Beruflich Dokumente
Kultur Dokumente
VPN) Solution
V600R001C00
Configuration Guide(CLI)
Issue 01
Date 2011-09-20
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: support@huawei.com
Intended Audience
This document describes the roadmap, data planning, and procedure for configuring services in
the ATN+CX mobile broadband (MBB) solution.
This document is intended for the following readers:
l Network planning engineers
l Commissioning engineers
l Data configuration engineers
Change History
Changes between document issues are cumulative. The latest document issue contains all the
changes made in previous issues.
Issue 01 (2011-09-20)
This document is the first release of V600R001C00.
Contents
2 Basic Configurations.....................................................................................................................9
2.1 Configuring Device Information......................................................................................................................10
2.2 Configuring Interfaces......................................................................................................................................10
2.3 Configuring AAA Users...................................................................................................................................15
2.4 Configuring User Interfaces.............................................................................................................................15
2.5 Configuring SNMP...........................................................................................................................................16
3 Deploying an IGP........................................................................................................................19
3.1 Configuration Roadmap...................................................................................................................................20
3.2 Data Planning...................................................................................................................................................21
3.3 Configuring Basic IS-IS Functions...................................................................................................................22
3.4 Controlling Route Advertisement and Import..................................................................................................25
4 Deploying MPLS.........................................................................................................................27
4.1 Configuration Roadmap...................................................................................................................................28
4.2 Data Planning...................................................................................................................................................29
4.3 Configuring MPLS TE and Hot Standby.........................................................................................................33
4.4 Configuring Static BFD for TE........................................................................................................................39
4.5 Configuring Static BFD for TE-LSP................................................................................................................41
8 Deploying QoS.............................................................................................................................85
8.1 Deploying QoS for Ethernet Services..............................................................................................................86
8.1.1 Configuration Roadmap..........................................................................................................................86
8.1.2 Data Planning..........................................................................................................................................86
8.1.3 Configuring Priority Mapping.................................................................................................................87
8.1.4 Configuring Queue Scheduling and Bandwidth......................................................................................88
8.2 Deploying QoS for ATM Services...................................................................................................................89
8.2.1 Configuration Roadmap..........................................................................................................................89
8.2.2 Data Planning..........................................................................................................................................89
8.2.3 Configuring Traffic Shaping...................................................................................................................90
1 Networking Requirements
Service Requirements
As Third Generation (3G) services and Long Term Extend (LTE) services develop, mobile
operators keep building and expanding RANs. This imposes high requirements on bandwidth,
expansion, and configuration flexibility of the RANs between NodeBs and Radio Network
Controllers (RNCs). IP datacom networks, as the mainstream of datacom networks, are large in
scale and provide a variety of access modes. To maximize carriers' return on investment, reduce
network construction costs, and evolve the exiting network smoothly into an LTE network, an
IPRAN solution is worked out.
In the Hierarchy VPN solution, ATN and CX series products are deployed on a RAN. The RAN
provides excellent Fixed-Mobile Convergence (FMC) capability and has simple and flexible
networking. The hierarchical network between CSGs and RSGs can bear various types of
services. ATN devices function as Cell Site Gateways (CSGs) and are connected to form an
access network. CX600s function as aggregation devices (ASGs) and Remote site gateways
(RSGs) and are connected to form an aggregation network. All these devices can be flexibly
deployed based on 2G, 3G, and LTE service requirements.
Network Topology
As shown in Figure 1-1, and Figure 1-2, the network needs to be constructed based on the
topologies; the corresponding network element names, device IP addresses need to be
configured; service interfaces and user interfaces need to be enabled.
NOTE
This example describes the networking of CSG dual-homing to ASGs and the networking of ASG dual-
homing to ASGs. If only single-homing is involved, only the slave device needs to be configured and no
switchover needs to be performed.
Data Planning
NOTE
Parameters need to be configured based on the real network conditions, such as the network scale and
network topology. The following parameter values are recommended ones in this example and only for
reference.
2 Basic Configurations
Data Planning
NOTE
The data provided in this section is used as an example and for reference, and may be different from that
in the real world situations, because the network scale and topology may differ.
Device information includes site names, device models, device roles, and device numbers. Each
device is named in the format of AA-BB-CC.
NOTE
Device roles are used to simplify description. For example, CSG1 stands for ATN910-AA-001. For details,
see "Network Topology" and "Data Planning" in "Service Requirements and Networking".
Configuration Procedure
#
sysname ATN910-AA-001
Data Planning
NOTE
The data provided in this section is used as an example and for reference, and may be different from that
in the real world situations, because the network scale and topology may differ.
l Configure loopback interfaces and their IP addresses on CSGs, ASGs, and RSGs. The
loopback interfaces remain Up after being created, and therefore CSGs, ASGs, and
RSGs can communicate with each other using loopback interfaces.
l Configure interfaces for connecting CSGs, ASGs, and RSGs, and the IP addresses of
these interfaces, so that CSGs, ASGs, and RSGs can communicate with each other.
3. Configure Ethernet service interfaces.
l Configure main interfaces or sub-interfaces as Ethernet service interfaces (including 10
Mbit/s and 100 Mbit/s Ethernet interfaces) based on the access type at the CSG side.
l Configure Layer 2 Etherent interfaces or VLANIF interfaces as Ethernet service
interfaces (including 1000 Mbit/s and 10000 Mbit/s Ethernet interfaces) based on the
access type at the RSG side.
4. Configure TDM service interfaces.
l Configure the TDM-encapsulated E1 channel at the CSG side. You can use either the
E1 channel in clear channel mode or the E1 channel in channelized mode based on
service and bandwidth requirements.
Channel Type Description PW Encapsulation
Type
l Configure the TDM-encapsulated VC12 channel on a CPOS interface at the RSG side
based on the E1 channel at the CSG side.
5. Configure ATM service interfaces.
l Configure the ATM-encapsulated E1 channel at the CSG side. You can use only the E1
channel in channelized mode based on service and bandwidth requirements.
l Configure the ATM interface at the RSG side based on the PVC created at the CSG
side.
CAUTION
l If a physical interface on the device is idle, without a cable being connected, run the
shutdown command to shut down the interface to prevent the interface from being interfered.
l After having configured services on an interface, run the shutdown and undo shutdown
commands in the interface view for the services to take effect.
Configuration Procedure
1. Configure interconnected interfaces on the IP/MPLS network.
l Configure a loopback interface.
interface LoopBack0
ip address 1.1.1.1 255.255.255.255//Configure an IP address for the
loopback interface.
l Configure a GE interface.
interface GigabitEthernet0/1/0
ip address 10.1.2.1 255.255.255.252
l Configure a GE sub-interface.
interface GigabitEthernet1/1/1.1
vlan-type dot1q 1
ip address 10.3.4.1 255.255.255.252
NOTE
Before adding a Layer 2 interface on the CX device to an Eth-Trunk interface, you need to run
the undo portswitch command to switch it into a Layer 3 interface.
l Configuring layer 3 attributes for an Eth-Trunk interface.
interface Eth-trunk 1.1
vlan-type dot1q 1
ip address 10.5.6.1 255.255.255.252
interface Eth-Trunk1
portswitch
port link-type trunk//Set the link type.
port trunk allow-pass vlan 100
#
interface VLANIF100
ip address 192.168.2.2 255.255.255.0//Configure an IP address for the
VLANIF interface. This IP address must be on a different network segment
with the IP address of the interface at the access side.
Data Planning
NOTE
The data provided in this section is used as an example and for reference, and may be different from that
in the real world situations, because the network scale and topology may differ.
Configuration Procedure
Add a local user named USER1.
aaa
local-user USER1 password cipher 12345678//Set the user name and password.
local-user USER1 level 15//Set a user level.
Data Planning
NOTE
The data provided in this section is used as an example and for reference, and may be different from that
in the real world situations, because the network scale and topology may differ.
Configuration Procedure
1. Set the maximum number of VTY user interfaces.
user-interface maximum-vty 15 //Set the maximum number of VTY user interfaces.
Data Planning
NOTE
The data provided in this section is used as an example and for reference, and may be different from that
in the real world situations, because the network scale and topology may differ.
snmp-agent community read public, write private Sets read and write
community names. The NMS
can access a device only
when the community names
set on the NMS are the same
as that set on the device.
Configuration Procedure
1. Configure SNMP.
snmp-agent
snmp-agent sys-info version all//Configure the system to use SNMP of all
versions.
snmp-agent mib-view included iso-view iso//The SNMP MIB view contains the iso
subtree.
snmp-agent community read public mib-view iso-view
snmp-agent community write private mib-view iso-view
Storage-type: nonVolatile
Community name:private
Group name:private
Storage-type: nonVolatile
2. # Check the IP address configured for the NMS that receives trap messages.
[HUAWEI] display snmp-agent target-host
Target-host NO. 1
-----------------------------------------------------------
IP-address : 11.1.1.1
VPN instance : -
Security name : public
Port : 162
Type : trap
Version : v1
Level : No authentication and privacy
NMS type : HW NMS
-----------------------------------------------------------
3 Deploying an IGP
Different IS-IS processes are deployed on access and aggregation rings to isolate routes. This is
to relieve the routing burden of CSGs.
3.1 Configuration Roadmap
This section describes the IS-IS configuration roadmap.
3.2 Data Planning
To deploy IS-IS, plan the following data.
3.3 Configuring Basic IS-IS Functions
Different IS-IS processes need to be configured on CSGs, ASGs, and RSGs.
3.4 Controlling Route Advertisement and Import
A routing policy needs to be configured to control the route advertisement and import on the
access and aggregation rings.
NOTE
If the number of CSGs on the access ring is great, and these CSGs are dual-homed to master and backup
ASGs, adjust the cost value of the link between CSGs according to the number of CSGs, ensuring that
traffic load balancing can be implemented between ASGs. This example only discusses the situation of
only one CSG. For details on the situation of multiple CSGs, refer to the relevant solution introduction.
NOTE
Parameter values need to be set based on the network conditions such as the network scale and network
topology. The following parameter values are recommended ones in this example and only for reference.
l ASG4:
49.0002.0000.0000.0004
.00
l RSG5:
49.0002.0050.0500.5005
.00
l RSG6:
49.0002.0060.0600.6006
.00
isis cost It is recommended that the Link costs are specified for
link cost of the interfaces in SPF calculation.
the access area be configured
as 10, the link cost of the
interfaces in the aggregation
area as 100, link cost between
ASGs as 100, and link cost
between RSGs as 1000.
Configuring CSGs
Configure CSGs on the access ring. Use the CSG1 as an example. The configuration procedure
is as follows:
Configuring ASGs
Configure IS-IS 1 and IS-IS 100 on the master and backup ASGs respectively. Configuring the
master ASG is similar to configuring the backup ASG. Use the configuration on ASG3 as an
example. The configuration procedure is as follows:
1. Configure IS-IS globally.
isis 1//Configure an IS-IS process on the access ring.
graceful-restart
is-level level-2
cost-style wide
timer lsp-generation 1 50 50
flash-flood level-2
network-entity 49.0001.0030.0300.3003.00
timer spf 1 50 50
traffic-eng level-2
log-peer-change
isis 100//Configure an IS-IS process on the aggregation ring.
graceful-restart
is-level level-2
cost-style wide
timer lsp-generation 1 50 50
flash-flood level-2
network-entity 49.0002.0030.0300.3003.00
timer spf 1 50 50
traffic-eng level-2
log-peer-change
Configuring RSGs
Configure IS-IS 100 on the master and backup RSGs respectively. The configurations on the
master and backup RSGs are similar. Use the configuration on RSG5 as an example. The
configuration procedure is as follows:
2. Import the Loopback 0 routes that are advertised to the aggregation ring to the access ring.
isis 1
import-route isis 100 route-policy LoopBack0 cost 100//Import the loopback0
routes with the cost of 100 in IS-IS 100 to IS-IS 1.
2. Import the Loopback 0 routes that are advertised to the aggregation ring to the access ring.
isis 1
import-route isis 100 route-policy LoopBack0 cost 200
Total Peer(s): 2
l Run the display isis interface command on a router to check information about IS-IS-
enabled interfaces.
If the IS-IS neighbor relationships are established, you can see that the router's IPv4
neighbors are Up.
[CSG1]display isis interface
l Run the display isis lsdb command to check the IS-IS Link State Database (LSDB) on each
router.
You can see that the LSDB on CSG1 contains only link state information on the access
ring.
l Run the display isis route command to check IS-IS routes on each router.
You can see that the IS-IS routes on CSG1 contain only the Loopback 0 routes on the
aggregation ring.
4 Deploying MPLS
MPLS TE needs to be configured for links between CSGs and RSGs to transmit MPLS VPN
services.
4.1 Configuration Roadmap
This section describes the roadmap for deploying MPLS.
4.2 Data Planning
To deploy MPLS, plan the following data.
4.3 Configuring MPLS TE and Hot Standby
MPLS TE is enabled to establish a primary tunnel and hot standby is enabled to establish a hot-
standby tunnel to protect traffic on the primary tunnel.These tunnels are used to transmit VPN
services.
4.4 Configuring Static BFD for TE
This section describes how to configure static BFD for TE to monitor primary tunnels. Static
BFD for TE speeds up L3VPN FRR traffic switchovers.
4.5 Configuring Static BFD for TE-LSP
This section describes how to Configure static BFD for TE-LSP to monitor primary CR-LSPs.
Static BFD for TE-LSP speeds up traffic switchovers.
As shown in Figure 4-1, an MPLS TE tunnel (MPLS VPN) is established between the CSG and
RSG to transmit wireless services.
1. Configure LSR-IDs and enable MPLS and MPLS TE globally on each device and interfaces
along the TE tunnel. In addition, enable OSPF on the ingress.
2. Create the tunnel for the Ethernet service.
(1) Create master VPN tunnels.
l Establish the master VPN tunnel TE1 between CSG1 and ASG3. Enable hot-
standby protection for TE1, with the primary explicit path and secondary explicit
path established.
l Establish the master VPN tunnel TE2 between ASG3 and RSG5. Enable hot-
standby protection for TE2, with the primary explicit path and secondary explicit
path established.
(2) Create the slave VPN tunnel.
l Establish the slave VPN tunnels TE3 and TE4 for TE1.
l Establish the slave VPN tunnel TE5 for TE2.
l Create a tunnel policy to bind the tunnel to the destination IP address. This allows
this tunnel only to transmit VPN services.
(3) Configure BFD for TE-LSP.
Configure BFD for TE-LSP on the master VPN tunnels TE1 and TE2, which speeds
up the switchover between the primary LSP and the hot-standby LSP.
(4) Configuring BFD for TE.
Configure BFD for TE on the master VPN tunnels TE1 and TE2, which speeds up the
switchover between the master tunnel and the slave tunnel in L3VPN FRR.
3. Create the ATM/TDM service tunnel.
(1) Enable MPLS L2VPN on each node along the TE tunnel, and configure LDP remote
peers on these nodes.
(2) Create the master VPN tunnel.
l Establish the master VPN tunnel TE1 between CSG1 and ASG3. Enable hot-
standby protection for TE1, with the primary explicit path and secondary explicit
path established.
l Establish the master VPN tunnel TE2 between ASG3 and RSG5. Enable hot-
standby protection for TE2, with the primary explicit path and secondary explicit
path established.
(3) Create the slave VPN tunnel.
l Establish the slave VPN tunnels TE3 and TE6 for TE1 or TE2.
l Establish TE7 between RSGs to facilitate the traffic to be diverted to the spoke
PW when a link fault occurs on the RSG side.
NOTE
If the Ethernet service shares the same tunnel with the ATM/TDM service, the same tunnel policy
can be configured for these services. Otherwise, different tunnel policies need to be configured.
4. Create a tunnel policy.
Bind the IP address of the remote peer to the tunnel policy, ensuring that VPN data from
the local end to the destination address is transmitted along the bound tunnel.
NOTE
Parameter values need to be set based on the network conditions such as network scale and network
topology. The following parameter values are recommended ones in this example and only for reference.
bfd bind mpls-te interface discriminator local BFD is bound to the primary
Tunnel te-lsp discriminator remote LSP of the master VPN
tunnel.
process-pst
The local discriminator is the
same as the remote
discriminator.The local
discriminator value of ATN
ranges from 1 to 255, and that
of CX600 ranges from 1 to
8191.
The minimum sending and
receiving intervals for BFD
packets need to be configured
according to configurations
of the live network. Detection
period = Detection multiple *
Sending/Receiving interval
(3*10 ms)
To speed up the switchover,
BFD is allowed to modify the
port state table.
bfd bind mpls-te interface discriminator local The master VPN tunnel to be
Tunnel discriminator remote monitored by BFD is
configured.
process-pst
The local discriminator is the
same as the remote
discriminator.The local
discriminator value of ATN
ranges from 1 to 255, and that
of CX600 ranges from 1 to
8191.
The minimum sending and
receiving intervals for BFD
packets need to be configured
according to configurations
of the live network. Detection
period=detection
multiple*sending/receiving
interval (3*100 ms)
To speed up the switchover,
BFD sessions are allowed to
modify the port state table.
NOTE
IGP TE has been enabled.
Configuring CSGs
Configure MPLS TE tunnels on each CSG on the access network:
l Establish an RSVP-TE tunnel with hot-standby CR-LSP between CSG1 and ASG3.
l Establish an RSVP-TE tunnel between CSG1 and ASG4.
mpls te tunnel-id 14
mpls te record-route label
mpls te path explicit-path main_1to4
mpls te commit
Configuring ASGs
Configure MPLS TE tunnels on each ASG:
l Establish RSVP-TE tunnels with Hot-standby CR-LSP between ASG3 and CSG1 and
between ASG3 and RSG5.
l Establish RSVP-TE tunnels between ASG4 and CSG1 and between ASG4 and RSG5.
l Establish an RSVP-TE tunnel between ASG3 and RSG6.
l Establish an RSVP-TE tunnel between ASG4 and RSG6.
The configuration on the master ASG is similar to that on the backup ASG. Use ASG3 (master)
as an example.
1. Enable MPLS TE globally and on interfaces.
mpls lsr-id 3.3.3.3
mpls
mpls te
label advertise non-null//Allocate non-null labels to the penultimate hop.
Allocating non-null labels from the egress to the penultimate hop is a default
setting on ATNs. To communicate with ATNs, CX600s are configured to allocate
non-null labels to the penultimate hops.
mpls rsvp-te
mpls rsvp-te hello
mpls rsvp-te hello full-gr
mpls te cspf
#
interface GigabitEthernet1/1/2
mpls
mpls te
mpls rsvp-te
mpls rsvp-te hello
mpls rsvp-te srefresh
#
interface GigabitEthernet1/1/1.1
mpls
mpls te
mpls rsvp-te
mpls rsvp-te hello
mpls rsvp-te srefresh
#
interface GigabitEthernet1/1/3
mpls
mpls te
mpls rsvp-te
mpls rsvp-te hello
mpls rsvp-te srefresh
#
interface GigabitEthernet1/1/0
mpls
mpls te
mpls rsvp-te
mpls rsvp-te hello
mpls rsvp-te srefresh
next hop 4.4.4.4 exclude//Prevent the primary CR-LSP from passing through the
backup ASG. Using a loose explicit path is recommended. A loose explicit path
allows the future operation of adding nodes to the ring.
#
explicit-path standby_3to1//Specify an explicit path for a hot-standby CR-LSP
between ASG3 and CSG1.
next hop 4.4.4.4 include loose
#
explicit-path main_3to5//Specify an explicit path for the primary CR-LSP
between ASG3 and RSG5.
next hop 6.6.6.6 exclude//Prevent the TE tunnel from passing through the
backup RSG. Using a loose explicit path is recommended. A loose explicit path
allows the future operation of adding nodes to the ring.
#
explicit-path standby_3to5//Specify an explicit path for a hot-standby CR-LSP
between ASG3 and RSG5.
next hop 6.6.6.6 include loose
#
explicit-path main_3to6//Specify an explicit path for a CR-LSP between ASG3 and
RSG6.
next hop 5.5.5.5 exclude//Prevent the primary CR-LSP in the primary TE tunnel
from passing through the master RSG.
Configuring RSGs
Configure MPLS TE tunnels on each RSG:
l Establish an RSVP-TE tunnel with Hot-standby CR-LSP between RSG5 and ASG3.
l Establish an RSVP-TE tunnel between RSG6 and ASG3.
l Establish an RSVP-TE tunnel between RSG5 and ASG4.
l Establish an RSVP-TE tunnel for bypass PW between RSG5 and RSG6.
l Establish an RSVP-TE tunnel between RSG6 and ASG4.
The configuration on the master RSG is similar to that on the backup RSG. Use RSG5 (master)
as an example.
1. Enable MPLS TE globally and on interfaces.
mpls lsr-id 5.5.5.5
mpls
mpls te
label advertise non-null//Allocate non-null labels to the penultimate hop.
Allocating non-null labels from the egress to the penultimate hop is a default
setting on ATNs. To communicate with ATNs, CX600s are configured to allocate
non-null labels to the penultimate hops.
mpls rsvp-te
mpls rsvp-te hello
mpls rsvp-te hello full-gr
mpls te cspf
#
interface GigabitEthernet1/0/0
mpls
mpls te
mpls rsvp-te
mpls rsvp-te hello
mpls rsvp-te srefresh
#
interface Eth-Trunk 1.1
mpls
mpls te
mpls rsvp-te
mpls rsvp-te hello
mpls rsvp-te srefresh
destination 3.3.3.3
mpls te tunnel-id 53
mpls te record-route label
mpls te path explicit-path main_5to3
mpls te path explicit-path standby_5to3 secondary
mpls te backup hot-standby wtr 60
mpls te commit
#
interface Tunnel0/0/54//Configure a tunnel interface for the tunnel between
RSG5 and ASG4.
ip address unnumbered interface LoopBack0
tunnel-protocol mpls te
destination 4.4.4.4
mpls te tunnel-id 54
mpls te record-route label
mpls te path explicit-path main_5to4
mpls te commit
#
interface Tunnel0/0/56//Configure a tunnel interface for the tunnel between
RSG5 and RSG6.
ip address unnumbered interface LoopBack0
tunnel-protocol mpls te
destination 6.6.6.6
mpls te tunnel-id 56
mpls te record-route label
mpls te path explicit-path main_5to6
mpls te commit
l Run the tracert lsp te tunnel command to check the forwarding paths of CR-LSPs.
This command is used to verify that the links of the primary and hot-standby tunnels do
not overlap.
[ASG3]tracert lsp te Tunnel 0/0/31
LSP Trace Route FEC: TE TUNNEL IPV4 SESSION QUERY Tunnel0/0/31 , press CTRL_C
to break.
TTL Replier Time Type Downstream
0 Ingress 10.1.3.1/[3 ]
1 1.1.1.1 70 ms Egress
[ASG3]tracert lsp te Tunnel 0/0/31 hot-standby
LSP Trace Route FEC: TE TUNNEL IPV4 SESSION QUERY Tunnel0/0/31 , press CTRL_C
to break.
TTL Replier Time Type Downstream
0 Ingress 10.3.4.2/[1026 ]
1 10.3.4.2 40 ms Transit 10.2.4.1/[1026 ]
2 10.2.4.1 40 ms Transit 10.1.2.1/[3 ]
3 1.1.1.1 40 ms Egress
l Run the display mpls te tunnel-interface to view information about tunnel interfaces on
CSG1.
# Display tunnel interface information. The command output shows that the primary and
hot-standby CR-LSPs have been established successfully.
<CSG1> display mpls te tunnel-interface tunnel 0/0/13
================================================================
Tunnel0/0/13
================================================================
Tunnel State Desc : UP
Active LSP : Primary LSP
Session ID : 13
Ingress LSR ID : 1.1.1.1 Egress LSR ID: 3.3.3.3
Admin State : UP Oper State : UP
Primary LSP State : UP
Main LSP State : READY LSP ID : 1
Hot-Standby LSP State : UP
Main LSP State : READY LSP ID : 32770
================================================================
Tunnel0/0/14
================================================================
Tunnel State Desc : UP
Active LSP : Primary LSP
Session ID : 14
Ingress LSR ID : 1.1.1.1 Egress LSR ID: 4.4.4.4
Admin State : UP Oper State : UP
Primary LSP State : UP
Main LSP State : READY LSP ID : 1
Configuring CSGs
Configure static BFD for TE to monitor the primary tunnel between CSG1 and ASG3.
1. Enable BFD.
bfd
bfd
# Configure static BFD for TE on Tunnel0/0/35 for the primary tunnel between ASG3 and
RSG5.
bfd TE35 bind mpls-te interface Tunnel0/0/35//Configure static BFD to monitor
the primary CR-LSP on Tunnel0/0/35.
discriminator local 35//Specify the local discriminator. The local
discriminator on one end is the same as the remote discriminator on the other
end of a BFD session.
discriminator remote 53//Specify the remote discriminator.
min-tx-interval 100//Set the local minimum interval at which BFD packets are
sent to 100 ms.
min-rx-interval 100//Set the local minimum interval at which BFD packets are
received to 100 ms.
process-pst//Enable the BFD session to modify the PST, speeding up a traffic
switchover.
commit//Commit the BFD session configurations.
# Configure static BFD for TE-LSP on Tunnel0/0/35 for the primary CR-LSP between
ASG3 and RSG5.
bfd LSP35 bind mpls-te interface Tunnel0/0/35 te-lsp//Configure static BFD to
monitor the primary CR-LSP on Tunnel0/0/35.
discriminator local 305
discriminator remote 503
min-tx-interval 10
min-rx-interval 10
process-pst
commit
1. Enable BFD.
bfd
The BFD session of the S_TE_LSP type is in the Up state. The BFD session has been established
successfully.
<CSG1> display bfd session all for-lsp
--------------------------------------------------------------------------------
Local Remote PeerIpAddr State Type InterfaceName
--------------------------------------------------------------------------------
103 301 3.3.3.3 Up S_TE_LSP Tunnel0/0/13
--------------------------------------------------------------------------------
Total UP/DOWN Session Number : 1/0
<ASG3> display bfd session all for-lsp
--------------------------------------------------------------------------------
Local Remote PeerIpAddr State Type InterfaceName
--------------------------------------------------------------------------------
301 103 1.1.1.1 Up S_TE_LSP Tunnel0/0/31
305 503 5.5.5.5 Up S_TE_LSP Tunnel0/0/35
--------------------------------------------------------------------------------
Total UP/DOWN Session Number : 1/0
<RSG5> display bfd session all for-lsp
--------------------------------------------------------------------------------
Local Remote PeerIpAddr State Type InterfaceName
--------------------------------------------------------------------------------
503 305 3.3.3.3 Up S_TE_LSP Tunnel0/0/53
--------------------------------------------------------------------------------
Total UP/DOWN Session Number : 1/0
Hierarchical BGP and MPLS VPN need to be configured between CSGs and RSGs to bear ETH
services.
5.1 Configuration Roadmap
This section describes the roadmap for configuring hierarchical BGP/MPLS VPN and service
protection.
5.2 Data Planning
To deploy L3VPN, plan the following data.
5.3 Configuring MP-BGP
To transmit 3G and LTE Ethernet services, MP-BGP needs to be configured between CSGs and
RSGs to implement hierarchical BGP/MPLS VPN.
5.4 Configuring a VPN
VPN instances need to be configured to advertise VPNv4 routes and forward data to achieve
communication over a L3VPN.
5.5 Configuring Protection Switching
To protect services from CSGs to RSGs, BGP GR and VPN FRR need to be configured.
5.6 Configuring VRRP
To protect links between RSGs and the MBB Core, VRRP needs to be configured between the
master and backup RSGs.
For local switching services between CSGs, create VPN instances on each CSG and on
the ASG and RSG to which the CSG belongs. (This is applicable in the case where
CSGs belong to different ASGs.) Configure ASGs to advertise default routes to only
the corresponding CSGs.
l HoVPN
For all services, configure hierarchical L3VPN on ASGs by specifying CSGs as UPEs.
Configure ASGs to advertise only default routes to CSGs.
NOTE
The H-VPN solution is used as an example.
3. Configure service protection switching.
l Enable BGP GR and BGP tracking on the entire network. This is to ensure that BGP
peer relationships are not interrupted during a master/backup device switchover and
speed up IBGP route convergence.
l Increase the ConnectRetry interval for re-establishing the BGP peer relationship
between a CSG and the master ASG.
This configuration allows the BGP peer relationship to be established between the CSG
and the master ASG after the BGP peer relationship has been established between the
recovered master ASG and the master RSG during LTE X2 service deployment.
l Configure VPN FRR or BFD for BGP.
VPN FRR is recommended. If no VPN instance is created on the deployed devices,
configure BFD for BGP to speed up the master/backup device switchover.
4. Configure VRRP.
To protect the links between RSGs and the MBB core, configure VRRP over VLANIF
between the master and backup RSGs.
(1) Configure the interfaces that connect the master and backup RSGs and the interfaces
that connect the master and backup RSGs to the RNC to be Layer 2 switch interfaces,
and add these interfaces to a VLAN.
(2) Create a VLANIF interface on the master and backup RSGs and configure VRRP over
VLANIF.
(3) Configure BFD between the master and backup RSGs to check Layer 2 links and
remote private network addresses. This is to speed up the master/backup device
switchover.
(4) Configure VRRP switchback delay on the master RSG. If VRRP switchback delay is
not configured, both NEs may be in the master state during VRRP switchback. This
will result in packet loss.
NOTE
The data provided in this section is used as an example, which may be different from that in real world
situations because the network scale and topology may differ.
Configuring CSGs
Configure CSGs on the access ring. Use CSG1 as an example.
1. Configure a route-policy and set a lower priority for the routes to the backup ASG.
route-policy pref permit node 10
apply local-preference 50//Set the local preference of BGP routes to 50.
NOTE
To allow LTE X2 services to be transmitted between eNodeBs, configure CSG2. The configuration of
CSG2 is similar to that of CSG1, and is not provided here.
Configuring ASGs
For LTE X2 services, ASGs advertise only default routes to CSGs. For other services, ASGs
advertise specific routes to CSGs.
# Configure the master and backup ASGs. Use the configuration of ASG3 as an example.
1. Configure an IP prefix list to match the default route for LTE X2 services.
ip ip-prefix default index 10 permit 0.0.0.0 0//Permit the default route
0.0.0.0 0.
ip ip-prefix default index 20 permit 192.168.2.0 24 greater-equal 24 less-
equal 32//Permit the core route 192.168.2.0.
ip ip-prefix nodefault index 10 deny 0.0.0.0 0//Deny the default route 0.0.0.0
0.
ip ip-prefix nodefault index 20 permit 0.0.0.0 0 less-equal 32//Permit all
routes except the default route.
NOTE
For details on tunnel policy configurations, see the section "Deploying MPLS."
3. Configure MP-IBGP peers.
bgp 100
router-id 3.3.3.3
group CSG internal//Create an IBGP peer group named CSG.
peer CSG connect-interface LoopBack0
peer 1.1.1.1 group CSG//Add CSGs to the CSG peer group.
peer 2.2.2.2 group CSG
group RSG internal//Create an IBGP peer group named RSG.
peer RSG connect-interface LoopBack0
peer 5.5.5.5 group RSG//Add RSGs to the RSG peer group.
peer 6.6.6.6 group RSG
#
ipv4-family vpnv4
reflector cluster-id 1//Configure ASGs as RRs.
undo policy vpn-target//Cancel VPN target-based filtering for VPNv4 routes
to allow all VPN routes to be received.
tunnel-selector IPRAN//Configure a tunnel selector and bind a VPN to a TE
tunnel.
peer CSG enable
peer CSG ip-prefix default export//Permit the default VPN route 0.0.0.0 0
sent to the CSGs. (This configuration is for LTE X2 services.)
peer CSG reflect-client//Configure CSGs as clients of ASGs (RRs).
peer CSG next-hop-local//Configure the ASG to set its IP address as the next
hop of routes when the ASG advertises routes to a CSG.
peer 1.1.1.1 group CSG
peer 2.2.2.2 group CSG
peer RSG enable
peer RSG ip-prefix nodefault export//Deny the default VPN route 0.0.0.0 0
sent to the RSGs. (This configuration is for LTE X2 services.)
peer RSG reflect-client//Configure RSGs as clients of ASGs (RRs).
peer RSG next-hop-local//Configure the ASG to set its IP address as the next
hop of routes when the ASG advertises routes to an RSG.
peer 5.5.5.5 group RSG
peer 6.6.6.6 group RSG
NOTE
Configure ASG4 as a different RR. The configuration is similar to that of ASG3 and is not provided here.
Configuring RSGs
# Configure the master and backup RSGs. Use the configuration of RSG5 as an example.
Configure MP-IBGP peers.
bgp 100
router-id 5.5.5.5
peer 3.3.3.3 as-number 100
peer 3.3.3.3 connect-interface LoopBack0
peer 4.4.4.4 as-number 100
peer 4.4.4.4 connect-interface LoopBack0
#
ipv4-family vpnv4
peer 3.3.3.3 enable
peer 4.4.4.4 enable
NOTE
The configuration of RSG6 is similar to that of RSG5, and is not provided here.
Configuring CSGs
# Configure CSGs. Use the configuration of CSG1 as an example.
NOTE
The configuration of CSG2 is similar to that of CSG1, and is not provided here.
Configuring ASGs
For LTE X2 services, ASGs advertise only default routes to CSGs. For other services, ASGs
advertise specific routes to CSGs. On ASGs, VPN instances are created only for LTE X2
services.
# Configure the master and backup ASGs. Use the configuration of ASG3 as an example.
NOTE
The configuration of ASG4 is similar to that of ASG3, and is not provided here.
Configuring RSGs
# Configure the master and backup RSGs. Use the configuration of RSG5 as an example.
1. Configure VPN instances.
# Create VPN instances based on service types.
ipv4-family ip vpn-instance LTE_S1//Specify a VPN target for LTE S1 services.
route-distinguisher 100:1
tnl-policy IPRAN
vpn-target 1:1 2:2 export-extcommunity//Configure the RSG to send routing
information of CSG1 and CSG2.
vpn-target 1:1 2:2 import-extcommunity//Configure the RSG to receive routing
information of CSG1 and CSG2.
NOTE
The configuration of RSG6 is similar to that of RSG5, and is not provided here.
NOTE
When a PE has multiple interfaces bound to the same VPN instance, specify the source address in
the ping -vpn-instance command to ping the remote PE. Otherwise, the ping may fail.
l Run the display ip vpn-instance verbose command to check VPN instance configurations.
[CSG1] display ip vpn-instance verbose
Total VPN-Instances configured : 2
Interfaces : Ethernet0/3/1
Address family ipv4
Create date : 2011/07/07 12:09:15 UTC-08:00
Up time : 0 days, 00 hours, 10 minutes and 18 seconds
Route Distinguisher : 200:2
Export VPN Targets : 100:1
Import VPN Targets : 100:1
Label Policy : label per route
The diffserv-mode Information is : uniform
The ttl-mode Information is : pipe
Tunnel Policy : IPRAN
Log Interval : 5
l Run the display ip routing-table vpn-instance command to view the routing table of the
VPN instance.
[ASG3]dis ip routing-table vpn-instance LTE_X2
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: LTE_X2
Destinations : 2 Routes : 2
Configuring CSGs
Configure CSGs on the access ring. Use CSG1 as an example.
NOTE
Configure BFD for TE on the working VPN tunnel to speed up a VPN FRR switchover. For details
on how to configure BFD for TE, see the section "Deploying MPLS."
Configuring ASGs
# Configure the master and backup ASGs. Use the configuration of ASG3 as an example.
3. If no VPN instance is created on ASGs, configure BFD for BGP on ASGs and RSGs to
speed up master/backup RSG switchover in the case of an RSG failure. Only the ASG
configurations are provided here. For RSG configurations, see related sections.
bgp 100
peer 5.5.5.5 bfd min-tx-interval 100 min-rx-interval 100//Speed up the master/
backup RSG switchover.
peer 5.5.5.5 bfd enable
Configuring RSGs
# Configure the master and backup RSGs. Use the configuration of RSG5 as an example.
1. Configure BGP GR.
bgp 100
graceful-restart
peer 3.3.3.3 tracking delay 30
peer 4.4.4.4 tracking delay 30
NOTE
Configure BFD for TE on the working VPN tunnel to speed up a VPN FRR switchover. For details
on how to configure BFD for TE, see the section "Deploying MPLS."
3. If BFD for BGP is configured on ASGs, BFD sessions need to be configured on RSGs.
bgp 100
peer 3.3.3.3 bfd min-tx-interval 100 min-rx-interval 100//Configure BFD for
BGP process on an ASG.
peer 3.3.3.3 bfd enable
1. Create a VLAN.
vlan batch 100 //Create VLAN 100.
3. Configure a VLAN trunk between the master RSG and the Core.
interface GigabitEthernet1/0/2
portswitch
negotiation auto
undo shutdown
port link-type trunk//Configure the same link type on the master RSG and the
MBB core.
port trunk allow-pass vlan 100
5. Configure BFD.
l # Configure BFD for VRRP.
min-rx-interval 10
commit
3. Configure a VLAN trunk between the master RSG and the MBB Core.
interface GigabitEthernet1/0/2
portswitch
negotiation auto
undo shutdown
port link-type trunk
port trunk allow-pass vlan 100
5. Configure BFD.
l # Configure BFD for VRRP.
vrrp recover-delay 60//Set the delay for restoring the status of a VRRP backup
group to 60 seconds.
Multi-segment PWs need to be created between CSGs and RSGs to bear TDM services.
CAUTION
If the ATM/TDM service and Ethernet service share the same hot-standby protection
tunnel, the detection period of BFD for PW must be longer than the switching delay for the
hot-standby LSP, preventing repeated switchover.
5. Configuring E-APS
Configuring E-APS between RSGs.
NOTE
In addition to configuring E-APS on RSGs, configuring E-APS on the core side (Base Station
Controllers) adjacent to the RSGs. For details on configurations of Base Station Controllers, refer to
the relevant product manual.
l Configure the TDM-encapsulated E1 channel on a CPOS interface at the RSG side based
on the channel type at the CSG side.
# Configure TDM PW services.
NOTE
Parameter values need to be set based on the network conditions such as the network scale and network
topology. The following parameter values are recommended ones in this example and only for reference.
mpls l2vpn — —
mpls ldp Remote LDP peer sessions LDP is enabled globally and
mpls ldp remote-peer are established between the remote LDP peer sessions are
ASG and the CSG, and created.
between the ASG and the In this example, TE tunnels
RSG. are configured between the
CSG and RSG. PWE3 uses
extended LDP signaling to
distribute VPN labels.
Therefore, a remote MPLS
LDP session has to be
configured between the CSG
and RSG.
bfd bind pw pw-ttl auto- discriminator local BFD sessions are configured
calculate discriminator remote to monitor PWs in TTL mode
and the number of hops in a
min-tx-interval PW is calculated
min-rx-interval automatically.
The minimum sending and
receiving intervals for BFD
packets need to be configured
according to configurations
of the live network.
Detection period=detection
multiple * sending/receiving
interval
If the tunnel is shared by
Ethernet services, the
detection period becomes
3*100 ms because TE hot-
standby is used. If the tunnel
is in independent mode, the
detection period becomes
3*10 ms.
3. Configure a PW profile.
pw-template tdm//Create a PW profile for TDM services.
control-word//Enable the control word for TDM services to help transmit alarm
and clock information.
tnl-policy IPRAN//Configure the tunnel policy for PWs.
jitter-buffer depth 8//Set the depth of the jitter buffer to 8.
tdm-encapsulation-number 8//Set the number of TDM frames to be encapsulated
into a PW packet to 8, and the number must be the same on both ends of a PW.
4. Configure PWs.
controller E1 0/2/0
using e1//Configure the clear channel mode.
# interface Serial0/2/0:0 //Enter the view of the serial interface
corresponding to the E1 channel, and the serial interface number should
correspond to the E1 interface.
link-protocol tdm //Configure the link protocol as TDM.
mpls l2vc 3.3.3.3 pw-template tdm 100//Specify the PW between CSG1 and the
master ASG as the primary PW.
mpls l2vc 4.4.4.4 pw-template tdm 101 secondary//Specify the PW between CSG1
and the backup ASG as the secondary PW.
mpls l2vpn redundancy independent//Configure PW redundancy. The combined use
of PW redundancy and the bypass PW can prevent network-side faults from
affecting the AC side .
mpls l2vpn stream-dual-receiving//Allow both the primary and secondary PWs to
receive packets. This prevents packet loss during traffic switchback to the
primary PW.
mpls l2vpn oam-mapping//Enable the mapping between the AC status and the
network side status
3. Configure PW switching.
mpls switch-l2vc 5.5.5.5 200 tunnel-policy IPRAN between 1.1.1.1 100 tunnel-
policy IPRAN encapsulation satop-e1 control-word-transparent//Configure PW
switching for the primary PW of which the encapsulation mode is satop-e1.
#
mpls ldp remote-peer 1.1.1.1
remote-ip 1.1.1.1
#
mpls ldp remote-peer 6.6.6.6
remote-ip 6.6.6.6
3. Configure PW switching.
mpls switch-l2vc 6.6.6.6 201 tunnel-policy IPRAN between 1.1.1.1 101 tunnel-
policy IPRAN encapsulation satop-e1 control-word-transparent//Configure PW
switching for the secondary PW.
3. Configure a PW profile.
pw-template tdm
control-word
tnl-policy IPRAN
jitter-buffer depth 8
tdm-encapsulation-number 8
4. Configure PWs.
interface Trunk-Serial0/1:0
link-protocol tdm
mpls l2vc 3.3.3.3 pw-template tdm 200//Configure the primary PW.
mpls l2vc 6.6.6.6 pw-template tdm 1000 bypass//Configure the bypass PW.
mpls l2vpn oam-mapping
#
3. Configure a PW profile.
pw-template tdm
control-word
tnl-policy IPRAN
jitter-buffer depth 8
tdm-encapsulation-number 8
5. Configure PWs.
interface Trunk-Serial0/1:0
link-protocol tdm
mpls l2vc 4.4.4.4 pw-template tdm 201
mpls l2vc 5.5.5.5 pw-template tdm 1000 bypass
mpls l2vpn oam-mapping
#
--- FEC: FEC 128 PSEUDOWIRE (NEW). Type = satop-e1, ID = 100 ping statistics
- --
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 1/1/1 ms
<RSG5> ping vc satop-e1 200 control-word remote 1.1.1.1 100
--- FEC: FEC 128 PSEUDOWIRE (NEW). Type = satop-e1, ID = 200 ping statistics
- --
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 5/9/14 ms
l Run the tracert vc command on CSG1 and RSGs to know information about the tunnels
that the PWs pass through and about outbound interfaces.
<CSG1> tracert vc satop-e1 100 control-word
tracert vc satop-e1 100 control-word
TTL Replier Time Type Downstream
0 Ingress 10.1.3.2/[4113 4096 ]
1 10.1.3.2 1 ms Egress
<RSG5> tracert vc satop-e1 200 control-word
l Check L2VPN connections on CSG1 and RSGs. The result shows that an L2VC is set up
and is in the Up state between CSG1 and each RSG. The following lists the check results
on CSG1 and RSG5 as an example.
<CSG1> display mpls l2vc brief
*Client Interface : Serial0/2/0:0
Administrator PW : no
AC status : up
VC State : up
Label state : 0
Token state : 0
VC ID : 100
VC Type : SAT E1 over Packet
session state : up
Destination : 3.3.3.3
link state : up
TDM encapsulation number : 8
jitter-buffer : 8
idle-code : ff
rtp-header : disable
The BFD session of the S_TE_TNL type is in the Up state. The BFD session has been established
successfully.
<CSG1> display bfd session all for-pw
--------------------------------------------------------------------------------
Local Remote PeerIpAddr State Type InterfaceName
--------------------------------------------------------------------------------
150 150 --.--.--.-- Up S_PW(M) Serial0/2/0:0
200 200 --.--.--.-- Up S_PW(M) Serial0/2/0:0
--------------------------------------------------------------------------------
Total UP/DOWN Session Number : 2/0
<RSG5> display bfd session all for-pw
--------------------------------------------------------------------------------
Local Remote PeerIpAddr State Type InterfaceName
--------------------------------------------------------------------------------
150 150 --.--.--.-- Up S_PW(M) Trunk-Seria1/1:0
--------------------------------------------------------------------------------
Total UP/DOWN Session Number : 1/0
NOTE
E-APS needs to be configured on both RSGs and the Base Station Controller (BSC) connected to the RSGs.
For details on how to configure E-APS on the BSC, see the BSC manuals.
--------------------------------------------------------------------------------
total entry: 1
[RSG6]display aps group 1
APS Group 1: APS working channel is 5.5.5.5
Cpos1/0/0 protection channel 0(Inactive)
Bidirection, 1:1 mode, Revert time(1 minutes)
KeepAlive Timer: 1(seconds), Hold Timer: 180(seconds)
No Request on Both Working and Protection Side
--------------------------------------------------------------------------------
Group Work-Channel Protect-Channel Wtr W-State P-State Switch-Cmd Switch-Result
--------------------------------------------------------------------------------
1 5.5.5.5 Cpos1/0/0 1 ok ok NA idle
--------------------------------------------------------------------------------
total entry: 1
Multi-segment PWs need to be created between CSGs and RSGs to bear ATM services.
CAUTION
If the ATM/TDM service and Ethernet service share the same hot-standby protection
tunnel, the detection period of BFD for PW must be longer than the switching delay for the
hot-standby LSP, preventing repeated switchover.
5. Configuring E-APS
Configuring E-APS between RSGs.
NOTE
In addition to configuring E-APS on RSGs, configuring E-APS on the core side (Base Station
Controllers) adjacent to the RSGs. For details on configurations of Base Station Controllers, refer to
the relevant product manual.
l Configure the ATM-encapsulated E1 channel at the CSG side. You can use only the E1
channel in channelized mode based on service and bandwidth requirements.
l Configure ATM interfaces at the RSG side based on the PVC created at the CSG side.
# Configure ATM PW services.
NOTE
Parameter values need to be set based on the network conditions such as the network scale and network
topology. The following parameter values are recommended ones in this example and only for reference.
mpls l2vpn — —
mpls ldp Remote LDP peer sessions LDP is enabled globally and
mpls ldp remote-peer are established between the remote LDP peer sessions are
ASG and the CSG, and created.
between the ASG and the In this example, TE tunnels
RSG. are configured between the
CSG and RSG. PWE3 uses
extended LDP signaling to
distribute VPN labels.
Therefore, a remote MPLS
LDP session has to be
configured between the CSG
and RSG.
bfd bind pw pw-ttl auto- discriminator local BFD sessions are configured
calculate discriminator remote to monitor PWs in TTL mode
and the number of hops in a
min-tx-interval PW is calculated
min-rx-interval automatically.
The minimum sending and
receiving intervals for BFD
packets need to be configured
according to configurations
of the live network.
Detection period=detection
multiple * sending/receiving
interval
If the tunnel is shared by
Ethernet services, the
detection period becomes
3*100 ms because TE hot-
standby is used. If the tunnel
is in independent mode, the
detection period becomes
3*10 ms.
3. Configure a PW profile.
pw-template atm
max-atm-cells 1 //Set the maximum number of cells to be encapsulated into a
packet to 1.
control-word//Enable the control word for ATM services to transmit alarm and
clock information.
tnl-policy IPRAN
4. Configure PWs.
interface Ima-group0/2/1.2 p2p//Configure ATM cell relay in 1-to-1 VCC mode on
a sub-interface in an IMA group.
pvc 1/100
map pvc 1/100 bidirectional//Configure the mapping between the local VPI/VCI
3. Configure PW switching.
mpls switch-l2vc 5.5.5.5 500 tunnel-policy IPRAN between 1.1.1.1 300 tunnel-
policy IPRAN encapsulation atm-1to1-vcc control-word-transparent//Configure PW
switching for the primary PW of which the encapsulation mode is atm-1to1-vcc.
3. Configure PW switching.
mpls switch-l2vc 6.6.6.6 501 tunnel-policy IPRAN between 1.1.1.1 301 tunnel-
policy IPRAN encapsulation atm-1to1-vcc control-word-transparent//Configure PW
switching for the secondary PW. #
mpls ldp
graceful-restart
#
mpls ldp remote-peer 3.3.3.3
remote-ip 3.3.3.3
#
mpls ldp remote-peer 6.6.6.6
remote-ip 6.6.6.6
3. Configure a PW profile.
pw-template atm
max-atm-cells 1
control-word
tnl-policy IPRAN
4. Configure PWs.
#
interface Atm-Trunk1.1 p2p
pvc 1/100//Configure the mapping between the local VPI/VCI and the VPI/VCI on
CSG1.
mpls l2vc 3.3.3.3 pw-template atm 500 //Configure the primary PW.
mpls l2vc 6.6.6.6 pw-template atm 2000 bypass//Configure the bypass PW.
#
3. Configure a PW profile.
pw-template atm
max-atm-cells 1
control-word
tnl-policy IPRAN
4. Configure PWs.
interface Atm-Trunk1.1 p2p
pvc 1/100
mpls l2vc 4.4.4.4 pw-template atm 501
mpls l2vc 5.5.5.5 pw-template atm 2000 bypass
#
--- FEC: FEC 128 PSEUDOWIRE (NEW). Type = atm-1to1-vcc, ID = 300 ping
statisti cs ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 1/1/1 ms
<RSG5> ping vc atm-1to1-vcc 500 control-word remote 1.1.1.1 300
Reply from 1.1.1.1: bytes=100 Sequence=1 time=20 ms
Reply from 1.1.1.1: bytes=100 Sequence=2 time=17 ms
Reply from 1.1.1.1: bytes=100 Sequence=3 time=12 ms
Reply from 1.1.1.1: bytes=100 Sequence=4 time=14 ms
Reply from 1.1.1.1: bytes=100 Sequence=5 time=12 ms
--- FEC: FEC 128 PSEUDOWIRE (NEW). Type = atm-1to1-vcc, ID = 500 ping
statisti cs ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 12/15/20 ms
l Run the tracert vc command on CSG1 and RSGs to know information about the tunnels
that the PWs pass through and about outbound interfaces.
<CSG1> tracert vc atm-1to1-vcc 300 control-word
TTL Replier Time Type Downstream
0 Ingress 10.1.3.2/[4115 4096 ]
1 10.1.3.2 1 ms Egress
<RSG5> tracert vc atm-1to1-vcc 500 control-word
TTL Replier Time Type Downstream
0 Ingress 10.3.5.1/[4114 4111 ]
1 10.3.5.1 12 ms Egress
l Check L2VPN connections on CSG1 and RSGs. The result shows that an L2VC is set up
and is in the Up state between CSG1 and each RSG. The following lists the check results
on CSG1 and RSG5 as an example.
<CSG1> display mpls l2vc brief
*Client Interface : Ima-group0/2/1.1
Administrator PW : no
AC status : up
VC State : up
Label state : 0
Token state : 0
VC ID : 300
VC Type : ATM 1to1 VCC
session state : up
Destination : 3.3.3.3
link state : up
max ATM cells : 1
ATM pack overtime : 1000
seq-number : disable
The BFD session of the S_TE_TNL type is in the Up state. The BFD session has been established
successfully.
<CSG1> display bfd session all for-pw
--------------------------------------------------------------------------------
Local Remote PeerIpAddr State Type InterfaceName
--------------------------------------------------------------------------------
100 100 --.--.--.-- Up S_PW(M) Ima-group0/2/1.1
200 200 --.--.--.-- Up S_PW(M) Ima-group0/2/1.1
--------------------------------------------------------------------------------
Total UP/DOWN Session Number : 2/0
<RSG5> display bfd session all for-pw
--------------------------------------------------------------------------------
Local Remote PeerIpAddr State Type InterfaceName
--------------------------------------------------------------------------------
100 100 --.--.- -.-- Up S_PW(M) Atm-Trunk1.1
--------------------------------------------------------------------------------
Total UP/DOWN Session Number : 1/0
NOTE
E-APS needs to be configured on both RSGs and the Base Station Controller (BSC) connected to the RSGs.
For details on how to configure E-APS on the BSC, see the BSC manuals.
8 Deploying QoS
This chapter describes the roadmap, data planning, and procedure for configuring QoS in the
DiffServ model.
NOTE
The data provided in this section is used as an example and for reference, which may be different from that
in real world situations because the network scale and topology may differ.
Table 8-2 QoS profile and flow queues on the ATN device
Device Name Normal Queue Scheduli Rate of Weight
Role Conditio Priority ng Mode Traffic
n Shaping
(kbit/s)
BE WFQ - 10
#
interface GigabitEthernet1/0/2//Enter the view of the AC-side interface. port-
queue be wfq weight 10 shaping 200 outbound//Configure queue scheduling
parameters. In this example, weighted fair queuing (WFQ) is used for EF queues.
The weight is set to 10, and the traffic shaping rate is set to 10 Mbit/s.
port-queue af1 wfq weight 10 shaping 200 outbound
port-queue af2 wfq weight 10 shaping 200 outbound
port-queue af3 wfq weight 15 shaping 200 outbound
port-queue af4 wfq weight 15 shaping 200 outbound
port-queue ef pq shaping 200 outbound
port-queue cs6 pq shaping 50 outbound
#
NOTE
The data provided in this section is used as an example and for reference, which may be different from that
in real world situations because the network scale and topology may differ.
2. Specify a PVC.
#
interface Ima-group0/2/0.1
pvc 20/60
service output csg
#
2. Specify a PVC.
#
interface Atm3/0/0
undo shutdown
pvc 20/60
service output rsg
#
This chapter describes the roadmap, data planning, and procedure for configuring 1588v2 and
synchronization Ethernet to achieve time and frequency synchronization.
Multiple technologies can be used to transparently transmit clock information. Using 1588v2 to
achieve time synchronization and using synchronization Ethernet to achieve frequency
synchronization are recommended.
C lo c k p ri 1
C S G 1 C lo c k p ri 1 C lo c k p ri 3 A S G 3 C lo c k p ri 1 C lo c k p ri 3 RSG5
G E 0 /1 /1 G E 1 /1 /2 G E 1 /1 /0 G E 1 /0 /0
G E 0 /1 /0 G E 1 /1 /1 G E 1 /0 /1
C lo c k p ri 2 C lo c k p ri 2 C lo c k p ri 2
C lo c k p ri 2 C lo c k p ri 2 C lo c k p ri 1
G E 0 /1 /0 G E 1 /1 /1 G E 1 /0 /1
G E 0 /1 /1 G E 1 /1 /2 G E 1 /1 /0 G E 1 /0 /0
C S G 2 C lo c k p ri 1 C lo c k p ri 3 A S G 4 C lo c k p ri 1 C lo c k p ri 2 RSG6
C lo c k p ri 3
Im p o rt th e c lo c k
C lo c k p ri n P rio rity o f th e c lo c k s o u rc e o n th e in te rfa c e
S la v e
B IT S
l Configure master and slave BITS devices to prevent single point failures from interrupting
clock transmission and configure RSG5 and RSG6 to select the normal clock source.
l Configure the BITS connected to RSG5 as the master clock to provide a reference clock
for the entire network.
– Configure synchronization Ethernet to achieve frequency synchronization.
– Configure 1588v2 to achieve time synchronization.
l Configure the ATN device to transmit the clock information to the base transceiver station
(BTS). The common scenarios are described below:
– The clock interface on the ATN device is directly connected to the BTS.
– Synchronization Ethernet or 1588v2 is used on the Ethernet interface to transmit clock
information to the BTS. The BTS is required to support synchronization Ethernet or
1588v2. The configuration on the BTS is the same as that on the network-side interface.
– Run the clock master command (default configuration) on the E1 and ATM interfaces
to transmit clock information to the peer.
Assign a high priority to the interface that connects to the master clock. Note that the smaller
the value, the higher the priority.
Configuring RSG5
1. Select a clock source.
#
clock bits-type bits0 2mhz//Specify the type of the clock signal from the
external reference clock source. 2 MHz signals are used in this example.
clock bits-type bits1 1pps input nmea//Specify the type of the clock signal
from the external reference clock source. ASCII signals (1PPS+RS422) are used
in this example.
clock source bits0 priority 1//Assign the highest clock priority to interface
bits0 that connects to the master BITS. The smaller the value, the higher the
priority. If multiple clock sources exist on the network, assigning different
priorities to the interfaces connected to the clock sources is recommended.
clock source bits0 ssm prc//Configure the SSM level for the reference clock
source. prc is the highest level.
clock source ptp ssm unk//This command does not need to be configured if
1588v2 will not be deployed.
clock source bits0 synchronization enable//Enable clock synchronization. The
device will trace a clock source only after clock synchronization is enabled.
clock source ptp synchronization enable//This command does not need to be
configured if 1588v2 will not be deployed.
clock ssm-control on//Enable SSM control in clock source selection so that the
clock source is selected based on SSM levels. By default, SSM control is
enabled.
clock bits output-threshold dnu//Set the lower threshold, namely, the lowest
quality level, of the clock signals output by the BITS. dnu is the default
setting.
#
Configuring RSG6
1. Select a clock source.
#
clock bits-type bits0 2mhz
clock bits-type bits1 1pps input nmea
clock source bits0 priority 3//Assign a low clock priority to the interface
connected to the slave BITS on RSG6. The priority should be lower than that of
other interfaces that receive clock information from other devices using 1588v2
or synchronization Ethernet. This ensures that all devices on the network trace
the same clock source.
clock source bits0 ssm prc
clock source ptp ssm unk
clock source bits0 synchronization enable
clock source ptp synchronization enable
clock ssm-control on
clock bits output-threshold dnu
#
#
clock source ptp synchronization enable
#
ptp domain 1//Configure the 1588v2 clock domain. All devices must be added to
the same 1588v2 clock domain.
ptp device-type bc//Configure the device type as BC. Configuring all devices
on the network as BCs is recommended in this solution.
ptp clock-source local priority1 80
#
Configuring RSG5
#
ptp enable
ptp domain 1
ptp device-type bc
ptp clock-source bits1 priority1 1//Increase the first priority (priority1) of the
time source. The smaller the value, the higher the priority. The default value is
128. When the BMC algorithm is used by a 1588v2-enabled device for master clock
selection, priority1 of each candidate time source is compared first, then the
clock class, clock accuracy, and priority2. If priority1 of candidate time sources
is the same, the clock class is compared, and so on. The time source with the
highest priority is selected as the master clock. For details on how to configure
other parameters, see the relevant ATN and CX product manuals.
ptp clock-source local priority1 2
#
Configuring RSG6
#
ptp enable
ptp domain 1
ptp device-type bc
ptp clock-source bits1 priority1 2//Increase the first priority (priority1) of the
time source. The smaller the value, the higher the priority. The default value is
128. When the BMC algorithm is used by a 1588v2-enabled device for master clock
selection, priority1 of each candidate time source is compared first, then the
clock class, clock accuracy, and priority2. If priority1 of candidate time sources
is the same, the clock class is compared, and so on. The time source with the
highest priority is selected as the master clock. For details on how to configure
other parameters, see the relevant ATN and CX product manuals.
ptp clock-source local priority1 1
#
Port info
Name State Delay-mech Ann-timeout Type Domain
------------------------------------------------------------------------
GigabitEthernet1/0/0 master pdelay 9 BC 0
GigabitEthernet1/0/1 master pdelay 9 BC 0