmp-agent trap enable feature-name lldp
snmp-agent extend error-code enable
lldp enable
Issue 03 (2013-11-22)
39
Establish a management plane between the ATN 905 and the CSG based on public network
static routes.
Data Planning
NOTE
Set these parameters based on the actual network conditions, such as network size and topology. The
following recommended values and precautions in this example are for reference only.
GE0/2/1.1 dot1q 1
192.168.1.9/30
GE0/2/1.1 dot1q 1
192.168.1.10/30
Loopback0
128.4.11.11/32
IPRAN
GE0/2/0
GE0/2/0
Loopback0
128.4.12.12/32
Loopback0
128.4.13.13/32
RNC/SGW
Interface
IP Address
VPN
ATN905SmallCellSiteA-001
Loopback0
128.4.11.11 32
GigabitEthernet
0/2/1.1
192.168.1.9 30
vlan-type dot1q 1
Issue 03 (2013-11-22)
40
NE Name
Interface
IP Address
VPN
ATN905SmallCellSiteB-002
Loopback0
128.4.12.12 32
GigabitEthernet
0/2/0.1
192.168.1.21 30
192.168.1.10 30
Loopback0
128.4.13.13 32
GigabitEthernet0/2/0.
1
192.168.1.22 30
vlan-type dot1q 1
GigabitEthernet
0/2/1.1
vlan-type dot1q 1
ATN910MacroCellSite-003
vlan-type dot1q 1
Configuring ATN905-SmallCellSiteA-001
interface GigabitEthernet0/2/1.1
description NNI
vlan-type dot1q 1
ip address 192.168.1.9 30
Configuring ATN905-SmallCellSiteB-002
interface GigabitEthernet0/2/0.1
description ToNext905
vlan-type dot1q 1
ip address 192.168.1.10 30
interface GigabitEthernet0/2/1.1
description NNI
vlan-type dot1q 1
ip address 192.168.1.21 30
Configuring ATN910-MacroCellSite-003
interface GigabitEthernet0/2/0.1
description NNI
vlan-type dot1q 1
ip address 192.168.1.22 30
Issue 03 (2013-11-22)
41
VRF2
Macro Cell
ATN 905
IPRAN
ATN 905
CSG
VRF2
VRF1
RNC
Main interface
Dot1q sub-interface
VRF1 service flow
VRF2 service flow
The preceding figure shows how to configure VRF instances. The configuration roadmap is as
follows:
l
Issue 03 (2013-11-22)
Use different VPNs to carry data flows of different users and bind AC interfaces on the
ATN 905 to VRF instances.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
42
NOTE
1. When services need to be isolated at station access devices, create multiple VRFs on the ATN 905
and CSG devices so that different services use their own VRFs. The VRFs must be the same as those
configured on the macro base station.
2. When services do not need to be isolated at station access devices, create and configure only one VRF
on the ATN 905 and CSG devices so that different services use the same VRF.
Configure dotlq subinterfaces for the interfaces connecting the ATN 905 devices and the
CSG and bind these subinterfaces to VRF instances.
Set these parameters based on the actual network conditions such as network scale and topology. The following
recommended values in this example are only for reference.
10.182.1.1/32(VRF1)
10.224.1.1/32(VRF1)
192.168.1.18
172.21.1.6
172.21.1.5
GE0/2/2
192.168.1.17
GE0/2/2
GE0/2/0
GE0/2/1
GE0/2/1
192.168.1.1
GE0/2/3
192.168.1.2
IPRAN
GE0/2/0
GE0/2/3
172.21.1.13
RNC/SGW
172.21.1.14
GE0/2/1.2 172.21.1.10/30 dot1q 2 VRF1
GE0/2/1.3 192.168.1.10/30 dot1q 3 VRF2
10.182.1.2/32(VRF2)
10.224.1.2/32(VRF2)
10.182.1.3/32(VRF1)
10.224.1.3/32(VRF1)
Issue 03 (2013-11-22)
Network Segment
Remarks
10.182.1.0/24
10.224.1.0/24
43
Network Segment
Remarks
172.21.1.0/24(VRF1)
192.168.1.0/24(VRF2)
NE
Name
Interface
IP Address
VPN
Remarks
SmallCellSi
teA
SmallC
ellSiteA
1
loopback0
10.182.1.1/32
VRF1
IP address of
NE
SmallCellSite
A1 for voice
services
loopback1
10.224.1.1/32
VRF1
IP address of
NE
SmallCellSite
A1 for data
services
loopback0
10.182.1.2/32
VRF2
IP address of
NE
SmallCellSite
A2 for voice
services
loopback1
10.224.1.2/32
VRF2
IP address of
NE
SmallCellSite
A2 for data
services
GigabitEth
ernet
0/2/1.2
172.21.1.9/30
VRF1
NNI on a
backhaul
device
192.168.1.9/30
VRF2
NNI on a
backhaul
device
SmallC
ellSiteA
2
ATN90
5SmallC
ellSiteA
-001
vlan-type
dot1q 2
GigabitEth
ernet
0/2/1.3
vlan-type
dot1q 3
Issue 03 (2013-11-22)
44
NE Name
SmallCellSi
teB
NE
Name
SmallC
ellSiteB
1
SmallC
ellSiteB
2
ATN90
5SmallC
ellSiteB
-002
Interface
IP Address
VPN
Remarks
GigabitEth
ernet 0/2/2
172.21.1.5/30
VRF1
To NE
SmallCellSite
A1
GigabitEth
ernet 0/2/3
192.168.1.1/30
VRF2
To NE
SmallCellSite
A2
loopback0
10.182.1.4/32
VRF2
IP address of
NE
SmallCellSite
B1 for voice
services
loopback1
10.224.1.4/32
VRF2
IP address of
NE
SmallCellSite
B1 for data
services
loopback0
10.182.1.3/32
VRF1
IP address of
NE
SmallCellSite
B2 for voice
services
loopback1
10.224.1.3/32
VRF1
IP address of
NE
SmallCellSite
B2 for data
services
GigabitEth
ernet
0/2/0.2
172.21.1.21/30
VRF1
To Next905
192.168.1.21/3
0
VRF2
To Next905
172.21.1.10/30
VRF1
NNI on a
backhaul
device
vlan-type
dot1q 2
GigabitEth
ernet
0/2/0.3
vlan-type
dot1q 3
GigabitEth
ernet
0/2/1.2
vlan-type
dot1q 2
Issue 03 (2013-11-22)
45
NE Name
NE
Name
Interface
IP Address
VPN
Remarks
GigabitEth
ernet
0/2/1.3
192.168.1.10/3
0
VRF2
NNI on a
backhaul
device
GigabitEth
ernet 0/2/2
192.168.1.17/3
0
VRF2
To NE
SmallCellSite
B1
GigabitEth
ernet 0/2/3
172.21.1.13/30
VRF1
To NE
SmallCellSite
B2
GE0/2/0.2
172.21.1.22/30
VRF1
To Next905
192.168.1.22/3
0
VRF2
To Next905
vlan-type
dot1q 3
MacroCellS
ite
ATN91
0MacroC
ellSite-0
03
vlan-type
dot1q 2
GE0/2/0.3
vlan-type
dot1q 3
VPN
Instance
Name
RD
Remarks
ATN905SmallCellSiteA-001
VRF1
100:1
VRF2
100:2
ATN905SmallCellSiteB-002
VRF1
100:1
VRF2
100:2
ATN910MacroCellSite-003
VRF1
200:1
VRF2
200:2
Issue 03 (2013-11-22)
46
Configuring ATN905-SmallCellSiteA-001
1.
2.
Configuring ATN905-SmallCellSiteB-002
1.
2.
Issue 03 (2013-11-22)
47
interface GigabitEthernet0/2/3
description To SmallCellSiteB2
ip binding vpn-instance VRF1
ip address 172.21.1.13 30
Configuring ATN910-MacroCellSite-003
1.
2.
Issue 03 (2013-11-22)
48
IPRAN
CSG
Micro/Pico
NativeIP
RNC
Static route
The preceding figure shows how to configure service plane static routes. The configuration
roadmap is as follows:
l
Configure static routes between the ATN 905 and small-cell base stations that are directly
connected to it.
On the ATN 905, configure a static route leading to the downstream ATN 905 and another
one leading to the small-cell base station that is directly connected to the downstream ATN
905. In other words, configure a static route from the ATN905-SmallCellSiteB-002 NE to
the ATN905-SmallCellSiteA-001 NE and configure a static route from the ATN905SmallCellSiteA-001 NE to its connected small-cell base station.
Set these parameters based on the actual network conditions, such as network size and topology. The
following recommended values in this example are only for reference.
Issue 03 (2013-11-22)
49
10.182.1.1 32(VRF1)
10.224.1.132(VRF1)
172.21.1.6
172.21.1.5
GE0/2/2
192.168.1.17
GE0/2/2
GE0/2/1
GE0/2/0
GE0/2/1
192.168.1.1
GE0/2/3
192.168.1.2
GE0/2/0
GE0/2/3
172.21.1.13
RNC/SGW
172.21.1.14
IPRAN
10.182.1.3 32(VRF1)
10.224.1.3 32(VRF1)
Issue 03 (2013-11-22)
NE Name
Destination IP
Address
Next Hop
VPN
Remarks
ATN905SmallCellSite
A-001
10.182.1.1/32
172.21.1.6
VRF1
IP address of NE
SmallCellSiteA
1 for voice
services
10.224.1.1/32
172.21.1.6
VRF1
IP address of NE
SmallCellSiteA
1 for data
services
10.182.1.2/32
192.168.1.2
VRF2
IP address of NE
SmallCellSiteA
2 for voice
services
10.224.1.2/32
192.168.1.2
VRF2
IP address of NE
SmallCellSiteA
2 for data
services
0.0.0.0
172.21.1.21
VRF1
VRF1-based
default upstream
route
50
NE Name
ATN905SmallCellSite
B-002
Issue 03 (2013-11-22)
Destination IP
Address
Next Hop
VPN
Remarks
0.0.0.0
192.168.1.21
VRF2
VRF2-based
default upstream
route
10.182.1.3/32
172.21.1.18
VRF1
IP address of NE
SmallCellSiteB2
for voice
services
10.224.1.3/32
172.21.1.18
VRF1
IP address of NE
SmallCellSiteB2
for data services
10.182.1.4/32
192.168.1.14
VRF2
IP address of NE
SmallCellSiteB1
for voice
services
10.224.1.4/32
192.168.1.14
VRF2
IP address of NE
SmallCellSiteB1
for data services
10.182.1.1/32
172.21.1.9
VRF1
IP address of NE
SmallCellSiteA
1 for voice
services
10.224.1.1/32
172.21.1.9
VRF1
IP address of NE
SmallCellSiteA
1 for data
services
10.182.1.2/32
192.168.1.9
VRF2
IP address of NE
SmallCellSiteA
2 for voice
services
10.224.1.2/32
192.168.1.9
VRF2
IP address of NE
SmallCellSiteA
2 for data
services
0.0.0.0
172.21.1.22
VRF1
VRF1-based
default upstream
route
0.0.0.0
192.168.1.22
VRF2
VRF2-based
default upstream
route
51
NE Name
Destination IP
Address
Next Hop
VPN
Remarks
ATN910MacroCellSit
e-003
10.182.1.3/32
172.21.1.21
VRF1
IP address of NE
SmallCellSiteB2
for voice
services
10.224.1.3/32
172.21.1.21
VRF1
IP address of NE
SmallCellSiteB2
for data services
10.182.1.4/32
192.168.1.21
VRF2
IP address of NE
SmallCellSiteB1
for voice
services
10.224.1.4/32
192.168.1.21
VRF2
IP address of NE
SmallCellSiteB1
for data services
10.182.1.1/32
172.21.1.21
VRF1
IP address of NE
SmallCellSiteA
1 for voice
services
10.224.1.1/32
172.21.1.21
VRF1
IP address of NE
SmallCellSiteA
1 for data
services
10.182.1.2/32
192.168.1.21
VRF2
IP address of NE
SmallCellSiteA
2 for voice
services
10.224.1.2/32
192.168.1.21
VRF2
IP address of NE
SmalloCellSite
A2 for carrying
data services
Configure static routes to small-cell base stations that are directly connected.
ip route-static vpn-instance VRF1 10.182.1.1 32 172.21.1.6////Sets a static
route with the destination IP address as 10.182.1.1 and the next-hop address
as 172.21.1.6.
ip route-static vpn-instance VRF1 10.224.1.1 32 172.21.1.6
Issue 03 (2013-11-22)
52
Configure NE ATN905-SmallCellSiteB-002
l
Configure static routes to small-cell base stations that are directly connected.
ip
ip
ip
ip
vpn-instance
vpn-instance
vpn-instance
vpn-instance
VRF1
VRF1
VRF2
VRF2
10.182.1.3
10.224.1.3
10.182.1.4
10.224.1.4
32
32
32
32
172.21.1.14
172.21.1.14
192.168.1.14
192.168.1.14
Configure static routes to the small-cell base stations that the downstream ATN 905 directly
connected.
ip
ip
ip
ip
route-static
route-static
route-static
route-static
route-static
route-static
route-static
route-static
vpn-instance
vpn-instance
vpn-instance
vpn-instance
VRF1
VRF1
VRF2
VRF2
10.182.1.1
10.224.1.1
10.182.1.2
10.224.1.2
32
32
32
32
172.21.1.9
172.21.1.9
192.168.1.9
192.168.1.9
Configure NE ATN910-MacroCellSite-003
l
Configure static routes to the small-cell base stations that the downstream ATN 905 directly
connected.
ip
ip
ip
ip
ip
ip
ip
ip
route-static
route-static
route-static
route-static
route-static
route-static
route-static
route-static
vpn-instance
vpn-instance
vpn-instance
vpn-instance
vpn-instance
vpn-instance
vpn-instance
vpn-instance
VRF1
VRF1
VRF2
VRF2
VRF1
VRF1
VRF2
VRF2
10.182.1.1
10.224.1.1
10.182.1.2
10.224.1.2
10.182.1.3
10.224.1.3
10.182.1.4
10.224.1.4
32
32
32
32
32
32
32
32
172.21.1.21
172.21.1.21
192.168.1.21
192.168.1.21
172.21.1.21
172.21.1.21
192.168.1.21
192.168.1.21
Run display ip routing-table vpn-instance to query the brief information about the IPv4
route table.
Run display ip routing-table vpn-instance verbose to query the detailed information about
the IPv4 route table.
53
CTRL_C to break
Code 3, Subcode
Code 3, Subcode
Code 3, Subcode
Code 3, Subcode
Code 3, Subcode
Configuration Roadmap
Traditional IP networks in best-effort mode are mainly used to carry data services, and the service
quality seems insignificant. However, with fast development of IP-oriented Internet services and
emerging of various new services (such as VoIP and VPN services), IP networks have changed
from pure data networks to bearer networks with commercial values. Therefore, IP networks
must ensure the quality of each type of service that they carry. Against this backdrop, quality of
service (QoS) is developed.
The ATN 905 functions as a small-cell base station bearer device or enterprise private line
Ethernet demarcation device (EDD). When configured with simple traffic classification, the
ATN 905 can manage the traffic. Priority mapping based on simple traffic classification indicates
that the priority of the packets on a network is mapped into the packets of another network so
that the packets of the first network can be transmitted on the second network based on the
original or user-defined packet priority. That is, on the ingress, the packets obtain the priority
and color for scheduling on the ATN equipment based on the values of the DSCP and 802.1p
fields. After being scheduled on the ATN equipment, the outgoing packets obtain the values of
the priority fields (such as DSCP and 802.1p) for encapsulation based on the above-mentioned
priority and color. In this manner, during traffic management, packets of different services join
different queues, ensuring differentiated scheduling.
To configure simple traffic classification, do as follows:
l
Issue 03 (2013-11-22)
Bind the default DiffServ domain to service interfaces (including main interfaces and
subinterfaces) of the ATN 905 to configure simple traffic classification.
54
Data Planning
NOTE
Set these parameters based on the actual network conditions such as network scale and topology. The
following recommended values in this example are only for reference.
Parameter
Value
Description
trust upstream
default
Application Process
l
For ATN905-SmallCellSiteA-001
interface GE0/2/1.2
trust upstream default
interface GE0/2/1.3
trust upstream default
interface GE0/2/2
trust upstream default
interface GE0/2/3
trust upstream default
For ATN905-SmallCellSiteB-002
interface GE0/2/0.2
trust upstream default
interface GE0/2/0.3
trust upstream default
interface GE0/2/1.2
trust upstream default
interface GE0/2/1.3
trust upstream default
interface GE0/2/2
trust upstream default
interface GE0/2/3
trust upstream default
For ATN910-MacroCellSite-003
interface GE0/2/0.2
trust upstream default
interface GE0/2/0.3
trust upstream default
55
on the network. Frequency synchronization (also known as clock synchronization) indicates that
signals retain certain relationships with respect to the phase. That is, the phase difference between
signals is constant. Phase synchronization (also known as time synchronization) indicates that
signals have the same frequency and phase. That is, there is no phase difference between signals.
For example, if two watches always indicate the same time, they are in phase synchronization;
if the two watches always have a constant time difference (such as 6 hours), they are in frequency
synchronization. In the IP RAN scenario, the ATN equipment needs to support frequency or
phase synchronization to meet the requirements of base stations.
Mainstream PSN-based synchronization technologies in the industry include IEEE 1588v2 and
synchronous Ethernet. In this solution, you are advised to configure synchronous Ethernet and
IEEE 1588v2 on the ATN 905 to achieve frequency synchronization and phase synchronization
respectively.
Figure 3-15 Networking diagram for clock deployment
Micro/Pico
Micro/Pico
BITS
GE0/2/2
GE0/2/3
pri 20
GE0/2/1
GE0/2/2
GE0/2/1
pri 20
GE0/2/0 GE0/2/0
ASG
pri 10
RSG
GE0/2/3
The preceding figure shows how to configure a clock. The configuration roadmap is as follows:
l
Enable synchronous Ethernet and IEEE 1588v2 for the ATN 905, so that the ATN 905 can
track the upstream clock information and time information, and send them to base stations.
For synchronous Ethernet, configure clock signal priorities in the local priority list, and
enable synchronization status message (SSM) control.
NOTE
For synchronous Ethernet clock synchronization, a clock source is selected based on the following
descending order of priority: SSM clock quality, local priority setting, and clock source type.
l The SSM clock quality levels are in the following descending order: primary reference clock (PRC),
SSUA, SSUB, SDH equipment clock (SEC), and DNU. A source for which no quality level is defined,
and a clock source with quality level being DNU, are not be selected during source selection.
l The local priority is configured as follows: The value range is 1 to 255, and a smaller value indicates
a higher priority.
l
Issue 03 (2013-11-22)
For IEEE 1588v2, use the best master clock (BMC) algorithm.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
56
NOTE
When the BMC algorithm is used by a 1588v2-enabled device for master clock selection, priority1 of each
candidate time source is compared first, then the clock class, clock accuracy, and priority2. If priority1 of
candidate time sources is the same, the clock class is compared, and so on. The time source with the highest
priority is selected as the master clock.
Parameter
Value
Remarks
ATN905SmallCellSiteA-001
Local priority
list
20
Clock output
port
GE0/2/2
ATN905SmallCellSiteB-002
ATN910MacroCellSite-003
GE0/2/3
Parameter
Value
Remarks
ATN905-SmallCellSiteA-001
Port delay
measurement
mechanism
delay
The mechanism is
recommended to be
set consistently
networkwide.
NE type
BC
The networkwide BC
mode is
recommended.
Ring network
asymmetry automeasurement
enable
Automatically adjusts
the length difference
between transmit and
receive fibers when
ring network
protection switching
occurs for restoration.
GE0/2/2
Connects to a base
station.
ATN905-SmallCellSiteB-002
ATN910-MacroCellSite-003
GE0/2/3
Configure NE ATN905-SmallCellSiteA-001
clock ethernet-synchronization enable //Enables global synchronous Ethernet in the
system view.
Issue 03 (2013-11-22)
57
Configure NE ATN905-SmallCellSiteB-002
clock ethernet-synchronization enable
clock ssm-control on
interface GigabitEthernet0/2/0
clock priority 20
clock synchronization enable
interface GigabitEthernet0/2/1
clock synchronization enable
interface GigabitEthernet0/2/2
clock synchronization enable
interface GigabitEthernet0/2/3
clock synchronization enable
Configure NE ATN910-MacroCellSite-003
clock ethernet-synchronization enable
clock ssm-control on
interface GigabitEthernet0/2/0
clock synchronization enable
interface GigabitEthernet0/2/1
clock synchronization enable
Configure NE ATN905-SmallCellSiteA-001
ptp enable //Enables global IEEE 1588v2.
ptp device-type bc //Specifies the BC mode for all devices.
interface GigabitEthernet0/2/1
ptp delay-mechanism delay
ptp enable
interface GigabitEthernet0/2/2
ptp delay-mechanism delay //Configures the delay measurement mechanism of a
device as delay which calculates the time difference based on the link delay of the
master and slave clocks.
ptp enable //Enables IEEE 1588v2 for the interface.
interface GigabitEthernet0/2/3
ptp delay-mechanism delay
ptp enable
Configure NE ATN905-SmallCellSiteB-002
ptp enable
ptp device-type bc
interface GigabitEthernet0/2/0
ptp delay-mechanism delay
ptp enable
Issue 03 (2013-11-22)
58
interface GigabitEthernet0/2/1
ptp delay-mechanism delay
ptp enable
interface GigabitEthernet0/2/2
ptp delay-mechanism delay
ptp enable
interface GigabitEthernet0/2/3
ptp delay-mechanism delay
ptp enable
Configure NE ATN910-MacroCellSite-003
ptp enable
ptp device-type bc
interface GigabitEthernet0/2/0
ptp delay-mechanism delay
ptp enable
interface GigabitEthernet0/2/1
ptp delay-mechanism delay
ptp enable
Issue 03 (2013-11-22)
59
60
Issue 03 (2013-11-22)
61
Overview
Solution 2: Native IP VRF dynamic route access (native IP + DCN private network
management + dynamic route + VRF access)
Figure 4-1 Example network of native IP VRF dynamic route access
VRF1
VRF2
Macro Cell
ATN 905
IPRAN
ATN 905
CSG
VRF2
VRF1
IGP
Issue 03 (2013-11-22)
RNC
main interface
Dot1q sub-interface
DCN management
plane
VRF1 service flow
VRF2 service flow
62
Applicable
Scenario
Solution
Advantage
Solution
Constraint
l Service
configurations
for small-cell
base stations:
Native IP
1. Scenario in which
the carrier
solution on the
macro base
station side
adopts the Layer
3 access solution
1. This solution is
applicable to
large-sized
networks.
1. The Interior
Gateway Protocol
(IGP) planning
and maintenance
are required for
this solution.
l Management
plane:
Private network
DCN
l IP route:
IGP route
l Native IP access:
VRF access
2. Different-sized
networks
3. Small-cell base
station providing
access for
multiple wireless
carriers (Services
of different
wireless carriers
are isolated from
each other.)
4. Scenario in which
the network
consists of only
Huawei products
and DCN private
network
management is
used in the
upstream
direction of the
macro base
station
2. This solution
features high
expansibility.
When a new
small-cell base
station is
connected to the
ATN 905, only
the interface
configurations of
the neighbor
backhaul devices
need to be
modified.
2. The network
topology changes
may result in
network flapping.
3. VRF instances
are created for
service isolation.
Wireless devices
are insensible to
VRF instances,
and VLANs and
IP addresses are
planned
independently.
Configuration Roadmap
l
Configure a DCN management plane between the ATN 905 and the macro base station.
NOTE
1. When services need to be isolated at station access devices, create multiple VRFs on the ATN 905
and CSG devices so that different services use their own VRFs. The VRFs must be the same as those
configured on the macro base station.
2. When services do not need to be isolated at station access devices, create and configure only one VRF
on the ATN 905 and CSG devices so that different services use the same VRF.
Issue 03 (2013-11-22)
63
Configure an independent IGP process for each VRF instance between the ATN 905 and
the backhaul device in a macro base station.
Data Planning
Item
Planning Guidelines
Basic configuration
parameters:
l NE name
l User login parameter
l SNMP
l AAA
Small-cell base station
data:
l Voice services IP
address
l Data services IP
address
l VRF
ATN 905 data:
l Management IP
address
l VRF
Routes
l Static route:
destination IP
address, next-hop IP
address
Issue 03 (2013-11-22)
QoS
Clock
SyncE and 1588v2 functions are enabled on the ATN 905 so that
the ATN 905 traces the clock and time of the upstream device
and transmits the clock signals to base stations.
64
network
SSH Client
SSH Server
Prerequisite
l
The ATN 905 has been logged in using the console interface and an IP address for each
interface has been configured on the ATN 905.
A direct or reachable route exists between the SSH client and the ATN 905.
NOTE
Perform the following configurations on the ATN 905 that serves as the SSH server. This section describes only
the SSH login by using the PuTTY program.
Procedure
Step 1 As shown in the following figure, set the IP address of the ATN 905 to 192.168.1.1 and the login
protocol to SSH.
NOTE
After the ATN is powered on for the first time, you can log in to it in STelnet mode. The IP address of the
management network interface Ethernet0/0/0 (the console interface) is 129.0.0.1. If the ATN has accessed
the network when it is powered on for the first time, its IP address 129.0.0.1 will be automatically changed
to the IP address that DHCP obtains during the startup.
Issue 03 (2013-11-22)
65
Step 2 Enter the user name root and the password Changeme_123.
NOTE
After the ATN is powered on for the first time, you can log in to it in STelnet mode. The user name and
password are root and Changeme_123 respectively. After logging in to the ATN, change the default
password in time.
Issue 03 (2013-11-22)
66
----End
Context
Figure 4-5 shows the networking diagram for logging in to the NE80E/40E by using the console
interface.
Figure 4-5 Networking diagram for logging in to the ATN 905 by using the console interface
PC
ATN
Prerequisite
l
Issue 03 (2013-11-22)
67
Procedure
Step 1 Use a serial cable to connect the serial interface on the PC and the console interface on the ATN
905.
For more information about the console interface, see the ATN 905Multi-service Access
EquipmentHardware Description.
Step 2 Start the HyperTerminal on the PC.
Choose Start > Programs > Accessories > Communications to start the HyperTerminal in
Windows.
Step 3 Set up a connection.
As shown in Figure 4-6, enter the name of the new connection in the Name text box, and select
an icon. Then, click OK.
Figure 4-6 Setting up a connection
Issue 03 (2013-11-22)
68
l Setting the COM1 properties according to the description in Figure 4-8 and setting them by clicking
Restore Defaults have the same effect. The default settings of the console interface will be used.
l When you log in to the ATN 905 by using the console interface, ensure that the COM1 properties on
the HyperTerminal are consistent with the interface attribute settings on the ATN 905. Otherwise, the
login will fail. This means that if default settings are not used for the interface attributes on the ATN
905, the COM1 properties on the HyperTerminal must be changed to be consistent with the interface
attribute settings on the ATN 905.
Issue 03 (2013-11-22)
69
----End
Commissioning Result
After the preceding configurations are complete, press Enter. An initial password is required
for the first login. Set an authentication password. The system automatically saves the set
password.
An initial password is required for the first login via the console.
Set a password and keep it safe! Otherwise you will not be able to login via the
console.
Please configure the login password (6-16)
Enter Password:
Confirm Password:
If the login fails, click Disconnect and then Call. If the login still fails, repeat Step 1 to check
whether the parameters or physical connections are correct. If they are correct, log in to the ATN
905 again.
Issue 03 (2013-11-22)
70
Data Planning
An NE name consists of the site name, device model, and device number. Each NE is named in
the format of AA-BB-CC. The following provides the meaning of the letters.
l
Value
Description
sysname
ATN905SmallCellSiteA-001
NOTE
All the NEs involved in this document are named as shown in the following figure.
SmallCellSiteA1
Macro Cell
Micro/Pico
ATN905SmallCellSiteB-002
Micro/Pico
Micro/Pico
ATN905SmallCellSiteA-001
IPRAN
ATN910MacroCellSite-003
RNC
Micro/Pico
SmallCellSiteA2
SmallCellSiteB2
Configuration Process
l
Issue 03 (2013-11-22)
71
Data Planning
To log in to an ATN device in telnet or Secure Shell (SSH) mode, you can configure the VTY
user interface to ensure equipment security. The following parameters are involved: the
maximum number of VTY user interfaces, user authentication mode, user privilege, and VTY
attributes.
l
By setting the maximum number of VTY user interfaces, you can limit the number of users
who can log in to the ATN device concurrently.
By setting the user authentication mode, you can enhance the equipment security. The user
authentication mode can be set to AAA authentication or password authentication.
1.
The AAA authentication mode is based on users, ensuring high security. To log in to
the ATN device, you need to enter the user name and password.
2.
By setting the user privilege, you can differentiate the access rights of different users on
the ATN device to enhance the management security. User privileges are divided into 16
levels, which are numbered 0 to 15. A larger value indicates a higher user privilege.
You can configure the VTY attributes of a VTY user interface, such as the timeout interval
of communication failure for login users. Each VTY attribute on the VTY user interface
has a default value on the ATN device. You can re-configure the terminal attributes as
required.
NOTE
Set these parameters based on the actual network conditions, such as network size and topology. The
following recommended values in this example are only for reference.
Parameter
Value
Description
user-interface
maximum-vty
15
Issue 03 (2013-11-22)
72
Parameter
Value
Description
user-interface
vty 0 14
authentication-mode
aaa
protocol inbound
ssh
user privilege
level 3
idle-timeout
50
Configuration Process
Perform the following configurations on all ATN devices:
1.
2.
Data Planning
If the user authentication mode is set to AAA authentication in an ATN device, a user needs to
keep the login user name and password properly, and uses them to log in to the ATN device.
The levels of commands that can be used by users logging in to an ATN device concurrently are
determined by the privileges of these users in the AAA configuration.
Issue 03 (2013-11-22)
73
NOTE
Set these parameters based on the actual network conditions, such as network size and topology. The
following recommended values in this example are only for reference.
Parameter
Value
Description
aaa
local-user XXX
password cipher XXX
USER01
local-user level
local-user xxx
service-type xxx
USER01
Hello@*#123
ssh
Configuration Process
Perform the following configurations on all ATN devices:
aaa
local-user USER01 password cipher Hello@*#123 //Add a local uer (USER01) and set
the password.
local-user USER01 level 3 //Set the user level of the local user.
local-user USER01 service-type ssh //Set the access type for the user.
NOTE
Requirements on user names and passwords for ATN products are as follows:
l A local user name contains 1 to 253 characters.
l A password must contain eight characters at least.
l A password must contain digits, upper-case and lower-case letters, and special characters, excluding
question marks (?) and spaces.
l The password cannot be the same as the user name or the user name in reverse order.
74
Data Planning
NOTE
Set these parameters based on the actual network conditions such as network scale and topology. The
following recommended values and precautions in this example are only for reference.
Value
Description
snmp-agent
snmp-agent sys-info
version
v2c
snmp-agent mib-view
included iso-view
iso
snmp-agent
community read
cipher
Huawei123!
snmp-agent
community write
cipher
Huawei@123
snmp-agent trap
enable
snmp-agent trap
source
NNI
address udp-domain
20.20.20.20
mib-view iso-view
mib-view iso-view
params securityname
Huawei@123 v2c privatenetmanager ext-vb
Issue 03 (2013-11-22)
75
Parameter
Value
Description
snmp-agent trap
enable feature-name
lldp
ftp client-source i
NNI
Configuration Process
Configure the SNMP as follows:
#
snmp-agent
snmp-agent sys-info version all//Configure the system to use SNMP of all versions.
snmp-agent mib-view included iso-view iso//The SNMP MIB view contains the iso
subtree.
snmp-agent community read cipher Huawei123! mib-view iso-view
snmp-agent community write cipher Huawei@123 mib-view iso-view//The write attribute
includes the read-write permission. When the read community name is consistent with
the write community name, the command line of the read attribute will be
overwritten by the command line of the write attribute.
snmp-agent trap enable
snmp-agent target-host trap address udp-domain 20.20.20.20 vpn-instance
__dcn_vpn__ params securityname Huawei@123 v2c private-netmanager ext-vb//When the
management plane traverses a DCN private network channel, SNMP trap messages can be
sent to the IP address 20.20.20.20 of the U2000. In this scenario, the community
name Huawei@123 is used. If the U2000 is used, you are advised to set parameters
private-netmanager and ext-vb.
snmp-agent trap source LoopBack1024//Specify a source interface that sends trap
packets.
snmp-agent trap enable feature-name lldp
Configuration Roadmap
Traditional management and service packets are closely coupled, making equipment
management more and more complex and costly. Therefore, it is more and more important to
separate the management and service planes. A user operates and manages devices using the
management plane and deploys services using other planes, such as the service plane. That is,
the logical channels of the management plane and other planes are separated. When the
Issue 03 (2013-11-22)
76
management plane becomes abnormal, other planes can still be used; when other planes become
abnormal, devices can still be managed.
The ATN-supported private network DCN, an exclusive logical channel independent from the
control and service planes, is used to transmit management packets between NEs. Currently, an
independent service VPN (the VPN instance is named __dcn_vpn__) is occupied. This VPN is
only used to transit management packets and cannot be occupied by user services. The DCN is
independent from the control plane, which indicates that the logical channel can be automatically
established without extra service control signaling and routes. Therefore, management packets
can be transmitted. The DCN is independent from the service plane, which indicates that the
logical channel is unrelated to services. That is, the logical channel is available no matter whether
services are available. Therefore, after the ATN equipment is powered on, DCN automatically
becomes available and management packets can be transmitted.
The configuration roadmap is as follows:
l
Establish a management plane between the ATN 905 and the CSG based on private network
DCN channels.
NOTE
After DCN is enabled on the ATN equipment, the following configuration is generated by default:
#
interface LoopBack1023
description DCN loopback interface
ip binding vpn-instance __dcn_vpn__
ip address 100.4.12.12 255.255.255.255
#
ospf 65534 vpn-instance __dcn_vpn__
description DCN ospf create by default
opaque-capability enable
hostname
vpn-instance-capability simple
area 0.0.0.0
network 0.0.0.0 255.255.255.255
#
dcn
ne-ip 100.4.12.12 255.255.255.255
Data Planning
When being initialized, each NE on a DCN automatically generates an NE IP address that maps
the default NE ID, diffuses the NE ID and NE IP address through the Open Shortest Path First
(OSPF) protocol, and automatically generates a core routing table that indicates the mapping
between the NE IP and NE IP address. In this manner, NEs can communicate with each other.
That is, management channels can be interconnected without any user operations. However, on
actual networks, some users can re-plan the NE ID and NE IP address as required instead of
using the default ones.
Issue 03 (2013-11-22)
77
Parameter
Value
Remarks
NEID
NEIP
Configuration Process
Re-plan the NE ID and NE IP address.
set neid 9a0005//Set the NE ID in the user view.
dcn
ne-ip 128.9.160.5 255.255.255.0//Set the NE IP address in the DCN view.
78
Three departments of an enterprise branch are required to be isolated from each other and each
department is connected to the PE through a CE. That is, the enterprise branch requires 3 egress
routers and 3 links leading to the PE, and the PE needs to provide 3 interfaces for the enterprise
branch. In this case, port and link resources are wasted and costs increase. To resolve this
problem, VRF Lite is introduced. That is, VRF instances are configured on the CE. The following
figure shows the networking mode. The enterprise branch needs only 1 CE to connect to the PE,
VRF instances are configured on the CE, and the CE interfaces for the 3 departments are bound
to VRF instances. In addition, the CE connects to the PE through only 1 physical link and link
subinterfaces are bound to VRF instances. In this manner, corresponding VRF instances are
logically connected on the CE and PE, so the PE and CE can run a routing protocol in each VRF
instance to exchange VPN routes.
Figure 4-10 Networking diagram for L3VPN deployment
VRF1
VRF2
Macro Cell
ATN 905
IPRAN
ATN 905
CSG
VRF2
VRF1
RNC
Main interface
Dot1q sub-interface
VRF1 service flow
VRF2 service flow
The preceding figure shows how to configure VRF instances. The configuration roadmap is as
follows:
l
Use different VPNs to carry data flows of different users and bind AC interfaces on the
ATN 905 to VRF instances.
Configure dotlq subinterfaces for the interfaces connecting the ATN 905 devices and the
CSG and bind these subinterfaces to VRF instances.
Set these parameters based on the actual network conditions such as network scale and topology. The following
recommended values in this example are only for reference.
Issue 03 (2013-11-22)
79
10.182.1.1/32(VRF1)
10.224.1.1/32(VRF1)
192.168.1.18
172.21.1.6
172.21.1.5
GE0/2/2
192.168.1.17
GE0/2/2
GE0/2/1
GE0/2/0
GE0/2/1
192.168.1.1
GE0/2/3
192.168.1.2
IPRAN
GE0/2/0
GE0/2/3
172.21.1.13
RNC/SGW
172.21.1.14
GE0/2/1.2 172.21.1.10/30 dot1q 2 VRF1
GE0/2/1.3 192.168.1.10/30 dot1q 3 VRF2
10.182.1.2/32(VRF2)
10.224.1.2/32(VRF2)
10.182.1.3/32(VRF1)
10.224.1.3/32(VRF1)
Issue 03 (2013-11-22)
Network Segment
Remarks
10.182.1.0/24
10.224.1.0/24
172.21.1.0/24(VRF1)
192.168.1.0/24(VRF2)
80
NE
Name
Interface
IP Address
VPN
Remarks
SmallCellSi
teA
SmallC
ellSiteA
1
loopback0
10.182.1.1/32
VRF1
IP address of
NE
SmallCellSite
A1 for voice
services
loopback1
10.224.1.1/32
VRF1
IP address of
NE
SmallCellSite
A1 for data
services
loopback0
10.182.1.2/32
VRF2
IP address of
NE
SmallCellSite
A2 for voice
services
loopback1
10.224.1.2/32
VRF2
IP address of
NE
SmallCellSite
A2 for data
services
loopback0
128.4.11.11/32
Router ID of
ATN905SmallCellSite
A-001
GigabitEth
ernet
0/2/1.2
172.21.1.9/30
VRF1
NNI on a
backhaul
device
192.168.1.9/30
VRF2
NNI on a
backhaul
device
GigabitEth
ernet 0/2/2
172.21.1.5/30
VRF1
To NE
SmallCellSite
A1
GigabitEth
ernet 0/2/3
192.168.1.1/30
VRF2
To NE
SmallCellSite
A2
SmallC
ellSiteA
2
ATN90
5SmallC
ellSiteA
-001
vlan-type
dot1q 2
GigabitEth
ernet
0/2/1.3
vlan-type
dot1q 3
Issue 03 (2013-11-22)
81
NE Name
NE
Name
Interface
IP Address
VPN
Remarks
SmallCellSi
teB
SmallC
ellSiteB
1
loopback0
10.182.1.4/32
VRF2
IP address of
NE
SmallCellSite
B1 for voice
services
loopback1
10.224.1.4/32
VRF2
IP address of
NE
SmallCellSite
B1 for data
services
loopback0
10.182.1.3/32
VRF1
IP address of
NE
SmallCellSite
B2 for voice
services
loopback1
10.224.1.3/32
VRF1
IP address of
NE
SmallCellSite
B2 for data
services
loopback0
128.4.12.12/32
Router ID of
ATN905SmallCellSite
B-002
GigabitEth
ernet
0/2/0.2
172.21.1.21/30
VRF1
To Next905
192.168.1.21/3
0
VRF2
To Next905
172.21.1.10/30
VRF1
NNI on a
backhaul
device
SmallC
ellSiteB
2
ATN90
5SmallC
ellSiteB
-002
vlan-type
dot1q 2
GigabitEth
ernet
0/2/0.3
vlan-type
dot1q 3
GigabitEth
ernet
0/2/1.2
vlan-type
dot1q 2
Issue 03 (2013-11-22)
82
NE Name
NE
Name
Interface
IP Address
VPN
Remarks
GigabitEth
ernet
0/2/1.3
192.168.1.10/3
0
VRF2
NNI on a
backhaul
device
GigabitEth
ernet 0/2/2
192.168.1.17/3
0
VRF2
To NE
SmallCellSite
B1
GigabitEth
ernet 0/2/3
172.21.1.13/30
VRF1
To NE
SmallCellSite
B2
loopback0
128.4.13.13/32
Router ID
GE0/2/0.2
172.21.1.22/30
VRF1
To Next905
192.168.1.22/3
0
VRF2
To Next905
vlan-type
dot1q 3
MacroCellS
ite
ATN91
0MacroC
ellSite-0
03
vlan-type
dot1q 2
GE0/2/0.3
vlan-type
dot1q 3
VPN
Instance
Name
RD
Remarks
ATN905SmallCellSiteA-001
VRF1
100:1
VRF2
100:2
ATN905SmallCellSiteB-002
VRF1
100:1
VRF2
100:2
ATN910MacroCellSite-003
VRF1
200:1
VRF2
200:2
Issue 03 (2013-11-22)
83
Configuring ATN905-SmallCellSiteA-001
1.
2.
Configuring ATN905-SmallCellSiteB-002
1.
2.
Issue 03 (2013-11-22)
84
interface GigabitEthernet0/2/3
description To SmallCellSiteB2
ip binding vpn-instance VRF1
ip address 172.21.1.13 30
Configuring ATN910-MacroCellSite-003
1.
2.
Configuration Roadmap
This topic describes the configuration roadmap for the multi-process IS-IS.
As an interior gateway protocol (IGP), the IS-IS protocol runs within an autonomous system
(AS). Also as a link status protocol, the IS-IS protocol calculates routes by running the shortest
path first (SPF) algorithm. To support large-scale networks, the IS-IS protocol uses a 2-level
structure in the route domain and enables the division of 1 domain into multiple areas. Generally
speaking, the level-1 router is deployed within an area, the level-2 router among areas, and the
level-1-2 router between the level-1 router and level-2 router. In the OSPF, routes between
different areas are advertised through the backbone area and the SPF algorithm is used only
within the same area. In the IS-IS, however, the SPF algorithm is used for both level-1 and
level-2 routes to generate shortest path trees (SPTs).
Issue 03 (2013-11-22)
85
10.182.1.1 32(VRF1)
10.224.1.132(VRF1)
GE0/2/2
GE0/2/1
GE0/2/1
GE0/2/2
GE0/2/3
GE0/2/0
GE0/2/0
GE0/2/3
IPRAN
RNC/SGW
10.182.1.3 32(VRF1)
10.224.1.3 32(VRF1)
Configure an IS-IS process number for each virtual private network (VPN).
2.
3.
Configure a static route between the ATN 905 and its directly-connected small-cell base
station.
4.
Import static routes and direct routes to the IS-IS configured on the ATN 905.
Data Planning
This topic describes the data planning for IS-IS configuration.
Table 4-6 IS-IS parameters
Parameter
Value
Remarks
isis
Issue 03 (2013-11-22)
86
Parameter
Value
Remarks
network-entity
ISIS 1001
l ATN905SmallCellSiteA-001:
49.0020.0010.0100.1001
.00
l ATN905SmallCellSiteB-002:
49.0020.0010.0100.1002
.00
l ATN910MacroCellSite-003:
49.0020.0010.0100.1003
.00
ISIS 1002
l ATN905SmallCellSiteA-001:
49.0020.0010.0100.1001
.00
NOTICE
You are advised to convert
loopback interface addresses
into NETs to ensure that each
NET is unique on a network. If
network NETs are not unique,
route flapping easily occurs.
Therefore, the NETs must be
properly planned. When
creating a level-2 neighbor, ISIS does not check whether the
area addresses of devices in the
level-2 area are the same. If a
level-1 neighbor needs to be
created, the area addresses of
devices in the level-1 area must
be the same; otherwise, the
level-1 neighbor cannot be
created.
l ATN905SmallCellSiteB-002:
49.0020.0010.0100.1002
.00
l ATN910MacroCellSite-003:
49.0020.0010.0100.1003
.00
Issue 03 (2013-11-22)
is-level
Level-2
cost-style
Wide
is-name
timer lspgeneration
1 50 50
87
Parameter
Value
Remarks
flash-flood
level-2
Configure static routes from the ATN 905 to its directly-connected small-cell base stations.
ip route-static vpn-instance VRF1 10.182.1.1 32 172.21.1.6 //10.182.1.1 is the
logical address of the small-cell base station and 172.21.1.6 is the IP address
of the interface connecting the small-cell base station to the network.
ip route-static vpn-instance VRF1 10.224.1.1 32 172.21.1.6
ip route-static vpn-instance VRF2 10.182.1.2 32 192.168.1.2
ip route-static vpn-instance VRF2 10.224.1.2 32 192.168.1.2
Configuring ATN905-SmallCellSiteB-002
l
Issue 03 (2013-11-22)
88
interface GigabitEthernet0/2/0.2
isis enable 1001
interface GigabitEthernet0/2/1.2
isis enable 1001
isis 1002 vpn-instance VRF2
is-level level-2
cost-style wide
timer lsp-generation 1 50 50 level-2
flash-flood level-2
network-entity 49.0020.0010.0100.1002.00
is-name ATN905-SmallCellSite1-001
import-route static cost 15
import-route direct cost 15
interface GigabitEthernet0/2/0.3
isis enable 1002
interface GigabitEthernet0/2/1.3
isis enable 1002
If the small-cell base station uses a logical address, a static route leading to the logical
address of the small-cell base station must be configured.
ip
ip
ip
ip
route-static
route-static
route-static
route-static
vpn-instance
vpn-instance
vpn-instance
vpn-instance
VRF1
VRF1
VRF2
VRF2
10.182.1.1
10.224.1.1
10.182.1.2
10.224.1.2
32
32
32
32
192.168.1.14
192.168.1.14
192.168.1.18
192.168.1.18
Configuring ATN910-MacroCellSite-003
l
89
Run the display ip routing-table vpn-instance command to view the brief information about
the IPv4 routing table.
Run the display ip routing-table vpn-instance verbose command to view the detailed
information about the IPv4 routing table.
time=2
time=1
time=1
time=1
time=1
Issue 03 (2013-11-22)
90
10.182.1.1 32(VRF1)
10.224.1.132(VRF1)
GE0/2/2
GE0/2/2
GE0/2/1
GE0/2/1
GE0/2/3
IPRAN
GE0/2/0
GE0/2/0
GE0/2/3
RNC/SGW
GE0/2/1.2 OSPF 1001 VRF1
GE0/2/1.3 OSPF 1002 VRF2
10.182.1.2 32(VRF2)
10.224.1.2 32(VRF2)
10.182.1.3 32(VRF1)
10.224.1.3 32(VRF1)
Configure a static route between the ATN 905 and its directly-connected small-cell base
station.
Import static routes and direct routes to the OSPF configured on the ATN 905.
Data Planning
This topic describes the data planning for Open Shortest Path First (OSPF) deployment.
Table 4-7 OSPF parameters
Parameter
Value
Remarks
ospf
spf-scheduleinterval
Initial interval: 50 ms
Incremental interval: 50 ms
Issue 03 (2013-11-22)
91
Parameter
Value
Remarks
lsa-originateinterval
Initial interval: 50 ms
Incremental interval: 50 ms
lsa-arrivalinterval
For ATN905-SmallCellSiteB-002
l
Issue 03 (2013-11-22)
92
For ATN910-MacroCellSite-003
l
Run the display ip routing-table vpn-instance command to view the brief information about
the IPv4 routing table.
Run the display ip routing-table vpn-instance verbose command to view the detailed
information about the IPv4 routing table.
Issue 03 (2013-11-22)
93
ms
Reply from 172.21.1.5: bytes=56 Sequence=3 ttl=251 time=1
ms
Reply from 172.21.1.5: bytes=56 Sequence=4 ttl=251 time=1
ms
Reply from 172.21.1.5: bytes=56 Sequence=5 ttl=251 time=1
ms
Configuration Roadmap
Traditional IP networks in best-effort mode are mainly used to carry data services, and the service
quality seems insignificant. However, with fast development of IP-oriented Internet services and
emerging of various new services (such as VoIP and VPN services), IP networks have changed
from pure data networks to bearer networks with commercial values. Therefore, IP networks
must ensure the quality of each type of service that they carry. Against this backdrop, quality of
service (QoS) is developed.
The ATN 905 functions as a small-cell base station bearer device or enterprise private line
Ethernet demarcation device (EDD). When configured with simple traffic classification, the
ATN 905 can manage the traffic. Priority mapping based on simple traffic classification indicates
that the priority of the packets on a network is mapped into the packets of another network so
that the packets of the first network can be transmitted on the second network based on the
original or user-defined packet priority. That is, on the ingress, the packets obtain the priority
and color for scheduling on the ATN equipment based on the values of the DSCP and 802.1p
fields. After being scheduled on the ATN equipment, the outgoing packets obtain the values of
the priority fields (such as DSCP and 802.1p) for encapsulation based on the above-mentioned
priority and color. In this manner, during traffic management, packets of different services join
different queues, ensuring differentiated scheduling.
To configure simple traffic classification, do as follows:
Issue 03 (2013-11-22)
94
Bind the default DiffServ domain to service interfaces (including main interfaces and
subinterfaces) of the ATN 905 to configure simple traffic classification.
Data Planning
NOTE
Set these parameters based on the actual network conditions such as network scale and topology. The
following recommended values in this example are only for reference.
Parameter
Value
Description
trust upstream
default
Application Process
l
For ATN905-SmallCellSiteA-001
interface GE0/2/1.2
trust upstream default
interface GE0/2/1.3
trust upstream default
interface GE0/2/2
trust upstream default
interface GE0/2/3
trust upstream default
For ATN905-SmallCellSiteB-002
interface GE0/2/0.2
trust upstream default
interface GE0/2/0.3
trust upstream default
interface GE0/2/1.2
trust upstream default
interface GE0/2/1.3
trust upstream default
interface GE0/2/2
trust upstream default
interface GE0/2/3
trust upstream default
For ATN910-MacroCellSite-003
interface GE0/2/0.2
trust upstream default
interface GE0/2/0.3
trust upstream default
95
To ensure that most services run normally on a current communication network, devices on the
entire network should keep the frequency or phase difference within a permitted range. That is,
synchronization, either frequency synchronization or phase synchronization, must be ensured
on the network. Frequency synchronization (also known as clock synchronization) indicates that
signals retain certain relationships with respect to the phase. That is, the phase difference between
signals is constant. Phase synchronization (also known as time synchronization) indicates that
signals have the same frequency and phase. That is, there is no phase difference between signals.
For example, if two watches always indicate the same time, they are in phase synchronization;
if the two watches always have a constant time difference (such as 6 hours), they are in frequency
synchronization. In the IP RAN scenario, the ATN equipment needs to support frequency or
phase synchronization to meet the requirements of base stations.
Mainstream PSN-based synchronization technologies in the industry include IEEE 1588v2 and
synchronous Ethernet. In this solution, you are advised to configure synchronous Ethernet and
IEEE 1588v2 on the ATN 905 to achieve frequency synchronization and phase synchronization
respectively.
Figure 4-14 Networking diagram for clock deployment
Micro/Pico
Micro/Pico
BITS
GE0/2/2
GE0/2/3
pri 20
GE0/2/1
GE0/2/2
GE0/2/1
pri 20
GE0/2/0 GE0/2/0
ASG
pri 10
RSG
GE0/2/3
The preceding figure shows how to configure a clock. The configuration roadmap is as follows:
l
Enable synchronous Ethernet and IEEE 1588v2 for the ATN 905, so that the ATN 905 can
track the upstream clock information and time information, and send them to base stations.
For synchronous Ethernet, configure clock signal priorities in the local priority list, and
enable synchronization status message (SSM) control.
NOTE
For synchronous Ethernet clock synchronization, a clock source is selected based on the following
descending order of priority: SSM clock quality, local priority setting, and clock source type.
l The SSM clock quality levels are in the following descending order: primary reference clock (PRC),
SSUA, SSUB, SDH equipment clock (SEC), and DNU. A source for which no quality level is defined,
and a clock source with quality level being DNU, are not be selected during source selection.
l The local priority is configured as follows: The value range is 1 to 255, and a smaller value indicates
a higher priority.
Issue 03 (2013-11-22)
96
For IEEE 1588v2, use the best master clock (BMC) algorithm.
NOTE
When the BMC algorithm is used by a 1588v2-enabled device for master clock selection, priority1 of each
candidate time source is compared first, then the clock class, clock accuracy, and priority2. If priority1 of
candidate time sources is the same, the clock class is compared, and so on. The time source with the highest
priority is selected as the master clock.
Parameter
Value
Remarks
ATN905SmallCellSiteA-001
Local priority
list
20
Clock output
port
GE0/2/2
ATN905SmallCellSiteB-002
ATN910MacroCellSite-003
GE0/2/3
Parameter
Value
Remarks
ATN905-SmallCellSiteA-001
Port delay
measurement
mechanism
delay
The mechanism is
recommended to be
set consistently
networkwide.
NE type
BC
The networkwide BC
mode is
recommended.
Ring network
asymmetry automeasurement
enable
Automatically adjusts
the length difference
between transmit and
receive fibers when
ring network
protection switching
occurs for restoration.
GE0/2/2
Connects to a base
station.
ATN905-SmallCellSiteB-002
ATN910-MacroCellSite-003
GE0/2/3
Issue 03 (2013-11-22)
97
Configure NE ATN905-SmallCellSiteA-001
clock ethernet-synchronization enable //Enables global synchronous Ethernet in the
system view.
clock ssm-control on //Configures SSM for source selection. By default, SSM is
enabled for an ATN NE.
interface GigabitEthernet0/2/1
clock priority 20//Assigns a clock priority to the interface. This will affect
clock selection in the inbound direction on the local end. A smaller value
indicates a higher priority. Assigning the highest priority to each interface on
the shortest path for clock signal transmission is recommended.
clock synchronization enable//Enables synchronous Ethernet for an interface.
interface GigabitEthernet0/2/0
clock synchronization enable
interface GigabitEthernet0/2/2
clock synchronization enable
Configure NE ATN905-SmallCellSiteB-002
clock ethernet-synchronization enable
clock ssm-control on
interface GigabitEthernet0/2/0
clock priority 20
clock synchronization enable
interface GigabitEthernet0/2/1
clock synchronization enable
interface GigabitEthernet0/2/2
clock synchronization enable
interface GigabitEthernet0/2/3
clock synchronization enable
Configure NE ATN910-MacroCellSite-003
clock ethernet-synchronization enable
clock ssm-control on
interface GigabitEthernet0/2/0
clock synchronization enable
interface GigabitEthernet0/2/1
clock synchronization enable
Configure NE ATN905-SmallCellSiteA-001
ptp enable //Enables global IEEE 1588v2.
ptp device-type bc //Specifies the BC mode for all devices.
interface GigabitEthernet0/2/1
ptp delay-mechanism delay
ptp enable
interface GigabitEthernet0/2/2
ptp delay-mechanism delay //Configures the delay measurement mechanism of a
device as delay which calculates the time difference based on the link delay of the
master and slave clocks.
ptp enable //Enables IEEE 1588v2 for the interface.
interface GigabitEthernet0/2/3
ptp delay-mechanism delay
ptp enable
Configure NE ATN905-SmallCellSiteB-002
ptp enable
ptp device-type bc
Issue 03 (2013-11-22)
98
interface GigabitEthernet0/2/0
ptp delay-mechanism delay
ptp enable
interface GigabitEthernet0/2/1
ptp delay-mechanism delay
ptp enable
interface GigabitEthernet0/2/2
ptp delay-mechanism delay
ptp enable
interface GigabitEthernet0/2/3
ptp delay-mechanism delay
ptp enable
Configure NE ATN910-MacroCellSite-003
ptp enable
ptp device-type bc
interface GigabitEthernet0/2/0
ptp delay-mechanism delay
ptp enable
interface GigabitEthernet0/2/1
ptp delay-mechanism delay
ptp enable
Issue 03 (2013-11-22)
99
Issue 03 (2013-11-22)
100
Overview
Solution 3: Native Ethernet access (native Ethernet + public network IGP management
plane + hybrid interface access)
Figure 5-1 Example network of native Ethernet access
VLAN
(10,20)
VLAN
(30,40)
Macro Cell
ATN 905
IPRAN
ATN 905
CSG
VLAN
(30,40)
Issue 03 (2013-11-22)
VLAN
(10,20)
RNC
Trunk interface
Dot1q sub-interface
Management plane
VLAN(10,20) service flow
VLAN(30,40) service flow
101
Applicable
Scenario
Solution
Advantage
Solution
Constraint
l Service
configurations
for small-cell
base stations:
native Ethernet
1. Scenario in which
the carrier
solution on the
macro base
station side
adopts the Layer
2 access solution
1. Users' IP address
planning does not
need to be
concerned.
1. The loopbreaking
protocols need to
be deployed to
prevent Layer 2
broadcast storms.
l Management
plane:
public network
IGP management
plane
l Native Ethernet
access:
hybrid interface
access
2. Ethernet
demarcation
device (EDD)
scenario
2. Users' VLANs
are not isolated
from carriers'
VLANs.
3. Scenario in which
users' VLANs are
not isolated from
carriers' VLANs
Configuration Roadmap
Small-cell base station packets need to be transparently transmitted to the CSG. The
configuration roadmap is as follows:
l
Add each AC port of the ATN 905 into the VLANs to which the small-cell base station
data belongs, and add the NNI interfaces of the ATN 905 into the VLANs to which the AC
ports belong.
Establish a management plane between the ATN 905 and the CSG based on public network
subinterfaces.
Configure L2VPNs for packets with different VLAN tags on each AC port of the CSG.
Data Planning
Item
Planning Guidelines
Basic configuration
parameters:
l NE name
l User login parameter
l SNMP
l AAA
Issue 03 (2013-11-22)
102
Item
Planning Guidelines
1. The VLAN (to which the small-cell base station data belongs)
need to be planned.
l VLAN ID
ATN 905 data:
l Management
subinterfaces and
their IP addresses
Clock
SyncE and 1588v2 functions are enabled on the ATN 905 so that
the ATN 905 traces the clock and time of the upstream device
and transmits the clock signals to base stations.
network
SSH Client
SSH Server
Prerequisite
l
The ATN 905 has been logged in using the console interface and an IP address for each
interface has been configured on the ATN 905.
A direct or reachable route exists between the SSH client and the ATN 905.
Issue 03 (2013-11-22)
103
NOTE
Perform the following configurations on the ATN 905 that serves as the SSH server. This section describes only
the SSH login by using the PuTTY program.
Procedure
Step 1 As shown in the following figure, set the IP address of the ATN 905 to 192.168.1.1 and the login
protocol to SSH.
NOTE
After the ATN is powered on for the first time, you can log in to it in STelnet mode. The IP address of the
management network interface Ethernet0/0/0 (the console interface) is 129.0.0.1. If the ATN has accessed
the network when it is powered on for the first time, its IP address 129.0.0.1 will be automatically changed
to the IP address that DHCP obtains during the startup.
Step 2 Enter the user name root and the password Changeme_123.
NOTE
After the ATN is powered on for the first time, you can log in to it in STelnet mode. The user name and
password are root and Changeme_123 respectively. After logging in to the ATN, change the default
password in time.
Issue 03 (2013-11-22)
104
----End
Context
Figure 5-5 shows the networking diagram for logging in to the NE80E/40E by using the console
interface.
Figure 5-5 Networking diagram for logging in to the ATN 905 by using the console interface
PC
ATN
Prerequisite
l
Issue 03 (2013-11-22)
105
Procedure
Step 1 Use a serial cable to connect the serial interface on the PC and the console interface on the ATN
905.
For more information about the console interface, see the ATN 905Multi-service Access
EquipmentHardware Description.
Step 2 Start the HyperTerminal on the PC.
Choose Start > Programs > Accessories > Communications to start the HyperTerminal in
Windows.
Step 3 Set up a connection.
As shown in Figure 5-6, enter the name of the new connection in the Name text box, and select
an icon. Then, click OK.
Figure 5-6 Setting up a connection
Issue 03 (2013-11-22)
106
l Setting the COM1 properties according to the description in Figure 5-8 and setting them by clicking
Restore Defaults have the same effect. The default settings of the console interface will be used.
l When you log in to the ATN 905 by using the console interface, ensure that the COM1 properties on
the HyperTerminal are consistent with the interface attribute settings on the ATN 905. Otherwise, the
login will fail. This means that if default settings are not used for the interface attributes on the ATN
905, the COM1 properties on the HyperTerminal must be changed to be consistent with the interface
attribute settings on the ATN 905.
Issue 03 (2013-11-22)
107
----End
Commissioning Result
After the preceding configurations are complete, press Enter. An initial password is required
for the first login. Set an authentication password. The system automatically saves the set
password.
An initial password is required for the first login via the console.
Set a password and keep it safe! Otherwise you will not be able to login via the
console.
Please configure the login password (6-16)
Enter Password:
Confirm Password:
If the login fails, click Disconnect and then Call. If the login still fails, repeat Step 1 to check
whether the parameters or physical connections are correct. If they are correct, log in to the ATN
905 again.
Issue 03 (2013-11-22)
108
Data Planning
An NE name consists of the site name, device model, and device number. Each NE is named in
the format of AA-BB-CC. The following provides the meaning of the letters.
l
Value
Description
sysname
ATN905SmallCellSiteA-001
NOTE
All the NEs involved in this document are named as shown in the following figure.
SmallCellSiteA1
Macro Cell
Micro/Pico
ATN905SmallCellSiteB-002
Micro/Pico
Micro/Pico
ATN905SmallCellSiteA-001
IPRAN
ATN910MacroCellSite-003
RNC
Micro/Pico
SmallCellSiteA2
SmallCellSiteB2
Configuration Process
l
Issue 03 (2013-11-22)
109
Data Planning
To log in to an ATN device in telnet or Secure Shell (SSH) mode, you can configure the VTY
user interface to ensure equipment security. The following parameters are involved: the
maximum number of VTY user interfaces, user authentication mode, user privilege, and VTY
attributes.
l
By setting the maximum number of VTY user interfaces, you can limit the number of users
who can log in to the ATN device concurrently.
By setting the user authentication mode, you can enhance the equipment security. The user
authentication mode can be set to AAA authentication or password authentication.
1.
The AAA authentication mode is based on users, ensuring high security. To log in to
the ATN device, you need to enter the user name and password.
2.
By setting the user privilege, you can differentiate the access rights of different users on
the ATN device to enhance the management security. User privileges are divided into 16
levels, which are numbered 0 to 15. A larger value indicates a higher user privilege.
You can configure the VTY attributes of a VTY user interface, such as the timeout interval
of communication failure for login users. Each VTY attribute on the VTY user interface
has a default value on the ATN device. You can re-configure the terminal attributes as
required.
NOTE
Set these parameters based on the actual network conditions, such as network size and topology. The
following recommended values in this example are only for reference.
Parameter
Value
Description
user-interface
maximum-vty
15
Issue 03 (2013-11-22)
110
Parameter
Value
Description
user-interface
vty 0 14
authentication-mode
aaa
protocol inbound
ssh
user privilege
level 3
idle-timeout
50
Configuration Process
Perform the following configurations on all ATN devices:
1.
2.
Data Planning
If the user authentication mode is set to AAA authentication in an ATN device, a user needs to
keep the login user name and password properly, and uses them to log in to the ATN device.
The levels of commands that can be used by users logging in to an ATN device concurrently are
determined by the privileges of these users in the AAA configuration.
Issue 03 (2013-11-22)
111
NOTE
Set these parameters based on the actual network conditions, such as network size and topology. The
following recommended values in this example are only for reference.
Parameter
Value
Description
aaa
local-user XXX
password cipher XXX
USER01
local-user level
local-user xxx
service-type xxx
USER01
Hello@*#123
ssh
Configuration Process
Perform the following configurations on all ATN devices:
aaa
local-user USER01 password cipher Hello@*#123 //Add a local uer (USER01) and set
the password.
local-user USER01 level 3 //Set the user level of the local user.
local-user USER01 service-type ssh //Set the access type for the user.
NOTE
Requirements on user names and passwords for ATN products are as follows:
l A local user name contains 1 to 253 characters.
l A password must contain eight characters at least.
l A password must contain digits, upper-case and lower-case letters, and special characters, excluding
question marks (?) and spaces.
l The password cannot be the same as the user name or the user name in reverse order.
112
Data Planning
The SNMP is a standard network management protocol widely used on TCP/IP networks. The
NMS can manage NEs using the SNMP. Specifically, the SNMP defines several device
management operations that can be performed by the NMS and alarms that can be automatically
sent to the NMS when the ATN equipment is faulty. The NMS uses the management information
base (MIB) to identify and manage devices. The SNMP versions include SNMPv1, SNMPv2c,
and SNMPv3, which are all supported by the ATN 905.
The Link Layer Discovery Protocol (LLDP) is a Layer 2 discovery protocol defined in 802.1ab.
When the ATN and its neighbors are all enabled with LLDP, the ATN notifies the neighbors of
its status and obtains the status of the neighbors through LLDP packets. The NMS then can get
information about Layer 2 connection of the ATN. In this manner, the NMS can analyze the
network topology.
NOTE
Set these parameters based on the actual network conditions, such as network size and topology. The
following recommended values in this example are only for reference.
Issue 03 (2013-11-22)
Parameter
Value
Description
snmp-agent
snmp-agent sys-info
version
all
snmp-agent mib-view
included iso-view
iso
snmp-agent
community read
cipher
Huawei123!
snmp-agent
community write
cipher
Huawei@123
snmp-agent trap
enable
mib-view iso-view
mib-view iso-view
113
Parameter
Value
Description
snmp-agent trap
source
LoopBack0
address udp-domain
20.20.20.20
params securityname
Huawei@123 v2c privatenetmanager ext-vb
snmp-agent trap
enable feature-name
lldp
snmp-agent extend
error-code
enable
lldp enable
Application Process
Perform the following configurations on all ATN devices:
snmp-agent
snmp-agent sys-info version all //Enable SNMP of all versions for the system.
snmp-agent mib-view included iso-view iso //Include the iso subtree SNMP MIB
view.
snmp-agent community read cipher Huawei123! mib-view iso-view
snmp-agent community write cipher Huawei@123 mib-view iso-view //Set the read and
write permissions for the write attributes. When the read entity name and write
entity name are the same, the write attribute command will override the read
attribute command.
snmp-agent trap enable
snmp-agent target-host trap address udp-domain 20.20.20.20 params securityname
Huawei@123 v2c private-netmanager ext-vb //When the management plane is deployed
on public network routes, SNMP trap messages can be sent to the U2000 at management
IP address 20.20.20.20 using entity name Huawei@123. If an NMS provided by Huawei
is used, configure private-netmanager and ext-vb.
snmp-agent trap source LoopBack0 //Set the source interface for trap messages.
snmp-agent trap enable feature-name lldp
snmp-agent extend error-code enable
lldp enable
114
separate the management and service planes. A user operates and manages devices using the
management plane and deploys services using other planes, such as the service plane. That is,
the logical channels of the management plane and other planes are separated. When the
management plane becomes abnormal, other planes can still be used; when other planes become
abnormal, devices can still be managed.
The configuration roadmap is as follows:
l
Establish a management plane between the ATN 905 and the CSG based on public network
Interior Gateway Protocol (IGP) routes.
Data Planning
NOTE
Set these parameters based on the actual network conditions, such as network size and topology. The
following recommended values and precautions in this example are for reference only.
GE0/2/1.1 dot1q 1
192.168.1.9/30
GE0/2/1.1 dot1q 1
192.168.1.10/30
Loopback0
128.4.11.11/32
IPRAN
GE0/2/0
GE0/2/0
Loopback0
128.4.12.12/32
Loopback0
128.4.13.13/32
RNC/SGW
Interface
IP Address
OSPF
Process
ID
VPN
ATN905SmallCellSiteA-001
Loopback0
128.4.11.11 32
1001
Loopback10
10.182.1.1 32
GigabitEthernet
0/2/1.1
192.168.1.9 30
vlan-type dot1q 1
ATN905SmallCellSiteB-002
Issue 03 (2013-11-22)
Loopback0
128.4.12.12 32
Loopback10
10.182.1.2 32
115
NE Name
Interface
IP Address
OSPF
Process
ID
GigabitEthernet
0/2/0.1
192.168.1.21 30
NOTE
The
OSPF
process
ID must
be the
same as
the
manage
ment
OSPF
process
ID on
the
macro
base
station
side.
vlan-type dot1q 1
GigabitEthernet
0/2/1.1
192.168.1.10 30
vlan-type dot1q 1
ATN910MacroCellSite-003
Loopback0
128.4.13.13 32
Loopback10
10.182.1.3 32
GigabitEthernet0/2
/0.1
192.168.1.22 30
vlan-type dot1q 1
VPN
Configuring ATN905-SmallCellSiteA-001
interface GigabitEthernet0/2/1.1
description NNI
vlan-type dot1q 1
ip address 192.168.1.9 30
interface Loopback0 //Set the router ID.
ip address 128.4.11.11 32
interface Loopback10 //Set the management IP address.
ip address 10.182.1.1 32
ospf 1001 router-id 128.4.11.11 //Configure an IGP route between management IP
addresses.
area
0.0.0.1
network 10.182.1.1
0.0.0.0
network 192.168.1.0 0.0.0.3
Configuring ATN905-SmallCellSiteB-002
interface GigabitEthernet0/2/0.1
description ToNext905
vlan-type dot1q 1
ip address 192.168.1.10 30
interface GigabitEthernet0/2/1.1
description NNI
vlan-type dot1q 1
ip address 192.168.1.21 30
interface Loopback0
ip address 128.4.12.12 32
Issue 03 (2013-11-22)
116
interface Loopback10
ip address 10.182.1.2 32
ospf 1001 router-id
128.4.12.12
area
0.0.0.1
network 10.182.1.2
0.0.0.0
network 192.168.1.0 0.0.0.3
Configuring ATN910-MacroCellSite-003
interface GigabitEthernet0/2/0.1
description NNI
vlan-type dot1q 1
ip address 192.168.1.22 30
interface Loopback0
ip address 128.4.13.13 32
interface Loopback10
ip address 10.182.1.3 32
ospf 1001 router-id
128.4.13.13
area
0.0.0.1
network 10.182.1.3
0.0.0.0
network 192.168.1.0 0.0.0.3
Issue 03 (2013-11-22)
117
VLAN:30,40
VLAN:10,20
GE0/2/2
GE0/2/2
GE0/2/1
GE0/2/1
GE0/2/0
IPRAN
GE0/2/0
GE0/2/3
GE0/2/3
RNC/SGW
VLAN:10,20
VLAN:30,40
Configure the AC interface and NNI-side interface on the ATN 905 as trunk interfaces and
allow packets with the VLAN of the small-cell base station to pass through.
Set these parameters based on the actual network conditions such as network scale and topology. The
following recommended values in this example are only for reference.
Interface
VLAN
Remarks
ATN905SmallCellSiteA-00
1
GigabitEthernet
0/2/1
To Next905
GigabitEthernet
0/2/2
To SmallCellSiteA1
GigabitEthernet
0/2/3
To SmallCellSiteA2
GigabitEthernet
0/2/0
To MacroCellSite
GigabitEthernet
0/2/1
To Next905
GigabitEthernet
0/2/2
To SmallCellSiteB1
ATN905SmallCellSiteB-02
Issue 03 (2013-11-22)
118
NE Name
ATN910MacroCellSite-003
Interface
VLAN
Remarks
GigabitEthernet
0/2/3
To SmallCellSiteB2
GigabitEthernet
0/2/0.1
vlan-type dot1q 10
To Next905
GigabitEthernet
0/2/0.2
vlan-type dot1q 20
To Next905
GigabitEthernet
0/2/0.3
vlan-type dot1q 30
To Next905
GigabitEthernet
0/2/0.4
vlan-type dot1q 40
To Next905
Digital Subscriber Line (DSL) is a technology that provides digital connections over the copper
wire or a local telephone network. xDSL refers to various DSL technologies. It is a family of
bandwidth-efficient modulation techniques developed to achieve extremely high data transfer
rates over twisted-pair cables. The ATN 905 supports VDSL2, an xDSL technology. VDSL2 is
an extension to VDSL1. In this scenario, the upstream interface on ATN905-ATN905SmallCellSiteB-002 can be a VDSL2 or Ethernet interface.
l
Issue 03 (2013-11-22)
119
interface GigabitEthernet0/2/2
portswitch
port link-type trunk
port trunk allow-pass vlan 10 20 30 40
interface GigabitEthernet0/2/3
portswitch
port link-type trunk
port trunk allow-pass vlan 30 40
interface GigabitEthernet0/2/4
portswitch
port link-type trunk
port trunk allow-pass vlan 10 20
NOTE
In this scenario, the ATN 905 uses a VDSL2 interface to connect to a DSLAM. For detailed DSLAM
configuration, see corresponding documents of the access network.
Configuring ATN910-MacroCellSite-003
interface GigabitEthernet0/2/0.1
vlan-type dot1q 10 //Configure a VLAN for the dot1q VLAN tag termination subinterface.
mpls l2vc 11.0.0.31 510 control-word raw
mpls l2vc 11.0.0.32 511 control-word raw secondary
mpls l2vpn redundancy master
mpls l2vpn reroute delay 500
mpls l2vpn stream-dual-receiving
mpls l2vpn arp-dual-sending
interface GigabitEthernet0/2/0.2
vlan-type dot1q 20
mpls l2vc 11.0.0.33 512 control-word raw
mpls l2vc 11.0.0.34 513 control-word raw secondary
mpls l2vpn redundancy master
mpls l2vpn reroute delay 500
mpls l2vpn stream-dual-receiving
mpls l2vpn arp-dual-sending
interface GigabitEthernet0/2/0.3
vlan-type dot1q 30
mpls l2vc 11.0.0.35 514 control-word raw
mpls l2vc 11.0.0.36 515 control-word raw secondary
mpls l2vpn redundancy master
mpls l2vpn reroute delay 500
mpls l2vpn stream-dual-receiving
mpls l2vpn arp-dual-sending
interface GigabitEthernet0/2/0.4
vlan-type dot1q 40
mpls l2vc 11.0.0.37 516 control-word raw
mpls l2vc 11.0.0.38 517 control-word raw secondary
Issue 03 (2013-11-22)
120
l2vpn
l2vpn
l2vpn
l2vpn
redundancy master
reroute delay 500
stream-dual-receiving
arp-dual-sending
Configuration Roadmap
Traditional IP networks in best-effort mode are mainly used to carry data services, and the service
quality seems insignificant. However, with fast development of IP-oriented Internet services and
emerging of various new services (such as VoIP and VPN services), IP networks have changed
from pure data networks to bearer networks with commercial values. Therefore, IP networks
must ensure the quality of each type of service that they carry. Against this backdrop, quality of
service (QoS) is developed.
The ATN 905 functions as a small-cell base station bearer device or enterprise private line
Ethernet demarcation device (EDD). When configured with simple traffic classification, the
ATN 905 can manage the traffic. Priority mapping based on simple traffic classification indicates
that the priority of the packets on a network is mapped into the packets of another network so
that the packets of the first network can be transmitted on the second network based on the
original or user-defined packet priority. That is, on the ingress, the packets obtain the priority
and color for scheduling on the ATN equipment based on the values of the DSCP and 802.1p
fields. After being scheduled on the ATN equipment, the outgoing packets obtain the values of
the priority fields (such as DSCP and 802.1p) for encapsulation based on the above-mentioned
priority and color. In this manner, during traffic management, packets of different services join
different queues, ensuring differentiated scheduling.
To configure simple traffic classification, do as follows:
l
Bind the default DiffServ domain to service interfaces (including main interfaces and
subinterfaces) of the ATN 905 to configure simple traffic classification.
Data Planning
NOTE
Set these parameters based on the actual network conditions such as network scale and topology. The
following recommended values in this example are only for reference.
Issue 03 (2013-11-22)
Parameter
Value
Description
trust upstream
default
121
Application Process
l
For ATN905-SmallCellSiteA-001
interface GE0/2/1.2
trust upstream default
interface GE0/2/1.3
trust upstream default
interface GE0/2/2
trust upstream default
interface GE0/2/3
trust upstream default
For ATN905-SmallCellSiteB-002
interface GE0/2/0.2
trust upstream default
interface GE0/2/0.3
trust upstream default
interface GE0/2/1.2
trust upstream default
interface GE0/2/1.3
trust upstream default
interface GE0/2/2
trust upstream default
interface GE0/2/3
trust upstream default
For ATN910-MacroCellSite-003
interface GE0/2/0.2
trust upstream default
interface GE0/2/0.3
trust upstream default
122
Micro/Pico
BITS
GE0/2/2
pri 20
GE0/2/1
GE0/2/3
GE0/2/2
GE0/2/1
pri 20
GE0/2/0 GE0/2/0
ASG
pri 10
RSG
GE0/2/3
The preceding figure shows how to configure a clock. The configuration roadmap is as follows:
l
Enable synchronous Ethernet and IEEE 1588v2 for the ATN 905, so that the ATN 905 can
track the upstream clock information and time information, and send them to base stations.
For synchronous Ethernet, configure clock signal priorities in the local priority list, and
enable synchronization status message (SSM) control.
NOTE
For synchronous Ethernet clock synchronization, a clock source is selected based on the following
descending order of priority: SSM clock quality, local priority setting, and clock source type.
l The SSM clock quality levels are in the following descending order: primary reference clock (PRC),
SSUA, SSUB, SDH equipment clock (SEC), and DNU. A source for which no quality level is defined,
and a clock source with quality level being DNU, are not be selected during source selection.
l The local priority is configured as follows: The value range is 1 to 255, and a smaller value indicates
a higher priority.
For IEEE 1588v2, use the best master clock (BMC) algorithm.
NOTE
When the BMC algorithm is used by a 1588v2-enabled device for master clock selection, priority1 of each
candidate time source is compared first, then the clock class, clock accuracy, and priority2. If priority1 of
candidate time sources is the same, the clock class is compared, and so on. The time source with the highest
priority is selected as the master clock.
Parameter
Value
Remarks
ATN905SmallCellSiteA-001
Local priority
list
20
ATN905SmallCellSiteB-002
Issue 03 (2013-11-22)
123
NE Name
Parameter
Value
Remarks
ATN910MacroCellSite-003
Clock output
port
GE0/2/2
GE0/2/3
Parameter
Value
Remarks
ATN905-SmallCellSiteA-001
Port delay
measurement
mechanism
delay
The mechanism is
recommended to be
set consistently
networkwide.
NE type
BC
The networkwide BC
mode is
recommended.
Ring network
asymmetry automeasurement
enable
Automatically adjusts
the length difference
between transmit and
receive fibers when
ring network
protection switching
occurs for restoration.
GE0/2/2
Connects to a base
station.
ATN905-SmallCellSiteB-002
ATN910-MacroCellSite-003
GE0/2/3
Configure NE ATN905-SmallCellSiteA-001
clock ethernet-synchronization enable //Enables global synchronous Ethernet in the
system view.
clock ssm-control on //Configures SSM for source selection. By default, SSM is
enabled for an ATN NE.
interface GigabitEthernet0/2/1
clock priority 20//Assigns a clock priority to the interface. This will affect
clock selection in the inbound direction on the local end. A smaller value
indicates a higher priority. Assigning the highest priority to each interface on
the shortest path for clock signal transmission is recommended.
clock synchronization enable//Enables synchronous Ethernet for an interface.
interface GigabitEthernet0/2/0
clock synchronization enable
interface GigabitEthernet0/2/2
clock synchronization enable
Issue 03 (2013-11-22)
124
Configure NE ATN905-SmallCellSiteB-002
clock ethernet-synchronization enable
clock ssm-control on
interface GigabitEthernet0/2/0
clock priority 20
clock synchronization enable
interface GigabitEthernet0/2/1
clock synchronization enable
interface GigabitEthernet0/2/2
clock synchronization enable
interface GigabitEthernet0/2/3
clock synchronization enable
Configure NE ATN910-MacroCellSite-003
clock ethernet-synchronization enable
clock ssm-control on
interface GigabitEthernet0/2/0
clock synchronization enable
interface GigabitEthernet0/2/1
clock synchronization enable
Configure NE ATN905-SmallCellSiteA-001
ptp enable //Enables global IEEE 1588v2.
ptp device-type bc //Specifies the BC mode for all devices.
interface GigabitEthernet0/2/1
ptp delay-mechanism delay
ptp enable
interface GigabitEthernet0/2/2
ptp delay-mechanism delay //Configures the delay measurement mechanism of a
device as delay which calculates the time difference based on the link delay of the
master and slave clocks.
ptp enable //Enables IEEE 1588v2 for the interface.
interface GigabitEthernet0/2/3
ptp delay-mechanism delay
ptp enable
Configure NE ATN905-SmallCellSiteB-002
ptp enable
ptp device-type bc
interface GigabitEthernet0/2/0
ptp delay-mechanism delay
ptp enable
interface GigabitEthernet0/2/1
ptp delay-mechanism delay
ptp enable
interface GigabitEthernet0/2/2
ptp delay-mechanism delay
ptp enable
interface GigabitEthernet0/2/3
ptp delay-mechanism delay
ptp enable
Configure NE ATN910-MacroCellSite-003
ptp enable
ptp device-type bc
Issue 03 (2013-11-22)
125
interface GigabitEthernet0/2/0
ptp delay-mechanism delay
ptp enable
interface GigabitEthernet0/2/1
ptp delay-mechanism delay
ptp enable
Issue 03 (2013-11-22)
126