* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Description
SIP extensions for the IP Multimedia Subsystem wikipedia , lookup
Wireless security wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Computer network wikipedia , lookup
Deep packet inspection wikipedia , lookup
Distributed firewall wikipedia , lookup
Network tap wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Airborne Networking wikipedia , lookup
UniPro protocol stack wikipedia , lookup
eLTE2.3 CNS600 Feature Description Issue V1.0 Date 2014-01-15 HUAWEI TECHNOLOGIES CO., LTD. Copyright © Huawei Technologies Co., Ltd. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. Huawei Technologies Co., Ltd. Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129 People's Republic of China Website: http://www.huawei.com Email: [email protected] Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd i eLTE2.3 eCNS600 Feature Description Contents Contents 1 Basic Features ................................................................................................................................. 1 1.1 Basic Service .................................................................................................................................................... 1 1.1.1 eCNSFD-010200 Mobility Management ................................................................................................ 1 1.1.2 eCNSFD-010300 Security Management ................................................................................................. 3 1.1.3 eCNSFD-010400 Path Management ....................................................................................................... 7 1.1.4 eCNSFD-010500 IP Address Allocation from Local Address Pool ........................................................ 8 1.1.5 eCNSFD-010600 Integrated Subscriber Data Management ................................................................... 9 1.1.6 eCNSFD-010700 Session Management ................................................................................................ 11 1.2 User Plane ...................................................................................................................................................... 13 1.2.1 eCNSFD-030100 QoS and Traffic Management .................................................................................. 13 1.3 IP Network Management ................................................................................................................................ 13 1.3.1 eCNSFD-040100 Routing ..................................................................................................................... 13 1.3.2 eCNSFD-040200 NTP .......................................................................................................................... 15 1.3.3 eCNSFD-040300 VLAN Supporting .................................................................................................... 16 1.3.4 eCNSFD-040500 Eth-Trunk ................................................................................................................. 18 1.3.5 eCNSFD-040600 OSPFv2 .................................................................................................................... 19 1.3.6 eCNSFD-040700 VRF .......................................................................................................................... 21 1.3.7 eCNSFD-040800 Local Routing ........................................................................................................... 22 1.3.8 eCNSFD-040900 SGi Redirection ........................................................................................................ 23 1.4 Reliability ....................................................................................................................................................... 25 1.4.1 eCNSFD-050200 Board Redundant Backup ......................................................................................... 25 1.5 Operation and Maintenance ........................................................................................................................... 26 1.5.1 eCNSFD-060100 Software Management.............................................................................................. 26 1.5.2 eCNSFD-060300 Performance Management ........................................................................................ 27 1.5.3 eCNSFD-060400 Fault Management .................................................................................................... 28 1.5.4 eCNSFD-060500 Equipment Management .......................................................................................... 29 1.5.5 eCNSFD-060600 Configuration Management ...................................................................................... 32 1.5.6 eCNSFD-060700 Security Management ............................................................................................... 32 1.5.7 eCNSFD-060800 Online Documentation ............................................................................................. 34 1.5.8 eCNSFD-060900 Tracing Function ...................................................................................................... 36 1.5.9 eCNSFD-061000 Log Management ..................................................................................................... 40 1.5.10 eCNSFD-061100 Daylight Saving Time ............................................................................................. 40 1.6 Interface Function .......................................................................................................................................... 41 Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd ii eLTE2.3 eCNS600 Feature Description Contents 1.6.1 eCNSFD-070100 S1 Interface .............................................................................................................. 41 1.6.2 eCNSFD-070200 SGi Interface ............................................................................................................ 43 1.7 Basic Platform ................................................................................................................................................ 45 1.7.1 eCNSFD-080300 Linux Security Hardening ........................................................................................ 45 2 Optional Features ........................................................................................................................ 49 2.1 Security Management ..................................................................................................................................... 49 2.1.1 eCNSFD-110001 NAS Encryption and Integrity Protection (AES) ..................................................... 49 2.1.2 eCNSFD-110002 NAS Encryption and Integrity Protection (SNOW3G) ............................................ 50 2.1.3 eCNSFD-110003 O&M SSL ................................................................................................................ 51 2.2 Service Management ...................................................................................................................................... 52 2.2.1 eCNSFD-110004 Static IP Address Allocation ..................................................................................... 52 2.2.2 eCNSFD-110005 Multiple PDN Connection ........................................................................................ 53 2.2.3 eCNSFD-110008 SPI-based QoS Profile Control ................................................................................. 54 2.2.4 eCNSFD-110009 Offline Charging ....................................................................................................... 55 2.2.5 eCNSFD-110011 UE IP Address assigned by the Radius AAA Server ................................................ 59 2.2.6 eCNSFD-110012 E2E Subscriber Tracing ............................................................................................ 62 2.3 Reliability ....................................................................................................................................................... 64 2.3.1 eCNSFD-110006 eCNS Redundancy ................................................................................................... 64 2.4 Networking ..................................................................................................................................................... 66 2.4.1 eCNSFD-110007 Bidirectional Forwarding Detection (BFD) .............................................................. 66 2.4.2 eCNSFD-110010 Routing Behind MS .................................................................................................. 67 2.4.3 eCNSFD-110013 UE Fixed IP MultiHoming ....................................................................................... 69 2.4.4 eCNSFD-110014 Core Network Interoperability ................................................................................. 71 Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd iii eLTE2.3 eCNS600 Feature Description 1 Basic Features 1 Basic Features 1.1 Basic Service 1.1.1 eCNSFD-010200 Mobility Management Applicable NEs eCNS Availability The EPS mobility management (EMM) was introduced in eCNS600 V100R001. Summary EMM controls the access of a UE to the evolved universal terrestrial radio access network (E-UTRAN) and traces location information about the UE. The location information includes information about the tracking area (TA) and the eCNS where the UE is located. EMM is implemented in the following procedures: Attach Detach Tracking area update (TAU) Service request Handover Paging Purge Benefits As a basic feature of the eCNS, it enables UEs to move in an enterprise's network. Description EMM controls the access of a UE to the E-UTRAN and traces location information about the UE. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 1 eLTE2.3 eCNS600 Feature Description 1 Basic Features UE states in the E-UTRAN are divided into EMM states and EPS connection management (ECM) states: EMM states are classified into EMM-DEREGISTERED and EMM-REGISTERED. ECM states are classified into ECM-IDLE and ECM-CONNECTED. The main EMM procedures are described as follows: Attach A UE must register on the network before using network services. This registration procedure is called network attach. During the attach procedure, a default EPS bearer, which provides a permanent IP connection, is established. The policy and charging control (PCC) rules that apply to the default EPS bearer can be predefined in the PDN GW and activated by the PDN GW itself in the attach procedure. TAU In an EPS network, the basic unit of location management is TA. A TA list can contain one or more TAs. A TA list can be dynamically generated or statically configured; and. prevents a UE from frequently initiating TA update procedures. For example, when a UE frequently moves between several TAs, you can define these TAs as a TA list. This prevents the TAU procedure from being generated. A UE initiates a TAU procedure in the following scenarios: a) The UE detects that the current TA identity does not exist in the TA identity (TAI) list on the network where the UE is registered. b) The access type of the UE is changed. c) The load balancing TAU is required. d) The TAU procedure is triggered during a handover procedure. e) The periodic TAU timer has expired. f) The RRC connection has failed. Service request A service request is used to change the ECM state from ECM-IDLE to ECM-CONNECTED and to establish radio and S1-U bearers during the transfer of uplink and downlink data. When the UE is in ECM-IDLE mode, it initiates a service request procedure in the following scenarios: − The downlink signaling or data needs to be transmitted from the network side. − The uplink signaling or data needs to be transmitted from the UE side. Generally, a service request procedure is initiated by a UE. When the downlink data or information is transferred in ECM-IDLE mode, the network initiates a paging procedure. This triggers a UE to initiate a service request procedure as the paging response. Handover When the UE is in the ECM-CONNECTED state, a handover procedure is triggered after the E-UTRAN determines that reselection is required. The eCNS supports S1-based handover. Draft A (2013-04-09) S1 refers to the interface between the eNodeB and the eCNS. Detach Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 2 eLTE2.3 eCNS600 Feature Description 1 Basic Features The detach procedure is used in the following scenarios: − A UE is detached from the EPS service. − A UE is disconnected from the last PDN connection. − The network informs a UE that it cannot be connected to the EPS. A UE can be detached explicitly or implicitly. − Explicit detach: A UE or network side requests the detach, and the originating party informs the other party of this event. − Implicit detach: A network side detaches a UE without informing the UE. For example, the network side performs implicit detach to a UE when it determines that the UE is unreachable. The detach procedure is classified into three types: − Detach procedure initiated by a UE − Detach procedure initiated by an eCNS After the detach procedure is complete, the EPS bearer contexts of the UE are deactivated locally. After a UE is detached from the network, the network cannot obtain the UE location information. Paging function This is the PS domain paging function. The network originates paging by using a certain ID of a subscriber, such as GUTI or IMSI, in a known area. After obtaining a response from the subscriber, the network performs the subsequent signaling flow or data transfer. Purge After removing the subscription data and MM context of a detached UE, the MME notifies the HSS of the removal through a purge procedure. Enhancement None Dependency This feature does not depend on other features. Standards 3GPP TS 23.060, "General Packet Radio Service (GPRS); Service description" 3GPP TS 23.401, "General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access" 3GPP TS 24.008, "Mobile radio interface Layer 3 specification; Core Network protocols - Stage 3" 3GPP TS 25.413, "UTRAN Iu Interface RANAP Signaling" 3GPP TS 24.301, "Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS); Stage 3" 3GPP TS 36.413, "Evolved Universal Terrestrial Radio Access Network (E-UTRAN); S1 Application Protocol (S1AP)" 1.1.2 eCNSFD-010300 Security Management The security management feature can: Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 3 eLTE2.3 eCNS600 Feature Description 1 Basic Features Identify and authenticate users. Ensure that only legal users can access the network. Guarantee confidentiality of user identity, user data, and signaling transfer. The security management feature consists of the following sub-features: Authentication User ID confidentiality Identity check 1.1.2.1 eCNSFD-010301 Authentication Applicable NEs eCNS Availability The EPS authentication was introduced in eCNS600 V100R001. Summary The authentication feature is used in subscriber identification, authentication, and synchronization of the encryption key. This feature checks the validity of a subscriber's service requests to ensure that only legal subscribers can use network services. The authentication procedure is performed in association with EMM procedures. The authentication function has two types: authentication of the network by a UE and authentication of a UE by the network. Benefits As a basic feature of the eCNS, it prevents illegal users from accessing the network, and ensures service operation profits. Subscribers who require high security can use this function to prevent their access to unacknowledged networks, and eliminate possible security risks. Description The EPS authentication is based on a USIM. An EPS authentication vector is composed of a quartet, namely, RAND, AUTN, XRES, and KASME. Random Challenge (RAND) A RAND is a random value that the network provides to a UE. The length is 16 octets. Authentication Token (AUTN) An AUTN is used to provide the information for a UE so that the UE can use the AUTN to authenticate the network. The length is 17 octets. Expected Response (XRES) An XRES is an expected response parameter of UE authentication. It is compared with the RES or RES+RES_EXT generated by a UE to determine whether the authentication is successful. The length ranges from 4 to 16 octets. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 4 eLTE2.3 eCNS600 Feature Description 1 Basic Features Key ASME (KASME) A KASME is a root encryption key deduced from the CK/IK and the public land mobile network (PLMN) ID of the ASME (MME). The length is 32 octets. Access Security Management Entity (ASME): In E-UTRAN access mode, the MME serves as an ASME. Figure 1-1 shows the EPS authentication procedure. Figure 1-1 EPS authentication procedure 1. The eCNS sends the Authentication Request message to the UE to trigger the authentication procedure. The authentication vectors, such as RAND, AUTN, and Key Set Identifier (KSIASME) are contained in the message. 2. The UE sends the Authentication response message to the eCNS. The UE authenticates the network based on the AUTN. If the authentication fails, the UE returns the Authentication Failure message to the MME, indicating the cause. If the authentication is successful, the UE calculates the RES based on the RAND and returns the RES to the MME. The MME compares the XRES in the authentication vector set with the returned RES. If they are consistent, the authentication succeeds. Otherwise, the authentication fails. In this case, the MME sends the Authentication Reject message to the UE. If the authentication succeeds, the UE calculates and saves the KASME value for later encryption and integrity protection. ----End In addition to basic authentication features, the eCNS provides the feature to obtain authentication sets in advance. The CNS can request authentication sets before all authentication sets are used up. Therefore, the duration of the procedure for the UE to access to the eCNS is shortened and user experience is improved. Enhancement None Dependency This feature does not depend on other features. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 5 eLTE2.3 eCNS600 Feature Description 1 Basic Features Standards 3GPP TS 33.102, "3G Security; Security architecture" 3GPP TS 33.401, "3GPP System Architecture Evolution (SAE); Security architecture" 1.1.2.2 eCNSFD-010302 User Identity Confidentiality Applicable NEs eCNS Availability The EPS user identity confidentiality was introduced in eCNS600 V100R001. Summary The EPS user identity confidentiality is implemented through GUTI allocation. The GUTI is used to provide a unique temporary UE identity in the EPS network. This identity does not reveal the permanent UE identity on the LTE-Uu interface. Benefits As a basic feature of the eCNS, user identity confidentiality prevents the IMSIs of UEs from being stolen, improving network security. Description A GUTI consists of the following parts: GUMMEI: A GUMMEI consists of a mobile country code (MCC), a mobile network code (MNC), and an eCNS identity. M-TMSI: A 32-bit M-TMSI uniquely identifies a UE in an eCNS. The GUTI can be implicitly allocated in the attach or TAU procedure or explicitly allocated in the GUTI reallocation procedure. Enhancement None Dependency This feature does not depend on other features. Standards 3GPP TS 24.301, "Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS); Stage 3" 3GPP TS 24.008, "Mobile radio interface Layer 3 specification; Core Network protocols - Stage 3" Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 6 eLTE2.3 eCNS600 Feature Description 1 Basic Features 1.1.2.3 eCNSFD-010304 Identity Check Applicable NEs eCNS Availability The EPS identity check was introduced in eCNS600 V100R001. Summary The network requests different user identities, such as IMSI and IMEI, to check the real identity of a UE. Benefits This is a basic feature of the eCNS. Description When a UE attaches to the network using a GUTI, to obtain the real identity of the UE, the network sends the UE an Identity Request for IMSI, IMEI, or IMEISV. Then the UE returns an Identity Response to notify the network of its identity. After obtaining the real identity of the UE, the network checks the user identity with the HLR/HSS or EIR. For details, see section 1.1.2.1 eCNSFD-010301 Authentication. Enhancement None Dependency This feature does not depend on other features. Standards 3GPP TS 24.301, "Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS); Stage 3" 3GPP TS 24.008, "Mobile radio interface Layer 3 specification; Core Network protocols - Stage 3" 1.1.3 eCNSFD-010400 Path Management Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 7 eLTE2.3 eCNS600 Feature Description 1 Basic Features Summary The system can manage the paths by using path detection messages, and clear invalid paths. Benefits The communication between devices can be ensured. Description A GTP path is determined by a quaternary, namely, local IP address, local port, peer IP address, and peer port. The path management messages are usually sent and received between the GTP entities. The path management feature is used to detect whether the peer GTP Entity is available. The eCNS can send the path management message on all paths in use. When a path is detected as faulty, the eCNS may deactivate all PDP/EPS bearer contexts related to the path so that data packets are no longer along this path. If no signaling or data is sent or received on a path for a long period, the eCNS determines that the path is invalid and clears the path. Enhancement None Dependency This feature does not depend on other features. Standards 3GPP TS 29.060, "GPRS Tunneling Protocol (GTPv1) across the Gn and Gp interface" 3GPP TS 09.60, "GPRS Tunneling Protocol (GTPv0) across the Gn and Gp interface" 1.1.4 eCNSFD-010500 IP Address Allocation from Local Address Pool Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. Summary The eCNS allocates IPv4 addresses to UEs from its local address pool. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 8 eLTE2.3 eCNS600 Feature Description 1 Basic Features Benefits This feature provides an enhancement to eCNSFD-110004 Static IP Address Allocation and enables the eCNS to automatically create routes to UEs. Description A UE must obtain at least one IP address before it is able to access PS services. A PDN Address Allocation IE is specified during the setup of a default bearer for the UE. This IE contains protocol information (including an IP address field) the UE must obtain before it is able to access an external PDN. In addition, this IE indicates the method the UE expects to use to obtain an IP address. 3GPP TS 23.401 defines three modes of allocating IP addresses to UEs: IP address allocation from the local address pool In this mode, the eCNS allocates a dynamic IP address to a UE from the local address pool during the activation of a bearer for the UE. The local address pool contains the IP addresses planned by the enterprise customer. Static IP address allocation In this mode, the eCNS allocates IP addresses to UEs from its integrated subscriber data module. This module matches the IMSI of each UE to an IP address range planned by the enterprise customer. This mode is a pure static IP address allocation mode, which requires complex configurations. Static allocation is an optional feature and is under license control. IP address allocation from the RADIUS server In this mode, the eCNS allocates dynamic IP addresses obtained from the RADIUS server during UE authentication in the bearer activation procedure. Note that dynamic IP addresses are carried in access response messages sent by the RADIUS server. This mode is applicable to enterprise customers or internet service providers (ISPs) who manage the RADIUS server and plan IP addresses for their internal users. Enhancement None Dependency This feature does not depend on other features. Standards 3GPP TS 23.401, "General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access" 1.1.5 eCNSFD-010600 Integrated Subscriber Data Management Applicable NEs eCNS Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 9 eLTE2.3 eCNS600 Feature Description 1 Basic Features Availability This feature was introduced in eCNS600 V100R001. Summary The eCNS implements the subscriber data management function, which is generally provided by the home subscriber server (HSS) in an EPC. Benefits This feature meets the requirements of the enterprise customer for higher space utilization, low power consumption, simple service delivery system, independent service management, and capability to terminate LTE local services. Description Compared with the HSS, the eCNS has the following unique characteristics in terms of subscriber data management: Integrated subscriber data management interface The eCNS does not need to provide a standard S6a interface. Differentiated service delivery system For end users, the eCNS delivers services using MML commands. For enterprise customers, the eCNS does not interconnect with their service delivery systems. Differentiated subscriber data management The eCNS stores and manages subscriber data and simplifies data templates. The eCNS can substitute for an LTE-HSS, but not an IMS-HSS, GSM-HSS, or UMTS-HSS. The eCNS manages subscriber data as follows: − Defines a USIM card The eCNS accepts the input of the information about a USIM card. − Cancels a USIM card The eCNS removes the information about a USIM card. − Defines a subscriber The eCNS enables services for a subscriber and allocates a phone number to the subscriber. − Deregisters a subscriber The eCNS disables services for a subscriber and removes the information about this subscriber. − Allows the query of static subscriber information The eCNS allows the query of static subscriber information, including subscribed services and locking status. − Manages EPS QoS templates The eCNS allows the enterprise customer to create EPS QoS templates and set default QoS parameters. − Manages APN templates The eCNS allows the enterprise customer to create access point name (APN) templates. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 10 eLTE2.3 eCNS600 Feature Description 1 Basic Features − Manages PDP context templates The eCNS allows the enterprise customer to create PDP context templates. Enhancement None Dependency This feature does not depend on other features. Standards 3GPP TS 23.008, "Organization of subscriber data" 3GPP TS 29.002, "Mobile Application Part (MAP) specification" 1.1.6 eCNSFD-010700 Session Management Applicable NEs eCNS Availability The EPS session management (ESM) was introduced in eCNS600 V100R001. Summary The objective of EPS session management (ESM) is to manage EPS bearers. Through the E-UTRAN and EPC networks, the EPS provides an IP connection, known as the PDN connection, between a UE and the PDN. Each PDN connection consists of at least one EPS bearer. The EPS bearer refers to the logical combination of one or more service data flows (SDFs). EPS bearers are created to meet requirements of QoS management and provide control for a bearer granularity. Benefits As a basic feature of the eCNS, it enables subscribers to connect to an external PDN and perform data services. Description The ESM procedure can be initiated by the network or requested by a UE. The ESM involves the following procedures: Default EPS bearer context activation This procedure is used to set up a default EPS bearer context between a UE and the EPC. It can be part of the attach procedure or an independent procedure. Dedicated EPS bearer context activation This procedure is used to set up the special QoS and traffic flow template (TFT) bearer contexts between a UE and the EPC. Draft A (2013-04-09) EPS bearer context modification Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 11 eLTE2.3 eCNS600 Feature Description 1 Basic Features This procedure is used to modify the QoS and TFT of the EPS bearer context. EPS bearer context deactivation This procedure is used to deactivate one, several, or all the EPS bearer contexts to the PDN. If all the EPS bearer contexts to the PDN are deactivated, the connection to the PDN is disconnected. UE-requested PDN disconnection This procedure is used when the UE requests to be disconnected from the PDN. In this procedure, all the EPS bearer contexts, including the default bearer context, related to the PDN are released. NOTE The last PDN connection can be disconnected only by the detach procedure initiated by the UE or the MME, and not by the UE-requested PDN connection. UE-requested EPS bearer resource modification The procedure involves the allocation and release of UE-requested EPS bearer resources. The allocation part involves allocating EPS bearer resources to new SDFs on request from the UE. The UE can request or modify a specified QoS. It can also initiate the guaranteed bit rate (GBR) request or change the existing GBR. The release part involves releasing the EPS bearer resources related to a specified SDF on request from the UE. NOTE The UE-initiated detach procedure is used to release all bearers. Enhancement None Dependency This feature does not depend on other features. Standards 3GPP TS 23.060, "General Packet Radio Service (GPRS); Service description" 3GPP TS 23.401, "General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access" 3GPP TS 24.008, "Mobile radio interface Layer 3 specification; Core Network protocols - Stage 3" 3GPP TS 25.413, "UTRAN Iu Interface RANAP Signaling" 3GPP TS 29.060, "GPRS Tunneling Protocol (GTPv1) across the Gn and Gp interface" 3GPP TS 24.301, "Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS); Stage 3" 3GPP TS 36.413, "Evolved Universal Terrestrial Radio Access Network (E-UTRAN); S1 Application Protocol (S1AP)" 3GPP TS 29.274, "Evolved General Packet Radio Service (GPRS); Tunneling Protocol for Control plane (GTPv2-C); Stage 3" Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 12 eLTE2.3 eCNS600 Feature Description 1 Basic Features 1.2 User Plane 1.2.1 eCNSFD-030100 QoS and Traffic Management For details, see section 1.2.1.1 eCNSFD-030101 EPS QoS. 1.2.1.1 eCNSFD-030101 EPS QoS Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. Summary The eCNS supports EPS QoS control at the bearer level. Benefits As a basic feature of the eCNS, it guarantees the end-to-end QoS in the EPS network. Description EPS QoS parameters are included in the EPS bearer context. EPS QoS parameters contain uplink/downlink GBR, uplink/downlink maximum bit rate (MBR), allocation/retention priority (ARP), QCI, APN-AMBR, and UE-AMBR. Enhancement None Dependency This feature does not depend on other features. Standards 3GPP TS 23.401, "General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access" 1.3 IP Network Management 1.3.1 eCNSFD-040100 Routing For details, see section 1.3.1.1 eCNSFD-040101 Static Routes and Default Routes. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 13 eLTE2.3 eCNS600 Feature Description 1 Basic Features 1.3.1.1 eCNSFD-040101 Static Routes and Default Routes Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. Summary The eCNS, together with routers, implements routing using static routes, which are manually configured by network administrators. Default routes are special routes and can also be manually configured. The eCNS uses static routes to communicate with a network or equipment. Specifically, the configured static routes are added to a routing table. Before the eCNS sends signaling, user data, or OM packets, it searches the routing table for a next-hop router or an interface by the specified destination address and subnet mask. Benefits This feature provides multiple route options for the enterprise customer. Description Static routes apply to networks with simple architectures and static network topologies. Static routes help implement security policies. Only authorized network administrators are allowed to modify the routing table. The eCNS use static routes to communicate with OM networks, eNodeBs, and PDNs. Implementation Static routes are added to the routing table after being configured by network administrators. Multiple static routes can be configured for the same destination address. If these routes are assigned the same priority, they work in load sharing mode. If they are assigned different priorities, they work in route backup mode. Default routes are used only when no matched entries are found in the routing table. Default routes can be manually configured by network administrators or generated using dynamic routing protocols such as Open Shortest Path First (OSPF) and Intermediate System to Intermediate System (IS-IS). The configuration for default routes is simple and robust. Together with other routes, default routes ensure that packets are forwarded when no matched entries are found in the routing table. Detection Bidirectional forwarding detection (BFD) is used to check the next hop of one or more static routes. If BFD detects that the next hop is unreachable, the associated static routes are removed from the routing table. When the next hop becomes reachable, the associated static routes are added back to the routing table. Application Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 14 eLTE2.3 eCNS600 Feature Description 1 Basic Features In a network with a simple structure, static routes can be configured to ensure that the network works properly. Correct static route settings provide network security and save bandwidth resources for important applications. Default routes are used to reduce the time for selecting routes and the bandwidth for forwarding packets. Default routes can meet the requirements for simultaneous communication by a large number of users. Enhancement None Dependency Application Limitations When the network is faulty or the network topology is changed, the static routes become unavailable and must be reconfigured by network administrators. Interaction with Other Features Table 1-1 Interaction with other features Related Feature Interaction eCNSFD-110007 Bidirectional Forwarding Detection (BFD) Static routes do not have self-healing capabilities and require intervention from the network administrators when faults occur. If BFD is enabled, the route management system can check the BFD session status to determine whether the IPv4 static routes in the public network are reachable. Standards RFC 791, "Internet Protocol" RFC 1155, "Structure and Identification of Management Information for TCP/IP-based Internets" 1.3.2 eCNSFD-040200 NTP Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. Summary The Network Time Protocol (NTP) is used to synchronize the time across the entire network. The eCNS supports NTPv3 and serves as an NTP client. The eCNS periodically obtains the standard time from an NTP server located on a PS network and adjusts the system time based Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 15 eLTE2.3 eCNS600 Feature Description 1 Basic Features on this standard time. To prevent time deviation, the time on the network needs to be synchronized with the external standard time. Benefits The NTP protocol ensures the time consistency of all NEs on a network, and guarantees the accuracy and consistency of functions such as performance measurement. Description The NTP protocol is a TCP/IP protocol that is used to synchronize time on all devices across the network. NTP is based on the UDP protocol. RFC 1305 stipulates the complex algorithm used by NTP to guarantee accuracy of time synchronization. The eCNS supports connecting to a remote NTP server in client mode. The eCNS periodically obtains the standard time from an NTP server or OMC server and adjusts the time across the entire network based on this standard time. Enhancement None Dependency This feature does not depend on other features. Standards RFC 1305, "Network Time Protocol" 1.3.3 eCNSFD-040300 VLAN Supporting Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. Summary A virtual local area network (VLAN) is a logical network comprising multiple physical network devices. A VLAN forms a broadcast domain. Different VLANs communicate with each other through routes. The eCNS implements VLAN functions by setting VLAN IDs on sub-interfaces. If VLANs are implemented based on layer 3 networking, sub-interfaces are configured on Ethernet ports or trunks and defined as the members of VLANs to distinguish users or services. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 16 eLTE2.3 eCNS600 Feature Description 1 Basic Features Benefits Broadcast traffic and unicast traffic in a VLAN are not forwarded to other VLANs. This helps control network traffic, reduce equipment investments, simplify network management, and improve network security and reliability. Traffic can be isolated by adding interfaces to different VLANs. Description The eCNS provides the following VLAN functions: Isolates traffic When the eCNS uses a set of switching equipment to construct a LAN, it can assign the interfaces between NEs to different VLANs to implement traffic isolation. The eCNS can also assign the interfaces between PDNs to different VLANs to isolate users. Adapts to the peer If the routers, switches, or firewalls that are directly connected to the eCNS are assigned to different VLANs, the relevant ports on the eCNS must be divided into sub-interfaces. These sub-interfaces must also be assigned to the corresponding VLANs. Increases the number of available interfaces If the ports on the eCNS are insufficient for connecting to the routers, switches, or firewalls, these ports can be divided into sub-interfaces and VLAN IDs can be configured on these ports. If a sub-interface on the eCNS is configured with a VLAN ID, the layer-2 or layer-3 device that is directly connected to the eCNS must also be configured with the same VLAN ID. Enhancement Table 1-2 Release history and enhancement Feature Version Product Version Details eCNSFD-040 300, 02 eCNS600 V100R002 Added the function of binding VLANs and sub-interfaces. eCNSFD-040 300, 01 eCNS600 V100R001 First official release. Dependency Application Limitations This feature is applicable only when the routers, switches, and firewalls that are directly connected to the eCNS also support VLAN functions. Interaction with Other Features Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 17 eLTE2.3 eCNS600 Feature Description 1 Basic Features Table 1-3 Interaction with other features Related Feature Interaction eCNSFD-040100 Routing Route information must be configured on the eCNS. Otherwise, packets cannot be forwarded between VLANs. 1.3.4 eCNSFD-040500 Eth-Trunk Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. Summary Eth-trunk supports traffic load sharing between multiple Ethernet interfaces, which improves network reliability. Benefits This feature increases the bandwidth, improves the reliability of networking, and ensures load sharing. Description Trunk is a bundling technology. Multiple Ethernet physical interfaces can be bound into a logical interface that is known as an Eth-trunk interface. Physical interfaces that are bound are called member interfaces. The trunk link can be regarded as a point-to-point direct link. The two ends of a trunk link can be two switches, or two routers, or one switch and one router. The advantages of the Trunk technology are as follows: Increased bandwidth. The total bandwidth of the Trunk interface is the sum of the bandwidth of each member interface. In this case, the bandwidth of the trunk interface is multiplied. Improved reliability. When one physical link connected to the member interface is faulty, traffic is switched to other available links connected to the member interface. Therefore, the reliability of the entire Trunk link is improved. Load sharing support. Load sharing can be achieved among member interfaces of the Trunk interface. Network congestion occurs when all the traffic is transmitted over a single link. The trunk interface prevents network congestion by distributing the traffic among different links. The destination of the traffic remains unchanged. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 18 eLTE2.3 eCNS600 Feature Description 1 Basic Features Dependency Table 1-4 Interaction with other features Feature Interaction eCNSFD-040700 VRF Eth-Trunk supports to be joined in VRF。 eCNSFD-040600 OSPFv2 eCNS and PE device can learn dynamic routes by Eth-Trunk through OSPF route protocol. Standards IEEE 802.3AD Amendment to carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications-aggregation of multiple link segments 1.3.5 eCNSFD-040600 OSPFv2 Applicable NEs eCNS Availability This feature is introduced in eCNS600 V100R002. Summary Open Shortest Path First (OSPF) is an Interior Gateway Protocol (IGP) based on link states. OSPF is more applicable to large complex networks. The eCNS uses OSPF Version 2 (OSPFv2) on the SGi interface to exchange routing information with peer equipment and implement network topology sharing. Benefits This feature enables data packet routing over the SGi interface between an EPC and an external data network and allows flexible networking based on the customer requirements, at same time it raised up the reliability of transmission because of the mesh network. Description The eCNS supports OSPFv2. OSPF is a link-state-based IGP developed by Internet Engineering Task Force (IETF). It supports networks in different scales and allows hundreds of routers deployed in a network. OSPF has the following characteristics: Draft A (2013-04-09) Fast convergence: OSPF sends link state update packets within the autonomous system (AS) immediately after detecting changes in the network topology. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 19 eLTE2.3 eCNS600 Feature Description 1 Basic Features Loop-free routing: OSPF computes the shortest path tree for each route based on link states by using a shortest path first algorithm that can ensure loop-free routing. Area-based administration: OSPF allows the AS to be divided into routing areas for administration. OSPF uses abstract routing information between areas to reduce the network bandwidth usage. Support of equal-cost routes: OSPF supports multiple equal-cost routes to the same destination address. Route hierarchy: OSPF divides routes into four types. In descending order of priorities, these types are intra-area, inter-area, external type 1, and external type 2. Support of packet authentication: OSPF performs interface-based packet authentication to ensure the security of route computing. Support of packet multicast Routers in the AS use OSPF to process routing tables. Each router gathers its link state information and broadcasts it within the entire AS using a flooding algorithm so that the AS can maintain one link state database. Based on this database, each router computes its shortest path tree with the router itself being the root and other routers being leafs. Enhancement None Dependency Application Limitations OSPFv2 is an IGP and can be used only within an AS. For routing between different ASs, border gateway protocols such as BGP-4 need to be used. The eCNS uses OSPFv2 only on the SGi interface. Interaction with Other Features Table 1-5 Interaction with other features Feature Interaction eCNSFD-110007 Bidirectional Forwarding Detection (BFD) BFD increases the OSPF convergence rate by rapidly detecting link faults between neighboring routers. eCNSFD-040700 VRF VRF isolates routes through VRF-route binding and forwards data based on routing tables and virtual private network (VPN) IDs. eCNSFD-040100 Routing The routing feature uses routing policies to control issue, reception, and reference of OSPF routing information. eCNSFD-040500 Eth-Trunk eCNS and PE device can learn dynamic routes by Eth-Trunk through OSPF route protocol. Standards Draft A (2013-04-09) RFC 791, "Internet Protocol" Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 20 eLTE2.3 eCNS600 Feature Description 1 Basic Features RFC 1155, "Structure and Identification of Management Information for TCP/IP-based Internets" RFC 1131, "OSPF specification" RFC 1247, "OSPF Version 2" 1.3.6 eCNSFD-040700 VRF Applicable NEs eCNS Availability This feature is introduced in eCNS600 V100R002. Summary Virtual routing and forwarding (VRF) is a means of implementing the virtual private network (VPN) function. It enables the functions of multiple virtual routing devices to be implemented on a single routing device. It is also used to logically define a physical device. Each VRF has a separate routing table and address space. eCNS supports VRF, and the functions of multiple logically separated virtual eCNS can be implemented on one eCNS device. VPN instances can be created on the eCNS to implement VRF. Benefits This feature facilitates connections between the eCNS and intranets because the address spaces of APNs of carriers' private networks can be reused. APN traffic can be separated to ensure network security. Interfaces of different VPN instances can use the same IP address, which conserves public IP addresses. Description A VPN keeps the transferred data private from other VPNs. By taking advantage of this feature on the eCNS, you can bind each APN to a separate VPN to divide the traffic of different APNs. Through traffic separation and network division, the APN resources of a VPN will not be used by other VPNs or subscribers of other VPNs on the network. Therefore, the information in the VPN is secure. A eCNS can be logically divided into multiple virtual eCNS through VRF. Each virtual eCNS works independently as a eCNS and has its own routing table and interface for data forwarding. In addition, traffic of different services can be separated. Networking application: The problem of insufficient IP addresses can be solved by binding physical interfaces (or Eth-trunk interfaces or sub-interfaces), logical interfaces, and routes to VRF, and the traffic of the signaling plane, user plane, and operation and maintenance (OM) data can be separated. Service application: By binding APNs to VRF, multiple virtual routing areas are available on one eCNS to realize the separation of addresses and routes among APNs. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 21 eLTE2.3 eCNS600 Feature Description 1 Basic Features Resource application: By binding address pools to VRF, address resources can be reused. Enhancement None Dependency Table 1-6 Interaction with other features Feature Interaction eCNSFD-040600 OSPFv2 One VRF support more than OSPF process, while one OSPF process belongs to only one VRF. eCNSFD-110007 Bidirectional Forwarding Detection(BFD) In the network scenario of dual active ports with static routes, BFD should be activated in VRF in order that eCNS could switch route when old route is fault. eCNSFD-040500 Eth-Trunk Eth-Trunk supports to be joined in VRF。 eCNSFD-110010 Routing Behind MS Different UEs which support “Routing Behind MS” can be separated by different VRFs。 Standards RFC 2764, "IP Based Virtual Private Networks" 1.3.7 eCNSFD-040800 Local Routing Applicable NEs eCNS Availability This feature is introduced in eCNS600 V100R002. Summary This feature enables the eCNS to directly forward packets between UEs connected to this eCNS. Benefits This feature does not require additional network equipment on the SGi interface for packet forwarding between UEs and therefore reduces end-to-end forwarding delay. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 22 eLTE2.3 eCNS600 Feature Description 1 Basic Features Description After the eCNS receives an uplink packet from a UE, the eCNS checks the target UE. If the eCNS has admitted the target UE, the eCNS directly forwards the packet to the target UE, as shown in Figure 1-2. Figure 1-2 Local routing Enhancement None Dependency Table 1-7 Interaction with other features Feature Interaction eCNSFD-040900 SGi Redirection Local routing does not take effect if SGi redirection is enabled. Standards None 1.3.8 eCNSFD-040900 SGi Redirection Applicable NEs eCNS Availability This feature is introduced in eCNS600 V100R002. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 23 eLTE2.3 eCNS600 Feature Description 1 Basic Features Summary This feature prohibits the eCNS from directly forwarding packets between UEs. Instead, this feature redirects uplink packets through the SGi interface to a specified device (for example, a firewall) in the PDN. Benefits This feature protects enterprise customers' networks and ensures end users' communication security. Description Most firewalls do not support bidirectional packet transmissions through an interface. Therefore, the configurations as shown in Figure 1-3 are required for SGi redirection. The blue line in this figure represents the direction of redirected packets. Uplink packets of UE 1 are sent through physical port a to the firewall. After being filtered by the firewall, the packets are sent through physical port b to the eCNS. Figure 1-3 Packet forwarding when SGi redirection is enabled If SGi redirection is disabled, uplink packets from UEs are not filtered by the firewall. Instead, the packets are directly forwarded by the eCNS, as shown in Figure 1-4. In this situation, packet security cannot be ensured. Figure 1-4 Packet forwarding when SGi redirection is disabled Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 24 eLTE2.3 eCNS600 Feature Description 1 Basic Features Enhancement None Dependency Table 1-8 Interaction with other features Feature Interaction eCNSFD-040800 Local Routing Local routing does not take effect if SGi redirection is enabled. Standards None 1.4 Reliability 1.4.1 eCNSFD-050200 Board Redundant Backup Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. Summary The eCNS performs 1+1 backup for all the processes. The redundancy backup ensures that the system is not impacted by any faulty process. Process redundancy backup, automatic fault detection, and self-healing function guarantee the system reliability. Benefits As a basic feature of the eCNS, it guarantees the system reliability. Description Process redundancy backup provides a backup mechanism for all the processes in the system. That is, all the processes work in the active/standby mode. A standby process can back up the data periodically or when the backing up process is triggered by an event. If the active process is faulty, the standby process takes over the service. Automatic fault detection means when the system is faulty because of a software abnormality or hardware fault, the system can automatically detect the fault by using a certain method without user intervention. This is the basis for fault isolation and fault recovery. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 25 eLTE2.3 eCNS600 Feature Description 1 Basic Features Self-healing means after a fault occurs; the system can take some measures, such as switchover and reset, to rectify the fault without affecting the normal operations of the system. Enhancement None Dependency This feature does not depend on other features. Standards None 1.5 Operation and Maintenance 1.5.1 eCNSFD-060100 Software Management Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. Summary Software management is used to achieve software management of the eCNS, including software installation and loading in addition to patch installation, loading, and activation. Benefits As a basic feature of the eCNS, it can flexibly manage the running software. Patches can correct software faults without service interruption. Description Software management mainly includes software installation, software upgrade, online patching. The eCNS supports software concurrent upgrade. That is, all the processes in the eCNS can load the software at the same time. As a result, the time spent in loading the software is greatly reduced. Enhancement None Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 26 eLTE2.3 eCNS600 Feature Description 1 Basic Features Dependency This feature does not depend on other features. Standards None 1.5.2 eCNSFD-060300 Performance Management Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. Summary The eCNS can measure network performances to provide the performance measurement data. Performance measurement data is an important basis for measurement, design, operation, and management of communication networks. Benefits As a basic feature of the eCNS, it can provide network data for network operating, planning, and management. Description The eCNS provides various test indexes. To simplify the management of these indexes, the indexes correspond to different measurement units, and the measurement units correspond to different measurement clusters. The measurement clusters provided by the eCNS include charging GTP-C, GTP-U, S1 mode EMM and ESM. The eCNS reports all the measurement results at a specified period, which means that users do not need to configure measurement tasks. The eCNS reports all measurement data to the operation and maintenance (OMS). Users can filter, query, collect, analyze, and print the measurement data by using the OMS. The eCNS generates performance alarms when the values of measurement indexes exceed preset thresholds or terraces. The performance alarms are categorized into threshold alarms and terrace alarms. Threshold Alarm A threshold refers to a preset limit. The unit of the threshold must be the same as the unit of the index. The system compares the measured data with this threshold. For each measurement index, there are four alarm severities, namely, critical, major, minor, and warning. You can set the direction (greater or smaller than a value) and the value of each alarm severity. For example, the threshold alarms of the average CPU usage are as follows: − Draft A (2013-04-09) Critical: > 90 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 27 eLTE2.3 eCNS600 Feature Description 1 Basic Features − Major: > 80 − Minor: > 70 − Warning: > 50 When the value of average CPU usage reaches 75, the system generates a minor performance alarm and reports the alarm in the Browse Alarm window to notify maintenance personnel. Terrace Alarm A terrace refers to the change degree of two values, reflecting the change rate of the measurement index. The unit of the value is percentage. The system compares the change rate of the measured data to this value. The calculation formula of the change rate is as follows: (Measured data of this period-Measured data of last period)/Measured data of last period If the terrace of the measurement index exceeds the preset terrace threshold, the system generates the performance alarm. For example, the terrace alarms of the average CPU usage are as follows: − Critical: > 70% − Major: > 50% − Minor: > 30% − Warning: > 10% If two consecutive values of the average CPU usage are 30% and 20% respectively, the terrace value is 50%. In this case, the system generates a Minor performance alarm and reports the alarm to the Browse Alarm window to notify maintenance personnel. Enhancement None Dependency This feature does not depend on other features. Standards 3GPP TS 12.04, "Performance data measurements" 3GPP TS 32.403, "Telecommunication management; Performance Management (PM); Performance measurements - UMTS and combined UMTS/GSM" 3GPP TS 32.426, "Telecommunication management; Performance Management (PM); Performance measurements Evolved Packet Core (EPC) network" 1.5.3 eCNSFD-060400 Fault Management Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 28 eLTE2.3 eCNS600 Feature Description 1 Basic Features Summary The fault management feature is used to monitor system operations. The eCNS notifies maintenance personnel of faults and events through alarms. Benefits As a basic feature of the eCNS, it provides detailed alarm information to help maintenance personnel easily locate and handle faults. Description The eCNS generates various types of alarms that cover faults and events related to software functions, hardware parts, and external environment to ensure that faults can be immediately detected and handled. To simplify management, these alarms are assigned different severities. The eCNS alarms are classified into the following severities: Critical Major Minor Warning You can adjust the alarm severities based on certain requirements. When an alarm occurs, the system reports the detailed information about the alarm so that maintenance personnel can locate and handle the fault. Maintenance personnel can shield alarms that they consider as unimportant. The alarm tool uses different colors and windows to differentiate the alarms of different severities, so that users can focus on alarms of high severity first. Alarms can be queried by specifying a combination of criteria such as the time range, alarm severity, and alarm type. The results returned help in analysis and location of faults. Enhancement None Dependency This feature does not depend on other features. Standards None 1.5.4 eCNSFD-060500 Equipment Management Applicable NEs eCNS Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 29 eLTE2.3 eCNS600 Feature Description 1 Basic Features Availability This feature was introduced in eCNS600 V100R001. Summary Equipment management includes operations such as monitoring, controlling, and testing the functions of entities such as system hardware and links. Benefits As a basic feature of the eCNS, it helps maintenance personnel in knowing the operations of the system so that they can flexibly maintain and manage the system. Description The equipment management feature helps in monitoring, control, and testing. Status monitoring The eCNS provides MML commands for querying status of devices. For boards and ports, it also provides a graphical query interface. Figure 1-5 and Figure 1-6 show the front view and rear view of a subrack. Figure 1-5 Front view Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 30 eLTE2.3 eCNS600 Feature Description 1 Basic Features Figure 1-6 Rear view Device control Device control includes operations such as switchover, reset, block, and disable. The monitored objects are board, process, port, link, and logical entities (such as signaling point). Device test The device test is an important method for finding and locating problems. The eCNS provides tests such as link self-loop test and path connectivity test. Enhancement None Dependency This feature does not depend on other features. Standards CCITT X.731 Information Technology - Open Systems Interconnection - Systems Management Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 31 eLTE2.3 eCNS600 Feature Description 1 Basic Features 1.5.5 eCNSFD-060600 Configuration Management Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. Summary Configuration management includes operations such as adding, deleting, modifying, and querying of system data. Benefits As a basic feature of the eCNS, it helps engineers configure and manage parameters for system operation to make the system work properly. Description The eCNS provides both dynamic and static modes for data configuration: Dynamic data configuration means directly modifying system data without interrupting the operation of the system. Static data configuration means editing the data script file (MML.TXT) offline. Modification of the file takes effect after the system resets. Configuration management also provides backup or export configuration data. Enhancement None Dependency This feature does not depend on other features. Standards None 1.5.6 eCNSFD-060700 Security Management Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 32 eLTE2.3 eCNS600 Feature Description 1 Basic Features Summary The security management provided by the eCNS ensures that only authorized users can perform operations on the system, and guarantees system security. Security management includes account management, right management, operation period control, account validity control, access control list (ACL), account lockout policy, password policy, and operation log. Benefits Only authorized operators can perform authorized operations on legal terminals. It prevents unauthorized operators from performing operations intentionally or unintentionally, and ensures system security. Description Security management includes account management, right management, operation period control, account validity control, ACL, account lockout policy, password policy, and operation log. Account Management To maintain the eCNS, the operator must have a valid account. All accounts are managed by the system administrator. The system administrator can add or delete operator accounts as required. Rights Management The eCNS classifies commands to different command sets. You can manage the rights of each account by assigning the account with the execution rights of a specified command set. For convenient management, account rights are defined in user groups, and then users in different user groups can be assigned different rights. A user group is a collection of users who share the same rights. By default, the system provides four user groups: − Administrators: There is only one administrator account in a system. − Operators: Users in this group can check the data, maintain the system, and configure the data. − Users: Users in this group can check the data and maintain the system. − Guests: Users in this group can only check the data. The administrator can assign rights to users by assigning users to different user groups, and can assign special rights to a user account. Operation Period Control You can control the time period for which users log in and operate the OMU. If the current time is not in the specified time period, users cannot log in and operate the OMU. Account Validity Control The administrator can change the account validity by modifying the user attributes. When a user account is invalid, the user cannot log in to the OMU server. ACL Generally, the OMU does not restrict the IP address of the client that a user uses. After the ACL function is enabled, the IP address of the client that the user uses to log in to the OMU must be contained in the ACL. Otherwise, the login fails. Draft A (2013-04-09) Account Lockout Policy Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 33 eLTE2.3 eCNS600 Feature Description 1 Basic Features You can set a threshold for the number of login failures. If the number of failures to log in using an account exceeds the threshold, the system locks out the account. During a specified period, the system rejects login requests from this account. The account lockout policy can prevent malicious hackers from logging in and misusing the data. Password Policy The complexity and regular modification of passwords guarantee system security. The eCNS can customize the password policy as follows: − Specify the validity period of a password − Specify the password length − Specify the characters that can be used in a password Operation Log An operation log records all the operation information about a user, including user name, user number, IP address, commands that the user runs, time when the command is run, and result of the command. You can check the operation log on the LMT and trace suspicious operations. Enhancement None Dependency This feature does not depend on other features. Standards None 1.5.7 eCNSFD-060800 Online Documentation Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. Summary Each version of the eCNS has its own online help, which contains: O&M system online help It is used to help users correctly use relevant interfaces and different management functions, and provides alarm descriptions and suggestions for handling alarms. MML command online help It is used to explain each MML command and help users correctly use these commands. An online help provides the following functions: Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 34 eLTE2.3 eCNS600 Feature Description 1 Basic Features It is organized based on common tasks performed by users. In the client window, choose Help > Help Topics to display the online help. You can obtain the information about a task through the navigation tree. It provides the detailed description of all operations supported by the system. Operation help is associated with certain interfaces, so you can obtain relevant information by pressing F1 to activate the help you want to query. It also provides powerful index function, so you can obtain help information by typing a key word. Benefits As a basic feature of the eCNS, it guides an operator to use and maintain the system. Description The contents of the online help are as follows: Interface online help It describes the meanings of the LMT user interfaces and how to use maintenance functions and alarm management functions. Alarm help It describes each alarm and provides suggestions to handle alarms. MML help It describes the function, notes, parameter description, and example of each MML command. Performance index help It describes the meaning, triggering point, measurement object, and unit of each measurement index. There are several ways to trigger the online help: Press F1 to invoke the interface online help. The MML help is automatically triggered after a command is selected or entered. The alarm help is automatically triggered when you check the alarm. Choose Help > Help theme to display all online helps. Enhancement None Dependency This feature does not depend on other features. Standards None Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 35 eLTE2.3 eCNS600 Feature Description 1 Basic Features 1.5.8 eCNSFD-060900 Tracing Function Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. Summary Tracing can be classified into subscriber tracing, group tracing, and interface tracing. The tracing functions can be used to store, resolve, and review a tracing file. Interface tracing involves establishment, capture, and resolution of tracing messages processed by the interfaces of eCNS. Benefits This feature guarantees flexibility in locating and solving problems for enterprise customers. The tracing feature is used in the daily maintenance of a device. This feature can locate where a fault occurs in the service procedure through message tracing. After a device is configured for data, the device can validate whether signaling links run normally by setting up tracing, and locate faults. Description The eCNS provides subscriber signaling and data tracing based on the IMSI or MSISDN. The eCNS supports the following types of message filters: MM messages of the S1 interface: NAS_MM and GTP_C SM messages of the S1 interface: NAS_SM and GTP_C S1-AP message of the S1 interface: S1-AP The eCNS can create subscriber tracing for a UE that does not attach to the network. Once the UE initiates the attach procedure, all the signaling and user data can be captured. Group tracing means tracing the signaling message and interface message on a certain group. Interface tracing means tracing all the messages on a certain interface. The eCNS allows a tracing file to be saved to the hard disk in different formats through both automatic and manual modes. The tracing messages can be saved in following format: Trace message file (*.tmf): It is used to browse messages offline through the Trace Viewer. This type of message browsing is intuitive. Text file (*.txt): It is used to save the messages displayed in the tracing interface. Protocol text file (*.txt): It is used to save protocol explanation of messages. CSV file (*.csv): It is used to save the complete code flow. The LMT interface displays only part of the code flow. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 36 eLTE2.3 eCNS600 Feature Description 1 Basic Features The OMS provides a message analyzer that can be used to view messages online. You can double-click a certain message in the Message Browser window to query the detailed information about this message. When browsing messages online, you can select and double-click a record that you want to query. A window containing the detailed information and explanation of the record is displayed, as shown in Figure 1-7. Figure 1-7 Message Browser NOTE The window is divided into two parts, the upper pane and the lower pane. You can adjust the view by moving the bar that separates the two panes. If you select a row in the upper part of the window, the row is highlighted in blue and the blue bar in the lower pane indicates the hexadecimal information of the selected row. The tracing files that are saved on local devices can be viewed in the Trace Viewer. The Trace Viewer can be used to perform the following operations: View message streams Complete tracing message procedures can be viewed, including the directory, time, type, and content of a message, as shown in Figure 1-8. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 37 eLTE2.3 eCNS600 Feature Description 1 Basic Features Figure 1-8 Trace Viewer Resolve messages Select and double-click a record that you want to query. A window containing the detailed information and explanation of the record is displayed, as shown in Figure 1-9. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 38 eLTE2.3 eCNS600 Feature Description 1 Basic Features Figure 1-9 Message Browser NOTE The window is divided into two parts, the upper pane and the lower pane. You can adjust the view by moving the bar that separates the two panes. If you select a row in the upper part of the window, the row is highlighted in blue and the blue bar in the lower pane indicates the hexadecimal information of the selected row. Sort messages Messages can be sorted according to the serial number, time, direction, and type. Enhancement None Dependency This feature does not depend on other features. Standards None Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 39 eLTE2.3 eCNS600 Feature Description 1 Basic Features 1.5.9 eCNSFD-061000 Log Management Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. Summary The eCNS provides and manages run logs, operation logs, security logs and event logs. It allows log export and upload. Benefits This feature meets the requirements of enterprise customers for log management. Description The eCNS supports the following logs: Run logs: record the running status of system software, for example, record system deployment status and system status changes. Using the run logs, OM personnel can learn the running status of the system. Operation logs: record the commands delivered from LMTs. Using the operation logs, OM personnel can manage OM records. Security logs: record the security events that occur on the eCNS. The security events include user login, account management, and account authentication. Event logs: record the all events generated by eCNS system. The events include event ID, event name, time of occurrence, event location information. Enhancement None Dependency This feature does not depend on other features. Standards None 1.5.10 eCNSFD-061100 Daylight Saving Time Applicable NEs eCNS Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 40 eLTE2.3 eCNS600 Feature Description 1 Basic Features Availability This feature was introduced in eCNS600 V100R001. Summary The eCNS can set information about time zone and Daylight Saving Time (DST) management, such as time zone where the system is located, the start time of DST, and the end time of DST. Benefits This feature meets requirements for enterprise customers in different areas. Description The eCNS can set information about time zone and DST in the following ways: By data By week Enhancement None Dependency This feature does not depend on other features. Standards None 1.6 Interface Function 1.6.1 eCNSFD-070100 S1 Interface Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. Summary The S1 interface includes the S1-MME interface and the S1-U interface in LTE/SAE. The S1-MME interface is a standard interface between the eNodeB and the eCNS. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 41 eLTE2.3 eCNS600 Feature Description 1 Basic Features The S1-U interface is a user-plane interface between the eNodeB and the eCNS. It is used to transmit uplink and downlink user-plane data flows between the eNodeB and the eCNS. Benefits This feature enables the S1 interface to transmit user-plane and control-plane data. Description The S1-MME interface is the signaling interface between the eNodeB and the eCNS. Figure 1-10 shows the protocol stack of the S1-MME interface. Figure 1-10 Protocol stack of the S1-MME interface The protocol layers are described as follows: S1 Application Protocol (S1-AP): It refers to the application layer protocol between the eNodeB and the MME. Stream Control Transmission Protocol (SCTP): It is used to guarantee the transmission of signaling messages between the eNodeB and the MME. IP: It contains IPv4 that is defined in RFC 791 and IPv6 that is defined in RFC 1883. L2/L1: The data link layer/physical layer protocol can be 10 Mbit/s, 100 Mbit/s, or 1000 Mbit/s Ethernet. The S1-U interface uses the GPRS Tunneling Protocol version 1 (GTPv1). Figure 1-11 shows the S1-U interface protocol stack. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 42 eLTE2.3 eCNS600 Feature Description 1 Basic Features Figure 1-11 S1-U interface protocol stack Enhancement None Dependency This feature does not depend on other features. Standards 3GPP TS 36.413, "Evolved Universal Terrestrial Radio Access Network (E-UTRAN); S1 Application Protocol (S1AP)" 1.6.2 eCNSFD-070200 SGi Interface Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. Summary The SGi interface is an interface between eCNS and the packet data network (PDN), or between the eCNS and the authentication, authorization and accounting (AAA) server. It is used to transmit PS session data. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 43 eLTE2.3 eCNS600 Feature Description 1 Basic Features Benefits For... Benefits Enterprise customers This feature enables the eCNS to interwork with PDN devices of various vendors by using the SGi interface, complying with 3GPP specifications. Subscribers Subscribers are unaware of the SGi interface feature. Description SGi Interface Protocol Stack Figure 1-12 shows the SGi interface protocol stack. Figure 1-12 SGi interface protocol stack Enhancement None Dependency This feature does not depend on other features. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 44 eLTE2.3 eCNS600 Feature Description 1 Basic Features 1.7 Basic Platform 1.7.1 eCNSFD-080300 Linux Security Hardening Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. Summary This feature hardens Linux operating system (OS) security and protects against attacks without interruptions to ongoing services. A secure OS is essential to ensure proper running of NEs and prevent unauthorized operations. An OS with vulnerabilities is open to attacks from hackers and viruses, leading to issues such as network service interruption, information loss, data corruption, and low efficiency. Linux security is hardened using the following means: Minimized OS OS passwords, file permissions, and kernel parameters OS logs Interconnection security data Benefits This feature enhances system robustness and security, protects against hackers and viruses, and improves user satisfaction. Description This feature hardens Linux security and protects against attacks without interruption to ongoing services. OS Security Threats and Vulnerability Causes The Linux OS faces the following security threats: Manipulated attacks Manipulated attacks are major attacks the OS faces. Hackers attack the system by utilizing OS vulnerabilities that are caused by various factors such as OS leaks, insecure passwords, or configuration defects. After seizing the super control rights, the hackers tamper with important files and data, wrecking havoc for the network security. Programmed attacks Programmed attacks mainly refer to computer viruses, including executable file viruses, worm viruses, script viruses, and backdoor programs. The following factors make the OS vulnerable: Draft A (2013-04-09) OS leaks Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 45 eLTE2.3 eCNS600 Feature Description 1 Basic Features OS leaks arise from program design or function defects such as identity authentication defects and service loopholes. Insecure accounts or passwords Hackers and viruses can easily crack insecure accounts and passwords using means such as password dictionaries or brutal-force crackers. Incorrect file permissions With file permissions, users can operate files such as reading, writing, or executing files. File permissions are essential to file sharing, protection, and confidentiality. To protect files and directories against unauthorized access, the Linux OS defines three types of users: owner, user group, and others. These users can be assigned different permissions. If incorrect permissions are granted to user groups or others, important files may be unexpectedly read, written, or executed. Insecure network services All network services have security risks. For example, Telnet does not encrypt or verify sessions; it transmits user names and passwords over the network in plaintext. In addition, network services such as Samba have security leaks. If the OS is not promptly patched, hackers or viruses may utilize these leaks to attack the system. Incorrect operations Incorrect operations (for example, directly powering off the Linux OS) may lead to system faults or system breakdown. If users open email attachments sent from unknown addresses or visit unknown websites, the system may get infected with viruses. OS Security Hardening Policies Linux security is hardened using the following policies: Minimizing the OS The default software package of the Linux OS contains many services and components, most of which are optional. These services and components affect OS performance and security. Therefore, the OS needs to be streamlined for different purposes, including: − Reducing the system size − Increasing the startup speed − Improving the system security − Retaining existing services and functions after minimization The minimized OS supports system security measures, for example, closing ports, closing services, and clearing leaks. Configuring OS passwords, file permissions, and kernel parameters Different users are assigned different file permissions to protect important files from being written, read, or executed by unauthorized users. In addition to the default user root, the Linux OS creates a user named omu, as described in Table 1-9. The administrator can also create other users for routine operations and maintenance (OM). Table 1-9 OS users and rights User Name Function Rights Default Password root User root is the default user. This user can control all resources, create other users, assign file User root has the highest rights, and can install and huawei Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 46 eLTE2.3 eCNS600 Feature Description 1 Basic Features permissions to them, and perform all operations supported by the OS. uninstall applications. server During system deployment, user root can perform installation and configuration. After the deployment, this user cannot perform routine OM, and the password is managed by the enterprise customer. omu User omu is created during the installation of the OMU. This user manages OMU processes and performs routing OM functions by using, for example, alarms, and logs. User omu has permissions to control the status of OMU processes. omu Managing OS logs To better manage OS logs and protect their security, the OS uses different log management policies based on log types, saving paths, and log formats. Linux OS logs are classified into two types: − Login logs utmp and wtmp are key log files in the Linux OS log system. utmp records the information about users who have logged in to the system. wtmp records the information about login, logout, data exchange, power-off, and restart. − System logs System logs are configured in the /etc/syslog-ng/syslog-ng.conf file. Different logs are saved in different paths: − The saving path of a system log can be specified by the destination messages parameter in the /etc/syslog-ng/syslog-ng.conf file. The default path is /var/log/messages. − utmp is saved in /var/run/utmp. − wtmp is saved in /var/log/wtmp. The policies for managing OS logs are as follows: − Creates a centralized log management mechanism. If multiple computers use the SuSE Linux OS, use a central log server to save and managing logs. Centralized log management can reduce the daily workload of querying logs and to help trace attackers. − Backs up logs. − Controls the access to logs. − Compresses logs and save logs for a long period. Configuring interconnection security data To harden system security, the OS supports the configuration of the following security data for interconnection between an OMU (or another board) and an OM node (such as an LMT): − Client digital certificate A client digital certificate is used to authenticate a client that communicates with the OMU. The client supports two types of certificates: − Draft A (2013-04-09) Common Cert: To apply a certificate to all offices, set the certificate as Common Cert. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 47 eLTE2.3 eCNS600 Feature Description 1 Basic Features − − Server Cert: To apply a certificate to only one office, set the certificate as Server Cert. SMM security data To harden system security during deployment and routing OM, the OS allows the following security configurations for the shelf management module (SMM): − − Prohibiting a user from accessing the SMM from an external network port − Prohibiting user root from accessing the SMM, and allowing only user smm to access the SMM Secure transmission mode between a client and the OMU By default, the system supports SSL connections and common connections. SSL connections are recommended for secure data transmission. Dependency This feature does not depend on other features. Standards None Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 48 eLTE2.3 eCNS600 Feature Description 2 Optional Features 2 Optional Features 2.1 Security Management 2.1.1 eCNSFD-110001 NAS Encryption and Integrity Protection (AES) Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. Summary This feature uses Advanced Encryption Standard (AES) to protect non-access stratum (NAS) signaling and improve system security. NAS is a protocol layer between the UE and the EPC, used to transmit user data and signaling between them. Benefits This feature ensures the security and reliability of NAS signaling in addition to user data. Description AES is the most widely used encryption and integrity protection standard in the world. 3GPP defines two AES algorithms, EPS Encryption Algorithm 2 (EEA2) and EPS Integrity Algorithm 2 (EIA2), with the key length of 128 bits. After a UE attaches to the network, the UE notifies its supported encryption and integrity protection algorithms to the eCNS. If the UE supports AES, the eCNS determines whether to use AES according to local policies. If AES is used, the eCNS uses AES to encrypt and protect the integrity of signaling between the UE and the eCNS. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 49 eLTE2.3 eCNS600 Feature Description 2 Optional Features Enhancement None Dependency This feature does not depend on other features. Standards 3GPP TS 33.401, "3GPP System Architecture Evolution (SAE); Security architecture" 2.1.2 eCNSFD-110002 NAS Encryption and Integrity Protection (SNOW3G) Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. Summary This feature uses SNOW 3G to protect NAS signaling and improve system security. NAS is a protocol layer between the UE and the EPC, used to transmit user data and signaling between them. Benefits This feature ensures the security and reliability of NAS signaling in addition to user data. Description SNOW 3G is an EPS security standard. 3GPP defines two SNOW 3G algorithms, EPS encryption algorithm 1 (EEA1) and EPS integrity algorithm 1 (EIA1), with the key length of 128 bits. After a UE attaches to the network, the UE notifies its supported encryption and integrity protection algorithms to the eCNS. If the UE supports SNOW 3G, the eCNS determines whether to use SNOW 3G based on the local policy to encrypt and protect the integrity of signaling between the UE and the eCNS. Enhancement None Dependency This feature does not depend on other features. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 50 eLTE2.3 eCNS600 Feature Description 2 Optional Features Standards 3GPP TS 33.401, "Security architecture" ETSI Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2, Document 2: SNOW 3G Specification 2.1.3 eCNSFD-110003 O&M SSL Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. Summary The eCNS employs Huawei SeCert Transport Layer Security (TLS) development library and supports SSLv3.0, TLSv1.0, and TLSv1.1 by default. The Secure Socket Layer (SSL) feature can be implemented when the eCNS communicates with the M2000 or LMT to enhance security through encryption. Therefore, the MML channel, binary channel, SOAP interface, Web interface, and FTP file transfer channel between the eCNS and the M2000 or LMT can be encrypted to ensure secure transmission. Benefits The security of accounts and passwords of Internet service providers (ISPs) for operation and maintenance is guaranteed, data is transmitted over networks while remaining intact, and the network operation expenditure is reduced. By providing the SSL value-added service to enterprises and individuals, an ISP establishes closer long-term cooperative relationships with them and improves service quality as the ISP makes full use of the existing network resources. The ISP therefore becomes more competitive and will be exposed to greater business profits. Description SSL is a security protocol that was first proposed by Netscape to provide secure communication for the application layer based on TCP transmission. In the TCP/IP protocol stack, SSL is applied between the transport layer and the application layer and adopts TCP to carry messages, therefore ensuring secure transmission for the application layer. SSL is widely used in services such as Web, FTP, and Telnet. Currently, available SSL versions are SSLv1, SSLv2, and SSLv3, among which SSLv3 is the latest version. The standardized versions of SSL are TLS1.0 and TLS1.1. SSL provides the following security services: Identity authentication Identity authentication means checking whether the peer end is the actual end with which you want to communicate. SSL authenticates the server and the client based on digital certificates to confirm that they are legitimate users. Both the client and the server have their own identifiers, which are numbered with a public key. To verify that a user is Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 51 eLTE2.3 eCNS600 Feature Description 2 Optional Features legitimate, SSL requires digital authentication during data exchange in the handshake stage. Connection privacy Connection privacy means that data is encrypted before transmission to avoid data cracking by illegitimate users. SSL ensures connection privacy by employing encryption algorithms. The common encryption algorithms are DES, 3DES, RC2, and RC4. Data integrity Data integrity means that any modification to data during transmission can be detected. SSL sets up a secure channel between the client and the server so that all SSL-processed data can reach the destination without being modified. SSL guarantees data integrity by employing message digest algorithms. The common message abstract algorithms are MD5 and SHA-1. Enhancement None Dependency This feature does not depend on other features. Standards None 2.2 Service Management 2.2.1 eCNSFD-110004 Static IP Address Allocation Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. This feature is an optional feature and is under license control. Summary The eCNS allocates static IP addresses to UEs based on subscriber data. Benefits This feature provides a basic function for radio access. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 52 eLTE2.3 eCNS600 Feature Description 2 Optional Features Description A UE must obtain at least one IP address before it is able to access PS services. A PDN Address Allocation IE is specified during the setup of a default bearer for the UE. This IE contains protocol information (including an IP address field) the UE must obtain before it is able to access an external PDN. In addition, this IE indicates the method the UE expects to use to obtain an IP address. 3GPP TS 23.401 defines three modes of allocating IP addresses to UEs: IP address allocation from the local address pool In this mode, the eCNS allocates a dynamic IP address to a UE from the local address pool during the activation of a bearer for the UE. The local address pool contains the IP addresses planned by the enterprise customer. Static IP address allocation In this mode, the eCNS allocates IP addresses to UEs from its integrated subscriber data module. This module matches the IMSI of each UE to an IP address range planned by the enterprise customer. This mode is a pure static IP address allocation mode, which requires complex configurations. IP address allocation from the RADIUS server In this mode, the eCNS allocates dynamic IP addresses obtained from the RADIUS server during UE authentication in the bearer activation procedure. Note that dynamic IP addresses are carried in access response messages sent by the RADIUS server. This mode is applicable to enterprise customers or internet service providers (ISPs) who manage the RADIUS server and plan IP addresses for their internal users. Enhancement None Dependency This feature does not depend on other features. Standards 3GPP TS 23.401, "General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access" 2.2.2 eCNSFD-110005 Multiple PDN Connection Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. This feature is an optional feature and is under license control. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 53 eLTE2.3 eCNS600 Feature Description 2 Optional Features Summary A UE can create several PDN connections to access different networks at the same time. The UE also needs to support the feature. Benefits The multiple PDN feature enables a UE to connect to several networks at the same time. Therefore, the UE can use other services without stopping the current service. For example, the UE can receive multimedia messages when surfing on the Internet or send pictures on the websites through multimedia messages. Description The EPS can support simultaneous exchange of IP traffic between a UE and multiple PDNs by using one or several PDN GWs. The usage of multiple PDNs is controlled by network policies and defined in the subscription data. To allow one or several connections to the PDN, the EPS must support the UE-initiated PDN connection procedure. The UE-initiated PDN connection procedure includes the establishment of a default bearer. The UE can use the disconnection procedure to disconnect from any PDN. In this disconnection procedure, all bearers related to the disconnected PDN, including the default bearer, are released. The disconnection procedure cannot be used to disconnect the last PDN connection. The UE or eCNS can initiate a detach procedure to disconnect the last PDN connection. Enhancement None Dependency This feature does not depend on other features. Standards 3GPP TS 23.401, "General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access" 2.2.3 eCNSFD-110008 SPI-based QoS Profile Control Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. This feature is an optional feature and is under license control. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 54 eLTE2.3 eCNS600 Feature Description 2 Optional Features Summary This feature uses the shallow packet inspection (SPI) technique to recognize traffic flows and provide QoS guarantees. SPI refers to the inspection of quintuples in IP packet headers at L3 and L4. A quintuple contains the source address, destination address, source port number, destination port number, and protocol type. Benefits This feature enables the eCNS to perform effective control and refined management, provide different QoS guarantees for different services, and improve user satisfaction. Description In the uplink, the eCNS resolves quintuples in packet headers after GTP decapsulation. If the filtering rules for L3 or L4 are configured, the eCNS filters the packets based on the quintuples and according to the rules. In the downlink, the eCNS resolves quintuples in packet headers. If the filtering rules for L3 or L4 are configured, the eCNS filters the packets based on the quintuples and according to the rules. After the filtering, the eCNS applies different QoS profiles to different types of packets. For example, the eCNS initiates a dedicated bearer setup procedure. If a dedicated bearer fails to be set up, the eCNS can age the quintuple used for setting up the dedicated bearer. The purpose is to trigger the SPI procedure again and to prevent a temporary setup failure from becoming a permanent setup failure. Enhancement Table 2-1 Release history and enhancement Feature Version Product Version Details eCNSFD-110 008, 02 eCNS600 V100R002 Added the function of reestablishing dedicated bearers after establishment failures. eCNSFD-110 008, 01 eCNS600 V100R001 First official release. Dependency This feature does not depend on other features. Standards None 2.2.4 eCNSFD-110009 Offline Charging Applicable NEs eCNS Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 55 eLTE2.3 eCNS600 Feature Description 2 Optional Features Availability This feature is introduced in eCNS600 V100R002. This feature is an optional feature and is under license control. Summary This feature enables the eCNS to send generated original CDRs to CGs using GTPv2. The CGs perform original CDR storage, consolidation, and standardization, and then send the processed data to the billing system (BS) for generating final bills. Currently, the eCNS does not support content-based offline charging. Benefits Enterprise Customers This feature enables enterprise customers to perform exact charging based on information about data services used by end users. In addition, this feature provides reference data for accounting between enterprise customers and for accounting between an enterprise customer and an Internet service provider (ISP). Information about end users' data services helps analyze end users' behaviors and habits, and helps develop operating policies. End Users This feature helps end users reduce consumption based on information about data services they used. Description Application Scenario This feature applies to the following scenarios: Traffic-based charging Duration-based charging Network Structure The network structure for offline charging is as follows: Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 56 eLTE2.3 eCNS600 Feature Description 2 Optional Features Figure 2-1 Network structure for offline charging The eCNS records information about data services used by end users, generates original CDRs, and sends the original CDRs to CGs using GTP'. The CGs perform original CDR storage, consolidation, and standardization, and then send the processed data to the BS for generating final bills. Load Sharing Between CGs The eCNS can connect to multiple CGs and configure priorities for these CGs. If the CGs have different priorities, the eCNS selects the CG with the highest priority. When a large number of original CDRs are generated, the eCNS can send the original CDRs to different CGs. This reduces the performance requirement on a single CG and improves the reliability of original CDR transmission. CG Link Detection If the eCNS does not receive any response after sending original CDRs to a CG, the eCNS sends again the original CDRs to the CG. If the response times out, the eCNS considers the CG to be faulty. If there is no original CDR to send, the eCNS sends an Echo message to the CG every one minute. If the eCNS does not receive any response for N consecutive times, the eCNS considers the CG to be faulty. N is set to 3 by default. CDR Buffering Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 57 eLTE2.3 eCNS600 Feature Description 2 Optional Features If the communication between the eCNS and CGs are broken, the eCNS buffers original CDRs. After the link recovers, the eCNS sends the original CDRs to the CG. CDR Generation The eCNS can control whether to generate original CDRs for an APN based on a specified charging characteristic. A CDR contains multiple fields such as user ID, service time segment, and service duration, based on which the BS charges end users. The original CDR generation procedure consists of the following three phases: Generating start original CDRs The eCNS generates start original CDRs when the services are activated, and records the user's subsequent actions that require charging. Generating intermediate original CDRs The eCNS generates intermediate original CDRs for the end user when the service duration, traffic volume, charge rate, number of QoS changes, or another parameter value reaches their threshold. Generating final original CDRs After the end user stops the services, the eCNS generates final original CDRs. The preceding procedure shows that the eCNS may generate multiple original CDRs for a service procedure. The BS consolidates these CDRs and generate final bills. The original CDRs generated by eCNS only comply with R9 CDR version. CDR Transfer After the eCNS generates original CDRs, it encodes the original CDRs in Abstract Syntax Notation One (ASN.1) format, encapsulates the original CDRs using GTP', and then sends the GTP' packets to CGs. Ga interface The Ga interface is a standard interface between a P-GW and a charging gateway (CG). It uses GTP'. Error! Reference source not found. shows the Ga protocol stack. Figure 2-2 Ga protocol stack Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 58 eLTE2.3 eCNS600 Feature Description 2 Optional Features GTP' is a GPRS protocol used for CDR transfer. The Ga signaling procedures are as follows: CDR generation CDR delivery Enhancement None Dependency Table 2-2 Interaction with other features Feature Interaction eCNSFD-070600 Ga Interface Offline charging depends on Ga interface to CG Standards 3GPP TS 32.240, "Charging management; Charging architecture and principles" 3GPP TS 32.298, "Charging management; Charging Data Record (CDR) parameter description" 3GPP TS 32.251, "Charging management; Packet Switched (PS) domain charging" 3GPP TS 32.295, "Charging management; Charging Data Record (CDR) transfer" 2.2.5 eCNSFD-110011 UE IP Address assigned by the Radius AAA Server Applicable NEs eCNS Availability This feature is introduced in eCNS600 V100R002. Summary eCNS600 cooperates with Radius AAA Server, to implement centralized assignment of wireless terminal IP addresses in whole network. Benefits Enterprise Customers Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 59 eLTE2.3 eCNS600 Feature Description 2 Optional Features Wireless terminal IP addresses are centralized managed by enterprise customers. Though when wireless terminals roam across core networks, their IP addresses can be centrally assigned by Radius AAA Server. For example, in railway industry, the IP addresses of terminals in vehicles are required to be centrally assigned and when these terminals roam across core networks, their IP addressed should be unique and fixed. Description Application Scenario Centralized management of UEs for enterprise customers Enterprise customers require the deployment of multiple P-GWs and central management of UE IP addresses, as shown in the following figure. P-GW PGW AAA Server LTE UE MME HSS S-GW P-GW eCNS600 Capacity expansion of the authentication, authorization, and accounting (AAA) server for enterprise customers If the number of UEs in an enterprise network exceeds the threshold of an AAA server's capacity of authentication or assigning UE IP addresses, the enterprise customer can add RADUIS AAA servers to share the load of processing authentication messages sent by P-GWs, as shown in the following figure. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 60 eLTE2.3 eCNS600 Feature Description 2 Optional Features P-GW P-GW AAA Server MME HSS AAA Server LTE UE S-GW P-GW eCNS600 Services and Functions The eCNS600 obtains UE IP addresses from the RADIUS AAA server and provides various services and functions. UE IP address assignment by RADIUS AAA server The eCNS600 obtains UE IP addresses from the AAA server through RADIUS authentication. Mapping between APN and AAA server The eCNS600 supports the configuration of active/standby AAA servers for each APN. Configuring authentication message resend count and expiration time The eCNS600 supports the configuration of authentication message resend count and expiration time based on network conditions. Striping domain name from user name The eCNS600 supports the ability to select whether to include a domain name in the user name of the authentication message sent to the RADIUS AAA server. Before an authentication message is sent, the eCNS600 checks whether the APN is configured to strip a domain name. If yes, the domain name will be stripped from the user name before an authentication message is sent to the AAA server. That is, the message sent to the AAA server carries the user name without a domain name. If no, the domain name will not be stripped from the user name. By default, the domain name is kept. Configuring port numbers for communicating with the AAA server The eCNS600 supports optional configuration of the destination ports of the eCNS600 for communicating with the AAA server. By default, the port number for authentication is 1812 and that for accounting is 1813. The port number for authentication ranges from 1 to 65535 for compatibility with other AAA server ports whose numbers are not the default values. Active/Standby AAA server The eCNS600 allows the AAA servers to receive RADIUS authentication messages in active/standby mode. In this mode, if the active AAA server works normally, it will receive all RADIUS authentication messages. If the active server is faulty, all the Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 61 eLTE2.3 eCNS600 Feature Description 2 Optional Features messages are sent to the standby server. The eCNS600 only supports active/standby mode connection with AAA Servers. 3GPP extended attributes 3GPP 29.061 defines the protocols of interfaces between the P-GW and the AAA server. The eCNS600 transmits the extended attributes defined in the 3GPP 29.061 protocol (for example: IMSI, MCC, and MNC) to the AAA server for authentication reference. Context deactivation according to RADIUS Packet of Disconnect (POD) messages The eCNS600 retrieves a UE IP address according to a POD message. POD messages, which are used to deactivate subscribers, are sent actively by the RADIUS AAA server to the P-GW. The eCNS600 deactivates context according to POD messages. It checks the validity of POD messages and receives only PODs containing server IP addresses. Then it deactivates subscribers based on their IMSIs and NSAPIs. Enhancement None. Dependency This feature depends on the PCO setting of the UE. The UE must support at least the Authentication Type, User Name and Password items in its PCO Setting. The Initial UE Message shall send the EPC the three information elements in the UE Attach process. Standard RFC 2865 Remote Authentication Dial In User Service (RADIUS) 3GPP TS 23.401, General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access 3GPP TS 29.061 Interworking between the Public Land Mobile Network (PLMN) supporting packet based services and Packet Data Networks (PDN) 2.2.6 eCNSFD-110012 E2E Subscriber Tracing Applicable NEs eCNS Availability This feature is introduced in eCNS600 V100R002. Summary The end-to-end subscriber trace feature enables multiple MEs to trace signaling messages of a subscriber in a trace task and to send traced messages to a specified device such as an NMS. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 62 eLTE2.3 eCNS600 Feature Description 2 Optional Features Benefits Enterprise Customers The end-to-end subscriber trace feature can improve fault location efficiency for refined network maintainance. Description Operation and maintenance engineers can use the end-to-end subscriber trace feature to trace subscriber signaling messages and then analyze the traced signaling messages for handling customer complaints, locating network faults, adjusting and optimizing networks, analyzing subscriber behaviors, and testing new features. Figure 2-3 shows the end-to-end subscriber trace procedure. Figure 2-3 End-to-end subscriber trace NMS Itf-N Itf-N Itf-N Vendor B Vendor A 3 1 EMS 3 2 PGW EMS EMS 1 3 3 3 2 SGW HSS 1 S1 2 2 MME eNB S1 eNB 1. The element management system (EMS) sends a trace command to MME through a management link and the instruction includes creating, checking, and deleting trace sessions. Alternatively, the EMS sends a trace command to the HSS and the HSS informs the MME of the instruction through a message over the S6a interface. The trace command is subscriber-specific and the subscriber is specified by the IMSI or MSISDN. 2. MME sends trace control parameters to the S-GW, P-GW, and eNodeB through signaling links. 3. MME traces signaling messages and sends traced signaling messages in file report mode to the EMS through the trace data link. Then, the EMS displays the traced messages. Trace data includes the trace reference ID, trace depth, trace ME list, and trace interface list of each ME. Draft A (2013-04-09) Trace reference ID Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 63 eLTE2.3 eCNS600 Feature Description 2 Optional Features It uniquely identifies a trace session. Trace depth It indicates the content depth of traced messages reported by the MEs. Currently, only the maximum depth is supported, that is, complete messages are reported. Trace ME list It lists the MEs required to trace signaling messages in a trace session, including the eNodeB, MME, S-GW, and P-GW. The MME sends trace data to the MEs in this list. Trace interface list It lists the interfaces on which messages need to be traced. Each ME has a trace interface list. When the eCNS600 servers as the MME, the messages on the S1-MME, S6a, and S10 interfaces can be traced. Enhancement None. Dependency The complete end-to-end subscriber trace function requires that all of the EMS, MME, eNodeB, S-GW, P-GW, and HSS support the end-to-end subscriber trace function. For the eCNS600 to implement the end-to-end subscriber trace function, at least the EMS must support the end-to-end subscriber trace function. Standard 3GPP TS 32.422, Telecommunication management; Subscriber and equipment trace: Trace control and configuration management 2.3 Reliability 2.3.1 eCNSFD-110006 eCNS Redundancy Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. This feature is an optional feature and is under license control. Summary eCNS redundancy is a disaster tolerance mechanism where multiple eCNSs serve the same radio coverage area (called the eCNS redundancy area). These eCNSs connect to all the eNodeBs in this area and work in load sharing mode. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 64 eLTE2.3 eCNS600 Feature Description 2 Optional Features Benefits This feature implements disaster tolerance and improves the network availability. Description In eCNS redundancy scenarios, the eNodeB selects an eCNS for a UE based on the load sharing policy configured on the eNodeB. Therefore, the eNodeB needs to know the status of the eCNSs. If the eNodeB detects that an eCNS is unavailable, it adjusts the load sharing policy and assigns new service requests to other eCNSs. In addition, the eNodeB needs to obtain the load sharing weights of the eCNSs through the S1 interfaces so that the eNodeB can select an eCNS for a UE from available eCNSs. An area served by multiple eCNSs is called an eCNS redundancy area. If one or more tracking areas (TAs) are served by multiple eCNSs, these TAs form an eCNS redundancy area. eCNS redundancy mainly implements disaster tolerance and improves the network availability. In addition, eCNS redundancy can be used to increase the maximum data throughput when the forwarding capability of the network becomes a bottleneck. Table 2-3 lists eCNS redundancy specifications. Table 2-3 eCNS redundancy specifications Item Specification Network usability 1 - (1 – A)N Maximum data throughput N x 4 Gbit/s Remarks A: system availability of an eCNS N (≤5): number of eCNSs 4 Gbit/s: maximum data throughput of an eCNS Enhancement None Dependency This feature does not depend on other features. Standards 3GPP TS 23.401, "General Packet Radio Service (GPRS) enhancements for Evolved universal Terrestrial Radio Access Network (E-UTRAN) access" 3GPP TS 23.236, "Intra-domain connection of Radio Access Network (RAN) nodes to multiple Core Network (CN) nodes" Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 65 eLTE2.3 eCNS600 Feature Description 2 Optional Features 2.4 Networking 2.4.1 eCNSFD-110007 Bidirectional Forwarding Detection (BFD) Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R001. This feature is an optional feature and is under license control. Summary Bidirectional forwarding detection (BFD) is used to detect communication faults between devices and notify the upper layers of the faults. The major characteristics of BFD are as follows: Implements bidirectional link detection, which does not significantly add to the network load and requires little time to complete. Dynamically modifies BFD parameters without affecting the status of ongoing sessions. Benefits This feature provides a transmission-media-independent detection mechanism that enables fault detection at the millisecond level. Description The eCNS supports single-hop BFD, which refers to detection of IP connectivity between directly connected devices. For a data protocol, only one BFD session exists on a specified interface such as a physical port, virtual circuit, or tunnel. BFD packets are encapsulated in UDP packets. The destination port number is 3784. The source port number is within the range of 49152 and 65535. All the BFD packets of a session use the same source port number. The eCNS supports BFD in asynchronous mode, but not in demand mode. In asynchronous BFD, the devices periodically send BFD packets to each other. If one device does not receive any packet from the other device within a specified period, the session is considered to be down. Asynchronous BFD is most commonly used. Table 2-4 lists BFD specifications. Table 2-4 BFD specifications Item Specification Shortest detection time (ms) 30 Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 66 eLTE2.3 eCNS600 Feature Description 2 Optional Features Maximum number of BFD sessions 16 Maximum number of static routes bound to a BFD session 512 Maximum number of default routes bound to a BFD session 6 Enhancement None Dependency Table 2-5 Interaction with other features Feature Interaction eCNSFD-040700 VRF In the network scenario of dual active ports with static routes, BFD should be activated in VRF in order that eCNS could switch route when old route is fault. Standards Draft-ietf-bfd-v4v6-1hop-04 Draft-ietf-bfd-base-04 Draft-ietf-bfd-multihop-04 2.4.2 eCNSFD-110010 Routing Behind MS Applicable NEs eCNS Availability This feature is introduced in eCNS600 V100R002. This feature is an optional feature and is under license control. Summary This feature applies to mobile VPNs. This feature allows terminals to access an enterprise network through a wireless device and allows mutual visits between the terminals and the enterprise network.Unlike Network Address Translation (NAT), this feature allows the wireless device to obtain a network segment address (not only an IP address) and assign IP addresses to the terminals. With these addresses, the terminals can communicate with the enterprise network. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 67 eLTE2.3 eCNS600 Feature Description 2 Optional Features The eCNS can determine whether to use this feature for an APN. Benefits Enterprise Customers This feature provides a new business model for mobile VPNs, improves working efficiency, and reduces operating costs. End Users This feature enables end users to access the enterprise network through a wireless device. In addition, this feature allows mutual visits between branches and headquarters in a flexible, rapid, and secure manner. Description Application Scenario This feature is mainly applicable to enterprise customers' mobile VPNs. Both mobile VPN users and common home users can access a network through a wireless device. However, the technologies for the two applications are very different. Common home users visit a network through a wireless router. The router uses NAT for address translation and allows multiple users to access the network at the same time even when the router obtains only one IP address during an EPS bearer activation procedure. In comparison, mobile VPN users need to visit or be visited by an enterprise network. As NAT cannot meet this requirement, the Routing Behind MS feature is introduced to address this issue. Figure 2-4 shows the network structure for the Routing Behind MS feature. Figure 2-4 Network structure for the Routing Behind MS feature Main Functional Units Draft A (2013-04-09) CPE Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 68 eLTE2.3 eCNS600 Feature Description 2 Optional Features The CPE is a wireless device. It originates the setup of a default EPS bearer, obtains a network segment address, and assigns IP addresses to the connected terminals. eCNS The eCNS receives uplink data from the CPE and forwards the data to PDNs. The eCNS also receives downlink data from PDNs, selects tunnels in the enterprise network based on the destination IP addresses, and sends the data to target terminals. IP terminals IP terminals are connected to the CPE. These terminals may be mobile phones, WiFi terminals, or computers. Enhancement None Dependency Table 2-6 Interaction with other features Feature Interaction eCNSFD-040600 OSPFv2 One VRF support more than OSPF process, while one OSPF process belongs to only one VRF. Standards None 2.4.3 eCNSFD-110013 UE Fixed IP MultiHoming Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R002. This feature is an optional feature and is under license control. Summary This feature applies to mobile virtual private networks (VPNs). The eCNS dynamically delivers route information containing the UE fixed IP address as the destination IP address over the SGi interface through the Open Shortest Path First (OSPF) protocol. In this way, a UE can access multiple interconnected eCNSs at different time points without changing its fixed IP address. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 69 eLTE2.3 eCNS600 Feature Description 2 Optional Features Benefits Enterprise Customers With enterprise networks, most traffic is originated by the network side and the IP addresses of the UEs are fixed. Normally, these UEs attach only to a specific eCNS. The UE Fixed IP MultiHoming feature enables the UE to change the route with the eCNS accessed by the UE. This improves the UE's capability to perform cross-EPC services. EPC is short for evolved packet core. Description Application Scenarios Cross-region access: In this scenario, the enterprise network consists of multiple eCNSs that cover different regions without any overlap. The UE has a fixed IP address and retains its fixed IP address after attaching to the eCNSs in different regions. Network redundancy backup: In this scenario, the enterprise network consists of multiple eCNSs whose coverage regions are overlapped. The UE has a fixed IP address and retains its fixed IP address after attaching to another eligible eCNS in the same region. The following figure shows the networking for UE Fixed IP MultiHoming. Figure 2-1 Networking for UE Fixed IP MultiHoming eCNS A S1 SGi Router eNodeB A S10 OSPF Area S5 APP Server UE S1 SGi eNodeB B eCNS B Main Functional Units UE: A UE has a fixed IP address and selects an eCNS on an EPC to attach to. eCNS: When a UE attaches to the eCNS, the eCNS delivers route information containing the UE fixed IP address as the destination IP address over the SGi interface through the OSPF protocol. When a UE detaches from the eCNS, the eCNS notifies the router to delete the route over the SGi interface through the OSPF protocol. Router: A router learns the route information containing the UE fixed IP address as the destination IP address through the OSPF protocol. When the router receives downlink data sent by the APP server, the router sends the data to the eCNS that recently delivers the route based on learned routes. APP Server: An APP Server initiates services to the UE, sends downlink data to the UE, and receives uplink data from the UE. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 70 eLTE2.3 eCNS600 Feature Description 2 Optional Features Enhancement None Dependency Table 2-7 Interaction with other features Related Feature Interaction eCNSFD-040600 OSPFv2 This feature depends on the eCNSFD-04600 OSPFv2 feature. eCNSFD-110010 Routing Behind MS This feature is mutually exclusive to the eCNSFD-110010 Routing Behind MS feature. Standards None 2.4.4 eCNSFD-110014 Core Network Interoperability Applicable NEs eCNS Availability This feature was introduced in eCNS600 V100R002. This feature is an optional feature and is under license control. Summary eCNS integrated with HSS, MME, SGW, PGW logic functional unit. Base on these 4 different logic functional unit, eCNS open S6a, S10, S5/S8 interface, for interoperability with other core network. Benefits Enterprise Customers This feature satisfies the enterprise customer requirements for eCNS to interconnection with other EPC devices. Description This feature support 3GPP Release 9. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 71 eLTE2.3 eCNS600 Feature Description 2 Optional Features Figure 2-2 Network structure of core network interoperability HSS S6a eNodeB MME S6a S10 EMS eCNS S1-MME X2 O&M HSS MME SGi PDN Network S1-U Uu UE eNodeB S-GW S5/S8 PGW P-GW SGi IP Network S5/S8 SGW S6a interface The S6a interface is a standard interface between an MME and an HSS. Error! Reference source not found. shows the S6a protocol stack. Figure 2-3 S6a protocol stack The protocols in the stack are as follows: Diameter Diameter is used to transmit subscription and authentication data between an MME and an HSS. Diameter is defined in RFC 3588. SCTP SCTP is used to transmit signaling between an MME and an HSS. IP IPv4 is defined in RFC 791, and IPv6 is defined in RFC 1883. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 72 eLTE2.3 eCNS600 Feature Description 2 Optional Features L2 and L1 L2 is the data link layer, and L1 is the physical layer. Both can use 10, 100, or 1000 Mbit/s Ethernet. S10 interface The S10 interface is a standard interface between MMEs. Error! Reference source not found. shows the S10 protocol stack. Figure 2-4 S10 protocol stack The protocols in the stack are as follows: GTP-C GTP-C is used to reliably transmit signaling between MMEs. The version used is GTPv2. Signaling transmitted on the S10 interface includes GTP path management messages and mobility management messages. UDP UDP is used to transmit user data between MMEs. UDP is defined in RFC 768. IP IPv4 is defined in RFC 791, and IPv6 is defined in RFC 1883. L2 and L1 L2 is the data link layer, and L1 is the physical layer. Both can use 10, 100, or 1000 Mbit/s Ethernet. S5/S8 interface The S5/S8 interface is a standard interface between an S-GW and a P-GW in the same network. This interface can be used in both the control plane and user plane. The S5 interface connects an S-GW and a P-GW in the same network. The S8 interface connects an S-GW in a visited network and a P-GW in a home network. Error! Reference source not found. and Error! Reference source not found. show the S5/S8 protocol stacks using GTPv2 and GTPv1, respectively. Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 73 eLTE2.3 eCNS600 Feature Description 2 Optional Features Figure 2-5 S5/S8 protocol stack using GTPv2 Figure 2-6 S5/S8 protocol stack using GTPv1 The S5 signaling procedures are as follows: Session setup Bearer setup Bearer modification Session release Bearer release Bearer update Enhancement None Dependency None Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 74 eLTE2.3 eCNS600 Feature Description 2 Optional Features Standards 3GPP TS 29.274, Evolved General Packet Radio Service (GPRS); Tunneling Protocol for Control plane (GTPv2-C); Stage 3 3GPP TS 29.272, Mobility Management Entity (MME) and Serving GPRS Support Node (SGSN) related interfaces based on Diameter protocol 3GPP TS 23.401, General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access RFC3588, "Diameter Base Protocol" Draft A (2013-04-09) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd 75