HCIE-Datacom V1.0 Training Material
HCIE-Datacom V1.0 Training Material
Foreword
⚫ Both Open Shortest Path First (OSPF) and Intermediate System to Intermediate System (IS-
IS) are link-state-based Interior Gateway Protocols (IGPs). Routers that run them
synchronize link state databases (LSDBs) and use the shortest path first (SPF) algorithm to
calculate optimal routes.
⚫ In response to network topology changes, OSPF and IS-IS support multiple fast convergence
and protection mechanisms, which minimize traffic loss caused by network faults.
⚫ To control the size of a routing table, OSPF and IS-IS support route selection and routing
information control.
⚫ This course describes the advanced features of OSPF and IS-IS, including fast convergence,
routing control, and other features.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
3 Huawei Confidential
Overview PRC Intelligent FRR BFD
Timer Association
4 Huawei Confidential
Overview PRC Intelligent FRR BFD
Timer Association
PRC
⚫ PRC only calculates routes that have been changed on a network.
⚫ PRC does not calculate nodes. Instead, it updates routes based on the shortest path tree (SPT)
calculated using the SPF algorithm.
• Scenario description:
R1 (root) ▫ OSPF runs on a network. The figure shows the SPT with R1 as the root after network
convergence. When R1 accesses R5, traffic is sent to the destination based on [outbound
interface of R1's downlink, IP address of R3's uplink interface].
▫ OSPF is enabled on Loopback0 of R5. This means that a new network segment is added to
R2 R3 the OSPF network.
• PRC:
▫ R5 floods a new LSA on the entire network.
R4 R5 ▫ After receiving the LSA, R1 creates a new route that inherits the original path and next
hop used when R1 accesses R5. In this case, the SPT remains unchanged, and only a leaf is
added to R5.
▫ Therefore, when R1 accesses Loopback0 of R5, traffic is sent to the destination based on
Loopback0: A directly connected [outbound interface of R1's downlink, IP address of R3's uplink interface].
network segment is added.
• Benefits:
In route calculation, a node represents a ▫ PRC focuses only on routes that are changed due to the addition of network segments to
router, and a leaf represents a route. PRC an OSPF network, thereby speeding up route calculation.
processes only the changed leaf information.
5 Huawei Confidential
Intelligent Timer
⚫ The intelligent timer is used for SPF calculation and LSA generation.
⚫ It can quickly respond to a small number of external incidents and prevent excessive CPU consumption.
▫ The interval for receiving LSAs is 1s. • You can configure the intelligent timer to set a proper
interval for SPF calculation in order to prevent excessive
• On a stable network where routes need to be fast consumption of a router's memory and bandwidth
converged, the intelligent timer can be used to set the resources.
interval for updating LSAs to 0s in order to cancel this
interval. In this manner, topology or route changes can be
immediately advertised to the network through LSAs or be
immediately detected, thereby speeding up route
convergence on the network.
6 Huawei Confidential
• If the interval for triggering route calculation is long, the network convergence
speed is affected.
• The first timeout period of the intelligent timer is fixed. Before the intelligent
timer expires, if an event that triggers the timer occurs, the next timeout period
of the intelligent timer becomes longer.
Overview PRC Intelligent FRR BFD
Timer Association
By default, the intelligent timer is enabled; the maximum interval, initial interval, and hold interval at which
LSAs are updated are 5000 ms, 500 ms, and 1000 ms, respectively.
7 Huawei Confidential
▫ start-interval: specifies the initial interval for updating OSPF LSAs. The value
is an integer ranging from 0 to 60000, in milliseconds. The default value is
500.
▫ hold-interval: specifies the hold interval for updating OSPF LSAs. The value
is an integer ranging from 1 to 60000, in milliseconds. The default value is
1000.
▫ other-type: sets an update interval for OSPF LSAs except router-LSAs and
network-LSAs.
▫ interval: specifies the interval for updating LSAs. The value is an integer
ranging from 0 to 10, in seconds. The default value is 5.
Overview PRC Intelligent FRR BFD
Timer Association
By default, the intelligent timer is enabled; the maximum interval, initial interval, and hold interval at which
LSAs are received are 1000 ms, 500 ms, and 500 ms, respectively.
8 Huawei Confidential
▫ start-interval: specifies the initial interval for receiving OSPF LSAs. The value
is an integer ranging from 0 to 60000, in milliseconds. The default value is
500.
▫ hold-interval: specifies the hold interval for receiving OSPF LSAs. The value
is an integer ranging from 1 to 60000, in milliseconds. The default value is
500.
Overview PRC Intelligent FRR BFD
Timer Association
⚫ After the intelligent timer is used, the interval for SPF calculation is as follows:
The initial interval for SPF calculation is specified by start-interval.
The interval for SPF calculation for the nth (n ≥ 2) time equals hold-interval x 2(n – 2)..
When the interval specified by hold-interval x 2(n – 2). reaches the maximum interval specified by max-interval,
OSPF performs SPF calculation at the maximum interval for three consecutive times. Then, OSPF returns to the
first step and performs SPF calculation at the initial interval specified by start-interval.
9 Huawei Confidential
▫ start-interval: specifies the initial interval for OSPF SPF calculation. The
value is an integer ranging from 1 to 60000, in milliseconds. The default
value is 500.
▫ hold-interval: specifies the hold interval for OSPF SPF calculation. The value
is an integer ranging from 1 to 60000, in milliseconds. The default value is
1000.
OSPF IP FRR
⚫ OSPF IP fast reroute (FRR) is a dynamic IP FRR technology that uses the loop-free alternate (LFA)
algorithm to pre-calculate a backup path and saves it in the forwarding table. If the primary link fails,
traffic is rapidly switched to the backup link, ensuring traffic continuity and achieving traffic protection.
OSPF IP FRR can reduce the fault recovery time to less than 50 ms.
⚫ The LFA algorithm calculates a backup link based on the following principles:
A device uses the SPF algorithm to calculate shortest paths to the destination, with each neighbor that provides
a backup link as a root node. The device then uses the inequality to calculate a loop-free backup link with the
minimum cost.
10 Huawei Confidential
Overview PRC Intelligent FRR BFD
Timer Association
Distance_opt (N, D) < Distance_opt (N, S) + Distance_opt (S, D) Distance_opt (N, D) < Distance_opt (N, S) + Distance_opt (S, D)
This ensures that the traffic from node N to node D does not pass through Node protection inequality:
node S. That is, this ensures that no loop occurs.
Distance_opt (N, D) < Distance_opt (N, E) + Distance_opt (E, D)
S R1 D
Cost = 10 Cost = 5 This ensures that the traffic from node N to node D does not pass through
nodes S and E. That is, this ensures that no loop occurs.
S E D
S: source node
Cost = 10 Cost = 5
D: destination node
N: node along the
backup link
N S: source node
D: destination node
Traffic flows from node S to node D. The link cost satisfies the link N: node along the
protection inequality. If the primary link fails, node S switches the traffic backup link
N E: faulty node
to the backup link. This ensures that the traffic interruption time is less
than 50 ms. Node-and-link protection must meet the preceding two inequalities.
11 Huawei Confidential
• Node-and-link protection:
▫ As shown in the right figure, traffic flows from node S to node D. The link
cost satisfies the node-and-link protection inequality. If the primary link
fails, node S switches the traffic to the backup link. This ensures that the
traffic interruption time is less than 50 ms.
▫ Link protection takes effect when the traffic to be protected flows along a
specified link.
[Huawei-ospf-1] frr
[Huawei-ospf-1-frr]
[Huawei-ospf-1-frr] loop-free-alternate
After OSPF IP FRR is enabled, the device uses the LFA algorithm to calculate the next hop and outbound
interface for a backup link.
OSPF IP FRR can be disabled on an interface of a specific device that is running important services and resides
on an FRR backup link. This setting prevents the device connected to this interface from being a part of a
backup link and being burdened after FRR switches traffic to the backup link.
12 Huawei Confidential
Overview PRC Intelligent FRR BFD
Timer Association
13 Huawei Confidential
Overview PRC Intelligent FRR BFD
Timer Association
R1 R3 R4
Cost = 10 Cost = 5
GE0/0/0 GE0/0/1
14 Huawei Confidential
Overview PRC Intelligent FRR BFD
Timer Association
▫ If a fault occurs on the link between R1 and R2, BFD detects the
fault and notifies R1. R1 processes the BFD session down event and
R3 recalculates the route. The new path is R1-R3-R2.
OSPF
15 Huawei Confidential
• OSPF periodically sends Hello packets to neighbors to detect faults. It takes more
than 1s to detect a fault. By default, when the OSPF Dead timer expires, the
neighbor is considered invalid. The default value of the OSPF Dead timer is 40s.
With the development of technologies, voice, video, and video on demand (VOD)
services are widely used. These services are sensitive to the packet loss rate and
delay. When the traffic rate reaches gigabit per second (Gbit/s), long-time fault
detection causes a large number of packets to be lost. This cannot meet high
reliability requirements of the carrier-class network.
• BFD for OSPF is introduced to resolve this problem. After BFD for OSPF is
configured in a specified process or on a specified interface, the link status can be
rapidly detected and fault detection can be completed in milliseconds. This
speeds up OSPF convergence when the link status changes.
Overview PRC Intelligent FRR BFD
Timer Association
16 Huawei Confidential
• Prerequisites:
▫ Before using BFD to quickly detect link faults, run the bfd command in the
system view to enable BFD globally.
• The BFD configuration on an interface takes precedence over that in a process. If
BFD is enabled on an interface, the BFD parameters on the interface are used to
establish BFD sessions.
• OSPF IP FRR can be associated with BFD.
▫ During the OSPF IP FRR configuration, the underlying layer needs to fast
respond to a link status change so that traffic can be switched to the
backup link immediately.
▫ OSPF IP FRR and BFD can be bound to rapidly detect link faults. This
ensures that traffic is rapidly switched to the backup link in the case of link
failures.
• Command: [Huawei-ospf-1] bfd all-interfaces { min-rx-interval receive-
interval | min-tx-interval transmit-interval | detect-multiplier multiplier-
value | frr-binding }
▫ min-rx-interval receive-interval: specifies an expected minimum interval for
receiving BFD packets from the peer. The value is an integer ranging from
10 to 2000, in milliseconds. The default value is 1000.
▫ min-tx-interval transmit-interval: specifies a minimum interval for sending
BFD packets to the peer. The value is an integer ranging from 10 to 2000, in
milliseconds. The default value is 1000.
▫ detect-multiplier multiplier-value: specifies a local detection multiplier.
The value is an integer ranging from 3 to 50. The default value is 3.
▫ frr-binding: binds the BFD session status to the link status of an interface.
If a BFD session goes down, the physical link of the bound interface also
goes down, triggering traffic to be switched to the backup link.
Contents
17 Huawei Confidential
Overview Equal-Cost Default LSA Configuration
Route Route Filtering Case
18 Huawei Confidential
• This course describes only equal-cost routes, default routes, and LSA filtering. For
other information, see HCIP-Datacom-Core Technology.
Overview Equal-Cost Default LSA Configuration
Route Route Filtering Case
Equal-Cost Route
⚫ If the destinations and costs of the multiple routes discovered by one routing protocol are the same,
these routes are equal-cost routes and can participate in load balancing.
⚫ The device sends packets to the same destination address through multiple equal-cost routes in load
balancing mode.
⚫ Set the maximum number of equal-cost routes for load balancing.
[Huawei-ospf-1] maximum load-balancing number
19 Huawei Confidential
20 Huawei Confidential
Overview Equal-Cost Default LSA Configuration
Route Route Filtering Case
Default Route
⚫ On the area border and AS border of an OSPF network generally reside multiple routers for egress
backup or traffic load balancing. In this case, a default route can be configured to reduce the number
of routing entries in the routing table and ensure high availability of the network.
⚫ OSPF default routes are generally applied to the following scenarios:
An ABR advertises Type 3 LSAs carrying the default route so that routers in an area forward inter -area packets
accordingly.
An ASBR advertises Type 5 or Type 7 LSAs carrying the default route so that routers in an AS forward AS -
external packets. Advertised
Area Type Trigger Condition LSA Type Flooding Scope
by
Common area The default-route-advertise command is run. ASBR Type 5 LSA Common area
21 Huawei Confidential
• Default routes have all 0s as the destination address and mask. A device uses a
default route to forward packets when no matching route is available.
Hierarchical management of OSPF routes prioritizes the default route carried in
Type 3 LSAs over the default route carried in Type 5 or Type 7 LSAs.
• Common area:
▫ Type 5 LSAs cannot be advertised within a stub area. All routers within a
stub area can learn AS external routes only through an ABR.
▫ The ABR in a stub area automatically generates a default Type 3 LSA and
advertises it to the entire stub area. The ABR uses the default route to
divert traffic destined for a destination outside the AS to itself and then
forwards the traffic.
• Totally stub area:
▫ Neither Type 3 nor Type 5 LSAs can be advertised within a totally stub area.
All routers within a totally stub area can learn AS external routes and other
areas' routes only through an ABR.
▫ The ABR in a totally stub area automatically generates a default Type 3 LSA
and advertises it to the entire stub area. The ABR uses the default route to
divert traffic destined for a destination outside the AS to itself and then
forwards the traffic.
• NSSA:
▫ To enable packets destined for routers outside an AS to be sent by way of
an ASBR in an NSSA, and other packets destined for routers outside the AS
to be sent by way of an ABR in the NSSA, configure the ABR to generate a
default Type 7 LSA and advertise this LSA within the entire NSSA. In this
case, a default Type 7 LSA will be generated on the ABR, regardless of
whether the default route 0.0.0.0 exists in the routing table.
▫ To enable all packets destined for routers outside the AS to be sent by way
of an ASBR in the NSSA, run the nssa [default-route-advertise] command
on the ASBR so that the ASBR generates a default NSSA LSA (Type 7 LSA)
and advertises it to the entire NSSA. In this case, a default Type 7 LSA is
generated only when the default route 0.0.0.0 exists in the routing table on
the ASBR.
▫ Note: Default routes are flooded only within the local NSSA and are not
flooded within the entire OSPF AS. If routers in the local NSSA have no
routes to the outside of the AS, the routers can forward packets outside of
the AS through an ASBR. However, packets of other OSPF areas cannot be
sent outside the AS through this ASBR. An ABR does not translate default
Type 7 LSAs into default Type 5 LSAs for flooding in the entire AS.
• Totally NSSA:
▫ The ABR in a totally NSSA automatically advertises the default route
through a Type 3 LSA to the NSSA. The ASBR in a totally NSSA, however,
does not automatically advertise default routes. In this scenario, the routers
in the area can reach the corresponding external network segments
through the external routes imported by the ASBR and reach other network
segments through the default routes delivered by the ABR.
▫ If you want routers in a totally NSSA to select an ASBR (rather than an ABR)
as the default egress, you need to configure the ASBR to deliver the default
route.
Overview Equal-Cost Default LSA Configuration
Route Route Filtering Case
By default, OSPF devices in a common OSPF area do not generate default routes.
2. Configure default route advertisement through a Type 3 summary LSA and set a cost for the route.
[Huawei-ospf-1] default-route-advertise summary cost cost
⚫ Note:
The import-route (OSPF) command cannot import the default route of another routing protocol. To enable a router to advertise
the default route of another routing protocol, run the default-route-advertise command on an ASBR so that the default route is
advertised to all common OSPF areas.
Before advertising a default route, OSPF compares the preferences of default routes in an OSPF area and then advertises a
default route with the highest preference. If a static default route is configured on an OSPF device, ensure that the preference of
the static default route is lower than that of the default route to be advertised by OSPF. This ensures that the default route
advertised by OSPF will be added to the routing table of the OSPF device.
23 Huawei Confidential
▫ cost cost: specifies the cost of the LSA. The value is an integer ranging from
0 to 16777214. The default value is 1.
• always:
▫ If the ASBR has a default route, the default-route-advertise command
enables the ASBR to advertise the default route 0.0.0.0 to all OSPF areas.
▪ With always configured, the ASBR can advertise the default route
0.0.0.0 even if there is no default route, and the ASBR does not
calculate the default routes sent by other devices.
▪ Without always configured, the ASBR generates the LSA of the default
route only when the local routing table contains an active default
route (non-BGP route) that does not belong to the current OSPF
process.
• match-any:
The command configuration does not take effect for the LSAs that have been sent out before the command is
run. The aging time of such an LSA is still 3600 seconds.
25 Huawei Confidential
▫ acl acl-number: specifies the number of a basic ACL. The value is an integer
ranging from 2000 to 2999.
⚫ To filter incoming Type 3 LSAs in an OSPF area, run the following command:
[Huawei-ospf-1-area-0.0.0.1] filter { acl-number | acl-name acl-name | ip-prefix ip-prefix-name | route-
policy route-policy-name } import
26 Huawei Confidential
27 Huawei Confidential
• When the number of external LSAs (Type 5 and Type 7) imported by OSPF
exceeds the maximum number supported, excessive external LSAs cannot be
processed properly and are discarded. To address this issue, you can set a proper
upper limit for the number of non-default external LSAs in the LSDB, so as to
adjust and optimize the OSPF network.
state again.
• Discards newly received non-default external routes and does not
reply with LSAck packets.
Stays in the Overflow Stays in the
• Checks whether the number of external routes still exceeds the
state. Overflow state.
maximum number when the overflow state timer expires.
▪ If not, the router exits the Overflow state.
▪ If so, the router restarts the Overflow state timer.
Exits the Overflow • Deletes the Overflow state timer.
state. Exits the Overflow
• Generates non-default external routes.
• Accepts newly received non-default external routes and replies with
state.
LSAck packets.
• Gets ready to enter the Overflow state again.
28 Huawei Confidential
Overview Equal-Cost Default LSA Configuration
Route Route Filtering Case
29 Huawei Confidential
Overview Equal-Cost Default LSA Configuration
Route Route Filtering Case
30 Huawei Confidential
Overview Equal-Cost Default LSA Configuration
Route Route Filtering Case
⚫ Requirements:
As long as the border-1 router and its uplink work properly, the data flows
AGG-1 AGG-2
of the finance department are forwarded only through the border-1 router.
OSPF
OSPF Area 2 As long as the core-1 router and its uplink work properly, the data flows of
Area 1
the finance department are forwarded only through the core-1 router.
For details about the data forwarding requirements of the marketing
Finance Marketing Data flow of the department, see the comment of this slide.
department client department client finance department
31 Huawei Confidential
Requirement Analysis
1. Controlling the network egress for data forwarding:
Finance server Marketing server ▫ Data of the finance department is always forwarded
through border-1.
▫ Data of the marketing department is always forwarded
Border-1 Border-2 through border-2.
32 Huawei Confidential
▫ Cost of a Type 2 external route = Cost of the route from an ASBR to the
destination
Overview Equal-Cost Default LSA Configuration
Route Route Filtering Case
⚫ Configuration result:
AGG-1 AGG-2
When there are two Type 2 external routes with different
costs on the same network segment, the network device
prefers the route with a smaller cost. In this case, each
network device preferentially selects R1 as the egress.
Finance Marketing
department client department client
33 Huawei Confidential
• The internal path cost to each ASBR is not considered during traffic egress
control.
Overview Equal-Cost Default LSA Configuration
Route Route Filtering Case
Core-1 Core-2
If S1 fails, S3 selects path 3.
S1 S2
1 2 3 ⚫ Implementation:
Path 1-cost < Path 2-cost < Path 3-cost
AGG-1 AGG-2
S3 S3
34 Huawei Confidential
Overview Equal-Cost Default LSA Configuration
Route Route Filtering Case
Finance Marketing
department department Data flow of the
client client finance department
35 Huawei Confidential
Overview Equal-Cost Default LSA Configuration
Route Route Filtering Case
Finance Marketing
department department Data flow of the
client client finance department
36 Huawei Confidential
Overview Equal-Cost Default LSA Configuration
Route Route Filtering Case
Finance Marketing
department client department client
37 Huawei Confidential
Overview Equal-Cost Default LSA Configuration
Route Route Filtering Case
Finance Marketing
department client department client
38 Huawei Confidential
Overview Equal-Cost Default LSA Configuration
Route Route Filtering Case
Border-1 Border-2
R1 R2
Cost=10 OSPF
Core-1 Area 0 Core-2
S1 Cost=10 S2
Cost=10
AGG-1 AGG-2
S3 Cost=50 S4
OSPF OSPF
Area 1 Area 2
Finance Marketing
department client department client
39 Huawei Confidential
Contents
40 Huawei Confidential
Multi- Association Forwarding GR NSR
Process with BGP Address
OSPF Multi-Process
⚫ OSPF supports multiple processes that can separately run on the same device and do not affect each
other. Route exchange between different OSPF processes is similar to route exchange between different
routing protocols.
⚫ An interface on a router can belong to only one OSPF process.
[PE] ospf 100 vpn-instance VPN1
[PE-ospf-100] quit
• Usage scenario:
CE1 [PE] ospf 200 vpn-instance VPN2
▫ A typical application of OSPF multi-process is in the VPN VPN1 [PE-ospf-200] quit
scenario. Site1
41 Huawei Confidential
AS 100 R2 AS 101 1. If R2 fails, traffic is switched to the path R1 -> R3 -> R4 -> R5.
3
2 10.1.5.5/32 2. After R2 recovers, OSPF converges first because IGP route
convergence is faster than BGP route convergence. If R1 needs
1
EBGP to access 10.1.5.5/32, it searches for a BGP route with the next
R1 R4 R5
hop being R5. R2 then searches for the IGP route and sends
R3 traffic to R2 over the route.
IBGP
3. After receiving the traffic, R2 searches for the BGP route.
OSPF runs on R1, R2, R3, and R4 and full-mesh IBGP Because BGP route convergence is not complete, R2 does not
connections are established. R3 is the backup device of R2. find a route to 10.1.5.5/32 and therefore does not forward
When the network is stable, the traffic from R1 to 10.1.5.5/32 traffic. As a result, traffic is lost.
42 Huawei Confidential
Multi- Association Forwarding GR NSR
Process with BGP Address
43 Huawei Confidential
44 Huawei Confidential
Multi- Association Forwarding GR NSR
Process with BGP Address
OSPF
⚫ The path from a router (for example, R4) in the OSPF domain
R4
to 10.1.1.1/32 is R4 -> R3 -> R2 -> R1, which is the sub-optimal
path.
45 Huawei Confidential
Multi- Association Forwarding GR NSR
Process with BGP Address
OSPF R4
46 Huawei Confidential
Multi- Association Forwarding GR NSR
Process with BGP Address
FA Values
⚫ When an ASBR imports external routes, if the FA field in the Type 5 LSA is 0, the router considers that the data
packets destined for the destination network segment should be sent to the ASBR. If the FA field in a Type 5 LSA is
not 0, the router considers that the data packet destined for the destination network segment should be sent to the
device identified by the FA.
⚫ The FA field can be set to a non-zero value only when all the following conditions are met:
The ASBR activates OSPF on the interface (outbound interface of the external route) connected to the external network.
The preceding interface is not configured as a silent interface.
The OSPF network type of such an interface is broadcast or NBMA.
The IP address of the interface is within the network segment specified by the network command in the OSPF configuration.
The route to the FA must be an OSPF intra-area route or an inter-area route. In this manner, the router that receives the
external LSA can add the LSA into the routing table. The next hop of the route generated using the loaded external LSA is the
same as the next hop to the FA.
47 Huawei Confidential
• Note: All OSPF LSAs have the same LSA header, and the P-bit is in the Options
field of the LSA header.
Multi- Association Forwarding GR NSR
Process with BGP Address
⚫ As shown in the figure, if the FA is not considered, R1 considers that the packet must pass through the ABR (R3) to
reach the destination because the router ID of R3 is greater than that of R2. In this way, traffic is diverted to the
low-bandwidth link R1 -> R3 -> R4 -> R5.
Router ID 10.1.3.3
R3
R1 10.1.5.0/24
10.1.45.5
R4 R5
48 Huawei Confidential
OSPF GR
⚫ During a device restart, GR ensures uninterrupted data forwarding in the forwarding plane and prevents actions
such as neighbor relationship reestablishment and route calculation in the control plane from affecting functions in
the forwarding plane. This prevents service interruption caused by route flapping, ensures the data forwarding of
key services, and improves the reliability of the entire network.
Type 9 Opaque LSAs (Grace-LSAs) are added. ⚫ TLV types:
Grace Period TLV: This TLV indicates the maximum hold time for
• OSPF implements GR through Grace-LSAs. a neighbor to remain in the GR Helper state. The Type value of the
TLV is 1, and the length is 4 bytes. If the GR Restarter has not
• Such LSAs are used to inform neighbors of information such completed the GR process when the timer expires, the neighbor no
as the GR time, reason, and interface address when the GR longer functions as a GR Helper. (Mandatory)
starts and exits. Graceful Restart Reason TLV: This TLV notifies a neighbor of the
GR Restarter's restart reason. The Type value of the TLV is 2, and
the length is 1 byte. (Mandatory)
LS Age Options LS Type=9
◼ The value 0 indicates that the reason is unknown.
Opaque
0 ◼ The value 1 indicates that the software is restarted.
Type=3
◼ The value 2 indicates that the software is reloaded or upgraded.
Advertising Router
◼ The value 3 indicates that the GR Restarter performs an
LS Sequence Number active/standby switchover.
IP Interface Address TLV: This TLV is used to notify the IP address
LS Checksum Length of the interface that sends Grace-LSAs. The IP address uniquely
TLVs (Type-Length-Value) identifies a restarted device on the network. The Type value of the
TLV is 3, and the length is 4 bytes.
49 Huawei Confidential
OSPF GR Process
⚫ GR process: Concepts related to GR
R1 R2
GR Session • GR Restarter: indicates a device that performs a
protocol restart triggered by the administrator or a
fault. A GR Restarter must support GR. A device can
GR Restarter GR Helper be configured to support totally GR or partial GR.
• GR Helper: indicates a neighbor of the GR Restarter.
Before an active/standby Grace-LSA A GR Helper helps the GR Restarter maintain a
Enter Helper
switchover stable routing relationship. Therefore, the GR Helper
Active/standby switchover must support GR. The Helper can be configured to
LSAck LSAcks are sent to
End of the active/standby acknowledge received support planned GR or unplanned GR or selectively
switchover LSAs. support GR through policies.
The original standby main Grace-LSA
• GR session: indicates a session, through which a GR
control board goes up.
Enter GR After other Grace LSAs Restarter and a GR Helper learn each other's GR
Grace-LSAs are received, only the capabilities and negotiate GR capabilities. A GR
Hello packets are exchanged for GR period is updated. session involves implementations such as protocol
neighbor negotiation, and DD restart notification and information exchanges
packets are exchanged for LSDB Helps the Restarter during a protocol restart.
Adjacency: Full synchronization. complete LSDB
synchronization. • GR duration: The maximum GR duration is 1800s. A
GR exits normally, routes Flush Grace-LSAs device can exit GR regardless of whether GR
Helper exits normally, and
are calculated, and LSAs succeeds or fails, without waiting for GR to expire.
are generated. Router-LSAs are generated.
50 Huawei Confidential
• On the Restarter:
▫ In planned GR mode, after a command is run to trigger an active/standby
switchover on the Restarter, the Restarter sends a Grace-LSA to each
neighbor to notify them of the GR period and reason, and then performs an
active/standby switchover. This prevents an interruption of the neighbor
relationships due to the long time taken for the original standby main
control board to go up, which would otherwise cause a GR failure.
▫ After the original standby main control board goes up, the router notifies
the routing management (RM) module that the GR starts. After the
interfaces previously enabled with OSPF on the original standby main
control board recover, a Grace-LSA is sent immediately to notify neighbors
that the local device has started a GR. Then, another five Grace-LSAs are
sent consecutively to each neighbor to ensure reception. This
implementation is defined by vendors, but not in the protocol. The router
does not age FIB entries in this case. Therefore, the communication is
normal. If GR is not supported, the router directly ages FIB entries. As a
result, routing is interrupted. In this case, the router restarts normally (non-
GR process). The Grace-LSAs sent by the Restarter are used to notify
neighbors that the Restarter enters GR. During GR, the neighbors retain
neighbor relationships with the Restarter so that other routers are unaware
of the switchover on the Restarter.
▫ The Restarter negotiates with its neighbors to enter the standard adjacency
establishment process. The neighbor states change as follows: Down → Init
→ Exstart. Then, DD packets are exchanged to complete LSDB
synchronization. During the update of LSAs, if the LSAs (Type 1 LSAs and
Type 2 LSAs) received from a Helper do not contain the link to the local
device, it indicates that the network topology has changed or the neighbor
does not support the Helper mode. In this case, GR fails, and the local
router exits GR and restarts normally.
▫ Each time the neighbor relationship between the router and a neighbor
enters the Full state, the router calculates routes and updates its routing
table. The router, however, does not update FIB entries immediately.
▫ If the GR timer expires, GR fails, and the router exits GR and restarts
normally.
▫ The router checks whether the neighbor relationships with all its neighbors
reach the Full state. If so, the router floods all Grace-LSAs (with the LSA
age being 3600s).
▫ GR exits normally. The router regenerates Router-LSAs and sends them to
all the areas to which the router belongs. If some interfaces are DRs, the
router regenerates Network-LSAs on the corresponding network segments.
The router then recalculates routes and updates its routing table. The
router updates its FIB and deletes invalid routing entries.
• On the Helper:
▫ After receiving a Grace-LSA from the Restarter, the device enters the Helper
mode if the LSAs exchanged between the two ends have no change and the
received Grace-LSA matches a filtering policy. If the network topology
changes, the received Grace-LSA is aged, or the device is in the Restarter
state, the device cannot enter the Helper mode.
▫ The Helper continues to send Hello packets to the Restarter to keep the
state of the adjacency between them unchanged. At this time, the
Restarter's neighbor state is Exstart, and therefore the Restarter implements
LSDB synchronization with the Helper. After receiving a DD packet from the
Restarter, the Helper generates a SeqMismatch event. This is because the
Helper is not expected to receive any DD packet when the neighbor state is
Full. When the neighbor state of the Helper changes from Full to Exstart,
the Helper starts to exchange DD packets with the other end to synchronize
LSDBs. The DD packet sent by the Restarter does not carry complete LSAs,
whereas the Helper has complete LSAs. Therefore, the neighbor state of the
Helper quickly changes from Exstart to Exchange and then to Full. The
Helper sends its LSAs to the Restarter for synchronization. If the Helper
continues to receive Grace-LSAs with different GR periods, it updates only
the GR period.
▫ If the GR timer expires, the GR Helper exits the Helper mode.
OSPF GR Exit
⚫ Reasons why a device exits GR:
GR Execution
GR Restarter GR Helper
Result
• Before GR expires, the Restarter re-establishes • When the GR Helper receives the Grace-LSA with
GR succeeds. neighbor relationships with all its pre- the age being 3600s from the Restarter, the
active/standby switchover neighbors. neighbor relationship with the Restarter is Full.
• GR expires, and neighbor relationships have not • The GR Helper has not received any Grace-LSA
recovered completely. from the Restarter when the neighbor
• The Router-LSA or Network-LSA sent by the relationship expires.
Helper causes a failure in the bidirectional check • The status of the Helper's interface changes.
on the Restarter. • The GR Helper receives LSAs, which are different
• The status of the GR Restarter's interface from the LSAs in its own LSDB, from other
GR fails. changes. routers. You can configure the GR Helper not to
• The Restarter receives a Grace-LSA generated by perform a strict LSA check to avoid this issue.
another router on the same network segment. • On the same network segment, the GR Helper
Only one router can perform a GR on the same receives Grace-LSAs from two routers at the same
network segment at the same time. time.
• The topology of neighbors on the same network • The neighbor relationships between the GR
segment with the Restarter changes. Helper and other routers change.
52 Huawei Confidential
Multi- Association Forwarding GR NSR
Process with BGP Address
This command enables the opaque LSA capability so that the OSPF process can generate opaque LSAs and
receive opaque LSAs from neighbors. To use the OSPF GR function, which is implemented through Type 9 LSAs,
the opaque LSA capability must be enabled first.
period period: specifies a GR period. The value is an integer ranging from 1 to 1800, in seconds. The default
value is 120.
planned-only: indicates that the router supports only planned GR. By default, a router supports both planned
GR and unplanned GR.
partial: indicates that the router supports partial GR. By default, a router supports totally GR.
53 Huawei Confidential
54 Huawei Confidential
Multi- Association Forwarding GR NSR
Process with BGP Address
[R1] ospf 1
[R1-ospf-1] opaque-capability enable
[R1-ospf-1] graceful-restart
.2
[R2] ospf 1
[R2-ospf-1] opaque-capability enable
[R2-ospf-1] graceful-restart
R2
⚫ Routers R1, R2, and R3 each are equipped with two main [R3] ospf 1
[R3-ospf-1] opaque-capability enable
control boards, which back up each other. The routers
[R3-ospf-1] graceful-restart
interwork through OSPF and support GR.
55 Huawei Confidential
Multi- Association Forwarding GR NSR
Process with BGP Address
⚫ It is required that traffic forwarding be not interrupted when Last exit reason:
R1 restarts an OSPF process or performs an active/standby On graceful restart : none
On Helper : none
switchover in GR mode.
56 Huawei Confidential
Multi- Association Forwarding GR NSR
Process with BGP Address
57 Huawei Confidential
Multi- Association Forwarding GR NSR
Process with BGP Address
OSPF Process 1 with Router ID 10.1.13.1 OSPF Process 1 with Router ID 10.1.12.2
Graceful-restart capability : enabled Graceful-restart capability : enabled
Graceful-restart support : planned and un-planned, totally Graceful-restart support : planned and un-planned, totally
Helper-policy support : planned and un-planned, strict lsa check Helper-policy support : planned and un-planned, strict lsa check
Current GR state : normal Current GR state : normal
Graceful-restart period : 120 seconds Graceful-restart period : 120 seconds
58 Huawei Confidential
Multi- Association Forwarding GR NSR
Process with BGP Address
NSR
⚫ High-reliability solutions include non-stop forwarding (NSF) and non-stop routing (NSR).
NSF NSR
• The GR mechanism ensures that service forwarding is not • The protocol backup mechanism ensures that routing in
interrupted during an active/standby switchover. the control plane and services in the forwarding plane are
▫ If a fault occurs in the system, services in the not interrupted during an active main board
forwarding plane are not interrupted during a system (AMB)/standby main board (SMB) switchover.
restart. • Routing is not interrupted during the AMB/SMB
▫ After the system recovers, it re-establishes neighbor switchover because:
relationships, obtains routing information from ▫ Neighbor and topology information is not lost.
neighbors, and rebuilds its routing table. ▫ Neighbor relationships are not interrupted.
• Advantages:
▫ This solution does not depend on or affect the peer
device. Therefore, there is no interworking problem.
▫ Route convergence in NSR is faster than that in NSF.
⚫ NSR is a reliability technology used on a device with an AMB and SMB. It ensures that neighbor relationships
are not affected when the AMB fails.
59 Huawei Confidential
▫ NSR and GR, however, are mutually exclusive. That is, for a specific
protocol, only one of them can be used after a switchover.
• Application scenario:
▫ NSF can be used if a network has low requirements for the packet loss rate
and route convergence.
▫ NSR can be used if a network has high requirements for the packet loss
rate and route convergence.
• System-level NSR is triggered in the following situations:
▫ A system fault triggers an AMB/SMB switchover.
• Note: NSR fundamentals are the same in OSPF, IS-IS, and BGP. This course uses
OSPF as an example.
Multi- Association Forwarding GR NSR
Process with BGP Address
NSR Fundamentals
1 2 ⚫
NSR is implemented in three phases:
Batch backup: After NSR is enabled and the SMB restarts, the AMB
AMB SMB AMB SMB
sends routing and forwarding information in batches to the SMB for
NSR
Packet sending Packet sending backup. Batch backup is performed before real-time backup. An
switchover
AMB/SMB switchover cannot be performed during batch backup in
LPU LPU NSR.
Real-time backup: Real-time backup starts after batch backup is
complete. All updates in the control and forwarding planes are
backed up from the AMB to the SMB in real time. In this phase, the
SMB can take over services from the AMB at any time.
Neighbor Neighbor
node node AMB/SMB switchover: If the AMB fails in the NSR system in which
backup has been completed, the SMB detects the failure through
1 The routing protocols in the control plane back up routing hardware status detection and becomes the new AMB. The new AMB
information in real time.
instructs LPUs to send packets to itself. The AMB/SMB switchover is
2 The hardware channel detects the exception on the AMB,
the SMB is instructed to become the new AMB, and LPUs completed rapidly, with routing between the local node and its
are instructed to send packets to the new AMB. neighbor nodes uninterrupted.
60 Huawei Confidential
• High availability (HA): implements data backup from the AMB to the SMB.
• AMB and SMB: implement control plane processes.
• Line processing unit (LPU): implements forwarding plane processes.
Multi- Association Forwarding GR NSR
Process with BGP Address
as routes in batches through the HA channel. The service data. As a result, an NSR switchover cannot be
performed; in this case, the device restarts and restores the
system enters the batch backup phase.
pre-fault status.
3. After service processes complete batch backup, the
system enters the redundancy protection state.
61 Huawei Confidential
Multi- Association Forwarding GR NSR
Process with BGP Address
LPU
1 1
62 Huawei Confidential
Multi- Association Forwarding GR NSR
Process with BGP Address
63 Huawei Confidential
Multi- Association Forwarding GR NSR
Process with BGP Address
Configuring NSR
1. Enable NSR.
This command is used to set an HA working mode. The default HA working mode is NSF.
nonstop-routing: sets the HA working mode to NSR. In NSR mode, the system can process routes and forward
services without interruption.
nonstop-forwarding: sets the HA working mode to NSF. The NSF mode greatly reduces the service interruption
time.
65 Huawei Confidential
Fast Routing Other
Convergence Control Features
66 Huawei Confidential
• The functions, including PRC, intelligent timer, and FRR of IS-IS are similar to
those of OSPF and therefore not detailed here.
Fast Routing Other
Convergence Control Features
I-SPF
⚫ I-SPF implementation: When the network topology changes, I-SPF recalculates routes only for affected
nodes instead of all nodes, speeding up route calculation.
In route calculation, a node represents a router, ▫ Therefore, when R1 accesses R5 and R6, the traffic of R1 is forwarded to R5
and a leaf represents a route. I-SPF processes and R6 based on [the outbound interface of R1's downlink and the IP address
the information of only changed nodes. of the inbound interface of R3's uplink].
67 Huawei Confidential
• SPF for route calculation: If a node on a network changes, SPF recalculates routes
for all the nodes on the network, which takes a long time, consumes a large
number of CPU resources, and consequently reduces the network-wide
convergence speed.
• I-SPF is an improvement of SPF. Unlike SPF that calculates all nodes, I-SPF
calculates only affected nodes. The SPT generated using I-SPF is the same as that
generated using SPF. This significantly decreases CPU usage and speeds up
network convergence.
• I-SPF and PRC are used together on an IS-IS network.
▫ If the SPT calculated by I-SPF changes, PRC processes all the leaves (routes)
of only the changed node.
▫ If the SPT calculated by I-SPF does not change, PRC processes only the
changed leaves (routes). For example, if IS-IS is newly enabled on an
interface of a node, the SPT on the network remains unchanged. In this
case, PRC updates only the routes of this interface, which consumes less
CPU resources.
Fast Routing Other
Convergence Control Features
68 Huawei Confidential
▫ level-1: enables the LSP flash-flood function in the Level-1 area. If no level
is specified in the command, this function is enabled in both Level-1 and
Level-2 areas.
▫ level-2: enables the LSP flash-flood function in the Level-2 area. If no level
is specified in the command, this function is enabled in both Level-1 and
Level-2 areas.
Fast Routing Other
Convergence Control Features
69 Huawei Confidential
• This course involves only equal-cost and default routes. For details about other
control methods, see HCIP-Datacom-Core Technology.
Fast Routing Other
Convergence Control Features
Equal-Cost Route
⚫ If there are multiple redundant links on an IS-IS network, multiple equal-cost routes to the same
destination may exist. In this case, you can use either of the following methods to configure equal-cost
routes:
Configure load balancing so that traffic is evenly distributed to relevant links.
◼ This method improves link utilization and reduces the possibility of congestion caused by overloaded links. However,
because traffic will be randomly forwarded, this method may make traffic management difficult.
Configure a preference for each equal-cost route so that the route with the highest preference is preferentially
selected and the others function as backups.
◼ This method is used to specify the preferred route among multiple equal-cost routes, without the need to modify original
configurations. It facilitates traffic management and improves network reliability.
◼ Note: After preferences are configured for equal-cost routes, IS-IS devices forward traffic to the next hop with the highest
preference, instead of forwarding traffic in load balancing mode.
70 Huawei Confidential
Fast Routing Other
Convergence Control Features
⚫ If the number of equal-cost routes is greater than the number specified using the maximum load-balancing
command, routes are selected for load balancing according to the following rules in sequence:
Route preference: Routes with smaller preference values (higher preferences) are selected for load balancing.
Next-hop system ID: If all equal-cost routes have the same preference, routes with smaller next-hop system IDs are selected for
load balancing.
Local outbound interface index: If all equal-cost routes have the same preference and next-hop system ID, routes with smaller
local outbound interface indexes are selected for load balancing.
71 Huawei Confidential
▫ ip-address: specifies the IP address of the next hop. The value is in dotted
decimal notation.
▫ weight value: specifies the weight of the next hop. A smaller value
indicates a higher preference. The value is an integer ranging from 1 to 254.
Fast Routing Other
Convergence Control Features
IS-IS R2 2. Configure the number of IS-IS equal-cost routes for load balancing on R1.
[R1] isis
Device Interface IP Address [R1-isis-1] maximum load-balancing 2
GE0/0/0 10.1.13.1/24
R1 3. Verify the configuration.
GE0/0/1 10.1.12.1/24
[R1]display ip routing-table
GE0/0/1 10.1.12.2/24 Route Flags: R - relay, D - download to fib
R2 -------------------------------------------------------------------------------------------
GE0/0/2 10.1.23.2/24
Loopback0 10.1.3.3/32 Destination/Mask Proto Pre Cost Flags NextHop Interface
R3 GE0/0/0 10.1.13.3/24 10.1.3.3/32 ISIS-L2 15 10 D 10.1.13.3 GigabitEthernet0/0/0
ISIS-L2 15 10 D 10.1.12.2 GigabitEthernet0/0/1
GE0/0/2 10.1.23.3/24
72 Huawei Confidential
Fast Routing Other
Convergence Control Features
73 Huawei Confidential
Fast Routing Other
Convergence Control Features
Default Route
⚫ IS-IS allows you to control the generation and advertisement of default routes using the following methods:
On Level-1-2 devices, configure a rule for setting the attached (ATT) bit in Level-1 LSPs.
Configure Level-1 devices not to automatically generate default routes even if they receive Level-1 LSPs with the ATT bit set to
1.
Configure devices to advertise default routes to the IS-IS routing domain.
PDU Length
Remaining Lifetime
PDU Common Header
LSP ID
PDU Specific Header
Sequence Number
Variable Length Fields(TLV)
Checksum
P ATT OL IS Type
74 Huawei Confidential
Fast Routing Other
Convergence Control Features
1. (Level-1-2 device) Configure a rule for setting the ATT bit in LSPs.
[Huawei-isis-1] attached-bit advertise { always | never }
By default, the Level-1-2 device sets the ATT bit in LSPs following the default rules.
2. (Level-1 device) Configure the device not to generate a default route after it receives LSPs carrying ATT bit 1.
[Huawei-isis-1] attached-bit avoid-learning
By default, a Level-1 device generates a default route after it receives LSPs carrying ATT bit 1.
75 Huawei Confidential
▫ never: indicates that the ATT bit is set to 0. This prevents the Level-1 device
from generating default routes and reduces the size of the routing table.
• Although the ATT bit is defined in both Level-1 and Level-2 LSPs, it is set to 1
only in Level-1 LSPs advertised by Level-1-2 devices. Therefore, this command
takes effect only on Level-1-2 devices.
• To prevent Level-1 devices from advertising default routes to their routing tables,
perform either of the following operations:
⚫ Generally, if other routing protocols are configured in addition to IS-IS, use the following two methods to forward
traffic in the IS-IS routing domain to other routing domains:
Configure boundary devices to advertise default routes to the IS-IS routing domain. This method is simple and does not require
external route learning.
Configure boundary devices to import routes of other routing protocols into IS-IS.
76 Huawei Confidential
78 Huawei Confidential
Fast Routing Other
Convergence Control Features
⚫ In IS-IS multi-process, multiple IS-IS processes are created in the same VPN instance (or in the same public network
instance). These IS-IS processes are independent of each other. IS-IS processes function similarly to different routing
protocols in route exchange.
⚫ A network may carry different services, which need to be isolated for security. You can bind each IS-IS process to a
different VPN instance. [PE] isis 100 vpn-instance VPN1
[PE-isis-100] quit
⚫ Application scenarios: [PE] isis 200 vpn-instance VPN2
CE1
▫ IS-IS multi-instance and multi-process are typically used in VPN1 [PE-isis-200] quit
Site1
VPN scenarios.
79 Huawei Confidential
LSP Fragment
⚫ When a PDU to be advertised by IS-IS contains too much information, an IS-IS router generates LSP
fragments to carry the information.
⚫ LSP packet format
⚫ An IS-IS LSP fragment is identified by the 1-byte LSP Number field in LSP ID. So, an IS-IS process can
generate a maximum of 256 LSP fragments, which means only limited information can be carried.
80 Huawei Confidential
Fast Routing Other
Convergence Control Features
81 Huawei Confidential
• After LSP fragment extension is configured, the system prompts you to restart
the IS-IS process if information is lost because LSPs overflow. After the IS-IS
process is restarted, the originating system loads as much routing information as
possible to its LSPs. The information that cannot be loaded is placed in the LSPs
of virtual systems for transmission. The originating system then notifies other
routers of its relationship with the virtual systems through TLV 24.
• Note: the additional and normal system IDs must be unique throughout a routing
domain.
Fast Routing Other
Convergence Control Features
• As the figure shown, R1 loads some routing information to the LSPs • As the figure shown, R1 loads some routing information to the LSPs
of R1-1 and R1-2 for transmission. When R2 receives the LSPs from of R1-1 and R1-2 for transmission. When R2 receives LSPs from R1-1
R1, R1-1, and R1-2, it considers that there are three independent and R1-2, it knows that their originating system is R1 based on TLV
routers at the peer end and calculates routes as normal. The costs of 24. R2 then considers information advertised by R1-1 and R1-2 as
the routes from R1 to R1-1 and from R1 to R1-2 are both 0, meaning information of R1.
that the routes from R2 to R1 and from R2 to R1-1/R1-2 share the
same cost.
82 Huawei Confidential
• Mode-1 implementation:
▫ Virtual systems participate in SPF calculation. The LSPs advertised by the
originating system contain information about links to each virtual system.
Similarly, the LSPs advertised by each virtual system contain information
about links to the originating system. In this way, virtual systems function
like physical routers that connect to the originating system.
▫ Mode-1 is a transitional mode used to support earlier versions that are
incapable of LSP fragment extension. In these earlier versions, IS-IS cannot
identify TLV 24. As a result, the LSPs sent by a virtual system must look like
LSPs sent by an originating system.
▫ Precautions:
▪ The LSPs sent by a virtual system must contain the same area address
and overload bit as those in LSPs sent by an originating system. Other
TLVs must also be the same.
▪ The neighbor of a virtual system must point to an originating system,
and the metric is the maximum value minus 1. The neighbor of the
originating system must point to the virtual system, and the metric
must be 0. This ensures that the virtual system is the downstream
node of the originating system when other routers calculate routes.
• Mode-2 implementation:
▫ Virtual systems do not participate in SPF calculation. All the routers on the
network know that the LSPs generated by the virtual systems actually
belong to the originating system.
▫ IS-IS working in mode-2 can identify TLV 24, which is used as the basis for
calculating an SPT and routes.
• Note: In both modes, the originating system and virtual systems must include
TLV 24 in their LSPs whose LSP Number is 0 to indicate which is the originating
system.
Fast Routing Other
Convergence Control Features
⚫ Note: The preceding two commands must be used together. The configured virtual system ID takes effect only after
LSP fragment extension is enabled and the IS-IS process is restarted using the reset isis all command.
83 Huawei Confidential
IS-IS GR
⚫ IS-IS GR is a high-reliability technology that supports GR and can ensure non-stop data forwarding.
⚫ To implement GR, IS-IS uses the TLV (Restart TLV) with the Type value 211 and three timers: T1, T2, and T3.
Restart TLV Timers
• The Restart TLV is included in the extension part of an IS-to-IS Hello • T1 timer: If the GR Restarter has sent an IIH packet with RR being set
(IIH) PDU. All IIH packets of a device that supports IS-IS GR contain the but has not received any IIH packet in which the Restart TLV is
Restart TLV. The Restart TLV carries some parameters for the protocol carried and RA is set from the GR Helper when the T1 timer expires,
restart. the GR Restarter resets the T1 timer and continues to send IIH
packets with the Restart TLV. If an acknowledgement packet is
Type = 211
received or the T1 timer expires three times, the T1 timer is canceled.
Length
The default value of the T1 timer is 3s.
Reserved SA RA RR
• T2 timer: It indicates the period from the time when the GR Restarter
Remaining Time restarts to the time when the LSDBs of all devices of the same level
are synchronized. T2 is the maximum time that the system waits for
• SA: is short for Suppress Adjacency Advertisement. synchronization of all LSDBs. T2 is generally 60 seconds.
• RA: is short for Restart Acknowledgment.
• T3 timer: It indicates the maximum time allowed for the GR Restarter
• RR: is short for Restart Request.
to complete GR successfully. The initial value of the T3 timer is
• Remaining Time: indicates the remaining time before the neighbor resets
65535s. If the T3 timer expires, GR fails.
the adjacency.
84 Huawei Confidential
• Background:
▫ After an active/standby switchover is performed on a device, because the
device has not stored any information about the neighbor relationships
established before the restart, the initial Hello packets sent by the device
carry an empty neighbor list. After receiving the Hello packets, a neighbor
(Helper device) performs the two-way neighbor relationship check. After
the neighbor detects that it is not in the neighbor list in the Hello packets
sent by the Restarter, the neighbor tears down the neighbor relationship.
The neighbor then generates new LSPs and floods the topology changes to
all other devices in the area. The other devices in the area then calculate
routes based on their new LSDBs, leading to routing interruptions or
routing loops.
▫ The IETF defined the GR standard (RFC 3847) for IS-IS. The protocol
restarts in which the FIB is retained and the protocol restarts in which the
FIB is not retained are both processed, preventing route flapping and traffic
interruptions caused by protocol restarts.
• TLV with Type value 211:
▫ Type: indicates the TLV type and is 1 byte long. Type value 211 indicates the
Restart TLV.
▫ Length: indicates the length of the TLV value and is 1 byte long.
▫ SA: is used to suppress adjacency advertisement and is 1 bit long. It is used
by a starting device to request its neighbors to suppress the broadcast of
the neighbor relationships with the starting device to prevent routing black
holes.
▫ RA: is used for restart acknowledgment and is 1 bit long. If a device sends
to a neighbor a Hello packet in which RA is set, the packet is used to notify
the neighbor that the device has received a packet in which RR is set.
▫ RR: indicates the restart request bit and is 1 bit long. If a device sends to a
neighbor a Hello packet in which RR is set, the packet is used to notify the
neighbor that the device is restarting or starting and to request the
neighbor to retain the current IS-IS adjacency and respond with CSNPs.
▫ Remaining Time: indicates the remaining time before the neighbor resets
the adjacency. The value is in seconds. This field is 2 bytes long. When RA is
reset, this field is mandatory.
• Supplementary description of the timers:
▫ T3 timer: The initial value of the T3 timer is 65535s. After the IIH packets in
which RA is set are received from neighbors, the T3 value is changed to the
smallest value of the Remaining Time field in the IIH packets. The entire
system maintains one T3 timer.
Fast Routing Other
Convergence Control Features
86 Huawei Confidential
• Notes:
▫ In Step 2, if the neighbor does not have the GR Helper capability, it ignores
the Restart TLV and resets the adjacency with the GR Restarter according to
normal IS-IS processing.
▫ In Step 3, the Restarter sets the value of the T3 timer to the Holdtime of
the neighbor, preventing neighbor disconnection during the GR, which
would otherwise cause routes to be recalculated on the whole network.
Fast Routing Other
Convergence Control Features
87 Huawei Confidential
• During the restarting, the Restarter starts the T1, T2, and T3 timers at the same
time after the protocol restart. The value of the T1 timer indicates the longest
time during which the GR Restarter waits for the Hello packet used for GR
acknowledgement from the GR Helper. The value of the T2 timer indicates the
longest time during which the system waits for the LSDB synchronization. The
value of the T3 timer indicates the longest time allowed for a GR. The device
cancels the T3 timer after synchronization of Level-1 and Level-2 LSDBs
completes during the GR. If LSDB synchronization has not completed when the
T3 timer expires, the GR fails.
Fast Routing Other
Convergence Control Features
Adjacency reestablishment Sends IIH packets that contain the Restart TLV through all interfaces. In
Starts the T1 timer. the packets, RR is cleared, and SA is set.
IIH (Restart TLV:
RR=1, RA=0, SA=1) 2. After receiving an IIH packet that carries the Restart TLV, a neighbor
performs the following actions based on whether GR is supported:
IIH (Restart TLV:
RR=0, RA=1, SA=0) If GR is supported, the neighbor re-initiates the adjacency.
88 Huawei Confidential
▫ If GR is not supported, the neighbor ignores the Restart TLV, resets the
adjacency with the GR Restarter, replies with an IIH packet that does not
contain the Restart TLV, and returns to normal IS-IS processing. In this case,
the neighbor does not suppress the advertisement of the adjacency with the
GR Restarter. In the case of a P2P link, the neighbor also sends a CSNP.
Fast Routing Other
Convergence Control Features
89 Huawei Confidential
Fast Routing Other
Convergence Control Features
2. Configure the device to remain the IS-IS neighbor Holdtime unchanged in GR scenarios.
[Huawei-isis-1] graceful-restart no-impact-holdtime
By default, after IS-IS GR is enabled, the IS-IS neighbor Holdtime is automatically changed to 60s if it is less
than 60s, and the Holdtime remains unchanged if it is greater than or equal to 60s.
90 Huawei Confidential
[Huawei] display isis graceful-restart status [ level-1 | level-2 ] [ process-id | vpn-instance vpn-instance-
name ]
91 Huawei Confidential
▫ Because the sequence numbers of LSP fragments are also reinitialized when
the router starts, the LSP copies stored on other routers seem to be newer
than the LSPs generated after the local router starts. This leads to a
temporary "blackhole" on the network, and the blackhole persists until the
router regenerates its own LSPs and advertises them with the largest
sequence number.
92 Huawei Confidential
Fast Routing Other
Convergence Control Features
⚫
Routers R1 and R2 each are equipped with two main control IS-IS(1) Level-1 Restart Status
Restart Interval: 300
boards, which back up each other. The routers interwork
SA Bit Supported
through IS-IS and support GR. Total Number of Interfaces = 1
Restart Status: RESTART COMPLETE
⚫
It is required that traffic forwarding be not interrupted when
R1 restarts an IS-IS process or performs an active/standby IS-IS(1) Level-2 Restart Status
Restart Interval: 300
switchover in GR mode. SA Bit Supported
Total Number of Interfaces = 1
Restart Status: RESTART COMPLETE
93 Huawei Confidential
Fast Routing Other
Convergence Control Features
94 Huawei Confidential
Quiz
C. Intelligent timer
D. OSPF IP FRR
B. False
95 Huawei Confidential
1. ACD
2. B
Quiz
B. False
96 Huawei Confidential
3. A
Summary
⚫
To better adapt to network topology changes, OSPF and IS-IS support multiple fast convergence modes. I-SPF and PRC
algorithms speed up route calculation; FRR enables fast traffic switching to the backup link; and intelligent timers
allow you to control the speeds at which link state information is generated and routes are calculated.
⚫
To control the size of routing tables and improve network performance, OSPF and IS-IS support route filtering, equal-
cost routes, and delivery of default routes. To isolate protocol routing tables, OSPF and IS-IS support multi-process
deployment on the same device. Routing tables of different processes are independent of each other.
⚫
To prevent a suboptimal route from being selected when external routes are imported, OSPF uses the FA in Type 5 or
Type 7 LSAs to guide data packet forwarding. To carry more routing information, IS-IS supports LSP fragment
extension.
⚫
To ensure that key services are not interrupted during a device restart, OSPF and IS-IS also support GR and NSR.
⚫ Thanks to the preceding features, OSPF and IS-IS are widely and flexibly used on live networks.
97 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
▫ R2 can filter out the Net2 route through BGP route control so that R2's BGP
routing table does not contain the Net2 route.
• Note: For details about the ACL, IP prefix list, filter-policy, route-policy, and BGP
path attributes, see the "HCIP-Datacom-Core Technology" course.
• A regex has the following functions:
▫ Checks and obtains the sub-character string that matches a specific rule in
the character string.
▫ ^a.$: matches a character string that starts with the character a and ends
with any single character, for example, a0, a!, ax, and so on.
▫ ^100_: matches a character string starting with 100, for example, 100, 100
200, 100 300 400, and so on.
▫ 100$|400$: matches a character string ending with 100 or 400, for example,
100, 1400, 300 400, and so on.
• Type 2:
▫ abc*d: matches the character c zero or multiple times, for example, abd,
abcd, abccd, abcccd, abccccdef, and so on.
▫ abc+d: matches the character c once or multiple times, for example, abcd,
abccd, abcccd, abccccdef, and so on.
▫ abc?d: matches the character c zero times or once, for example, abd, abcd,
abcdef, and so on.
▫ a(bc)?d: matches the character string bc zero times or once, for example,
ad, abcd, aaabcdef, and so on.
• The AS_Path attribute is a well-known mandatory attribute of BGP. All BGP
routes must carry this attribute. This attribute records the numbers of all the ASs
that a BGP route traversed during transmission.
• The default behavior of an AS_Path filter is deny. That is, if a route is not
permitted in a filtering, the route fails to match the AS_Path filter. If all matching
rules in an AS_Path filter work in deny mode, all BGP routes are denied by the
filter. To prevent this problem, configure a matching rule in permit mode after
one or more matching rules in deny mode so that the routes except for those
denied by the preceding matching rules can be permitted by the filter.
• The community attribute is an optional transitive attribute. It can identify the
routes with the same characteristics, regardless of the scattered route prefixes
and various AS numbers. That is, a specific community value can be assigned to
some routes so that these routes can be matched against the community value
instead of the network number or mask. Then, a corresponding routing policy
can be applied to the matched routes.
• Command: [Huawei-route-policy] apply community { community-number |
aa:nn | internet | no-advertise | no-export | no-export-subconfed } [ additive ]
▫ no-export: prevents the matched routes from being advertised outside the
local AS but allows them to be advertised to other sub-ASs in the local AS.
After a device receives a route with this attribute, it cannot advertise this
route outside the local AS.
▫ additive: adds community attributes to the routes that match the filtering
conditions.
• Command: [Huawei] ip community-filter { basic comm-filter-name | basic-
comm-filter-num } { permit | deny } [ community-number | aa:nn | internet |
no-export-subconfed | no-advertise | no-export ]
▫ basic comm-filter-name: specifies the name of a basic community filter.
The value is a string of 1 to 51 case-sensitive characters. It cannot be
comprised of only digits.
▫ basic-comm-filter-num: specifies the number of a basic community filter.
The value is an integer ranging from 1 to 99.
▫ deny: sets the matching mode of the community filter to deny.
▫ permit: sets the matching mode of the community filter to permit.
▫ community-number: specifies a community number. The value is an integer
ranging from 0 to 4294967295.
▫ aa:nn: specifies a community number. A maximum of 20 community
numbers can be specified at a time using this command. The values of aa
and nn are integers ranging from 0 to 65535.
▫ internet: allows the matched routes to be advertised to any peers.
▫ no-export-subconfed: prevents the matched routes from being advertised
outside the local AS. If a confederation is used, the matched routes will not
be advertised to the other sub-ASs in the confederation.
▫ no-advertise: prevents the matched routes from being advertised to any
other peers.
▫ no-export: prevents the matched routes from being advertised outside the
local AS. If a confederation is used, the matched routes will not be
advertised outside the confederation but will be advertised to the other
sub-ASs in the confederation.
• Command: [Huawei-route-policy] if-match community-filter { basic-comm-
filter-num [ whole-match ] | adv-comm-filter-num }
• Command: [Huawei-route-policy] if-match community-filter comm-filter-name
[ whole-match ]
▫ import: applies the routing policy to the routes received from the peer or
peer group.
▫ export: applies the routing policy to the routes to be advertised to the peer
or peer group.
• Command: [Huawei-bgp] peer { group-name | ipv4-address } capability-
advertise orf [ non-standard-compatible ] ip-prefix { both | receive | send }
[ standard-match ]
▫ both: enables the local device to both send and accept ORF packets.
• Note: BGP MD5 authentication and BGP keychain authentication are mutually
exclusive.
• As shown in the figure, if BGP GTSM is not enabled, the device finds that the
received numerous bogus BGP messages are destined for itself, and directly sends
them to the control plane for processing. As a result, the control plane has to
process a large number of bogus messages, causing the CPU usage to go
excessively high and the system to be unexpectedly busy.
• Command: [Huawei-bgp] peer { group-name | ipv4-address | ipv6-address }
keychain keychain-name
▫ drop: indicates that the messages that do not match the GTSM policy
cannot pass filtering and are dropped.
▫ pass: indicates that the messages that do not match the GTSM policy can
pass filtering.
▫ Assume that static routes are used or OSPF is used to ensure internal
network reachability in AS 101. The configuration details are not provided
here.
▫ On the network shown in this figure, before the new speaker in AS 2.2
sends an Update message to the old speaker in AS 65002, the new speaker
replaces each 4-byte AS number (1.1 and 2.2) with 23456 (AS_TRANS) in
AS_Path; therefore, the AS_Path carried in the Update message is (23456,
23456, 65001), and the carried AS4_Path is (2.2, 1.1, 65001). Upon receiving
the Update message, the old speaker in AS 65002 transparently transmits
AS4_Path (2.2, 1.1, 65001) to another AS.
• When a new speaker receives an Update message carrying the AS_Path and
AS4_Path attributes from an old speaker, the new speaker obtains the actual
AS_Path attribute based on the reconstruction algorithm.
▫ Assume that static routes are configured or OSPF is used to ensure internal
network reachability in AS 1.1. The configuration details are not provided
here.
• Notes:
▫ This slide uses NetEngine 8000 series routers as an example. For the 4-byte
AS number configuration on any other type of product, see the
corresponding product documentation.
▫ If you adjust the display format of 4-byte AS numbers, the matching results
in the case of filtering using AS_Path regular expressions or extended
community filters are affected. Specifically, after the display format of 4-
byte AS numbers is changed when an AS_Path regular expression or
extended community filter has been used in an export or import policy, the
AS_Path regular expression or extended community filter needs to be
reconfigured. If reconfiguration is not performed, routes may fail to match
the export or import policy, leading to a network fault.
• RR-related roles:
▫ RR: BGP device that reflects the routes learned from an IBGP peer to other
IBGP peers. An RR is similar to the designated router (DR) on an OSPF
network.
▫ Client: IBGP peer whose routes are reflected by the RR to other IBGP peers.
In an AS, clients only need to be directly connected to the RR.
▫ Non-client: IBGP device that is neither an RR nor a client. In an AS, full-
mesh connections still must be established between non-clients and RRs,
and between all non-clients.
▫ Originator: device that originates routes in an AS. The Originator_ID
attribute is used to prevent routing loops in a cluster.
▫ Cluster: a set of RRs and their clients. The Cluster_List attribute is used to
prevent routing loops between clusters.
• When configuring a BGP router as an RR, you also need to specify a client of the
RR. A client does not need to be configured because it is not aware that an RR
exists on the network.
• Rules for an RR to advertise routes:
▫ After learning routes from non-clients, the RR selects and advertises the
optimal route to all its clients.
▫ After learning routes from clients, the RR selects and advertises the optimal
route to all its non-clients and clients (except the originating client).
▫ After learning routes learned from EBGP peers, the RR selects and
advertises the optimal route to all its clients and non-clients.
• The route advertisement rules for hierarchical RR networking are the same as
those for single-cluster RR networking.
▫ Number of alternate paths: This factor affects load balancing and resource
consumption. More layers reduce the number of links for load balancing
but require fewer router resources.
1. D
2. A
3. A
Network Security Technologies
Foreword
⚫
Currently, Ethernet technologies are widely used on networks. Network attacks often occur, for example, attacks based
on the Address Resolution Protocol (ARP) and Dynamic Host Configuration Protocol (DHCP). Such attacks cause
authorized users' failure to access network resources and threaten network information security. In this situation,
Ethernet switching security becomes increasingly important.
⚫
On networks of large- and medium-sized enterprises, firewalls are usually deployed in hot standby mode to ensure
that the standby firewall can smoothly take over services of the active firewall when the active firewall fails, ensuring
service continuity. The virtual system feature allows a physical firewall to be logically divided into multiple
independent virtual systems. Each virtual system functions as a real device.
⚫
This course describes common Ethernet switching security technologies, including port isolation, port security, MAC
address flapping detection, storm control, interface rate limiting, MAC address table security, DHCP snooping, and IP
source guard; and advanced firewall features, including hot standby and virtual system.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
▫ Port Security
▫ MACsec
▫ Traffic Control
▫ DHCP Snooping
▫ IP Source Guard
VLAN 2 VLAN 3
4 Huawei Confidential
Overview of Port Isolation
⚫ Port isolation can isolate interfaces in a VLAN. That is, you only need to add interfaces to a port
isolation group to implement Layer 2 isolation between these interfaces. Port isolation provides secure
and flexible networking schemes for customers.
Router
GE0/0/2
communicate at Layer 2.
5 Huawei Confidential
Working Mechanism of Port Isolation
Interfaces in a port isolation group are isolated from each other, but
interfaces in different port isolation groups can communicate. Port isolation
Bidirectional applies only to interfaces on the same device and cannot isolate interfaces
isolation on different devices.
Isolation
type
To isolate interfaces in different port isolation groups, configure
Unidirectional unidirectional isolation between these interfaces. By default, unidirectional
isolation isolation is disabled.
Port
isolation
Isolation at Layer 2 and Broadcast packets in the same VLAN are isolated, but users connected to
interworking at Layer 3 different interfaces can communicate with each other at Layer 3. By default,
interfaces are isolated at Layer 2 but can communicate at Layer 3.
Isolation
mode
Layer 2 and Layer 3 Users on different ports in the same VLAN are isolated at Layer 2 and Layer 3
isolation and cannot communicate with each other.
6 Huawei Confidential
• When Layer 2 isolation and Layer 3 interworking are used, you can enable intra-
VLAN proxy ARP on the VLANIF interface and configure arp-proxy inner-sub-
vlan-proxy enable to implement communication between hosts in the same
VLAN.
Port Isolation Configuration Commands
1. Enable port isolation.
By default, port isolation is disabled on an interface. If group-id is not specified, an interface is added to port isolation group 1
by default.
By default, the port isolation mode is Layer 2 isolation and Layer 3 interworking.
l2: Layer 2 isolation and Layer 3 interworking
all: Layer 2 and Layer 3 isolation
This command is used to unidirectionally isolate the current interface from a specified interface. If interface A is isolated from
interface B unidirectionally, packets sent from interface A cannot reach interface B, but packets sent from interface B can reach
interface A. By default, unidirectional isolation is disabled.
7 Huawei Confidential
Example for Configuring Port Isolation
Router
Switch configuration:
[Switch] vlan 2
[Switch] port-isolate mode all
Switch [Switch] interface GigabitEthernet 0/0/1
[Switch-GigabitEthernet0/0/1] port link-type access
GE0/0/1 GE0/0/3 [Switch-GigabitEthernet0/0/1] port default vlan 2
GE0/0/2
[Switch-GigabitEthernet0/0/1] port-isolate enable group 2
[Switch] interface GigabitEthernet 0/0/2
[Switch-GigabitEthernet0/0/2] port link-type access
[Switch-GigabitEthernet0/0/2] port default vlan 2
[Switch-GigabitEthernet0/0/2] port-isolate enable group 2
[Switch] interface GigabitEthernet 0/0/3
[Switch-GigabitEthernet0/0/3] port link-type access
PC1 PC2 PC3 [Switch-GigabitEthernet0/0/3] port default vlan 2
IP: 10.1.1.1/24 IP: 10.1.1.2/24 IP: 10.1.1.3/24
VLAN 2
⚫ As shown in the figure, PC1, PC2, and PC3 belong to VLAN 2. After port isolation is configured,
PC3 can communicate with PC1 and PC2, but PC1 and PC2 cannot communicate with each other.
8 Huawei Confidential
Verifying the Configuration
1. Run the display port-isolate group group- 2. Verify that hosts in the same port isolation
number command to check interfaces in the group cannot communicate with each other.
port isolation group.
9 Huawei Confidential
Contents
▫ Port Security
▫ MACsec
▫ Traffic Control
▫ DHCP Snooping
▫ IP Source Guard
11 Huawei Confidential
• A MAC address table is used by the switch to record the mappings between
learned MAC addresses of other devices and interfaces on which MAC addresses
are learned, as well as VLANs to which the interfaces belong.
• When performing Layer 2 switching, the device searches the MAC address table
according to the destination MAC address of the packet. If the MAC address table
contains the entry corresponding to the destination MAC address of the packet
and the interface that receives the packet is different from the interface
corresponding to the entry, the packet is directly forwarded through the
outbound interface in the entry. If they are the same, the packet is discarded.
• If the MAC address table does not contain the entry matching the destination
MAC address of the packet, the device broadcasts the packet through all the
interfaces in the VLAN except the interface that receives the packet.
MAC Address Table Security
You can configure MAC address entries of fixed uplink devices or MAC
Static MAC address entry addresses of trusted user terminals as static MAC address entries to ensure
communication security.
Blackhole MAC To prevent hackers from attacking the network through MAC addresses, the
address entry switch discards the packets from or to blackhole MAC addresses.
Measures to You can configure an aging time for dynamic MAC address entries to
Dynamic MAC address entry prevent explosive growth of MAC address entries.
ensure security
of the MAC
address table If the network environment is fixed or the forwarding path has been specified,
Disabling MAC you can disable MAC address learning to prevent untrusted users from accessing
address learning the network and prevent MAC address attacks, improving network security.
Limiting the number of On an insecure network, you can limit the number of learned MAC addresses
learned MAC addresses to prevent attackers from changing MAC addresses to initiate attacks.
12 Huawei Confidential
• To prevent unauthorized users from modifying MAC address entries of some key
devices (such as servers or uplink devices), you can configure the MAC address
entries of these devices as static MAC address entries. Static MAC address entries
take precedence over dynamic MAC address entries and can hardly be modified
by unauthorized users.
• To prevent useless MAC address entries from occupying the MAC address table
and prevent hackers from attacking user devices or networks using MAC
addresses, you can configure untrusted MAC addresses as blackhole MAC
addresses. In this way, when the device receives a packet with the destination or
source MAC address as the blackhole MAC address, the device discards the
packet without modifying the original MAC address entry or adding a MAC
address entry.
• To reduce manual configuration of static MAC address entries, Huawei S series
switches are enabled with dynamic MAC address learning by default. The aging
time needs to be set properly for dynamic MAC address entries so that the switch
can delete unneeded MAC address entries.
• To improve network security and prevent the device from learning invalid MAC
addresses and incorrectly modifying the original MAC address entries in the MAC
address table, you can disable MAC address learning on a specified interface or
all interfaces in a specified VLAN so that the device does not learn new MAC
addresses from these interfaces.
• You can limit the number of MAC address entries that can be learned on the
device. When the number of learned MAC address entries reaches the limit, the
device does not learn new MAC address entries. You can also configure an action
to take when the number of learned MAC address entries reaches the limit. This
prevents MAC address entries from being exhausted and improves network
security.
Configuring MAC Address Entries
The specified VLAN must have been created and added to the bound interface. The specified MAC address must
be a unicast MAC address and cannot be a multicast or broadcast MAC address.
The device discards the received packets originating from or destined for blackhole MAC addresses.
13 Huawei Confidential
Disabling MAC Address Learning
14 Huawei Confidential
Limiting the Number of Learned MAC Address Entries
1. Limit the number of MAC address entries learned on an interface.
[Huawei-GigabitEthernet0/0/1] mac-limit maximum max-num
By default, the number of MAC address entries learned on an interface is not limited.
2. Configure an action for the device to take when the number of learned MAC addresses reaches the limit.
By default, the number of MAC address entries learned in a VLAN is not limited.
15 Huawei Confidential
Example for Configuring a MAC Address Table
Internet Switch3 configuration:
Switch3 Method 1: Interface view
GE0/0/1 GE0/0/2 # Disable MAC address learning on GE0/0/1.
[Switch3-GigabitEthernet0/0/1] mac-address learning disable action discard
GE0/0/2 # Set the maximum number of MAC address entries learned on GE0/0/2, and
GE0/0/2
configure the device to generate an alarm and set the action to discard when
Switch1 the number of learned MAC address entries reaches the limit.
Switch2
[Switch3-GigabitEthernet0/0/2] mac-limit maximum 100
GE0/0/1 GE0/0/1 [Switch3-GigabitEthernet0/0/2] mac-limit alarm enable
[Switch3-GigabitEthernet0/0/2] mac-limit action discard
User User
network 1 network 2
16 Huawei Confidential
Verifying the Configuration
⚫ Run the display mac-limit command in any view to check whether MAC address limiting rules are
configured successfully.
[Switch3]display mac-limit
MAC Limit is enabled
Total MAC Limit rule count : 2
17 Huawei Confidential
Contents
▫ MACsec
▫ Traffic Control
▫ DHCP Snooping
▫ IP Source Guard
Switch2
PC1 PC1
PC1 PC2 PC3 MAC:0011-0022-0033 MAC:0011-0022-0033
19 Huawei Confidential
Introduction to Port Security
⚫ You can configure port security on a specified interface of a switch to limit the number of MAC address
entries learned by the interface and configure a punishment action when the number of learned MAC
address entries exceeds the threshold.
⚫ Port security converts dynamic MAC addresses learned on an interface into secure MAC addresses
(including dynamic and static secure MAC addresses, and sticky MAC addresses). This function prevents
unauthorized users from communicating with the switch using this interface and therefore enhances
device security.
20 Huawei Confidential
Working Mechanism of Port Security
⚫ Secure MAC addresses are classified into the following types.
⚫ Secure MAC addresses are usually used together with security protection actions. Common security protection
actions are as follows:
Restrict: Discards packets with a nonexistent source MAC address and sends a trap.
Protect: Discards packets with a nonexistent source MAC address but does not send a trap.
Shutdown: Sets the interface state to error-down and generates an alarm.
21 Huawei Confidential
• Dynamic secure MAC addresses can be aged out using two modes: absolute
aging and relative aging.
▫ Absolute aging time: If the absolute aging time is set to 5 minutes, the
system calculates the lifetime of each MAC address every minute. If the
lifetime is larger than or equal to 5 minutes, the secure dynamic MAC
address is aged immediately. If the lifetime is smaller than time minutes,
the system determines whether to delete the secure dynamic MAC address
after 1 minute.
▫ Relative aging time: If the value is set to 5 minutes, the system checks
whether there is traffic from a specified dynamic secure MAC address every
1 minute. If no traffic is received from the secure dynamic MAC address,
this MAC address is aged out 5 minutes later.
• By default, an interface in error-down state can be restored only after the restart
command is run in the interface view.
• To enable an interface in error-down state to automatically go Up after a period
of time, run the error-down auto-recovery cause port-security interval
interval-value command in the system view. In this command, interval-value
specifies the period of time after which an interface in error-down state can
automatically go Up.
• When port security or sticky MAC address is enabled or disabled on an interface,
the MAC address on the interface changes as follows:
▫ Port security
...
Department A Department B Department C
Change the MAC addresses of a Configure MAC addresses of a Convert MAC addresses of
large number of fixed users to small number of fixed users as frequent access users into
sticky MAC addresses. After the secure static MAC addresses. dynamic secure MAC addresses,
device is restarted, bound MAC After the device is restarted, so it is easy to delete bound MAC
address entries are not lost. bound MAC address entries are address entries.
not lost.
23 Huawei Confidential
• You can configure port security and set the maximum number of secure MAC
addresses learned by an interface on networks demanding high access security.
Port security enables the switch to convert MAC addresses learned by an
interface into secure MAC addresses and to stop learning new MAC addresses
after the maximum number of learned MAC addresses is reached. In this case,
the switch can only communicate with devices with learned MAC addresses. If
the switch receives packets with a nonexistent source MAC address after the
number of secure MAC addresses reaches the limit, the switch considers that the
packets are sent from an unauthorized user, regardless of whether the
destination MAC address of packets is valid, and takes the configured action on
the interface. This prevents untrusted users from accessing these interfaces,
improving security of the switch and the network.
• Port security enables the switch to convert MAC addresses learned by an
interface into secure MAC addresses and to stop learning new MAC addresses
after the maximum number of learned MAC addresses is reached. In this case,
the switch can only communicate with devices with learned MAC addresses. If
the number of access users changes, you can restart the device or set the aging
time of secure MAC address entries to update the MAC address entries. If you do
not want to change the MAC address entries of stable access users, you can
enable the sticky MAC function on the interface. After the configuration is saved,
the MAC address entries will not be updated or lost.
Port Security Configuration Commands (1)
1. Enable port security on an interface.
2. Set the maximum number of secure MAC addresses learned by an interface is set.
24 Huawei Confidential
▫ protect
▪ Discards packets with new source MAC addresses when the number
of learned MAC addresses exceeds the limit.
▪ When static MAC address flapping occurs, the interface discards the
packets with this MAC address.
▫ restrict
▪ Discards packets with new source MAC addresses and sends a trap
message when the number of learned MAC addresses exceeds the
limit.
▪ When static MAC address flapping occurs, the interface discards the
packets with this MAC address and sends a trap.
▫ shutdown
▪ Sets the interface state to error-down and generates a trap when the
number of learned MAC addresses exceeds the limit.
By default, dynamic secure MAC address entries learned by an interface are not aged out.
7. Set the maximum number of sticky MAC addresses that can be learned by an interface.
By default, an interface enabled with the sticky MAC address function can learn only one sticky MAC address.
25 Huawei Confidential
26 Huawei Confidential
Verifying the Configuration
⚫ Run the display mac-address security command to check dynamic secure MAC address entries.
27 Huawei Confidential
Configuring Port Security - Sticky MAC Addresses
Switch configuration:
[Switch] interface GigabitEthernet 0/0/1
Switch [Switch-GigabitEthernet 0/0/1] port-security enable
[Switch-GigabitEthernet 0/0/1] port-security max-mac-num 1
GE0/0/1 GE0/0/3
[Switch-GigabitEthernet 0/0/1] port-security mac-address sticky
[Switch] interface GigabitEthernet 0/0/2
GE0/0/2
[Switch-GigabitEthernet 0/0/2] port-security enable
[Switch-GigabitEthernet 0/0/2] port-security max-mac-num 1
[Switch-GigabitEthernet 0/0/2] port-security mac-address sticky
[Switch] interface GigabitEthernet 0/0/3
[Switch-GigabitEthernet 0/0/3] port-security enable
PC1 PC2 PC3
[Switch-GigabitEthernet 0/0/3] port-security max-mac-num 1
[Switch-GigabitEthernet 0/0/3] port-security mac-address sticky
[Switch-GigabitEthernet 0/0/3] port-security mac-address sticky
⚫ Requirements: 5489-98ac-71a9 vlan 1
Configure port security on the switch. Enable port security on GE0/0/1 through GE0/0/3.
Set the maximum number of MAC addresses that can be learned by GE0/0/1 and GE0/0/2 to 1 and convert secure dynamic MAC
addresses learned by GE0/0/1 and GE0/0/2 to sticky MAC addresses.
On GE0/0/3, set the maximum number of MAC addresses that can be learned to 1, manually create a sticky MAC address entry
for the interface, and bind the interface to MAC address 5489-98ac-71a9. Retain the default penalty on each interface.
28 Huawei Confidential
Verifying the Configuration
⚫ Run the display mac-address sticky command to check sticky MAC address entries.
29 Huawei Confidential
Contents
▫ Port Security
◼ MAC Address Flapping Prevention and Detection
▫ MACsec
▫ Traffic Control
▫ DHCP Snooping
▫ IP Source Guard
GE0/0/2
PC1 PC2
MAC address forged by an attacker
MAC: 0011-0022-0033 MAC: 0011-0022-0033 MAC:0011-0022-0033
31 Huawei Confidential
MAC Address Flapping Prevention
⚫
If MAC address flapping is caused by loops, deploy loop prevention technologies, such as STP, to eliminate Layer 2 loops. If MAC
address flapping is caused by network attacks or other reasons, you can use the following MAC address flapping prevention
measures.
Preventing MAC address entries from being overridden on
Configuring a MAC address learning priority for an interface
interfaces with the same priority
If the same MAC address is learned on interfaces that have different priorities, If the interface connected to a bogus network device has the same priority
the MAC address entry on the interface with the highest priority overrides that as the interface connected to an authorized device, the MAC address entry of
on the other interfaces. the bogus device learned later does not override the original correct MAC
address entry. undo mac-learning priority 0 allow-flapping
1 2
32 Huawei Confidential
33 Huawei Confidential
• Whether all Huawei switches support MAC address flapping detection depends
on the switch model.
VLAN-based MAC Address Flapping Detection
⚫ When VLAN-based MAC address flapping detection is
configured and detects MAC address flapping on an
GE0/0/1 GE0/0/2
interface, you can configure one of the following
SW1 actions:
Trap sending: The device only sends a trap to the NMS.
Interface blocking: The interface is blocked for a specified
SW2 period of time and the interface is disabled from sending
PC1 and receiving packets.
MAC: 0011-0022-0033
MAC address blocking: The device blocks only the current
MAC address but not the physical interface.
Communication of other MAC addresses on the current
interface is not affected.
PC2 PC3
Attacker
MAC: 0011-0022-0033
VLAN 2
34 Huawei Confidential
• After MAC address flapping occurs, the following actions are performed: 1. A trap
is generated and reported. 2. GE0/0/2 on SW1 is disabled from sending and
receiving packets. 3. GE0/0/2 on SW1 is disabled from sending and receiving
packets with a specified MAC address.
• When an interface is blocked:
▫ When detecting MAC address flapping in VLAN 2, the device blocks the
interface where MAC address flapping occurs.
▫ The interface will be blocked for 10s (specified by the block-time keyword).
The blocked interface cannot receive or send data.
▫ After 10 seconds, the interface is unblocked and starts to send and receive
data. If MAC address flapping is not detected within 20 seconds, the
interface is unblocked. If MAC address flapping is detected again on the
interface within 20 seconds, the switch blocks the interface again. If the
switch still detects MAC address flapping on the interface, the switch
permanently blocks the interface. The retry-times parameter specifies the
number of times that MAC address flapping is detected.
Global MAC Address Flapping Detection
⚫ When a switch detects MAC address flapping, it only reports a trap by default and does not take other actions. In
practice, you can define the following actions after MAC address flapping is detected:
error-down
◼ When an interface configured with MAC address flapping detection detects MAC address flapping, the interface is set to enterthe Error-Down
state and does not forward data.
quit-vlan
◼ When an interface configured with MAC address flapping detection detects MAC address flapping, the interface is removed fromthe VLAN to
which the interface belongs.
1 2 1 2
VLAN 10
PC1 PC2 PC1 PC2
Secure network MAC address forged by an attacker Secure network MAC address forged by an attacker
MAC: 0011-0022-0033 MAC: 0011-0022-0033 MAC: 0011-0022-0033 MAC: 0011-0022-0033
35 Huawei Confidential
• If an interface is set to enter the Error-Down state due to MAC address flapping,
the interface does not automatically restore to the Up state by default.
By default, the MAC address learning priority of an interface is 0. A larger priority value indicates a higher MAC address
learning priority.
2. Configure the device to discard packets when the device is configured to prohibit MAC address flapping.
By default, the action is forward when the device is configured to prohibit MAC address flapping.
3. Configure the device to prevent MAC address entries from being overridden on interfaces with the same priority.
By default, MAC address flapping between interfaces with the same priority is allowed.
36 Huawei Confidential
Configuration Commands of MAC Address Flapping
Prevention and Detection (2)
5. (Optional) Configure a VLAN whitelist for MAC address flapping detection.
By default, the device performs MAC address flapping detection in all VLANs.
6. (Optional) Configure the action for the device to take after MAC address flapping is detected on an interface.
By default, the device discards packets with new MAC addresses when the number of learned MAC address entries reaches the
limit on the interface.
7. (Optional) Set an aging time for flapping MAC addresses.
37 Huawei Confidential
• Insecure networks are vulnerable to MAC address attacks. If attackers send large
numbers of forged packets with different source MAC addresses to the switch, its
MAC address table will be filled with unwanted address entries. As a result, the
device is unable to learn the source MAC addresses of valid packets.
• You can limit the number of MAC address entries that can be learned on the
device. When the number of learned MAC address entries reaches the limit, the
device does not learn new MAC address entries. You can also configure an action
to take when the number of learned MAC address entries reaches the limit. This
prevents MAC address entries from being exhausted and improves network
security.
Example for Configuring MAC Address Flapping Prevention
and Detection
GE0/0/1 1. Set the MAC address learning priority of GE0/0/1 that connects
Switch1 Server
Switch1 to the server to be higher than that of other
GE0/0/2 interfaces. The default MAC address learning priority is 0.
GE0/0/3 [Switch1] interface GigabitEthernet 0/0/1
Switch2 [Switch1-GigabitEthernet 0/0/1] mac-learning priority 3
GE0/0/1 GE0/0/2 2. Configure MAC address flapping detection on Switch2 and
configure an action to taken when MAC address flapping is
detected on an interface.
38 Huawei Confidential
• When Switch3 and Switch4 are incorrectly connected, the MAC address of
GE0/0/1 on Switch2 is learned by GE0/0/2, causing GE0/0/2 to enter the Error-
Down state.
• You can run the display mac-address flapping record command to check MAC
address flapping records.
Verifying the Configuration
⚫ When the MAC address of GE0/0/1 on Switch2 is learned by GE0/0/2, GE0/0/2 is shut down. You can
run the display mac-address flapping record command to check MAC address flapping records.
[Switch2] display mac-address flapping record
S : start time
E : end time
(Q) : quit vlan
(D) : error down
---------------------------------------------------------------------------------------------------
Move-Time VLAN MAC-Address Original-Port Move-Ports MoveNum
---------------------------------------------------------------------------------------------------
S:XXXX-XX-22 17:22:36 1 5489-9815-662b GE0/0/1 GE0/0/2(D) 83
E:XXXX-XX-22 17:22:44
---------------------------------------------------------------------------------------------------
Total items on slot 0: 1
39 Huawei Confidential
Contents
▫ Port Security
▫ Traffic Control
▫ DHCP Snooping
▫ IP Source Guard
Most data is transmitted in plain text on LAN links, posing security risks in scenarios
demanding high security.
Internet IPsec Media Access Control Security (MACsec), in compliance with 802.1AE, defines an
Ethernet-based data security communication method. It encrypts data hop by hop to
Site 2 ensure data transmission security.
41 Huawei Confidential
Working Mechanism of MACsec
⚫ When the device runs point-to-point MACsec, a network administrator pre-configures the same Secure Connectivity Association Key
(CAK) on the two devices using commands. The two devices use the MACsec Key Agreement (MKA) to elect a key server. The key
server determines the encryption scheme, uses an encryption algorithm to generate a Secure Association Key (SAK) based on
parameters such as the CAK, and distributes the SAK to the peer device. In this way, the two devices have the same SAK, which can
be used to encrypt and decrypt MACsec data packets.
42 Huawei Confidential
• A CAK is not directly used to encrypt data packets. Instead, the CAK and other
parameters derive the encryption key of data packets. The CAK can be delivered
during 802.1X authentication or statically configured.
▫ Port Security
▫ MACsec
◼ Traffic Control
▫ DHCP Snooping
▫ IP Source Guard
⚫
Solution:
Traffic suppression can rate-limit the broadcast, unknown multicast,
unknown unicast, known multicast, and known unicast packets by
VLAN 2 setting thresholds. This prevents traffic flooding caused by broadcast,
Broadcast, multicast, and unknown multicast, and unknown unicast packets and the impact
unknown unicast packets incurred by a large number of known multicast and known unicast
Known multicast and packets.
known unicast packets
44 Huawei Confidential
Traffic Suppression Storm Control
80 Threshold
Internet
50 Switch 50 Router
80 80
100 80
xx Packets/Rate
45 Huawei Confidential
• In the outbound direction of an interface, the device can block broadcast packets,
unknown multicast packets, and unknown unicast packets.
Traffic Suppression Storm Control
Switch1
Switch2 Switch3
VLAN 10 VLAN 10
VLAN 20 VLAN 20
VLAN 30 VLAN 30
Broadcast
xx packets/Rate
46 Huawei Confidential
47 Huawei Confidential
• The threshold can be configured for incoming packets on interfaces. The system
discards the traffic exceeding the threshold and forwards the traffic within the
threshold. In this way, the system limits the traffic rate in an acceptable range.
• Note that traffic suppression can also block outgoing packets on interfaces.
• In storm control, rate thresholds are configured for incoming packets only on
interfaces. When the traffic exceeds the threshold, the system rejects the packets
of this particular type on the interface or shuts down the interface.
Traffic Suppression Storm Control
By default, the suppression mode is packets. In bits mode, traffic suppression is more fine-grained and accurate.
The traffic suppression mode configured on an interface must be the same as the global traffic suppression mode.
48 Huawei Confidential
GE0/0/1 GE0/0/2
Layer 2 Layer 3
network network
Switch Router Switch configuration:
⚫ Requirements:
[Switch]suppression mode by-packets
Configure traffic suppression in the view of GE0/0/1 to
[Switch-GigabitEthernet0/0/1] unicast-suppression 80
limit the capability of forwarding broadcast, unknown
[Switch-GigabitEthernet0/0/1] multicast-suppression 70
multicast, and unknown unicast packets on the Layer 2
[Switch-GigabitEthernet0/0/1] broadcast-suppression 60
network.
Set the bandwidth percentage for broadcast packets to
60%.
Set the bandwidth percentage for unknown multicast
packets to 70%.
Set the bandwidth percentage for unknown unicast
packets to 80%.
49 Huawei Confidential
Traffic Suppression Storm Control
50 Huawei Confidential
Traffic Suppression Storm Control
⚫ Solution:
Storm control blocks broadcast, unknown multicast, and
VLAN 2 VLAN 2
unknown unicast packets by disabling related interfaces.
51 Huawei Confidential
Traffic Suppression Storm Control
80 Threshold 80 Threshold
Block Error-down
Switch1 Switch1
52 Huawei Confidential
• The difference between traffic suppression and storm control is as follows: The
storm control function can take the punishment action (block or shutdown) for
an interface, whereas the traffic suppression function only limits the traffic on an
interface.
Traffic Suppression Storm Control
53 Huawei Confidential
• In storm control, rate thresholds are configured for incoming packets only on
interfaces. When the traffic exceeds the threshold, the system rejects the packets
of this particular type on the interface or shuts down the interface.
Traffic Suppression Storm Control
Storm control is performed on broadcast packets, multicast packets, or unknown unicast packets on the interface.
2. Configure a storm control action.
[Huawei-GigabitEthernet0/0/1] storm-control action { block | error-down }
5. (Optional) Add specified protocol packets to the traffic suppression and storm control whitelist.
[Huawei] storm-control whitelist protocol { arp-request | bpdu | dhcp | igmp | ospf }*
54 Huawei Confidential
Traffic Suppression Storm Control
GE0/0/1
Layer 2 Layer 3
network network Switch configuration:
Switch Router
[Switch] storm-control whitelist protocol arp-request
[Switch] interface gigabitethernet0/0/1
[Switch-GigabitEthernet0/0/1] storm-control broadcast min-rate
⚫ Requirements 1000 max-rate 2000
[Switch-GigabitEthernet0/0/1] storm-control multicast min-rate
The switch is required to prevent broadcast storms caused 1000 max-rate 2000
by broadcast packets, unknown multicast packets, and [Switch-GigabitEthernet0/0/1] storm-control unicast min-rate 1000
max-rate 2000
unknown unicast packets forwarded on the Layer 2 [Switch-GigabitEthernet0/0/1] storm-control interval 90
network. [Switch-GigabitEthernet0/0/1] storm-control action block
[Switch-GigabitEthernet0/0/1] storm-control enable trap
⚫ Configuration roadmap: # Enable the trap function for storm control.
Configure storm control on GE0/0/1 to prevent broadcast
storms on the Layer 2 network.
55 Huawei Confidential
Traffic Suppression Storm Control
56 Huawei Confidential
Contents
▫ Port Security
▫ MACsec
▫ Traffic Control
◼ DHCP Snooping
▫ IP Source Guard
DHCP client DHCP server DHCP client DHCP relay agent DHCP server
Discovery stage: The DHCP client Discovery stage: DHCP The DHCP relay agent unicasts
1 broadcasts a DHCP Discover message. 1 Discover message a DHCP Discover message.
Offer stage: The DHCP server unicasts Offer stage: DHCP The DHCP server unicasts a
2 2
or broadcasts a DHCP Offer message. Offer message DHCP Offer message.
Request stage: The DHCP client Request stage: DHCP The DHCP relay agent unicasts
3 broadcasts a DHCP Request message. 3
Request message a DHCP Request message.
Acknowledgment stage: The DHCP Acknowledgment stage: DHCP The DHCP server unicasts
4 4 ACK message
server unicasts a DHCP ACK message. a DHCP ACK message.
58 Huawei Confidential
▫ The DHCP relay agent changes the destination IP address of the DHCP
Discover message to the IP address of the DHCP server or the next-hop
DHCP relay agent, and changes the source IP address to the IP address of
the interface connecting the DHCP relay agent to the client. The message is
then unicast to the DHCP server or the next-hop DHCP relay agent.
60 Huawei Confidential
DHCP Snooping Trust Function
Unauthorized
⚫ The DHCP snooping trust function ensures that DHCP
DHCP Client 1 DHCP server clients obtain IP addresses from authorized DHCP
servers.
⚫ DHCP snooping involves two interface roles: trusted
interface and untrusted interface.
DHCP ACK messages, NAK messages, and Offer messages
Authorized are received from the trusted interface.
DHCP server
In addition, the device only forwards DHCP Request
DHCP Client 2 messages from DHCP clients to the authorized DHCP
DHCP snooping trusted interface
server through the trusted interface.
DHCP snooping untrusted interface
Interface enabled with DHCP snooping.
DHCP ACK messages, NAK messages, and Offer messages
Valid DHCP Offer, ACK, and NAK messages are discarded on untrusted interfaces.
Invalid DHCP Offer, ACK, and NAK messages
Request message from the DHCP client
61 Huawei Confidential
• After the dhcp snooping enable command is run on an interface, the interface
forwards received DHCP Request messages to all trusted interfaces and discards
received DHCP Reply messages.
• After an interface on which the dhcp snooping trusted command is run receives a
DHCP Request message, it forwards the message to all other trusted interfaces. If
there are no other trusted interfaces, it discards the message. After receiving a
DHCP Reply message, it forwards the message only to the interfaces that are
connected to clients and have the dhcp snooping enable command configured. If
such interfaces cannot be found, it discards the DHCP Reply message.
DHCP Snooping Binding Table
⚫ The Layer 2 access device enabled with DHCP snooping obtains required information, such as the PC's MAC address, IP address, and
address lease, from the DHCP ACK messages, learns information (interface number and VLAN ID) about the DHCP snooping-enabled
interface connected to the PC, and generates a DHCP snooping binding entry for the PC.
⚫
The DHCP snooping binding table records the mapping between IP addresses and MAC addresses of DHCP clients. The device can
check DHCP messages against the DHCP snooping binding table to prevent attacks initiated by unauthorized users.
DHCP Client 2
192.168.1.99/24
MAC-2
62 Huawei Confidential
• DHCP snooping binding entries are aged out when the DHCP release expires, or
the entries are deleted when users send DHCP Release messages to release IP
addresses.
DHCP Starvation Attacks
⚫ An attacker continuously applies to the DHCP server for a large number of IP addresses until the IP addresses in the address pool of
the DHCP server are exhausted. As a result, the DHCP server cannot allocate IP addresses to authorized users.
⚫
Vulnerability analysis: When the DHCP server allocates IP addresses to clients, it cannot distinguish authorized and unauthorized
users.
Source Mac = Mac-B DHCP REQUEST CHADDR = B
63 Huawei Confidential
Defense Against DHCP Starvation Attacks
⚫ Solution: Configure MAC address limiting of DHCP snooping to prevent starvation attacks. This function limits the
maximum number of MAC addresses that can be learned on an interface of a switch to prevent a large number of
DHCP Request messages with variable MAC addresses from being sent.
Source Mac = Mac-B DHCP REQUEST CHADDR = B
64 Huawei Confidential
DoS Attacks by Changing the CHADDR Field
⚫ An attacker continuously applies to the DHCP server for a large number of IP addresses until the IP addresses in the address pool of
the DHCP server are exhausted. As a result, the DHCP server cannot allocate IP addresses to authorized users.
⚫
Vulnerability analysis: When the DHCP server allocates IP addresses to clients, it cannot distinguish authorized and unauthorized
users.
Source Mac = Mac-B DHCP REQUEST CHADDR = B
65 Huawei Confidential
Source Mac = Mac-E DHCP REQUEST CHADDR = D The device checks whether the source MAC
address in the DHCP Request message is the
An attacker keeps sending bogus DHCP Discover
same as the CHADDR value. If so, the device
Attacker messages with different CHADDR values to apply
forwards the message. If not, the device
for IP addresses from the DHCP server.
discards the message.
66 Huawei Confidential
• To prevent starvation attacks, DHCP snooping checks whether the source MAC
address of a DHCP Request message is the same as the CHADDR value on an
interface. If they are the same, the interface forwards the DHCP Request
message. If they are different, the interface discards the message. To check the
consistency between the source MAC address and the CHADDR field on an
interface, run the dhcp snooping check dhcp-chaddr enable command on the
interface.
• An attacker may continuously change both the MAC address and CHADDR value
simultaneously, and uses the same CHADDR value as the MAC address each
time. In this way, the consistency check between the source MAC address and the
CHADDR can be avoided.
Man-in-the-Middle Attacks
⚫ An attacker uses the ARP mechanism to enable a client to learn the mapping between the DHCP server's IP address and attacker's
MAC address, and enable the server to learn the mapping between the client's IP address and attacker's MAC address. In this way, all
IP packets exchanged between the client and server traverse the attacker's device.
⚫
Vulnerability analysis: The man-in-the-middle attack is a spoofing IP/MAC attack. This attack uses the mapping between the forged
IP address and MAC address to deceive the DHCP client and server.
Attacker
PC2
(MAC2 IP2)
A man-in-the-middle sends a packet with
The man-in-the-middle acts as a forged
its own MAC address and the DHCP
client, sending packets that carry its
server's IP address to a DHCP client. The
MAC address and client's IP address to
DHCP client learns the MAC address of
the server. As a result, the server also
the man-in-the-middle and DHCP
learns the MAC address and IP address
server's IP address, and considers the
of the man-in-the-middle.
man-in-the-middle as the DHCP server.
67 Huawei Confidential
• As shown in the figure, the attacker uses the ARP mechanism to enable PC1 to
learn the mapping between IP-S and MAC2 and enable the server to learn the
mapping between IP1 and MAC2. When PC1 sends an IP packet to the DHCP
server, the destination IP address is IP-S and the source IP address is IP1. The
destination MAC address of the frame in which the IP packet is encapsulated is
MAC2 and the source MAC address is MAC1, so the frame reaches PC2 first. After
receiving the frame, the attacker changes the destination MAC address to MAC-S
and the source MAC address to MAC2, and then sends the frame to the server.
When the DHCP server sends an IP packet to PC1, the destination IP address is
IP1 and the source IP address is IP-S. The destination MAC address of the frame
in which the IP packet is encapsulated is MAC2 and the source MAC address is
MAC-S, so the frame reaches PC2 first. After receiving the frame, the attacker
changes the destination MAC address to MAC1 and the source MAC address to
MAC2, and then sends the frame to PC1.
• The IP packets transmitted between PC1 and the DHCP server traverse the
attacker's device (man-in-the-middle). Therefore, the attacker can easily obtain
some information in the IP packets and use the information to perform other
damage operations. The attacker can easily tamper with the DHCP messages
transmitted between PC1 and the DHCP server. These messages are encapsulated
in UDP packets, and UDP packets are encapsulated in IP packets. In this way, the
attacker can directly attack the DHCP server.
Defense Against DHCP Man-in-the-Middle Attacks
⚫ Solution: To defend against man-in-the-middle attacks and IP/MAC spoofing attacks, configure the DHCP snooping binding table.
When an interface receives an ARP or IP packet, the interface matches the source IP address and source MAC address in the ARP or
IP packet against the DHCP snooping binding table. Packets that match entries are forwarded, whereas packets that do not match
entries are discarded.
PC2 Attacker
The device checks the source IP address and
(MAC2 IP2) source MAC address in the ARP Request
packet and finds that the IP-MAC mapping
does not match any entry in the DHCP
snooping binding table. Therefore, the device
IP-S MAC2 IP-C MAC2 discards the ARP Request packet.
PC1 Server
DHCP Client Switch DHCP Server
IP2 MAC2 - - -
68 Huawei Confidential
• As shown in the figure, if the DHCP server assigns IP address IP1 to PC1 and IP
address IP2 to PC2, IP1 is bound to MAC1 and IP2 is bound to MAC2. These
bindings are stored in the DHCP snooping binding table. To enable the server to
learn the mapping between IP1 and MAC2, the attacker sends an ARP Request
packet in which the source IP address is set to IP1 and the source MAC address is
set to MAC2. After receiving the ARP Request packet, the switch checks the
source IP address and source MAC address in the packet and finds that the IP-
MAC (IP1-MAC2) mapping does not match any entry in the DHCP snooping
binding table. Therefore, the switch discards the ARP Request packet, this
effectively prevents spoofing IP/MAC attacks.
• To prevent IP/MAC spoofing attacks, run the arp dhcp-snooping-detect enable
command in the system view of the switch.
DHCP Snooping Configuration Commands (1)
1. Enable DHCP snooping globally.
[Huawei] dhcp snooping enable [ ipv4 | ipv6 ]
69 Huawei Confidential
DHCP Snooping Configuration Commands (2)
4. Enable DHCP snooping in the interface view.
6. (Optional) Configure the device to discard DHCP Request messages with non-0 GIADDR field.
Enable the device to check whether the GIADDR field in a DHCP Request message is 0. This command can be
run in both the VLAN view and interface view.
If you run this command in the VLAN view, the command configuration takes effect for the DHCP messages
received by all interfaces on the device from the specified VLAN. If you run this command in the interface view,
the command configuration takes effect for all DHCP messages on the specified interface.
70 Huawei Confidential
Examples for Configuring DHCP Snooping
Method 1: Interface view
[Switch] dhcp snooping enable ipv4
[Switch] interface GigabitEthernet 0/0/1
[Switch-GigabitEthernet0/0/1] dhcp snooping enable
[Switch] interface GigabitEthernet 0/0/2
DHCP client 1 GE0/0/1 [Switch-GigabitEthernet0/0/2] dhcp snooping enable
VLAN 2 [Switch] interface GigabitEthernet 0/0/3
GE0/0/3
[Switch-GigabitEthernet0/0/3] dhcp snooping enable
[Switch-GigabitEthernet0/0/3] dhcp snooping trusted
Switch DHCP server
GE0/0/2
DHCP client 2
VLAN 2
Method 2: VLAN view
⚫ As shown in the figure, basic DHCP and VLAN
[Switch] dhcp snooping enable ipv4
configurations are complete, and DHCP snooping is [Switch] vlan 2
configured on the switch. [Switch-vlan2] dhcp snooping enable
[Switch] interface GigabitEthernet 0/0/3
[Switch-GigabitEthernet0/0/3] dhcp snooping trusted
71 Huawei Confidential
Verifying the Configuration
⚫ Run the display dhcp snooping interface command to check DHCP snooping information on an interface.
72 Huawei Confidential
Contents
▫ Port Security
▫ MACsec
▫ Traffic Control
▫ DHCP Snooping
◼ IP Source Guard
Requirement:
Authorized Only hosts at 10.1.1.1 and
host 1 10.1.1.2 are allowed to
Authorized hosts 1 and 2 can access IP: 10.1.1.1 access the Internet.
the Internet, but they are shut down.
Authorized
The IP address of the unauthorized host 2 Internet
host is 10.1.1.10, and the host cannot IP: 10.1.1.2
access the Internet. After the IP Switch Router
address is changed to 10.1.1.1, the
host can access the Internet. Unauthorized
host Configure IPSG on the user-side interface or
IP: 10.1.1.10
VLAN of the switch.
74 Huawei Confidential
75 Huawei Confidential
• After the binding table is generated, the IPSG-enabled device delivers ACL rules
to the specified interface or VLAN according to the binding table, and then
checks all IP packets against the ACL rules. The switch forwards the packets from
hosts only when the packets match binding entries, and discards the packets that
do not match binding entries. When the binding table is modified, the IPSG-
enabled device delivers the ACL rules again.
• By default, if IPSG is enabled in the scenario where no binding table is generated,
the switch rejects all IP packets except DHCP Request messages.
• A static binding entry contains the MAC address, IP address, VLAN ID, and
inbound interface. IPSG checks received packets against all options in a static
binding entry.
• A dynamic binding entry contains the MAC address, IP address, VLAN ID, and
inbound interface. You can specify the options to be checked, and IPSG filters the
packets received by interfaces according to the specified options. By default, the
IPSG-enabled device checks packets against all the four options.
▫ Common check items:
▪ Source IP address
▪ Source MAC address
▪ Source IP address + Source MAC address
▪ Source IP address + Source MAC address + Interface
▪ Source IP address + Source MAC address + Interface + VLAN
Application of IPSG
⚫ IPSG prevents PCs from changing their own IP
Internet
addresses.
PCs can only use the IP addresses allocated by the DHCP
server or static IP addresses configured by an administrator
to access the network. If a PC changes its IP address
without permission, the PC cannot access the network. This
prevents PCs from obtaining network rights without
IPSG-enabled interface
76 Huawei Confidential
IPSG Configuration Commands
1. Configure a static binding table.
[Huawei] user-bind static { { { ip-address | ipv6-address } { start-ip [ to end-ip ] } &<1-10> | ipv6-prefix
prefix/prefix-length } | mac-address mac-address } * [ interface interface-type interface-number ] [ vlan vlan-
id [ ce-vlan ce-vlan-id ] ]
The IPSG-enabled device matches packets against the static binding table.
2. Enable IPSG.
The configuration of IP packet check in the VLAN view is the same as that in the interface view.
3. Enable the alarm function of IP packet check.
[Huawei-GigabitEthernet0/0/1] ip source check user-bind alarm enable
77 Huawei Confidential
Example for Configuring IPSG
Switch1 configuration:
Internet
# Configure a static binding table on the access switch.
[Switch1] user-bind static ip-address 10.1.1.1 mac-address 5489-98C2-1486
[Switch1] user-bind static ip-address 10.1.1.10 mac-address 5489-98AB-22A7
Switch2
# Enable IPSG and configure the alarm function of IP packet check on
GE0/0/1.
GE0/0/3 [Switch1] interface GigabitEthernet 0/0/1
Switch1 [Switch1-GigabitEthernet0/0/1] ip source check user-bind enable
[Switch1-GigabitEthernet0/0/1] ip source check user-bind alarm enable
GE0/0/1 GE0/0/2 [Switch1-GigabitEthernet0/0/1] ip source check user-bind alarm threshold
100
# The configuration of GE0/0/2 is similar to that of GE0/0/1.
PC1 PC2
IP:10.1.1.1/24 IP:10.1.1.10/24
MAC:5489-98C2-1486 MAC:5489-98AB-22A7
⚫ As shown in the figure, PCs are configured with static IP addresses for unified management. IPSG is configured on
the access switch to prevent hosts from changing their own IP addresses to access the network.
Configure a static binding table.
Enable IPSG and configure the alarm function.
78 Huawei Confidential
Verifying the Configuration
⚫ Run the display dhcp static user-bind all command on the switch to check the static binding table.
⚫ PC1 and PC2 can access the Internet using statically configured IP addresses, and cannot access the Internet after
changing their IP addresses.
79 Huawei Confidential
Contents
80 Huawei Confidential
Problems Facing the Deployment of Firewalls in Hot
Standby Mode
External External
network network
81 Huawei Confidential
• With the rapid development of services such as mobile office, online shopping,
instant messaging, Internet finance, and Internet education, the network needs to
carry a growing number of services and the services carried are more and more
important. As such, uninterrupted transmission of service data urgently needs to
be fulfilled in the network development process.
• In this example, the firewall is deployed at the egress of the enterprise network,
and services between the intranet and external network are forwarded by the
firewall. Such services will be all interrupted if the firewall is faulty. Therefore, if
only one device is deployed in a key position of the network, the network may be
interrupted due to a single point of failure, regardless of the reliability of this
single device. Therefore, in network architecture design, a key position on the
network usually has two network devices planned for high availability.
• A firewall is a stateful inspection device. It inspects the first packet of a flow and
establishes a session to record packet status information (including the source IP
address, source port number, destination IP address, destination port number,
and protocol). Subsequent packets of the flow are then forwarded according to
the session entry. Only those matching this entry will be forwarded. Packets that
do not match this entry will be discarded by the firewall.
• If two independent firewalls are deployed at the network egress, the two
firewalls run independently and need to be configured and maintained
separately. Assuming that VRRP is deployed in the upstream and downstream
directions of the firewalls, the two VRRP groups are independent of each other,
which may lead to inconsistent master/backup status. In this case, the paths of
the incoming and outgoing traffic from the intranet to the external network are
inconsistent. When the return traffic reaches FW2, FW2 does not have matching
session entries and therefore discards the traffic. To avoid this problem, when
firewalls are deployed in hot standby mode, consider backup of status
information such as session entries on the two firewalls.
Hot Standby Overview
Heartbeat link
Service Deployment requirements
traffic
• Currently, hot standby can be implemented only between two devices.
• The active and standby devices must have the same product model and version.
• The active and standby devices must have the same numbers and types of cards
installed in the same arrangement. Otherwise, the information synchronized from
the active device does not match the physical configuration of the standby device.
Intranet As a result, faults occur after an active/standby switchover.
83 Huawei Confidential
Key Components of Firewall Hot Standby
84 Huawei Confidential
• Each firewall has a VGMP group. A VGMP group can be in any of the following
states:
▫ Initialize: indicates the temporary initial status of a VGMP group after hot
standby is enabled.
▫ Load Balance: When the priority of the local VGMP group is the same as
that of the peer VGMP group, the VGMP groups at both ends are in the
Load Balance state.
▫ Active: When the priority of the local VGMP group is higher than that of the
peer VGMP group, the local VGMP group is in Active state.
▫ Standby: When the priority of the local VGMP group is lower than that of
the peer VGMP group, the local VGMP group is in Standby state.
• After two firewalls are deployed in hot standby mode, the VGMP groups on them
have the same priority, and both are in Load Balance state. In this case, the two
firewalls are in load balancing state.
• You can configure VRRP or manually specify a standby device to enable the two
firewalls to work in active/standby mode. The VRRP configuration method applies
to networks where the firewalls connect to Layer 2 switches, and the method of
manually specifying a standby device applies to other hot standby networks.
• A firewall has an initial VGMP group priority. When an interface or a card on the
firewall becomes faulty, the initial VGMP group priority is decreased by a specific
value.
• This course uses USG6000 V500R001 as an example.
Key Components of Firewall Hot Standby: VRRP and VGMP
External External
• VGMP is used to • When the status
network network
manage VRRP of a VGMP
groups in a group changes,
unified manner. the status of all
• The status of the VRRP member
VGMP group interfaces in the
VRRP VRRP VRRP
Master Backup determines the Master VGMP group is
status of all VRRP forcibly
Active Standby Standby Active
member changed.
VRRP VRRP interfaces. VRRP VRRP • Consistent
Master Backup Backup Master
status ensures
that the
incoming and
outgoing service
traffic is
Intranet Intranet forwarded along
VGMP group
status the same path.
85 Huawei Confidential
Key Components of Firewall Hot Standby: HRP and
Heartbeat Link
External
network
• To ensure successful switchover, key configuration commands and status
information must be synchronized between the active and standby firewalls.
• Configurations that can be backed up are as follows:
Backs up configuration
Policies: security policy, NAT policy (including the NAT address pool), and
VRRP and status information. VRRP NAT Server
Master Backup
Objects: address, region, service, application, and user
Active Standby
Network: security zone, DNS, IPsec, and SSL VPN
VRRP VRRP
Master Backup
System: administrator, virtual system, and log configuration
• Status information that can be backed up is as follows:
Session table, server mapping table, blacklist/whitelist, port mapping table in
PAT mode, address mapping table in NO-PAT mode, Layer 2 forwarding
table (static MAC address backup), AAA user table (default user admin is
Intranet not backed up), online user monitoring table, PKI certificate, and IPsec
VGMP group
status
86 Huawei Confidential
• To achieve this, Huawei firewalls use HRP to back up dynamic status data and
key configuration commands between the active and standby firewalls.
• In load balancing mode, both firewalls are active. Therefore, if both firewalls
synchronize commands to each other, command overwrite or conflict problems
may occur. To centrally manage the configurations of the two firewalls, you need
to configure the designated active and standby devices.
Typical Networking Scenarios of Firewall Hot Standby
Hot standby is deployed in in-line mode and connects to Hot standby is deployed in in-line mode and connects to
Layer 2 devices. Layer 3 devices.
SW3 SW4 R3 R4
VRRP VRID100
OSPF
SW1 SW2 R1 R2
• The service interfaces of the firewalls work at Layer 3 and connect to • The service interfaces of the firewalls work at Layer 3 and connect to
switches in the upstream and downstream directions. routers in the upstream and downstream directions.
• The default gateway of the terminal can be set to the virtual IP • OSPF runs between firewalls and routers. When a service interface of
address of VRRP VRID1. When configuring the return route on FW1 is faulty, FW1 becomes the standby device, and FW2 becomes the
SW3/SW4, you can set the next hop to the virtual IP address of VRRP active device. The cost of the routes advertised by FW1 is automatically
VRID100. changed to 65500. After the routes are re-converged, traffic is
forwarded through FW2.
87 Huawei Confidential
Contents
88 Huawei Confidential
Application Scenarios of the Firewall Virtual System
Network isolation for large and medium-sized
Security gateway for cloud computing centers
enterprises
The virtual systems of the firewall isolate the R&D, finance, and With virtual system technology, you can deploy a firewall at the egress of
administrative departments. The departments can access each other a cloud computing center and create virtual systems for each customer to
based on the permissions assigned to them, and their administrators have isolate and protect the traffic of different tenants. Such a firewall
different permissions. functions as the security gateway.
Internet Internet
Physical Physical
firewall firewall
Virtual Virtual Virtual Virtual Virtual
system system system system system
(R&D) (Finance) (Administration) (A) (B)
Enterprise Cloud
intranet computing
center
R&D Finance Administrative Tenant A Tenant B
department department department
89 Huawei Confidential
Firewall Virtual System Overview
What is a virtual system Virtual system and firewall virtualization
Virtual system
Virtual system
Virtual system
Interface Interface Interface
N
A
B
Independent resources
Independent configuration
Public system Virtual Virtual
Independent security system B system N
functions
Independent routing table
The virtual systems of a firewall are classified into two types:
Virtual
• Public system (Public) system A
Interface Interface Interface
A special virtual system that exists by default. By default,
configuring a firewall is equivalent to configuring the public
system.
The public system manages other virtual systems and provides To ensure that services of each virtual system can be correctly forwarded,
communication services between them. independently managed, and isolated from each other, the firewall
implements virtualization in the following aspects: resource virtualization,
• Virtual system (vSYS)
configuration virtualization, security function virtualization, and route
An independent logical system created on a firewall. virtualization.
90 Huawei Confidential
▫ Configuration virtualization: Each virtual system has its own virtual system
administrator and configuration interface. Virtual system administrators can
only manage their own virtual systems.
Virtual-if1 Public system Virtual-if2 • A virtual interface can work properly only after it is
assigned an IP address and added to a security zone.
Virtual system Virtual system
A B • Virtual interfaces are named in the format of Virtual-if+
Interface number, with the virtual interface of the public
system numbered 0 (Virtual-if0). Other virtual interfaces
are automatically numbered from 1.
91 Huawei Confidential
• As shown in the figure, virtual interfaces of virtual systems and the public system
are connected to form virtual links. You can consider virtual systems and the
public system as independent devices, and virtual interfaces as communication
interfaces between them. Virtual systems can communicate with each other and
with the public system after their virtual interfaces are added to security zones
and routes and policies are configured for device communications.
Virtual System Communication with the Public System
⚫ Users on network segment 10.3.0.0/24 in virtual system A access the Internet server 3.3.3.3 through GE1/0/1 of the
public system.
Destination Outbound Next Destination Outbound Next
IP Address Interface Hop IP Address Interface Hop
0.0.0.0/0 Virtual-if0 0.0.0.0 0.0.0.0/0 GE1/0/1 1.1.1.254
10.3.0.0/24 GE1/0/2 10.1.1.2 ... ... ...
... ... ... ... ... ...
Source 2 3 Destination
10.3.0.0/24
Data 1 4
3.3.3.3/24
92 Huawei Confidential
• Communication between a virtual system and the public system involves two
scenarios: from a virtual system to the public system, and from the public system
to a virtual system. The packet forwarding processes in the two scenarios are
slightly different.
• This slide uses the access from a virtual system to the public system as an
example. Packets are processed in both the virtual system and public system
according to the firewall's packet forwarding process. As such, you must perform
key configurations such as security policies and routes in both the virtual system
and public system.
Direct Communication Between Two Virtual Systems
⚫ Users on network segment 10.3.0.0/24 in virtual system A access server 3.3.3.3 in virtual system B.
Source 2 3 Destination
10.3.0.0/24 Data 1 4 3.3.3.3/24
93 Huawei Confidential
⚫
As shown in the figure, users in vsysa need to access
the server in vsysb.
94 Huawei Confidential
95 Huawei Confidential
Example for Configuring Communication Between Virtual
Systems (3)
Set an IP address for vsysb's virtual interface Virtual-if2 and add the interface
to the Untrust zone. The IP address can be any value as long as it does not
conflict with the IP address on any other interface.
Trust Firewall Trust
GE1/0/3 [FW-vsysb] interface Virtual-if 2
10.3.0.1/24 GE1/0/4 [FW-vsysb-Virtual-if1] ip address 172.16.2.1 24
10.3.0.0/24 10.3.1.1/24 10.3.1.0/24 [FW-vsysb-Virtual-if1] quit
vsya vsyb [FW-vsysb] firewall zone untrust
10.3.0.3/24 10.3.1.3/24 [FW-vsysb-zone-untrust] add interface Virtual-if2
[FW-vsysb-zone-untrust] quit
Configure a policy for users in vsysa to access the server in vsysb.
⚫
As shown in the figure, users in vsysa need to access [FW-vsysb] security-policy
[FW-vsysb-policy-security] rule name vsysa_to_server
the server in vsysb. [FW-vsysb-policy-security-rule-vsysa_to_vsysb] source-zone untrust
[FW-vsysb-policy-security-rule-vsysa_to_vsysb] destination-zone trust
⚫ The configuration procedure is as follows: [FW-vsysb-policy-security-rule-vsysa_to_vsysb] source-address 10.3.0.0 24
[FW-vsysb-policy-security-rule-vsysa_to_vsysb] destination-address 10.3.1.3
Configure the route for communication between virtual 32
[FW-vsysb-policy-security-rule-vsysa_to_vsysb] action permit
systems vsysa and vsysb in the public system.
Verify the configuration.
Configure a security policy in vsysa.
PC>ping 10.3.1.3
Configure a security policy in vsysb. Ping 10.3.1.3: 32 data bytes, Press Ctrl_C to break
From 10.3.1.3: bytes=32 seq=1 ttl=127 time=79 ms
96 Huawei Confidential
Quiz
2. (True or false) On a firewall, virtual systems are isolated by default. Hosts in different
virtual systems cannot communicate with each other. ( )
A. True
B. False
97 Huawei Confidential
1. ABD
2. A
Summary
⚫ Port isolation can isolate interfaces in a VLAN. Two port isolation modes are available: Layer 2 isolation and Layer 3 interworking, and
Layer 2 and Layer 3 isolation.
⚫ MAC address entries of a switch are classified into static, blackhole, and dynamic MAC address entries.
⚫ Port security enables a switch to convert dynamic MAC addresses learned by an interface into secure MAC addresses. Secure MAC
addresses are usually used together with security protection actions.
⚫ Enabling MAC address flapping detection on a switch helps engineers quickly troubleshoot loops on the switch.
⚫ MACsec defines a method for secure data communication based on Ethernet and ensures data transmission security through hop-by-hop
data encryption between devices.
⚫ The difference between traffic suppression and storm control is that traffic suppression only limits the rate of various packets and discards
excess packets, whereas storm control takes different actions, such as shutting down an interface or blocking packets based on the packet
rate.
⚫ DHCP snooping plays an important role in preventing network attacks on terminals that automatically obtain IP addresses on the
Ethernet. You can configure the DHCP snooping trusted interface and DHCP snooping binding table to prevent DHCP-based network
attacks.
⚫ An IPSG-enabled switch checks packets against the binding table to prevent IP spoofing attacks.
⚫ Deploying firewalls in hot standby mode can improve network reliability, and deploying firewall virtual systems can logically divide
physical devices to improve resource utilization.
98 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
• In MPLS, the most common example of FEC is: Packets whose destination IP
addresses match the same IP route are considered to belong to the same FEC.
• An LSP is composed of an ingress LSR, an egress LSR, and a variable number of
transit LSRs. Therefore, an LSP can be considered as an ordered set of these LSRs.
• An LSP is a unidirectional path from the start point to the end point. If
bidirectional data communication is required, an LSP for return traffic needs to
be established between the two ends.
• The EXP field is defined in early MPLS standards and is an experimental field.
Actually, this field is mainly used for CoS. To avoid ambiguity, this field is
renamed Traffic Class in RFC 5462.
• When the upper layer is the MPLS label stack, the Type field in the Ethernet
header is 0x8847, and the Protocol field in the PPP header is 0x8281.
• The label spaces of different LSRs are independent of each other, indicating that
each router can use the entire label space.
• If the ingress LSRs of packets belonging to the same FEC are different, the LSPs
for forwarding the packets are different.
• An LSR uses the same way to process packets in the same FEC, regardless of
where the packets' inbound interfaces are the same.
• An LSP is composed of the forwarding actions of LSRs, and the label forwarding
table determines the forwarding action. Therefore, establishing a label
forwarding table can also be considered as establishing an LSP.
• As shown in the figure, the three packets belong to the same FEC, FEC1, because
they have the same destination. However, as their ingress LSRs are different, the
packets are forwarded along different LSPs (LSP1, LSP2, and LSP3, respectively).
The labels assigned by different LSRs to the same FEC can be the same or
different, because labels are valid only on their local LSRs.
• Control plane:
▪ Routing information base (RIB): stores static routes, direct routes, and
routes generated by IP routing protocols. Routes can be selected from
the RIB to guide packet forwarding.
• Forwarding plane
▫ A static LSP is meaningful only to the local node, and the local node cannot
be aware of the entire LSP.
• Dynamic LSP:
• When an IP packet enters an MPLS domain, the ingress searches the FIB to check
whether the tunnel ID corresponding to the destination IP address is 0x0.
▫ If the tunnel ID is 0x0, the ingress LSR performs IP forwarding for the
packet.
▫ If the tunnel ID is not 0x0, the ingress LSR performs MPLS forwarding for
the packet.
• A transit LSR searches for ILMs and NHLFEs to guide MPLS packet forwarding.
• The egress LSR searches the ILM table to guide MPLS packet forwarding.
• An outgoing label occupies the label space of the downstream LSR, but the label
distribution mode used by the downstream space is uncertain. As such, the value
of an outgoing label ranges from 16 to 1048575.
• An incoming label occupies the label space of the current LSR. When a static LSP
is used, the value of an incoming label ranges from 16 to 1023.
1. AC
2. B
MPLS LDP Fundamentals and Configuration
Foreword
⚫ Multiprotocol Label Switching (MPLS) implements data forwarding based on short and
fixed-length labels carried in packets.
⚫ A fundamental concept in MPLS is that two LSRs must agree on the meaning of the labels
used to forward traffic between them. The Label Distribution Protocol (LDP) can be used by
an LSR to send its label binding information to other LDP-capable LSRs, helping implement
correct forwarding of labeled packets.
⚫ This course describes the principles, features, and basic configurations of LDP.
1 Huawei Confidential
• LDP mentioned in this course refers to that defined in RFC 3036 for the first time.
This protocol has been replaced by RFC 5036.
• Other label distribution protocols include MP-BGP and RSVP.
Objectives
2 Huawei Confidential
Contents
2. LDP Principles
3 Huawei Confidential
LDP Overview
⚫ LDP is an MPLS control protocol, which is similar to a signaling protocol on a traditional network. LDP is responsible
for FEC classification, label distribution, and LSP establishment and maintenance. LDP defines the messages used in
label distribution as well as the message processing procedures.
⚫ The working process of LDP involves:
LDP session establishment between LSRs
Dynamic exchange of FEC-label mapping information between LSRs over LDP sessions, as well as LSP establishment based on
label information FEC: FEC:
192.168.3.0/24 192.168.3.0/24
Incoming label: Incoming label:
1024 1025
FEC: FEC:
R1 R2 R3
192.168.1.0/24 192.168.1.0/24
Incoming label: Incoming label:
1024 1026
4 Huawei Confidential
LDP Session, Adjacency, and Peer
⚫ An LDP session must be established before LSRs can exchange label binding information. LDP sessions are classified
into the following types:
Local LDP session: can be established between two LSRs that are directly connected.
Remote LDP session: can be established between two LSRs that are directly or indirectly connected.
⚫ An adjacency is established between two LSRs after they exchange Hello messages.
⚫ After an adjacency is established between two LSRs, they exchange LDP session messages to establish an LDP
session. An LDP peer relationship is then established between them.
Label distribution
R1 R2 R3
5 Huawei Confidential
LSR ID and LDP ID
⚫ Each LDP-capable LSR must have an LDP ID, in addition to an LSR ID.
An LDP ID is 48 bits long and consists of a 32-bit LSR ID and a 16-bit label space ID.
An LDP ID is presented in the format of "LSR ID:Label space ID", for example, 2.2.2.2:0.
GE0/0/0 GE0/0/0
R1 10.0.12.1/24 10.0.12.2/24 R2
6 Huawei Confidential
Transport Layer
Message Type Message Name Function
Protocol
Discovery message Hello UDP Advertises local LSRs and discovers peers in the LDP discovery process.
7 Huawei Confidential
• LDP messages are classified into four types by function: discovery, session,
advertisement, and notification.
▫ Discovery messages: announce and maintain the presence of LSRs on a
network. Hello messages belong to this category.
▫ Session messages: establish, maintain, and terminate sessions between LDP
peers. Initialization and KeepAlive messages belong to this category.
▫ Advertisement messages: generate, change, and delete label mappings for
FECs.
• LDP messages are carried over UDP or TCP, with the port number being 646.
Discovery messages, which are used to discover peers, are carried over UDP.
Other LDP messages must be transmitted in a reliable and ordered manner.
Therefore, LDP uses TCP to establish sessions. Session, advertisement, and
notification messages are transmitted over TCP.
LDP Packet Encapsulation
⚫ An LDP packet consists of an LDP header and an LDP message.
An LDP header carries information such as the LDP version and packet length.
An LDP message carries information such as the message type and message length.
Message
U Type Message ID Mandatory Parameters Optional Parameters
Length
8 Huawei Confidential
• An LDP header is 10 bytes long. It consists of three parts: Version, PDU Length,
and LDP Identifier.
▫ The Version field occupies 2 bytes. It indicates the LDP version number. The
current version number is 1.
▫ The PDU Length field occupies 2 bytes. It indicates the packet length in
bytes, excluding the Version and PDU Length fields.
▫ The LDP Identifier field (that is, LDP ID) occupies 6 bytes. The first 4 bytes
uniquely identify an LSR, and the last 2 bytes identify the label space of the
LSR.
• An LDP message consists of five parts.
▫ The U field occupies 1 bit, which is an unknown message. When an LSR
receives an unknown message, the LSR returns a notification message to
the message originator if the U field is 0, but ignores the message and does
not respond with a notification message if the U field is 1.
▫ Message Length occupies 2 bytes. It indicates the total length of Message
ID, Mandatory Parameters, and Optional Parameters, in bytes.
▫ Message ID occupies 32 bits. It identifies a message.
▫ Each of the Mandatory Parameters and Optional Parameters fields has a
variable length.
▫ Message Type indicates a specific message type. Currently, common
messages defined by LDP include Notification, Hello, Initialization,
KeepAlive, Address, Address Withdraw, Label Mapping, Label Request, Label
Abort Request, Label Withdraw, and Label Release.
Contents
2. LDP Principles
◼ LDP Session Establishment
▫ LDP-based Label Distribution
▫ LDP Working Process
9 Huawei Confidential
LDP Session State Machine
⚫ LDP uses five states to describe the LDP session state machine.
1
A received message is not a Non-Existent
KeepAlive message, or no
A received message is not an Initialization
message is received. TCP connection message, or no message is received.
Action: Sends an NAK setup
message.
2 Active LSR
The passive LSR receives an acceptable Action: Sends an Initialization
Initialization message.
Initialized
message. A received message is not an
Action: Sends Initialization and Initialization message, or no
KeepAlive messages. message is received.
Action: Sends an NAK message.
3 3
OpenRec OpenSent
10 Huawei Confidential
• The LDP session negotiation process can be described through the state machine.
As shown in the figure, there are five states. They are Non-Existent, Initialized,
OpenRec, OpenSent, and Operational.
▫ Non-Existent: It is the initial state of an LDP session. In this state, both LSRs
send Hello messages to elect the active LSR. After a TCP connection
establishment success event is received, the state changes to Initialized.
▫ Initialized: In this state, the active LSR sends an Initialization message to the
passive LSR, sets the session state to OpenSent, and waits for an
Initialization message. The passive LSR waits for the Initialization message
sent by the active LSR. If the parameters in the received Initialization
message are accepted, the passive LSR sends Initialization and KeepAlive
messages, and sets the session state to OpenRec. When the active and
passive LSRs receive any non-initialization message or the waiting period
times out, both of them set the session state to Non-Existent.
• The LDP state change information can be viewed using the debug mpls ldp
session command.
LDP Session Establishment: Peer Discovery and TCP Session
Establishment
R1 GE0/0/0 GE0/0/0 R2 Discovery phase
10.0.12.1 10.0.12.2
• An LSR periodically sends LDP Link Hello messages
Transport address: Transport address: to implement the basic LDP discovery mechanism.
1.1.1.1 2.2.2.2 • LDP Link Hello messages are encapsulated in UDP
packets, with the destination address being a
Hello (UDP) multicast address 224.0.0.2. If an LSR receives LDP
10.0.12.1:646 -> 224.0.0.2:646 Link Hello messages on an interface, it indicates
Discovery
that this interface has established LDP peer
Phase Hello (UDP) relationships.
224.0.0.2:646 <-10.0.12.2 :646
Non-Existent
TCP SYN
1.1.1.1:646 <- 2.2.2.2:22139 TCP Connection Establishment Phase
TCP • A Hello message carries a transport address, which
connection TCP SYN ACK The LSR with a larger
will be used to establish an LDP session.
establishm 1.1.1.1:646 -> 2.2.2.2:22139 transport address initiates a
TCP connection request. • The LSR with a larger transport address is the
ent phase
active LSR and initiates a TCP connection request.
TCP ACK • After the TCP three-way handshake, a TCP
2.2.2.2:22139 -> 1.1.1.1:646 connection will be established.
Initialized
12 Huawei Confidential
• LDP transport addresses are used to establish TCP connections with peers.
▫ Before establishing an LDP session, two LSRs need to establish a TCP
connection to exchange LDP packets.
▫ A transport address of an LSR is contained in LDP Hello messages, through
which an LSR can learn the transport addresses of its peers.
▫ After two LSRs discover each other and learn each other's transport address
through Hello messages, the LSRs attempt to perform the TCP three-way
handshake (based on the transport addresses), and exchange LDP
Initialization messages, Label Mapping messages, and so on. All these
messages use the transport addresses of the two ends as source and
destination IP addresses.
▫ An LSR must have a route to the transport address of its peer.
▫ By default, the transport address for a device on a public network is the LSR
ID of the device, and the transport address for a device on a private
network is the primary IP address of an interface on the device.
▫ The mpls ldp transport-address command can be run in the interface view
to change a transport address.
LDP Session Establishment - Session Establishment and
Maintenance
R1 GE0/0/0 GE0/0/0 R2 • After a TCP connection is established, R2
10.0.12.1 10.0.12.2 (active LSR with a larger transport address)
sends an LDP Initialization message to
Transport address: Transport address: negotiate parameters related to LDP session
1.1.1.1 Completion of peer discovery 2.2.2.2 establishment.
and TCP three-way handshake • These parameters include the LDP version,
label distribution mode, KeepAlive timer value,
Initialization maximum PDU length, and label space.
Sends an Initialization message to
• After R1 receives the Initialization message, it
negotiate related parameters.
OpenSent replies with a KeepAlive message if it accepts
R2's parameters. To improve transmission
Initialization + KeepAlive
efficiency, R1 also sends an Initialization
LDP session Replies with a KeepAlive message if the peer's
message.
establishme parameters are accepted,
nt phase and initiates an Initialization message. • After R2 receives the Initialization message, it
KeepAlive replies with a KeepAlive message if it accepts
Sends a KeepAlive message if these R1's parameters.
parameters are accepted. • After both ends receive each other's KeepAlive
OpenRec
message, the session is established
successfully. They periodically send KeepAlive
The LDP session enters the Operational state. messages to maintain the session.
13 Huawei Confidential
LDP Peer State
GE0/0/0 GE0/0/0
R1 10.0.12.1/24 10.0.12.2/24 R2
14 Huawei Confidential
LDP Session States
GE0/0/0 GE0/0/0
R1 10.0.12.1/24 10.0.12.2/24 R2
⚫ Status: state of the LDP session
<R1>display mpls ldp session
Operational: The LDP session is established successfully.
LDP Session(s) in Public Network
Codes: LAM(Label Advertisement Mode), SsnAge
⚫ LAM: label advertisement mode:
Unit(DDDD:HH:MM)
There are two label advertisement modes: DU and DoD
A '*' before a session means the session is being deleted.
---------------------------------------------------------------------------- (described later).
PeerID Status LAM SsnRole SsnAge KASent/Rcv
----------------------------------------------------------------------------
This example uses the DU mode.
2.2.2.2:0 Operational DU Passive 0000:00:33 133/133
SsnRole: role that an LSR plays in an LDP session:
----------------------------------------------------------------------------
TOTAL: 1 session(s) Found.
Active and Passive indicate the active role and passive
role in LDP session establishment, respectively.
15 Huawei Confidential
▫ OpenSent: The active LSR sends an Initialization message to the passive LSR
and waits for a reply.
▫ Open Recv: LDP peers at both ends of the LDP session wait for a KeepAlive
message from each other after the session enters the initialization state. If
they receive each other's KeepAlive message, the LDP session enters the
Operational state.
2. LDP Principles
▫ LDP Session Establishment
◼ LDP-based Label Distribution
▫ LDP Working Process
16 Huawei Confidential
Label Advertisement and Management
⚫ On an MPLS network, a downstream LSR determines the bindings between labels and FECs and advertises the bindings to its
upstream LSR.
⚫
To establish LSPs, LDP sends Label Request and Label Mapping messages to advertise the bindings between labels and FECs.
⚫ Label advertisement and management are determined by the label advertisement mode, label distribution control mode, and label
retention mode.
Default
Item Mode Description
Mode
Downstream unsolicited An LSR assigns and distributes labels to a FEC without receiving Label Request messages
Label Yes
(DU) from its upstream LSR.
advertisement
mode Downstream on demand An LSR assigns and distributes labels to a FEC only after receiving Label Request
No
(DoD) messages from its upstream LSR.
A local LSR assigns and binds a label to a FEC and then advertises the binding to the
Independent No
upstream LSR, without waiting for the label distributed by the downstream LSR.
Label distribution
control mode An LSR sends the label mapping of a FEC to its upstream device only if the LSR has
Ordered Yes received Label Mapping messages from the next hop of the FEC or if the LSR is the
egress of the FEC.
An LSR retains all label mappings received from a peer, regardless of whether the peer is
Label retention Liberal Yes
its next hop.
mode
Conservative No An LSR retains the label mappings received from a peer only if the peer is its next hop.
17 Huawei Confidential
Upstream and Downstream
⚫ MPLS determines the upstream and downstream relationships based on the data forwarding direction. Labeled
packets are sent from an upstream LSR, and received and processed by a downstream LSR.
⚫ As shown in the figure, for the LSP to 192.168.3.0/24, R3 is the downstream LSR of R2, and R1 is the upstream LSR
of R2.
MPLS Domain
192.168.3.0/24
R1 R2 R3
18 Huawei Confidential
Label Advertisement Mode - DU
⚫ DU mode
An LSR assigns and distributes labels to a FEC without having to receive Label Request messages from its
upstream LSR.
An LSR actively advertises the labels of a FEC to its upstream peer without having to receive Label Request
messages from the peer.
192.168.3.0/24
R1 R2 R3
19 Huawei Confidential
• Label assignment: An LSR assigns a label from the local label space and binds it
with a FEC.
• Label distribution: An LSR notifies the upstream LSR of the binding between
labels and FECs.
• When the DU label advertisement mode is used, an LSR can assign labels to all
its peers by default. Specifically, each LSR can distribute label mappings to all its
peers, regardless of whether the LSR is an upstream or a downstream one. If an
LSR distributes labels only to upstream peers, it must identify its upstream and
downstream nodes based on routing information before sending Label Mapping
messages. An upstream node cannot send Label Mapping messages to its
downstream node.
Label Advertisement Mode - DoD
⚫ DoD mode
An LSR assigns and distributes labels to a FEC only after receiving Label Request messages from its upstream
LSR.
Generally, a Label Request message is triggered when an access request to a particular FEC arises.
192.168.3.0/24
R1 Requests R2 Requests R3
labels. labels.
R1 requires to access the
192.168.3.0/24 network segment.
20 Huawei Confidential
• An LSR advertises label mappings to an upstream peer only after receiving Label
Request messages from the upstream peer.
Label Distribution Control Mode - Independent
⚫ Independent mode
A local LSR assigns and binds a label to a FEC and then advertises the binding to the upstream LSR, without
waiting for the label distributed by the downstream LSR.
Unordered
DU Advertises label mappings Advertises label mappings
to the upstream node. to the upstream node.
+
192.168.4.0/24
Independent
R1 R2 R3 R4
Unordered
Advertises label mappings Advertises label mappings
DoD to the upstream node. to the upstream node.
+
192.168.4.0/24
Independent
R1 Requests R2 Requests R3 R4
labels. labels.
21 Huawei Confidential
• The label distribution control mode works with the label advertisement mode:
▫ If the network shown in the figure uses the DU label advertisement mode,
R2 and R3 can actively notify the upstream LSR of the label binding for the
FEC 192.168.4.0/24 even if the upstream LSR does not send Label Request
messages and R2 and R3 do not receive label binding information from the
downstream LSR.
▫ If the network uses the DoD label advertisement mode, R2 and R3 can
notify the upstream LSR of the label binding for the FEC 192.168.4.0/24
given that R2 and R3 have received Label Request messages from the
upstream LSR, regardless of whether R2 and R3 have received label binding
information from the downstream LSR.
Label Distribution Control Mode - Ordered
⚫ Ordered mode
An LSR sends the label mapping of a FEC to its upstream device only if the LSR has received Label Mapping
messages from the downstream of the FEC or if the LSR is the egress of the FEC.
3 2 1
Advertises label mappings Advertises label mappings Advertises label mappings
DU to the upstream node. to the upstream node. to the upstream node.
+
192.168.4.0/24
Ordered
R1 R2 R3 R4
Egress LSR
6 5 4
Advertises label mappings Advertises label mappings Advertises label mappings
DoD to the upstream node. to the upstream node. to the upstream node.
+
192.168.4.0/24
Ordered
R1 Requests R2 Requests R3 Requests R4
labels. labels. labels. Egress LSR
1 2 3
22 Huawei Confidential
• In ordered label distribution control mode, an LSR can send a Label Mapping
message to its upstream node only when the LSR receives Label Mapping
messages of a FEC from the downstream of the FEC or when the LSR is the
egress of an LSP.
▫ If the network shown in the figure uses the DU label advertisement mode,
an LSR sends the label binding information of the FEC 192.168.4.0/24 to its
upstream node only after the LSR receives the label binding information of
the FEC from its downstream node, even if the upstream node has sent
Label Request messages. Therefore, the initiator for LSP establishment must
be an egress LSR (R4 in this example).
▫ If the network uses the DoD label advertisement mode, an LSR advertises
the label binding information of the FEC 192.168.4.0/24 to the upstream
node only after the LSR receives Label Request messages from the
upstream node as well as the label binding information of the FEC from the
downstream node. Therefore, a Label Request message can be initiated by
the ingress LSR (R1) only. After a Label Request is sent hop by hop to the
egress LSR (R4), R4 advertises a Label Mapping message to the upstream
LSR to establish an LSP.
Label Retention Mode - Liberal
⚫ Liberal mode
An LSR can receive label mappings from its next hop or non-next hop nodes.
An LSR retains all label mappings received from a peer, regardless of whether the peer is its next hop.
23 Huawei Confidential
Not retained
R5
24 Huawei Confidential
• The advantage of the conservative mode is that only the labels that will be used
to forward data are retained and maintained, thereby saving the label space.
▫ In DU label advertisement mode, an LSR may receive Label Mapping
messages for the same network segment (FEC) from multiple LDP peers. As
shown in the figure, R3 receives Label Mapping messages for the network
segment 192.168.1.0/24 from both R2 and R5. If the conservative label
retention mode is used, R3 retains only the label sent by the next hop R2
and discards the label sent by the non-next hop R5.
▫ In DoD label advertisement mode, an LSR uses routing information to
determine its next hop and requests labels only from the next hop.
• If the next hop of a FEC changes, either of the following situations occurs:
▫ In liberal label retention mode, the LSR can use an existing label advertised
by a non-next hop LSR to quickly establish an LSP. The liberal mode
requires more memory and label space.
▫ In conservative label retention mode, the LSR retains the labels advertised
by the next hop only. This mode saves memory and label space but
consumes more time to reestablish the LSP.
▫ An LSR that has a limited label space usually uses the conservative mode
and DoD mode.
PHP
Label IP Packet
To To To To
1033
192.168.3.3 192.168.3.3 192.168.3.3 192.168.3.3
192.168.3.0/24
192.168.3.0/24 192.168.3.0/24
R1 Label=1033 R2 Label=3 R3
MPLS Domain
⚫ Penultimate hop popping (PHP): If PHP is enabled, an egress assigns a special label (3), to a local
route. This label is called an implicit null label. When an LSR forwards a labeled packet and finds that
the outgoing label value is 3, the LSR removes the top label from the packet and forwards the inner
data to the downstream LSR.
25 Huawei Confidential
• During data forwarding, R2, as the penultimate hop to 192.168.3.0, finds that the
outgoing label value is 3. Then, R2 removes the label header and forwards the IP
packet to R3. R3 only needs to query the FIB once to obtain the corresponding
forwarding information, improving the forwarding efficiency.
Implicit Null Label and Explicit Null Label (1)
⚫ By default, an egress assigns implicit null labels, that is, label 3, to the penultimate hop.
⚫ However, if QoS is deployed, after the label is popped out, the priority in the label is lost.
R1 R2 R3 R4
10.0.12.2/24 10.0.23.3/24 10.0.34.4/24
192.168.1.0/24 192.168.4.0/24
10.0.12.1/24 10.0.23.2/24 10.0.34.3/24
200 To 300 To To
EXP 192.168.4.4 EXP 192.168.4.4 192.168.4.4
26 Huawei Confidential
Implicit Null Label and Explicit Null Label (2)
⚫ In the explicit null label mechanism, an egress assigns label 0 to the penultimate hop.
⚫ When R3 forwards a labeled packet of which the outgoing label is 0, R3 does not pop out the label header, and
therefore QoS information is retained. When R4 receives a packet with label 0, it directly pops out the label without
searching for an ILM entry.
⚫ By default, an egress assigns implicit null labels. You can run the label advertise explicit-null command to enable
the egress to assign explicit null labels to the penultimate hop.
QoS information
is retained.
R1 R2 R3 R4
10.0.12.2/24 10.0.23.3/24 10.0.34.4/24
192.168.1.0/24 192.168.4.0/24
10.0.12.1/24 10.0.23.2/24 10.0.34.3/24
200 To 300 To 0 To
EXP 192.168.4.4 EXP 192.168.4.4 EXP 192.168.4.4
27 Huawei Confidential
2. LDP Principles
▫ LDP Session Establishment
▫ LDP-based Label Distribution
◼ LDP Working Process
28 Huawei Confidential
Networking Overview
⚫ OSPF has been deployed on the network, and devices can learn routes from each other.
⚫ MPLS and LDP have been enabled on devices and interfaces, and local LDP sessions have been established between
neighboring devices.
192.168.4.0/24 OSPF 2 R2
R1 R4
OSPF
LDP 192.168.4.0/24
29 Huawei Confidential
192.168.4.0/24 OSPF 1 R4
R2
R1 R4
OSPF
LDP 192.168.4.0/24/24
30 Huawei Confidential
• Note: By default, 32-bit host IP routes are used to trigger LSP establishment. You
can manually trigger the establishment of an LSP with non-32-bit host IP routes.
Label Distribution - Transit LSR
⚫ Take R2 as an example. In its routing table, the next hop of the route 192.168.4.0/24 is R4. When R2 receives a
Label Mapping message for the route 192.168.4.0/24 from R4, R2 assigns label 1021 to the route because the
message is sent by a downstream LDP peer, and advertises the label mapping to the LDP peer, for example, R1. This
process also applies to R3.
Destination/Mask Proto Cost NH
192.168.4.0/24 OSPF 1 R4
R2
R1 R4
OSPF
LDP 192.168.4.0/24
31 Huawei Confidential
Label Distribution - Ingress LSR
⚫ After R1 receives the label mappings for the route 192.168.4.0/24 advertised by R2 and R3, R1 stores both of the
label mappings. However, R1 only uses label 1021 advertised by R2, because the next hop of the route to
192.168.4.0/24 is R2, as shown in R1's routing table.
R2
Destination/Mask Proto Cost NH
192.168.4.0/24 OSPF 2 R2
R1 R4
OSPF
LDP 192.168.4.0/24
32 Huawei Confidential
• Note: If R2 fails, OSPF routes re-converge. The next hop of the route
192.168.4.0/24 in the routing table of R1 is switched to R3. In this case, R1 uses
the label advertised by R3 for 192.168.4.0/24.
Label-based Forwarding - Ingress LSR
⚫ As an ingress LSR, R1 pushes a label into each received IP packet, and forwards packets based on
labels.
Routing table of R1
NHLFE 3 1
table of R1
To 192.168.4.1
Tunnel ID Out intf OPER NH Out Label
R3
0x12 GE0/0/0 push R2 1021 LSP
33 Huawei Confidential
• When R1 receives an IP packet destined for 192.168.4.1, it searches the FIB for a
forwarding entry matching the destination IP address of the packet, and finds
that the tunnel ID in the matching entry is not 0. As such, R1 continues to search
for an NHLFE matching the tunnel ID, pushes a label to the IP packet, and
forwards the packet. The outbound interface is GE 0/0/0, the next hop is R2, and
the outgoing label is 1021. Therefore, R1 adds a label header to the packet and
forwards the packet.
Label-based Forwarding - Transit LSR
⚫ As a transit LSR, R2 needs to swap labels in received IP packets and forward the packets.
1 4
ILM table of R2 2 R2
In Label Tunnel ID
1021 0x12
R1 R4
NHLFE table 3 OSPF
192.168.4.0/24
of R2 LDP
R3
LSP
34 Huawei Confidential
• When R2 receives a packet with label 1021, it searches for a matching ILM entry
and an NHLFE matching the ILM entry. Then, R2 changes the label of the packet
to 1041 and forwards the packet through the matching outbound interface.
Label-based Forwarding - Egress LSR
⚫ As an egress LSR, R4 needs to perform the pop operation on received IP packets to remove labels and
forward the packets through IP.
ILM table of R4 2
1
R1 R4
OSPF
192.168.4.0/24
LDP
GE0/0/0
3 To 192.168.4.1
R3
LSP
35 Huawei Confidential
• When R4 receives a packet with label 1041, it searches for a matching ILM entry
and finds that the operation type is pop. R4 then performs a pop operation to
remove the outer label from the packet. The packet then becomes a standard IP
packet, and therefore R4 performs the standard IP forwarding on the packet.
• When R4 forwards the packet, it searches the LFIB and FIB. How can the
forwarding efficiency be improved on the egress LSR (R4)?
Summary of an LDP-Capable LSR's Operations on an MPLS
Network
⚫ An LSR runs an IGP (such as OSPF or IS-IS) to construct a routing table and FIB.
⚫ LDP assigns labels to route prefixes (FECs) in the routing table based on the label assignment mode it uses.
⚫ LDP advertises the labels assigned to the route prefixes to LDP peers through LDP Label Mapping messages based
on the label advertisement mode it uses.
⚫ An LSR stores the labels that it assigns to route prefixes and the labels that LDP peers advertise to the route
prefixes, and associates the labels with information such as outbound interfaces and next-hop addresses (label
forwarding entries).
⚫ When an LSR forwards a labeled packet destined, the LSR always uses the outgoing label advertised by the
downstream LDP peer. The downstream peer is the next-hop device to the destination network in the routing table.
36 Huawei Confidential
Contents
2. LDP Principles
37 Huawei Confidential
Basic LDP Configuration Commands (1)
1. Enable LDP.
The mpls ldp command enables LDP and displays the LDP view.
[Huawei-GigabitEthernet0/0/0] mpls ldp
Enable LDP on an interface. Before running this command, enable LDP globally.
The mpls ldp remote-peer command creates a remote peer and displays the remote peer view.
[Huawei-mpls-ldp-remote-PeerName] remote-ip ip-address
Set the remote-ip ip-address parameter to the IP address of a remote LDP peer.
38 Huawei Confidential
Basic LDP Configuration Commands (2)
3. Configure a policy for triggering LSP establishment.
The lsp-trigger command configures the routes (static and IGP routes) that are used to trigger LSP establishment, which are
IP routes with a 32-bit mask by default.
• all: All static and IGP routes are used to trigger LSP establishment. If this parameter is set, a significant of LSPs will be
established, consuming label resources excessively and slowing down network-wide LSP convergence. Therefore, setting this
parameter is not recommended.
• host: IP routes with a 32-bit mask are used to trigger LSP establishment.
• ip-prefix ip-prefix-name: Routes matching a specified IP prefix list are used to trigger LSP establishment.
• none: LSP establishment cannot be triggered.
4. Configure a label advertisement mode.
[Huawei-GigabitEthernet0/0/0] mpls ldp advertisement { dod | du }
The default label advertisement mode is downstream unsolicited (DU).
• If the label advertisement mode is DU, the label retention mode is liberal.
• If the label advertisement mode is DoD, the label retention mode is conservative.
39 Huawei Confidential
• BGP routes can also be used to trigger LDP LSP establishment. This trigger policy
is not covered in this course.
Basic LDP Configuration Commands (3)
5. Configure an LDP label distribution control mode.
6. Configure PHP.
[Huawei-mpls] label advertise { explicit-null | implicit-null | non-null }
By default, an egress distributes implicit null labels to a penultimate hop.
• explicit-null: An egress assigns explicit null label to the penultimate hop.
• implicit-null: An egress assigns implicit null labels to the penultimate hop.
• non-null: An egress assigns common labels to the penultimate hop.
40 Huawei Confidential
Configuration Examples
R1 GE0/0/0 R2 GE0/0/1 R3 GE0/0/1 R4
10.0.12.1/24 10.0.23.2/24 10.0.34.3/24
GE0/0/0 GE0/0/0 GE0/0/0
10.0.12.2/24 10.0.23.3/24 10.0.34.4/24
41 Huawei Confidential
Configuration Procedure (1)
R1 GE0/0/0 R2 GE0/0/1 R3 GE0/0/1 R4
10.0.12.1/24 10.0.23.2/24 10.0.34.3/24
GE0/0/0 GE0/0/0 GE0/0/0
10.0.12.2/24 10.0.23.3/24 10.0.34.4/24
42 Huawei Confidential
Configuration Procedure (2)
R1 GE0/0/0 R2 GE0/0/1 R3 GE0/0/1 R4
10.0.12.1/24 10.0.23.2/24 10.0.34.3/24
GE0/0/0 GE0/0/0 GE0/0/0
10.0.12.2/24 10.0.23.3/24 10.0.34.4/24
43 Huawei Confidential
Checking the Configuration - Checking LSP Information
44 Huawei Confidential
Quiz
1. (Single-answer question) Which of the following commands can be used to display a label distributed for a specific
FEC? ( )
A. display mpls ldp
2. (Single-answer question) What is the default combination of label advertisement mode, label distribution control
mode, and label retention mode on Huawei devices? ( )
A. DU + Independent + Conservative
B. DU + Ordered+ Liberal
45 Huawei Confidential
1. C
2. B
Summary
⚫ MPLS supports multiple label distribution protocols, among which LDP is widely used.
⚫ LDP is a process in which LSRs negotiate the meaning of labels. LDP uses discovery, session,
advertisement, and notification packets to establish sessions and distribute labels.
⚫ LDP determines label advertisement and management based on the label advertisement mode, label
distribution control mode, and label retention mode. By default, Huawei datacom devices use the DU
label advertisement mode + ordered label distribution control mode + liberal label retention mode.
⚫ LDP can directly map network-layer routing information to label information in order to establish LSPs.
LSRs are connected according to the incoming label, next hop, and outgoing label corresponding to a
specified FEC in the local forwarding table. In this manner, the LSP crossing the entire MPLS domain
can be formed.
46 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
▫ They share a same site, but devices at the site do not communicate with
devices using overlapping address spaces at the other sites of the VPNs.
• For details about VRFs, see the related HCIP-Datacom-Core course.
• When configuring an RD, you need to specify only the Administrator and
Assigned Number subfields in the RD.
• Four types of RD configuration formats are available. The following two types are
commonly used:
• When configuring a VPN target, you need to specify only the Administrator and
Assigned Number subfields in the VPN target. VPN targets have the same
configuration formats as RDs.
• A PE device distributes MPLS labels in either of the following ways:
▫ One label per route: Each route in a VRF is assigned one label. When many
routes exist on the network, the Incoming Label Map (ILM) maintains these
entries, requiring high router capacity.
▫ One label per instance: Each VPN instance is assigned one label. All the
routes of a VPN instance share the same label, reducing the number of
labels required.
• VPN route leaking: a process of matching VPNv4 routes against the VPN targets
of local VPN instances. After a PE receives a VPNv4 route, the PE directly matches
the route against the VPN targets of local VPN instances, without selecting the
optimal route or checking whether a desired tunnel exists.
• Tunnel recursion: A public network tunnel is required to transmit VPN traffic from
one PE to the other PE over the public network. After VPN route leaking, the
route must be successfully recursed to an LSP based on the destination IPv4
prefix before the route is added to the routing table of the corresponding VPN
instance. This means that the next hop of the IPv4 route must match an LSP.
• By default, only the peer relationships in the BGP IPv4 unicast address family
view are automatically enabled. In other words, after the peer as-number
command is run in the BGP view, the system automatically configures the peer
enable command. In other address family views, however, peering must be
enabled manually.
1. A
2. ABCD
MPLS VPN Deployment and Application
Foreword
1 Huawei Confidential
2 Huawei Confidential
Contents
3 Huawei Confidential
Basic MPLS VPN Networking: Intranet
⚫ When the intranet networking solution is used, all users in a VPN are in a user group isolated from the
users of other VPNs and can forward traffic to each other. Users in a VPN cannot communicate with
users outside the VPN. The sites of a VPN usually belong to the same organization.
VPN1 (RD: 1:1) VPN1 (RD: 1:2)
Import RT: 100:1 Import RT: 100:1
Export RT: 100:1 Export RT: 100:1
VPN1 VPN1
• A PE needs to create a VPN instance
Site 1 Site 2
for each site and set a unique route
CE CE
distinguisher (RD) for each site.
PE P PE • Import and export route targets (RTs)
are set on PEs to prevent mutual
Site 3 Site 4
communication between sites in
CE CE different VPNs.
VPN2 VPN2
VPN2 (RD: 2:1) VPN2 (RD: 2:2)
Import RT: 200:1 Import RT: 200:1
Export RT: 200:1 Export RT: 200:1
4 Huawei Confidential
Basic MPLS VPN Networking: Extranet
⚫ When the extranet networking solution is used, VPN users can share network resources in some sites
with other VPN users.
5 Huawei Confidential
Basic MPLS VPN Networking: Hub&Spoke (1)
⚫ In the Hub&Spoke solution, one site can be configured as the hub site, and the other sites can be configured as
spoke sites. Mutual access between sites must pass through the hub site. Data transmission between sites is
centrally managed and controlled by the hub site.
• A spoke site needs to advertise routes to a
VPN VPN_in hub site, and then the hub site advertises the
Import RT: Hub Import RT: routes to other spoke sites. Spoke sites do
Export RT: Spoke Spoke not directly exchange routing information.
VPN1
• For Spoke-PEs, set the export RT to "Spoke"
VPN1 and the import RT to "Hub."
Site 1
Spoke-CE1 Spoke-PE1 • The Hub-PE needs to use two interfaces or
Site 2 sub-interfaces (bound to two VPN instances
P Hub-PE Hub-CE that are created). One interface or sub-
interface is used to receive the routes from
Site 3
the Spoke-PE, and the import RT of the VPN
Spoke-CE2 Spoke-PE2 VPN_out instance is "Spoke." The other is used to
VPN1 Export RT: advertise routes to Spoke-PEs, and the
VPN Hub export RT of the VPN instance is "Hub."
Import RT: Hub
Export RT: Spoke
6 Huawei Confidential
Basic MPLS VPN Networking: Hub&Spoke (2)
⚫ The process of advertising routes from site 1 to site 2 is as follows:
VPN
Import RT: Hub VPN_in 1. Spoke-CE1 advertises the route to Spoke-PE1.
Export RT: Spoke Import RT:
Spoke 2. Spoke-PE1 advertises the route to the Hub-PE
1 through IBGP.
VPN1
3 3. The Hub-PE imports the route into the VPN_in
2
Site 1 VPN1 routing table through the import RT attribute
of the VPN instance (VPN_in) and advertises
Spoke-CE1 Spoke-PE1 the route to the Hub-CE.
Site 2
6 4. The Hub-CE learns the route and advertises the
P Hub-PE Hub-CE
route to the VPN instance (VPN_out) of the
Site 3 4 Hub-PE.
5
Spoke-CE2 Sopke-PE2 5. The Hub-PE advertises the route to Spoke-PE2
VPN_out
VPN1 Export RT: with the export RT attribute of VPN_out.
VPN Hub 6. Spoke-PE2 advertises the route to Spoke-CE2.
Import RT: Hub
Export RT: Spoke
7 Huawei Confidential
MCE Networking
⚫ When a private network is divided into VPNs based on services or networks, services of different VPN
users must be completely isolated. In this case, configuring a CE for each VPN increases device and
maintenance costs.
⚫ A multi-VPN-instance CE (MCE) device can function as a CE for multiple VPN instances on an MPLS
VPN network, reducing the investment on network devices.
8 Huawei Confidential
Inter-AS MPLS VPN Networking
⚫ With the wide application of the MPLS VPN solution, the number and geographical scope of terminal users are
increasing. The number of sites in an enterprise is increasing. It is common to connect a geographical location to
another service provider, for example, between different MANs of a carrier, the backbone networks of the carriers
that cooperate with each other may span different autonomous systems (ASs).
⚫ Generally, the MPLS VPN architecture runs in an AS. The routing information of any VPN can only be flooded in one
AS as needed. The inter-AS MPLS VPN solution is used to deploy the MPLS VPN between ASs.
Site A Site B
AS100 AS200
9 Huawei Confidential
▫ Inter-AS VPN Option C (inter-provider backbones Option C): PEs use multi-
hop MP-EBGP to advertise VPNv4 routes, which are also called multi-hop
EBGP redistribution of labeled VPN-IPv4 routes.
Networking for Route Import Between Instances
⚫ In BGP/MPLS IP VPN networking, VPN users cannot communicate with public network users. In addition, users in
one VPN can communicate with those in another VPN only if the two VPNs have matching VPN targets. To enable
communication in both cases, configure route import between instances. Route import between instances is
classified into the following types:
Route import between VPN and public network instances
Route import between VPN instances
VPNA VPNB
Public network
CE1 CE1
P
PE1 PE2
VPNA CE1 PE1
VPNB VPNA
CE2 CE2
10 Huawei Confidential
Contents
11 Huawei Confidential
Deploying MPLS VPN in the Intranet Scenario
⚫ As shown in the figure, customer X and customer Y have two sites each. The two sites need to be
interconnected through MPLS VPN, which corresponds to VPNX and VPNY, respectively.
⚫ Interconnection interfaces, AS numbers, and IP addresses are shown in the figure. CEs and PEs
exchange routing information using the protocol or method shown in the figure.
Loopback0 Loopback0
CE1 GE0/0/0 1.1.1.1/32 3.3.3.3/32 GE0/0/0 CE2
192.168.100.1/24 192.168.200.1/24
192.168.1.0/24 192.168.2.0/24
Site A of Site B of
GE0/0/0 GE0/0/0
customer X 10.0.23.3/24 customer X
10.0.12.1/24
GE0/0/0 GE0/0/1
Site C of PE2 Site D of
PE1 10.0.12.2/24 P 10.0.23.2/24
customer Y customer Y
192.168.1.0/24 192.168.2.0/24
GE0/0/0 GE0/0/0
AS 100 CE3 192.168.100.1/24 AS 123 192.168.200.1/24 CE4
12 Huawei Confidential
• Note: This course describes only the non-inter-AS MPLS VPN deployment.
Deploying OSPF Between PEs and CEs (1)
CE1 GE0/0/0 AS 123 GE0/0/0 CE2
192.168.100.1/24 192.168.200.1/24
192.168.1.0/24 192.168.2.0/24
Site A of Site B of
customer X customer X
PE1 P PE2
The interface has been bound
to the corresponding VRF.
[CE1] ospf 1
[CE1-ospf-1] area 0
[CE1-ospf-1-area-0.0.0.0] network 192.168.100.0 0.0.0.255
[CE1-ospf-1-area-0.0.0.0] network 192.168.1.0 0.0.0.255
13 Huawei Confidential
Deploying OSPF Between PEs and CEs (2)
CE1 GE0/0/0 AS 123 GE0/0/0 CE2
192.168.100.1/24 192.168.200.1/24
192.168.1.0/24 192.168.2.0/24
Site A of Site B of
customer X customer X
PE1 P PE2
The interface has been bound
to the corresponding VRF.
[PE1] ospf 1 vpn-instance VPNX [PE1] bgp 123
[PE1-ospf-1] area 0 [PE1-bgp] ipv4-family vpn-instance VPNX
[PE1-ospf-1-area-0.0.0.0] network 192.168.100.0 0.0.0.255 [PE1-bgp] import-route ospf 1
[PE1-ospf-1-area-0.0.0.0] quit
[PE1-ospf-1] import bgp
The OSPF process used by PE1 to interconnect with CE1 must be Import the OSPF routes learned by OSPF process 1 in
bound to the corresponding VPN instance. the routing table of VPNX on PE1 to BGP. Then, convert
Import the BGP routes in the routing table of VPNX on PE1 (mainly the customer routes destined for site A to BGP VPNv4
the customer routes learned by PE1 through BGP and destined for routes and advertise them to PE2.
site B) into OSPF so that these routes can be advertised to CE1
through OSPF.
14 Huawei Confidential
Deploying Static Routes Between PEs and CEs
CE1 GE0/0/0 AS 123 GE0/0/0 CE2
192.168.100.1/24 192.168.200.1/24
192.168.1.0/24 192.168.2.0/24
Site A of Site B of
customer X customer X
PE1 P PE2
The interface has been bound
to the corresponding VRF.
[CE2] ip route-static 192.168.1.0 24 192.168.200.2 [PE2] ip route-static vpn-instance VPNX 192.168.2.0 24 192.168.200.1
[CE2] ip route-static 192.168.100.0 24 192.168.200.2
A static route to each network segment at site B needs to be
A static route to each network segment at site A needs configured on PE2.
to be configured on CE2. [PE2] bgp 123
[PE2-bgp] ipv4-family vpn-instance VPNX
[PE2-bgp] import-route static
Import the static route in the routing table of VPNX on PE2 to BGP so
that the static route can be converted into a BGP VPNv4 route and
advertised to PE1.
15 Huawei Confidential
Deploying EBGP Between PEs and CEs
GE0/0/0 GE0/0/0
10.0.12.1/24 10.0.23.3/24
GE0/0/0 GE0/0/1
Site C of PE2 Site D of
PE1 10.0.12.2/24 P 10.0.23.2/24
customer Y customer Y
192.168.1.0/24 192.168.2.0/24
GE0/0/0 GE0/0/0
AS 100 CE3 192.168.100.1/24 AS 123 192.168.200.1/24 CE4
The interface has been bound
to the corresponding VRF.
CE3 only needs to perform common BGP configurations When a PE and a CE use BGP to exchange customer routes,
and does not need to support VRF. you do not need to manually import routes on the PE. In this
example, after PE1 learns a customer route from CE3 using
BGP, PE1 automatically converts the route to a VPNv4 route
and advertises the route to PE2. After PE1 learns the route to
site D from PE2 using BGP, PE1 automatically converts the
route to an IPv4 route and advertises the IPv4 route to CE3.
16 Huawei Confidential
BGP Configuration in Special Scenarios: AS Number Replacement
⚫ In an MPLS VPN scenario, if EBGP runs between a PE and a CE to exchange routing information, the AS numbers of
the two sites may be the same.
Site 1 Site 2
EBGP EBGP
GE0/0/0
AS CE1 192.168.100.1/24 PE1 P PE2 CE2 AS
65001 AS123 65001
• If CE1 sends a VPN route to PE1 through EBGP and PE2 forwards the route to CE2, CE2 will discard
the route due to repetitive AS numbers. As a result, site 1 and site 2 that belong to the same VPN
cannot communicate with each other.
• You can run the peer substitute-as command on each PE to enable the AS number replacement
function. That is, the PE replaces the AS number of the VPN site where the CE resides in the
received private network route with the local AS number. The peer CE then does not discard the
route with the repetitive AS number.
When sending a BGP route to CE1, PE1 replaces 65001 with
[PE1] bgp 123
the local AS number 123 if the AS_Path attribute contains
[PE1-bgp] ipv4-family vpn-instance vpn1
65001. Therefore, if a route is transmitted from CE2 to PE2
[PE1-bgp-vpn1] peer 192.168.100.1 substitute-as
and then from PE2 to PE1, the AS_Path attribute of the BGP
route is {123,123} when PE1 transmits the route to CE1.
17 Huawei Confidential
BGP Configuration in Special Scenarios: SoO
⚫ In a CE multi-homing scenario, if BGP AS number replacement is enabled, routing loops may occur. Therefore, the site of origin (SoO)
feature is required to prevent the routing loops.
Both CE1 and CE3 belong to site 1. CE2 belongs to site 2. The AS numbers of sites 1 and 2 are both 65001. EBGP runs between PEs and CEs. To ensure
that the PEs and CEs learn routes from each other, configure AS number replacement on PE1 and PE2.
CE1 transmits an intra-site route to PE1, and PE1 transmits the route to CE3. Because AS number replacement is configured, CE3 receives the route,
which may cause a routing loop.
After the SoO attribute is configured for the BGP peer:
[PE1] bgp 123 • When a BGP route is received from a peer, the SoO
[PE1-bgp] ipv4-family vpn-instance vpn1 attribute is carried in the path attribute and advertised
[PE1-bgp-vpn1] peer 192.168.100.1 soo 200:1 to other BGP peers.
[PE1-bgp-vpn1] peer 192.168.200.1 soo 200:1 • Before advertising a BGP route to a peer, the device
checks whether the SoO attribute of the route is the
same as the configured SoO value. If the SoO attribute
of the route is the same as the configured SoO value,
CE3 the device does not advertise the route to prevent loops.
Site 1 Site 2
CE1
EBGP
EBGP PE1 P PE2 CE2
AS AS
65001 AS123 65001
18 Huawei Confidential
[CE4] isis 1
[PE2] isis 1 vpn-instance VPNY
[CE4-isis-1] network-entity 49.0001.0000.0000.1111.00
[PE2-isis-1] network-entity 49.0002.0000.0000.2222.00
[CE4-isis-1] is-level level-2
[PE2-isis-1] is-level level-2
[CE4-isis-1] quit
[PE2-isis-1] import-route bgp level-2
[CE4] interface GigabitEthernet 0/0/0
[PE2-isis-1] quit
[CE4-GigabitEthernet0/0/0] isis enable 1
[PE2] interface GigabitEthernet 0/0/2
[CE4-GigabitEthernet0/0/0]quit
[PE2-GigabitEthernet0/0/2] isis enable 1
[CE4] interface GigabitEthernet 0/0/1
[PE2] bgp 123
[CE4-GigabitEthernet0/0/1] isis enable 1
[PE2-bgp] ipv4-family vpn-instance VPNY
# GE0/0/1 is the interface connected to network segment
[PE2-bgp] import-route isis 1
192.168.2.0/24.
19 Huawei Confidential
Contents
20 Huawei Confidential
Deploying MPLS VPN in the Hub&Spoke Scenario
⚫ Hub&Spoke networking solutions are as follows:
Method 1: EBGP runs between the Hub-CE and Hub-PE, and between the Spoke-PE and Spoke-CE.
Method 2: An IGP runs between the Hub-CE and Hub-PE, and between the Spoke-PE and Spoke-CE.
Method 3: EBGP runs between the Hub-CE and Hub-PE, and an IGP runs between the Spoke-PE and Spoke-CE.
⚫ The Hub-CE and Hub-PE cannot use an IGP when the Spoke-PE and Spoke-CE using EBGP to deploy the MPLS VPN
in the Hub&Spoke networking.
Loopback0
1.1.1.1/32
Site 1 GE0/0/1
192.168.100.2/24
Spoke-CE1 Loopback0
GE0/0/0
3.3.3.3/32 GE0/0/0 GE0/0/0 Site 3
192.168.100.1/24 Spoke-PE1
192.168.31.2/24 192.168.31.1/24
Loopback0 Hub-CE
Site 2 2.2.2.2/32 GE0/0/1 GE0/0/1
GE0/0/1 P Hub-PE 192.168.32.2/24 192.168.32.1/24
192.168.200.2/24
Spoke-CE2 GE0/0/0
192.168.200.1/24 Spoke-PE2
AS 123
21 Huawei Confidential
VRF Configuration
⚫ Create a VPN instance on the Spoke-PE. The RT configuration is shown in the figure.
⚫ Create VPN_in and VPN_out on the Hub-PE to import private network routes and export private network routes to
the Spoke-PE, respectively. The RT configuration is shown in the figure.
VPN VPN_out
Import RT: 300:1 Export RT:
Export RT: 100:1 300:1
Site 1
EBGP
Spoke-CE1
Spoke-PE1 Site 3
Hub-CE
Site 2
P Hub-PE
Spoke-CE2
EBGP
Sopke-PE2 VPN_in
Import RT:
VPN 100:1, 200:1
Import RT: 300:1
Export RT: 200:1
22 Huawei Confidential
Deployment Method 1: Route Advertisement Process
⚫ Spoke-CEs and Spoke-PEs exchange routing information through EBGP. After an EBGP connection is set
up, Spoke-CEs and Spoke-PEs advertise routes to BGP.
⚫ Two EBGP connections are set up between the Hub-PE and Hub-CE to separately advertise and accept
private network routes.
Site 1
EBGP
Spoke-CE1
EBGP
Spoke-PE1 Site 3
VPN_in
Hub-CE
Site 2 EBGP
P Hub-PE
Spoke-CE2
EBGP VPN_out
Sopke-PE2
23 Huawei Confidential
▫ The Hub-PE imports the route into the VPN_in routing table through the
import RT attribute of the VPN instance (VPN_in), and then advertises the
route to the Hub-CE through EBGP.
▫ The Hub-CE learns the route through the EBGP connection and advertises
the route to the VPN instance (VPN_out) of the Hub-PE through another
EBGP connection.
▫ The Hub-PE advertises the route with the export RT attribute of VPN_out to
all Spoke-PEs.
24 Huawei Confidential
Deployment Method 2: Route Advertisement Process
⚫ The following example uses OSPF as an IGP.
Spoke-CEs and Spoke-PEs exchange routing information through OSPF process 100.
The Hub-PE uses two OSPF processes to establish OSPF neighbor relationships with the Hub-CE, which
separately advertise and accept private network routes.
Site 1
OSPF 100
Spoke-CE1
OSPF 100
Spoke-PE1 VPN_in Site 3
Hub-CE
Site 2 OSPF 200
P Hub-PE
Spoke-CE2
OSPF 100 VPN_out
Sopke-PE2
25 Huawei Confidential
▫ The Hub-PE imports the route to the VPN_in routing table through the
import RT attribute of the VPN instance (VPN_in). After the BGP route is
imported into OSPF 100, the route transmitted from Spoke-PE1 is
advertised to the Hub-CE.
▫ The Hub-CE receives the route through OSPF 100. After route import is
configured, the route is advertised to OSPF 200, and then OSPF 200
advertises the route to the Hub-PE.
▫ The VPN instance (VPN_out) of the Hub-PE imports the route of OSPF 200
multi-instance and advertises the route with the export RT attribute to all
Spoke-PEs.
26 Huawei Confidential
Deployment Method 3: Route Advertisement Process
⚫ Use OSPF as an example. The Spoke-CEs and Spoke-PEs exchange routing information through an
OSPF neighbor relationship (process 100).
⚫ Establish two EBGP connections between the Hub-PE and Hub-CE to accept and advertise private
network routes, respectively. The configurations of the Hub-PE and Hub-CE are similar to those in
method 1.
Site 1
OSPF 100
Spoke-CE1
EBGP
Spoke-PE1 Site 3
VPN_in
Hub-CE
Site 2
P Hub-PE EBGP
Spoke-CE2
OSPF 100 VPN_out
Sopke-PE2
27 Huawei Confidential
▫ The Hub-PE imports the route into the VPN_in routing table through the
import RT attribute of the VPN instance (VPN_in), and then advertises the
route to the Hub-CE through EBGP.
▫ The Hub-CE learns the route through the EBGP connection and advertises
the route to the VPN instance (VPN_out) of the Hub-PE through another
EBGP connection.
▫ The Hub-PE advertises the route with the export RT attribute of VPN_out to
Spoke-PE2.
192.168.1.0/24
AS_Path{65001} 192.168.1.0/24
192.168.1.0/24
AS_Path{ }
Site 1
EBGP
Spoke-CE1
OSPF 100
Spoke-PE1 Site 3
VPN_in
AS 65001
Hub-CE
Site 2
P Hub-PE OSPF 200
Spoke-CE2
EBGP VPN_out
Sopke-PE2
28 Huawei Confidential
• The following takes the advertisement of the route destined for 192.168.1.0/24
from Spoke-CE1 to Spoke-CE2 as an example. The process is as follows:
▫ Spoke-CE1 advertises a route to Spoke-PE1 through EBGP.
▫ Hub-CE learns the route through OSPF 100 and advertises the route to the
Hub-PE through OSPF 200.
▫ The VPN instance (VPN_out) of the Hub-PE imports the route of OSPF 200
and advertises the route with the export RT attribute of VPN_out to all
Spoke-PEs.
▫ The VPN instance on Spoke-PE2 imports the route based on the import RT.
Spoke-PE2 advertises the route to Spoke-CE2 through EBGP.
• The VPN instance (VPN_out) on the Hub-PE advertises the route to Spoke-PE2
and Spoke-PE1 at the same time with the export RT. The route is imported by the
Hub-PE through an IGP (OSPF 200). Because the IGP route does not carry the
AS_Path attribute, the AS_Path attribute is null. The AS_Path of the route
destined for 192.168.1.0/24 from Spoke-CE1 is not null. Therefore, the route
returned by the Hub-PE takes precedence over the route from Spoke-CE1. As a
result, route flapping occurs.
• The process is as follows:
▫ The route advertised by Spoke-CE1 becomes a non-optimal route because
of the AS_Path attribute.
▫ The Hub-CE withdraws the route sent to the Hub-PE (the implementation is
the same as the preceding implementation).
▫ The Hub-PE advertises the Update message to withdraw the route sent to
Spoke-PE1.
• Therefore, the route from Spoke-CE1 becomes the optimal route on Spoke-PE1.
Spoke-PE1 advertises the route to the Hub-PE through IBGP. The Hub-PE then
returns the route, and the route from Spoke-CE1 becomes a non-optimal route.
This process repeats.
Contents
30 Huawei Confidential
Configuring Interworking Between VPN and Public Network
Instances
1 ⚫
Import different types of VPN routes to the public network
1. Configure the PE to import VPN routes to the local public routing table.
2. Configure the PE to import the local public routing table into other
routing protocols so that the P device can obtain routing information.
⚫
Import different types of routes from the public network
1
2 instance to a VPN instance's corresponding routing tables.
VPNA CE1 PE1 Public P
network [Huawei-vpn-instance-VPNA-af-ipv4] import-rib public protocol { direct |
vlink-direct-route | { static | isis process-id | ospf process-id } [ valid-
route ] } [ route-policy route-policy-name ]
1. Configure the PE to import public routes to the local VPN routing table.
2. Configure the PE to import the local private routing table into other
routing protocols so that the CE device can obtain routing information.
31 Huawei Confidential
Example for Configuring Interworking Between VPN and
Public Network Instances
<P>ping 10.0.12.1
1. Import routes of a specified VPN instance to the public PING 10.0.12.1: 56 data bytes, press CTRL_C to break
network instance. Reply from 10.0.12.1: bytes=56 Sequence=1 ttl=255 time=5 ms
Reply from 10.0.12.1: bytes=56 Sequence=2 ttl=255 time=4 ms
[PE1]ip import-rib vpn-instance VPNA protocol direct Reply from 10.0.12.1: bytes=56 Sequence=3 ttl=255 time=3 ms
[PE2]ospf 1 Reply from 10.0.12.1: bytes=56 Sequence=4 ttl=255 time=5 ms
[PE1-ospf-1]import-route direct Reply from 10.0.12.1: bytes=56 Sequence=5 ttl=255 time=4 ms
2. Import routes of the public network instance to a specified VPN
instance.
32 Huawei Confidential
Configuring Interworking Between VPN Instances
1
VPNA CE1 PE1 VPNB CE2
⚫
Configure route import between VPN instances.
[Huawei-vpn-instance-VPNA-af-ipv4] import-rib vpn-instance vpn-instance-name protocol { direct| { static | isis process-id | ospf process-id } [ valid-
route ] } [ route-policy route-policy-name | route-filter route-filter-name ]
33 Huawei Confidential
Example for Configuring Interworking Between VPN Instances
34 Huawei Confidential
Contents
35 Huawei Confidential
OSPF/BGP in MPLS VPN
⚫ When OSPF is deployed between the PE and CE to exchange routing information, if the standard BGP/OSPF
exchange process (BGP/OSPF interoperation for short) is used on the PE to exchange routing information, the
remote PE directly generates Type 5 LSAs when importing BGP into the OSPF process of the VPN instance. Different
sites consider the routes of other sites as AS external routes (AS_external).
⚫ To solve the problem of OSPF routing information loss caused by standard BGP/OSPF interoperability, BGP and
OSPF are extended accordingly.
PE1 imports the OSPF route PE2 imports the BGP route
advertised by CE1 into BGP and advertised by PE1 into OSPF and
advertises the route to PE2. advertises the route to CE2.
BGP
Site 1 Site 2
OSPF OSPF
AS CE1 PE1 P PE2 CE2 AS
65001 AS123 65001
36 Huawei Confidential
• In actual applications, if two sites that need to communicate are in the same AS,
each site should consider the route of the other site as an inter-area route rather
than an AS external route.
BGP Extended Community Attributes
⚫ To retain OSPF routing information, BGP adds some community attributes that can carry
OSPF routing information.
Domain ID: identifies a domain.
Route Type: contains the area ID and route type of the OSPF route imported to BGP.
◼ Area-ID: ID of the VRF OSPF process of the PE that establishes an adjacency with a CE.
◼ Route Type: type of the imported OSPF route:
− 1 or 2: intra-area route, that is, the route calculated by the PE based on Type 1 and Type 2 LSAs
− 3: inter-area route
− 5: OSPF external route, that is, the route calculated by the PE through Type 5 LSAs. When the value of the Route Type
field is 5, the value of the Area-ID field must be 0.0.0.0.
− 7: NSSA route, that is, the route calculated by the PE through Type 7 LSAs
37 Huawei Confidential
Domain ID
⚫ When OSPF routes are imported into BGP on a PE, the PE adds the domain ID attribute to the BGP routes according
to the local configuration. The domain ID is transmitted as the extended community attribute of BGP.
⚫ When a PE imports a BGP route to OSPF, if the domain ID carried in the BGP route is the same as the local domain
ID, the two sites belong to the same OSPF routing domain. If they are different, they are considered not in the same
routing domain.
38 Huawei Confidential
• The domain ID can be configured using the domain-id command in the view of
the OSPF process bound to the VRF instance.
▫ By default, the domain ID is 0 (NULL). If different OSPF domains use NULL
as the domain ID, these OSPF domains cannot be distinguished.
Consequently, the routes between different OSPF domains are considered
as intra-area routes.
▫ If an OSPF domain is configured with a non-zero domain ID, NULL is no
longer the domain ID of the OSPF domain.
• It is recommended that all OSPF instances related to the same VPN use the same
domain ID or the default domain ID.
Domain ID and Route Type
⚫ Based on the domain ID and route type in the BGP route, a PE generates different types of OSPF LSAs
and advertises them to the OSPF process of the VRF.
39 Huawei Confidential
Contents
40 Huawei Confidential
Type 3 Routing Loop Prevention: Case
⚫ The following figure shows an example of Type 3 LSA routing loops.
Site 1 and site 2 belong to VPN1.
Site 1 is connected to PE1 on the backbone network through OSPF area 0.
Site 2 is connected to PE2 and PE3 on the backbone network through OSPF area 0 (in the dual-homing load
balancing scenario).
PE2
Type 3 LSA
VPNv4 PE3
41 Huawei Confidential
▫ PE1 imports the route of the OSPF VPN1 process to BGP and advertises the
route to PE2 and PE3 through MP-IBGP.
▫ PE3 advertises the optimal route learned from OSPF to PE1 through MP-
IBGP.
▫ In this case, PE1 has two routes to the destination network segment
192.168.1.0/24. One is learned from CE1 through OSPF, and the other is
learned from PE3 through MP-IBGP. The following problems may occur:
▪ PE1 withdraws the route to 192.168.1.0/24. If the link between PE1
and PE2 is blocked, BGP Update messages cannot be sent to PE2. As a
result, the route sent by PE3 to PE1 still exists. (In normal cases, the
route is withdrawn when PE1 sends Update messages to PE2.) The
next hop of the route from PE1 to 192.168.1.0/24 is PE3. Routing
loops occur.
▪ If the priority of the MP-IBGP route on PE1 is higher than that of the
OSPF route, PE1 preferentially selects the BGP route advertised by PE3.
In this case, PE1 needs to withdraw the BGP route advertised to PE2.
As a result, PE3 withdraws the BGP route advertised to PE1, and PE1
preferentially selects the OSPF route again. As a result, route flapping
occurs.
Type 3 Routing Loop Prevention: DN Bit
⚫ To prevent Type 3 LSA loops, the OSPF multi-instance process uses an unused bit in the LSA Options
field as a flag bit, which is called the DN bit. The DN bit is used to prevent Type 3 LSA loops.
⚫ When performing SPF calculation, the OSPF instance process on a PE ignores Type 3 LSAs with the DN
bit being 1.
PE2
Type 3 LSA
192.168.1.0/24 CE2
OSPF LSA calculation is
CE1 PE1 P not performed.
Area 0
Site 1 Site 2
VPNv4 PE3
43 Huawei Confidential
• By default, the DN bit in LSAs generated by OSPF is set to 1. You can run the dn-
bit-set disable command to disable OSPF from setting the DN bit in LSAs.
Type 5/7 Routing Loop Prevention: Case
⚫ The following figure shows an example of a Type 5 LSA routing loop.
Site 1 and site 2 belong to VPN1.
Site 1 is connected to PE1 on the backbone network through EBGP.
Site 2 is connected to PE2 and PE3 on the backbone network through OSPF.
PE2
192.168.1.0/24 EBGP
CE2
AS CE1 PE1 P
65001 Site 1 Site 2
VPNv4 PE3
44 Huawei Confidential
PE2
192.168.1.0/24 EBGP
CE2
LSA calculation is
AS CE1 PE1 P not performed.
65001 Site 1 Site 2
VPNv4 PE3
45 Huawei Confidential
• The VPN route tag is not transmitted in the BGP extended community attribute.
The VPN route tag is valid only on the PEs that receive BGP routes and generate
OSPF LSAs.
• By default, the VPN route tag is calculated based on the AS number of BGP. If
BGP is not configured, the default value is 0.
• You can run the route-tag command to set a VPN route tag.
Contents
46 Huawei Confidential
Sham Link Usage Scenarios
⚫ Generally, BGP peers use BGP extended community attributes to carry routing information on the MPLS VPN
backbone network. OSPF running on the peer PE can use the information to generate Type 3 LSAs from the PE to
CE. These Type 3 LSAs are inter-area routes.
⚫ If a backdoor link is added between CE1 and CE2 and OSPF is run to exchange routes, the route learned through
the backdoor link is an intra-area route.
⚫ Because intra-area routes take precedence over inter-area routes, the backdoor link is preferentially selected. To
allow the backdoor link as a backup link, use the sham link.
47 Huawei Confidential
Working Mechanism of Sham Link
⚫ The sham link creates an intra-area link between two PEs. When LSAs are flooded on a sham link, all OSPF route
types remain unchanged and are not changed to Type 3 or 5 LSAs.
⚫ A sham link is considered as a link between two VPN instances. The addresses of the two ends of the link are the
addresses of the PEs, which are used as the source and destination addresses of the connection. The source and
destination addresses of a sham link are loopback interface addresses with 32-bit masks. The loopback interface
must be bound to a VPN instance and advertised through BGP.
sham link
L0:1.1.1.1/32 L0:2.2.2.2/32
48 Huawei Confidential
• Multiple sham links of the same OSPF process can share the same endpoint
address, but different OSPF processes cannot have two sham links with the same
endpoint address.
Sham Link Configuration Example
1. Create an interface on the PE to set up a sham link. The configuration of PE2 is similar to that of PE1.
[PE1]interface LoopBack0
[PE1-LoopBack0] ip binding vpn-instance VPNA
[PE1-LoopBack0]ip address 1.1.1.1 32
# Advertise the routes in the BGP VPN address family.
[PE1-bgp-VPNA]network 1.1.1.1 32
2. Configure the sham link on PE1. The configuration of PE2 is similar to that of PE1.
[PE1-ospf-1]area 0
[PE1-ospf-1-area-0.0.0.0]sham-link 1.1.1.1 2.2.2.2
3. Adjust the cost value to ensure that the cost value of the backdoor link is greater than that of the sham link.
[CE1-GigabitEthernet0/0/0]ospf cost 1000
49 Huawei Confidential
• When configuring a sham link, you can specify the route cost of the sham link.
The default value is 1.
Verifying the Configuration of the Sham Link
1. For details about common OSPF VPN configurations, see the preceding configuration examples.
<PE1>display ospf sham-link area 0
2. Check OSPF routes on CE1. The command output shows that the peer route has been learned as an intra-area route.
50 Huawei Confidential
Quiz
B. Type 3 LSA
C. Type 5 LSA
D. Type 7 LSA
2. (True or false) When a CE transmits routes to a PE through BGP, the routes may carry the
SoO attribute. ( )
A. True
B. False
51 Huawei Confidential
1. BCD
2. B
Summary
⚫ MPLS VPN has different networking solutions in different scenarios. The common networking solutions
are intranet, extranet, and Hub&Spoke. In addition, MPLS VPN networking can be classified into inter-
AS and intra-AS networking based on whether the MPLS VPN backbone network is an inter-AS
network.
⚫ PEs and CEs can use static, OSPF, IS-IS, or BGP routes to exchange routing information. OSPF provides
the following extended features for MPLS VPN:
Domain ID: identifies whether the routes imported to a VPN instance belong to the same OSPF domain.
DN bit: used to prevent routing loops because of Type 3 LSAs.
VPN route tag: is used to prevent routing loops caused by Type 5 or Type 7 LSAs.
Sham link: controls OSPF route selection in special scenarios.
52 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
3 Huawei Confidential
Fundamentals of Intra-AS MPLS VPN: Route Advertisement
and Label Distribution
The following example MPLS backbone network
describes how CE1
advertises routes to CE2.
PE1 FEC: PE1 P FEC: PE1 PE2
Label: T1 Label: T2
IPv4 routing 4 LDP 4 LDP IPv4 routing
CE1 IPv4: Net1 IPv4: Net1 CE2
Site1 2 MP-IBGP Site2
NH: CE1 NH: PE2
VPNv4: RD1+Net1
VPNv4 routing
1 IGP/BGP NH: PE1 3 IGP/BGP
VPN Label: V1
1. CE1 and PE1 run IGP/BGP to exchange routing information (IPv4 routes).
2. After PE1 receives a route from CE1, PE1 converts the route into a VPNv4 route, advertises the VPNv4 route to PE2
using MP-IBGP, and allocates a VPN label V1 to the route.
3. After PE2 receives the VPNv4 route, PE2 converts the route into an IPv4 route and advertises the route to CE2
using IGP/BGP.
4. PEs and the P on the MPLS backbone network run LDP to allocate tunnel labels. Assume that the labels allocated
by PE1 and allocated by P to PE1 are T1 and T2 respectively.
Only PEs are aware of VPN routing information, while the P device is not.
The backbone network uses MPLS tunnel forwarding to avoid routing blackholes.
4 Huawei Confidential
Fundamentals of Intra-AS MPLS VPN: Data Forwarding
MPLS backbone network The following example
describes how CE2 sends a
data packet to CE1.
PE1 P PE2
IP MPLS MPLS IP
5 Huawei Confidential
Background of Inter-AS MPLS VPN Solutions
⚫ As the enterprise scale keeps increasing, enterprise sites in different locations may belong to different ASs. As shown in the figure,
when CEs in two different ASs need to communicate with each other, the inter-AS VPN technology is required.
AS100 AS200
CE1 CE3 CE4 CE2
6 Huawei Confidential
⚫ Compared with intra-AS MPLS VPN, inter-AS MPLS VPN has similar fundamentals but faces the following problems:
LDP does not run between ASs, as a result of which, outer tunnels cannot be established between ASs.
PEs do not run IGP, cannot establish BGP peer relationships between each other by default, and so cannot directly advertise
VPNv4 routes to each other.
7 Huawei Confidential
Inter-AS MPLS VPN Solutions
⚫ The following describes three inter-AS MPLS VPN solutions:
Inter-Provider Backbones Option A (inter-AS VPN Option A)
◼
VPN instances spanning multiple ASs are bound to dedicated interfaces of ASBRs to manage their own VPN routes. This
solution is also called VRF-to-VRF.
◼
The configuration is simple, without requiring MPLS to run between ASBRs.
8 Huawei Confidential
Contents
9 Huawei Confidential
Inter-AS VPN Option A Overview
⚫ As a basic BGP/MPLS IP VPN application in the inter-AS scenario, Option A does not need special configurations and MPLS does not
need to run between ASBRs. In this mode, ASBRs of two ASs directly connect to each other and function as PEs in the ASs. Each ASBR
views the peer ASBR as its CE and advertises IPv4 routes to the peer ASBR using EBGP.
EBGP
AS100 AS200
CE1 CE2
10 Huawei Confidential
Inter-AS VPN Option A Topology
⚫ Two ASBR-PEs are connected through multiple physical interfaces (or sub-interfaces), each interface is bound to a VPN, and each
ASBR-PE views the peer ASBR-PE as a CE. Therefore, the interfaces connecting the two ASBR-PEs need to be bound to VRFs, and
VPNv4 routes need to be converted into common IPv4 routes using EBGP and transmitted from one AS to another AS. Therefore, the
two ASBRs need to be interconnected, but MPLS does not need to be enabled.
IP/MPLS IP/MPLS
MP-IBGP MP-IBGP
AS100 AS200
P1 EBGP P2
PE1 PE2
ASBR-PE1 ASBR-PE2
CE1 CE2
IPv4
VPN
LDP LSP
11 Huawei Confidential
Inter-AS VPN Option A: Control Plane
1. CE1 sets the next hop of an IPv4 route
IP/MPLS IP/MPLS to itself and advertises the route to PE1.
MP-IBGP MP-IBGP
2. PE1 converts the IPv4 route into a
AS100 AS200
VPNv4 route, sets the next hop of the
route to PE1, allocates a VPN label V1
to the route, and advertises the route to
P1 P2 ASBR-PE1.
PE1 PE2
ASBR-PE1 ASBR-PE2 3. PE1 and P1 allocate tunnel labels T1
and T2 respectively to the routes
destined for PE1.
Tunnel Tunnel Tunnel Tunnel
4. ASBR-PE1 converts the VPNv4 route into
label label label label CE2
Net1 CE1 an IPv4 route, sets the next hop to
3 3 6 6 ASBR-PE1, and advertises the route to
FEC: PE1 FEC: PE1 FEC: ASBR-PE2 FEC: ASBR-PE2 ASBR-PE2.
Label: T1 Label: T2 Label: T3 Label: T4
5. ASBR-PE2 converts the IPv4 route into a
VPNv4 route, sets the next hop of the
IPv4 routing VPNv4 routing IPv4 routing VPNv4 routing IPv4 routing route to ASBR-PE2, allocates a VPN
1 2 4 5 7 label V2 to the route, and advertises the
IPv4: Net1 IPv4: Net1 IPv4: Net1 route to PE2.
NH: CE1 VPNv4: RD1+Net1 NH: ASBR-PE1 VPNv4: RD2+Net1 NH: PE2 6. ASBR-PE2 and P2 allocate tunnel labels
NH: PE1 NH: ASBR-PE2
T3 and T4 respectively to the routes
VPN label: V1 VPN label: V2
destined for ASBR-PE2.
The following example describes how CE1 7. PE2 converts the VPNv4 route into an
IPv4 route, sets the next hop to PE2, and
advertises a route to CE2.
advertises the route to CE2.
12 Huawei Confidential
• The numbers in this example are only for ease of understanding, and do not
represent the actual processing sequence on the devices.
Inter-AS VPN Option A: Forwarding Plane
1. CE2 sends an IP packet destined
IP/MPLS IP/MPLS for Net1 to PE2.
MP-IBGP MP-IBGP 2. After PE2 receives the IP packet, it
AS100 AS200 encapsulates the packet with a
VPN label V2 and then an outer
P1 label T4 and forwards the packet
P2
to P2.
PE1 PE2 3. P2 swaps the outer label T4 with
ASBR-PE1 ASBR-PE2
T3 and forwards the packet to
Site1 Site2 ASBR-PE2.
4. ASBR-PE2 removes all labels from
Net1 CE1 CE2 the packet and forwards the
7 6 5 4 3 2 1 packet to ASBR-PE1.
5. After ASBR-PE1 receives the IP
IP MPLS MPLS IP MPLS MPLS IP
packet, it encapsulates the packet
Net1 Net1 Net1 Net1 Net1 Net1 Net1 with a VPN label V1 and then an
outer label T2 and forwards the
V1 V1 V2 V2
packet to P1.
T1 T2 T3 T4 6. P1 swaps the outer label T2 with
T1 and forwards the packet to
PE1.
7. PE1 removes all labels from the
packet and forwards the packet to
CE1.
13 Huawei Confidential
⚫ An ASBR views the peer ASBR as a CE and uses a VRF interface to connect to the peer ASBR. ASBRs in two ASs
exchange VPNv4 routes.
⚫ At the data layer, VPN user data is exchanged between ASBRs in two ASs in the form of IP packets, that is, packets
do not carry any label header.
⚫ The scalability of inter-AS VPN Option A is poor. ASBRs need to manage all VPN routes, and a VPN instance needs
to be configured for each VPN. This results in numerous VPN-IPv4 routes on the ASBRs. In addition, because
common IP forwarding is implemented between ASBRs, each inter-AS VPN requires a different interface, which can
be a sub-interface, physical interface, or bundled logical interface. This poses high requirements for ASBRs. If a VPN
spans multiple ASs, the intermediate ASs must support VPN services. This requires complex configurations and
greatly affects the intermediate ASs. If only a few inter-AS VPN instances are used, inter-AS VPN Option A is
recommended.
14 Huawei Confidential
Contents
15 Huawei Confidential
Inter-AS VPN Option A Configuration Example (1)
16 Huawei Confidential
Inter-AS VPN Option A Configuration Example (2)
1. Take ASBR-PE1 as an example to create a VPN instance and
bind it to the interface connected to ASBR-PE2.
AS100 GE2/0/0 AS200
[ASBR-PE1] ip vpn-instance vpna
10.0.34.0/24 [ASBR-PE1-vpn-instance-vpna] ipv4-family
P1 ASBR-PE1 ASBR-PE2 P2 [ASBR-PE1-vpn-instance-vpna-af-ipv4] route-distinguisher 100:3
PE1 PE2 [ASBR-PE1-vpn-instance-vpna-af-ipv4] vpn-target 1:1 both
[ASBR-PE1-vpn-instance-vpna-af-ipv4] quit
[ASBR-PE1-vpn-instance-vpna] quit
[ASBR-PE1] interface gigabitethernet 2/0/0
CE1 CE2 [ASBR-PE1-GigabitEthernet2/0/0] ip binding vpn-instance vpna
[ASBR-PE1-GigabitEthernet2/0/0] ip address 10.0.34.3 24
192.168.1.1/24 192.168.2.1/24 [ASBR-PE1-GigabitEthernet2/0/0] quit
3. Take ASBR-PE1 as an example to establish an MP-IBGP peer 2. Take ASBR-PE1 as an example to establish an EBGP peer
relationship between ASBR-PE1 and PE1. relationship between ASBR-PE1 and ASBR-PE2.
[ASBR-PE1] bgp 100 [ASBR-PE1] bgp 100
[ASBR-PE1-bgp] peer 10.0.1.1 as-number 100 [ASBR-PE1-bgp] ipv4-family vpn-instance vpna
[ASBR-PE1-bgp] peer 10.0.1.1 connect-interface loopback 0 [ASBR-PE1-bgp-vpna] peer 10.0.34.4 as-number 200
[ASBR-PE1-bgp] ipv4-family vpnv4 [ASBR-PE1-bgp-vpna] import-route direct
[ASBR-PE1-bgp-af-vpnv4] peer 10.0.1.1 enable [ASBR-PE1-bgp-vpna] quit
[ASBR-PE1-bgp-af-vpnv4] quit [ASBR-PE1-bgp] quit
[ASBR-PE1-bgp] quit
ASBR-PE1 views ASBR-PE2 as a CE and establishes an EBGP
ASBR-PE1 establishes a VPNv4 peer relationship with PE1 to peer relationship with ASBR-PE2 in the VPN instance address
transmit VPNv4 routes. family view to transmit IPv4 routes.
17 Huawei Confidential
Verifying the Configuration (1)
1. Check CE1's routing information on PE1.
<PE1>display bgp vpnv4 all routing-table
AS100 GE2/0/0 AS200 Total number of routes from all PE: 1
Route Distinguisher: 100:1
10.0.34.0/24 Network NextHop MED LocPrf PrefVal Path/Ogn
P1 ASBR-PE1 ASBR-PE2 P2 *> 192.168.1.0 10.0.11.1 0 0 65000i
3
PE1 PE2 VPN-Instance vpna, Router ID 10.0.12.1:
2
Total Number of Routes: 1
1 Network NextHop MED LocPrf PrefVal Path/Ogn
*> 192.168.1.0 10.0.11.1 0 0 65000i
CE1 CE2 The next hop is CE1.
192.168.1.1/24 192.168.2.1/24 2. Check CE1's routing information on ASBR-PE1.
3. Check CE1's routing information on ASBR-PE2. <ASBR-PE1>display bgp vpnv4 all routing-table 192.168.1.0
Total routes of Route Distinguisher(100:1): 1
<ASBR-PE2>display bgp vpnv4 all routing-table 192.168.1.0 BGP routing table entry information of 192.168.1.0/24:
Total routes of Route Distinguisher(100:4): 1 Label information (Received/Applied): 1026/NULL
BGP routing table entry information of 192.168.1.0/24: From: 10.0.1.1 (10.0.1.1)
Label information (Received/Applied): NULL/1027 Route Duration: 00h05m07s
From: 10.0.34.3 (10.0.3.3) Relay IP Nexthop: 10.0.23.2 The next hop is PE1.
Route Duration: 00h13m13s Relay token: 0x1
Direct Out-interface: GigabitEthernet0/0/1 Original nexthop: 10.0.1.1
Original nexthop: 10.0.34.3 The label of the received route is null, Ext-Community:RT <1 : 1>
Ext-Community:RT <2 : 2> indicating that the route is an IPv4 route. AS-path 65000, origin igp, MED 0, localpref 100, pref-val 0, valid,
internal, best, select, pre 255, IGP cost 2
The next hop is ASBR-PE1.
18 Huawei Confidential
Verifying the Configuration (2)
4. Check CE1's routing information on PE2.
<PE2>display bgp vpnv4 all routing-table 192.168.1.0
AS100 GE2/0/0 AS200 Total routes of Route Distinguisher(100:4): 1
BGP routing table entry information of 192.168.1.0/24:
10.0.34.0/24 Label information (Received/Applied): 1027/NULL
P1 ASBR-PE1 ASBR-PE2 P2 From: 10.0.4.4 (10.0.4.4)
3
PE1 4 PE2 Relay IP Nexthop: 10.0.56.5
2
Relay IP Out-Interface: GigabitEthernet0/0/1
1 5 Relay Tunnel Out-Interface: GigabitEthernet0/0/1
Relay token: 0x1
CE1 CE2 Original nexthop: 10.0.4.4 ASBR-PE2 allocates
Qos information : 0x0 label 1027 to the route.
192.168.1.1/24 192.168.2.1/24 Ext-Community:RT <2 : 2>
19 Huawei Confidential
Contents
20 Huawei Confidential
Inter-AS VPN Option B Overview
⚫ Compared with Option A, Option B does not require VPN instances to be created on ASBR-PEs and does not require
interfaces to be bound.
⚫ In Option B, two ASBRs use MP-EBGP to exchange VPNv4 routes received from the PEs in their respective ASs.
⚫ By default, a PE stores only the VPN routes that match the VPN targets of its local VPN instances. Therefore, ASBRs
can be configured not to filter routes based on RTs.
MP-EBGP
AS100 AS200
CE1 CE2
If ASBRs are not directly connected to CEs, VPN instances do not need to be created.
To disable VPN target-based filtering for received VPN routes, run the undo policy vpn-target command.
Interfaces connecting two ASBRs must support MPLS forwarding.
21 Huawei Confidential
Inter-AS VPN Option B Topology
⚫ A PE uses MP-IBGP to advertise a VPNv4 route to the ASBR-PE or VPN RR (with the ASBR-PE as the
client) in the same AS. The ASBR-PE uses MP-EBGP to advertise the VPNv4 route to the peer ASBR-PE
in another AS, and then the peer ASBR-PE advertises the VPNv4 route to the PE in the same AS.
IP/MPLS IP/MPLS
MP-IBGP MP-IBGP
AS100 AS200
EBGP
P1 P2
PE1 ASBR-PE2 PE2
ASBR-PE1
Site1 Site2
CE1 CE2
22 Huawei Confidential
Inter-AS VPN Option B: Control Plane Without RRs
1. CE1 advertises an IPv4 route to PE1.
MP-IBGP MP-IBGP
2. PE1 converts the IPv4 route into a
AS100 AS200 VPNv4 route, sets the next hop of the
EBGP
route to PE1, allocates the VPN label
V1 to the route, and advertises the
PE1 P1 P2 PE2 route to ASBR-PE1.
3. ASBR-PE1 changes the next hop of the
ASBR-PE1 ASBR-PE2 route to itself, allocates a new VPN
label V2 to the route, and uses MP-
Site1 5 5 6 6 Site2 EBGP to advertise the route for the
Tunnel Tunnel Tunnel Tunnel prefix Net1 to ASBR-PE2.
label label label label CE2
Net1 CE1
4. ASBR-PE2 sets the next hop of the
route to itself, allocates the VPN label
FEC: ASBR- FEC: ASBR- V3 to the route, and uses MP-IBGP to
FEC: PE1 FEC: PE1
PE2 PE2 advertise the route for the prefix Net1
Label: T1 Label: T2 Label: T3 Label: T4
1 3 7 to PE2.
VPNv4 routing 5. PE1 and P1 allocate tunnel labels T1
IPv4 routing 2 VPNv4 routing 4 VPNv4 routing IPv4 routing and T2 respectively to the routes
destined for PE1.
IPv4: Net1 VPNv4: IPv4: 6. ASBR-PE2 and P2 allocate tunnel labels
VPNv4: RD1+Net1 VPNv4: RD1+Net1 Net1 T3 and T4 respectively to the routes
NH: CE1 RD1+Net1
NH: ASBR-PE1 NH: ASBR-PE2 NH: PE2 destined for ASBR-PE2.
NH: PE1
VPN label: V1 VPN label: V2 VPN label: V3 7. PE2 converts the VPNv4 route into an
IPv4 route, sets the next hop to PE2,
and advertises the route to CE2.
23 Huawei Confidential
Inter-AS VPN Option B: Control Plane with RRs
⚫ When there are a large number of VPN instances, RRs can be deployed. As shown in the figure, the PEs and ASBRs in ASs establish
MP-BGP peer relationships only with RRs, and the RRs are responsible for reflecting routes. The PEs and ASBRs do not need to
establish BGP peer relationships with each other.
⚫
The RRs are responsible only for transmitting VPNv4 routes on the control plane. During data forwarding, traffic does not pass
through the RRs.
Reflects routes
without RR1 P1 P2 RR2
forwarding
data.
PE1 PE2
ASBR-PE1 ASBR-PE2
Site1 Site2
EBGP
MP-IBGP
24 Huawei Confidential
25 Huawei Confidential
Inter-AS VPN Option B Characteristics
⚫ The advantage of Option B is that all traffic is forwarded by ASBRs. In this way, traffic is controllable,
but the loads on the ASBRs are heavy because the ASBRs need to save a large number of VPNv4
routes. BGP routing policies, such as VPN target-based filtering policies, can be configured on ASBRs, so
that ASBRs only save some of VPNv4 routes.
⚫ The disadvantage is that VPN routing information is stored on and forwarded by ASBRs. If a large
number of VPN routes exist, the overloaded ASBRs tend to become faulty points. Therefore, in
scenarios where MP-EBGP is used, ASBRs that maintain VPN routing information generally do not
perform IP forwarding on the public network.
⚫ Option B is better than Option A when a large number of VRF instances need to communicate with
each other.
26 Huawei Confidential
Contents
27 Huawei Confidential
Inter-AS VPN Option B Configuration Example (1)
⚫
Configuration roadmap
AS100 GE2/0/0 AS200
10.0.34.0/24 Configure basic MPLS capabilities and MPLS LDP on the MPLS
P1 ASBR-PE1 ASBR-PE2 P2 backbone network to establish LDP LSPs in each AS. (The
PE1 PE2 configuration details are not provided here.)
Establish an MP-IBGP peer relationship between the PE and ASBR-PE
in each AS to exchange VPN routing information. (The configuration
CE1 CE2
details are not provided here.)
192.168.1.1/24 192.168.2.1/24
Configure a VPN instance on the PE connected to the CE in each AS
and establish EBGP peer relationships between the PE and CE to
⚫
CE1 and CE2 belong to the same VPN named vpna. CE1 and
exchange VPN routing information. (The configuration details are
CE2 need to communicate with each other using Option B. not provided here.)
Device Loopback0 RD RT Enable MPLS on the interfaces connecting the ASBRs, establish an
PE1 10.0.1.1/32 100:1 1:1 Data plan MP-EBGP peer relationship between the ASBRs, and configure the
ASBR-PE1 10.0.3.3/32 / / ASBRs not to filter received VPNv4 routes based on RTs.
28 Huawei Confidential
Inter-AS VPN Option B Configuration Example (2)
1. Take ASBR-PE1 as an example to establish an MP-EBGP peer relationship
between ASBR-PE1 and ASBR-PE2, configure ASBR-PE1 not to filter
received VPNv4 routes based on the VPN target, and enable ASBR-PE1 to
AS100 GE2/0/0 AS200 allocate labels based on the next hop.
10.0.34.0/24 [ASBR-PE1] bgp 100
P1 ASBR-PE1 ASBR-PE2 P2 [ASBR-PE1-bgp] peer 10.0.34.4 as-number 200
PE1 PE2 [ASBR-PE1-bgp] ipv4-family vpnv4
[ASBR-PE1-bgp-af-vpnv4] peer 10.0.34.4 enable
[ASBR-PE1-bgp-af-vpnv4] undo policy vpn-target
[ASBR-PE1-bgp-af-vpnv4] apply-label per-nexthop
CE1 CE1 [ASBR-PE1-bgp-af-vpnv4] quit
[ASBR-PE1-bgp] quit
192.168.1.1/24 192.168.2.1/24
By default, an ASBR allocates a label to each VPNv4 route to be
advertised to its MP-BGP peers. After this command is run, ASBR-PE1
allocates a label to the routes with the same next hop and outgoing label.
3. Take ASBR-PE1 as an example to establish an MP-IBGP peer relationship
between ASBR-PE1 and PE1.
2. Take ASBR-PE1 as an example to enable MPLS on the interfaces
[ASBR-PE1] bgp 100
connecting ASs.
[ASBR-PE1-bgp] peer 10.0.1.1 as-number 100
[ASBR-PE1-bgp] peer 10.0.1.1 connect-interface loopback 0 [ASBR-PE1] interface gigabitethernet 2/0/0
[ASBR-PE1-bgp] ipv4-family vpnv4 [ASBR-PE1-GigabitEthernet2/0/0] mpls
[ASBR-PE1-bgp-af-vpnv4] peer 10.0.1.1 enable [ASBR-PE1-GigabitEthernet2/0/0] quit
[ASBR-PE1-bgp-af-vpnv4] quit
[ASBR-PE1-bgp] quit To differentiate between VPN instances, ASBRs advertise VPNv4 routes
to each other. Because the VPNv4 routes carry label information, the
interfaces connecting ASBRs must support label forwarding.
29 Huawei Confidential
Verifying the Configuration (1)
1. Check CE1's routing information on ASBR-PE1.
<ASBR-PE1>display bgp vpnv4 all routing-table 192.168.1.0
AS100 GE2/0/0 AS200 BGP local router ID : 10.0.3.3
Local AS number : 100
10.0.34.0/24 Total routes of Route Distinguisher(100:1): 1
P1 ASBR-PE1 ASBR-PE2 P2 BGP routing table entry information of 192.168.1.0/24:
PE1 PE2 Label information (Received/Applied): 1026/1026
From: 10.0.1.1 (10.0.1.1)
Route Duration: 00h07m32s
Relay IP Nexthop: 10.0.23.2
CE1 CE2 Relay IP Out-Interface: GigabitEthernet0/0/0
Relay Tunnel Out-Interface: GigabitEthernet0/0/0
192.168.1.1/24 192.168.2.1/24 Relay token: 0x2
Original nexthop: 10.0.1.1
Qos information : 0x0
⚫
The process of transmitting intra-area routing information is Ext-Community:RT <1 : 1> # The export RT value must match the
import RT value of PE2.
not described here. This example describes only the key AS-path 65000, origin igp, MED 0, localpref 100, pref-val 0, valid,
procedure of transmitting routing information. internal, best, select, pre 255, IGP cost 2
Advertised to such 1 peers:
10.0.34.4
PE1 allocates the label 1026 to the route. When routes are transmitted
between ASs, ASBR-PE1 changes the next hop to itself. Therefore, ASBR-
PE1 re-allocates the label 1026 when advertising routes to ASBR-PE2.
MPLS labels are local to a device, so different devices can allocate the
same label.
30 Huawei Confidential
Verifying the Configuration (2)
2. Check CE1's routing information on ASBR-PE2.
<ASBR-PE2>display bgp vpnv4 all routing-table 192.168.1.0
BGP local router ID : 10.0.4.4
Local AS number : 200
Total routes of Route Distinguisher(100:1): 1
BGP routing table entry information of 192.168.1.0/24:
Label information (Received/Applied): 1026/1032
From: 10.0.34.3 (10.0.3.3)
Route Duration: 00h02m18s
Relay Tunnel Out-Interface: GigabitEthernet0/0/1
AS100 GE2/0/0 AS200 Relay token: 0x1
Original nexthop: 10.0.34.3
10.0.34.0/24 Qos information : 0x0
P1 ASBR-PE1 ASBR-PE2 P2 Ext-Community:RT <1 : 1>
PE1 PE2 AS-path 100 65000, origin igp, pref-val 0, valid, external, best, select, pre
2
55
Advertised to such 1 peers:
CE1 CE2 10.0.6.6
192.168.1.1/24 192.168.2.1/24
ASBR-PE1 allocates the label 1026 to the route. When
advertising the route to PE2, ASBR-PE2 changes the next hop of
the route to itself and re-allocates the label 1032 to the route.
31 Huawei Confidential
Verifying the Configuration (3)
192.168.1.1/24 192.168.2.1/24
32 Huawei Confidential
Contents
▫ Basic Configurations
33 Huawei Confidential
Inter-AS VPN Option C Overview
⚫
In Option C, ASBRs do not store VPNv4 routes or advertise VPNv4 routes to each other. This is different from the implementation in
Option A and Option B.
⚫ In Option C, PEs in different ASs establish a multi-hop EBGP connection with each other to exchange VPNv4 routes. Two solutions
are available to enable PEs to communicate with each other:
Solution 1: An ASBR uses BGP to send the routes destined for a PE in another AS to the local PE.
Solution 2: An ASBR imports the routes destined for a PE in another AS to an IGP.
⚫
ASBRs do not have VPNv4 routes. To prevent routing blackholes during packet forwarding, PEs need to transmit packets over tunnels
so that non-PE devices are unaware of VPN encapsulation information. Therefore, both the solutions require ASBRs to advertise
labeled routes to set up outer forwarding tunnels between ASs.
34 Huawei Confidential
Solution 1 Solution 2
AS100 AS200
PE1 P1 P2 PE2
ASBR1 ASBR2
Site1 Site2
CE1 CE2
IPv4
VPN
LDP LSP
BGP LSP
35 Huawei Confidential
• If the P device of each AS knows the routes to the PEs of other ASs, the data
forwarding process will be relatively simple. But if the P device does not know
these routes, then when a PE receives VPN data from a CE, the PE will add three
labels. The bottom label is the VPN label that is allocated by the peer PE and
associated with VPN routes, the middle label is the label allocated by an ASBR
and associated with the route to the peer PE, and the outer label is the label
associated with the route to the next-hop ASBR.
• Note: For convenience, as shown in the figure above, a symmetric LSP is used for
illustration, but in fact, in the working process of the control plane and the data
plane, the LSP of the ASs at both ends is asymmetric.
Solution 1 Solution 2
36 Huawei Confidential
Solution 1 Solution 2
Reflects routes
without RR1 P1 P2 RR2
forwarding
data.
PE1 PE2
ASBR1 ASBR2
Site1 Site2
Unicast BGP peer relationship
Net1 CE1 MP-BGP CE2
37 Huawei Confidential
Solution 1 Solution 2
Net1 Net1 Net1 Net1 Net1 Net1 Net1 5. After receiving the packet, ASBR1
removes the BGP label B1 and checks its
V1 V1 V1 V1 V1 forwarding table. It finds the label T2
T1 T2 B1 B2 B2 associated with the route destined for
T3 T4 PE1, adds T2 to the top of the label
stack, and forwards the packet to P1.
7 6 5 4 3 2 1
6. P1 swaps the outer label T2 with T1 and
forwards the packet to PE1.
7. PE1 removes all labels from the packet
and forwards the packet to CE1.
38 Huawei Confidential
Solution 1 Solution 2
39 Huawei Confidential
Solution 1 Solution 2
40 Huawei Confidential
Solution 1 Solution 2
41 Huawei Confidential
Solution 1 Solution 2
PE1 P1 P2 PE2
ASBR1 ASBR2
Site1 Site2
CE1 CE2
IPv4
VPN
LDP LSP
BGP LSP
42 Huawei Confidential
Solution 1 Solution 2
43 Huawei Confidential
Solution 1 Solution 2
Reflects routes
without RR1 P1 P2 RR2
forwarding data.
PE1 PE2
ASBR1 ASBR2
Site1 Site2
Unicast BGP peer relationship
CE2
Net1 CE1 MP-BGP peer relationship
44 Huawei Confidential
Solution 1 Solution 2
45 Huawei Confidential
Inter-AS VPN Option C Characteristics
⚫ VPN routes are directly exchanged between the ingress and egress PEs. The routes do not need to be
stored or forwarded by intermediate devices.
⚫ Only PEs maintain VPN routing information, and Ps and ASBRs are only responsible for packet
forwarding. This means that the intermediate devices only need to support MPLS forwarding instead of
MPLS VPN services. ASBRs are no longer bottlenecks. Option C, therefore, is suitable for VPNs spanning
multiple ASs.
⚫ MPLS VPN load balancing is easy to implement using Option C.
⚫ The disadvantage of Option C is that it costs too much to manage an end-to-end connection between
PEs.
46 Huawei Confidential
Comparison of Three Inter-AS VPN Solutions
Inter-AS
VPN Description
Solution
• Easy configuration: MPLS is not required between ASBRs, and no special configuration is required for inter-AS
connections.
• Poor scalability: ASBRs need to manage all VPN routes, and a VPN instance needs to be configured for each VPN.
This results in numerous VPNv4 routes on the ASBRs. In addition, because common IP forwarding is implemented
Option A
between ASBRs, each inter-AS VPN requires a different interface, which can be a sub-interface, physical interface,
or bundled logical interface. This poses high requirements for ASBRs. If a VPN spans multiple ASs, the intermediate
ASs must support VPN services. This requires complex configurations and greatly affects the intermediate ASs. If
only a few inter-AS VPN instances are used, Option A is recommended.
• Unlike Option A, Option B is not restricted by the number of links between ASBRs.
• If a large number of VPN routes exist, the overloaded ASBRs tend to become faulty points. Therefore, in scenarios
Option B
where MP-EBGP is used, ASBRs that maintain VPN routing information generally do not perform IP forwarding on
the public network.
• VPN routes are directly exchanged between the ingress and egress PEs. The routes do not need to be stored or
forwarded by intermediate devices.
• Only PEs maintain VPN routing information, and Ps and ASBRs are only responsible for packet forwarding. This
Option C means that the intermediate devices only need to support MPLS forwarding instead of MPLS VPN services. ASBRs
are no longer bottlenecks. Option C, therefore, is suitable for VPNs spanning multiple ASs.
• MPLS VPN load balancing is easy to implement using Option C.
• The disadvantage of Option C is that it costs too much to manage an end-to-end BGP LSP between PEs.
47 Huawei Confidential
Contents
48 Huawei Confidential
Solution 1 Solution 2
49 Huawei Confidential
Solution 1 Solution 2
50 Huawei Confidential
Solution 1 Solution 2
51 Huawei Confidential
Solution 1 Solution 2
52 Huawei Confidential
Solution 1 Solution 2
53 Huawei Confidential
Solution 1 Solution 2
54 Huawei Confidential
Solution 1 Solution 2
55 Huawei Confidential
Solution 1 Solution 2
56 Huawei Confidential
Solution 1 Solution 2
57 Huawei Confidential
Solution 1 Solution 2
RR1 RR2 6. On ASBR-PE1, establish LDP LSPs for labeled BGP routes of the
public network.
CE1 CE2
[ASBR-PE1] mpls
192.168.1.1/24 192.168.2.1/24 [ASBR-PE1-mpls] lsp-trigger bgp-label-route
[ASBR-PE1-mpls] quit
59 Huawei Confidential
Solution 1 Solution 2
60 Huawei Confidential
Solution 1 Solution 2
61 Huawei Confidential
Solution 1 Solution 2
62 Huawei Confidential
Solution 1 Solution 2
192.168.1.1/24 192.168.2.1/24
63 Huawei Confidential
Solution 1 Solution 2
64 Huawei Confidential
Quiz
1. (Single-answer question) Which of the following inter-AS VPN solutions does not require ASBRs to
save CE-side routing information? ( )
A. Option A
B. Option B
C. Option C
2. (Single-answer question) When only LDP or BGP is used to allocate labels, which of the following
inter-AS VPN solutions may use three types of labels during packet forwarding? ( )
A. Option A
B. Option B
C. Option C
65 Huawei Confidential
1. C
2. C
Summary
⚫ When VPN routing information is exchanged between ASs, three inter-AS VPN solutions are
proposed in related standards:
Option A: It features simple configurations as MPLS does not need to run between ASBRs. It is
applicable to the scenario with a small number of VPNs.
Option B: It does not require interfaces to be created for each inter-AS VPN. All traffic is forwarded
by ASBRs, facilitating traffic control but burdening ASBRs. When there are a large number of VPN
routes, ASBRs are overloaded and may become a bottleneck.
Option C: It does not require ASBRs to maintain or advertise VPN-IPv4 routes because these routes
are directly exchanged between PEs. Option C is applicable to scenarios where multiple ASs are
spanned. The disadvantage of Option C is that it costs too much to manage an end-to-end BGP LSP
between PEs.
66 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
⚫ VPLS cannot implement load balancing, simplify network deployment, provide flexible L2VPN
deployment, or improve link efficiency in CE multi-homing scenarios. Ethernet Virtual Private Network
(EVPN) solves these problems.
⚫ Defined in RFC7432, EVPN introduces the control plane to control MAC address learning. EVPN has
been continuously expanded to support both L2VPN and L3VPN.
⚫ EVPN has been widely used in various scenarios, such as WANs, data centers (DCs), and campus
networks.
⚫ This document describes the background, fundamentals, typical route types, and application scenarios
of EVPN.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
2. EVPN Fundamentals
3. Inter-AS EVPN
3 Huawei Confidential
VPLS Overview
⚫ VPLS is an Ethernet-based L2VPN technology. It provides services similar to LAN services on an MPLS network and
allows users to access the network from multiple geographical locations and communicate with each other.
⚫ Implementing VPLS involves three steps: creating tunnels and pseudo wires (PWs), creating virtual switch instances
(VSIs), and binding PWs and attachment circuits (ACs) to VSIs.
Enterprise Enterprise
A CE1 A CE2
192.168.2.1 192.168.2.2
4 Huawei Confidential
VPLS Fundamentals: Creating Tunnels and PWs
⚫ To implement VPLS, you need to establish a tunnel between PE1 and PE2 and then create PWs to carry
services of different enterprise customers.
Enterprise Enterprise
A CE1 A CE2
PW A carries enterprise A's services.
192.168.1.1 192.168.1.2
PW A PW A
Tunnel
PW B PW B
PE1 PE2
Enterprise Enterprise
B CE3 PW B carries enterprise B's services. B CE4
192.168.2.1 192.168.2.2
5 Huawei Confidential
VPLS Fundamentals: Creating VSIs
⚫ A VSI is an independent virtual switching unit for each VPLS service. A VSI stores an independent MAC
address table, forwards packets, and terminates PWs.
Enterprise Enterprise
A CE1 A CE2
VSI A VSI A
192.168.1.1 192.168.1.2
MAC A MAC A
PE1 PE2
Enterpris Enterprise
e B CE3 VSI B VSI B B CE4
MAC B MAC B
192.168.2.1 192.168.2.2
6 Huawei Confidential
VPLS Fundamentals: Binding PWs and ACs to VSIs
⚫ An attachment circuit (AC) is a link between a CE and a PE. After a PW and an AC are bound to a VSI,
the VSI works like a switch. The VSI records the MAC addresses learned by different interfaces and
generates MAC address entries.
Enterprise Enterprise
A CE1 A CE2
Bind the AC and PW
to the VSI.
AC
VSI A VSI A
192.168.1.1 192.168.1.2
MAC A MAC A
PW A PW A
Tunnel
PW B PW B
PE1 PE2
Enterprise Enterprise
B CE3 VSI B VSI B B CE4
MAC B MAC B
192.168.2.1 192.168.2.2
7 Huawei Confidential
⚫
The forwarding behavior is determined by examining the MAC address table. If packets match an entry in the MAC address table,
packets are forwarded according to the table. Otherwise, packets are flooded for forwarding.
Enterprise Enterprise
A CE1 A CE2
Access from 192.168.1.1 to 192.168.1.2
VSI A VSI A
192.168.1.1 192.168.1.2
MAC A MAC A
PW A PW A
Tunnel
CE1 sends an PE1 PE2 PE2 forwards the
1 ARP request. Outbound 4 ARP request.
Outbound MAC
MAC Interface
Interface
DMAC ALL 1-1-1 Port1 1-1-1 PWA DMAC ALL
SMAC 1-1-1 SMAC 1-1-1
DIP 192.168.1.2 2 PE1 generates a MAC 3 PE2 receives the ARP DIP 192.168.1.2
SIP 192.168.1.1 address entry and floods the request and generates SIP 192.168.1.1
received ARP request to all a MAC address entry in
ARP request the PWs bound the VSI. the VSI. ARP request
8 Huawei Confidential
VPLS Challenge 1: Uneven Load Balancing Due to Single-
Active Access
⚫
In VPLS, if a ring topology is achieved when a CE is dual-homed to two PEs, the loop-free forwarding path is formed by blocking a
port. This is the same as the loop prevention technology (STP) of switches. Therefore, VPLS access works in active/standby mode.
⚫ There is only one link between the CE and PE for traffic forwarding, and multiple paths cannot be formed between PEs. As a result,
some links may be congested.
PE1 P PE3
CE1 CE2
PE2 P PE4
1 The standby link between the CE and 2 Multiple paths cannot be formed
PE does not forward data. between PEs.
9 Huawei Confidential
VPLS Challenge 2: Slow Fault Convergence
⚫ After detecting a link fault, PE3 sends a MAC Withdraw message to the peer PE, instructing the peer PE to delete
the MAC address of PE3. PE4 changes the standby link to the active state. After receiving the Withdraw message,
PE1 clears the corresponding MAC address and learn MAC addresses again. The fault convergence time is closely
related to the number of MAC addresses.
PE1 receives the MAC Withdraw message, clears PE3 detects a fault and sends a MAC
3 the corresponding MAC address, and learns MAC 1 Withdraw message to instruct PE1 to clear
addresses again for about 10 seconds. the MAC address of PE3 (within subseconds).
PE1 P PE3
CE1 CE2
10 Huawei Confidential
EVPN Overview
⚫ EVPN changes the traditional MAC address learning mode on the L2VPN data plane. It introduces the control plane to learn MAC
addresses and IP addresses for data forwarding, implementing forwarding-control separation.
⚫
EVPN implements active-active, fast convergence, and simplified O&M, resolving typical problems of traditional L2VPNs.
⚫ EVPN uses Multiprotocol Border Gateway Protocol (MP-BGP) on the control plane and supports multiple types of tunnels on the
data plane, such as MPLS tunnels, GRE tunnels, and Segment Routing over IPv6 (SRv6) tunnels. In this course, MPLS is used as the
outer tunnel forwarding technology.
Control plane: PEs exchange BGP EVPN packets to transmit MAC addresses and IP addresses.
PE4
Broadcast traffic optimization
CE1 PE2 CE2
Equal-cost multi-path routing
(ECMP)
EVPN peer relationship
Data plane: Data forwarding paths are formed by IP tunnels or MPLS label forwarding paths. The data plane
is only responsible for forwarding data and does not need to broadcast packets to learn MAC addresses.
11 Huawei Confidential
EVPN Terms
⚫ An Ethernet segment (ES) is a group of Ethernet links that connect a user site (device or network) to a PE. An ES is
identified by an Ethernet Segment Identifier (ESI).
⚫ An EVPN instance (EVI) identifies an EVPN client.
⚫ BUM labels are carried in EVPN Type 3 routes to forward BUM traffic.
⚫ Unicast labels are carried in Type 2 routes to forward unicast traffic.
12 Huawei Confidential
PE1 PE3
ES ES
CE1 CE2
PE2 PE4
13 Huawei Confidential
ESI Format
T ype ESI Value
(1 byte) (9 bytes)
Static ESI configuration example.
⚫ Type 0: The ESI is manually configured by the
[*PE1] interface eth-trunk 10
administrator. [*PE1-Eth-Trunk10] esi 0000.1111.2222.1111.1111
⚫ Type 1: If LACP is used between a PE and a CE, the View ESI information.
ESI is the CE LACP System MAC address (6 bytes) +
<PE1> display bgp evpn all esi
CE LACP Port Key (2 bytes) + 0x00 (1 byte). Number of ESI for EVPN address family: 1
ESI IFName/Bridge-domain
⚫ Type 2: The ESI is automatically generated by MSTP. 0000.1111.2222.1111.1111 Eth-Trunk10
14 Huawei Confidential
• Currently, ESIs of Type 2, Type 3, Type 4 and Type 5 are not used on Huawei
devices.
Basic EVPN Terms: EVI and MAC-VRF
⚫ An EVI identifies an EVPN client.
⚫ A MAC-VRF table is a MAC address table that belongs to an EVI on a PE.
PE1 PE3
ES ES
CE1 CE2
PE2 PE4
EVI 1
EVI 1 and EVI 2 have independent MAC
MAC-VRF
address tables, which can be used to
EVI 2
MAC-VRF distinguish different services or customers.
15 Huawei Confidential
Basic EVPN Terms: RD and RT
⚫ An RD is the unique identifier of an EVPN and identifies an EVI.
⚫ RTs are used to label routes to control the import of EVPN routes.
PE1 PE3
ES ES
CE1 CE2
PE2 PE4
RD 1:1 identifies EVI 1. EVI 1(RD 1:1, RT 10:10)
MAC-VRF
16 Huawei Confidential
Contents
2. EVPN Fundamentals
◼ EVPN Route Overview and Interaction Process
▫ EVPN Route Types
▫ EVPN Access Principles
3. Inter-AS EVPN
18 Huawei Confidential
Functions of Four Types of EVPN Routes
⚫ RFC7432 defines four types of EVPN routes: Type 1 to Type 4. With the development of the EVPN
protocol, more and more routes are redefined. The following describes four types of EVPN routes.
19 Huawei Confidential
• Up to now, 11 route types have been defined in the RFC and draft. Type 1 to
Type 5 are relatively mature. Type 5 is in the draft phase. Type 6 to Type 11 are
used for multicast traffic optimization and are not mature.
EVPN Working Process
⚫ The EVPN process is divided into two phases:
Startup phase
◼ EVPN peers exchange EVPN Type 3 routes to establish the BUM traffic forwarding table.
◼ EVPN peers exchange Type 4 routes to complete ES discovery and DF election (in ES multi-homing scenarios).
◼ EVPN peers exchange Type 1 routes and ESI labels to implement split horizon and aliasing.
Traffic forwarding phase: CE-side traffic triggers a PE to advertise the MAC address through a Type 2 route. The route carries
assigned label information. The PE then forwards unicast traffic based on the label.
PE1 P PE3 BUM traffic forwarding table
setup (Type 3)
DF election (Type 4)
Aggregated
port
PE2 P PE4 EVPN traffic forwarding (Type 2)
20 Huawei Confidential
⚫ The following describes the generation process and functions of the three tables.
21 Huawei Confidential
Creating an EVPN Instance Locally
⚫ Create an EVPN instance on each PE and configure an RD and an RT for the instance. EVPN is then activated locally
on the PE, and the MAC-VRF table with empty content is generated.
EVI 1 EVI 1
MAC-VRF MAC-VRF
PE1 PE3
CE1 CE2
P
PE2 PE4
EVI 1 EVI 1
MAC-VRF MAC-VRF
MPLS backbone
network
22 Huawei Confidential
EVI 1 EVI 1
PE1 Type 3 route
MAC-VRF RD = rd1 MAC-VRF
Label = 101
PE1 PE3
CE1 CE2
PE2 PE4
EVI 1 EVI 1
MAC-VRF MAC-VRF
23 Huawei Confidential
Type 3 Route Type 4 Route Type 1 Route Type 2 Route
PE1 PE3
CE1 CE2
PE2 PE4
24 Huawei Confidential
Type 3 Route Type 4 Route Type 1 Route Type 2 Route
25 Huawei Confidential
Binding an Interface to an EVPN Instance
⚫ A CE is dual-homed to PEs in active-active mode. Bind the interface connecting to the CE to the EVPN instance on
each PE. Packets received by the interface are then sent to the EVPN instance.
BUM traffic BUM traffic
EVI 1 forwarding table EVI 1 forwarding table
MAC-VRF Peer Label MAC-VRF Peer Label
PE2 102 PE1 101
PE3 103 PE2 102
PE4 104 PE4 104
PE1 PE3
CE1 CE2
PE2 PE4
BUM traffic BUM traffic
EVI 1 forwarding table EVI 1 forwarding table
MAC-VRF Peer Label Peer Label
MAC-VRF
PE1 101 PE1 101
PE3 103 PE2 102
PE4 104 PE3 103
26 Huawei Confidential
Type 3 Route Type 4 Route Type 1 Route Type 2 Route
EVI 1 EVI 1
MAC-VRF MAC-VRF
ESI 1 ESI 2
PE1 Type 4 route PE3 Type 4 route
RD = rd1 RD = rd3
ESI = ESI 1 ESI = ESI 2
PE1 PE3
CE1 CE2
PE2 PE4
EVI 1 EVI 1
ESI 1 MAC-VRF MAC-VRF ESI 2
27 Huawei Confidential
Type 3 Route Type 4 Route Type 1 Route Type 2 Route
DF Election (1)
⚫ When a CE is multi-homed to multiple PEs, only one PE forwards BUM traffic to the CE. The process of selecting
such a PE is DF election.
EVI 1 EVI 1
MAC-VRF MAC-VRF
EVI 1 EVI 1
ESI 1 MAC-VRF MAC-VRF ESI 2
ES member table ES member table
No. ESI Member Label No. ESI Member Label
0 ESI 1 PE2 0 ESI 2 PE3
1 ESI 1 PE1 1 ESI 2 PE4
28 Huawei Confidential
Type 3 Route Type 4 Route Type 1 Route Type 2 Route
DF Election (2)
⚫ PEs use a specific algorithm to elect a DF. In this example, PE2 and PE3 are elected as DFs, and only PE2 and PE3
are allowed to forward BUM traffic to CEs.
EVI 1 EVI 1
MAC-VRF MAC-VRF
EVI 1 EVI 1
ESI 1 MAC-VRF MAC-VRF ESI 2
ES member table ES member table
No. ESI Member Label No. ESI Member Label
DF Non-DF
0 ESI 1 PE2 0 ESI 2 PE3
1 ESI 1 PE1 1 ESI 2 PE4
29 Huawei Confidential
EVI 1 EVI 1
PE1 Type 1 route
MAC-VRF RD = rd1 MAC-VRF
ESI = ESI 1
ESI 1 ESI Label = 201 ES member table ESI 2
No. ESI Member Label
Non-DF DF 0 ESI 2 PE3
1 ESI 2 PE4
PE1 PE3
CE1 CE2
PE2 PE4
EVI 1 EVI 1
ESI 1 MAC-VRF MAC-VRF ESI 2
ES member table ES member table
No. ESI Member Label No. ESI Member Label
DF Non-DF
0 ESI 1 PE2 0 ESI 2 PE3
1 ESI 1 PE1 1 ESI 2 PE4
30 Huawei Confidential
Type 3 Route Type 4 Route Type 1 Route Type 2 Route
EVI 1 EVI 1
MAC-VRF MAC-VRF
ES member table ES member table
ESI 1 ESI 2
No. ESI Member Label No. ESI Member Label
0 ESI 1 PE2 202 0 ESI 2 PE3 203
Non-DF DF
1 ESI 1 PE1 201 1 ESI 2 PE4 204
PE1 PE3
CE1 CE2
PE2 PE4
EVI 1 EVI 1
ESI 1 MAC-VRF MAC-VRF ESI 2
ES member table ES member table
No. ESI Member Label No. ESI Member Label
DF 0 ESI 1 PE2 202 Non-DF 0 ESI 2 PE3 203
1 ESI 1 PE1 201 1 ESI 2 PE4 204
31 Huawei Confidential
Type 3 Route Type 4 Route Type 1 Route Type 2 Route
32 Huawei Confidential
EVPN Traffic Forwarding Phase
⚫ The EVPN traffic forwarding phase starts when the CE-side user traffic is initiated.
⚫ CE1 and CE2 are unaware of EVPN packet exchange between PEs.
⚫ In this example, the service process of CE1 accessing CE2 is as follows:
CE1 CE2
33 Huawei Confidential
Local MAC Address Learning
⚫ CE1 sends an ARP request to access CE2. PE1 receives the packet and generates a local MAC address entry.
PE1 PE3
CE1 CE2
PE2 PE4
EVI 1 EVI 1
MAC-VRF MAC-VRF Port 4
Port 2
ESI 2
ESI 1
DF Non-DF
34 Huawei Confidential
• The data packets sent by the CEs do not carry any label. Therefore, the incoming
label in the MAC-VRF table of PEs is NULL.
Type 3 Route Type 4 Route Type 1 Route Type 2 Route
PE1 PE3
CE1 CE2
PE2 PE4
EVI 1 EVI 1
MAC-VRF MAC-VRF Port 4
Port 2
ESI 2
ESI 1
DF Non-DF
35 Huawei Confidential
Type 3 Route Type 4 Route Type 1 Route Type 2 Route
PE1 PE3
CE1 CE2
PE2 PE4
EVI 1 EVI 1
MAC-VRF MAC-VRF
Next Next
MAC ESI Label MAC ESI Label
Port 2 Hop Hop Port 4
1-1-1 ESI 1 PE1 301 1-1-1 ESI 1 PE1 301 ESI 2
ESI 1
DF Non-DF
36 Huawei Confidential
Type 3 Route Type 4 Route Type 1 Route Type 2 Route
PE1 PE3
CE1 CE2
PE2 PE4
EVI 1 PE2 Type 2 route EVI 1
MAC-VRF RD = rd2 MAC-VRF
Next ESI = ESI 1 Next
MAC ESI Label MAC ESI Label
Port 2 Hop MAC = 1-1-1 Hop Port 4
1-1-1 ESI 1 Port2 NULL MPLS Label = 302 1-1-1 ESI 1 PE1 301 ESI 2
ESI 1
DF Non-DF
37 Huawei Confidential
Type 3 Route Type 4 Route Type 1 Route Type 2 Route
PE1 PE3
CE1 CE2
PE2 PE4
EVI 1 PE2 Type 2 route EVI 1
MAC-VRF RD = rd2 MAC-VRF
Next ESI = ESI 1 Next
MAC ESI Label MAC ESI Label
Port 2 Hop MAC = 1-1-1 Hop Port 4
1-1-1 ESI 1 Port2 NULL MPLS Label = 302 1-1-1 ESI 1 PE1 301 ESI 2
ESI 1 1-1-1 ESI 1 PE2 302
DF Non-DF
38 Huawei Confidential
ARP Broadcast Forwarding
⚫ The ARP request sent by CE1 reaches PE1. PE1 learns the MAC address of CE1 through the data plane and sends the
MAC address to all neighbors through a Type 2 route.
⚫ After the control plane behavior is completed, PE1 performs the data plane behavior, that is, forwards the ARP
broadcast request. Because PE3 is the DF, it forwards the ARP broadcast packet to CE2.
1 The control plane of PE1 advertises the MAC address.
2 The data plane of PE1 forwards the ARP packet.
3 PE3 forwards the ARP packet.
PE1 PE3
DF
ARP broadcast
CE1 CE2
PE2 PE4
39 Huawei Confidential
ARP Broadcast Forwarding: from PE1 to PE3
⚫ The ARP packet carrying label 103 from PE1 to PE3 is forwarded based on the BUM traffic forwarding table. PE3
functions as the DF and forwards the packet through Port3.
BUM traffic Tunnel BUM traffic
DMAC All DMAC All
SMAC 1-1-1 EVI 1 forwarding table 103 EVI 1 forwarding table SMAC 1-1-1
Peer Label DMAC All Peer Label
ARP request MAC-VRF MAC-VRF ARP request
PE2 102 SMAC 1-1-1 PE1 101
PE3 103 ARP request PE2 102
ESI 1 PE4 104 PE4 104 ESI 2
ES member table ES member table
Non-DF No. ESI Member Label DF No. ESI Member Label
0 ESI 1 PE2 202 0 ESI 2 PE3 203
1 ESI 1 PE1 201 1 ESI 2 PE4 204
PE1 PE3
CE1 CE2
BUM traffic BUM traffic
PE2 forwarding table PE4 forwarding table
Peer Label Peer Label
EVI 1 PE1 101 EVI 1 PE1 101
PE3 103 PE2 102
ESI 1 MAC-VRF PE4 104 MAC-VRF PE3 103 ESI 2
ES member table ES member table
No. ESI Member Label No. ESI Member Label
DF 0 ESI 1 PE2 202 Non-DF 0 ESI 2 PE3 203
1 ESI 1 PE1 201 1 ESI 2 PE4 204
40 Huawei Confidential
• PE1 forwards the ARP packet to all members based on the BUM traffic
forwarding table.
ARP Broadcast Forwarding: from PE1 to PE4
⚫ Traffic from PE1 to PE4 carries label 104. PE4 determines that the traffic is BUM traffic based on the label and
discards the traffic because PE4 is a non-DF.
DMAC All BUM traffic BUM traffic DMAC All
forwarding table Tunnel
SMAC 1-1-1 EVI 1 EVI 1 forwarding table SMAC 1-1-1
Peer Label 104 Peer Label
ARP request MAC-VRF MAC-VRF ARP request
PE2 102 DMAC All PE1 101
PE3 103 SMAC 1-1-1 PE2 102
ESI 1 PE4 104
ARP request PE4 104 ESI 2
ES member table ES member table
Non-DF No. ESI Member Label DF No. ESI Member Label
0 ESI 1 PE2 202 0 ESI 2 PE3 203
1 ESI 1 PE1 201 1 ESI 2 PE4 204
PE1 PE3
CE1 CE2
BUM traffic BUM traffic
PE2 forwarding table PE4 forwarding table
Peer Label Peer Label
EVI 1 PE1 101 EVI 1 PE1 101
PE3 103 PE2 102
ESI 1 MAC-VRF PE4 104 MAC-VRF PE3 103 ESI 2
ES member table ES member table
No. ESI Member Label No. ESI Member Label
DF 0 ESI 1 PE2 202 Non-DF 0 ESI 2 PE3 203
1 ESI 1 PE1 201 1 ESI 2 PE4 204
41 Huawei Confidential
• Only the router that is elected as the DF forwards BUM traffic to CEs.
ARP Broadcast Forwarding: from PE1 to PE2
⚫ Because PE1 and PE2 belong to the same ES, traffic from PE1 to PE2 carries both the ESI label 202 and the BUM
label 102. After receiving the packet, PE2 finds that the packet carrying the label 202 and discards the packet.
DMAC All BUM traffic BUM traffic DMAC All
SMAC 1-1-1 EVI 1 forwarding table EVI 1 forwarding table SMAC 1-1-1
Peer Label Peer Label
ARP request MAC-VRF MAC-VRF ARP request
PE2 102 Tunnel PE1 101
PE3 103 102 PE2 102
ESI 1 PE4 104 202 PE4 104 ESI 2
ES member table DMAC All ES member table
Non-DF No. ESI Member Label SMAC 1-1-1 DF No. ESI Member Label
0 ESI 1 PE2 202 ARP request 0 ESI 2 PE3 203
1 ESI 1 PE1 201 1 ESI 2 PE4 204
PE1 PE3
CE1 CE2
BUM traffic BUM traffic
PE2 forwarding table PE4 forwarding table
Peer Label Peer Label
Split horizon is
EVI 1 PE1 101
implemented EVI 1 PE1 101
PE3 103 PE2 102
ESI 1 MAC-VRF PE4 104
using the ESI MAC-VRF PE3 103 ESI 2
labels assigned to
ES member table Type 1 routes. ES member table
No. ESI Member Label No. ESI Member Label
DF 0 ESI 1 PE2 202 Non-DF 0 ESI 2 PE3 203
1 ESI 1 PE1 201 1 ESI 2 PE4 204
42 Huawei Confidential
• ESI labels are used to prevent CE traffic from being looped back.
Unicast ARP Reply
⚫ CE2 sends a unicast ARP reply. PE3 learns the MAC address of CE2 and sends a Type 2 route to trigger
the EVPN control plane behavior. PE3 searches the MAC address table to forward the unicast ARP
packet to PE1. Finally, PE1 forwards the ARP packet to CE1.
CE1 CE2
PE2 PE4
43 Huawei Confidential
Unicast ARP Reply: Local MAC Address Learning
⚫ CE2 sends a unicast ARP reply. PE3 learns the MAC address of CE2 through the data plane and generates a local
MAC-VRF entry.
EVI 1 EVI 1 DMAC 1-1-1
MAC-VRF MAC-VRF SMAC 2-2-2
MAC ESI Next Hop Label MAC ESI Next Hop Label ARP reply
1-1-1 ESI 1 Port1 NULL
1-1-1 ESI 1 PE1 301
Port 1 1-1-1 ESI 1 PE2 302 Port 3
ESI 1 2-2-2 ESI 2 Port 3 NULL ESI 2
Non-DF DF
PE1 PE3
CE1 CE2
PE2 PE4
EVI 1 EVI 1
MAC-VRF MAC-VRF
MAC ESI Next Hop Label MAC ESI Next Hop Label
Port 2 1-1-1 ESI 1 Port2 NULL 1-1-1 ESI 1 PE1 301 Port 4
1-1-1 ESI 1 PE2 302 ESI 2
ESI 1
DF Non-DF
44 Huawei Confidential
Type 3 Route Type 4 Route Type 1 Route Type 2 Route
DF Non-DF
45 Huawei Confidential
Type 3 Route Type 4 Route Type 1 Route Type 2 Route
46 Huawei Confidential
Unicast ARP Reply: Data Plane Forwarding
⚫ PE3 uses a load balancing algorithm to find a next hop (for example, PE1) for sending packets carrying label 301.
After receiving the packet, PE1 forwards the packet through Port1.
Tunnel
DMAC 1-1-1 EVI 1 EVI 1 DMAC 1-1-1
MAC-VRF 301
SMAC 2-2-2 MAC-VRF SMAC 2-2-2
MAC ESI Next Hop Label DMAC 1-1-1
ARP reply MAC ESI Next Hop Label ARP reply
SMAC 2-2-2
1-1-1 ESI 1 Port1 NULL 1-1-1 ESI 1 PE1 301
ARP reply
Port 1 2-2-2 ESI 2 PE3 303 1-1-1 ESI 1 PE2 302 Port 3
2-2-2 ESI 2 PE4 304 2-2-2 ESI 2 Port 3 NULL
ESI 1 ESI 2
Non-DF DF
PE1 PE3
CE1 CE2
PE2 PE4
EVI 1 EVI 1
MAC-VRF MAC-VRF
MAC ESI Next Hop Label MAC ESI Next Hop Label
Port 2 1-1-1 ESI 1 Port2 NULL 1-1-1 ESI 1 PE1 301 Port 4
2-2-2 ESI 2 PE3 303 1-1-1 ESI 1 PE2 302 ESI 2
ESI 1
2-2-2 ESI 2 PE4 304 2-2-2 ESI 2 Port 4 NULL
DF Non-DF
47 Huawei Confidential
• PE3 searches the MAC-VRF table based on the destination MAC address (1-1-1)
of the packet and finds that there are two next hops: PE1 and PE2. PE3 uses a
load balancing algorithm to select an appropriate next hop (for example, PE1)
for packet forwarding.
• After receiving the ARP reply, PE1 searches the MAC-VRF table and sends the
packet through Port1.
Summary: EVPN Solves the Problems Brought by the Active-
Active Mode
⚫ ESIs carried in Type 1 routes prevent loops on the CE side. Type 4 routes are used for DF election, preventing
multiple copies of broadcast traffic from being sent to CEs.
PE1 PE3
CE1 CE2
PE2 PE4
48 Huawei Confidential
Summary: EVPN Implements Load Balancing
⚫ EVPN implements full-path load balancing.
Data 1
EVI 1 MAC-VRF EVI 1 MAC-VRF
Data 2 Next Next
MAC ESI Label MAC ESI Label Data 1
Data 3 Hop Hop
1-1-1 ESI 1 Port1 NULL 1-1-1 ESI 1 PE1 301
Data 3
Data 4 2-2-2 ESI 2 PE3 303 1-1-1 ESI 1 PE2 302
Non-DF 2-2-2 ESI 2 PE4 304 DF 2-2-2 ESI 2 Port 3 NULL
PE1 PE3
CE1 CE2
PE2 PE4
49 Huawei Confidential
• CE1 sends traffic to PE1 and PE2 over two active paths for load balancing.
Because PE1 and PE2 each have established two paths to CE2, traffic can be load
balanced between the two paths. Finally, four service data flows are sent to CE2
over different paths.
Summary: EVPN Achieves Fast Convergence
⚫ After detecting a link fault on CE2, PE3 deletes the local MAC address entry and sends a Type 1 route to instruct
other PEs to withdraw all the MAC addresses associated with an ES.
EVI 1 MAC-VRF EVI 1 MAC-VRF
MAC ESI Next Hop Label MAC ESI Next Hop Label
1-1-1 ESI 1 Port1 NULL 1-1-1 ESI 1 PE1 301
2-2-2 ESI 2 PE3 303 1-1-1 ESI 1 PE2 302
2-2-2 ESI 2 PE4 304 2-2-2 ESI 2 Port 3 NULL
PE3 Type 1 route
Non-DF DF
RD = rd3
ESI = ESI 2
PE1 PE3
CE1 CE2
PE2 PE4
EVI 1 MAC-VRF EVI 1 MAC-VRF
MAC ESI Next Hop Label MAC ESI Next Hop Label
1-1-1 ESI 1 Port2 NULL 1-1-1 ESI 1 PE1 301
2-2-2 ESI 2 PE3 303 1-1-1 ESI 1 PE2 302
2-2-2 ESI 2 PE4 304 2-2-2 ESI 2 Port 4 NULL
50 Huawei Confidential
2. EVPN Fundamentals
▫ EVPN Route Overview and Interaction Process
◼ EVPN Route Types
▫ EVPN Access Principles
3. Inter-AS EVPN
52 Huawei Confidential
Key Parameters Carried in EVPN Routes
⚫ The functions of the four types of EVPN routes are closely related to the parameters carried in the routes.
Type 1 routes carry ESI labels to implement split horizon.
Type 2 routes carry unicast labels to guide unicast traffic forwarding.
Type 3 routes carry BUM labels to guide BUM traffic forwarding, but Type 3 routes do not carry ES information.
Type 4 routes carry ESIs for DF election but do not carry any label information.
Type 2 √ √ √ √ √
Type 4 √ √ √
53 Huawei Confidential
Type 1 Type 2 Type 3 Type 4
In an Ethernet A-D per ES route, this field contains the source IP address configured on a PE, for
Route Distinguisher (8 bytes)
example, X.X.X.X:0. In an Ethernet A-D per EVI route, this field is the RD of an EVPN instance.
This field identifies an Ethernet tag. According to the RFC recommendation, the last 20 bits of this field
Ethernet Tag ID (4 bytes)
can be the VLAN ID.
In an Ethernet A-D per ES route, the field is all 0s. In an Ethernet A-D per EVI route, this field is the
MPLS Label (3 bytes)
MPLS label used to forward EVPN unicast traffic in load balancing mode.
54 Huawei Confidential
Type 1 Type 2 Type 3 Type 4
The lowest bit of this field is defined as the single-active bit. The value 0 indicates
Flag (1 byte)
the multi-active scenario.
ESI Label (3 bytes) This field is used by a PE to identify each ES for split horizon.
55 Huawei Confidential
Type 1 Type 2 Type 3 Type 4
Fast Convergence
⚫ In EVPN, MAC address learning is controlled by BGP. On a large-scale complex network, route convergence takes a
long time. To address this issue, EVPN defines a mechanism to efficiently instruct peer PEs to update their
forwarding tables. Specifically, PEs advertise Ethernet A-D per ES routes for all ESs.
⚫ When a PE detects a fault on the connected CE, the PE withdraws the corresponding MAC address entry and sends
an Ethernet A-D per ES route to instruct other PEs to withdraw the corresponding MAC address entry.
⚫ An Ethernet A-D per ES route must carry the ESI Label extended community attribute.
PE1 BGP Update message:
Ethernet A-D per ES route
PE3
Site 1 Site 2
CE1 CE2
PE2
56 Huawei Confidential
Type 1 Type 2 Type 3 Type 4
Split Horizon
⚫ When a CE is multi-homed to PEs, if the links of the CE work in all-active mode, BUM packets sent by the CE to a PE may be looped
back by another PE. This problem needs to be solved using split horizon.
⚫
All PEs advertise Ethernet A-D per ES routes that carry the ESI Label extended community attribute to implement split horizon. As
shown in the following figure, PE2 (DF) assigns an ESI label to identify ES1 and advertises the label to PE1 (non-DF) through an
Ethernet A-D per ES route. PE1 adds this label to a BUM packet before sending the packet to PE2. After receiving the packet, PE2
finds that the label is assigned by itself and does not forward the packet to ES1.
When sending BUM traffic to PE2, PE1 adds Label1 and then the BUM label
PE1 assigned by PE2 to the traffic.
2 Before sending BUM traffic to PE3, PE1 adds the BUM label assigned by PE3
to the traffic.
BUM
4 PE3 forwards the BUM traffic to CE2.
PE3
Site 1 Site 2
CE1 CE2
PE2 identifies Label1 and does not forward 1PE2 allocates an MPLS label, for example, Label1, to ES1.
3 the BUM traffic to CE1, but sends the traffic PE2
to other ESs in the EVPN instance. DF
57 Huawei Confidential
Type 1 Type 2 Type 3 Type 4
Aliasing
⚫ When a CE is multi-homed to PEs in all-active mode, some PEs may fail to learn the MAC address of the CE. As a result, the peer PE
receives MAC/IP advertisement routes from only one PE, failing to implement load balancing among paths between PEs. Aliasing
solves this problem using Ethernet A-D per EVI routes. Aliasing ensures that a PE is reachable even if the PE does not learn MAC
addresses from the EVI/ES.
⚫
In this example, CE1 is dual-homed to PE1 and PE2. If PE1 has learned the address of Site1 but PE2 has not, PE1 sends a MAC/IP
route carrying detailed information to PE2, and PE2 advertises reachability through an Ethernet A-D per EVI route. Therefore, PE3
considers that PE1 and PE2 at Site 1 are reachable.
PE3
Site 1 Site 2
CE1 CE2
58 Huawei Confidential
• Note: The peer PE may first receive the Ethernet A-D per EVI route and then the
Ethernet A-D per ES route. To prevent this problem, the peer PE forwards traffic
only when it receives the Ethernet A-D per EVI route and Ethernet A-D per ES
route at the same time.
Ethernet Segment Identifier (10 bytes) This field uniquely identifies connections between PEs and a CE.
Ethernet Tag ID (4 bytes) This field is the VLAN ID configured on the device.
MAC Address (6 bytes) This field indicates the host MAC address carried in the route.
IP Address Length (1 byte) This field is optional and can be set to 32 or 128 bits.
IP Address (0, 4, or 16 bytes) This field is optional and indicates the host IP address carried in the route.
MPLS Label1 (3 bytes) This field is assigned by the downstream router to forward Layer 2 service traffic.
MPLS Label2 (0 or 3 bytes) This field is optional and used to forward Layer 3 service traffic.
59 Huawei Confidential
Type 1 Type 2 Type 3 Type 4
The least significant bit of this field is defined as the Sticky/static bit.
Flag (1 byte)
If this bit is 0, the MAC address can be moved.
60 Huawei Confidential
Ethernet Tag ID (4 bytes) This field is the VLAN ID configured on the device.
Originating Router's IP Address (4 or 16 bytes) This field indicates the source IP address configured on a PE.
61 Huawei Confidential
Type 1 Type 2 Type 3 Type 4
PMSI Attribute
⚫ The PMSI attribute carries the tunnel type (ingress replication or MLDP) and tunnel label information used for
transmitting multicast packets.
⚫ A PE forwards the multicast traffic that it receives to other PEs in P2MP mode. The PEs can establish a tunnel to
transmit multicast traffic through inclusive multicast routes.
⚫ The PMSI attribute is defined in RFC6514. In the EVPN scenario, the Leaf bit in the Flags field is 0 and the tunnel
type is 6 (ingress replication).
Flags (1 byte) The last bit of this field is the Leaf bit.
Tunnel Type (1 byte) The value of this field is typically 6 (ingress replication) in EVPN.
Tunnel Identifier (variable length) This field is the IP address of the tunnel end.
62 Huawei Confidential
Type 1 Type 2 Type 3 Type 4
This field is the unique identifier of the connection between local and
Ethernet Segment Identifier (10 bytes)
peer devices.
Originating Router's IP Address (4 or 16 bytes) This field indicates the source address configured on a PE.
63 Huawei Confidential
Type 1 Type 2 Type 3 Type 4
⚫ ES route filtering: ES-Import RT allows only PEs connected to the same site to import Type 4 routes. RTs are used to
import Ethernet segment routes to all the PEs connected to the same site.
The least significant bit of this field is defined as the Single-Active bit. The
ES-Import (2 bytes)
value 0 indicates the multi-homing scenario.
64 Huawei Confidential
Type 1 Type 2 Type 3 Type 4
DF Election
⚫ In a CE multi-homing scenario, an ES may be configured with multiple Ethernet tags, and only one PE
is elected as a designated forwarder (DF). DF election is implemented using Type 4 routes that carry
the ES-Import attribute. A DF provides the following functions:
Sends multicast and broadcast traffic to the CEs on the specified ES.
Floods unknown unicast traffic to CEs.
PE1
BUM
DF PE3
Site 1 Site 2
PE2
65 Huawei Confidential
• DF election rules:
▫ A PE discovers the ES and ESI of the local connection and advertises the
Type 4 route carrying the ES-Import.
▫ The PE starts the timer. The default value of the timer is 3 seconds, within
which ES routes can be received.
▫ After the timeout, the PE generates an ordered list. The list contains the IP
addresses of all PEs and information about their connections to the ES. The
sequence number of the list starts from 0 in ascending order. The sequence
number is used to determine the DF.
▫ The PE elected as the DF forwards BUM traffic to CEs. When a link fault
occurs, the PE withdraws its ES routes, which triggers a re-election process.
New EVPN Routes
⚫ EVPN is not limited to L2VPN applications. With the increase of EVPN route types, more applications,
such as L3VPN, are supported.
Route Type Function Benefits
Aliasing
Loop prevention
MAC address withdrawal in batches
(Type 1) Ethernet A-D route Fast convergence
All-active indication
Load balancing
ESI label advertisement
MAC address learning and Policy based on each MAC
advertisement address
(Type 2) MAC/IP advertisement route
MAC/IP binding ARP suppression
MAC address mobility Host migration
Auto-discovery of multicast tunnel
(Type 3) Inclusive multicast route BUM traffic forwarding
endpoints & multicast types
ES member auto-discovery Support for both all-active
(Type 4) Ethernet segment route
DF election and single-active modes
66 Huawei Confidential
IP Prefix Route
⚫ IP prefix routes are used to advertise a host IP address received from an access network or the network
segment where the host IP address resides.
Ethernet Segment Identifier (10 bytes) This field uniquely identifies connections between PEs and a CE.
IP Prefix Length (1 byte) This field indicates the mask length of the IP prefix carried in the route.
IP Prefix (4 or 16 bytes) This field indicates the IP prefix carried in the route.
MPLS Label (3 bytes) This field indicates the label used for Layer 3 service traffic forwarding.
67 Huawei Confidential
• For more details about Type 5 routes, see the RFC draft.
Typical Application Scenarios of IP Prefix Routes
⚫ Type 5 routes are advertised to an EVPN instance to implement interworking between the EVPN
instance and external networks.
EVPN peer
PE1 PE2
Type 5 route
RD = 100:1
Network segment: 10.0.0.0/8
68 Huawei Confidential
EVPN Protocol Standards
draft-ietf-bess-
IP Prefix
RFC 8365 evpn-inter-
Control RFC 7432 A Network subnet-
Advertisement in
BGP MPLS-Based EVPN
plane Virtualization Overlay forwarding
Ethernet VPN draft-ietf-bess-evpn-
Solution using EVPN Integrated Routing and prefix-advertisement
Bridging in EVPN
69 Huawei Confidential
Contents
2. EVPN Fundamentals
▫ EVPN Route Overview and Interaction Process
▫ EVPN Route Types
◼ EVPN Access Principles
3. Inter-AS EVPN
The physical interface connected to a user network is directly bound to a common EVI. This
Port-based mode
service mode is used to carry only Layer 2 services.
The physical interface connected to a user network is divided into different sub-interfaces.
VLAN-based mode Each sub-interface is bound to a specific EVI. One EVI is required per user. This service
mode is used to carry Layer 2 or Layer 3 services.
Users are divided based on VLANs. Each VLAN is bound to a specific EVI. This service mode
VLAN bundle mode
is used to carry Layer 2 or Layer 3 services.
Users are divided based on VLANs. The VLANs are bound to the same EVI. This service
VLAN-aware bundle mode
mode is used to carry Layer 2 or Layer 3 services.
71 Huawei Confidential
Port-based Mode
⚫ In port-based mode, an interface is used only by a single user. Specifically, the physical interface
connected to a user network is bound to a common EVI and has no sub-interfaces created. This service
mode is used only to carry Layer 2 services.
72 Huawei Confidential
VLAN-based Mode
⚫ In VLAN-based mode, the physical interfaces connected to user networks each have different sub-interfaces created.
Each sub-interface is associated with a unique VLAN and added to a specific BD, and each BD is bound to a specific
EVI. This service mode is used to carry Layer 2 or Layer 3 services. In this example, User1 and User2 access the
network through different sub-interfaces.
73 Huawei Confidential
• In this service mode, the sub-interface, VLAN, BD, and EVI are exclusively used by
a user to access the network, and a separate MAC forwarding table is used on
the forwarding plane for each user. Although this mode effectively ensures
service isolation, it consumes a large amount of EVI resources because each user
requires one EVI.
VLAN Bundle Mode
⚫ In VLAN bundle mode, an EVI connects to multiple users who are divided by VLAN, and the EVI is bound to a BD. In
this service mode, the users connected to the same EVI share a MAC forwarding table, requiring each user on the
network to have a unique MAC address. This service mode is used to carry Layer 2 or Layer 3 services.
User1
GE1/0/0.1 EVPN A configuration example:
VLAN 10 [~PE] bridge-domain 10
BD 10 EVPN A [*PE-bd10] evpn binding vpn-instance evpna
VLAN 20 [*PE-bd10] quit
GE1/0/0.2 [*PE] interface GigabitEthernet 1/0/0.1 mode l2
PE [*PE-G1/0/0.1] encapsulation dot1q vid 10
User2
[*PE-G1/0/0.1] bridge-domain 10
[*PE-G1/0/0.1] commit
User1's service packets are tagged with VLAN 10
and transmitted through GE1/0/0.1.
User2's service packets are tagged with VLAN 20
and transmitted through GE1/0/0.2.
74 Huawei Confidential
VLAN-Aware Bundle Mode
⚫ In VLAN-aware bundle mode, an EVI connects to multiple users divided by VLAN. Additionally, the EVI can be bound
to multiple BDs. In this service mode, users connected to the same EVI use separate forwarding entries. During
traffic forwarding, the system uses the BD tag carried in packets to locate the corresponding BD MAC forwarding
table and searches the table for a forwarding entry based on a MAC address.
User1
GE1/0/0.1 EVPN A configuration example:
VLAN 10 BD 10 [~PE] bridge-domain 10
EVPN A [*PE-bd10] evpn binding vpn-instance evpna bd-tag 10
VLAN 20 BD 20 [*PE-bd10] quit
GE1/0/0.2 [*PE] interface GigabitEthernet 1/0/0.1 mode l2
PE [*PE-G1/0/0.1] encapsulation dot1q vid 10
User2
[*PE-G1/0/0.1] bridge-domain 10
[*PE-G1/0/0.1] commit
User1's service packets are tagged with VLAN 10
and transmitted through GE1/0/0.1.
User2's service packets are tagged with VLAN 20
and transmitted through GE1/0/0.2.
75 Huawei Confidential
• When EVPN peers send routes to each other, a BD tag is encapsulated into the
Ethernet Tag ID field of Ethernet A-D route packets, MAC/IP advertisement route
packets, and inclusive multicast route packets.
Contents
2. EVPN Fundamentals
3. Inter-AS EVPN
76 Huawei Confidential
Inter-AS EVPN Overview
⚫ Typically, an EVPN architecture runs in an autonomous system (AS). Routing information of
any EVPN can be flooded only in the local AS. In some complex scenarios, an enterprise may
have multiple ASs. In this case, the existing EVPN architecture needs to be extended to
provide an inter-AS EVPN.
⚫ Inter-AS EVPN can be implemented in the following ways, similar to inter-AS MPLS VPN:
Option A
Option B
Option C
77 Huawei Confidential
⚫ In Option A, intra-AS traffic has two labels, and inter-AS traffic has no label.
AS1 AS2
EVPN EVPN
IP IP IP IP IP
Eth Eth Eth Eth Eth
EVPN Label EVPN Label
Tunnel Label Tunnel Label
Eth Eth
78 Huawei Confidential
Inter-AS EVPN: Option B
⚫ In inter-AS EVPN Option B, EVPN peer relationships need to be established between PEs and ASBRs, and between
ASBRs.
⚫ After receiving a MAC/IP advertisement route, an ASBR changes the next hop to itself, allocates a new label to the
route, and sends the route to the ASBR in another AS.
⚫ In Option B, intra-AS traffic has two labels, and inter-AS traffic has one label (EVPN label).
AS1 AS2
IP IP IP IP IP
Eth Eth Eth Eth Eth
EVPN Label 1 EVPN Label 2 EVPN Label 3
Tunnel Label Eth Tunnel Label
Eth Eth
79 Huawei Confidential
Inter-AS EVPN: Option C
⚫ In inter-AS EVPN Option C, an E2E BGP LSP needs to be established between the PEs at different sites (Site 1 and
Site 2 in this example).
⚫ PE1 and PE2 establish an EVPN peer relationship. ASBRs are unaware of MAC/IP advertisement routes.
⚫ In Option C, intra-AS traffic has three labels, and inter-AS traffic has two labels (EVPN label and BGP label).
AS1 AS2
IP IP IP IP IP
Eth Eth Eth Eth Eth
EVPN Label EVPN Label EVPN Label
Tunnel Label BGP Label 2 BGP Label 3
Eth Eth Tunnel Label
Eth
80 Huawei Confidential
Contents
2. EVPN Fundamentals
3. Inter-AS EVPN
81 Huawei Confidential
EVPN Application on a WAN
Without VPLS
VPLS VPWS ETREE L3VPN
EVPN
82 Huawei Confidential
• E-Line, E-Tree, and E-LAN are three types of Ethernet virtual connection (EVC),
which are point-to-point EVC, multipoint-to-multipoint EVC, and rooted-
multipoint EVC.
Spine
83 Huawei Confidential
EVPN Application on a Campus Network
⚫ Similar to the cloud DC solution, the campus network virtualization solution can also use EVPN NVO (RFC8365).
⚫ On different underlying networks, VXLAN encapsulation is used together with EVPN on the control plane to build a
flexible campus overlay network.
84 Huawei Confidential
EVPN Application in SD-WAN
⚫ SD-WAN is a next-generation enterprise branch interconnection solution that supports features such as intelligent
traffic steering, zero touch provisioning (ZTP), and visualization.
⚫ In the SD-WAN solution, EVPN can be deployed between the route reflector (RR) and CPE to transmit SD-WAN
overlay VPN routes on the control plane. The data plane uses IPsec VPN to build a secure forwarding channel.
RR
Transport
network-1
1.1.1.1 1.1.1.2
2.2.2.1 2.2.2.2
Transport
Site Site1 network-2 Site2 Site
(CPE) (CPE)
information information
IPsec VPN
85 Huawei Confidential
Contents
2. EVPN Fundamentals
3. Inter-AS EVPN
86 Huawei Confidential
Configuring BD EVPN Functions
1. Configure an EVPN instance in BD mode.
[Huawei] evpn vpn-instance evpna bd-mode
[Huawei-evpn-instance-evpna] route-distinguisher 100:1
[Huawei-evpn-instance-evpna] vpn-target 1:1 [ both | export-extcommunity | import-extcommunity ]
An EVPN instance named evpna is created, the EVPN instance view is displayed, and the RD and RT are set to 100:1 and 1:1,
respectively.
2. Configure an EVPN source address.
[Huawei] evpn source-address ip-address
The EVPN source address is part of EVPN route information and can be used to identify a PE on an EVPN. Configuring EVPN
source addresses is a mandatory task for EVPN configuration.
3. Configure an ESI.
[Huawei-Eth-Trunk10] esi
Perform this configuration if a VLAN is used to access an EVPN. For details about other configurations, see the product manual
of the corresponding product.
87 Huawei Confidential
In MPLS forwarding, bind a BD to the EVPN instance named evpna. In this example, the BD ID is 10. By specifying different bd-
tag values, you can bind multiple BDs with different VLANs to the same EVPN instance and isolate services in these BDs.
2. Add a Layer 2 sub-interface to the BD so that the sub-interface can transmit data packets in this BD.
[Huawei] interface Eth-Trunk10.1 mode l2
[Huawei-Eth-Trunk10.1] encapsulation dot1q vid 2
[Huawei-Eth-Trunk10.1] rewrite pop single
[Huawei-Eth-Trunk10.1] bridge-domain 10
The Layer 2 sub-interface is added to a BD so that it can transmit data packets in this BD. In this example, the sub-interface ID is Eth-
Trunk10.1.
The rewrite pop { single | double } command removes single or double VLAN tags from received packets. For single-tagged packets
that a Layer 2 sub-interface receives, specify single to remove the tags from these packets. If the encapsulation type of packets has
been set to QinQ in the previous step, specify double to remove double VLAN tags from the received packets.
88 Huawei Confidential
Example for Configuring Eth-Trunk Sub-interfaces to Access
a BD EVPN (Dual-Homing Active-Active)
Loopback0
10.0.1.1/32 ⚫ Configuration roadmap
PE1 Configure an IGP on the backbone network to allow the PEs to
GE0/2/0 communicate with each other. (The configuration details are not
CE1 CE2 provided here.)
VLAN 2 VLAN 2 Configure basic MPLS functions and enable MPLS LDP to establish
PE3
192.168.1.1/24 Loopback0 192.168.1.2/24 LDP LSPs on the backbone network. (The configuration details are not
10.0.3.3/32 provided here.)
Loopback0 Configure a BD EVPN instance on PEs.
10.0.2.2/32
PE2 Configure an ESI and E-Trunk to implement dual-homing active-active
⚫
EVPN needs to be configured on the network to implement networking.
Layer 2 communication. Configure local-remote fast reroute (FRR) for MAC routes.
CE1 is dual-homed to PE1 and PE2 and works in active-active mode Establish BGP EVPN peer relationships.
through an E-Trunk.
Configure a CE to access the PEs through an Eth-Trunk interface.
The ESI of CE1 is 0000.1111.2222.1111.1111.
Verify the configuration.
IP addresses of CE1 and CE2 are 192.168.1.1/24 and 192.168.1.2/24
respectively.
The EVPN instance name is evpna.
On PE1, PE2, and PE3, the RDs of the EVPN instance evpna are 100:1,
200:1, and 300:1 respectively and the RTs are 1:1.
89 Huawei Confidential
90 Huawei Confidential
Example for Configuring Eth-Trunk Sub-interfaces to Access
a BD EVPN (2)
Loopback0 The following uses PE1 as an example to configure an ESI and E-
10.0.1.1/32 Trunk for dual-homing active-active networking.
PE1 [~PE1] lacp e-trunk system-id 00e0-fc00-0000
[*PE1] lacp e-trunk priority 1
GE0/2/0 [*PE1] e-trunk 1
CE1 CE2 [*PE1-e-trunk-1] peer-address 2.2.2.2 source-address 1.1.1.1
VLAN 2 [*PE1-e-trunk-1] quit
VLAN 2 PE3
192.168.1.2/24 [*PE1] interface eth-trunk 10
192.168.1.1/24 Loopback0 [*PE1-Eth-Trunk10] mode lacp-static
10.0.3.3/32 [*PE1-Eth-Trunk10] e-trunk 1
Loopback0 [*PE1-Eth-Trunk10] e-trunk mode force-master
10.0.2.2/32 [*PE1-Eth-Trunk10] esi 0000.1111.2222.1111.1111
PE2
[*PE1-Eth-Trunk10] quit
⚫
Configure a BD EVPN instance on PEs. [*PE1] interface eth-trunk 10.1 mode l2
[*PE1-Eth-Trunk10.1] encapsulation dot1q vid 2
⚫
Configure an ESI and E-Trunk to implement [*PE1-Eth-Trunk10.1] rewrite pop single
dual-homing active-active networking. [*PE1-Eth-Trunk10.1] bridge-domain 10
[*PE1-Eth-Trunk10.1] quit
⚫
Configure local-remote FRR for MAC routes.
[*PE1] interface gigabitethernet 0/1/0
⚫
Establish BGP EVPN peer relationships. [*PE1-GigabitEthernet0/1/0] eth-trunk 10
[*PE1-GigabitEthernet0/1/0] quit
⚫ Configure a CE to access the PEs through the [*PE1] commit
Eth-Trunk interface.
⚫
Verify the configuration. The E-Trunk system ID of PE2 must be the same as that of PE1.
91 Huawei Confidential
• For details about the E-Trunk configuration, see the corresponding product
documentation.
Example for Configuring Eth-Trunk Sub-interfaces to Access
a BD EVPN (3)
Loopback0
10.0.1.1/32
The following uses PE1 as an example to configure
PE1 local-remote FRR for MAC routes.
GE0/2/0
CE1 CE2 [~PE1] evpn
[*PE1-evpn] vlan-extend private enable
VLAN 2 PE3 VLAN 2
[*PE1-evpn] vlan-extend redirect enable
192.168.1.1/24 Loopback0 192.168.1.2/24
[*PE1-evpn] local-remote frr enable
10.0.3.3/32
Loopback0
[*PE1-evpn] quit
10.0.2.2/32 [*PE1] commit
PE2
⚫
Configure a BD EVPN instance on PEs.
In CE multi-homing scenarios, MAC route redirection
enables all PEs connected to the same CE to redirect the
⚫
Configure an ESI and E-Trunk to implement outbound interfaces of MAC routes destined for the CE to
dual-homing active-active networking.
local AC interfaces. This function shortens forwarding
⚫
Configure local-remote FRR for MAC routes. paths and improves forwarding efficiency.
⚫
Establish BGP EVPN peer relationships. If the AC interface on one of the PEs fails, the outbound
interface of the associated MAC route can be quickly
⚫ Configure a CE to access the PEs through the
Eth-Trunk interface. redirected so that traffic can be forwarded through
another active PE, improving reliability.
⚫
Verify the configuration.
92 Huawei Confidential
Example for Configuring Eth-Trunk Sub-interfaces to Access
a BD EVPN (4)
Loopback0
10.0.1.1/32
The following uses PE1 as an example to establish
PE1 BGP EVPN peer relationships.
GE0/2/0 [~PE1] bgp 100
CE1 CE2
[*PE1-bgp] peer 10.0.2.2 as-number 100
VLAN 2 PE3 VLAN 2 [*PE1-bgp] peer 10.0.2.2 connect-interface loopback 1
192.168.1.1/24 Loopback0 192.168.1.2/24 [*PE1-bgp] peer 10.0.3.3 as-number 100
10.0.3.3/32 [*PE1-bgp] peer 10.0.3.3 connect-interface loopback 1
Loopback0 [*PE1-bgp] l2vpn-family evpn
10.0.2.2/32
PE2 [*PE1-bgp-af-evpn] peer 10.0.2.2 enable
[*PE1-bgp-af-evpn] peer 10.0.3.3 enable
⚫
Configure a BD EVPN instance on PEs.
[*PE1-bgp-af-evpn] quit
⚫
Configure an ESI and E-Trunk to implement [*PE1-bgp] quit
dual-homing active-active networking. [*PE1] commit
⚫
Configure local-remote FRR for MAC routes.
⚫
Establish BGP EVPN peer relationships.
⚫ Configure a CE to access the PEs through the
Eth-Trunk interface.
⚫
Verify the configuration.
93 Huawei Confidential
Example for Configuring Eth-Trunk Sub-interfaces to Access
a BD EVPN (5)
Loopback0
10.0.1.1/32
The following uses CE1 as an example to configure it to
PE1
access the PEs through the Eth-Trunk interface.
GE0/2/0
CE1 CE2 [~CE1] VLAN 2
[*CE1-vlan2] quit
VLAN 2 PE3 VLAN 2
[*CE1] interface Eth-Trunk10
192.168.1.1/24 Loopback0 192.168.1.2/24
[*CE1-Eth-Trunk10] portswitch
10.0.3.3/32
Loopback0
[*CE1-Eth-Trunk10] port link-type trunk
10.0.2.2/32 [*CE1-Eth-Trunk10] port trunk allow-pass VLAN 2
PE2 [*CE1-Eth-Trunk10] mode lacp-static
⚫
Configure a BD EVPN instance on PEs. [*CE1-Eth-Trunk10] quit
[*CE1] interface gigabitethernet0/1/0
⚫
Configure an ESI and E-Trunk to implement [*CE1-GigabitEthernet0/1/0] eth-trunk 10
dual-homing active-active networking. [*CE1-GigabitEthernet0/1/0] quit
⚫
Configure local-remote FRR for MAC routes. [*CE1] interface gigabitethernet0/2/0
[*CE1-GigabitEthernet0/2/0] eth-trunk 10
⚫
Establish BGP EVPN peer relationships. [*CE1-GigabitEthernet0/2/0] quit
⚫ Configure a CE to access the PEs through [*CE1] commit
the Eth-Trunk interface.
⚫
Verify the configuration.
94 Huawei Confidential
Verifying the Configuration (1)
Check Type 3 routes on PE3.
Loopback0
10.0.1.1/32 <PE3>display bgp evpn all routing-table inclusive-route
Local AS number : 100
PE1 EVPN address family:
GE0/2/0 Number of Inclusive Multicast Routes: 3
CE1 CE2 Route Distinguisher: 100:1
VLAN 2 Network(EthTagId/IpAddrLen/OriginalIp) NextHop
VLAN 2 PE3
192.168.1.1/24 192.168.1.2/24 *>i 0:32:10.0.1.1 10.0.1.1
Loopback0
10.0.3.3/32
Route Distinguisher: 200:1
Loopback0 Network(EthTagId/IpAddrLen/OriginalIp) NextHop
10.0.2.2/32 *>i 0:32:10.0.2.2 10.0.2.2
PE2
Route Distinguisher: 300:1
Network(EthTagId/IpAddrLen/OriginalIp) NextHop
Check the BGP EVPN peer relationship on PE3. *> 0:32:10.0.3.3 127.0.0.1
[~PE3]display bgp evpn peer EVPN-Instance evpna:
BGP local router ID : 10.0.3.3 Number of Inclusive Multicast Routes: 3
Local AS number : 100 Network(EthTagId/IpAddrLen/OriginalIp) NextHop
Total number of peers : 2 Peers in established state : 2 *>i 0:32:10.0.1.1 10.0.1.1
Peer AS State PrefRcv *>i 0:32:10.0.2.2 10.0.2.2
10.0.1.1 100 Established 4 *> 0:32:10.0.3.3 127.0.0.1
10.0.2.2 100 Established 4
PE3 receives Type 3 routes from PE1 and PE2 to
forward BUM traffic.
95 Huawei Confidential
Verifying the Configuration (2)
Check Type 4 routes on PE3.
Loopback0
10.0.1.1/32 <PE3>display bgp evpn all routing-table es-route
Local AS number : 100
PE1 EVPN address family:
GE0/2/0 Number of ES Routes: 3
CE1 CE2 Route Distinguisher: 10.0.1.1:0
VLAN 2 Network(ESI) NextHop
VLAN 2 PE3
192.168.1.1/24 192.168.1.2/24 *>i 0000.1111.2222.1111.1111 10.0.1.1
Loopback0
10.0.3.3/32
Route Distinguisher: 10.0.2.2:0
Loopback0 Network(ESI) NextHop
10.0.2.2/32 *>i 0000.1111.2222.1111.1111 10.0.2.2
PE2
Route Distinguisher: 10.0.3.3:0
Network(ESI) NextHop
*> 014c.1fcc.f95d.e30a.3100 127.0.0.1
EVPN-Instance evpna:
Number of ES Routes: 1
Network(ESI) NextHop
*> 014c.1fcc.f95d.e30a.3100 127.0.0.1
Type 4 routes sent by PE1 and PE2 carry the same ESI.
96 Huawei Confidential
Verifying the Configuration (3)
Check Type 2 routes on PE3.
Loopback0
<PE3>display bgp evpn all routing-table mac-route
10.0.1.1/32
Local AS number : 100
PE1 BGP Local router ID is 10.0.3.3
EVPN address family:
GE0/2/0 Number of Mac Routes: 2
CE1 CE2 Route Distinguisher: 100:1
VLAN 2 Network(EthTagId/MacAddrLen/MacAddr/IpAddrLen/IpAddr) NextHop
VLAN 2 PE3
192.168.1.2/24 *>i 0:48:4c1f-cccf-6675:0:0.0.0.0 10.0.1.1
192.168.1.1/24 Loopback0 Route Distinguisher: 300:1
10.0.3.3/32 Network(EthTagId/MacAddrLen/MacAddr/IpAddrLen/IpAddr) NextHop
Loopback0 *> 0:48:4c1f-ccf9-5de3:0:0.0.0.0 0.0.0.0
10.0.2.2/32
PE2
EVPN-Instance evpna:
Number of Mac Routes: 2
Network(EthTagId/MacAddrLen/MacAddr/IpAddrLen/IpAddr) NextHop
*>i 0:48:4c1f-cccf-6675:0:0.0.0.0 10.0.1.1
*> 0:48:4c1f-ccf9-5de3:0:0.0.0.0 0.0.0.0
97 Huawei Confidential
Verifying the Configuration (4)
Check Type 1 routes on PE3.
Loopback0
10.0.1.1/32 <PE3>display bgp evpn all routing-table ad-route
Local AS number : 100
PE1 BGP Local router ID is 10.0.3.3
GE0/2/0 EVPN address family:
CE1 CE2 Number of A-D Routes: 5
VLAN 2 Route Distinguisher: 100:1
VLAN 2 PE3
192.168.1.1/24 192.168.1.2/24 Network(ESI/EthTagId) NextHop
Loopback0
10.0.3.3/32
*>i 0000.1111.2222.1111.1111:0 10.0.1.1
Loopback0 Route Distinguisher: 200:1
10.0.2.2/32 Network(ESI/EthTagId) NextHop
PE2
*>i 0000.1111.2222.1111.1111:0 10.0.2.2
EVPN-Instance evpna:
Number of A-D Routes: 4
Network(ESI/EthTagId) NextHop
*>i 0000.1111.2222.1111.1111:0 10.0.1.1
i 10.0.2.2
*> 014c.1fcc.f95d.e30a.3100:0 127.0.0.1
98 Huawei Confidential
Verifying the Configuration (5)
Check the MAC address table of evpna on PE3.
Loopback0
<PE3>display evpn mac routing-table evpn-instance evpna verbose
10.0.1.1/32
MAC Flag: D - download to fib
PE1 -----------------------------------------------------------------------------EVPN
name: evpna
GE0/2/0 MACs: 2 Entries: 3
CE1 CE2 MAC Address: 4c1f-cccf-6675
VLAN 2 Protocol: BGP VLAN/BD: 10
VLAN 2 PE3
192.168.1.2/24 State: Active Age: 00h13m01s
192.168.1.1/24 Loopback0 Type: Dynamic Label: 48002
10.0.3.3/32 IndirectID: 0x1000080 PeerIP: 10.0.1.1
Loopback0 Flag: D
10.0.2.2/32 TunnelID: 0x0000000001004c4b82 Interface: Ethernet1/0/0
PE2
MAC Address: 4c1f-cccf-6675
Check the ARP table on CE2 and ping CE1 from CE2. Protocol: BGP VLAN/BD: 10
State: Active Age: 00h13m01s
<CE2>display arp Type: Dynamic Label: 48002
IP ADDRESS MAC ADDRESS INTERFACE IndirectID: 0x100007D PeerIP: 10.0.2.2
-------------------------------------------------------------------- Flag: D
192.168.1.2 4c1f-ccf9-5de3 Vlanif2 #MAC address of CE2 TunnelID: 0x0000000001004c4b81 Interface: Ethernet1/0/1
192.168.1.1 4c1f-cccf-6675 Eth-Trunk10 #MAC address of CE1
<CE2>ping 192.168.1.1 MAC address of Label allocated by
PING 192.168.1.1: 56 data bytes, press CTRL_C to break
Reply from 192.168.1.1: bytes=56 Sequence=1 ttl=255 time=10 ms
CE1 PE1 to CE1
Reply from 192.168.1.1: bytes=56 Sequence=2 ttl=255 time=50 ms
99 Huawei Confidential
Contents
2. EVPN Fundamentals
3. Inter-AS EVPN
2. Enable EVPN to generate and advertise IP prefix routes and IRB routes.
⚫
Configure an IGP on the backbone network to allow the Ping 192.168.2.1 from CE1.
PEs to communicate. (The configuration details are not <CE1>ping 192.168.2.1
provided here.) PING 192.168.2.1: 56 data bytes, press CTRL_C to break
Reply from 192.168.2.1: bytes=56 Sequence=1 ttl=126 time=30 ms
⚫
Configure basic MPLS functions and enable MPLS LDP to Reply from 192.168.2.1: bytes=56 Sequence=2 ttl=126 time=10 ms
Reply from 192.168.2.1: bytes=56 Sequence=3 ttl=126 time=50 ms
establish LDP LSPs on the backbone network. Reply from 192.168.2.1: bytes=56 Sequence=4 ttl=126 time=40 ms
⚫ Configure an L3VPN instance on PEs. Reply from 192.168.2.1: bytes=56 Sequence=5 ttl=126 time=50 ms
--- 192.168.2.1 ping statistics ---
⚫
Establish BGP EVPN peer relationships. 5 packet(s) transmitted
5 packet(s) received
⚫
Configure CEs to access PEs and advertise routes.
0.00% packet loss
⚫ Verify the configuration. round-trip min/avg/max = 10/36/50 ms
1. A
2. B
Summary
⚫ EVPN uses BGP extensions to implement MAC address learning and advertisement on the control plane
instead of the data plane. EVPN allows a device to manage MAC addresses in the same way as it
manages routes, implementing load balancing between EVPN routes with the same destination MAC
address but different next hops. In addition, EVPN supports the deployment of BGP RRs, significantly
reducing network complexity.
⚫ EVPN uses the labels carried in Type 3 routes to guide BUM traffic forwarding, uses the labels carried in
Type 2 routes to guide unicast traffic forwarding, uses Type 1 routes to implement split horizon and
fast convergence, and uses Type 4 routes to implement DF election and automatic ES member
discovery. EVPN also supports the advertisement of IP prefix routes through Type 5 routes.
⚫ With the enrichment of application scenarios and extension of protocols, EVPN can be used in various
scenarios, including WAN, DC, and campus network scenarios.
▫ inherit-cost: enables the static route to inherit the cost of the recursive
route.
▫ description text: specifies a description for the static route. The value is a
string of 1 to 80 characters and can contain spaces.
• In OSPFv3, the concepts "link" and "prefix" are frequently used, which however
are independent of each other. The terms "network" and "subnet" used in
OSPFv2 should be replaced with the term "link" when OSPFv3 is discussed.
• In multi-instance, each instance is differentiated by adding a specific instance ID
to the OSPFv3 packet header. If an instance is assigned a specific instance ID, the
OSPFv3 packets that do not match the instance ID are discarded.
• IPv6 implements neighbor discovery and automatic configuration using link-local
addresses. Routers running IPv6 do not forward IPv6 packets whose destination
addresses are link-local addresses. Such packets are valid only on the local link.
▫ OSPFv3 assumes that each router has been assigned a link-local address on
each link. All OSPFv3 interfaces except virtual-link interfaces use the
associated link-local addresses as the source addresses to send OSPFv3
packets.
▫ A router learns the link-local addresses of all the other routers attached to
the same link and uses these addresses as the next-hop addresses to
forward packets.
• Note: On a virtual link, the global unicast address or a site's local address must
be used as the source address of OSPFv3 packets.
• OSPFv3 packets have the following functions:
▫ Hello packet: Hello packets are sent periodically to discover, establish, and
maintain OSPFv3 neighbor relationships.
▫ LSR packet: An LSR packet is used to request the required LSAs from a
neighbor. An OSPFv3 device sends LSR packets to its neighbor only after DD
packets have been successfully exchanged between them.
• Type: indicates the type of an OSPFv3 packet and occupies 1 byte. The following
types are available:
▫ 1: Hello packet
▫ 2: DD packet
▫ 3: LSR packet
▫ 4: LSU packet
▫ 5: LSAck packet
• Packet length: indicates the total length of an OSPFv3 packet, including the
packet header. The field occupies 2 bytes.
• Router ID: indicates the router ID of the router that originates the packet, and
occupies 4 bytes.
• Area ID: indicates the area in which the packet is sent, and occupies 4 bytes.
• Checksum: indicates the standard 16-bit IPv6 checksum and occupies 2 bytes.
• Options: indicates the optional capabilities supported by the router and occupies
3 bytes.
▫ NP: indicates whether the area to which the originating router interface
belongs is a not-so-stubby area (NSSA). This option occupies 1 bit.
▫ MC: indicates whether multicast data packets can be forwarded. This option
occupies 1 bit.
▫ V6: indicates whether the router or link can participate in route calculation.
This option occupies 1 bit. If it is set to 0, the router or link does not
participate in IPv6 route calculation.
• LS Age: indicates the time elapsed since the LSA was generated, in seconds. This
field occupies 2 bytes. The value of this field continually increases regardless of
whether the LSA is transmitted over a link or saved in an LSDB.
• LS Type: indicates the LSA type. This field occupies 2 bytes. The high-order three
bits of this field identify generic properties of the LSA, whereas the remaining bits
identify the LSA's specific function.
▫ The U-bit indicates how to process an unknown LSA, that is, how a router
that does not recognize an LSA's function code should process this LSA.
▪ 1: The LSA is stored and flooded as if its type had been understood.
▪ S2 S1 = 1 1: reserved.
• As shown in the figure, the U-bit in the LS Type field of the OSPFv3 LSA header is
0 by default. Except the Type 5 and Type 8 LSAs, the other types of LSAs all have
the area flooding scope (S2 S1 = 0 1).
▫ Link-local flooding scope: LSAs, including link-LSAs, are flooded only on the
local link.
▫ Area flooding scope: The following types of LSAs are flooded in a single
OSPF area: router-LSA, network-LSA, inter-area-prefix-LSA, inter-area-
router-LSA, NSSA-LSA, and intra-area-prefix-LSA.
▫ V: virtual link. The value 1 indicates that the router that generates the LSA
is at one end of the virtual link.
▫ E: external. The value 1 indicates that the router that generates the LSA is
an ASBR.
▫ B: border. The value 1 indicates that the router that generates the LSA is an
ABR.
▫ Metric: indicates the cost of the route to the destination address and
occupies 3 bytes.
▪ MC-bit: multicast bit. If this bit is set to 1, the prefix is used for
multicast route calculation. Otherwise, the prefix is not used for
multicast route calculation.
▪ LA-bit: local address capability bit. If this bit is set to 1, the prefix is an
interface address of the router.
▪ NU-bit: no unicast capability bit. If this bit is set to 1, the prefix is not
used for IPv6 unicast route calculation.
• Note: The prefix length of the default route is 0. An ABR can also originate an
inter-area Type 3 LSA to advertise a default route to a stub area.
• The fields in an OSPFv3 inter-area-router-LSA are described as follows:
▫ Metric: indicates the cost of the route to the destination address and
occupies 3 bytes.
• The fields in an OSPFv3 AS-external-LSA are described as follows:
▫ Bit E: indicates the cost type of an AS external route and occupies 1 bit.
▪ The value 1 indicates the cost of a Type 2 external route. This cost
does not increase during route transmission.
▪ The value 0 indicates the cost of a Type 1 external route. This cost
increases during route transmission.
▫ Bit F: occupies 1 bit. The value 1 indicates that the Forwarding Address field
(optional) is included.
▫ Bit T: occupies 1 bit. The value 1 indicates that the External Route Tag field
(optional) is included.
▫ Metric: indicates the cost of the route to the destination address and
occupies 3 bytes.
▫ PrefixLength, PrefixOptions, and Address Prefix are triplets that describe a
prefix and have the same meanings as those in an inter-area-prefix-LSA.
▫ Forwarding Address: is an optional 128-bit IPv6 address and occupies 4
bytes. This field is included if bit F is 1. In this case, a data packet needs to
be forwarded to this address before reaching its destination.
▫ External Route Tag: an optional flag, which occupies 4 bytes. It can be used
for communication between ASBRs. In a typical scenario where each of two
ASBRs imports an AS external route, the imported routes can be tagged
differently to facilitate route filtering.
▫ Referenced Link State ID: occupies 4 bytes. This field is included if the
Referenced LS Type field is not 0, indicating the link state ID of the
referenced LSA.
• The fields in an OSPFv3 link-LSA are described as follows:
▫ Rtr Pri: indicates the router priority of the interface attaching the
originating router to the link and occupies 1 byte.
▫ Options: indicates a collection of Options bits that the router sets in the
network-LSA and occupies 3 bytes.
• After the network becomes stable, check the LSDB of R2. The command output
shows information about the following types of LSAs: router-LSA (Type 1),
network-LSA (Type 2), Link-LSA (Type 8), and intra-area-prefix-LSA (Type 9).
• The command output is described as follows:
▫ LS Seq Number: sequence number of the LSA. This field is carried in the LSA
header.
▫ To maintain the same topology, each interface must run both IS-IS (IPv4)
and IS-IS (IPv6), which is not flexible.
▫ IPv4 areas cannot be used to connect different IPv6 areas. That is, IPv4
networks cannot be used to address IPv6 network isolation.
• The IS-IS MT feature can overcome the disadvantages of IS-IS single topology.
• To support MT, IS-IS defines multiple types of TLVs, including Multi-Topology
TLV, MT Intermediate Systems TLV, Multi-Topology Reachable IPv4 Prefixes TLV,
and Multi-Topology Reachable IPv6 Prefixes TLV. This course focuses on the
Multi-Topology TLV and does not elaborate on the other ones.
• Multi-Topology TLV:
▫ This TLV is contained only in IIH PDUs and fragment zero LSPs.
▫ Reserved MT IDs:
▫ ipv6: sets the topology type to IPv6. That is, the IPv6 capability for the IS-IS
process is enabled in an IPv6 topology. Links on the network can be
configured as IPv4 or IPv6 links. SPF calculation is performed separately in
IPv4 and IPv6 topologies.
▫ standard: sets the topology type to standard. That is, the IPv6 capability for
the IS-IS process is enabled in an integrated topology. A network
administrator must ensure that all links on the network support the same
topology type. By default, the standard type is used when the IPv6
capability is enabled for an IS-IS process.
• To support IPv6, BGP needs to map IPv6 routing information to the NLRI
attributes.
• Update message:
▫ An Update message can be used to advertise multiple routes with the same
path attribute. These routes are stored in the NLRI attribute. An Update
message can also carry multiple unreachable routes, which are stored in the
Withdrawn Routes field, to instruct peers to withdraw these routes.
• Fields in the MP_REACH_NLRI attribute are described as follows:
▫ Length of Next Hop Network Address: indicates the length of the next-hop
address and occupies 1 byte. Generally, the value is 16.
▫ Network Address of Next Hop: The length is variable and depends on the
preceding field. Generally, the value is a global unicast address.
2. A
IPv6 Transition Technologies
Foreword
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
3 Huawei Confidential
Overview IPv6 over IPv4 6PE 6VPE IPv4 over IPv6 NAT64 IVI
4 Huawei Confidential
• IPv4 address exhaustion fuels the urgency to transition to IPv6, but this requires
existing IPv4 devices to be replaced as these devices are incompatible with IPv6
networks. The main issue is that replacing a large number of IPv4 devices will
incur huge costs and interrupt services on the live networks. Therefore, the
transition from IPv4 to IPv6 must be a gradual process. During the early stage of
IPv4-to-IPv6 transition, IPv6 networks are scattered across a large number of IPv4
networks. Therefore, IPv6 transition technologies are required to implement IPv6
service interworking.
• Note: The VXLAN and SRv6 technologies will be described in detail in subsequent
courses.
Overview IPv6 over IPv4 6PE 6VPE IPv4 over IPv6 NAT64 IVI
Source IPv4 address Destination IPv4 1. IPv4/IPv6 dual stack is enabled on border
of the tunnel address of the tunnel devices (R1 and R2), and an IPv6 over IPv4
IPv6 host Loopback 0 IPv4 Loopback 0 IPv6 host tunnel is configured.
2. When receiving an IPv6 packet from the
IPv6 IPv6 over IPv4 tunnel IPv6 connected IPv6 network, R1 encapsulates it into
Tunnel 1 Tunnel 1 an IPv4 packet by attaching an IPv4 header to
R1 R2
(dual-stack) (dual-stack) the IPv6 packet. This is done only if the IPv6
IPv6 Header IPv6 Data IPv6 Header IPv6 Data packet is not destined for R1 and has a tunnel
interface as the next hop.
Next hop: IPv6 address of
3. R1 transmits the resulting IPv4 packet to R2
the peer interface Tunnel 1
IPv4 Header IPv6 Header IPv6 Data over the IPv4 network.
Source IPv4: source IPv4 address of the tunnel 4. R2 decapsulates the IPv4 packet by removing
Destination IPv4: destination IPv4 address of the tunnel the IPv4 header, and sends the resulting IPv6
packet to the destination IPv6 network.
⚫ Classification of IPv6 over IPv4 tunnels:
For an IPv6 over IPv4 tunnel, the source IPv4 address must be manually specified, and the destination IPv4 address can be
manually or automatically determined. From this perspective, IPv6 over IPv4 tunnels are classified into manual tunnels and
automatic tunnels.
5 Huawei Confidential
Overview IPv6 over IPv4 6PE 6VPE IPv4 over IPv6 NAT64 IVI
Manual Tunnel
⚫ For a manual tunnel, the destination IPv4 address must be manually specified, as border devices cannot
automatically obtain this address.
Manual IPv6 over IPv4 tunnel IPv6 over IPv4 GRE tunnel
• A manual tunnel provides a point-to-point connection, and • An IPv6 over IPv4 GRE tunnel uses the standard GRE
its source and destination addresses need to be manually tunneling technology to provide a point-to-point
specified. In a manual tunnel, an IPv6 packet is connection. Addresses need to be specified for both ends
encapsulated into an IPv4 packet, with itself as the of the tunnel.
payload of the IPv4 packet.
IPv4
IPv4
IPv6 GRE tunnel IPv6
IPv6 IPv6 over IPv4 tunnel IPv6
Border device Border device
Border device Border device (dual-stack) (dual-stack)
(dual-stack) (dual-stack)
IPv4 Header GRE Header IPv6 Header IPv6 Data
IPv4 Header IPv6 Header IPv6 Data
6 Huawei Confidential
Automatic Tunnel
⚫ For an automatic tunnel, you only need to configure the source IPv4 address of the tunnel, and the destination IPv4 address of the
tunnel is automatically generated by the device. To automatically generate a destination IPv4 address, a tunnel interface on the
device uses a special IPv6 address that contains an IPv4 address. The device obtains an IPv4 address from the destination IPv6
address of an IPv6 packet, and uses this IPv4 address as the destination address of the tunnel.
Automatic IPv4-compatible IPv6 tunnel 6to4 tunnel ISATAP tunnel
• The destination address (special IPv6 address • A 6to4 tunnel uses special IPv6 addresses that • An Intra-Site Automatic Tunnel Addressing
used by the automatic tunnel) of an IPv6 contain IPv4 addresses as the network prefix. Protocol (ISATAP) tunnel uses special IPv6
packet is an IPv4-compatible IPv6 address. The • 6to4 address format: addresses that contain IPv4 addresses as the
first 96 bits of the address are all 0s, and the interface ID.
last 32 bits are an IPv4 address. • ISATAP interface ID format:
IPv4
FP TLA SLA ID Interface ID IPv4
Address 000000ug00000000 0101111011111110
IPv4 Header IPv6 Header IPv6 Data Address
Source IPv4: 10.1.1.1 Source IPv6: ::A01:101
Destination IPv4: Destination IPv6: ::A01:102 3 bits 13 bits 32 bits 16 bits 64 bits 16 bits 16 bits 32 bits
10.1.1.2 Tunnel 1
10.1.1.1/24 10.1.1.2/24 LLA: FE80::5EFE:A01:101
10.1.1.1/24 10.1.1.2/24
GUA: 1::5EFE:A01:101
IPv4 IPv4
IPv4
IPv6 IPv6 6to4 6to4 tunnel 6to4
IPv6 ISATAP tunnel
R1 IPv4-compatible R2 6to4 router 6to4 router
Tunnel 1 IPv6 tunnel Tunnel 1 Host 1 ISATAP router Host 2
Tunnel 1 Tunnel 1
::A01:101/96 ::A01:102/96 3::8
2002:A01:101::1/48 2002:A01:102::1/48 GE0/0/1:10.1.1.1/24
7 Huawei Confidential
▫ R1 encapsulates the IPv6 packet into an IPv4 packet. The source address of
the IPv4 packet is the source IPv4 address 10.1.1.1 of the tunnel, and the
destination IPv4 address is the last 32 bits (10.1.1.2) of the IPv4-compatible
IPv6 address ::A01:102.
▫ R1 sends the resulting IPv4 packet out from its tunnel interface. Then, the
packet is routed to the destination node R2 at 10.1.1.2 over the IPv4
network. When receiving this packet, R2 decapsulates the packet to obtain
the original IPv6 packet, and processes the IPv6 packet using the IPv6
protocol stack.
▫ The response packet returned by R2 is processed in a similar way as the
IPv6 packet sent by R1.
• 6to4 tunnel:
▫ The network prefix of a 6to4 address is 64 bits long.
▪ The first 48 bits (2002: a.b.c.d) are determined by the IPv4 address
assigned to a router and cannot be changed.
▪ When the IPv4 address is globally unique, the "u" bit is set to 1;
otherwise, the "u" bit is set to 0. ISATAP tunnels are typically applied
within sites. Therefore, the IPv4 addresses in interface IDs do not need
to be globally unique.
▪ The "g" bit is an IEEE group/individual bit and its value is fixed at 0.
▫ As shown in the figure, Host 2 on the IPv4 network supports the IPv4/IPv6
dual stack and has a private IPv4 address (10.1.1.2/24). You can perform
the following operations on Host 2 to enable the ISATAP function:
1. Configure an ISATAP tunnel interface. Then, Host 2 generates an
ISATAP interface ID based on its IPv4 address, and generates an
ISATAP link-local IPv6 address (FE80::5EFE:A01:102) based on the
interface ID, so that it can access the IPv6 network on the local link.
Dual-stack Dual-stack
CE1 6PE1 IPv4 6PE2 CE2
IPv6 link IPv6 link
IPv4 tunnel (MPLS)
CEs and PEs use IPv6 PEs use IPv4 routing protocols to
routing protocols such exchange IPv4 routes with P devices
as IGP, EBGP, and and other PEs.
static routing to Tunnels are established between PEs to
exchange IPv6 routes. transparently transmit IPv6 packets.
9 Huawei Confidential
• Advantages of 6PE:
▫ Easy maintenance: All configurations are performed on PEs. IPv6 services
are carried over the existing IPv4 networks, simplifying network
maintenance. Additionally, users on IPv6 networks are unaware of the IPv4
networks.
Intra-AS 6PE
⚫ Isolated IPv6 networks can connect to the same autonomous system (AS). PEs in the AS exchange IPv6 routes by
establishing MP-IBGP peer relationships.
⚫ The following figure shows how CE2 sends a route to CE1 and how CE1 sends a packet to CE2 in an intra-AS 6PE
scenario.
I-L is the inner label (MP-IBGP label), which is assigned by MP-BGP. It indicates the outbound interface or CE to which the
packet should be forwarded.
O-L is the outer tunnel label (MPLS Label), which is assigned by MPLS. It directs the packet to the BGP next hop.
1::1/128 I-L1
6PE1 6PE2 1::1/128 Next hop: 6PE2 1::1/128
IPv4 IBGP CE1 6PE1 6PE2 CE2
MPLS LSP IPv6 EBGP IPv4 IBGP IPv6 EBGP
1::1/128
10 Huawei Confidential
3. When receiving the labeled IPv6 route, 6PE1 recurses the route to a tunnel,
and adds the route to the local forwarding table. Then, 6PE1 changes the
next hop of the IPv6 route to itself, removes the label from the route, and
sends the route to its EBGP peer CE1.
1. CE1 sends an ordinary IPv6 packet to 6PE1 over an IPv6 link on the public
network.
2. Upon receipt of the IPv6 packet, 6PE1 looks up the destination address of
the packet in its forwarding table, and encapsulates the packet with inner
and outer labels. Then, 6PE1 sends the resulting IPv6 packet to 6PE2 over a
public network tunnel.
3. When receiving the IPv6 packet, 6PE2 removes the inner and outer labels
and forwards the resulting IPv6 packet to CE2 based on the destination
address over an IPv6 link.
Overview IPv6 over IPv4 6PE 6VPE IPv4 over IPv6 NAT64 IVI
11 Huawei Confidential
• When 6PE routes are configured to share the same explicit null label on 6PE2,
6PE2 advertises 6PE routes with an explicit null label to 6PE1 without applying
for labels for the routes.
• When forwarding data to 6PE2, 6PE1 adds two labels to the data. The outer label
is distributed by LDP pointing to 6PE2, and the inner label is an explicit null label
distributed by MP-BGP.
• When the IPv6 data packet arrives at 6PE2, 6PE2 pops out the explicit null label
and forwards the packet to CE2.
Overview IPv6 over IPv4 6PE 6VPE IPv4 over IPv6 NAT64 IVI
VPN1 VPN1
Site Site • 6VPE uses MP-BGP to advertise VPNv6 routes on an IPv4 MPLS
Dual-stack Dual-stack backbone network, uses MPLS to assign labels to identify IPv6
6VPE1 IPv4 MPLS 6VPE2
CE (IPv6) CE (IPv6) packets, and uses tunneling mechanisms such as LSP and MPLS
BGP/MPLS IPv6 VPN TE to transmit private network data on the backbone network.
CE (IPv6) CE (IPv6) • If the backbone network is an IPv4 network, IPv4 addresses are
used to establish VPNv6 peer relationships between PEs to
A BGP/MPLS IPv6 VPN transmit IPv6 VPN routes. For these routes, IPv4 tunnels on the
VPN2 VPN2
tunnel is established
Site between PEs to transmit Site backbone network can be selected to transmit IPv6 VPN services.
IPv6 VPN routes. • Except the routing protocols running between PEs and CEs,
implementation of 6VPE is the same as that of IPv4 VPN.
CEs and PEs use IPv6 routing protocols
such as IGP, EBGP, and static routing to
exchange IPv6 routes.
12 Huawei Confidential
• In 6VPE, IPv6 routing protocols run between PEs and CEs. The following IPv6
routing protocols can be used to provide IPv6 VPN services:
▫ BGP4+
[HUAWEI-vpn-instance-vpna] ipv6-family
[HUAWEI-vpn-instance-vpna-af-ipv6] route-distinguisher route-distinguisher
[HUAWEI-vpn-instance-vpna-af-ipv6] vpn-target vpn-target [ both | export-extcommunity | import-
extcommunity ]
A route distinguisher (RD) and VPN target extended community are configured for the VPN instance IPv6 address
family.
13 Huawei Confidential
• Note: This course uses a Huawei NetEngine 8000 series router as an example to
describe how to configure 6VPE.
• Command: <HUAWEI>system-view [ immediately ]
14 Huawei Confidential
Overview IPv6 over IPv4 6PE 6VPE IPv4 over IPv6 NAT64 IVI
15 Huawei Confidential
• Note: For details about route exchange between PEs and CEs, see the
corresponding product documentation.
Overview IPv6 over IPv4 6PE 6VPE IPv4 over IPv6 NAT64 IVI
16 Huawei Confidential
Overview IPv6 over IPv4 6PE 6VPE IPv4 over IPv6 NAT64 IVI
⚫ Configuration requirements:
Users at different sites desire IPv6 data communication between
each other across a public network without having the internal
route information known to the public network, and also
implement service isolation.
As shown in the figure, CE1 and CE2 belong to vpna. It is required
that 6VPE be configured to allow sites in vpna to communicate
with each other through an MPLS backbone network, and PEs The configuration on PE2 is similar to
and CEs exchange static routes. that on PE1, and is not provided here.
17 Huawei Confidential
Overview IPv6 over IPv4 6PE 6VPE IPv4 over IPv6 NAT64 IVI
⚫ Configuration requirements:
Users at different sites desire IPv6 data communication between
each other across a public network without having the internal
route information known to the public network, and also
implement service isolation.
As shown in the figure, CE1 and CE2 belong to vpna. It is required
that 6VPE be configured to allow sites in vpna to communicate
with each other through an MPLS backbone network, and PEs
and CEs exchange static routes.
18 Huawei Confidential
Overview IPv6 over IPv4 6PE 6VPE IPv4 over IPv6 NAT64 IVI
19 Huawei Confidential
Overview IPv6 over IPv4 6PE 6VPE IPv4 over IPv6 NAT64 IVI
20 Huawei Confidential
Overview IPv6 over IPv4 6PE 6VPE IPv4 over IPv6 NAT64 IVI
IPv4 Header IPv4 Data IPv4 Header IPv4 Data the other nodes (Host 1, Host 2, and nodes between R1
and R2) are unaware of the tunnel. IPv4 packets are
IPv6 Header IPv4 Header IPv4 Data transmitted between Host 1 and R1 and between R2 and
Host 2, and IPv6 packets are transmitted between R1 and
R2. Therefore, R1 and R2 must be able to process both IPv4
and IPv6 packets; that is, IPv4/IPv6 dual stack must be
enabled on both R1 and R2.
21 Huawei Confidential
IPv6 data
IPv4 data IPv4 server
22 Huawei Confidential
NAT64 Prefixes
⚫ The device determines whether to perform NAT64 on an IPv6 packet by checking whether the IPv6 packet contains
a NAT64 prefix.
⚫ There are two types of NAT64 prefixes:
Well-known prefix: 64:FF9B::/96, which exists by default and does not need to be configured.
Predefined prefix: a prefix with the length of 32, 40, 48, 56, 64, or 96 bits.
⚫ Where an IPv4 address is embedded in an IPv6 address depends on the length of the predefined NAT64 prefix, as
shown in the following figure.
In a predefined NAT64 prefix, PL indicates the length of the prefix, suffix is a random value (the device does not process this
field), and U is the reserved octet whose value must be set to 0.
PL
• If an IPv4 address is 192.168.0.1 and the NAT prefix is 2001:DB8::/64,
32 Prefix (32) V4 (32) U Suffix
40 Prefix (40) V4 (24) U (8) Suffix the IPv6 address corresponding to this IPv4 address is
48 Prefix (48) (16) U (16) Suffix 2001:0DB8:0000:0000:00C0:A800:0100:0000, which can be
56 Prefix (56) (8) U V4 (24) Suffix abbreviated to 2001:DB8::C0:A800:100:0.
64 Prefix (64) U V4 (32) Suffix • When you configure a DNS64 server, ensure that it has the same
96 Prefix (96) V4 (32) NAT64 prefix and prefix length as the NAT64 device.
23 Huawei Confidential
• NAT64 types:
▫ PAT-based NAT64: translates both addresses and port numbers by mapping
[IPv6 address, port number] into [IPv4 address, port number]. Multiple
IPv6 addresses can be translated into the same IPv4 address. The mappings
are differentiated by port number. This mode is commonly used.
Dynamic NAT64
⚫ Dynamic NAT64 applies to the scenarios where a large number of IPv6 users use unfixed IP addresses. When an IPv6 user accesses
an IPv4 server, a NAT64 device dynamically translates the IPv6 address in the user packet into an IPv4 address from an address pool,
converts the IPv6 packet into an IPv4 packet, and then sends the IPv4 packet to the IPv4 server.
⚫
The NAT64 device then creates a session table for the IPv6-to-IPv4 traffic and records the address mapping. The NAT64 device
forwards the IPv4-to-IPv6 traffic that matches an entry in the session table to the corresponding IPv6 user based on the address
64:FF9B::0101:0101 1.1.1.1
mapping.
DNS64
96 bits 32 bits
24 Huawei Confidential
Static NAT64
⚫ Static NAT64 allows for static mappings between IPv6 and IPv4 addresses. These mappings will not be updated or age and will
always exist unless you delete them. Both IPv6-to-IPv4 traffic and IPv4-to-IPv6 traffic can trigger the creation of session tables. In
this way, not only IPv6 users can access IPv4 servers, but also IPv4 users can access IPv6 servers.
⚫
When users access services of a different protocol stack (IPv4-to-IPv6 or IPv6-to-IPv4), the device translates the destination address
in packets between protocol stacks according to the corresponding static address mapping.
Static mapping: The relationship between the domain
DNS name and address has been registered.
2001:DB8::2 <-----> 2.1.1.10
Prefix64:
64:FF9B::/96 2
25 Huawei Confidential
3. After receiving the DNS reply, the user sends a packet with the obtained
IPv4 address as the destination address to the remote server.
4. Upon receipt of the IPv4 packet, the NAT64 device translates the
destination IPv4 address into an IPv6 address (2001:DB8::2) according to
the preconfigured static address mapping (based on which a server
mapping table is generated), combines the source IPv4 address and the
preconfigured NAT64 prefix into a source IPv6 address (64:FF9B::101:101),
and converts the IPv4 packet into an IPv6 packet. The NAT64 device then
sends the IPv6 packet to the remote server on the IPv6 network, and
generates a session table.
5. Upon receipt of the IPv6 packet, the server returns a reply packet.
6. After receiving the reply packet from the IPv6 server, the NAT64 device
converts the IPv6 packet into an IPv4 packet according to the session table,
and sends the IPv4 packet to the IPv4 user.
Overview IPv6 over IPv4 6PE 6VPE IPv4 over IPv6 NAT64 IVI
26 Huawei Confidential
27 Huawei Confidential
▫ global: specifies the global 3-tuple NAT mode. The generated server
mapping table does not contain security zone parameters and is not subject
to restrictions of interzone relationships.
▫ local: specifies the local 3-tuple NAT mode. The generated server mapping
table contains security zone parameters and is subject to restrictions of
interzone relationships.
[HUAWEI] nat64 static protocol { tcp | udp } ipv6-address [ ipv6-port ] ipv4-address [ipv4-port ] [ route ]
Static NAT64 mapping for TCP or UDP is configured.
28 Huawei Confidential
Overview IPv6 over IPv4 6PE 6VPE IPv4 over IPv6 NAT64 IVI
The IPv6 network has a large number of PCs using unfixed
IP addresses. These PCs need to access the server on the 4. Set the NAT64 prefix to 2001:db8:1::/96 (a predefined prefix).
IPv4 network through the domain name [FW1] nat64 prefix 2001:db8:1:: 96
example.huawei.com.
29 Huawei Confidential
Overview IPv6 over IPv4 6PE 6VPE IPv4 over IPv6 NAT64 IVI
30 Huawei Confidential
• The destination address of IPv6 packets sent by the IPv6 PC is the NAT64 address
2001:DB8:1::101:102/96.
• Other configurations:
▪ Set the IPv4 address of the server to 1.1.1.2/24, which is on the same
network segment as GE1/0/2 of Firewall 1.
Overview IPv6 over IPv4 6PE 6VPE IPv4 over IPv6 NAT64 IVI
0 31 39 71 127
IVI Prefix FF IPv4 Address Suffix IPv6 Internet
IVI6
address
• The first 32 bits are an IVI prefix, which is an IPv6 address IPv6
prefix, and the last eight bits are fixed at FF. IPv6 user IVI6 IVI
• The 41st to 72nd bits are an embedded IPv4 address. address gateway IPv4 Internet
• The value of Suffix is all 0s.
IPv6 data
IPv4 data IPv4 server
31 Huawei Confidential
• IVI supports communication requests initiated by both IPv6 and IPv4 hosts.
• The following uses access from an IVI6 host to a global IPv4 host as an example:
1. In this scenario, stateless IPv6 address autoconfiguration cannot be used
due to the special IVI6 address format. Therefore, the IVI6 host obtains the
IVI6 address, default gateway address, and DNS server address through
static configuration or DHCPv6 Options.
2. The IVI6 host sends an AAAA query request to the dual-stack IVI DNS
server. This DNS server stores the IVI4 addresses of IVI servers and their
corresponding IVI6 addresses. When receiving the AAAA query request, the
IVI DNS server sends an AAAA query request to the target network. If no
AAAA record exists, the IVI DNS server sends an A query request, converts
the obtained A record into an AAAA record according to the IVI mapping
rule, and returns the AAAA record to the IVI6 host.
3. The IVI6 host sends a data packet. When receiving this data packet, the IVI
gateway statelessly converts the packet into an IPv4 packet. During
address translation, the IPv4 address embedded in the IVI6 address is
extracted and used as the source address in the IPv4 header. During
header encapsulation, the Stateless IP/ICMP Translation (SIIT) algorithm is
used.
4. The resulting IPv4 data packet is routed to the IPv4 network, thereby
implementing access from the IVI6 host to the IPv4 host.
• IVI restrictions: The IPv6 addresses of hosts and servers must be planned and
configured in compliance with the IVI format.
Quiz
B. 6PE
C. NAT64
D. 6VPE
32 Huawei Confidential
1. ABD
Summary
⚫ IPv6 can provide a large number of network address resources, making it a key to implementing
Internet of Everything (IoE) and promoting the digital, network-based, and intelligent development of
production and life. The IPv6-based next-generation Internet is an inevitable trend of Internet evolution
and upgrade.
⚫ In the early stage of IPv4-to-IPv6 transition, IPv4 networks are widely deployed, whereas IPv6 networks
are siloed networks scattered around the world. Tunneling technologies can be used to create tunnels
over IPv4 networks, so as to connect these siloed IPv6 networks. Address translation technologies can
also be used to translate between IPv6 and IPv4 addresses and protocols for bidirectional
communication.
⚫ This course mainly describes the fundamentals and applications of transition technologies during IPv6
network evolution, including IPv6 over IPv4 tunneling, 6PE, 6VPE, IPv4 over IPv6 tunneling, NAT64, and
IVI.
33 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. Introduction to QoS
6. Introduction to HQoS
3 Huawei Confidential
"Best-Effort" Traditional Network
⚫ When the IP network emerges, there is no QoS guarantee.
⚫ You only know that the packets have been sent out. Whether the packets can be received
and when the packets can be received are unknown.
Undifferentiated
treatment
First In First Out (FIFO)
4 Huawei Confidential
5 Huawei Confidential
Live QoS:
streaming
QoS is designed to provide different service
quality according to networking requirements.
Video
communication
6 Huawei Confidential
• To support voice, video, and data services of different requirements, the network
is required to distinguish different communication types before providing
corresponding QoS.
▫ For example, real-time services such as Voice over IP (VoIP) demand shorter
latency. A long latency for packet transmission is unacceptable. Email and
the File Transfer Protocol (FTP) services are comparatively insensitive to the
latency.
• To support voice, video, and data services of different requirements, the network
is required to distinguish different communication types before providing
corresponding QoS.
▫ The BE mode of traditional IP networks cannot identify and distinguish
various communication types on the networks. This distinguishing capability
is the premise for providing differentiated services. The BE mode cannot
satisfy application requirements, so QoS is introduced.
• What is QoS?
• QoS is designed to provide different service quality according to networking
requirements. Example:
▫ The bandwidth used by FTP on the backbone network can be limited, and
database access can be given a higher priority.
▫ For an ISP, its users may transmit voice, video, or other real-time services.
QoS enables the ISP to differentiate these packets and provide different
services.
▫ QoS can provide bandwidth and low delay guarantee for time-sensitive
multimedia services, and other services on the network do not affect these
time-sensitive services.
• Which factors affect QoS?
▫ Latency: indicates the round trip time (RTT) of an IP packet between two
nodes on a network. — Delay-sensitive traffic, such as video and voice
traffic
▫ Jitter: indicates the change in the latencies of different packets which are in
the same data stream and transferred in the same direction. — It is related
to the latency. If the latency is short, the jitter range is small, which has a
great impact on real-time services such as voice and video services.
▫ Packet loss rate: indicates the allowed maximum packet loss rate when a
service is transmitted on a network. — It is used to measure the network
reliability. A small number of lost packets have little impact on services, but
a large number of lost packets severely affect the transmission efficiency.
QoS provides
three Integrated Services (IntServ)
service models: model
Differentiated Services
(DiffServ) model
8 Huawei Confidential
BE Model
⚫ An application can send any number of packets at any time.
⚫ The network then makes the best effort to transmit the packets.
! No guarantee of performance in
terms of delay and reliability
Undifferentiated
treatment
FIFO
9 Huawei Confidential
• The BE model is the simplest service model in which an application can send any
number of packets at any time without obtaining approval or notifying the
network.
• The network then makes the best effort to transmit the packets but provides no
guarantee of performance in terms of delay and reliability.
• The BE model is the default service model for the Internet and applies to various
network applications, such as the File Transfer Protocol (FTP) and email. It uses
FIFO queues.
IntServ Model
⚫ Before sending packets, an application needs to apply for specific services through signaling.
⚫ After receiving a resource request from an application, the network reserves resources for
each information flow by exchanging RSVP signaling information.
!Complex implementation
and waste of resources
I require 1 Mbit/s
bandwidth.
Live
streaming Reserve 1 Mbit/s Reserve 1 Mbit/s
bandwidth bandwidth
Video
communication
……
10 Huawei Confidential
Live 1
Traffic classification Live
3
streaming and marking Queue streaming
scheduling
Video Video
communication DS edge node DS node communication
CoS Mapping DS domain
2
FTP FTP
Branch HQ
11 Huawei Confidential
• The DiffServ model classifies network traffic into multiple classes for
differentiated processing. To be specific, the DiffServ model implements traffic
classification first and allocates different identifiers to different classes of packets.
After a network node receives these packets, it simply identifies these identifiers
and processes packets based on the actions corresponding to these identifiers.
• There is an analogy between the DiffServ model and train ticket service system. A
train ticket marks the service that you book: soft sleeper, hard sleeper, hard seat,
or no seat. You get on a train and enjoy the specific service marked in your ticket.
On an IP network, an identifier is to a packet as a train ticket is to a passenger.
• In addition to traffic classification and marking, the DiffServ model provides the
queuing mechanism. When network congestion occurs on a device, the device
buffers packets in queues. The device sends the packets out of queues when
network congestion is relieved.
Common QoS Technologies (DiffServ Model)
Traffic limiting
Traffic policing and traffic shaping are used to
monitor the rate of traffic entering the network
and limit the usage of traffic and resources.
Congestion avoidance
Common It adjusts the network traffic to relieve
technologies network overload.
Congestion management
It adjusts the scheduling sequence of packets
to meet high QoS requirements of delay-
sensitive services.
12 Huawei Confidential
• Rate limiting: Traffic policing and traffic shaping monitor the rate of traffic
entering the network to limit the traffic and resource usage, providing better
services for users.
Token
Video
Queue 0
Inbound interface
Outbound interface
Scheduling
Queue 1
Other
Traffic Re-
Token CAR processing WRED GTS
classification marking Queue 2
bucket …
Voice …
Congestion Traffic
Traffic policing
avoidance shaping
Queue N
Congestion management
Data
13 Huawei Confidential
▫ Traffic policing: monitors the volume of specific data traffic that arrives at
network devices, and is usually applied to incoming traffic. When the traffic
volume exceeds the maximum value, traffic limiting or punishment
measures are taken to protect business interests and network resources of
service providers.
B. IntServ model
C. BE model
15 Huawei Confidential
1. ABC
Section Summary
16 Huawei Confidential
Contents
1. Introduction to QoS
6. Introduction to HQoS
17 Huawei Confidential
QoS Data Processing
Token
Video
Queue 0
Inbound interface
Outbound interface
Scheduling
Queue 1
Other
Traffic Re-
CAR processing WRED GTS
classification marking Queue 2
…
Voice …
Queue N
Data
18 Huawei Confidential
Traffic marking
Packets with different Queue
Video priorities
Inbound interface
Traffic
classification
Voice
Data
19 Huawei Confidential
▪ Internal marking
▪ Sets the CoS and drop precedence of packets for internal processing
on a device so that packets can be placed directly in specific queues.
Downlink direction
Packet header
Service class Color
priority
Different packets
CoS Drop priority
use
of packets of packets
different QoS
on the device on the device
priorities.
21 Huawei Confidential
• Packets carry different types of precedence field depending on the network type.
For example, packets carry the 802.1p value on a VLAN network, the EXP value
on an MPLS network, and the DSCP value on an IP network. To provide
differentiated services for different packets, the device maps the QoS priority of
incoming packets to the scheduling precedence (also called service class) and
drop precedence (also called color), and then performs congestion management
based on the service-class and congestion avoidance based on the color. Before
forwarding packets out, the device maps the service class and color of the
packets back to the QoS priority, which provides a basis for other devices to
process the packets.
External Priority: VLAN Packet
22 Huawei Confidential
• Eight service priorities (PRIs) are defined in the VLAN tag of the Ethernet frame
header.
External Priority: MPLS Packet
23 Huawei Confidential
• The EXP field in the label is used as the external priority of MPLS packets to
differentiate service classes of data traffic.
External Priority: IP Packet
External priority
DSCP 7 6 5 4 3 2 1 0 Value range: 0–63
24 Huawei Confidential
• Eight IP service types are defined in the Precedence field of the ToS field in an
IPv4 packet header.
• The ToS field in the IPv4 packet header is redefined as the Differentiated Services
(DS) field. That is, the IP Precedence field is extended.
Mapping Between External Priorities
CS
6 6 6 48-55 CS6 (48)
Priority in
5 5 5 40-47 EF EF (46)
4 4 4 32-39 AF4 AF41 (34) AF42 (36) AF43 (38)
3 3 3 24-31 AF3 AF31 (26) AF32 (28) AF33 (30)
AF
2 2 2 16-23 AF2 AF21 (18) AF22 (20) AF23 (22)
1 1 1 8-15 AF1 AF11 (10) AF12 (12) AF13 (14)
0 0 0 0-7 BE BE (0)
25 Huawei Confidential
Service Class
BA classification Uplink direction Downlink direction
SFU
VLAN packet 802.1p
Service class
MPLS packet MPLS EXP Mapping
Color
Queue CS7
Service class CS
26 Huawei Confidential
• Service classes refer to the internal priorities of packets. Eight service class values
are available: class selector 7 (CS7), CS6, expedited forwarding (EF), assured
forwarding 4 (AF4), AF3, AF2, AF1, and best-effort (BE). Service classes determine
the types of queues to which packets belong.
• The priority of queues with a specific service class is calculated based on
scheduling algorithms.
▫ If queues with eight service classes all use priority queuing (PQ) scheduling,
queues are displayed in descending order of priority: CS7 > CS6 > EF > AF4
> AF3 > AF2 > AF1 > BE.
▫ If the BE queue uses PQ scheduling (this configuration is rare on live
networks) but all the other seven queues use weighted fair queuing (WFQ)
scheduling, the BE queue is of the highest priority.
▫ If the queues of eight service classes all use WFQ scheduling, their priorities
are the same.
Color
BA classification Uplink direction Downlink direction
SFU
VLAN packet 802.1p
Service class
MPLS packet MPLS EXP Mapping
Color
Color
Red
27 Huawei Confidential
• Color, referring to the drop priority of packets on a device, determines the order
in which packets in one queue are dropped when traffic congestion occurs.
• As defined by the Institute of Electrical and Electronics Engineers (IEEE), the color
of a packet can be green, yellow, or red.
• Drop priorities are compared based on the configured parameters. For example,
if a maximum of 50% of the buffer is configured to store packets colored green,
whereas a maximum of 100% of the buffer is configured to store packets colored
red, the drop priority of packets colored green is higher than that of packets
colored red.
Mapping
BA classification Uplink direction Downlink direction
SFU
VLAN packet 802.1p
Service class
MPLS packet MPLS EXP Mapping
Color
IP packet DSCP 802.1p
Service class
Mapping MPLS EXP
Color
DSCP
• Mapping from external priorities to internal priorities • Mapping from internal priorities to external priorities
28 Huawei Confidential
• A device maps the QoS priority to the service class and color for incoming
packets and maps the service class and color back to the QoS priority for
outgoing packets.
Multi-field Classification
Real-time services such
as voice and video
services are given the
highest priority.
Live streaming Live streaming
Video Video
communication communication
DS edge node
29 Huawei Confidential
OR Modification in OR Modification in
sequence sequence
Traffic matching Traffic modification Traffic matching Traffic modification
rule 1 rule 1 rule 1 rule 1
Data flow
Traffic matching Traffic modification Traffic matching Traffic modification
rule 2 rule 2 rule 2 rule 2
30 Huawei Confidential
Traffic Classification Process
Real-time services such
as voice and video
services are given the
highest priority.
Video Video
communication communication
DS edge node DS node DS node DS edge node
FTP FTP
HQ Branch
31 Huawei Confidential
32 Huawei Confidential
Checking the MF Classification Configuration
⚫ After MF classification is configured, you can run the following commands to check the configuration.
system-view
display traffic classifier user-defined [ classifier-name ] //Check the traffic classifier configuration.
display traffic behavior [ system-defined | user-defined ] [ behavior-name ] //Check the traffic behavior configuration.
display traffic policy user-defined [ policy-name ] classifier [classifier-name ] //Check the traffic policy configuration.
display traffic-policy applied-record [ policy-name ] //Check the record of the specified traffic policy.
33 Huawei Confidential
(Optional) Modifying the BA Classification Configuration
⚫ Specify the packet priority trusted on an
DS edge node DS node
interface.
system-view
interface [interface-type interface-num] //Enter the
DS domain
interface view.
trust [8021p | dscp] //Specify the priority to be trusted.
• Based on the priority mapping table, BA
classification maps data with the specific QoS ⚫ Configure a priority mapping table.
system-view
field to the internal priority. qos map-table [ dot1p-dot1p | dot1p-dscp | dot1p-lp | dscp-
dot1p | dscp-dscp | dscp-lp ] //Enter the priority mapping table
• The priority mapping table can be modified as view.
input [input-value1] output [output-value] //Configure
required. The roadmap is as follows: mappings in the priority mapping table.
34 Huawei Confidential
Checking the Priority Mapping Configuration
⚫ After the priority mapping configuration is modified, you can run the following commands to check the
configuration.
system-view
display qos map-table [ dot1p-dot1p | dot1p-dscp | dot1p-lp | dscp-dot1p | dscp-dscp | dscp-lp ]
//Check the mapping between priorities.
35 Huawei Confidential
Quiz
B. False
2. (Multiple-answer question) Which of the following parameters are used to mark the QoS
priority of data packets?( )
A. EXP
B. 802.1p
C. DSCP
D. IP precedence
36 Huawei Confidential
1. A
2. ABCD
Section Summary
⚫ The DiffServ model must mark packets for differentiating them. Generally, MF
classification is used to mark incoming traffic on edge devices in a DS domain, and
BA classification is used to mark incoming traffic on devices in a DS domain.
⚫ Tags can be added to multiple types of data packet headers.
The Pri bit (802.1p priority) in the VLAN header is used to mark the QoS priority.
The EXP bit in the MPLS header is used to mark the QoS priority.
The TOS bit (DSCP/IP precedence) in the IP header is used to mark the QoS priority.
37 Huawei Confidential
Contents
1. Introduction to QoS
6. Introduction to HQoS
38 Huawei Confidential
Traffic Limiting Token Bucket Traffic Policing Traffic Shaping
Video Queue 0
Outbound interface
Inbound interface
Scheduling
Queue 1
Other
Traffic
CAR Re-marking processing WRED GTS
classification Queue 2
…
Voice …
Traffic policing Traffic
Queue N shaping
Data
39 Huawei Confidential
• This course describes two rate limiting technologies: traffic policing and traffic
shaping.
• Traffic policing: If the traffic rate of a connection exceeds the specifications on an
interface, traffic policing allows the interface to drop excess packets or re-mark
the packet priority to protect network resources and protect carriers' profits. An
example of this process is restricting the rate of HTTP packets to 50% of the
network bandwidth.
• Traffic shaping: allows the traffic rate to match that on the downstream device.
When traffic is transmitted from a high-speed link to a low-speed link or a traffic
burst occurs, the inbound interface of the low-speed link is prone to severe data
loss. To prevent this problem, traffic shaping must be configured on the
outbound interface of the device connecting to the high-speed link.
Traffic Limiting Token Bucket Traffic Policing Traffic Shaping
Video Queue 0
Outbound interface
Inbound interface
Scheduling
Queue 1
Other
Traffic Re-
CAR processing WRED GTS
classification marking Queue 2
…
Voice …
Traffic
Traffic policing
shaping
Queue N
Token
bucket
40 Huawei Confidential
• Both traffic policing and traffic shaping use the token bucket technology.
▫ Token bucket: A token bucket is used to check whether traffic meets packet
forwarding conditions.
Traffic Limiting Token Bucket Traffic Policing Traffic Shaping
Single-Rate-Single-Bucket Mechanism
• Committed Information Rate (CIR):
indicates the rate at which tokens are put into
bucket C, in kbit/s.
Token
• Committed burst size (CBS):
Discard packets
indicates the maximum volume of burst traffic that
in the case of
bucket C allows before the rate of some traffic CIR overflow
exceeds the CIR, that is, the capacity of bucket C.
The value is expressed in bytes.
Initial
Bucket CBS number of
• The single-rate-single-bucket mechanism does C tokens (Tc)
not allow burst traffic. Only committed traffic is = CBS
allowed. The data packet is marked green
Yes (Tc = Tc-B) and forwarded by default.
B < Tc?
Size of an arriving
packet (B) No (Tc remains unchanged)
The data packet is marked red
and discarded by default.
41 Huawei Confidential
• When a packet arrives, the device compares the packet with the number of
tokens in the bucket. If there are sufficient tokens, the packet is forwarded (one
token is associated with 1-bit forwarding permission). If there are no enough
tokens, the packet is discarded or buffered.
Single-Rate-Two-Bucket Mechanism
• Initial number of tokens
CIR:
Token Bucket C: Tc = CBS
Indicates the rate at which tokens are put into Bucket E: Te = EBS
bucket C, in kbit/s. Token overflow
• CBS: CIR
Indicates the maximum volume of burst traffic that
bucket C allows before the rate of some traffic
exceeds the CIR, that is, the capacity of bucket C.
The value is expressed in bytes. Bucket Bucket
CBS EBS
C E
42 Huawei Confidential
• When a packet arrives, the device compares the packet with the number of
tokens in the bucket. If there are sufficient tokens, the packet is forwarded (one
token is associated with 1-bit forwarding permission). If there are no enough
tokens, the packet is discarded or buffered.
▫ If B is less than or equal to Tc, the packet is marked green and Tc decreases
by B.
▫ If B is greater than Tc and less than or equal to Te, the packet is marked
yellow and Te decreases by B.
▫ If B is greater than Te, the packet is marked red, and Tc and Te remain
unchanged.
Traffic Limiting Token Bucket Traffic Policing Traffic Shaping
Two-Rate-Two-Bucket Mechanism
• Peak Information Rate (PIR): Initial number of tokens
Indicates the rate at which tokens are put into Token Token Bucket P: Tp = PBS
Bucket C: Tc = CBS
bucket P, that is, the maximum traffic rate that Discard packets in the
bucket P allows. The PIR is greater than the CIR. The PIR case of overflow Discard packets in the
value is expressed in kbit/s. case of overflow
• Peak burst size (PBS): CIR
Indicates the capacity of bucket P, that is, the
maximum volume of burst traffic that bucket P
allows. The PBS is greater than the CBS. The value is
Bucket Bucket
expressed in bytes. PBS CBS
P C
• CIR:
Indicates the rate at which tokens are put into Yes (Tc and Tp The data packet is marked red
bucket C, in kbit/s. remain unchanged) and discarded by default.
B > Tp?
• CBS:
Indicates the maximum volume of burst traffic that Size of an arriving The data packet is marked
packet (B) No
bucket C allows before the rate of some traffic Yes (Tp = Tp-B) yellow and forwarded by default.
exceeds the CIR, that is, the capacity of bucket C.
Tp > B > Tc?
The value is expressed in bytes.
No (Tc = Tc-B)
• The two-rate-two-bucket mechanism allows
The data packet is marked green
long-term burst traffic. and forwarded by default.
43 Huawei Confidential
• The two rate three color marker (trTCM) algorithm focuses on the traffic burst
rate and checks whether the traffic rate conforms to the specifications. Therefore,
traffic is measured based on bucket P and then bucket C.
▫ If B is greater than Tp, the packet is marked red and Tc and Tp remain
unchanged.
▫ If B is greater than Tc and less than or equal to Tp, the packet is marked
yellow and Tp decreases by B.
▫ If B is less than or equal to Tc, the packet is marked green, and Tp and Tc
decrease by B.
Traffic Limiting Token Bucket Traffic Policing Traffic Shaping
44 Huawei Confidential
• In the figure:
▫ An edge network device connects a wide area network (WAN) and a local
area network (LAN). The LAN bandwidth (100 Mbit/s) is higher than the
WAN bandwidth (2 Mbit/s).
▫ When a LAN user attempts to send a large amount of data to a WAN, the
edge network device is prone to traffic congestion. Traffic policing can be
configured on the edge network device to restrict the traffic rate,
preventing traffic congestion.
CAR
⚫ CAR uses token buckets to measure traffic and determines whether a packet conforms to the specification.
Packets are forwarded at the original rate.
(Traffic policing is not required.)
Packets Remark
match rules.
Compliant Forward
Traffic
Arriving packets classification
Discard
Token bucket
• Token bucket modes • The device marks the packet red, yellow, or green based on
the metering result using the token bucket.
1. Single-rate-single-bucket
1. Green indicates that the packets comply with the specifications
2. Single-rate-two-bucket
and are directly forwarded.
3. Two-rate-two-bucket
2. Yellow indicates that temporary burst traffic is allowed although it
does not comply with specifications. After the traffic is re-marked,
the priority is reduced and the traffic is forwarded in BE mode.
3. Red indicates that the packet rate is high and does not comply
with the specifications. Therefore, the packets are discarded.
45 Huawei Confidential
• Traffic policing uses CAR to control traffic. CAR uses token buckets to measure
traffic and determines whether a packet conforms to the specification.
• CAR has the following two functions:
▫ Rate limiting: Only packets allocated enough tokens are allowed to pass so
that the traffic rate is restricted.
• CAR process:
▫ When a packet arrives, the device matches the packet against matching
rules. If the packet matches a rule, the device uses token buckets to meter
the traffic rate.
▫ The device marks the packet red, yellow, or green based on the metering
result using the token bucket. Red indicates that the traffic rate exceeds the
specifications. Yellow indicates that the traffic rate exceeds the
specifications but is within an allowed range. Green indicates that the
traffic rate is conforming to the specifications.
▫ The device drops packets marked red, re-marks and forwards packets
marked yellow, and forwards packets marked green.
• Three token bucket modes can be used.
▫ To control the traffic rate, use single-rate-single-bucket.
▫ To control the traffic rate and check whether the traffic rate exceeds the
CIR or PIR, use two-rate-two-bucket. Note that traffic marked yellow must
be processed differently from traffic marked green. Otherwise, the
implementation of the two-rate-two-bucket mechanism is the same as that
of the single-rate-single-bucket mechanism.
Traffic Limiting Token Bucket Traffic Policing Traffic Shaping
47 Huawei Confidential
• Voice, video, and data services are transmitted on an enterprise network. When a
large amount of traffic enters the network, congestion may occur due to
insufficient bandwidth. Different guaranteed bandwidth must be provided for the
voice, video, and data services in descending order of priority. In this situation,
traffic policing can be configured to provide the highest guaranteed bandwidth
for voice packets and lowest guaranteed bandwidth for data packets. This
configuration ensures preferential transmission of voice packets during
congestion.
DS domain
system-view
interface [interface-type interface-num] //Enter the
interface view.
• Typically, traffic policing is performed in the inbound qos car [ inbound | outbound ] [ acl acl-number |
direction of a device. Traffic policing can be deployed destination-ip-address | source-ip-address ] cir [cir-value] [ pir pir-
value ] [ cbs cbs-value pbs pbs-value ] //Configure traffic
on the terminal side or in the inbound direction of an policing for specific traffic in the inbound or outbound direction of
an interface. The CIR must be configured. The CIR indicates the
egress device as required. Traffic policing can be maximum committed rate of traffic policing. If the PIR is not
configured based on interfaces or MQC. configured, it is equal to the CIR. In this case, the traffic rate
cannot be higher than the CIR.
• The configuration roadmap of interface-based traffic
policing is as follows:
48 Huawei Confidential
Traffic Limiting Token Bucket Traffic Policing Traffic Shaping
49 Huawei Confidential
Traffic Limiting Token Bucket Traffic Policing Traffic Shaping
⚫ After MQC-based traffic policing is configured, you can run the following commands to check
the configuration.
system-view
display traffic classifier user-defined [ classifier-name ] //Check the traffic classifier configuration.
display traffic behavior [ system-defined | user-defined ] [ behavior-name ] //Check the traffic behavior configuration.
display traffic policy user-defined [ policy-name ] classifier [classifier-name ] //Check the traffic policy configuration.
display traffic-policy applied-record [ policy-name ] //Check the record of the specified traffic policy.
50 Huawei Confidential
Traffic Limiting Token Bucket Traffic Policing Traffic Shaping
51 Huawei Confidential
Scheduling
Leave a No outbound interface.
Queue queue Shaping? Forward
Yes
Compliant
Token bucket The data packets
that are leaving
queues are still
forwarded.
When packets in a queue are Exceeding
transmitted at a rate exceeding the
specifications, the queue is marked
unscheduled and will be scheduled
when the bandwidth is available.
52 Huawei Confidential
• When packets leave queues, the packets that do not need to be shaped are
forwarded. The packets that need to be shaped are measured against token
buckets.
▫ If the packet rate conforms to the rate limit, the packet is marked green
and forwarded.
▫ If the rate of a data packet exceeds the threshold, the data packet is still
forwarded. In this case, the status of the queue where the data packet is
located is changed to unscheduled, and the queue is scheduled when the
token bucket is filled with new tokens. After the queue is marked
unscheduled, more packets can be put into the queue, but excess packets
over the queue capacity are dropped. Therefore, traffic shaping allows
traffic to be sent at an even rate but does not provide zero-packet-loss
guarantee.
Traffic Limiting Token Bucket Traffic Policing Traffic Shaping
Scheduling
an interface
53 Huawei Confidential
• When packets leave queues, all queues are measured together against token
buckets.
▫ If the packet rate conforms to the rate limit, the packet is marked green
and forwarded.
▫ If the packet rate exceeds the threshold (that is, tokens in the token bucket
are insufficient), the packet is marked red. In this case, the interface stops
scheduling and continues to schedule the packets when there are sufficient
tokens.
Traffic Limiting Token Bucket Traffic Policing Traffic Shaping
⚫ If all branches connect to the Internet at the same time, a large amount of web traffic sent from the headquarters to the Internet causes network
congestion. As a result, some web traffic is discarded.. As shown in the figure, to prevent web traffic loss, traffic shaping can be configured before traffic
sent from enterprise branches enters the enterprise headquarters.
Uplink mapping
Traffic direction
Configure
traffic shaping in the
Branch 1 outbound direction of
an interface.
ISP HQ Internet
Branch 2
• Traffic shaping is generally used in the outbound direction of an interface and is mainly used to limit the traffic rate. It
is recommended for packet loss-sensitive traffic (such as Internet access and service download).
54 Huawei Confidential
Configuring Interface-based Traffic Shaping
⚫ Configure interface-based traffic shaping.
DS edge node DS node
system-view
DS domain interface [interface-type interface-num] //Enter the
interface view.
qos gts cir [cir-value] [ cbs cbs-value ] //Configure traffic
shaping in the outbound direction of an interface. The CIR
• Traffic shaping can be configured only in the indicates the maximum traffic shaping rate. You can configure the
CBS as required to control the size of the token bucket. The CIR
outbound direction of a device. It falls into interface-
must be configured.
based, queue-based, and MQC-based traffic shaping.
55 Huawei Confidential
Configuring Queue-based Traffic Shaping
⚫ Create a queue profile and configure queue shaping.
DS edge node DS node
system-view
interface [interface-type interface-num] //Enter the
DS domain interface view.
qos queue-profile [queue-profile-name] //Create a queue
profile.
• To shape packets in each queue on an interface, queue [start-queue-index] to [end-queue-index ] gts cir
[cir-value] [ cbs cbs-value ] //Configure traffic shaping for a
configure a queue profile and apply it to the interface. specified queue in the outbound direction and set the CIR.
• You can set different traffic shaping parameters for ⚫ Apply the queue profile to an interface.
queues with different priorities to provide system-view
differentiated services. The configuration roadmap is interface [interface-type interface-num] //Enter the
interface view.
as follows: qos queue-profile [queue-profile-name] //Apply the queue
profile to the interface.
▫ Create a queue profile.
56 Huawei Confidential
Configuring MQC-based Traffic Shaping
DS edge node DS node system-view
traffic classifier [classifier-name] //Create a traffic
classifier.
DS domain if-match [acl | vlan-id | …. ] //Match traffic based on
traffic characteristics.
system-view
• MQC-based traffic policing uses traffic classifiers to traffic behavior [behavior-name] //Create a traffic
implement differentiated services. behavior.
gts cir [cir-value] | pct [pct-value] //Configure traffic shaping
based on the maximum traffic rate or the percentage of the
• The configuration roadmap is as follows:
occupied interface bandwidth.
▫ Configure a traffic classifier to match traffic. system-view
traffic policy [policy-name] //Create a traffic policy.
▫ Configure a traffic behavior to define an action for packets.
classifier [classifier-name] behavior [behavior-name]
▫ Bind the traffic classifier and traffic behavior to a traffic //Bind the traffic classifier to the traffic behavior.
policy. system-view
interface [interface-type interface-num] //Enter the
▫ Apply the traffic policy to an interface in the outbound interface view.
direction. traffic-policy [policy-name] [inbound | outbound] //Apply
the traffic policy to the interface in the outbound direction.
57 Huawei Confidential
Checking the Traffic Shaping Configuration
⚫ After queue-based traffic shaping is configured, you can run the following commands to check the
configuration.
system-view
display qos queue-profile [ queue-profile-name ] //Check the queue profile configuration.
⚫ After MQC-based traffic shaping is configured, you can run the following commands to check the
configuration.
system-view
display traffic classifier user-defined [ classifier-name ] //Check the traffic classifier configuration.
display traffic behavior [ system-defined | user-defined ] [ behavior-name ] //Check the traffic behavior configuration.
display traffic policy user-defined [ policy-name ] classifier [classifier-name ] //Check the traffic policy configuration.
display traffic-policy applied-record [ policy-name ] //Check the record of the specified traffic policy.
58 Huawei Confidential
Quiz
1. (True or false) Traffic shaping caches excess traffic by default, and traffic policing discards
excess traffic by default.( )
A. True
B. False
2. (Multiple-answer question) How many modes of token buckets are used to measure
traffic?( )
A. Single-rate-single-bucket
B. Three-rate-two-bucket
C. Single-rate-two-bucket
D. Two-rate-two-bucket
59 Huawei Confidential
1. A
2. ACD
Section Summary
⚫ There are two traffic limiting technologies: traffic policing and traffic shaping.
⚫ Traffic policing discards excess traffic by default. It can be deployed in inbound and outbound
directions of a device.
⚫ Traffic shaping caches excess traffic by default. It can be deployed only in the outbound direction of a
device.
⚫ The device uses token buckets to measure traffic. There are three modes of token buckets:
The single-rate-single-bucket mechanism can be used together with traffic policing and traffic shaping.
The single-rate-two-bucket mechanism can be used only with traffic policing, and is mainly used in scenarios where
burst traffic occurs occasionally.
The two-rate-two-bucket can be used only with traffic policing, and is mainly used in scenarios with long-term
burst traffic.
60 Huawei Confidential
Contents
1. Introduction to QoS
6. Introduction to HQoS
61 Huawei Confidential
Background of Congestion Occurrence
Bandwidth mismatch
100 Mbit/s 10 Mbit/s
Congestion point
Aggregation problem
Data flow
10 Mbit/s
62 Huawei Confidential
• Traffic congestion occurs when multiple users compete for the same resources
(such as the bandwidth and buffer) on the shared network.
▫ For example, a user on a LAN sends data to a user on another LAN through
a WAN. The WAN bandwidth is lower than the LAN bandwidth. Therefore,
data cannot be transmitted at the same rate on the WAN as that on the
LAN. Traffic congestion occurs on the router connecting the LAN and WAN.
1. Congestion avoidance
Solution
2. Congestion management
63 Huawei Confidential
• Impact of congestion:
• Solutions:
▫ The solutions need to make full use of network resources on the premise of
meeting users' requirements for service quality. Congestion management
and congestion avoidance are commonly used to relieve traffic congestion.
▫ Congestion management provides means to manage and control traffic
when traffic congestion occurs.
▫ Congestion avoidance is a flow control technique used to relieve network
overload. By monitoring the usage of network resources in queues or
memory buffer, a device automatically drops packets on the interface that
shows a sign of traffic congestion. Congestion avoidance prevents queues
from being overflowed due to network overload. The following will
introduce congestion avoidance technology.
Congestion Avoidance Technology
⚫ Congestion avoidance is a flow control technique used to relieve network overload. By monitoring the
usage of network resources for queues or memory buffers, a device automatically drops packets that
shows a sign of traffic congestion.
Queue 1
1. Tail drop: traditional processing
Congestion Drop
avoidance Queue 2 2. Random Early Detection (RED)
policies
… 3. Weighted Random Early Detection (WRED)
Queue N
64 Huawei Confidential
Policy 1: Tail Drop
⚫ When the length of a queue reaches the maximum value, the device enabled with tail drop discards all
new packets buffered at the tail of the queue.
6 5 4 3 2 1
65 Huawei Confidential
• Due to the limited length of each queue, when a queue is full, the traditional
processing method discards all the packets sent to the queue until the congestion
is relieved. This processing method is called tail drop.
Disadvantage 1: Global TCP Synchronization
⚫ When the length of a queue reaches the maximum value, the device enabled with tail drop discards all
new packets buffered at the tail of the queue.
Problem
Global TCP
synchronization
The TCP connection
cannot be established.
• Process:
Traffic
1. TCP starts.
2. Traffic is too heavy. As a result, the queue is full and tail
2
3 drop occurs.
Maximum 3. The TCP ACK packet returned by the server is discarded
value due to congestion. Therefore, the sender does not receive
the TCP ACK packet and considers that the network is
4 congested. In this case, the TCP sliding window size is
reduced, and the overall traffic is also reduced.
4. At this time, network congestion is eliminated, and the
sender can receive the TCP ACK packet. Therefore, the
sender considers that the network is not congested, and
1
Time enters the TCP slow start process. This process is repeated.
66 Huawei Confidential
• As shown in the following figure, three colors indicate three TCP connections.
▫ In tail drop mechanism, all newly arrived packets are dropped when
congestion occurs, causing all TCP sessions to simultaneously enter the slow
start state and the packet transmission to slow down.
Problem
Undifferentiated drop
67 Huawei Confidential
• Tail drop cannot differentiate services and discard traffic in the same way.
Policy 2: RED
⚫ Random early detection (RED) randomly discards data packets.
Drop probability
• Process:
No drop Random drop Tail drop 1. When the queue length is less than the lower
100% Drop probability curve threshold, no packets are discarded.
68 Huawei Confidential
Relieving Global TCP Synchronization
⚫ RED randomly discards packets so that rates of TCP connections are reduced at different
times. This prevents global TCP synchronization.
Traffic
Maximum • Symptom:
value
Global TCP
Global TCP synchronization may still occur,
synchronization but the link usage is greatly increased.
• Disadvantage:
RED cannot distinguish traffic.
Time
69 Huawei Confidential
• RED is used to avoid global TCP synchronization that occurs with tail drop. It
does this by randomly discarding packets so that the transmission speed of
multiple TCP connections is not reduced simultaneously. This results in more
stable rates of TCP traffic and other network traffic. — Do not adjust TCP sliding
window sizes simultaneously.
Policy 3: WRED
⚫ Weighted Random Early Detection (WRED) sets different drop policies for data packets or
queues with different priorities to discard different types of traffic.
Drop • Example:
probability (%)
1. The lower threshold is 20 and the upper threshold
is 40 for the traffic whose IP precedence is 0.
100%
2. The lower threshold is 35 and the upper threshold
is 40 for the traffic whose IP precedence is 2. The
Maximum traffic whose IP precedence is 2 is discarded later
drop probability
than the traffic whose IP precedence is 0.
1 2
• Advantage:
Actual
queue
1. Do not adjust TCP sliding window sizes
20 30 35 40 length simultaneously to avoid global TCP
IP precedence used as an example: synchronization.
The corresponding precedences are Traffic 1
as follows: 0 1 2 Traffic 2
2. Different traffic is discarded based on weights.
Traffic 3
70 Huawei Confidential
Actual
Red Red Yellow Yellow Green Green Maximum queue length
Lower Upper Upper Upper Upper Upper queue
threshold threshold threshold threshold threshold threshold length
71 Huawei Confidential
• Color:
▫ The color of packets determines the order in which packets are dropped in
a congested queue.
• Application:
▫ The WRED lower threshold is recommended to start from 50% and change
with the drop priority. The lowest drop probability and highest lower and
upper thresholds are recommended for green packets; a medium drop
probability and medium lower and upper thresholds are recommended for
yellow packets; the highest drop probability and smallest lower and upper
thresholds are recommended for red packets.
▫ When traffic congestion aggravates, red packets are first dropped due to
the smallest lower threshold and high drop probability. As the queue length
increases, the device drops green packets at last. If the queue length
reaches the upper threshold for red/yellow/green packets, red/yellow/green
packets start to be tail dropped.
Application of Congestion Avoidance
Traffic direction
Configure congestion
avoidance
in the outbound
direction of the interface
Video flow Video
Data flow
Data
LAN WAN LAN
72 Huawei Confidential
• Example:
▫ Users in different LANs may upload data to the same server, so data
exchanged between users and the server passes the WAN. Because WAN
bandwidth is lower than LAN bandwidth, congestion may occur on the
edge device between the WAN and LANs. Congestion avoidance can be
configured on the edge device to discard low-priority packets such as data
packets, reducing network overload and ensuring forwarding of high-
priority services.
Configuring Queue-based WRED
DS edge device DS node
system-view
drop-profile [drop-profile-name] //Create a drop profile.
DS domain wred [dscp | ip-precedence] //Configure a WRED drop
profile based on DSCP or IP priorities.
dscp [dscp-value] low-limit [low-limit-percentage] high-limit
[high-limit-percentage] discard-percentage [discard-percentage]
• The device supports WRED based on DSCP priorities or //Configure WRED parameters based on DSCP priorities.
IP priorities. The configuration roadmap is as follows: ip-precedence [ip-precedence-value] low-limit [low-limit-
percentage] high-limit [high-limit-percentage] discard-
▫ Configure a drop profile. percentage [discard-percentage] //(Optional) Configure WRED
parameters based on IP priorities.
▫ Configure WRED parameters. qos queue-profile [queue-profile-name] //Enter the queue
profile view.
▫ Reference the drop profile to a queue profile. queue [queue-index] drop-profile [drop-profile-name]
//Bind the drop profile to the specified queue in the queue profile.
▫ Apply the queue profile to the outbound direction of the interface [interface-type interface-num] //Enter the
interface. interface view.
qos queue-profile [queue-profile-name] //Apply the queue
profile to the interface.
73 Huawei Confidential
Configuring MQC to Implement Congestion Avoidance (1)
DS edge device DS node
system-view
drop-profile [drop-profile-name] //Create a drop profile.
DS domain wred [dscp | ip-precedence] //Configure a WRED drop
profile based on DSCP or IP priorities.
• After a drop profile is bound to a traffic behavior, dscp [dscp-value] low-limit [low-limit-percentage] high-limit
[high-limit-percentage] discard-percentage [discard-percentage]
associate the traffic behavior with the corresponding //Configure WRED parameters based on DSCP priorities.
traffic classifier in the traffic policy and apply the ip-precedence [ip-precedence-value] low-limit [low-limit-
percentage] high-limit [high-limit-percentage] discard-
traffic policy to an interface to implement percentage [discard-percentage] //(Optional) Configure WRED
congestion avoidance for traffic matching the traffic parameters based on IP priorities.
74 Huawei Confidential
Configuring MQC to Implement Congestion Avoidance (2)
DS edge device DS node system-view
traffic classifier [classifier-name] //Create a traffic
DS domain
classifier.
if-match [acl | vlan-id | …. ] //Match traffic based on
• After a drop profile is bound to a traffic behavior, traffic characteristics.
75 Huawei Confidential
Checking the Congestion Avoidance Configuration
⚫ Checking the queue-based congestion avoidance configuration
system-view
interface [interface-type interface-num]
display this //Check the queue profile bound to the interface.
qos queue-profile [queue-profile-name]
display this //Check the drop profile bound to the queue profile.
display drop-profile [ drop-profile-name ] //Check the drop profile configuration.
76 Huawei Confidential
Quiz
B. RED
C. MRED
D. WRED
77 Huawei Confidential
1. ABD
Section Summary
78 Huawei Confidential
Contents
1. Introduction to QoS
6. Introduction to HQoS
79 Huawei Confidential
Congestion Management Technology
⚫ Congestion management technology manages and controls different types of service traffic
when network congestion occurs.
⚫ It uses queue scheduling technology to handle traffic congestion.
Queue 1
Scheduling
Queue N
80 Huawei Confidential
• Queuing technology
• Packets sent from one interface are placed into many queues which are identified
with different priorities. The packets are then sent based on the priorities.
Different queue scheduling mechanisms are designed for different situations and
lead to varying results.
What Is a Queue?
⚫ The queuing technology orders packets in the buffer.
81 Huawei Confidential
• What is a queue?
▫ The queuing technology orders packets in the buffer. When the packet rate
exceeds the interface bandwidth or the bandwidth configured for packets,
the packets are buffered in queues and wait to be forwarded.
▫ Each interface on the NE20E or NE40E stores eight downlink queues, which
are called CQs or port queues. The eight queues are BE, AF1, AF2, AF3, AF4,
EF, CS6, and CS7.
Queue Scheduling Algorithms
⚫ Congestion management uses the queuing technology.
82 Huawei Confidential
• Queuing technology places packets sent from one interface into multiple queues
with different priorities. These packets are then sent based on the priorities.
Different queue scheduling mechanisms are designed for different situations and
lead to varying results.
FIFO
⚫ The FIFO mechanism is used to transfer packets in a queue. Resources used to forward
packets are allocated based on the arrival order of packets.
FIFO FIFO
Enter a queue Leave a queue
Scheduling
FIFO
Packet 3 Packet 2 Packet 1 Queue Packet 3 Packet 2 Packet 1
83 Huawei Confidential
• FIFO allows the packets that come earlier to enter the queue first. On the exit of
a queue, FIFO allows the packets to leave the queue in the same order as that in
which the packets enter the queue.
• Characteristics:
Classifica
tion
Enter a queue
Scheduling
queue
Packet 1 Packet 5 Packet 4 Packet 3 Packet 6 Packet 2
SP
Medium-priority queue Packet 5 Packet 4 Packet 3
84 Huawei Confidential
• SP: Packets in queues with a low priority can be scheduled only after all packets
in queues with a higher priority are scheduled.
• As shown in the figure, three queues with a high, medium, and low priorities
respectively are configured with SP scheduling. The number indicates the order in
which packets arrive.
• When packets leave queues, the device forwards the packets in descending order
of priority. Packets in the higher-priority queue are forwarded preferentially. If
packets in the higher-priority queue come in between packets in the lower-
priority queue that is being scheduled, the packets in the high-priority queue are
still scheduled preferentially. This implementation ensures that packets in the
higher-priority queue are always forwarded preferentially. As long as there are
packets in the high-priority queue, no other queue will be served.
• Characteristics:
▫ Advantage: High-priority packets are preferentially forwarded.
▫ Disadvantage: Low-priority queues may be starved out. That is, when
congestion occurs, packets in lower-priority queues are not processed until
all the higher-priority queues are empty. As a result, a congested higher-
priority queue causes all lower-priority queues to starve out.
WFQ
⚫ WFQ allocates outbound bandwidth to flows on an interface based on weights of queues.
Classific
ation
Enter a queue
Scheduling
queue
WFQ
Medium-priority queue: 25% 6-bit packet
Packet assembly
Low-priority queue: 25% 8-bit packet
Leaving packet
85 Huawei Confidential
▪ Packets in different queues are scheduled fairly, and the flow delays
have slight differences.
▪ The smaller the weight, the less the allocated bandwidth. Flows with
larger weights are allocated higher bandwidth.
87 Huawei Confidential
• PQ queue
▫ SP scheduling applies to PQ queues. Packets in high-priority queues are
scheduled preferentially. Therefore, services that are sensitive to delays
(such as VoIP) can be configured with high priorities.
Queue 1
SP Start
PQ ……
scheduling
queue
Queue m
Is the PQ No Perform a round of
queue empty? PQ scheduling
Destination
Queue 1
interface
Yes
WFQ SP
WFQ …
scheduling scheduling
queue No
Is the WFQ Perform a round of
Queue i queue empty? WFQ scheduling
Yes
89 Huawei Confidential
▫ If PQ, WFQ, and LPQ queues use SP scheduling. PQ, WFQ, and LPQ queues
are scheduled in sequence.
▫ and packets in WFQ queues are scheduled only when no packets are
buffered in PQ queues. Bandwidths are preferentially allocated to PQ
queues to guarantee the PIR of packets in PQ queues.
▫ Packets in LPQ queues are scheduled only after all packets in WFQ queues
are sent.
• Scheduling result:
Traffic direction
Configure congestion
management
in the outbound
direction of the
interface
Video flow Video
90 Huawei Confidential
• Example:
91 Huawei Confidential
Configuring MQC to Implement Congestion Management
(1)
DS edge device DS node system-view
traffic classifier [classifier-name] //Create a traffic
classifier.
DS domain if-match [acl | vlan-id | …. ] //Match traffic based on
• MQC provides three types of queues: traffic characteristics.
92 Huawei Confidential
• AF queue: AF queues ensure that service traffic is forwarded when the traffic rate
does not exceed the minimum bandwidth.
• EF/LLQ queue: After packets matching certain rules enter EF or LLQ queues, they
are scheduled in SP mode. Packets in other queues are scheduled only after all
the packets in EF or LLQ queues are scheduled. In addition, EF queues can use
the available bandwidth in AF or BE queues. The latency of LLQ queues is lower
than that of common EF queues.
93 Huawei Confidential
• AF queue: AF queues ensure that service traffic is forwarded when the traffic rate
does not exceed the minimum bandwidth.
• EF/LLQ queue: After packets matching certain rules enter EF or LLQ queues, they
are scheduled in SP mode. Packets in other queues are scheduled only after all
the packets in EF or LLQ queues are scheduled. In addition, EF queues can use
the available bandwidth in AF or BE queues. The latency of LLQ queues is lower
than that of common EF queues.
94 Huawei Confidential
Quiz
1. (Single-answer question) How many queues are there on an interface?( )
A. 6
B. 7
C. 8
D. 9
95 Huawei Confidential
1. C
2. ABD
Section Summary
⚫ After a data packet enters a queue, the device sends the data packet
according to the queue scheduling mechanism.
⚫ Common queue scheduling technologies include FIFO, PQ, and WFQ.
⚫ PQ scheduling is performed before WFQ scheduling and FIFO. Queues
scheduled in WFQ mode can transmit data only when queues scheduled in
PQ mode have no data to transmit. The queue scheduled in FIFO mode can
transmit data only when queues scheduled in PQ and WFQ mode have no
data to transmit.
96 Huawei Confidential
Contents
1. Introduction to QoS
6. Introduction to HQoS
97 Huawei Confidential
Limitations of QoS
⚫ Traditional QoS distributes a flow into only eight queues for scheduling and control. Therefore, it has great limitations in multi-
tenant scenarios.
QoS limitations in home broadband scenarios
14 households rent
different bandwidths
and services.
Internet
• In home broadband scenarios, different families may rent different network bandwidths and network services.
Therefore, QoS cannot manage these families in a refined manner.
98 Huawei Confidential
HQoS Overview
⚫ Traditional QoS schedules traffic based on interfaces. An interface can only differentiate service
priorities. The traffic of the same priority uses the same interface queue and competes for the same
queue resources. Therefore, traditional QoS technology cannot provide differentiated services based on
types of traffic and users.
⚫ HQoS meets this requirement by implementing hierarchical scheduling based on multiple levels of
queues, differentiating both services and users to provide refined QoS guarantee.
⚫ Different devices provide different HQoS features. This section describes HQoS features supported by
the CPE (AR series router).
99 Huawei Confidential
Introduction to HQoS Queues
⚫ The CPE supports three-level queues: flow queue (level 3), subscriber queue (level 2), and port queue
(level 1).
…
Video flow Level 3 flow queue
Tenant 1
Sub-
interface
Level 1 port queue
…
and
tunnel
Internet interface
access traffic Physical
…
interface
Gaming flow
Tenant 2
…
Video flow
Other traffic
Tenant N
• Flow queue
▫ Services from a user are placed into a subscriber queue. HQoS allows all
services in the subscriber queue to share the bandwidth.
• Port queue
▫ Each port corresponds to a queue and port queues are scheduled in RR
mode. You can configure only interface-based traffic shaping, but cannot
configure scheduling modes.
Introduction to HQoS Queue Scheduling
⚫ The flow queue and subscriber queue support PQ scheduling, WFQ scheduling, and PQ+WFQ
scheduling. The port queue uses RR scheduling.
HQoS queue scheduling
PQ/WFQ
…
Level 2 subscriber
queue Level 1 port queue
PQ/WFQ
Level 3 flow
…
...
queue
RR
...
PQ/WFQ
…
Discard
packets Discard packets based
Discard packets based
based on on drop policies
drop on drop policies
policies
WFQ
family B (20 Mbit/s) building (60 Mbit/s)
Family B Deploy HSI (WFQ scheduling)
HQoS at Level 2 subscriber queue
the egress Level 3 flow queue
Total bandwidth of
HSI (WFQ scheduling) family C (30 Mbit/s)
Family C
system-view
traffic behavior [behavior-name] //Create a traffic
• Child traffic policies are used to differentiate services. You can behavior.
configure multiple child traffic policies based on services when queue [af | ef | llq] bandwidth [bandwidth | pct percentage]
//Configure AF, EF, or LLQ queue parameters in the traffic
configuring HQoS. behavior.
drop-profile [drop-profile-name] //Bind the created drop
• The configuration of HQoS child traffic policies is the same as
profile to the traffic behavior.
that of common MQC. The configuration roadmap is as follows:
system-view
▫ Configure a traffic classifier where traffic is matched based on service
traffic policy [policy-name] //Create a traffic policy.
characteristics. classifier [classifier-name] behavior [behavior-name]
▫ Configure a traffic behavior where the queue scheduling mode and
//Bind the traffic classifier to the traffic behavior.
queue bandwidth are defined.
system-view
• A parent traffic policy is used to differentiate users. When traffic behavior [behavior-name] //Create a traffic
behavior.
configuring HQoS, you can bind multiple child traffic policies queue [af | ef | llq] bandwidth [bandwidth | pct percentage]
to a parent traffic policy. //(Optional) Configure AF, EF, or LLQ queue parameters in the
traffic behavior.
• The configuration roadmap is as follows: traffic-policy [policy-name] //Bind the sub traffic policy to
the traffic behavior.
▫ Configure a traffic classifier to match traffic based on user
characteristics.
system-view
▫ Configure a traffic behavior that needs to invoke a child traffic policy. traffic policy [policy-name] //Create a parent traffic policy.
▫ Bind the traffic classifier and traffic behavior to a traffic policy. classifier [classifier-name] behavior [behavior-name]
//Bind the traffic classifier to the traffic behavior.
system-view
display traffic classifier user-defined [ classifier-name ] //Check the traffic classifier configuration.
display traffic behavior [ system-defined | user-defined ] [ behavior-name ] //Check the traffic behavior configuration.
display traffic policy user-defined [ policy-name ] classifier [classifier-name ] //Check the traffic policy configuration.
display traffic-policy applied-record [ policy-name ] //Check the record of the specified traffic policy.
B. False
B. Subscriber queue
C. Data queue
D. Port queue
1. B
2. ABD
Section Summary
▫ Draw up the project budget based on the project objective, project scope,
and work content.
• Temperature and humidity easily affect the proper running of devices. Standard
equipment rooms should be equipped with thermometers and hygrometers, and
check and record of the temperature and humidity should be performed on a
daily basis.
• The cleanness and neatness of the equipment room also affect the proper
running of the equipment.
▫ Tidiness refers to the proper layout of devices and cables. Devices must be
installed and cables must be routed according to installation and
deployment requirements. However, during network operation, temporary
adjustments, such as temporary jumper tests, are often made. After such
activities are taken for a period of time, the equipment room becomes
disordered. The purpose of checking the equipment environment is to find
out and rectify these problems in time.
• The preceding check items may vary according to devices. For details, see the
product documentation of each type of device.
• Software version running on a device:
▫ If a device is newly added, the software version may be different from the
existing software version. Some devices may be upgraded or downgraded
due to other reasons. Especially on a large-scale network, the same type of
device may run different versions. In this case, verify that different versions
can meet the same network function requirements.
• Startup information:
• License information:
▫ License rules vary according to devices. The licenses of some devices have
validity periods.
• You can configure information output rules as needed to control the output of
various types and levels of information along information channels in different
output directions.
<R1>
YY-MM-DD10:14:21.751.1-08:00 R1 RM/6/RMDEBUG:
2. B
Network Troubleshooting
Foreword
⚫ Digital transformation of medium- and large-sized enterprises is implemented using multiple technologies, such as
cloud computing, big data, artificial intelligence (AI), and Internet of Things (IoT). These technologies are all
supported by data communications networks. A stable data communications network requires fully prepared
network design, construction, and maintenance.
⚫ An enterprise data communications network accommodates various types of devices that are connected by multiple
types of physical links. In addition, to accurately forward data packets, the devices run multiple protocols. Network
devices, cables, and protocols may encounter faults. How to quickly rectify faults is a basic skill of senior network
engineers.
⚫ This course describes common network faults, how to troubleshoot them in an effort to help network engineers
build capabilities of troubleshooting faults in various scenarios.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
3 Huawei Confidential
What Is a Network Fault?
⚫ A network fault refers to the phenomenon that a network loses a specific function and adversely affects services due to some
reasons.
⚫ From the perspective of users, any phenomenon that adversely affects services can be defined as a fault.
⚫ The common fault symptoms and categories are as follows:
Service Transient
Symptom Service Protocol Protocol Route
Alarm Loop Forwarding Service Packet Loss
Category Interruption Anomaly Flapping Anomaly
Failure Interruption
Hardware √ √ √
Configuration √ √ √ √
Network √ √ √ √ √ √ √ √
Performance √ √ √ √ √
Software √ √
Interconnection √ √ √
Others √ √ √ √ √
4 Huawei Confidential
• Mapping between the preceding fault symptoms and categories varies according to
scenarios.
Contents
5 Huawei Confidential
Structured Network Troubleshooting Process
Fault report
Information collection
Cause listing
Fault assessment
Step-by-step troubleshooting
No
Is fault rectified? The network recovers.
Yes
Fault resolving Wrap-up work
6 Huawei Confidential
Fault Report
⚫ An enterprise has multiple departments, such as finance, human
resource, logistics, marketing, and R&D departments. These
departments need to communicate. To properly guarantee network
operations, enterprises may take the following measures:
Large- and medium-sized enterprises set up network maintenance
Cloud/ departments to build professional network teams.
Network O&M area
Data
center To reduce expenses, small-sized enterprises do not set up an independent
network maintenance department. Instead, they entrust their networks to
professional network maintenance companies.
Contact device manufacturers for after-sales service.
7 Huawei Confidential
Fault Fault Information Identification Cause Fault Step-by-Step Fault Wrap-up
Report Confirmation Collection and Analysis Listing Assessment Troubleshooting Resolving Work
Name, department, position, work content, computer location (floor, room, wireless or wired access),
Fault reporter
and website that the computer attempts to access.
Fault frequency Check whether the fault occurs suddenly, occasionally, or frequently.
Operations performed by a user on a terminal before and after a fault occurs. For example, the IP
User operation address and DNS parameters are changed, desktop firewall software is installed, and security control
software is installed.
8 Huawei Confidential
Fault Confirmation
⚫ Four factors for determining a fault:
Subject: network service that becomes faulty
Symptom: symptom of the fault
Time: the time when a fault was found and the fault occurrence time estimated by professional personnel
Location: network component that becomes faulty
9 Huawei Confidential
▫ The user description may be ambiguous, and the reported fault may not be the
actual faulty point. In this situation, experienced engineers have to confirm the fault.
Fault Fault Information Identification Cause Fault Step-by-Step Fault Wrap-up
Report Confirmation Collection and Analysis Listing Assessment Troubleshooting Resolving Work
Information Collection
⚫ Which information needs to be collected?
In the information collection phase, fault-related information, such as documents and network changes, is collected.
⚫ Obtaining permissions:
In a network environment that poses high requirements on information security, information collection must be authorized. Sometimes, a
written authorization file must be signed.
10 Huawei Confidential
Fault Fault Information Identification Cause Fault Step-by-Step Fault Wrap-up
Report Confirmation Collection and Analysis Listing Assessment Troubleshooting Resolving Work
Maintenance information
Cause listing
Change information
Team experience
11 Huawei Confidential
Fault Fault Information Identification Cause Fault Step-by-Step Fault Wrap-up
Report Confirmation Collection and Analysis Listing Assessment Troubleshooting Resolving Work
Cause Listing
⚫ In the cause listing phase, you must list all possible fault causes, sort out the most likely causes, and exclude the
least possible causes to narrow down the troubleshooting scope.
Cause listing
Information filtering
Possible cause 1 Cause 1 to be located
Possible cause 3
Possible cause 4
Causes excluded
...
12 Huawei Confidential
Fault Fault Information Identification Cause Fault Step-by-Step Fault Wrap-up
Report Confirmation Collection and Analysis Listing Assessment Troubleshooting Resolving Work
Fault Assessment
⚫ Fault assessment must be performed before each check.
Cause listing
Fault assessment
Step-by-step
troubleshooting
Cause 1 to be located
Root cause
Fault cause 2 to be located
13 Huawei Confidential
▫ If a complex network fault cannot be rectified within a short period of time after
being evaluated and a user wants to immediately restore network availability, you
advise the user to temporarily skip the faulty node and build an alternative network
environment.
Step-by-Step Troubleshooting
⚫ In the phase of step-by-step troubleshooting, the conflict between the urgency of solving problems and the risk of
introducing new faults must be balanced. Therefore, users must be clearly informed of the risks that may be induced
the process. Perform the check only after being authorized.
⚫ In some cases, network changes may be involved in the verification process. In this case, a complete emergency plan
and rollback preparations must be made.
Emergency plan
Rollback preparations
Step-by-step troubleshooting
Cause 1 to be located
Root cause
Cause 2 to be located
14 Huawei Confidential
Fault Fault Information Identification Cause Fault Step-by-Step Fault Wrap-up
Report Confirmation Collection and Analysis Listing Assessment Troubleshooting Resolving Work
Fault Resolving
⚫ After the root cause is found and the fault is rectified, the troubleshooting is complete.
⚫ In a complex network environment, you have to observe the network for a period of time after the fault symptom
disappears. On the one hand, you can confirm that the fault reported by the user has been rectified. On the other
hand, you can confirm that no new fault is introduced during the troubleshooting process.
Fault resolving
Continual observation
Step-by-step troubleshooting Root cause
Wrap-up work
15 Huawei Confidential
Fault Fault Information Identification Cause Fault Step-by-Step Fault Wrap-up
Report Confirmation Collection and Analysis Listing Assessment Troubleshooting Resolving Work
Wrap-up Work
⚫ Wrap-up work involves arranging related documents and sending notifications. Back up all changed configurations or
software in the previous network troubleshooting process, and sort out and hand over troubleshooting documents.
To prevent the same fault from occurring again, provide improvement suggestions for users in this phase.
Wrap-up work
Troubleshooting process documents
Affected parties
16 Huawei Confidential
Contents
▫ Troubleshooting Process
◼ Core Ideas and Methods of Network Troubleshooting
17 Huawei Confidential
Service Traffic Path-Centric Troubleshooting Ideals
⚫ The path along which service traffic passes is usually designed in the network planning phase. You merely need to
know the round-trip path of service traffic adversely affected by a network fault, trace the path, and rectify the fault
step by step.
Other
Finance OA Production
services
Service
Network
18 Huawei Confidential
Determining a Service Traffic Path: Network Layer
⚫ Multiple paths may exist during packet forwarding. Therefore, you need to determine the path over which service
traffic is transmitted based on the packet forwarding process.
Path 1
19 Huawei Confidential
Determining a Service Traffic Path: Data Link Layer
⚫ Check how data frames of service traffic are forwarded by switches on a Layer 2 network.
Path 1
Path 2
20 Huawei Confidential
Layered Troubleshooting Approach
⚫ The layered troubleshooting approach is simple, because all working models follow a simple rule: the upper-layer
structure of any model can work properly as long as the lower-layer structure is working properly.
Application layer
Presentation layer
Session layer
Transport layer Check whether TCP connections are correctly established and whether TCP and UDP ports are enabled.
Check whether routes are available and whether a routing protocol is working properly.
Network layer
Check whether data link layer encapsulation is correct, whether an interface protocol is up, and whether Layer 2
Data link layer addressing is normal.
Physical layer Check whether the physical status of an interface is up and whether cables and connectors are securely connected.
21 Huawei Confidential
Configuration Comparison Approach
⚫ Compare configurations, software versions, and hardware models in normal and faulty states to find differences.
⚫ Network troubleshooting personnel with less experience will use this method more frequently in practice.
# #
sysname r1 sysname r1
# #
isis 1 Compare isis 1
network-entity 49.0001.1000.0000.0001.00 network-entity 49.0001.1000.0000.0001.00
#
them #
interface Serial4/0/0 interface Serial4/0/0
link-protocol ppp link-protocol ppp
ip address 10.0.12.1 255.255.255.0 ip address 10.0.12.1 255.255.255.0
isis enable 1 isis enable 1
isis timer hello 30 isis timer hello 120
# #
interface LoopBack0 interface LoopBack0
ip address 10.0.1.1 255.255.255.255 ip address 10.0.1.1 255.255.255.255
isis enable 1 isis enable 1
# #
22 Huawei Confidential
Block-based Troubleshooting Approach
⚫ The configuration files of Huawei network devices, such as switches and routers, are edited in a clear structure.
⚫ If a fault occurs, you can narrow down the fault locating scope by classifying the fault into one or several categories:
Management (router name, password, service, and log)
Ports (address, encapsulation, cost, and authentication)
Routing protocols (static route, OSPF, BGP, and route import)
Policies (routing policy, policy-based routing, and security configuration)
Access (console port login, Telnet login, dial-up)
Applications (DNS, DHCP, and VPN configuration)
23 Huawei Confidential
Block-based Troubleshooting Approach: Example
⚫ After the display ip routing-table command is run, only direct routes are displayed. What are possible causes?
<R2>display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 16 Routes : 16
⚫ The fault is related to the following blocks: routing protocols, policies, and ports. If no routing protocol is configured or a routing
protocol is incorrectly configured, the routing table may be empty. If an ACL is incorrectly configured, route update may be
adversely affected. If the IP address, mask, or authentication configuration of an interface is incorrect, the routing table may be
incorrect.
24 Huawei Confidential
Segment-based Troubleshooting Approach
⚫ Since data packets may pass through multiple routers and physical links, each segment may encounter a fault. In this
situation, the segment-based approach applies.
25 Huawei Confidential
Replacement Approach
⚫ The replacement approach is one of the most common methods for checking hardware problems.
⚫ If a network cable may be faulty, replace it with another one in good condition. If an interface module may fail,
replace it with another interface module that is working properly.
26 Huawei Confidential
Requirements for Network Maintenance and Management
Personnel
⚫ Have an in-depth understanding of protocol requirements.
⚫ Be able to guide a customer to describe the fault symptom and related information in detail.
⚫ Fully understand the networks managed and maintained.
⚫ Record troubleshooting documents and summarize troubleshooting experience.
⚫ Be familiar with network troubleshooting approaches and combine them flexibly.
27 Huawei Confidential
Quiz
2. (True or false) On a large-scale network, the comparison approach is the most effective method for
troubleshooting faults. ( )
A. True
B. False
28 Huawei Confidential
1. ABC
2. False
Contents
▫ Route Faults
▫ Service Faults
29 Huawei Confidential
Troubleshooting Common Network Faults: Topology (1)
• During network maintenance, network engineers may
R1 R2 R3
OSPF IS-IS
encounter various network faults, such as login, route, and
GE0/0/0 GE0/0/1 IP service faults. The left figure shows a part of the network
GE0/0/2
IBGP IBGP
architecture, which is used as an example to describe how to
troubleshoot common network faults.
Static Static
SW3
GE0/0/3
SW4 SW5 • Routing protocol overview:
▫ OSPF: runs between R1 and R2. OSPF is enabled on all interfaces
GE0/0/4
GE0/0/4
GE0/0/4
GE0/0/3
▫ IS-IS: runs between R2 and R3.
SW1 SW2 SW6
▫ BGP: R1 and R3 establish IBGP peer relationships with R2 and
function as clients of R2, namely, the RR.
▫ Static route: SW3, SW4, and SW5 use static routes to connect to
routers.
PC1 PC2 PC13 PC14 PC5 Server6
30 Huawei Confidential
Troubleshooting Common Network Faults: Topology (2)
• IP address planning:
R1 R2 R3 ▫ Loopback0: are 10.0.1.1/32, 10.0.2.2/32, and 10.0.3.3/32 on R1, R2, and R3,
10.0.12.0/24 10.0.23.0/24 respectively.
.1 .2 .2 .3
▫ Interconnection interfaces: The network segment is shown in
the preceding figure, and the decimal number of the right-most octet in an IP
VLAN 35
10.0.35..0/24 address is a device ID.
▫ Terminals: The network segment is shown in the figure. A gateway has the
SW3 SW4 SW5 largest IP address on a network segment. PC5 obtains an IP address using
DHCP, and R3 functions as a DHCP server. Other terminals use static IP
MSTP
Instance 12 vlan 12 addresses, with the decimal number of the right-most octet in an IP address
Instance 34 vlan 34 indicating a device ID.
▫ R3 imports the static route destined for 192.168.56.0/24 into the BGP
PC1 PC2 PC13 PC14 PC5 Server6 routing table.
31 Huawei Confidential
32 Huawei Confidential
Common Network Troubleshooting: Symptom
• The following symptoms are found:
R1 R2 R3 ▫ PC1 and PC13 cannot communicate.
OSPF IS-IS
▫ Server 6 provides the FTP service, but PC1 cannot use
this service.
IBGP IBGP
▫ PC5 cannot communicate with any host.
Static Static
SW3 SW4 SW5 • There are multiple possible causes. The preceding
MSTP
Instance 12 vlan 12
approaches are used to demonstrate how to
Instance 34 vlan 34
troubleshoot the three faults.
SW1 SW2 SW6 • Assume that the symptoms have been confirmed.
Skip the following steps in the subsequent
troubleshooting: fault report, fault confirmation,
information collection, and wrap-up work.
PC1 PC2 PC13 PC14 PC5 Server6
33 Huawei Confidential
PC1 and PC13 Cannot Communicate (1)
Simplified topology: • The figure on the left shows the planned path for PC1-to-PC13
traffic. Use the layered, segment-based, and forwarding path-
SW3 SW4
GE0/0/3 centric approaches to analyze the faults. PC1 and PC13 fail to
GE0/0/4
GE0/0/4
GE0/0/10
▫ VRRP fault
PC1 PC13
34 Huawei Confidential
• This section describes common troubleshooting methods and tools, providing guidance for
network maintenance personnel. The processing sequence in actual scenarios can be
different from that in the example.
PC1 and PC13 Cannot Communicate (2)
• On PC1 and PC13, choose Control Panel > Network and Internet > Network Connection >
Ethernet Cable to check Ethernet cables and ensure that the physical cable connections to
the PCs are correct. (The preceding path varies according to an operating system and version.)
• Check the physical interface status on each involved switch (SW1, for example). If the physical
Physical link fault status of an interface is not up, use another interface to connect the switch to a PC.
SW3 SW4
GE0/0/3 <SW1>display interface brief | include up
Incorrectly Interface PHY Protocol InUti OutUti inErrors outErrors
GE0/0/4
GE0/0/4
configured GigabitEthernet0/0/3 up up 0% 0% 0 0
IP address GigabitEthernet0/0/4 up up 0% 0% 0 0
GigabitEthernet0/0/10 up up 0% 0% 0 0
GigabitEthernet0/0/11 up up 0% 0% 0 0
VLAN GE0/0/3
SW1 SW2 • Ping 192.168.34.13 from PC1 and check whether the number of packets sent and received by
configuration
the interface increases. If so, the physical link is working properly. If not, use another interface
error
GE0/0/10
GE0/0/10
or replace the network cable.
35 Huawei Confidential
• This section uses the Windows 10 OS as an example to describe how to check the physical
connection status of a PC.
• Check the IP addresses on SW3 and SW4 and ensure that the IP addresses are correctly
Physical link fault configured. (A VLANIF interface without an IP address assigned will not go up and cannot
implement Layer 3 forwarding.)
SW3 SW4
GE0/0/3 <SW3>display ip interface brief
Incorrectly
GE0/0/4
GE0/0/4
configured IP Interface IP Address/Mask Physical Protocol
address MEth0/0/1 unassigned down down
NULL0 unassigned up up(s)
Vlanif1 unassigned up down
VLAN GE0/0/3 Vlanif12 192.168.12.3/24 up up
SW1 SW2 Vlanif34 192.168.34.3/24 up up
configuration
error
GE0/0/10
GE0/0/10
<SW4>display ip interface brief
VRRP fault • The preceding information indicates that the IP addresses of the interfaces on SW3 and SW4
have been correctly configured.
36 Huawei Confidential
PC1 and PC13 Cannot Communicate (4)
• Query the switch port and VLAN configuration.
[SW1]display vlan
The total number of vlans is : 3
Physical link fault --------------------------------------------------------------------------------
U: Up; D: Down; TG: Tagged; UT: Untagged;
MP: Vlan-mapping; ST: Vlan-stacking;
SW3 SW4 #: ProtocolTransparent-vlan; *: Management-vlan;
GE0/0/3
Incorrectly --------------------------------------------------------------------------------
VID Type Ports
GE0/0/4
GE0/0/4
configured IP
--------------------------------------------------------------------------------
address 12 common TG:GE0/0/11(U) TG:GE0/0/10(U)
34 common TG:GE0/0/11(U) TG:GE0/0/10(U)
GE0/0/3 VID Status Property MAC-LRN Statistics Description
VLAN SW1 SW2 --------------------------------------------------------------------------------
configuration 12 enable default enable disable VLAN 0012
error
GE0/0/10
GE0/0/10
34 enable default enable disable VLAN 0034
PC1 PC13 • After the VLAN is correctly configured on the switches, check whether PC1 can
communicate with other IP addresses on the same network segment. For example, run the
VRRP fault ping 192.168.12.13 command on PC1. The command output shows that packet loss occurs
and the delay is long.
37 Huawei Confidential
• GE 0/0/10 belongs to VLAN 12 and VLAN 34 and works in tagged mode, indicating that the
interface is configured as a trunk interface and the PVID is not 12.
PC1 and PC13 Cannot Communicate (5)
• Check the MSTP status on each switch. All ports on SW4 are in the Forwarding state.
GE0/0/4
GE0/0/4
configured IP 12 GigabitEthernet0/0/4 DESI FORWARDING NONE
address 34 GigabitEthernet0/0/2 DESI FORWARDING NONE
34 GigabitEthernet0/0/3 DESI FORWARDING NONE
34 GigabitEthernet0/0/4 DESI FORWARDING NONE
VLAN GE0/0/3
SW1 SW2 • MSTP faults may be caused by an incorrect domain name setting, incorrect binding
configuration
between instances and VLANs, or incorrect binding between ports and VLANs. Check the
error
GE0/0/10
GE0/0/10
MSTP configuration on SW4.
<SW4>display current-configuration | begin region-configuration
stp region-configuration
Loop region-name TEST //The correct domain name is test, not TEST.
instance 12 vlan 12
PC13 instance 34 vlan 34
PC1
active region-configuration
#
VRRP fault
• Correct the domain name on SW4. Ping 192.168.12.13 from PC1. As a result, packet loss
occurs now and then.
38 Huawei Confidential
▫ The indicator of the VLAN interface with the loop occurring frequently blinks.
GE0/0/4
GE0/0/4 Exclude vlan-list :-
configured IP
address -------------------------------------------------
<SW3>display mac-address flapping record
Info: The mac-address flapping record does not exist.
VLAN GE0/0/3 • After observing for a while, find that the fault occurs during working hours. When the fault
SW1 SW2
configuration occurs, check the MAC address table, and find that the MAC address table is unstable.
error Then check STP statistics.
GE0/0/10
GE0/0/10
<SW3>display stp tc-bpdu statistics
-------------------------- STP TC/TCN information ---------------
Loop MSTID Port TC(Send/Receive) TCN(Send/Receive)
12 GigabitEthernet0/0/1 13/56 -/-
12 GigabitEthernet0/0/3 22/18 -/-
PC1 PC13 12 GigabitEthernet0/0/4 29/66 -/-
• During working hours, a switch port frequently alternates between up and down, and
VRRP fault
sends a large number of TC BPDUs. In this case, configure the switch port connected to the
PC as an edge port.
39 Huawei Confidential
• After receiving STP TC BPDUs, the STP-enabled switch clears the MAC address table and re-
learns MAC addresses. During this period, data forwarding is interrupted for a short period,
causing packet loss.
PC1 and PC13 Cannot Communicate (7)
• Shut down SW3's GE 0/0/4. PC1 cannot ping PC13, causing a large number of packets to be
discarded in a short period. After SW3 is restarted, the following alarm is generated on SW3:
GE0/0/4
GE0/0/4
configured IP 0101)
address
• The IP address is a virtual IP address. VRRP may be defective. Obtain packet information
VLAN GE0/0/3 on SW1's GE 0/0/10 and SW2's GE 0/0/3. The addresses marked bold are source MAC and
SW1 SW2
configuration IP addresses.
error
GE0/0/10
GE0/0/10
40 Huawei Confidential
▫ This command can only obtain information received by an interface, not information
sent by an interface.
PC1 and PC13 Cannot Communicate (8)
• The destination MAC address is 00 00 5e 00 01 03. The VRRP ID is 3, which should have
been 1 as planned. Check the VRRP status and configuration of SW3.
GE0/0/4
GE0/0/4
configured IP PriorityRun : 100
address PriorityConfig : 100
MasterPriority : 100
Virtual MAC : 0000-5e00-0103
VLAN GE0/0/3 <SW3>display current-configuration interface Vlanif 12
SW1 SW2
configuration #
error interface Vlanif12
GE0/0/10
GE0/0/10
Loop • According to the preceding analysis, a VRRP dual-master fault occurs because the VRID is
incorrectly set. As a result, packet loss occurs during a VRRP switchover. Correct the
PC1 PC13
configuration of SW3.
VRRP fault • Carry out a reliability test again. Find that no packet loss occurs during the switchover.
Then, the fault is rectified.
41 Huawei Confidential
• The VRRP group numbers on SW3 and SW4 are different. After the VRRP group on SW3
detects a downlink fault, the VRRP status on SW4 does not change. The VRRP status on
SW4 remains in the Master state. In this situation, sending gratuitous ARP messages is not
triggered for an ARP entry update on the terminal.
• The destination MAC address of data frames sent from PC1 to a gateway is still 00 00 5e 00
01 03.
• After the link between SW1 and SW3 is disconnected, SW1 cannot forward packets to SW2,
because SW1 does not have the MAC address entry of 00 00 5e 00 01 03.
Contents
▫ Service Faults
42 Huawei Confidential
PC1 Cannot Use the FTP Service (1)
Simplified topology: • In the preceding example, measures are taken to ensure no fault occurs
between PC1 and SW3 and between server 6 and SW5.
R1 R2 R3
OSPF IS-IS
• As shown in the figure on the left, possible causes for an FTP failure on PC1
GE0/0/0 GE0/0/1 are as follows:
IBGP IBGP ▫ Physical link fault (done)
Static Static
▫ Route faults
SW3 SW5
▪ Static route
▪ OSPF
SW1 SW6
▪ BGP
▪ IS-IS
43 Huawei Confidential
PC1 Cannot Use the FTP Service (2)
• Data packets are forwarded hop by hop. All routing devices along a
path must have routes to the destination. First, check whether routes
Static route destined for server 6 exist on all devices through which data packets
sent from PC1 to server 6 pass.
R1 R2 R3
OSPF IS-IS
OSPF • Check the static route configuration on SW3.
GE0/0/0 GE0/0/1
▫ When configuring a static route, specify only the outbound interface
name for a P2P interface. For a broadcast interface, also specify a next-
Static Static
hop IP address.
IS-IS
SW3 SW5 <SW3>display ip routing-table protocol static
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
BGP Destination/Mask Proto Pre Cost Flags NextHop Interface
0.0.0.0/0 Static 60 0 RD 10.0.13.1 Vlanif13
• The command output indicates that the static route has been
Planned traffic path correctly configured on SW3.
44 Huawei Confidential
PC1 Cannot Use the FTP Service (3)
• Check the routing table on R1.
<R1>display ip routing-table 192.168.56.0
• The command output shows that R1 does not have a route to 192.168.56.0.
Static route Check whether a BGP peer relationship is properly established between R1 and
R2.
R1 R2 R3 <R1>display bgp peer
OSPF IS-IS BGP local router ID : 10.0.1.1
OSPF Local AS number : 100
GE0/0/0 GE0/0/1
Total number of peers : 1 Peers in established state : 0
Peer AS MsgRcvd MsgSent OutQ Up/Down State PrefRcv
10.0.2.2 100 0 0 0 0:00:05 Idle 0
Static Static
IS-IS • The preceding command output shows that the BGP peer relationship fails to
be established. Possible causes are as follows:
SW3 SW5
▫ The loopback0 interface of the remote device is unreachable.
▫ The AS number of the local or remote device is incorrect.
BGP ▫ The peer ebgp-max-hop command used to allow the establishment of an indirect EBGP
peer relationship is not run.
▫ Router IDs on both ends are the same.
• According to the command output, the numbers of sent and received BGP
Planned traffic path packets are 0, indicating that the loopback0 interface on the remote device
may be unreachable.
45 Huawei Confidential
PC1 Cannot Use the FTP Service (4)
• On R1, check the route destined for the BGP peer.
Static Static • The preceding command output shows that the OSPF neighbor relationship
IS-IS fails to be established. Possible causes are as follows:
▫ Router IDs on both ends are the same.
SW3 SW5
▫ Area IDs do not match on both ends.
▫ Network masks do not match on both ends.
BGP
▫ MTUs do not match on both ends.
▫ On an MA network, DR priorities of all devices are set to 0.
▫ Authentication passwords do not match on both ends.
46 Huawei Confidential
PC1 Cannot Use the FTP Service (5)
• Check OSPF error information on R1.
[R1]display ospf error
Static route General packet errors:
0 : IP: received my own packet 0 : Bad packet
0 : Bad version 0 : Bad checksum
R1 R2 R3 0 : Bad area id 0 : Drop on unnumbered interface
OSPF IS-IS 0 : Bad virtual link 0 : Bad authentication type
OSPF 0 : Bad authentication key 0 : Packet too small
GE0/0/0 GE0/0/1
0 : Packet size > ip length 0 : Transmit error
0 : Interface down 0 : Unknown neighbor
0 : Bad net segment 0 : Extern option mismatch
Static Static 133 : Router id confusion
IS-IS
• The preceding command output shows that a router ID conflict may cause a
SW3 SW5
failure to establish an OSPF neighbor relationship. To accurately locate the
fault, enable OSPF debugging on R1.
BGP
<R1>terminal debugging
Info: Current terminal debugging is on.
<R1>debugging ospf packet interface GigabitEthernet 0/0/0
47 Huawei Confidential
PC1 Cannot Use the FTP Service (6)
• Check the configuration of the local OSPF protocol.
<R1>display ospf interface GigabitEthernet 0/0/0 verbose
OSPF Process 1 with Router ID 10.0.1.1
Interface: 10.0.12.1 (GigabitEthernet0/0/0)
Static route Cost: 1 State: DR Type: Broadcast MTU: 1500
Designated Router: 10.0.12.1
Backup Designated Router: 0.0.0.0
R1 R2 R3 Timers: Hello 10 , Dead 40 , Poll 120 , Retransmit 5 , Transmit Delay 1
OSPF IS-IS IO Statistics
OSPF Type Input Output
GE0/0/0 GE0/0/1
Hello 36 36
• Check OSPF error information in the debugging information on R1.
Static : Source Address: 10.0.12.2
IS-IS : Destination Address: 224.0.0.5
: Ver# 2, Type: 1 (Hello)
SW3 SW5 : Length: 44, Router: 10.0.1.1
: Area: 0.0.0.0, Chksum: db9c
: AuType: 00
BGP : Key(ascii): * * * * * * * *
: Net Mask: 255.255.255.0
: Hello Int: 10, Option: _E_
: Rtr Priority: 1, Dead Int: 40
Planned traffic path • After comparison, it is found that the interval at which Hello packets are sent, mask, and
authentication information on one end matches those on the other end, and only the
router ID conflict occurs.
48 Huawei Confidential
• The debugging information on R1 shows that the OSPF router ID carried in the Hello
packets sent from 10.0.12.2 is the same as the OSPF router ID on R1.
PC1 Cannot Use the FTP Service (7)
• Log in to R2 and change the OSPF router ID. However, the attempt to use Telnet to log
in to R2 fails.
• Common causes of Telnet login failures are as follows:
R1 R2
Static route ▫ A route is unavailable, and a TCP connection cannot be established between the client and
OSPF
server.
GE0/0/0
▫ Telnet is disabled on the server.
▫ The number of users logging in to a device reaches a specified upper limit.
OSPF Telnet ▫ An ACL is bound to a VTY user interface.
▫ An access protocol configured in the VTY user interface view is incorrect. If the protocol inbound
ssh command is used, the attempt to use Telnet for login fails.
• Log in to R2 through the console port and check whether Telnet is enabled.
IS-IS
[R2]display telnet server status
TELNET IPV4 server :Enable
TELNET IPV6 server :Enable
TELNET server port :23
BGP • Check whether Telnet is allowed in the VTY view.
[R2-ui-vty0-4]display this
user-interface vty 0 4
authentication-mode aaa
protocol inbound ssh
• Modify the configuration of R2 to support Telnet in the VTY user interface view. The test result
shows that the attempt to log in to R2 is successful.
49 Huawei Confidential
PC1 Cannot Use the FTP Service (8)
• Change the OSPF router ID on R2, restart the OSPF process to make the
router ID take effect, and check the OSPF neighbor relationship status.
Static route
<R2>display ospf peer
R1 R2 R3 OSPF Process 1 with Router ID 10.0.12.2
OSPF IS-IS Neighbors
GE0/0/0 GE0/0/1 Area 0.0.0.0 interface 10.0.12.2(GigabitEthernet0/0/0)'s neighbors
OSPF Router ID: 10.0.1.1 Address: 10.0.12.1
State: Full Mode:Nbr is Slave Priority: 1
DR: 10.0.12.2 BDR: 10.0.12.1 MTU: 0
Static Static Dead timer due in 35 sec
Retrans timer interval: 5
IS-IS Neighbor is up for 00:09:17
SW3 SW5 Authentication Sequence: [ 0 ]
50 Huawei Confidential
PC1 Cannot Use the FTP Service (9)
• Check the BGP peer relationship status on R1.
<R1>display bgp peer
BGP local router ID : 10.0.1.1
Local AS number : 100
Static route
Total number of peers : 1 Peers in established state : 1
R1 R2 R3
Peer AS MsgRcvd MsgSent Up/Down State
OSPF IS-IS 10.0.2.2 100 25 26 0:19:22 Established
GE0/0/0 GE0/0/1
OSPF • Check whether the BGP routing table of R1 contains a route destined for 192.168.56.0/24.
• R1 still does not have an available route. As R1 should have get the route from R3, check
BGP whether the route is imported into the BGP routing table on R3.
<R3>display bgp routing-table
BGP Local router ID is 10.0.3.3
Planned traffic path Total Number of Routes: 1
Network NextHop MED LocPrf Path/Ogn
*> 192.168.56.0 0.0.0.0 0 0 ?
51 Huawei Confidential
• On R3, the command output shows that the route to 192.168.56.0/24 has been imported
into the BGP routing table.
PC1 Cannot Use the FTP Service (10)
• Check the BGP peer status on R3.
<R3>display bgp peer
Static route BGP local router ID : 10.0.3.3
Local AS number : 100
R1 R2 R3 Total number of peers : 1 Peers in established state : 0
OSPF IS-IS Peer AS MsgRcvd MsgSent OutQ Up/Down State PrefRcv
GE0/0/0 GE0/0/1 10.0.2.2 100 0 0 0 0:00:05 Idle 0
OSPF
• The BGP peer relationship is not established between R3 and R2. Check
whether a route destined for 10.0.2.2/32 exists on R3.
IS-IS
SW3 SW5 <R3>display ip routing-table 10.0.2.2
• R3 does not have the route to 10.0.2.2/32. As IS-IS runs between R2 and R3,
check whether an IS-IS neighbor relationship is properly established between
BGP
R3 and R2.
<R3>display isis peer
Planned traffic path Peer information for ISIS(1)
SystemId Interface CircuitId State Type PRI
0100.0000.2002 GE0/0/1 0100.0000.2002.01 Up L2 64
52 Huawei Confidential
• Possible causes for the failure to establish an IS-IS neighbor relationship are as follows:
▫ Area IDs do not match on both ends. (The inconsistency adversely affects only level-1
neighbor relationships.)
▫ IS-IS levels do not match on both ends. (Note that on Huawei devices if the system
level differs from the interface circuit level, the system level takes effect.)
▫ The IP addresses are on different network segments. (Source check is enabled for IS-
IS on a broadcast network, and can be disabled.)
PC1 Cannot Use the FTP Service (11)
• The IS-IS neighbor relationship is properly established, but R3 cannot obtain
the route to 10.0.2.2/32. Possible causes are as follows:
Static route ▫ IS-IS is not enabled on an interface.
53 Huawei Confidential
PC1 Cannot Use the FTP Service (12)
• Check the IS-IS configuration on R3.
isis 1
is-level level-2
network-entity 49.0001.0100.0000.3003.00
Static route #
• The following information shows that the cost style of R2 does not match that of R3.
R1 R2 R3
OSPF IS-IS Change the cost style of R3 to wide. Then, check whether R3 has a route to 10.0.2.2/32.
GE0/0/0 GE0/0/1
OSPF <R3>display ip routing-table 10.0.2.2
Route Flags: R - relay, D - download to fib
--------------------------------------------------------------
Destination/Mask Proto Pre Cost Flags NextHop Interface
Deploy 10.0.2.2/32 ISIS-L2 15 10 D 10.0.23.2 GE0/0/1
IS-IS. SW3 SW5 • Check whether the BGP peer relationship on R3 is restored and check the BGP routing
table of R3.
<R3>display bgp peer
BGP local router ID : 10.0.23.3
BGP Peer AS MsgRcvd MsgSent Up/Down State
10.0.2.2 100 8 7 0:04:42 Established
<R3>display bgp routing-table
Total Number of Routes: 2
Planned traffic path
Network NextHop MED LocPrf Path/Ogn
*>I 192.168.12.0 10.0.1.1 0 100 ?
*> 192.168.56.0 0.0.0.0 0 0 ?
54 Huawei Confidential
PC1 Cannot Use the FTP Service (13)
• R3 has correctly advertised routes and learned the route to 192.168.12.0/24.
Check whether R1 has a route to 192.168.56.0/24.
Static route
<R1>display bgp routing-table
R1 R2 R3 BGP Local router ID is 10.0.1.1
OSPF IS-IS Network NextHop MED LocPrf Path/Ogn
GE0/0/0 GE0/0/1 *> 192.168.12.0 0.0.0.0 0 0 ?
OSPF i 192.168.56.0 10.0.3.3 0 100 ?
• R1 has received the BGP route from R3, but the route is unavailable. The
possible cause is that the next hop is unreachable. On R1, check whether
there is a route to 10.0.3.3/32.
Deploy
IS-IS. SW3 SW5 <R1>display ip routing-table 10.0.3.3
• The command output shows that the routing table of R1 does not contain the
route to 10.0.3.3/32. This route should have been imported by R2 from IS-IS
BGP into the OSPF routing table. Possible causes are as follows:
▫ A routing policy is configured on R1.
▫ R2 does not import IS-IS routes into the OSPF routing table.
Planned traffic path ▫ Type 5 LSAs are filtered out in the outbound direction of R2's interface.
55 Huawei Confidential
PC1 Cannot Use the FTP Service (14)
• Check the LSDB of R1.
<R1>display ospf lsdb
OSPF Process 1 with Router ID 10.0.1.1
Area: 0.0.0.0
Static route Type LinkStateID AdvRouter Age Len Sequence Metric
Router 10.0.2.2 10.0.2.2 5 48 80000003 1
R1 R2 R3 Router 10.0.1.1 10.0.1.1 3 48 8000000D 1
OSPF IS-IS Network 10.0.12.1 10.0.1.1 3 32 80000002 0
GE0/0/0 GE0/0/1 • R1 does not have Type 5 LSAs. Check whether R1 imports IS-IS routes into the OSPF
OSPF
routing table.
<R2>display current-configuration configuration ospf
#
ospf 1 router-id 10.0.2.2
Deploy area 0.0.0.0
IS-IS. SW3 SW5 network 10.0.2.2 0.0.0.0
network 10.0.12.2 0.0.0.0
#
• Modify the configuration of R2, import IS-IS routes into the OSPF routing table, and then
BGP check the routing table of R1.
<R1>display ip routing-table
Route Flags: R - relay, D - download to fib
Planned traffic path ------------------------------------------------------------
Destination/Mask Proto Pre Cost Flags NextHop Interface
10.0.3.3/32 O_ASE 150 1 D 10.0.12.2 GE0/0/0
192.168.56.0/24 IBGP 255 0 RD 10.0.3.3 GE0/0/0
56 Huawei Confidential
traceroute to 192.168.56.6, 8
1 192.168.12.3 63 ms 46 ms 47 ms
2 10.0.13.1 78 ms 63 ms 62 ms
Static route 3 10.0.12.2 94 ms 63 ms 78 ms
4 10.0.23.3 94 ms 62 ms 63 ms
R1 R2 R3
5 * * *
OSPF IS-IS
GE0/0/0 GE0/0/1 • R3 does not respond to the received data packets. Enable traffic statistics collection on
OSPF R3's GE 0/0/2 and check whether R3 sends the data packets through GE0/0/2.
GE0/0/2
[R3] acl 3000
[R3-acl-adv-3000]rule 5 permit ip source 192.168.12.1 0 destination 192.168.56.6
Deploy
0
IS-IS. SW3 SW5 [R3-acl-adv-3000]quit
[R3]traffic classifier trafficSta
[R3-classifier-trafficSta]if-match acl 3000
[R3-classifier-trafficSta]quit
BGP [R3]traffic behavior trafficSta
[R3-behavior-trafficSta]statistic enable
[R3-behavior-trafficSta]quit
[R3]traffic policy trafficSta
Planned traffic path [R3-trafficpolicy-trafficSta]classifier trafficSta behavior trafficSta
[R3-trafficpolicy-trafficSta]quit
[R3]interface GigabitEthernet0/0/2.35
[R3-GigabitEthernet0/0/2.35]traffic-policy trafficSta outbound
57 Huawei Confidential
• After R1 learns the route, PC1 still cannot access the FTP service provided by server 6. In
this case, run the traceroute command to check connectivity between R1 and server 6.
• Based on traffic statistics, the analysis is as follows:
▫ Check whether the traffic reaches the inbound interface of the device and determine
whether packet loss occurs on the upstream device.
▫ Check whether the traffic is forwarded to the outbound of the device and determine
whether packet loss occurs on the device.
▫ Check whether Layer 2 and Layer 3 information about traffic on the inbound
interface of the device is correct and determine whether the upstream device
forwards and encapsulates packets properly.
▫ Check whether the Layer 2 and Layer 3 information about the outbound interface is
correct and determine whether the device forwards and encapsulates packets
properly.
▫ Check whether transient traffic flapping occurs due to MAC address flapping, route
changes, or IP address conflicts.
• Procedure for configuring traffic statistics collection:
▫ Configure an ACL rule to match traffic to be collected.
▫ Configure a traffic classifier.
▫ Configure a traffic behavior and configure traffic statistics collection in the traffic
behavior.
▫ Configure a traffic policy; bind the traffic classifier and behavior to the traffic policy;
apply the traffic policy to the inbound direction of the switch to collect statistics on
packets of different users.
PC1 Cannot Use the FTP Service (16)
• Check traffic statistics on R3. No packet loss occurs on R3.
GE0/0/2
Dropped 0/0
• Check the routing table of SW5 in the direction where server 6 sends data packets.
IS-IS
SW3 SW5
[SW5]display ip routing-table
Destination/Mask Proto Pre Cost Flags NextHop Interface
10.0.35.0/24 Direct 0 0 D 10.0.35.5 Vlanif35
BGP 192.168.56.0/24 Direct 0 0 D 192.168.56.5 Vlanif56
• SW5 does not have a static route to PC1. Configure a static route on SW5.
• Check whether PC1 and server 6 can communicate and use the FTP
Planned traffic path service properly.
• After the preceding operations are complete, the troubleshooting is complete.
58 Huawei Confidential
PC1 Cannot Use the FTP Service Summary
• The following faulty points are involved in the
R1 R2 R3 troubleshooting:
OSPF IS-IS
GE0/0/0 GE0/0/1 ▫ Incorrect static route configuration
59 Huawei Confidential
Contents
▫ Route Faults
◼ Service Faults
60 Huawei Confidential
PC5 Cannot Communicate with Any Host (1)
• PC5 cannot communicate with any host. The possible cause is that the physical link to PC5 is
abnormal, or PC5's IP address is incorrect.
⚫ Simplified topology:
• Check the IP address of PC5. PC5 fails to obtain an IP address.
PC>ipconfig
IPv4 address 0.0.0.0
R3 DHCP server Subnet mask 0.0.0.0
Gateway 0.0.0.0
Physical address 54-89-98-39-22-B7
GE0/0/2
• PC5 obtains an IP address using DHCP. The common causes of DHCP faults are as
SW5 DHCP relay agent
follows:
GE0/0/4
PC5
61 Huawei Confidential
• If the client and server are on different network segments and a relay agent is deployed
between them
▫ The link between the DHCP relay agent and server becomes faulty.
▫ The DHCP function is not enabled globally on a device. As a result, the DHCP function
does not take effect.
• Check whether a Layer 2 loop occurs on SW6 and check the VLAN configuration.
trunk interface. Modify the configuration on SW6 to configure GE 0/0/10 as an access interface and set the VLAN
ID to 56.
SW6 • After the modification, check whether PC5 can properly obtain an IP address.
PC>ipconfig
GE0/0/10
62 Huawei Confidential
PC5 Cannot Communicate with Any Host (3)
• SW5 is a DHCP relay agent. Query the global configuration of SW5.
<SW5>display current-configuration
DHCP server dhcp enable
#
R3 interface Vlanif35
ip address 10.0.35.5 255.255.255.0
dhcp select relay
GE0/0/2
DHCP • The DHCP service has been enabled on SW5 and the DHCP relay agent has been
relay SW5 configured. However, after the data packets sent by PC5 pass through SW6, SW6 adds
agent
the tag with VLAN ID 56 to the packets before forwarding them. As a result, the DHCP
GE0/0/4
63 Huawei Confidential
PC5 Cannot Communicate with Any Host (4)
• Query the DHCP relay status of SW5.
[SW5]display dhcp relay statistics
The statistics of DHCP RELAY:
DHCP packets received from clients : 11
DHCP server DHCP DISCOVER packets received : 11
DHCP REQUEST packets received :0
R3 DHCP RELEASE packets received :0
DHCP INFORM packets received :0
DHCP DECLINE packets received :0
GE0/0/2
<R3>display current-configuration
dhcp enable
#
SW6 ip pool test
gateway-list 192.168.56.254
GE0/0/10
64 Huawei Confidential
PC5 Cannot Communicate with Any Host (5)
• R3 and SW5 are connected through sub-interfaces. Therefore, enable the DHCP server service on a
sub-interface, instead of the physical interface GE0/0/2.
Bad Messages 0
• Check the IP address on PC5.
SW6 PC>ipconfig
IPv4 address 192.168.56.253
Subnet mask 255.255.255.0
GE0/0/10
VLAN
Gateway 192.168.56.254
Physical address 54-89-98-39-22-B7
DNS server 192.168.1.1
• PC5 has obtained an IP address and can use it to communicate with all hosts. The troubleshooting is
PC5
complete.
65 Huawei Confidential
Quiz
1. (Multiple-answer question) Which of the following causes are possible for a failure to establish an OSPF neighbor relationship? ( )
A. Router ID conflict
B. Area ID inconsistency
C. Interface mask inconsistency
D. Process ID inconsistency
2. (True or false) If the level of an interface on an IS-IS router is different from the global router level, the level of the interface takes
effect. ( )
A. True
B. False
3. (Multiple-answer question) Which of the following faults may occur in case of a Layer 2 loop? ( )
A. An attempt to remotely log in to a device fails.
B. An interface receives a large number of broadcast packets, which can be viewed in the display interface command output.
C. An attempt to log in to a device through the serial port is time consuming.
D. CPU usage exceeds 70%.
66 Huawei Confidential
1. ABC
2. B
3. ABCD
Summary
⚫ The structured troubleshooting process involves fault report, fault confirmation, information collection, identification and analysis,
cause listing, assessment, step-by-step troubleshooting, fault resolving, and wrap-up work.
⚫ The purpose of troubleshooting is to restore the proper service running status. First, determine a service traffic path before
troubleshooting. The layered, comparison, block-based, segment-based, and replacement approaches are used.
⚫ On a LAN, the commonly used methods are to replace hardware to rectify link or device faults and to use STP to rectify LAN loops.
⚫ Network-layer faults are mainly caused by unavailable routes. This course describes the causes and troubleshooting procedures for
the failures to establish OSPF and IS-IS neighbor relationships and BGP peer relationships.
⚫ Troubleshooting personnel must have abundant knowledge and be skilled in using multiple troubleshooting approaches.
Troubleshooting experience summary also matters.
67 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
▫ Negotiate the time arrangement with the customer and obtain customer's
approval.
▫ Reserve some time for major operations to avoid engineering accidents due
to timeout.
• Type B service: service that has low requirements on the latency but occupies
much bandwidth. These services are carried over IPsec VPNs.
• Static return routes are manually specified for the headquarters, and NQA is used
to switch services to the standby path upon faults. This case focuses on the
branch network and does not involve the headquarters network.
1. We can set up a local pilot office and simulate the customer's network to verify
the feasibility of the entire migration solution.
2. The configuration of the live network needs to be backed up. To verify the
network status before and after the migration, collect dynamic data of the live
network, including the port status, traffic, status of each routing protocol,
number of routes, STP status, and ARP/MAC address entries of each port.
Enterprise Network Introduction
Foreword
⚫ Nowadays, data has become a new production factor and important asset of enterprises.
Enterprise networks, as the infrastructure, promote the efficient transmission of various data
and accelerate the digital transformation of thousands of industries.
⚫ Enterprise networks are classified into campus networks, wide area networks (WANs), and
data center networks (DCNs). The three types of networks are used to meet different
service requirements and have different network architectures.
⚫ This course introduces the general enterprise network architecture, enterprise networks in
typical industries, and Huawei enterprise network solutions for specific scenarios.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
3 Huawei Confidential
“Power Grid” in the Digital World : Data Communication
Network
⚫ The symbol of industrialization is "electricity", transmitting electricity through the power grid.
⚫ The symbol of digitalization is "cloudification", transmitting computing power through the cloud network.
4 Huawei Confidential
Enterprise Networks in the Digital Society
O&M Security
After more than 30 years of development, networks have laid a solid foundation for the intelligent
society. With the acceleration of enterprise digitalization, enterprise networks need to carry more
and more key services, playing an important role in the digitalization process.
5 Huawei Confidential
Enterprise Campus Network Overview
A campus network is used to implement terminal access in a small range
Internet WAN
and interworking within an enterprise. Campus networks can be classified
into small, midsize, and large ones based on the number of terminal users
or NEs. A typical large campus network consists of the following modules:
Egress zone • Egress zone: the border between the campus internal network and external
Management network. It is used for internal users to access the public network and for external
DC
and O&M zone users to remotely access the internal network.
• Core layer: the core of campus data switching that connects all components of the
campus network, such as the DC, management and O&M zone, and campus egress.
Core layer • Aggregation layer: forwards horizontal traffic between users and vertical traffic to
the core layer. The aggregation layer can function as the switching core of a
department or area and can connect more terminals to the network.
Aggregation layer
• Access layer: provides various access modes for users and is the first network layer
to which terminals connect.
• Terminal layer: involves various terminals that access the campus network, such as
PCs, printers, IP phones, mobile phones, and cameras.
Access layer • DC: deploys servers and application systems to provide data and application services
for internal and external users of an enterprise.
Terminal layer • Management and O&M zone: deploys the network management system (such as
the NMS and authentication server) and O&M system.
iStack/CSS link
6 Huawei Confidential
Enterprise WAN Overview
WAN • An enterprise WAN connects the enterprise headquarters,
backbone branches, and data center for interconnection.
network
• By users, enterprise WANs can be classified into self-built
Provincial core
for internal use and self-built for external use.
▫ Self-built, for internal use: To meet the interconnection
requirements of the headquarters, branches, and data centers in
a large span, various industries such as large enterprise,
Municipal core
government, finance, and electric power need to build their own
WANs.
▫ Self-built, for external use: Carriers build WANs to provide WAN
connection services for enterprises, including the Internet, MPLS
District/County core
private lines, and transmission private lines.
7 Huawei Confidential
Enterprise DCN Overview
• A DCN connects general-purpose
WAN computing, storage, and high-
performance computing resources, carries
WAN access Campus access
communication between internal
zone zone
resources of the DC, and implements
Internet Extranet
communication between the DC and
access zone access zone
external networks.
• A mainstream DCN uses the spine-leaf
architecture. Switches are connected
Production Non-production through Layer 3 interfaces, and the
Switching
extranet core extranet core underlay network runs a dynamic routing
Management and core
O&M zone protocol. Traffic can be load balanced
Border-Leaf Border-Leaf Border-Leaf Border-Leaf between spine and leaf nodes through
equal-cost multi-path routing (ECMP),
VXLAN VXLAN VXLAN VXLAN implementing a DCN that features high-
Spine Spine Spine Spine
FW domain FW domain FW domain FW domain bandwidth, non-blocking forwarding, and
Leaf Leaf Leaf Leaf fast network convergence upon faults.
• To isolate services and tenants, VXLAN
and EVPN technologies are deployed in
Production environment Production environment Test environment Test environment DCs to build virtualized networks.
zone 1 zone 2 zone 1 zone 2
VTEP
8 Huawei Confidential
• DCNs do not have a fixed zone division mode. Different industries and enterprises
have different area division modes.
• The zone division in the slide uses the financial industry as an example:
9 Huawei Confidential
• Different network security solutions can be used to cope with different network
security problems.
▫ Deploying firewalls in the server area of a data center: implements security
isolation, access control, and intrusion prevention between servers and VMs
in the data center.
▫ Deploying Web Application Firewalls (WAFs) in the server area of a data
center: protects website servers and prevents website text and images from
being tampered with.
11 Huawei Confidential
DC A DC N
Financial backbone
P network P
P
• To meet their own business development and operation
management requirements, financial enterprises generally
build their own backbone networks across the country to
Level-1 support the development of enterprise informatization and
branch
core services.
Sub-branch
12 Huawei Confidential
Typical Enterprise Network: Transportation Industry
Head office • The railway system in China is used as an example.
node • In the railway system, the network provides unified transmission services
for signaling, dispatching, ticketing, integrated services, and GSM-R
Backbone
network services.
• The railway data communications network uses a two-layer
Regional Regional Regional architecture:
node 1 node 2 node N
▫ A backbone network consisting of multiple high-performance core
routers located at regional nodes and railway bureaus.
▫ A regional network set by each railway bureau. The regional
Core node
network is connected to the backbone network through the
Regional
Aggregation backbone network's regional node of the local railway bureau to
network
node implement communication between railway bureaus.
Access • As an independent autonomous system, the backbone network forwards
node traffic between the head office and railway bureaus and between
railway bureaus.
• Each railway bureau is configured with a backbone network access node
and multiple backbone network forwarding nodes. The head office node
Ticket hall Video OA PIS CTC/RBC/TCC GSM- functions as the service aggregation node of the entire railway system
conferencing R/wireless
and does not forward traffic.
13 Huawei Confidential
• Generally, the regional nodes of the backbone network are deployed in the
equipment rooms of each railway bureau.
• GSM-R: Global System for Mobile Communications - Railway
14 Huawei Confidential
Huawei Datacom Certification and Enterprise Network
HCIE-Datacom
• HCIP-Datacom-Campus Network Planning and Deployment
• HCIP-Datacom-SD-WAN Planning and Deployment
Capability
convergence • HCIP-Datacom-WAN Planning and Deployment
• HCIP-Datacom-Enterprise Network Solution Design
Scenario-based Advanced
network datacom
planning, capabilities • HCIP-Datacom-Advanced Routing Switching Technology
construction,
maintenance, • HCIP-Datacom-Network Automation Developer
and optimization
capabilities
• HCIA-Datacom
Basic datacom capabilities • HCIP-Datacom-Core Technology
15 Huawei Confidential
Contents
16 Huawei Confidential
Campus Network DC WAN
17 Huawei Confidential
Campus Network DC WAN
18 Huawei Confidential
Campus Network DC WAN
• Wi-Fi and IoT services are • Service faults cannot be detected in a Challenges:
independently planned, deployed, and timely manner. • The workload is repetitive and heavy,
managed. The overall network • After a fault occurs, the fault cause is and manual configuration is complex.
construction cost is high. determined based on the O&M • New services need to be configured
• The workload of network experience of professional personnel, on devices one by one, which is time-
management and O&M is heavy. and the fault cannot be quickly consuming and costly.
located. • The workload of network policy
• The network cannot be automatically deployment and adjustment is heavy.
optimized.
19 Huawei Confidential
Campus Network DC WAN
Unified management and centralized Centralized management of multiple branches Open and big data analytics capability
configuration on the cloud and remote automatic O&M
Cloud
management
Sites' network devices platform
Site network 2
20 Huawei Confidential
Campus Network DC WAN
Enterprise services are migrated to Unified management and centralized Rapidly narrowing gap between the
the cloud, and enterprise egress configuration quality of the Internet and
traffic increases sharply. traditional private lines
80% Traditional
carrier private
20% lines/MPLS
2016 2020
Internet
Proportion of egress
traffic to total traffic on
the enterprise network Source: IDC SDN introduces a new role, that is, the The coverage and network performance of
centralized controller, so that it can not only the Internet are continuously improving, and
understand the network requirements the gap between the quality of the Internet
proposed by the administrator, but also fully and traditional private lines is narrowing
manage and configure the physical network, rapidly. As such, more and more enterprises
Intelligence Cloudification Video Mobility implementing automatic deployment and fast and organizations are using the Internet for
provisioning of applications on the network. interconnection.
21 Huawei Confidential
Campus Network DC WAN
The cost of WAN The network deployment The application Visualized O&M is required LAN-side and WAN-side
interconnection between efficiency needs to be identification capability to simplify management services need to be
branches needs to be improved and the service needs to be enhanced to and O&M. managed in a unified
reduced. provisioning period needs to ensure key service manner.
Challenges:
Challenges: be shortened. experience. Challenges:
• CLI-based O&M is
Carriers' transmission Challenges: Challenges: inefficient and lacks • Unified configuration
private lines or MPLS VPN • It takes a long time to • Different enterprise visualized O&M methods. management and O&M
private lines are of high provision traditional applications have cannot be implemented.
• If an enterprise has a
quality but expensive. private lines. different requirements on
large number of
link quality.
• Service provisioning is branches, onsite O&M
mainly performed by • Traditional private lines will increase costs.
network engineers on cannot detect the
site, which has high skill application status and
requirements and low cannot guarantee key
efficiency. services at any time.
22 Huawei Confidential
Campus Network DC WAN
Weather
Life science Drug R&D
forecast
• Supercomputing — the core of high-performance computing
(HPC) — provides the computing power needed to drive
development of the digital economy and plays a key role in
numerous scientific and technological fields.
Supercomputing
center
23 Huawei Confidential
Campus Network DC WAN
All-flash storage
Ethernet
Storage media 1000x interconnection
SCSI Capacity NVMe
HDD -> SSD
FC (32G) RoCE (400G)
• With the development of enterprise digital transformation, data has become a key production factor. DCs are responsible for data computing, storage, and
forwarding, and are the most critical digital infrastructure in the new infrastructure. The IT architecture, computing, and storage of DCs are undergoing
significant changes, driving DCNs to evolve from the multi-protocol mode to the full-Ethernet mode.
24 Huawei Confidential
Zero packet loss required for Zero packet loss required for More complex for large-
high-performance computing dual-active storage scale network O&M
>70 km
0.02%
DC A DC B
The packet loss rate increases The delay increases in intra-city Traditional Ethernet lacks effective
exponentially with the (long distance) transmission, and it O&M methods,
increase of network nodes on is difficult to perform flow control and the network is too complex to
traditional Ethernet. across DCNs on traditional Ethernet. be handled manually.
25 Huawei Confidential
Campus Network DC WAN
4K
WAN
• With the advent of the 5G and cloud era, various innovative services such as VR/AR, live streaming, and
autonomous driving are emerging. The traffic on the entire network increases explosively, and the
dynamic complexity of services also increases the complexity of the entire network.
26 Huawei Confidential
Campus Network DC WAN
The network passively adapts to various With the development of new services As the network scale and complexity
new services, such as enterprise private such as enterprise application migration increase, the O&M complexity also
line services. Service provisioning is to the cloud, network traffic in carriers' increases. Carriers urgently need to
time-consuming and customer response pipes is more dynamic and deploy automation measures to reduce
is slow. unpredictable. Traditional network the skill requirements for O&M
planning and optimization have poor personnel and effectively control the
adaptability, and service SLA assurance OPEX in the long term.
faces great challenges.
27 Huawei Confidential
28 Huawei Confidential
Huawei Intelligent Cloud-Network Solution
Intra-cloud
interconnection
Hyper-converged DCN
CloudFabric 3.0 All-Ethernet-based high-
Network security
performance computing
(HPC) and storage General
Storage HPC
HiSec
computing
Inter-cloud
CloudWAN interconnection
CloudWAN 3.0 Flexible migration to
the cloud
SLA experience
assurance
Cloud-network-
Cloud access AR Switch AP security collaboration
CloudCampus
CloudCampus 3.0 All-wireless campus Campus
High-quality experience
29 Huawei Confidential
Four Engines + Platform for Manager, Controller, and
Analyzer Convergence
iMaster NCE
Management, control, and
analysis convergence platform
31 Huawei Confidential
• In the campus network scenario, iMaster NCE-Campus is used as the iMaster NCE
controller.
Campus
DC WAN
network
Network-wide
intelligent O&M
Complaints reduced by 75%
Multi-cloud
Full-lifecycle automation
TTM reduced by 90%
Analyzer
Manager Controller
Active-active all-Ethernet
Automation Intelligence
storage network
Cross-DC links reduced by 90%
Hyper-converged DCN
All-Ethernet HPC network
Unleashes 100% of computing power
General Storage
HPC
Computing
32 Huawei Confidential
• In the data center scenario, iMaster NCE-Fabric is used as the iMaster NCE
controller.
Campus
DC WAN
network
Network as a service
Integrated cloud-network- • Network as a service, one-stop provisioning
security operations of cloud-network products
• OSS and BSS streamlining, easy to integrate
Network as a service
Qiankun security cloud Cloud management
service platform Flexible multi-cloud connection
Cloud-network
Cloud-network- Flexible multi-cloud • Pre-connection to multiple clouds
management
security collaboration and control connection • End-to-end SRv6, access to the cloud upon
network access
Deterministic experience
Government Deterministic experience
• Slices for deterministic SLAs
Education • One network for multiple industries with
Intelligent MAN Intelligent cloud secure isolation
backbone
Healthcare
Cloud-network-security
Manufacturing collaboration
• Four-dimensional integrated security protection
"Added" for "connectivity" "Adjusted" for "quality" "Born" for "cloud"
• AI-powered threat correlation detection
33 Huawei Confidential
2 3 4
Autonomous driving
Network management system Controller Analyzer
network system
Network =
iMaster NCE is a network automation platform that integrates management, control, analysis, and AI capabilities.
34 Huawei Confidential
All-New iMaster NCE
DC iMaster NCE-Fabric
Enterprise
iMaster NCE-Campus
campus
WAN
iMaster NCE-T
transmission
35 Huawei Confidential
Quiz
B. iMaster NCE-WAN
C. iMaster NCE-IP
D. iMaster NCE-SD-WAN
36 Huawei Confidential
1. AB
Summary
⚫ This course briefly introduces the overall enterprise network architecture and the
campus networks, DCNs, and WANs in different scenarios.
⚫ With the continuous development of services and new technologies, enterprise
networks are facing great challenges. Therefore, Huawei provides corresponding
solutions for networks in different scenarios. These contents will be described in
more details in subsequent courses.
37 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
⚫ Campuses are everywhere in our cities. Some examples of campuses include factories,
government buildings and facilities, shopping malls, office buildings, school campuses, and
parks. According to statistics, 90% of urban residents work and live in campuses, 80% of
gross domestic product (GDP) is created in campuses, and each person stays in campuses
for 18 hours every day. Campus networks, as the infrastructure for campuses to connect to
the digital world, are an indispensable part of campus construction and play an increasingly
important role in daily working, R&D, production, and operation management.
⚫ This course describes campus networks, common architectures and technologies of campus
networks, and typical applications of these technologies. This information helps readers
better understand the campus network design.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
3 Huawei Confidential
Campuses Are Everywhere
90%+
of city residents work and
live in campuses.
5 h & 22 h 80%+
spent in using smart of GDP is created in
terminals & staying in the campuses.
campus every day
90%+
of innovations are
made in campuses.
4 Huawei Confidential
Overview of a Campus Network
5 Huawei Confidential
Campus Network Classification (1)
• Users: internal personnel only
⚫ Number of terminals > 2000
• Security requirements: network access control and
⚫ Number of NEs > 100
external threat defense
Large
campus Closed
network campus
network
Served
Scale
objects
⚫ Number of terminals: 200–2000 ⚫ Number of terminals < 200 ⚫ Users: including external personnel, such as the public
⚫ Number of NEs: 25–100 ⚫ Number of NEs < 25 ⚫ Security requirements: access control, identity
identification, behavior control, security protection, etc.
Networks of different scales have different requirements and pain points. A running campus network usually has both closed and open subnets.
6 Huawei Confidential
Campus Network Classification (2)
⚫ Each device accessing a network must be connected to the
⚫ Single services preset network port through a network cable.
⚫ Simple network architecture ⚫ The architecture is structured and hierarchical, and the logic is
clear, so faults are easy to locate.
Single-
service Wired
campus campus
network network
Access
Service
mode
Multi- Wireless
service Classified by Classified by
campus
campus services carried on network campus network
network campus networks access modes
⚫ The network needs to carry a large number of services, and the ⚫ The network is based on the 802.11 protocol (Wi-Fi) and is also called WLAN.
network scale is large. Different services need to be isolated ⚫ AP deployment and installation affect the coverage effect. Interference and
and guaranteed. conflicts exist, so the network needs to be optimized periodically.
⚫ The campus network architecture is becoming complex and virtualized. ⚫ Faults are difficult to locate.
The complexity of the campus network architecture depends on the Currently, most campus networks are a mix of wired and wireless
complexity of services carried on the campus network. networks.
7 Huawei Confidential
Campus Network Classification (3)
To meet requirements of different industries, the campus network architecture is designed based on the characteristics of the industries
that campus networks serve, ultimately building industry-specific campus network solutions.
Enterprise campus network School campus network Government campus network Business campus network
⚫ It refers to the Ethernet-based ⚫ School campus networks are ⚫ It usually refers to the internal ⚫ This type of campus networks apply
enterprise office network. classified into primary/secondary network of a government agency. to shopping malls, supermarkets,
⚫ The enterprise campus network education and higher education ⚫ High security is required. hotels, and parks.
focuses on network reliability and campus networks. Generally, the internal network ⚫ Such networks mainly serve
advancement, continuously ⚫ Higher education campus and external network are isolated consumers. In addition, they include
improves employees' office networks are complex and usually to ensure high security of subnets for internal office work.
experience, and ensures the have teaching and research confidential information. ⚫ Such networks provide Internet
efficiency and quality of operation networks, student networks, and access services and help build
and production. operational dormitory networks. business intelligence (BI) systems
⚫ There are high requirements on for a better user experience, lower
network manageability and O&M cost, higher efficiency, and
security, and specific requirements value transfer.
on network advancement.
8 Huawei Confidential
Typical Physical Architecture of a Campus Network
⚫ Egress zone: serves as the border between the campus internal network and the
Internet WAN
external network. Through this egress zone, internal users can access the public
network and external users (including customers, partners, branch users, and
remote users) can access the internal network. Firewalls can be deployed at the
egress zone to ensure the security of the internal network.
Egress zone
Data ⚫ Core layer: serves as the core of data switching on the campus network. It
center O&M zone
connects various parts of the campus network, such as the data center, O&M
zone, and egress zone.
⚫ Aggregation layer: forwards not only horizontal traffic between users, but also
Core layer
vertical traffic to the core layer. It can also function as the switching core for a
department or zone and further extend the quantity of access terminals.
Aggregation layer ⚫ Access layer: provides various access modes for users and is the first layer of the
network to which a terminal accesses.
⚫ Terminal layer: has terminals deployed to connect to the campus network.
Terminals include computers, printers, IP phones, mobile phones, and cameras.
Access layer ⚫ Data center: has servers and application systems deployed to provide data and
application services for internal and external users of the enterprise.
Terminal layer
⚫ O&M zone: manages network servers such as the NMS and authentication server.
iStack/CSS link
9 Huawei Confidential
Contents
10 Huawei Confidential
Industry Digital Transformation Improves Efficiency and
Customer Satisfaction
Digital workspace Digital education Digital manufacturing
• All-wireless access • Shift from spoon-feeding education to • Always-on mass terminals/sensors
• Anytime, anywhere workstyles immersive education • Real-time collection of production data
• One-click conference reservation via an • On-demand access to high-quality • Automated and precise control
app teaching
• Auto-adjustable lighting and temperature • Practical-scene teaching
"At least 55% of the organizations will be "86% of higher education CIOs will regard IT "84.9% of manufacturing enterprises are
firm advocates of digitalization by 2020.“ as a key factor in enabling education going digital, driving business model
Source: IDC FutureScape: Worldwide Digital business transformation.“ innovations and reshaping the business
Transformation 2019 Predictions Source: 2019 Higher Education Industry ecosystem.“
Insights, Gartner Source: IDC's 2018 manufacturing industry
survey
11 Huawei Confidential
• Access anytime, • Quick service deployment • Precise measurement and • Configuration delivery based
anywhere and adjustment evaluation of user experience on services
• High-quality service • Rapid rollout of value- • AI-powered automatic adjustment • Fast and accurate fault
support added applications of resource allocation locating
12 Huawei Confidential
Constantly Evolving Campus Network
• Autonomous driving
• Intelligent O&M
1st generation 2nd generation 3rd generation
• Intelligent connectivity
From "sharing" to Layer 3 routed Multi-service
• Intelligent ultra-
"switching" switching converged support broadband
•…
⚫ Today, we stand on the cusp of the fourth industrial revolution, as represented by AI. It is foreseeable that new ICT
will lead us from the information era to the intelligence era. As a key engine of the fourth industrial revolution, AI
will drive the progress and development of all industries around the world. Data networks, which are a key driving
force in the IT era, will be developed and optimized first with AI.
⚫ Campus networks gradually become intelligent and provide simplified service deployment and network O&M
capabilities for customers.
13 Huawei Confidential
• Wi-Fi and IoT services are • Service faults cannot be detected in a Challenges:
independently planned, deployed, and timely manner. • The workload is repetitive and heavy,
managed. The overall network • After a fault occurs, the fault cause is and manual configuration is complex.
construction cost is high. determined based on the O&M • New services need to be configured
• The workload of network experience of professional personnel, on devices one by one, which is time-
management and O&M is heavy. and the fault cannot be quickly consuming and costly.
located. • The workload of network policy
• The network cannot be automatically deployment and adjustment is heavy.
optimized.
15 Huawei Confidential
Service Requirements and Challenges of Small- and
Medium-Sized Campus Networks
Plug-and-play network devices, Centralized O&M on the cloud, Open APIs, accelerating integration of
improving deployment efficiency simplifying O&M of multiple sites business applications
Unified management and centralized Centralized management of multiple branches Open and big data analytics capability
configuration on the cloud and remote automatic O&M
Cloud
management
Sites' network devices platform
Site network 2
16 Huawei Confidential
Service Requirements and Challenges of Multi-Campus
Network Interconnection
Branch Service provisioning
Service experience Management and O&M Unified management
interconnection cost period
Requirements: Requirements: Requirements: Requirements: Requirements:
The cost of WAN The network deployment The application Visualized O&M is required LAN-side and WAN-side
interconnection between efficiency needs to be identification capability to simplify management services need to be
branches needs to be improved and the service needs to be enhanced to and O&M. managed in a unified
reduced. provisioning period needs to ensure key service Challenges: manner.
Challenges: be shortened. experience. Challenges:
• CLI-based O&M is
Carriers' transmission Challenges: Challenges: inefficient and lacks • Unified configuration
private lines or MPLS VPN • It takes a long time to • Different enterprise visualized O&M methods. management and O&M
private lines are of high provision traditional applications have cannot be implemented.
• If an enterprise has a
quality but expensive. private lines. different requirements on
large number of
link quality.
• Service provisioning is branches, onsite O&M
mainly performed by • Traditional private lines will increase costs.
network engineers on cannot detect the
site, which has high skill application status and
requirements and low cannot guarantee key
efficiency. services at any time.
17 Huawei Confidential
CloudCampus: One-Stop Autonomous Driving Solution for
Campus Networks
Analysis One-stop management platform Automated network design, accurately aligning with service intents
18 Huawei Confidential
Full Scenarios: Full Coverage from Simple-Service Campuses
to Multi-Branch Interconnection Campuses
Simple-service campus Multi-service campus Multi-branch interconnection campus
VN 1
Internet VN 2
Internet
VN 3
19 Huawei Confidential
Full Lifecycle: Planning, Deployment, O&M, and
Optimization
Planning (Day 0) Deployment (Day 1-2) O&M (Day N) Optimization (Day N)
Fault demarcation
The green part indicates the network lifecycle management service provided by iMaster NCE-Campus.
20 Huawei Confidential
Full Convergence: One Controller Manages Both LAN and
WAN
Regional controller
WAN Control
plane
WAN side GUI
IPsec VPN EVPN
LAN side (large or Forwarding
small/midsize campus) Centralized management plane
Private
Internet
line
WAN side Real-time Topology Various Intelligent WAN side
monitoring visualization reports analysis LAN side
LAN side
Wired Wireless
Visibility into network service data, thereby easily monitoring and analyzing Services provided by the carrier can be extended from WAN to LAN and
the status of the entire network. even value-added services.
Simple O&M Value extension
21 Huawei Confidential
22 Huawei Confidential
VLAN
23 Huawei Confidential
• In addition to interface-based VLAN assignment, you can also use the following
methods to assign VLANs:
▫ MAC address-based assignment: assigns VLANs based on the source MAC
addresses of frames. This mode applies to small-scale networks where
physical locations of user terminals frequently change but their network
adapters seldom change.
▫ IP subnet-based assignment: assigns VLANs based on the source IP
addresses of frames. This mode applies to scenarios where there are high
requirements for mobility and simplified management and low
requirements for security.
▫ Protocol-based assignment: assigns VLANs based on the protocol (suite)
types and encapsulation formats of frames. This mode applies to networks
running multiple protocols.
Network Network
You can use a single interface of a switch to transmit An IP phone is connected to a switch independently.
both voice and data services.
24 Huawei Confidential
• A device configured with voice VLAN can identify voice flows in either of the
following modes:
▫ MAC address-based identification: A device identifies voice flows based on
the source MAC addresses of received data packets. If a source MAC
address of a packet matches the organizationally unique identifier (OUI) of
a voice device, the packet is considered a voice packet. OUIs must be
preconfigured and are used in scenarios where IP phones send untagged
voice packets.
▫ VLAN-based identification: Configuring OUIs for a large number of IP
phones is time-consuming. In this case, you can configure a switch to
identify voice packets based on VLAN IDs. If the VLAN ID of a received
packet matches the configured voice VLAN ID, the packet is considered a
voice packet. This simplifies configuration when a large number of IP
phones are connected to the switch. However, the IP phones must be able
to obtain voice VLAN information from the switch.
Spanning Tree Protocol (STP)
⚫
On a switching network with physical loops, switches running
SW1 (root bridge) STP automatically generate a loop-free working topology, which
is also called an STP tree. Each node of an STP tree is a specific
D D
switch, and each branch is a specific link.
⚫
STP transmits configuration BPDUs between switches to elect
the root switch (or root bridge) and determine the role and
status of each switch port.
R R
SW2 D SW3 ⚫
Each switch proactively sends configuration BPDUs during
initialization. After the network topology becomes stable, only
the root bridge periodically sends configuration BPDUs. Other
R Root port D Designated Non-designated Configuration switches send their own configuration BPDUs only after
port port BPDU
receiving configuration BPDUs from upstream devices.
25 Huawei Confidential
▪ Root bridge election: The device with the smallest root bridge ID is
elected as the root bridge.
▪ Root port election: A device compares the RPC, peer BID, peer PID,
and local PID of its ports in sequence. The port with the smallest
value is elected as the root port.
▪ Designated port election: A device compares the RPC, local BID, and
local PID of its ports in sequence. The port with the smallest value is
elected as the root port.
▪ After the root port and designated port are determined, all the non-
root ports and non-designated ports on the switch will be blocked.
Rapid Spanning Tree Protocol (RSTP)
⚫
As LANs are increasing in scale, the problem of slow STP topology
SW1 (root bridge)
convergence is becoming more prominent. To address this problem, the
D D IEEE released the 802.1w standard in 2001 that defined the RSTP
protocol. RSTP is an enhanced version of STP and implements rapid
convergence of the switching network.
⚫
RSTP makes the following improvements over STP:
R R Defines more port roles, making the spanning tree protocol easier to understand
SW2 D A SW3
and configure.
D B E E
Eliminates the listening state, reducing the number of port states from 5 to 3.
Uses the Flags field of STP configuration BPDUs to define port roles.
Processes configuration BPDUs differently from STP. For example, it allows non-
root bridges to proactively generate and send configuration BPDUs, and reduces
R Root port D Designated A Alternate B Backup E Edge port the BPDU timeout interval to three times that of the Hello Time.
port port port Provides rapid convergence mechanisms, such as the Proposal/Agreement (PA)
mechanism and edge port mechanism.
Provides protection mechanisms to ensure the stability of the switching network.
26 Huawei Confidential
Multiple Spanning Tree Protocol (MSTP)
⚫ Defined in IEEE 802.1s and compatible with STP and RSTP, MSTP
implements fast convergence while providing multiple redundant
paths for forwarding data, effectively load balancing traffic for VLANs.
SW1 SW2 ⚫
An MSTP network is composed of one or more MST regions, and each
Data traffic MST region contains one or more multiple spanning tree instances
(MSTIs). An MSTI is a tree network that consists of switches running
STP, RSTP, or MSTP.
SW3
⚫
The switches in the same MST region share the following
characteristics:
Have MSTP enabled.
Instance 1: Instance 2: Have the same region name.
VLAN 1, 2, 3 ... 10 VLAN 11, 12, 13 ... 20
Have the same VLAN-to-MSTI mappings.
Have the same MSTP revision level.
27 Huawei Confidential
OSPFv2
On a large-scale enterprise network, the aggregation layer may consist of
Area 0
Layer 3 devices, such as routers and switches. In such scenarios, static routes
are not flexible because the configuration is complex and they cannot quickly
respond to topology changes. Therefore, a dynamic routing protocol —
typically OSPF in IGP — can be deployed on the enterprise intranet.
⚫
The aggregation devices are divided into different non-backbone OSPF
areas based on the network structure.
⚫
Core devices, network egress devices, and uplink interfaces of aggregation
devices belong to Area 0. The downlink interfaces of aggregation devices
and the access devices are added to Area X.
⚫
Redundancy links and the OSPF triggered update mechanism are used to
Area 1 Area 2
implement backup of intranet paths.
⚫
Aggregation devices function as area border routers (ABRs) to execute
route filtering policies.
28 Huawei Confidential
Policy-Based Routing (PBR)
In the conventional routing and forwarding process, devices search their IP routing tables for
Internet
routes based on packets' destination addresses and then forward the packets accordingly.
However, more and more users require packet routing based on user-defined policies.
② ④
Traffic classifier
Configure a traffic classifier for matching interested Traffic behavior
data flows. Redirects interested packets.
③ ① Matching criteria: VLAN ID, source or destination MAC You can set the next-hop IP address or
address, Ethernet protocol type, DSCP priority, IP outbound interface for redirection.
precedence, inbound or outbound interface, ACL rule
Traffic policy
Traffic classifier > Traffic behavior
Enterprise intranet
Apply the traffic policy
⚫ Apply the traffic policy to the inbound direction of an interface.
PBR can be configured using the modular
⚫ Apply the traffic policy to the incoming packets that belong to the VLAN and
QoS command line interface (MQC) or an
match the criteria defined in the traffic classifier.
ACL-based simplified traffic policy. ⚫ Apply the traffic policy globally or to a card.
29 Huawei Confidential
Internet
AC
Fat AP
Fit AP
⚫ Networking characteristics: A Fat AP works independently ⚫ Networking characteristics: A Fit AP provides a wide range of functions and is
and needs to be configured separately. It provides only used with an AC. Fit APs are managed and configured by an AC in a unified
simple functions and is cost-effective. manner, posing high requirements on skills of maintenance personnel.
⚫ Application scenarios: families or mini-stores ⚫ Application scenarios: medium- and large-sized enterprises
30 Huawei Confidential
WLAN Network Architectures (2)
Leader AP Agile distributed AP
AC
Internet
Central AP Central AP
Leader AP
RU RU
⚫ Networking characteristics: A leader AP can work ⚫ Networking characteristics: The agile distributed architecture divides APs into
independently or manage a small number of common APs to central APs and remote units (RUs). A central AP can manage multiple RUs, and
implement basic roaming functions. A leader AP has a low this architecture provides good coverage and reduces costs. RUs can be used in the
price and low requirements for maintenance skills. Fat AP, AC + Fit AP, and cloud management architectures.
⚫ Application scenarios: small and micro enterprises ⚫ Application scenarios: scenarios where rooms are densely distributed
31 Huawei Confidential
WLAN Network Architectures (3)
Cloud management mode
Internet ⚫
Networking characteristics: APs are centrally managed and
configured on iMaster NCE-Campus. They provide rich functions and
support plug-and-play.
⚫
Application scenarios: small- and medium-sized enterprises
Cloud AP
32 Huawei Confidential
WLAN Network Architectures (4)
Native AC
Internet WAN
Egress zone ⚫
Networking characteristics: This architecture
Data
center
uses the native AC function of switches to
iStack/CSS link
33 Huawei Confidential
VRRP
Basic VRRP application Typical application of MSTP+VRRP
VRRP VRRP
Access switch
34 Huawei Confidential
• Generally, all hosts on the same network segment are configured with the same
default route with the gateway address as the next-hop address. The hosts use
the default route to send packets to the gateway, which then forwards the
packets to other network segments, enabling hosts to communicate with external
networks. If the gateway fails, hosts using this gateway address as the next hop
of their default route cannot communicate with external networks.
• The Virtual Router Redundancy Protocol (VRRP) virtualizes several routing
devices into a virtual router and uses the IP address of the virtual router as the
default gateway address for the communication between users and external
networks. If a gateway fails, VRRP selects another gateway to forward traffic,
thereby ensuring reliable communication.
▫ Redundancy: Multiple routing devices enabled with VRRP constitute a VRRP
group and the VRRP group is used as the default gateway. When a single
point of failure (SPOF) occurs, services are transmitted through the backup
link. This reduces the possibility of network faults and ensures non-stop
transmission of services.
▫ Load balancing: VRRP enables multiple available routers to share the load,
reducing the traffic burden on the master.
▫ Association: VRRP can monitor faults on uplinks. When the uplink interface
or uplink is faulty, the priority of the original master decreases, and an
optimal backup becomes the master, ensuring proper traffic forwarding.
Association between VRRP and BFD speeds up the active/standby
switchover. To speed up the active/standby switchover in the VRRP group,
configure a BFD session between the master and backup and associate the
BFD session with the VRRP group. This is because BFD can fast detect
faults. When the link between the master and backup becomes Down, the
backup immediately switches to the master and takes over traffic.
Link Aggregation, iStack, and CSS
Network ⚫
Ethernet link aggregation, also known as Eth-Trunk, bundles
iStack/CSS Link multiple physical links into a logical link to increase link
bandwidth, without having to upgrade hardware.
Eth-Trunk
CSS ⚫
Intelligent stack (iStack) enables multiple stacking-capable
switches to function as a single logical switch. iStack is
applicable to Huawei fixed switches.
⚫
A cluster switch system (CSS), also known as a cluster,
iStack combines two clustering-capable switches into a single logical
switch. CSS is applicable to Huawei modular switches.
⚫
Link aggregation can be used with iStack/CSS to implement
link-level and device-level reliability and increase network
bandwidth.
iStack iStack
35 Huawei Confidential
Network Quality Analysis (NQA)
⚫ To visualize the quality of network services and allow users to
check whether the quality of network services meets
requirements, the following measures must be taken:
Enable the device to provide network service quality information.
TCP test
Deploy probe devices to monitor network service quality.
DNS test ⚫
The preceding measures require devices to provide statistical
NQA test instance
parameters such as the delay, jitter, and packet loss ratio and
ICMP test
require dedicated probe devices. These requirements increase
HTTP test
investments on devices.
Network
⚫
NQA can precisely test the network operating status and
NQA client NQA server
output statistics without using dedicated probe devices,
effectively reducing costs.
⚫
NQA measures network performance and collects statistics on
the delay, jitter, and packet loss ratio in real time.
36 Huawei Confidential
37 Huawei Confidential
Access Access ⚫ Some enterprises may require that a switch forward only data frames
switch 1 switch 2
sent by terminals with trusted MAC addresses to the upper-layer
network. Employees are not allowed to change their locations, that is,
change access interfaces of the switch.
Solution
Terminal 1 Terminal 2 Terminal 3 Terminal 4
Port security converts the dynamic MAC addresses learned on an interface
into secure MAC addresses (including dynamic and static secure MAC
addresses, and sticky MAC addresses). This function prevents unauthorized
Point where port security can be configured
users from using this interface to communicate with the switch, thereby
enhancing device security.
38 Huawei Confidential
• The interface configured with port security can convert the learned MAC
addresses into secure MAC addresses, preventing devices with other MAC
addresses from accessing the network through the interface.
Media Access Control Security (MACsec)
Background
Most data is transmitted in plaintext on LAN links, failing to meet security requirements in
scenarios demanding high security.
Site 1
MACsec overview
IPsec
Internet
Media Access Control Security (MACsec), in compliance with the IEEE 802.1AE standard,
defines a method for secure data communication based on the Ethernet. It provides hop-
Site 2
by-hop encryption to secure data transmission.
Data source
Data integrity User data
authenticity Replay protection
check encryption
verification
⚫ MACsec is deployed between switches to ensure data security. For example, MACsec is
deployed between access switches and uplink aggregation or core switches.
⚫ When transmission devices exist between switches, MACsec can be deployed to ensure
data security.
39 Huawei Confidential
DHCP Snooping
Authorized
DHCP server ⚫ Some attacks are launched against DHCP on the
2
network, including bogus DHCP server attacks, DHCP
Invalid DHCP ACK, NAK, server DoS attacks, and bogus DHCP message attacks.
and Offer messages
2 ⚫ DHCP snooping ensures that DHCP clients obtain IP
Unauthorized addresses from authorized DHCP servers and records
DHCP server
1 mappings between IP addresses and MAC addresses
3 Obtain an of DHCP clients, preventing DHCP attacks on the
incorrect IP
DHCP client address DHCP client network.
40 Huawei Confidential
41 Huawei Confidential
3 The unauthorized terminal sends data. ⚫ IPSG checks IP packets on Layer 2 interfaces against a
binding table that contains the bindings of source IP
An unauthorized terminal accesses
Unauthorized 2 the network using authorized addresses, source MAC addresses, VLAN IDs, and
terminal 1's IP address.
terminal
1.1.1.2/24 inbound interfaces. Only packets matching the binding
0000-0000-FFFF
table are forwarded, and other packets are discarded.
42 Huawei Confidential
VXLAN Solution
Terminal 1 Terminal 4 Terminal 3 Terminal 4 However, this increases network construction costs.
1.1.1.1/24 2.2.2.1/24 1.1.1.2/24 2.2.2.2/24 ⚫ Virtual Routing and Forwarding (VRF): It is also called a VPN instance,
which is similar to a virtual device. A VPN instance uses a routing table
Isolation Isolation Isolation
independent of the root device to completely isolate the VPN instance
VN1 (office) VN2 (monitoring) from the root device, without increasing hardware costs.
43 Huawei Confidential
Network Admission Control (NAC)
Internet WAN
Authentication server
Authentication
device
Data
center O&M zone
User terminal
AC AC
• NAC is an end-to-end security technology that authenticates clients and
users to ensure network security.
44 Huawei Confidential
• In addition to using NAC to authenticate access users and control their rights, a
campus network also needs to authenticate and control rights of administrators
(also called login users) who can log in to devices through FTP, HTTP, SSH,
Telnet, or console ports.
DHCP
Using DHCP to automatically configure IP addresses Typical application of DHCP on a large-scale campus network
DHCP server
45 Huawei Confidential
46 Huawei Confidential
Network Time Protocol (NTP)
Primary ⚫ NTP is an application layer protocol in the TCP/IP suite that synchronizes time
time server
Stratum 1 between time servers and clients. NTP is implemented based on IP and UDP. NTP
Stratum-2 Primary time server: directly synchronizes its clock with a standard reference
Stratum-2
time server SwitchC SwitchE time server clock through a cable or radio. Typically, the standard reference clock is either
Stratum 3 Stratum 3
a radio clock or the Global Positioning System (GPS).
Stratum-2 time server: synchronizes its clock with either the primary time
server or other stratum-2 time servers on the network. Stratum-2 time servers
use NTP to transmit time information to other hosts in a LAN.
47 Huawei Confidential
SNMP
48 Huawei Confidential
Network Configuration Protocol (NETCONF)
⚫ NETCONF provides a set of mechanisms for managing network devices. To be specific, users can use
NETCONF to add, modify, and delete configurations of network devices, as well as obtain
configurations and status of network devices.
NETCONF message
NETCONF Network
NETCONF Server
Device
Device 1 Device 2 Device 3
49 Huawei Confidential
50 Huawei Confidential
LLDP
Network management requirements and overview of LLDP Application of LLDP in Huawei CloudCampus solution
51 Huawei Confidential
Analyzer
Telemetry-based
data reporting Collector Controller
Device
52 Huawei Confidential
Network Address Translation (NAT)
Web server
Internet 200.1.2.3
53 Huawei Confidential
Generic Routing Encapsulation (GRE)
Source IP 1.1.1.1
Destination IP 2.2.2.2
⚫ GRE is a protocol that encapsulates data packets of some network
GRE header layer protocols, such as IPX, IPv6, and IPv4. The encapsulated data
Source IP 2001:0DB8:0:0::1 packets can then be transmitted over a network using a different
Destination IP 2001:0DB8:0:1::1 network layer protocol, such as IPv4 and IPv6.
Payload Data
⚫
GRE is a Layer 3 tunneling technology that transparently transmits
packets over GRE tunnels. It solves the transmission problems on the
R1 1.1.1.1 2.2.2.2 R2 network that uses different network-layer protocols.
GRE tunnel GRE is easy to implement and increases only a few loads on devices at both
ends of a tunnel.
2001:0DB
Source IP GRE sets up tunnels over an IPv4 network to connect networks running
8:0:0::1
Source IP 2001:0DB8:0:0::1 different protocols, reusing the original network architecture and reducing
Destination 2001:0DB
Destination IP 8:0:1::1 costs.
2001:0DB8:0:1::1
IP Payload Data GRE connects non-contiguous subnets and sets up VPNs to ensure secure
Payload Data
connections between the enterprise headquarters and branches.
GRE provides only simple password authentication and does not provide the
54 Huawei Confidential
IPsec VPN
Source IP 1.1.1.1
Destination IP 2.2.2.2
Security protocol header
Source IP 192.168.1.1
⚫ Internet Protocol Security (IPsec) is a set of open network
Destination IP 172.16.1.1 security protocols defined by the Internet Engineering Task
Payload Data Force (IETF) to secure data transmission and reduce the
risk of information leakage.
R1 1.1.1.1 2.2.2.2 R2 ⚫
Through encryption and authentication, IPsec ensures
IPsec VPN tunnel secure service data transmission over the Internet from the
following dimensions:
Data source authentication
Source IP 192.168.1.1
Destination Data encryption
Source IP 192.168.1.1 172.16.1.1
IP
Destination IP 172.16.1.1 Payload Data
Data integrity verification
Payload Data Anti-replay
PC1 PC2
192.168.1.1/24 172.16.1.1/24
55 Huawei Confidential
L2TP VPN
⚫
Layer 2 Tunneling Protocol (L2TP) extends the application of the
Enterprise Point-to-Point Protocol (PPP). It is a VPN tunneling protocol that
branch LAC
LAC allows traveling employees or enterprise branches to remotely
Remote
OA user
access intranet resources.
⚫
The L2TP network architecture includes an L2TP access
56 Huawei Confidential
SSL VPN
⚫
Secure Shell (SSL) VPN is an SSL-based remote access VPN
technology. It allows mobile users (referred to as remote users in SSL
VPN) to securely and conveniently access enterprise intranets and
Remote
OA user intranet resources, improving work efficiency.
⚫
SSL VPN uses the browser/server (B/S) architecture. Remote users can
External directly use a web browser to access intranet resources securely and
Intranet anti-snapshot functions to eliminate security risks from remote users' devices.
57 Huawei Confidential
• B/S: Browser/Server
Contents
58 Huawei Confidential
Case 1 - Traditional Campus Network
Network requirements
Internet WAN
⚫ There are about 3000 wireless and wired terminals in total, so the campus
network needs to provide both wireless and wired access services.
⚫ Network segments are divided based on departments and services. The gateways
are configured on aggregation switches, and terminal addresses are
Egress zone automatically allocated.
Data
⚫ Network devices are centrally managed and monitored.
center O&M zone ⚫ Unified policy control is implemented for access users, and the intranet is
protected from attacks from external networks.
⚫ Network reliability must be ensured.
Solution
Core layer
⚫ Access, aggregation, and core switches are stacked or set up a CSS, and Eth-
Trunks are configured on uplinks to ensure reliability.
Aggregation layer
⚫ The AC + Fit AP wireless networking mode is used, and hot standby is configured
between ACs to ensure wireless network reliability. VLANs are configured on
access switches to differentiate users on different service network segments, and
IP addresses are allocated to these users by the corresponding aggregation
switches through DHCP. Single-area OSPF is deployed on aggregation devices
and upper-layer devices.
⚫ Access authentication is deployed for all users on the network, and
Access layer corresponding policies are configured using ACLs.
⚫ Firewalls are deployed in the egress zone and security zones are configured to
control traffic.
Terminal layer ⚫ SNMP is enabled on all devices on the network, and the network management
iStack/CSS link software is used to manage and maintain network devices in a unified manner.
59 Huawei Confidential
Case 2 - Virtualized Campus Network
Internet WAN Network requirements
⚫ Reliability and security requirements similar to those of traditional
campus networks.
⚫ Plug-and-play and centralized management of network devices, and
flexible provisioning of service configurations and policies.
Egress zone
Data
⚫ Isolation of multiple services on the campus network.
center O&M zone
⚫ Access control of terminals, and consistent network access rights and
experience for users while they are moving within the campus so long as
their identities remain unchanged.
60 Huawei Confidential
Case 3 - Small- and Medium-Sized Cloud Managed Campus
Network
Advertisement push ESL Network requirements
⚫ There are a large number of stores, most of which use wireless networks and
have simple network topologies. In addition, onsite personnel do not have
network O&M skills.
⚫ There are many types of wireless terminals, including common wireless terminals
and IoT terminals such as electronic shelf labels (ESLs).
⚫ The stores want to push product discounts and promotion activity advertisements
to customers who are connecting to the Wi-Fi network in the stores.
Internet
Solution
⚫ Deployment by scanning barcodes achieves minute-level AP onboarding and
quick provisioning of wireless network services. The cloud management platform
provides one-stop management of the entire lifecycle (from planning and
construction to maintenance and optimization) of all store networks.
⚫ Deploy IoT APs and use the IoT slots built in the IoT APs to implement co-site
deployment of IoT and Wi-Fi, unified planning, and shared network for data
backhaul. The ESL management system connects to and interacts with the
supermarket management and ERP systems to dynamically display real-time
price changes and issue out-of-stock warnings.
⚫ Customers access the network through Portal authentication, and can view
Store 1 Store 2 Store N customized advertisements displayed on the authentication page.
61 Huawei Confidential
B. Eth-Trunk
C. iStack
D. CSS
2. (True or False) On an MSTP network, devices in the same MST region must be configured
with the same VLAN-to-MSTI mappings. ( )
A. True
B. False
62 Huawei Confidential
1. BCD
2. A
Summary
63 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
⚫ Virtual eXtensible Local Area Network (VXLAN), defined in RFC 7348, is a Network
Virtualization over L3 (NVO3) technology that uses MAC-in-User Datagram
Protocol (MAC-in-UDP) encapsulation.
⚫ VXLAN has been widely used on data center networks (DCNs). As campus
networks have increasingly flexible service requirements and growing virtualization
and network automation requirements, VXLAN is introduced to campus networks
and works with the SDN controller to provide more benefits for customers.
⚫ This course describes basic concepts and fundamentals of VXLAN and how to use
VXLAN to build a multi-purpose campus network.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
3. BGP EVPN
3 Huawei Confidential
Technical Background: Virtualization Are Widely Deployed
by Enterprises
⚫ Virtualization technologies reduce IT costs, improve service deployment flexibility, and reduce O&M costs. More and
more enterprises choose to use cloud computing or virtualization technologies in their DCs or campus IT
infrastructure.
⚫ After an enterprise chooses the virtualization architecture, services are deployed on VMs in server clusters.
Services are deployed on VMs in server clusters.
Hypervisor Hypervisor
Physical network
4 Huawei Confidential
New Network Requirement: Layer 2 Extension
⚫ VMs in a virtualization or cloud computing cluster can be migrated flexibly. As a result, VMs running the same
service (on the same network segment) may run on different servers, or the same VM (with the same IP address)
may run on different servers (physical locations) at different times.
⚫ Physical servers may be located in equipment rooms with long geographical distances. Therefore, Layer 3
interconnection is required.
Layer 2 communication over a Layer 3 network
Layer 2 communication is required for the same service.
Hypervisor Hypervisor
5 Huawei Confidential
• After servers are virtualized, services are encapsulated in VMs. VMs can be live
migrated to any host in a cluster. One of the features of live migration is that the
network status does not change. As a result, the IP addresses of service VMs may
be in different network locations. Therefore, a large Layer 2 network is required
to solve this problem.
New Network Requirement: Multi-Tenant Isolation
⚫ In cloud-based scenarios, multi-tenancy is supported, that is, different tenants share physical resources. This poses
two requirements on the network: inter-tenant isolation and intra-tenant communication.
Inter-tenant isolation: Tenants may be configured with the same MAC address and IP address. Therefore, physical network
isolation needs to be considered. In addition, a large number of potential tenants need to be isolated.
Intra-tenant communication: VMs on the same network segment of a tenant require Layer 2 communication, which is irrelevant
to physical locations.
Intra-tenant Layer 2 communication Inter-tenant network isolation
Hypervisor Hypervisor
6 Huawei Confidential
Challenges Facing Traditional Networks
VM quantity limited by entry specifications of Limited VM migration scope
Limited network isolation capabilities
devices
• Server virtualization leads to an exponential • The VLAN ID field has only 12 bits. • VM migration must be performed on a Layer 2
growth of the number of VMs, compared • The number of tenants is much greater than network.
with physical servers. However, the MAC the number of available VLANs in large • VM migration on a traditional Layer 2 network
address table size of a Layer 2 device at the virtualization and cloud computing service is limited to a small scope.
access side is incapable to meet this scenarios.
change.
• VLANs on traditional Layer 2 networks
cannot adapt to dynamic network
adjustment. 802.1Q-tagged frame VMs can be migrated only within a VLAN.
The number of VLANs is limited.
Destination Source 802.1Q Length/
Payload FCS
MAC MAC Tag Type
Each device must have a The 12-bit VLAN IDs can represent
End-to-end
large MAC address table. only 4096 logical units.
VLAN
7 Huawei Confidential
3. BGP EVPN
8 Huawei Confidential
Overview of VXLAN
⚫ VXLAN is essentially a virtual private network (VPN) technology and can be used to build a Layer 2 virtual network
over any networks with reachable routes. VXLAN uses VXLAN gateways to implement communication within a
VXLAN network and communication between a VXLAN network and a non-VXLAN network.
⚫ VXLAN utilizes MAC-in-UDP encapsulation to extend Layer 2 networks. It encapsulates Ethernet packets into IP
packets for these Ethernet packets to be transmitted over routes, without considering the MAC addresses of VMs. In
addition, the routed network has no limitation on the network structure and supports large-scale expansion. As
such, VM migration is not constrained by the network architecture.
Local LAN
Overlay
Local LAN
VXLAN tunnel
9 Huawei Confidential
10 Huawei Confidential
Using VXLAN to Build a Multi-Purpose Campus Network
Internet Multiple services carried on one network Internet
11 Huawei Confidential
12 Huawei Confidential
VXLAN Packet Format
Outer Inner
Outer UDP VXLAN Inner
Ethernet Ethernet Payload
IP header header header IP header
header header
• Source IP address: IP
address of the source VTEP
of a VXLAN tunnel
VXLAN Flags
Reserved VNI Reserved
• Destination IP address: IP (00001000)
address of the destination
8 bits 24 bits 24 bits 8 bits
VTEP of a VXLAN tunnel
13 Huawei Confidential
IP network
PC1 PC2
192.168.1.1/24 192.168.1.2/24
VXLAN tunnel
14 Huawei Confidential
NVE VTEP VNI and BD VAP Border and Edge Gateway
PC1 PC2
192.168.1.1/24 192.168.1.2/24
SW1 SW2
VXLAN tunnel
VTEP VTEP
1.1.1.1/32 2.2.2.2/32
15 Huawei Confidential
PC1 BD 20 BD 20 PC2
192.168.1.1/24 VNI 2000 SW1 192.168.1.2/24
SW2 VNI 2000
VXLAN tunnel
16 Huawei Confidential
NVE VTEP VNI and BD VAP Border and Edge Gateway
PC1 PC2
192.168.1.1/24 192.168.1.2/24
SW1 SW2
1
VXLAN tunnel
G0/0/1.1
Bind it to BD 10 2
BD 10
Bind it to VLAN 10
17 Huawei Confidential
• After traffic from a traditional network enters a VXLAN network, a Layer 2 sub-
interfaces or VLAN is bound to a BD. A VXLAN VNI is specified in the BD to
implement mapping from the traditional VLAN network to the VXLAN network.
NVE VTEP VNI and BD VAP Border and Edge Gateway
VXLAN network
External network
⚫ Edge: an edge access device on a VXLAN network, through which traffic from a traditional network enters the
VXLAN network.
⚫ Border: a node for communication between a VXLAN network and an external network. It is used for external traffic
to enter the VXLAN network or internal traffic to access the external network. It is usually connected to devices
(such as routers and firewalls) that have Layer 3 forwarding capabilities.
18 Huawei Confidential
NVE VTEP VNI and BD VAP Border and Edge Gateway
Layer 2 gateway: forwards traffic to a VXLAN Layer 3 gateway: is used for inter-subnet
network or is used for intra-subnet communication communication on a VXLAN network and allows access
on the same VXLAN network. to an external network (non-VXLAN network).
19 Huawei Confidential
NVE VTEP VNI and BD VAP Border and Edge Gateway
SW3
VBDIF 10 Layer 3 gateway VBDIF 20
192.168.1.254 192.168.2.254
⚫ VLANIF interfaces are used for communication between broadcast domains on a traditional network. Similarly,
VBDIF interfaces are used for communication between BDs on a VXLAN network.
⚫ A VBDIF interface is a Layer 3 logical interface created for a BD on a Layer 3 VXLAN gateway.
⚫ IP addresses can be configured for VBDIF interfaces to implement communication between different VXLAN
segments and between VXLAN and non-VXLAN networks, and to connect a Layer 2 network to a Layer 3 network.
20 Huawei Confidential
NVE VTEP VNI and BD VAP Border and Edge Gateway
Layer 3
gateway
Layer 2 Layer 2
gateway gateway
Layer 2/Layer Layer 2/Layer
3 gateway 3 gateway
The Layer 3 gateway is deployed on one device. All inter-subnet traffic is VTEPs function as both Layer 2 and Layer 3 gateways. Non-gateway
forwarded by the gateway to implement centralized traffic management. nodes are unaware of VXLAN tunnels and only forward VXLAN packets.
21 Huawei Confidential
• Centralized gateway:
▫ Advantage: Inter-subnet traffic is managed in a centralized manner,
simplifying gateway deployment and management.
• Distributed gateways:
3. BGP EVPN
22 Huawei Confidential
Tunnel Establishment MAC Address Learning Data Frame Forwarding
23 Huawei Confidential
Tunnel Establishment MAC Address Learning Data Frame Forwarding
VTEP1
1.1.1.1/32
PC2 VTEP2
172.16.2.2/24 2.2.2.2/32 PC4
interface nve 1
source 1.1.1.1 interface nve 1 172.16.2.4/24
vni 100 head-end peer-list 3.3.3.3 source 2.2.2.2
vni 200 head-end peer-list 2.2.2.2 vni 200 head-end peer-list 1.1.1.1
24 Huawei Confidential
Tunnel Establishment MAC Address Learning Data Frame Forwarding
⚫
When a VTEP receives a data frame from the local device in a BD, the VTEP adds the source MAC address of the data frame to the
MAC address table of the BD and sets the outbound interface to the interface that receives the data frame.
⚫ This entry is used to guide the forwarding of data frames sent to a device connected to the VTEP.
PC1
172.16.1.1/24
0000-0000-000A
25 Huawei Confidential
Tunnel Establishment MAC Address Learning Data Frame Forwarding
PC1 broadcasts an ARP SW1 performs VXLAN encapsulation for the ARP packet, and SW2 forwards the ARP
Request packet. floods the VXLAN-encapsulated ARP packet to all VTEPs. packet to PC2.
1 3 5
Ethernet ARP Ethernet IP VXLAN Original data Ethernet ARP
UDP header
header packet header header header frame header packet
26 Huawei Confidential
2. After receiving the packet, SW1 determines the BD ID, destination VXLAN
tunnel, and VNI of the traffic based on VAP information. In addition, SW1
learns the MAC address of PC1 and records the BD ID and the interface
that receives the packet in the corresponding MAC address entry.
3. SW1 performs VXLAN encapsulation for the ARP Request packet and
forwards the encapsulated packet based on the ingress replication list.
4. After receiving the VXLAN packet, SW2 decapsulates the packet to obtain
the original data frame. In addition, SW2 learns the MAC address of PC1
and records the BD ID and the VTEP address of SW1 in the corresponding
MAC address entry.
5. SW2 floods the ARP packet in the local BD. PC2 then receives the packet
and learns the ARP information of PC1.
Tunnel Establishment MAC Address Learning Data Frame Forwarding
PC1 and PC2 have learned ARP entries of each other, and SW1 and SW2 have learned MAC addresses of PC1 and PC2. This
process is called flood and learn.
27 Huawei Confidential
8. SW2 encapsulates the ARP Reply packet with a VXLAN header and sends it
to the remote VTEP at 1.1.1.1.
9. After SW1 receives the VXLAN packet, it decapsulates the packet and
records the source MAC address of PC2 in the MAC address table. The
outbound interface is the remote VTEP.
• By doing this, PC1 and PC2 learn ARP entries of each other, and SW1 and SW2
learn MAC addresses of each other.
Tunnel Establishment MAC Address Learning Data Frame Forwarding
28 Huawei Confidential
Tunnel Establishment MAC Address Learning Data Frame Forwarding
PC1
172.16.2.1/24 VTEP1
1.1.1.1/32
VTEP2
2.2.2.2/32 PC3
BUM traffic 172.16.2.3/24
VXLAN header
UDP
IP Src 1.1.1.1, IP Dst 2.2.2.2
29 Huawei Confidential
Tunnel Establishment MAC Address Learning Data Frame Forwarding
Inter-Subnet Forwarding
Routing table of SW3
Outbound
Destination/Mask Next Hop
SW3 Interface
Layer 3 192.168.1.0/24 VBDIF10 192.168.1.254
VBDIF 10 VBDIF 20
gateway 3
192.168.1.254 192.168.2.254 192.168.2.0/24 VBDIF20 192.168.2.254
00AB-09FF-1111 00AB-09FF-2222
PC1 192.168.1.1/24 SW1 SW2 Server2 192.168.2.1/24
Default gateway: Layer 2 Layer 2 Default gateway:
192.168.1.254 gateway VTEP 3.3.3.3/32 gateway 192.168.2.254
4
• Source IP address: 1.1.1.1 VNI: 1000 • Source IP address: 3.3.3.3 VNI: 2000
• Destination IP address: 3.3.3.3 • Destination IP address: 2.2.2.2
30 Huawei Confidential
• After receiving the packet, SW3 decapsulates the VXLAN packet and finds that
the destination MAC address of the internal original data packet is 00AB-09FF-
1111, which is the MAC address of its own interface VBDIF10. Then SW3 needs to
search the Layer 3 forwarding table.
• SW3 searches the routing table and finds that the destination IP address
192.168.2.1 matches the direct route generated by VBDIF 20. SW3 then searches
the ARP table for the destination MAC address of the packet and searches the
MAC address table for the outbound interface of the packet. On SW3, the
outbound interface for the MAC address corresponding to 192.168.2.1 is the
remote VTEP at 2.2.2.2. SW3 encapsulates the packet into a VXLAN packet and
sends it to SW2.
• After receiving the packet, SW2 decapsulates the VXLAN packet and finds that
the destination MAC address is not the MAC address of any local interface. SW2
then searches the Layer 2 forwarding table and forwards the packet through the
local interface based on the MAC address table.
Contents
3. BGP EVPN
31 Huawei Confidential
VXLAN Configuration (1)
1. Create a BD.
Create a BD in the system view and enter the BD view. The value ranges from 1 to 16777215.
2. Create a VNI.
[Huawei-bd100] vxlan vni vni-id
Create a VNI in the BD view and associate the VNI with the BD. The value ranges from 1 to 16777215.
Create an NVE interface and enter its view. The NVE interface number must be 1.
Configure an IP address for the source VTEP. A loopback interface's address is recommended.
32 Huawei Confidential
VXLAN Configuration (2)
5. Configure an ingress replication list.
Configure an encapsulation mode to determine the type of data packet that can pass through the Layer 2 sub-interface.
7. Bind a VLAN to the BD.
[Huawei-bd] l2 binding vlan vlan-id
This command is configured in the BD view. Before binding a global VLAN to a BD, ensure that the global VLAN has been
created and interfaces have been added to the global VLAN.
8. Configure a Layer 3 gateway.
33 Huawei Confidential
Configuration Example: Intra-Subnet Communication (1)
Configure a Configure service SW1 configuration:
VXLAN tunnel access
[SW1] bridge-domain 100
BD 100 [SW1-bd100] vxlan vni 10000
VNI 10000
SW1 SW2
VTEP [SW1] interface Nve 1
GE1/0/10 VTEP
1.1.1.1/32 [SW1-Nve1] source 1.1.1.1
2.2.2.2/32
[SW1-Nve1]vni 10000 head-end peer-list 2.2.2.2
GE1/0/1
SW2 configuration:
[SW2] bridge-domain 100
[SW2-bd100] vxlan vni 10000
IP1 IP2 IP3
192.168.1.1/24 192.168.1.2/24 192.168.1.3/24
[SW2] interface Nve 1
[SW2-Nve1] source 2.2.2.2
• Configure a VXLAN tunnel between the two switches to [SW2-Nve1]vni 10000 head-end peer-list 1.1.1.1
34 Huawei Confidential
Configuration Example: Intra-Subnet Communication (2)
Configure a Configure SW1 configuration:
VXLAN tunnel service access
[SW1]interface GigabitEthernet 1/0/1.1 mode l2
BD 100 [SW1-GigabitEthernet1/0/1.1]encapsulation untag
VNI 10000 [SW1-GigabitEthernet1/0/1.1]bridge-domain 100
SW1 SW2 [SW1]interface GigabitEthernet 1/0/2.1 mode l2
VTEP GE1/0/10 VTEP [SW1-GigabitEthernet1/0/2.1]encapsulation untag
1.1.1.1/32 2.2.2.2/32 [SW1-GigabitEthernet1/0/2.1]bridge-domain 100
GE1/0/1
SW2 configuration:
[SW2] bridge-domain 100
IP1 IP2 IP3 [SW1-bd100] l2 binding vlan 1
192.168.1.1/24 192.168.1.2/24 192.168.1.3/24
35 Huawei Confidential
1. SW1 provides Layer 2 sub-interface access, and SW2 uses the VLAN binding
mode.
2. Create a VBDIF interface as the gateway for terminals in the BD.
Configuration Example: Inter-subnet Communication
(Centralized Gateway) (1)
Configure a Configure Configure a SW1 configuration:
VXLAN tunnel service access gateway
[SW1] bridge-domain 100
[SW1-bd100] vxlan vni 10000
BD 100 VTEP BD 200
SW3
VNI 10000 3.3.3.3/32 VNI 20000 [SW1] interface Nve 1
192.168.1.1 192.168.2.1 [SW1-Nve1] source 1.1.1.1
[SW1-Nve1]vni 10000 head-end peer-list 3.3.3.3
VTEP VTEP
SW1 SW2
1.1.1.1/32 2.2.2.2/32 SW2 configuration:
GE1/0/1 GE1/0/1 [SW2] bridge-domain 200
[SW2-bd100] vxlan vni 20000
36 Huawei Confidential
• On SW3, configure NVE interfaces to connect to SW1 and SW2, and create VBDIF
100 and VBDIF 200 as gateways of terminals in BD 100 and BD 200.
Configuration Example: Inter-subnet Communication
(Centralized Gateway) (2)
Configure a Configure Configure a
VXLAN tunnel service access gateway
SW1 configuration:
[SW1] interface GigabitEthernet 1/0/1.1 mode l2
BD 100 VTEP BD 200 [SW1-GigabitEthernet1/0/1.1] encapsulation untag
SW3
3.3.3.3/32 VNI 20000
VNI 10000 [SW1-GigabitEthernet1/0/1.1] bridge-domain 100
192.168.1.1 192.168.2.1
192.168.1.10/24 192.168.2.10/24
• VXLAN tunnels are configured between the three switches to If traffic from 192.168.2.10 carries VLAN 20,
how do we configure SW2?
implement mutual access between two PCs on different network
segments. The centralized VXLAN gateway is deployed on SW3.
37 Huawei Confidential
38 Huawei Confidential
Contents
3. BGP EVPN
◼ Basic Concepts
▫ BGP EVPN Routes
39 Huawei Confidential
Using BGP EVPN as the Control Plane Protocol
BGP EVPN not used BGP EVPN used as the control plane protocol
Problem 2: The flood and learn mechanism is used to learn MAC In practice, RRs can be used to further reduce the number of BGP EVPN
addresses. As a result, a large amount of traffic is flooded. peer relationships.
40 Huawei Confidential
• The static VXLAN solution does not have a control plane. VTEP discovery and
learning of host information (including IP addresses, MAC addresses, VNIs, and
gateway VTEP IP addresses) are performed through traffic flooding on the data
plane. As a result, there is a lot of flooded traffic on VXLAN networks. To address
this problem, VXLAN uses EVPN as the control plane protocol. EVPN allows VTEPs
to exchange BGP EVPN routes to implement automatic VTEP discovery and host
information advertisement, preventing unnecessary traffic flooding.
SW1 SW2
• Type 2 routes (MAC/IP routes): are used to advertise host MAC addresses, ARP entries, and IP routes.
• Type 3 routes (inclusive multicast routes): are used to transmit Layer 2 VNI (L2VNI) and VTEP IP address information, implement
automatic VTEP discovery, dynamic VXLAN tunnel establishment, and BUM packet forwarding.
• Type 5 routes (IP prefix routes): are used to advertise host MAC addresses, ARP entries, IP routes, and external network routes.
41 Huawei Confidential
42 Huawei Confidential
Extended Community
⚫ BGP EVPN is similar to MPLS VPN. To control the sending and receiving of routes, BGP EVPN uses the EVPN
instance, which is the same as the traditional IP VPN instance. An EVPN instance has RD and RT values. When
routes are transmitted, the extended community attribute is used to carry the RT value of the EVPN instance.
⚫ In addition to the RT value, BGP EVPN adds some new sub-types to the extended community attribute: MAC
Mobility and EVPN Router's MAC Extended Community.
43 Huawei Confidential
• For details about the RD and RT, see the HCIP-Advanced Routing Switching - 08
MPLS VPN Principles and Configuration.
EVPN VPN Instance
⚫ After an EVPN instance is bound to a BD, MAC address entries of the BD are transmitted through BGP EVPN routes, carrying the ERT
of the EVPN instance bound to the BD. After receiving the EVPN routes, the remote end compares the ERT carried in the EVPN
routes with the IRT of the local EVPN instance and adds the EVPN routes to the routing table of the EVPN instance. The remote end
parses the EVPN routing table to obtain MAC address entries and adds them to the MAC address table of the BD bound to the EVPN
instance.
BGP Update message
EVPN RT = 202:1
EVPN route
VXLAN tunnel
PC1 SW1 SW2 PC2
EVPN RD: 20:1 If the ERT and IRT values are not specified EVPN RD: 20:1
EVPN ERT: 202:1 and only the RT value is available, the ERT EVPN ERT: 200:1
EVPN IRT: 200:1 and IRT values are the same. EVPN IRT: 202:1
44 Huawei Confidential
Contents
3. BGP EVPN
▫ Basic Concepts
◼ BGP EVPN Routes
45 Huawei Confidential
Type 2 Route Type 3 Route Type 5 Route
Ethernet Segment Identifier (10 bytes) Unique ID for defining the connection between local and remote devices.
MAC Address Length (1 byte) Length of the host MAC address carried in the route.
IP Address Length (1 byte) Mask length of the host IP address carried in the route
46 Huawei Confidential
Type 2 Route Type 3 Route Type 5 Route
When hosts on the same subnet In a centralized gateway scenario, ARP IRB routes are advertised when inter-
communicate with each other, the host routes are advertised, including host IP subnet mutual access is deployed in a
MAC address is advertised, including the addresses, MAC addresses, and L2VNIs. distributed gateway scenario. The
host MAC address and L2VNI. routes carry MAC addresses, IP
addresses, L2VNIs, and L3VNIs of hosts.
47 Huawei Confidential
• The first three fields (RD, Ethernet Segment Identifier, and Ethernet Tag ID) of a
Type 2 route are the same in different scenarios, and only the last six fields are
different.
Type 2 Route Type 3 Route Type 5 Route
VXLAN tunnel
RD = 10:1
MAC address = 0000-0000-0001
VNI = 10
48 Huawei Confidential
4. After receiving the BGP EVPN route from SW1, SW2 checks the RT (similar
to the RT concept in MPLS VPN) carried in the route. If the RT is the same
as the import RT of the local EVPN instance, SW2 accepts the route.
Otherwise, SW2 discards the route. After accepting the route, SW2 obtains
the MAC address of PC1 and the mapping between the BD ID and the
VTEP IP address (next hop network address in MP_REACH_NLRI) of SW1,
and generates the MAC address entry of PC1 in the local MAC address
table. Based on the next hop, the outbound interface of the MAC address
entry recurses to the VXLAN tunnel destined for SW1.
Type 2 Route Type 3 Route Type 5 Route
ARP Advertisement
⚫ This slide describes how BGP EVPN uses Type 2 routes to advertise host ARP entries.
VXLAN tunnel
RD = 10:1 3
1
MAC address =0000-0000-0001
SW1 learns the ARP IP address = 172.16.1.1 The Layer 3 gateway
entry of PC1. L2VNI = 10 SW2 obtains ARP
information of PC1.
When BGP EVPN is used in a centralized gateway scenario, the inter-subnet packet forwarding process is similar to that in a
static VXLAN scenario.
MAC address ARP IP route
advertisement advertisement advertisement
49 Huawei Confidential
• A MAC/IP route can carry both the MAC and IP addresses of a host, and
therefore can be used to advertise ARP entries between VTEPs. The MAC Address
and MAC Address Length fields identify the MAC address of the host, whereas
the IP Address and IP Address Length fields identify the IP address of the host.
This type of MAC/IP route is called the ARP route. ARP advertisement applies to
the following scenarios:
▫ ARP broadcast suppression. After a Layer 3 gateway learns the ARP entries
of a host, it generates host information that contains the host IP and MAC
addresses, Layer 2 VNI, and gateway's VTEP IP address. The Layer 3
gateway then transmits an ARP route carrying the host information to a
Layer 2 gateway. When the Layer 2 gateway receives an ARP request, it
checks whether it has the host information corresponding to the
destination IP address of the packet. If such host information exists, the
Layer 2 gateway replaces the broadcast MAC address in the ARP request
with the destination unicast MAC address and unicasts the packet. This
implementation suppresses ARP broadcast packets.
▫ VM migration in distributed gateway scenarios. After a VM migrates from
one gateway to another, the new gateway learns the ARP entry of the VM
(after the VM sends gratuitous ARP packets) and generates host
information that contains the host IP and MAC addresses, Layer 2 VNI, and
gateway's VTEP IP address. The new gateway then transmits an ARP route
carrying the host information to the original gateway. After the original
gateway receives the ARP route, it detects a VM location change and
triggers ARP probe. If ARP probe fails, the original gateway withdraws the
ARP and host routes of the VM.
• ARP advertisement is mainly used in the centralized VXLAN gateway+BGP EVPN
scenario. In BGP EVPN, ARP or IRB advertisement to peers is mutually exclusive.
Only one of these routes can be configured to advertise. Generally, ARP
advertisement is selected in the centralized VXLAN gateway+BGP EVPN scenario,
in the distributed VXLAN gateway+BGP EVPN scenario, IRB routes are advertised.
Type 2 Route Type 3 Route Type 5 Route
2 Routing
VBDIF 10 VBDIF 10
VBDIF 20 VBDIF 20
VLANIF 10 VLANIF 20
PC1 PC2
172.16.2.1/24 VTEP1 VTEP2 172.16.1.2/24
50 Huawei Confidential
▫ After receiving the packet sent from PC1 to PC2, the switch decapsulates
the packet and finds that the destination MAC address is the MAC address
of VLANIF 10. Therefore, the switch considers that the packet is sent to
itself and sends the packet to the routing module for further processing.
▫ The routing module parses the packet and finds that the destination IP
address is 192.168.20.2, which is not the IP address of the local interface.
Therefore, the routing module needs to forward the packet at Layer 3.
When the routing module searches the routing table, it matches the direct
route generated by VLANIF 20 against the packet.
▫ Because the direct route is matched, the packet has reached the last hop.
Therefore, the switch searches the ARP table for 192.168.20.2, obtains the
MAC address corresponding to 192.168.20.2, and sends the packet to the
switching module to re-encapsulate the packet into a data packet.
▫ The switching module searches the MAC address table to determine the
outbound interface of the packet and whether the packet needs to carry a
VLAN tag. In the data packet sent by the switching module, the source MAC
address is MAC2, the destination MAC address is MAC3, and the VLAN tag
is None.
• In the preceding forwarding process, the switch determines whether the packet is
forwarded at Layer 3 based on the destination MAC address of the data packet.
If the destination MAC address is the MAC address of the switch, the switch
forwards the packet based on the Layer 3 forwarding table. Otherwise, the switch
forwards the packet based on the Layer 2 forwarding table. This process is
involved in both symmetric and asymmetric IRB scenarios.
Asymmetric IRB
⚫ Asymmetric IRB: The ingress VTEP performs both Layer 3 and Layer 2 table lookup, and the egress VTEP only needs to perform Layer
2 table lookup and forwarding. This is called asymmetric forwarding because the operations performed by the ingress VTEP and
egress VTEP are different.
Outer IP
UDP
VBDIF 10 VBDIF 10
VXLAN header (VNI 100)
VBDIF 20 VBDIF 20
VTEP1 Source MAC: MAC address of VBDIF 10 VTEP2
1.1.1.1 Destination MAC: MAC B 2.2.2.2
6 VTEP2 sends the data
1 VTEP1 sends the data packet to VTEP2
PC1 sends a unicast packet to PC2.
4 through the VXLAN tunnel.
packet to PC2.
VXLAN tunnel
52 Huawei Confidential
• During asymmetric IRB, VTEPs do not transmit host IP routes between each
other. That is, VTEP1 and VTEP2 do not transmit the 32-bit host route (generated
through an ARP entry) of the connected PC. Therefore, VTEP1 searches the
routing table in step 2, and matches the packet against the direct route
generated by VBDIF 10.
• In step 5, VTEP2 decapsulates the VXLAN packet and finds that the destination
MAC address is not the MAC address of the local VBDIF interface corresponding
to the BD. Therefore, VTEP2 searches the Layer 2 forwarding table for the MAC
address entry of the corresponding BD based on the VNI carried in the packet
and then forwards the packet at Layer 2.
Type 2 Route Type 3 Route Type 5 Route
Symmetric IRB
⚫ Symmetric IRB: Both the ingress and egress VTEPs perform Layer 3 table lookup and forwarding.
⚫
Compared with asymmetric IRB, symmetric IRB adds an IP VPN instance and its bound L3VNI. In asymmetric IRB mode, the VNI in
the VXLAN header of packets transmitted between VTEPs is the L2VNI. The VBDIF interface needs to be bound to an IP VPN
instance. In this case, route learning and data forwarding are restricted to the IP VPN instance, which is similar to MPLS VPN.
VTEP1 VTEP2
1.1.1.1 2.2.2.2
VXLAN tunnel
VBDIF 20 VBDIF 10
IP Bind VPN-Instance VPN1 In this case, IRB routes (additional L3VNI) are IP Bind VPN-Instance VPN1
BD 20 BD 10
transmitted between VTEPs. The learning of IRB
routes between BD 20 of VTEP1 and BD 10 of
IP VPN-Instance VPN1 IP VPN-Instance VPN1
VTEP2 is controlled by the RT values carried in
VXLAN VNI 1000 (L3VNI) VXLAN VNI 1000 (L3VNI)
RD 203:1 the routes. This mechanism is similar to the RD 103:1
RT 10:1 MPLS VPN VPNv4 route learning mechanism. RT 10:1
53 Huawei Confidential
54 Huawei Confidential
• In a BGP EVPN scenario, if you want to control the sending and receiving of EVPN
routes based on the RT value of the IP VPN instance, run the vpn-target evpn
command to configure the RT value. In this case, the ERT is carried in EVPN
routes and sent to the remote BGP EVPN peer, the IRT matches the RT carried in
an EVPN route to determine which EVPN routes can be added to the routing
table of the local VPN instance address family.
VBDIF 20
MAC address ARP IP route BGP EVPN routing table IP VPN routing table
advertisement advertisement advertisement
55 Huawei Confidential
• VTEP1 sends a Type 2 BGP EVPN route (IRB type), which carries the ERT (20:1) of
the EVPN instance bound to the BD.
• After receiving the BGP Update message, VTEP2 checks the RT value (20:1)
carried in the BGP Update message and compares it with the IRT in the local
EVPN instance and the IRT (EVPN) in the IP VPN instance. VTEP2 finds that the
IRT of the EVPN instance bound to BD 20 and IRT of the IP VPN instance bound
to VBDIF 20 are the same, adds the EVPN routes to the EVPN routing table of BD
20, and adds the IP routes contained in the EVPN routes to the routing table of
the IP VPN instance bound to VBDIF 20.
Type 2 Route Type 3 Route Type 5 Route
VXLAN tunnel
BGP EVPN uses the EVPN Router's MAC Extended Community attribute to transmit the VTEP's router MAC address, which is the MAC
address of an NVE interface.
56 Huawei Confidential
Type 2 Route Type 3 Route Type 5 Route
UDP
VXLAN header (L3VNI 1000)
Source MAC address: MAC
VTEP1 address of VBDIF 20 VTEP2 2.2.2.2
1.1.1.1 Destination MAC address: MAC B Router MAC: MAC B
1 VTEP2 sends the
PC1 sends a unicast VTEP1 sends the data packet to VTEP2 5
3 data packet to PC2.
packet to PC2. through the VXLAN tunnel.
VXLAN tunnel
57 Huawei Confidential
• In symmetric IRB mode, VTEPs transmit 32-bit host routes generated using ARP
entries. Therefore, VTEP1 matches the 32-bit host routes transmitted from VTEP2
during route lookup. Even if VTEP1 has the direct route generated by VBDIF 10, it
still forwards packets based on 32-bit host routes according to the longest match
rule.
• In step 4, VTEP2 decapsulates the VXLAN packet and finds that the destination
MAC address of the inner data of a packet is the router MAC address (MAC B) of
VTEP2. VTEP2 determines that it needs to forward the packet based on the
routing table, finds the corresponding IP VPN instance based on VNI 1000, and
searches the routing table of the IP VPN instance for the route, finds the direct
route generated by VBDIF 10, searches the local MAC address table, and sends
the packet to PC2.
Type 2 Route Type 3 Route Type 5 Route
Type 3 Route
⚫ Type 3 route (inclusive multicast route)
This type of route is used on the VXLAN control plane for automatic VTEP discovery and dynamic VXLAN tunnel establishment.
VTEPs that function as BGP EVPN peers exchange inclusive multicast routes to transfer L2VNIs and VTEPs' IP addresses.
The Originating Router's IP Address field identifies the local VTEP's IP address; the MPLS Label field identifies the L2VNI.
PMSI attribute Tunnel Type (1 byte) The value can only be 6, representing Ingress Replication in VXLAN
scenarios.
MPLS Label (3 bytes) = L2VNI
L2VNI carried in the route.
Tunnel Identifier (variable)
This field is the local VTEP's IP address in VXLAN scenarios.
58 Huawei Confidential
59 Huawei Confidential
Type 2 Route Type 3 Route Type 5 Route
Type 5 Route
⚫ Type 5 route (IP prefix route)
The IP Prefix Length and IP Prefix fields in an IP prefix route can identify a host IP address or network segment.
If the IP Prefix Length and IP Prefix fields in an IP prefix route identify a host IP address, the route is used for IP route
advertisement in distributed VXLAN gateway scenarios, which functions the same as an IRB route on the VXLAN control plane.
If the IP Prefix Length and IP Prefix fields in an IP prefix route identify a network segment, the route allows hosts on a VXLAN to
access external networks.
Format of an IP prefix route Field description
60 Huawei Confidential
Type 2 Route Type 3 Route Type 5 Route
61 Huawei Confidential
• Similar to Type 2 IRB routes, Type 5 routes carry the router MAC address of the
VTEP through the EVPN router's MAC extended community attribute during
route transmission. In addition, Type 5 routes carry only the L3VNI. Therefore, the
forwarding process is also called IRB forwarding.
Contents
3. BGP EVPN
▫ Basic Concepts
▫ BGP EVPN Routes
◼ BGP EVPN Features
62 Huawei Confidential
ARP Broadcast Suppression
⚫ BGP EVPN Type 2 routes enable VTEPs to learn MAC addresses without depending on communication between
hosts. However, ARP entries between hosts still need to be flooded and forwarded on the VXLAN overlay, which
consumes a large number of network resources.
⚫ To reduce broadcast traffic, configure ARP broadcast suppression using BGP EVPN routes.
Query the ARP broadcast
suppression table of BD 20
2 IP Address MAC VTEP
172.16.2.2 MAC B 2.2.2.2
VXLAN tunnel
PC1 PC2
172.16.2.1/24 VTEP1 VTEP1 changes the destination MAC address of the VTEP2 172.16.2.2/24
MAC A 1.1.1.1 ARP packet from all Fs to MAC B, and sends the ARP 2.2.2.2 MAC B
packet to VTEP2 through VXLAN encapsulation.
1 3 4
PC1 sends an ARP IP UDP VXLAN Original data VTEP2 unicasts the
Request packet to ARP ARP packet to PC2.
header header header packet
request the ARP
entry of PC2.
• Source IP address: 1.1.1.1 • Source MAC address: MAC A • Source MAC: MAC A
• Destination IP address: 2.2.2.2 • Destination MAC address: MAC B • Destination MAC: MAC B
63 Huawei Confidential
VXLAN tunnel
PC1 PC2
172.16.2.1/24 VTEP1 VTEP2 172.16.2.2/24
MAC A 1.1.1.1 2.2.2.2 MAC B
Transmit ARP entries through
Type 2 IRB routes
1 2 3 VTEP2 uses IRB routes
Enable BGP EVPN host to generate an IRB
information collection host information table
to generate IRB routes
64 Huawei Confidential
• An ARP route carries the following valid information: host MAC address, host IP
address, and L2VNI. An IRB route carries the following valid information: host
MAC address, host IP address, L2VNI, and L3VNI. As a result, an IRB route
includes an ARP route and can be used to advertise both the host IP route and
host ARP entry.
Local Proxy ARP (1)
⚫ After BGP EVPN host information collection is enabled on the entire network, the Layer 3 gateway learns the 32-bit
host routes of all hosts. In this way, the Layer 3 gateway can use the symmetric IRB mode to forward traffic
between hosts in the same BD.
⚫ In this case, you can enable local proxy ARP on the VBDIF interface of the Layer 3 gateway. The VBDIF interface
responds to the ARP Request packet sent by a downstream host to an IP address on the same network segment.
Then the Layer 3 gateway performs Layer 3 forwarding on the same network segment.
1
PC1 sends an ARP Request VBDIF 20
packet to request the ARP MAC C
entry of PC2. 172.16.2.254
arp-proxy local enable
2
VBDIF 20 is enabled local
proxy ARP to respond to
ARP Reply packets.
VXLAN tunnel
PC1 PC2
172.16.2.1/24 VTEP1 VTEP2 172.16.2.2/24
MAC A 1.1.1.1 2.2.2.2 MAC B
65 Huawei Confidential
VBDIF 20
ARP entry of PC1 MAC C
172.16.2.254
IP Address MAC
172.16.2.2 MAC C
VXLAN tunnel
PC1 PC2
172.16.2.1/24 VTEP1 VTEP2 172.16.2.2/24
MAC A 1.1.1.1 2.2.2.2 MAC B
VTEP1 finds that the destination MAC address is
its own MAC address, searches the routing table
Data packet sent from for the host route, and forwards the packet to
PC1 to PC2 VTEP2 through VXLAN.
3 4
Ethernet
Payload
header
• Source MAC address: MAC A With the local proxy ARP mechanism, ARP packets are suppressed on the local VTEP,
• Destination MAC address: MAC C and unnecessary traffic exchange between VTEPs is reduced.
66 Huawei Confidential
Distributed Gateway
⚫ When local proxy ARP is enabled, a VTEP only needs to maintain local ARP entries. ARP information
transmitted by other VTEPs through BGP EVPN routes is not used during forwarding. In this case, the
VTEP does not need to maintain ARP entries learned from other VTEPs.
⚫ After distributed gateway is enabled, the VTEP processes only the ARP packets received from the user-
side host and deletes the learned network-side ARP entries.
VTEP1's ARP entry
IP Address MAC
172.16.2.1 MAC A
172.16.2.2 MAC B
VXLAN tunnel
PC1 PC2
172.16.2.1/24 VTEP1 VTEP2 172.16.2.2/24
MAC A 1.1.1.1 2.2.2.2 MAC B
67 Huawei Confidential
• Generally, the same MAC address is configured for VBDIF interfaces with the
same interface number on different VTEPs. After the distributed gateway function
is enabled, VBDIF interfaces with the same IP address and MAC address do not
report ARP conflicts. In addition, when hosts and VMs are migrated to different
VTEPs, the gateway does not need to resolve ARP entries again.
MAC Mobility (1)
172.16.2.1/24
MAC B
68 Huawei Confidential
MAC Mobility (2)
69 Huawei Confidential
• The MAC Mobility extended attribute is used to announce the location change of
a host or VM when the host or VM is migrated from one VTEP to another VTEP.
Contents
3. BGP EVPN
70 Huawei Confidential
Layers and Concepts of a VXLAN-based Virtualized Campus
Network
• Multiple VNs can be created based on service
requirements to implement service isolation.
• VXLAN is used to implement Layer 2 and Layer 3
VN 1 VN 2 VN 3 communication.
Underlay (physical network layer) • Basic bearer network for service data forwarding.
71 Huawei Confidential
72 Huawei Confidential
• L4-L7 security policy: The firewall supports security control from Layer 4 to Layer
7.
What Are an Underlay Network and a Fabric?
Underlay network Fabric
The underlay network is the foundation of the entire virtualized campus A campus fabric is a network resource pool that is abstracted from
network. It is a physical network consisting of physical network devices, physical network devices on the underlay network, creating a multiple-
which provides interoperability for all services on a campus network. purpose network.
Edge Access
Border
IGP (OSPF) Edge Access
Interconnection VLAN
Interconnection IP address
• Multi-layer architecture (core, aggregation, and access layers) The fabric consists of the following resource pools:
• Multiple topologies (such as tree, ring, and mesh topologies) • Overlay network resource pool (BD IDs and VNIs) for terminal access
• Underlay information includes device interconnection VLANs, • VLAN ID pool for terminal access
interconnection IP addresses, and an IGP. • Access point pool (switch ports for wired access or SSIDs for wireless
access) for terminal access
These resource pools can be used to create multiple VNs.
73 Huawei Confidential
What Is an Overlay Network?
Underlay and overlay in our daily life Underlay and overlay networks on a virtualized campus network
VXLAN encapsulation
Service A Service A
74 Huawei Confidential
IoT VN • Network service resources (such as the DHCP server and third-party
RADIUS/Portal server)
AP
R&D VN • (Optional) External networks
OA VN • User IP address segments, VLANs, and gateway address
75 Huawei Confidential
Creating a VN
Internet
VN settings
• User gateway location
1
• External network
• Network service resources
• User subnet and gateway
OA VN
3 Wireless access
Host1 Host2 Host3 Host4 • Access sites and devices
76 Huawei Confidential
Typical Case Analysis: Requirements
Firewall DHCP server
Fabric requirements:
Internet
• Build a fabric based on the physical network.
• Use the distributed gateway solution.
VN requirements:
• Create two VNs, one for OA and the other for
R&D.
• By default, the two VNs are completely isolated,
and intra-subnet and inter-subnet communication
can be implemented in each VN.
• Devices in both VNs can access the external
network connected to the firewall.
• Terminals in the two VNs can obtain IP addresses
Sales R&D Sales R&D from the DHCP server.
employee employee employee employee
77 Huawei Confidential
Typical Case Analysis: Fabric Management (1)
Firewall DHCP server Fabric creation and configuration:
78 Huawei Confidential
Typical Case Analysis: Fabric Management (2)
Firewall DHCP server
Automatic deployment of the fabric and underlay
network:
1. Based on the discovered physical network topology
and the user-defined fabric, iMaster NCE-Campus
Interconnection IP Interconnection IP
address/VLAN Border address/VLAN automatically orchestrates the network. (You can
OSPF RR OSPF
select multiple OSPF areas or a single OSPF area.)
Transparent Transparent 2. iMaster NCE-Campus automatically delivers
Interconnection Interconnection underlay network configurations to devices based
IP address/VLAN IP address/VLAN
OSPF BGP EVPN peer OSPF on the network orchestration result so that the
relationship
devices have reachable routes to each other's IP
Edge Edge address.
3. iMaster NCE-Campus automatically delivers fabric
configurations to devices, and BGP EVPN peer
relationships are established between devices.
79 Huawei Confidential
Typical Case Analysis: VN Management
Firewall DHCP server
Network service
External resource
network 2
External
network 1
VN creation:
1. You can create OA and R&D VNs and specify the IP
network segments/VLANs, gateway addresses,
OA VN
VLAN 10: 10.1.10.0/24
associated external networks and network service
R&D VN
VLAN 20: 10.1.20.0/24 VLAN 30: 10.1.30.0/24 resources, and terminal access points for the VNs.
VLAN 40: 10.1.40.0/24
2. iMaster NCE-Campus translates user intents into
configurations and delivers the configurations to
Access devices Access devices network devices.
and ports and ports
80 Huawei Confidential
Typical Case Analysis: Tunnel Establishment
Firewall DHCP server
81 Huawei Confidential
Typical Case Analysis: Address Obtaining
Firewall DHCP server
Address obtaining:
1.2.3.0/24
1. After sales employee A accesses the network, the
Border user is authenticated. After the authentication
DHCP message exchange succeeds, the authentication point Edge1 obtains
3.3.3.3 the authorization result of the user and assigns
the user to the corresponding VLAN.
2. Host A sends a DHCP Request message. After
receiving the Request message, the gateway
1.1.1.1 Edge1 relays the Request message to the border
node through the VXLAN tunnel.
Edge1 Edge2 3. The border node decapsulates the VXLAN packet
and forwards the DHCP Request message to the
DHCP server.
Sales employee A
4. The DHCP server assigns an IP address to host A.
82 Huawei Confidential
Typical Case Analysis: Intra-Subnet Communication
Firewall DHCP server
1.1.1.1 2.2.2.2
3. Edge1 learns the MAC address AAAA.0000.0002.
VXLAN tunnel (L2VNI)
4. When host A sends data packets to host B, Edge1
Edge1 Edge2 encapsulates the data packets into VXLAN
packets and forwards them to Edge2. Edge2
performs VXLAN decapsulation and sends the
Sales employee A Sales employee B
10.1.10.1/24 10.1.10.2/24 decapsulated packets to the destination.
AAAA-0000-0001 AAAA-0000-0002
83 Huawei Confidential
Typical Case Analysis: Inter-Subnet Communication
Firewall DHCP server
Inter-subnet communication on the same VN:
1. Sales employee C passes the access authentication
Border and accesses the campus network.
BGP Update message
2. Edge2 advertises the host route of host C to the
MAC/IP route (IRB)
Route Host route = 10.1.20.1/32 border node through a BGP Update message. The
reflection L3VNI = 10 border node (RR) advertises the host route to Edge1.
Next_Hop = 2.2.2.2
3. Edge1 learns the route to 10.1.20.1/32. The next hop
of the route is 2.2.2.2, and the outbound interface is
1.1.1.1 2.2.2.2
VXLAN tunnel (L3VNI) the VXLAN tunnel interface.
84 Huawei Confidential
Typical Case Analysis: Accessing the External Network
Firewall DHCP server
85 Huawei Confidential
Quiz
1. (True or false) BGP EVPN Type 2 host IP routes can be used to transmit ARP information.
( )
A. True
B. False
2. (Single-answer question) Which of the following statements about BGP EVPN is false?
( )
A. MP_REACH_NLRI is used to carry routes.
86 Huawei Confidential
1. A
2. D
Summary
⚫ VXLAN uses a Layer 3 routed network as the underlay network and uses tunnels to
build an overlay network, supporting large-scale tenant networks.
⚫ VXLAN does not define the control plane. To prevent BUM traffic flooding, use
other protocols on the control plane to optimize BUM traffic forwarding.
⚫ BGP EVPN defines several new types of BGP EVPN routes by extending BGP. These
BGP EVPN routes can be used to transmit VTEP addresses, host information, and
routing information, effectively controlling flooding of BUM traffic.
87 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
⚫ Campus networks are faced with an increasing number of information security threats, such
as viruses, Trojan horses, spyware, and malicious attacks. On a traditional campus network,
the intranet is considered secure and threats come from the extranet. However, research
shows that roughly 80% of security threats come from the intranet. Network faults caused
by the intranet threats will lead to a broad range of serious damage. Even worse, the service
system and network will break down.
⚫ The Network Admission Control (NAC) solution integrates terminal security with access
control and takes check, isolation, hardening, and audit measures to improve the proactive
protection capabilities of terminals. This solution ensures security of each terminal and the
entire campus network.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. Overview of NAC
4. NAC Configuration
5. Policy Association
3 Huawei Confidential
Technical Background of NAC
⚫ Unauthorized users may access a campus
network, which compromises information security
Intranet FTP server
on the campus network.
⚫ Various types of terminals are connected to a
Unauthorized campus network, and it is difficult to control user
access
Virus spreading behaviors on the campus network.
Campus network
⚫ For security purposes, a campus network cannot
Guest Virus-infected host grant access rights to all terminals.
Virus spreading Authentication must be performed based on user
identities and terminal status. The terminals that
do not meet certain conditions are not allowed to
access the campus network.
4 Huawei Confidential
• Currently, the intranets of most campus networks are faced with the following
security issues:
▫ Antivirus software is not managed in a centralized manner, and patch
management is disordered. Even if enterprises purchase antivirus software,
it is difficult to ensure that the virus signature databases of all terminals are
the latest. As a result, once a terminal is infected with viruses or malicious
code, the virus will soon spread on the intranet.
5 Huawei Confidential
2 4
The admission device sends the user credential to the
authentication
User identity
Campus network User policy admission server for authentication.
authorization
3. User identity verification
The admission server verifies the identity of the terminal
Admission device
User identity and delivers the verification result and corresponding
authentication policy to the admission device.
request 1
Terminal
4. User policy authorization
The admission device executes the policy based on the
authorization result received from the admission server.
6 Huawei Confidential
• User policy authorization: The admission device executes the policy based on the
authorization result received from the admission server. For example, the
admission device permits or denies access from the terminal. The admission
device can also perform more complex policy-based control on the terminal, for
example, increasing or decreasing the forwarding priority or limiting the network
access rate.
Policy-based Control in NAC
7 Huawei Confidential
Policy-based Authorization in NAC
User terminals Admission devices Pre-authentication domain
Before authentication
…
Isolation domain
Access
Upon authentication failures …
Virus signature Patch server
database
server
Post-authentication domain
After successful
authentication Intranet
8 Huawei Confidential
3. Unauthorized users and users who have not completed authentication are
allowed to access resources only in the pre-authentication domain or
isolation domain.
Contents
1. Overview of NAC
4. NAC Configuration
5. Policy Association
9 Huawei Confidential
802.1X MAC Portal Multi-mode
Application scenario
802.1X authentication applies to office users who have high security
requirements.
10 Huawei Confidential
• The EAP packets transmitted between the client and access device are
encapsulated in EAPoL format and transmitted across the LAN.
• Users can determine the authentication mode between the access device and
authentication server based on the client support and network security
requirements.
▫ EAP termination mode: The access device terminates EAP packets and
encapsulates them into RADIUS packets. The authentication server then
uses the standard RADIUS protocol to implement authentication,
authorization, and accounting.
▫ EAP relay mode: The access device directly encapsulates the received EAP
packets into EAP over RADIUS (EAPoR) packets, and then transmits these
packets over a complex network to the authentication server.
• EAPoL defines EAP encapsulation on IEEE 802 (such as 802.3 and 802.11)
networks. EAPoL only transmits EAP packets between 802.1X clients and access
devices, and does not implement authentication.
802.1X client Access device Authentication server 802.1X client Access device Authentication server
• The access device directly encapsulates EAPoL packets • The access device extracts information from EAPoL
sent from the 802.1X client into RADIUS packets without packets, encapsulates the information into RADIUS
processing data in the EAPoL packets. packets, and sends the RADIUS packets to the
• This mode has high requirements on the authentication authentication server.
server. • This mode has high requirements on access devices.
11 Huawei Confidential
12 Huawei Confidential
5. After receiving the user name forwarded by the access device, the RADIUS
server searches the user name table in the local database for the
corresponding password, encrypts the password with a randomly
generated MD5 challenge, and sends a RADIUS Access-Challenge packet
containing the MD5 challenge to the access device.
6. The access device forwards the MD5 challenge received from the RADIUS
server to the client.
7. Upon receipt of the MD5 challenge, the client encrypts the password with
the MD5 challenge, generates an EAP-Response/MD5-Challenge packet,
and sends the packet to the access device.
10. After receiving the RADIUS Access-Accept packet, the access device sends a
packet indicating successful authentication (EAP-Success) to the client,
changes the port state to authorized, and allows the user to access the
network through the port.
• In EAP termination mode, the MD5 challenge for encrypting the user password is
randomly generated by the access device, instead of the authentication server in
EAP relay mode. Besides, in EAP termination mode, the access device
encapsulates the user name, password encrypted by the client, and MD5
challenge into standard RADIUS packets, and sends the packets to the
authentication server for authentication. In EAP relay mode, in contrast, the
access device is only responsible for encapsulating EAP packets into RADIUS
packets and transparently transmitting them to the authentication server.
802.1X MAC Portal Multi-mode
14 Huawei Confidential
802.1X MAC Portal Multi-mode
15 Huawei Confidential
802.1X MAC Portal Multi-mode
16 Huawei Confidential
802.1X MAC Portal Multi-mode
17 Huawei Confidential
• Dumb terminal: Compared with other terminals, dumb terminals have limited
functions and simple interaction modes. In this document, dumb terminals refer
to terminals whose authentication information such as user names and
passwords cannot be entered.
• By default, a MAC address without hyphens (-) is used as the user name and
password for MAC address authentication, for example, 0005e0112233.
• Passwords of MAC address authentication users can be processed using PAP or
CHAP. The following MAC address authentication process uses PAP as an
example:
1. When a terminal accesses the network, the access device detects and
learns the MAC address of the terminal, triggering MAC address
authentication.
2. The access device generates a random value (MD5 challenge), arranges
the user MAC address, password, and random value in sequence, encrypts
them using the MD5 algorithm, encapsulates the encryption results into a
RADIUS authentication request packet, and sends the packet to the
RADIUS server.
3. The RADIUS server arranges the user MAC address, password saved in the
local database, and received random value in sequence, and uses the
random value to encrypt them using the MD5 algorithm. If the encrypted
password is the same as that received from the access device, the RADIUS
server sends an authentication accept packet to the access device,
indicating that MAC address authentication is successful and the terminal
is allowed to access the network.
• Different from PAP, CHAP arranges CHAP ID,the user MAC address, and
random value in sequence, encrypts them using the MD5 algorithm.
802.1X MAC Portal Multi-mode
3. Configure the type of packets that can trigger MAC address authentication.
18 Huawei Confidential
802.1X MAC Portal Multi-mode
19 Huawei Confidential
802.1X MAC Portal Multi-mode
Networking mode
The authentication client, access device, Portal server, and authentication
server are deployed.
Application scenario
20 Huawei Confidential
• Portal server: a server system that receives authentication requests from clients,
provides Portal services and authentication pages, and exchanges client
authentication information with access devices.
6. Send a Portal
authentication request.
Portal authentication protocols
7. Perform authentication using either protocol. • The Portal protocol is used between the Portal server
Portal-based Portal and access device.
authentication
• The HTTP/HTTPS protocol is used between the client and
HTTP/HTTPS-based Portal authentication access device.
22 Huawei Confidential
5. The Portal server returns the Portal authentication page to the client.
6. The user enters the user name and password on the Portal authentication
page. The client then sends a Portal authentication request to the Portal
server.
7. The parameters such as the user name and password are transmitted
according to the protocol interaction process defined by different
authentication protocols.
802.1X MAC Portal Multi-mode
6. Send a Portal
authentication request. Authentication protocol: Portal
Portal-based Portal • The Portal protocol is used between the Portal server and
authentication access device for transmitting parameters such as the
7. Send a Portal user name and password. Generally, the Portal protocol is
challenge request. recommended.
8. Return a Portal • This protocol has the following features:
challenge response.
▫ Adopts the client/server model and runs based on UDP.
9. Send a Portal
authentication ▫ Supports CHAP authentication (more secure) and PAP
request. 10. Exchange RADIUS authentication.
authentication and ▫ Uses packets with attribute information such as the
11. Send the Portal accounting information.
user name, password, and MAC address encapsulated
authentication result. in TLV format.
12. Notify the user of the
authentication result.
13. Acknowledge the
authentication result.
24 Huawei Confidential
8. The access device sends a Portal challenge response packet to the Portal
server.
9. The Portal server encapsulates the entered user name and password into a
Portal authentication request packet and sends the packet to the access
device.
10. The access device and RADIUS server exchange user information to
authenticate the user, including:
▪ The access device encapsulates the entered user name and password
into a RADIUS authentication request packet and sends the packet to
the RADIUS server.
▪ The RADIUS server authenticates the user name and password. If
authentication succeeds, the RADIUS server sends an authentication
accept packet to the access device. If authentication fails, the RADIUS
server sends an authentication reject packet to the access device. The
authentication accept packet also contains user authorization
information because RADIUS authorization is combined with
authentication.
▪ The access device permits or denies the user access according to the
authentication result. If the user access is permitted, the access device
sends an accounting start request packet to the RADIUS server.
11. The access device sends the Portal authentication result to the Portal
server and adds the user to the local online user list.
12. The Portal server sends the Portal authentication result to the client to
inform the client of successful authentication and adds the user to the
local online user list.
13. The Portal server sends an authentication acknowledgment packet to the
access device.
• Note: If the built-in Portal server function of an access device is used for Portal
authentication, only the Portal protocol is supported.
802.1X MAC Portal Multi-mode
26 Huawei Confidential
• HTTPS is a secure HTTP and also known as HyperText Transfer Protocol over
Transport Layer Security (HTTP over TLS) or HyperText Transfer Protocol over
Secure Socket Layer (HTTP over SSL). HTTPS uses HTTP for communication and
SSL/TLS for data encryption.
• A URL is a concise representation of the location and access method of a
resource that can be obtained from the Internet. It is the address of a standard
resource on the Internet. Each file on the Internet has a unique URL. The URL
contains information about the location of the file and how a browser should
process the file.
• When HTTP/HTTPS-based Portal authentication is used, the authentication
process is as follows:
1. The Portal server instructs the client to send a Portal authentication
request to the access device.
2. The client sends a Portal authentication request to the access device.
3. After receiving the Portal authentication request, the access device parses
the packet according to parameter names to obtain parameters such as
the user name and password, and then sends the obtained user name and
password to the RADIUS server for authentication. The process is similar to
the Portal-based Portal authentication.
4. The access device returns the Portal authentication result to the client and
adds the user to the local online user list.
• As shown in the figure, an HTTP request is sent in Get mode:
http://Portal.example.com/login?userName=test&password=Huawei@123. You
can see that the user name and password are in plain text and are separated
from the URL by a question mark (?).
802.1X MAC Portal Multi-mode
2. Create a Portal server template and enter the Portal server template view.
27 Huawei Confidential
802.1X MAC Portal Multi-mode
5. Configure parameters for the Portal server when the HTTP/HTTPS protocol is used for authentication.
28 Huawei Confidential
802.1X MAC Portal Multi-mode
29 Huawei Confidential
802.1X MAC Portal Multi-mode
30 Huawei Confidential
802.1X MAC Portal Multi-mode
Terminals Access device Authentication server • Dumb terminals such as printers and fax machines
do not support 802.1X authentication. When both
PCs and dumb terminals are connected to an
1. Send traffic.
interface of an access device, you can configure
2. Trigger 802.1X MAC address bypass authentication to allow the
3. Perform 802.1X authentication.
authentication. dumb terminals to access the network using MAC
address authentication.
802.1X authentication times out, and MAC • MAC address bypass authentication takes a longer
address authentication is performed.
period of time than MAC address authentication
4. Perform MAC address because it has an 802.1X authentication stage
authentication.
additionally.
31 Huawei Confidential
802.1X MAC Portal Multi-mode
32 Huawei Confidential
1. Overview of NAC
4. NAC Configuration
5. Policy Association
33 Huawei Confidential
User Authorization User Logout
34 Huawei Confidential
• When the RADIUS server is used, the authentication accept packet also contains
user authorization information because RADIUS authorization is combined with
authentication.
• The RADIUS server can assign an authorized ACL to a user in either of the
following modes:
▫ Static ACL assignment: The RADIUS server uses the standard RADIUS
attribute Filter-Id to assign an ACL ID to the user. In this mode, the ACL
and corresponding rules are configured on the access device in advance.
▫ Dynamic ACL assignment: The RADIUS server uses the Huawei extended
RADIUS attribute HW-Data-Filter to assign an ACL ID and corresponding
rules to the user. In this mode, the ACL ID and ACL rules are configured on
the RADIUS server.
• The RADIUS server assigns an authorized UCL group to a user in either of the
following modes:
▫ Assigns the UCL group name through the standard RADIUS attribute Filter-
Id.
▫ Assigns the UCL group ID through the Huawei extended RADIUS attribute
HW-UCL-Group.
▫ You must configure the UCL group and corresponding network access
policies on the access device in advance, regardless of which UCL group
authorization mode is used.
• RADIUS is a fully extensible protocol. The No. 26 attribute (Vendor-Specific)
defined in RFC 2865 can be used to extend RADIUS to implement the functions
not supported by standard RADIUS attributes. For details about Huawei extended
RADIUS attributes, see the product documentation.
• For more information, see the Free Mobility course.
User Authorization User Logout
Users are allowed to access 192.168.1.1 to download Users are allowed to access 192.168.1.1 to update the
client software before being authenticated virus signature database even when authentication fails.
36 Huawei Confidential
User Logout
⚫ When users go offline but the access device, RADIUS server, and Portal server do not detect the user logout events,
the following problems may occur:
The RADIUS server still performs accounting for the users, causing incorrect accounting.
Unauthorized users may spoof IP addresses and MAC addresses of authorized users to access the network.
If there are many offline users, these users are still counted as access users of the device. As a result, other users may fail to
access the network.
⚫ The access device needs to detect user logout immediately, delete the user entry, and request the RADIUS server to
stop accounting.
⚫ User logout may occur in the following situations:
A client logs out proactively.
An access device controls user logout.
The server forces a user to go offline.
37 Huawei Confidential
• Note:
▫ MAC address authentication supports only user logout control by the access
device and server.
1. Overview of NAC
4. NAC Configuration
5. Policy Association
38 Huawei Confidential
User Access Authentication Configuration Roadmap
1 Configure an access profile.
2 Configure an authentication profile.
Bind the access
802.1X access profile (dot1x-access-profile) profile to an
authentication Authentication mode (including
profile. the access profile)
MAC access profile (mac-access-profile) Apply the
User authorization 3 authentication profile
… to enable NAC.
Portal access profile (portal-access-profile)
39 Huawei Confidential
40 Huawei Confidential
Authentication Profile Configuration (2)
3. Enable MAC address bypass authentication.
• When a forcible domain is configured, the device authenticates users in the forcible domain, regardless of whether the user names contain domain
names.
41 Huawei Confidential
Extended Function: Configuring Static Users
⚫ During network deployment, static IP addresses are assigned to dumb terminals such as printers, which
can be configured as static users for flexible authentication.
1. Configure parameters such as the IP address range, domain name, connected interface, and VLAN for a static user.
[Huawei] static-user start-ip-address [ end-ip-address ] [ domain-name domain-name | interface interface-type interface-
number | mac-address mac-address | vlan vlan-id ] *
2. Configure parameters such as the user name and password of the static user.
[Huawei] static-user username macaddress format { with-hyphen [ normal ] [ colon ] | without-hyphen } [ uppercase ] [
password-with-macaddress ]
⚫ After a static user is configured, you can enable 802.1X authentication, MAC address authentication, or
Portal authentication on the interface connected to the user. Then, the device uses static user
information such as the user IP address as the user name for authentication.
42 Huawei Confidential
• After a static user is configured, the device preferentially uses the user name and
password of the static user to authenticate the user when detecting that the user
information matches the parameters such as the IP address range and domain
name configured for the static user. If the authentication fails, the device
performs 802.1X, MAC address, or Portal authentication on the user.
• You can run the static-user username macaddress format command to specify
the MAC address of a terminal as the user name and password for
authentication, as well as the user name format. This command has a higher
priority than the static-user username format-include and static-user
password cipher password commands.
• The static-user username format-include and static-user password commands
are used to configure the user name and password of a static user respectively.
• By default (the S5731 is used as an example):
2. Apply the configured authentication profile. The following uses GE0/0/1 as an example.
43 Huawei Confidential
Configuration Example: Networking Requirements and
Authentication Planning
Authentication server
192.168.100.100 Networking requirements
Campus
egress To enhance network security, an enterprise requires that all
terminals (such as PCs, printers, and IP phones) be authenticated
before accessing the network.
The enterprise network has the following characteristics:
SW1 Intranet
• Access switches do not support 802.1X authentication.
• The enterprise network is small in scale and does not have any
branches.
Intranet server cluster • The enterprise has no more than 1000 employees. A maximum
GE0/0/3 192.168.101.0/24 of 2000 terminals, including guest terminals, access the
network every day.
SW2 • Dumb terminals, such as IP phones and printers, are connected
to the enterprise network.
GE0/0/1 GE0/0/2
44 Huawei Confidential
Configuration Example: Data Plan
Item Data
RADIUS server IP address: 192.168.100.100
45 Huawei Confidential
Configuration Example: Procedure (1)
Authentication server 1. Enable network connectivity.
192.168.100.100
Campus 2. Configure transparent transmission of 802.1X packets. SW3 is
egress used as an example.
[SW3] l2protocol-tunnel user-defined-protocol 802.1X protocol-mac 0180-
c200-0003 group-mac 0100-0000-0002
SW1 Intranet [SW3] interface gigabitethernet 0/0/1
[SW3-GigabitEthernet0/0/1] l2protocol-tunnel user-defined-protocol 802.1X
enable
[SW3-GigabitEthernet0/0/1] bpdu enable
Intranet server cluster
[SW3-GigabitEthernet0/0/1] quit
GE0/0/3 192.168.101.0/24 [SW3] interface gigabitethernet 0/0/2
[SW3-GigabitEthernet0/0/2] l2protocol-tunnel user-defined-protocol 802.1X
SW2 enable
[SW3-GigabitEthernet0/0/2] bpdu enable
GE0/0/1 GE0/0/2
[SW3-GigabitEthernet0/0/2] quit
[SW3] interface gigabitethernet 0/0/3
GE0/0/1 GE0/0/1 [SW3-GigabitEthernet0/0/3] l2protocol-tunnel user-defined-protocol 802.1X
enable
SW3 SW4 [SW3-GigabitEthernet0/0/3] bpdu enable
GE0/0/2 GE0/0/3 GE0/0/2 GE0/0/3 [SW3-GigabitEthernet0/0/3] quit
46 Huawei Confidential
• In this example, SW3 and SW4 are deployed between the authentication switch
SW2 and users. Therefore, transparent transmission of 802.1X packets must be
configured on SW3 and SW4 so that SW2 can perform 802.1X authentication on
users.
Configuration Example: Procedure (2)
Authentication server 3. Configure a RADIUS server template.
192.168.100.100 [SW2] radius-server template rd1
Campus [SW2-radius-rd1] radius-server authentication 192.168.100.100 1812
egress [SW2-radius-rd1] radius-server accounting 192.168.100.100 1813
[SW2-radius-rd1] radius-server shared-key cipher Huawei@123
[SW2-radius-rd1] quit
SW1 Intranet
4. Configure an AAA authentication scheme, accounting
scheme, and an authentication domain.
Intranet server cluster [SW2] aaa
GE0/0/3 192.168.101.0/24 [SW2-aaa] authentication-scheme a1
[SW2-aaa-authen-a1] authentication-mode radius
SW2 [SW2-aaa-authen-a1] quit
[SW2-aaa] accounting-scheme a2
GE0/0/1 GE0/0/2 [SW2-aaa-accounting-a2] accounting-mode radius
[SW2-aaa-accounting-a2] quit
GE0/0/1 GE0/0/1 [SW2-aaa] domain nac
[SW2-aaa-domain-nac] authentication-scheme a1
SW3 SW4 [SW2-aaa-domain-nac] accounting-scheme a1
[SW2-aaa-domain-nac] radius-server rd1
GE0/0/2 GE0/0/3 GE0/0/2 GE0/0/3 [SW2-aaa-domain-nac] quit
[SW2-aaa] quit
47 Huawei Confidential
Configuration Example: Procedure (3)
Authentication server
192.168.100.100 5. Configure an 802.1X access profile.
Campus
egress [SW2] dot1x-access-profile name d1
[SW2-dot1x-access-profile-d1] dot1x authentication-method eap
[SW2-dot1x-access-profile-d1] quit
SW1 Intranet
48 Huawei Confidential
Configuration Example: Procedure (4)
Authentication server
192.168.100.100 8. Apply the authentication profile to interfaces.
Campus
egress [SW2] interface gigabitethernet 0/0/1
[SW2-Gigabitethernet0/0/1] authentication-profile p1
[SW2-Gigabitethernet0/0/1] quit
[SW2] interface gigabitethernet 0/0/2
SW1 Intranet [SW2-Gigabitethernet0/0/2] authentication-profile p1
[SW2-Gigabitethernet0/0/2] quit
SW3 SW4
GE0/0/2 GE0/0/3 GE0/0/2 GE0/0/3
10. Create user accounts on the RADIUS server and configure
corresponding rights.
49 Huawei Confidential
Contents
1. Overview of NAC
4. NAC Configuration
5. Policy Association
50 Huawei Confidential
Technical Background (1)
⚫ Deploying authentication at the access layer helps implement fine-grained permission management
and high network security. As the network scale expands, some problems emerge.
Access layer
Authentication points
51 Huawei Confidential
Technical Background (2)
⚫ One solution is to move user authentication points from the access layer to the aggregation or core
layer. In this way, authentication information on the entire network is centralized, the number of
authentication points is greatly reduced, and the configuration and maintenance workload is reduced.
Authentication points
52 Huawei Confidential
• Devices at the access layer must transparently transmit BPDUs. Otherwise, 802.1X
authentication fails. The reason is as follows:
▫ EAP packets transmitted in 802.1X authentication are BPDUs. By default,
Huawei switches do not perform Layer 2 forwarding for BPDUs. If a Layer 2
switch exists between the 802.1X-enabled device and users, Layer 2
transparent transmission must be enabled on the Layer 2 switch. Otherwise,
the EAP packets sent by users cannot reach the 802.1X-enabled device,
causing authentication failures.
Overview of Policy Association
⚫ Policy association provides a solution to contradiction between policy strengths and complexity on
large campus networks. In the solution, user access policies are centrally managed on the gateway and
executed by the gateway and access devices. Roles in the policy association solution
• Terminals: provide human-machine interfaces for user
authentication and resource access. The terminals include
PCs, laptops, tablets, and dumb terminals.
• Authentication access device: an authentication execution
Authentication point that executes network access policies for users.
control devices
• Authentication control device: an authentication control
point that authenticates users and controls their access
Authentication policies.
access devices
• A Control And Provisioning of Wireless Access Points
(CAPWAP) tunnel is established between an authentication
control point and an authentication execution point.
• Authentication control devices and authentication access
Terminals
devices use CAPWAP tunnels to associate users, transmit
Authentication Authentication messages, deliver user authorization policies, and
CAPWAP tunnel synchronize user information.
control point execution point
53 Huawei Confidential
54 Huawei Confidential
2. When detecting the access of a new user, the access device creates a user
association entry to record basic information such as the user and access
interface.
3. The access device sends a user association request to the control device.
4. The control device creates a user association entry to save the mapping
between the user and access device, and returns a user association
response to notify the access device of successful association.
6. The control device deletes the user association entry. When the
authentication succeeds, the control device generates a complete user
entry, and sends a user authorization request to the access device, and
delivers the network access policy of the user to the access device.
7. The access device updates the user association entry, grants the specified
network access rights to the user, and sends a user authorization response
to the control device.
8. The user accesses the specified network resources.
Comparison Between Policy Association and Authentication
Transmit the user
credential to the
2 authentication module.
Authentication
Interface
Authentication
module
1 Send the user 3 Forward the user
User credential. credential to the Authentication
authentication server. server
Authentication
point
Policy execution interface
Interface
Authentication
module 4 Forward the user
1 Send the user
User credential. credential to the Authentication
authentication server
Authentication Authentication server.
execution point control point
55 Huawei Confidential
• Authentication:
▫ The user exchanges information with the authentication point. The
authentication point directly exchanges authentication information with the
authentication server. When the authentication succeeds, the authentication
server delivers the user rights to the authentication point. The interface on
the authentication point then executes the corresponding user policy.
• Policy association:
56 Huawei Confidential
Policy Association Configuration: Configuring an Access
Device
1. Establish a CAPWAP tunnel.
57 Huawei Confidential
[Huawei] as-auth
The access device authentication view is displayed.
58 Huawei Confidential
▫ By default, access devices can connect to a control device only after passing
authentication. The control device authenticates access devices using a
blacklist and whitelist. Blacklisted access devices cannot connect to the
control device, whereas whitelisted access devices can. The control device
does not authenticate access devices out of the blacklist and whitelist, and
you need to manually specify allowed access devices. You can also
configure none authentication for access devices. As a result of this
configuration, an access device can connect to the control device regardless
of whether the access device is in the blacklist or whitelist.
▫ For details about how to configure this function, see the product
documentation.
Policy Association Configuration: Configuring a Control
Device (2)
4. Configure user authorization information to be delivered to the access device and control device.
59 Huawei Confidential
Configuration Example: Networking Requirements and
Authentication Planning
RADIUS server User VLAN: VLAN 10 Networking requirements
192.168.4.30 Management VLAN: VLAN 20
Large campus networks have many access devices, so user access
policy deployment is time-consuming and the policies are difficult
Intranet to modify.
The customer requires that NAC authentication and user access
VLAN 30
policies be configured on the gateway and the access policies be
GE0/0/3 executed on access devices to simplify device deployment at the
access layer.
SW1 (gateway)
GE0/0/1 Authentication planning
VLAN 10, VLAN 20 • Configure the gateway SW1 as the control device and SW2
as the access device.
GE0/0/1
• Configure the control device to authenticate users and the
SW2 (access) access device to execute user access policies.
GE0/0/2 GE0/0/3 • Configure VLAN 10 as the user VLAN and VLAN 20 as the
VLAN 10
management VLAN of the CAPWAP tunnel. In this example,
802.1X authentication is used.
60 Huawei Confidential
Configuration Example: Data Plan
Item Data
RADIUS server IP address: 192.168.4.30
• VLAN to which the uplink interface GE0/0/3 belongs: VLAN 30
Gateway switch (control device, SW1) • VLAN to which downlink interface GE0/0/1 belongs: VLAN 10 (user VLAN),
VLAN 20 (management VLAN)
Access switch (SW2) VLAN to which users belong: VLAN 10
• Authentication server IP address: 192.168.4.30
• Authentication server port number: 1812
RADIUS scheme
• Shared key of the RADIUS server: Huawei@123
• Authentication domain: nac
ACL number of the post-
3001
authentication domain
Access permission Prohibit access to resources on the 192.168.5.0/24 network segment.
61 Huawei Confidential
Configuration Example: Procedure (1)
RADIUS Server
192.168.4.30 User VLAN: VLAN 10 1. Create VLANs and configure the allowed VLANs
Management VLAN: VLAN 20
on interfaces.
2. On the control device, configure an interface
Intranet address pool on VLANIF 10 to assign IP addresses
to users.
VLAN 30 [SW1] dhcp enable
GE0/0/3 [SW1] interface vlanif 10
[SW1-Vlanif10] ip address 192.168.1.1 255.255.255.0
SW1 (gateway) [SW1-Vlanif10] dhcp select interface
[SW1-Vlanif10] quit
GE0/0/1
VLAN 10, VLAN 20
GE0/0/1
SW2 (access)
GE0/0/2 GE0/0/3
VLAN 10
62 Huawei Confidential
Configuration Example: Procedure (2)
RADIUS Server
192.168.4.30 User VLAN: VLAN 10 3. Configure the control device and access device to
Management VLAN: VLAN 20
establish a CAPWAP tunnel.
[SW1] interface vlanif 20
[SW1-Vlanif20] ip address 192.168.2.1 255.255.255.0
Intranet
[SW1-Vlanif20] dhcp select interface
[SW1-Vlanif20] dhcp server option 43 ip-address 192.168.2.1
VLAN 30 [SW1-Vlanif20] quit
[SW1] capwap source interface vlanif 20
GE0/0/3 [SW1] as-auth
[SW1-as-auth] auth-mode none
SW1 (gateway)
[SW1-as-auth] quit
GE0/0/1
VLAN 10, VLAN 20 [SW2] interface vlanif 20
[SW2-Vlanif20] ip address dhcp-alloc
GE0/0/1 [SW2-Vlanif20] quit
[SW2] as access interface vlanif 20
SW2 (access)
GE0/0/2 GE0/0/3
VLAN 10
63 Huawei Confidential
Configuration Example: Procedure (3)
RADIUS Server
192.168.4.30 User VLAN: VLAN 10 4. On the control device, create and configure a
Management VLAN: VLAN 20
RADIUS server template, an AAA authentication
scheme, and an authentication domain.
Intranet [SW1] radius-server template rd1
[SW1-radius-rd1] radius-server authentication 192.168.4.30 1812
[SW1-radius-rd1] radius-server shared-key cipher Huawei@123
VLAN 30 [SW1-radius-rd1] quit
GE0/0/3
[SW1] aaa
SW1 (gateway) [SW1-aaa] authentication-scheme abc
[SW1-aaa-authen-abc] authentication-mode radius
GE0/0/1 [SW1-aaa-authen-abc] quit
VLAN 10, VLAN 20 [SW1] domain nac
[SW1-aaa-domain-isp1] authentication-scheme abc
GE0/0/1
[SW1-aaa-domain-isp1] radius-server rd1
SW2 (access) [SW1-aaa-domain-isp1] quit
[SW1-aaa] quit
GE0/0/2 GE0/0/3
VLAN 10 [SW1] domain nac
# Configure a global default domain named nac.
64 Huawei Confidential
Configuration Example: Procedure (4)
RADIUS Server
192.168.4.30 User VLAN: VLAN 10 5. Configure the control device as the control point
Management VLAN: VLAN 20
and the access device as the access point.
[SW1] interface gigabitethernet 0/0/1
[SW1-GigabitEthernet0/0/1] authentication control-point
Intranet [SW1-GigabitEthernet0/0/1] quit
GE0/0/1
SW2 (access)
GE0/0/2 GE0/0/3
VLAN 10
65 Huawei Confidential
Configuration Example: Procedure (5)
RADIUS Server
192.168.4.30 User VLAN: VLAN 10 6. Configure the control device to deliver ACL-based
Management VLAN: VLAN 20
authorization information to the access device,
and bind the AAA service scheme asd to the
Intranet authentication domain nac.
[SW1] aaa
VLAN 30 [SW1-aaa] service-scheme asd
[SW1-aaa-service-asd] remote-authorize acl
GE0/0/3 [SW1-aaa-service-asd] quit
[SW1-aaa] domain nac
SW1 (gateway) [SW1-aaa-domain-nac] service-scheme asd
GE0/0/1 [SW1-aaa-domain-nac] quit
[SW1-aaa] quit
VLAN 10, VLAN 20
GE0/0/1
SW2 (access)
GE0/0/2 GE0/0/3
VLAN 10
66 Huawei Confidential
Configuration Example: Procedure (6)
RADIUS Server
192.168.4.30 User VLAN: VLAN 10 7. Configure ACLs and ACL rules for authorization on the
Management VLAN: VLAN 20 control device and access device.
[SW1] acl 3001
[SW1-acl-adv-3001] rule deny ip destination 192.168.5.0 0.0.0.255
Intranet [SW1-acl-adv-3001] quit
SW1 (gateway)
8. Configure 802.1X authentication on the control device
GE0/0/1 and access device, and configure an authentication-free
rule on the control device to allow packets from the
VLAN 10, VLAN 20 management VLAN of the CAPWAP tunnel to pass
through. (The 802.1X authentication configuration is not
GE0/0/1
mentioned here.)
SW2 (access) [SW1] free-rule-template name default_free_rule
GE0/0/2 GE0/0/3 [SW1-free-rule-default_free_rule] free-rule 1 source vlan 20
VLAN 10 [SW1-free-rule-default_free_rule] quit
67 Huawei Confidential
Quiz
1. (Single-answer question) When PCs and dumb terminals such as printers and fax
machines are connected to an interface of an access device, which authentication
mode can be used to ensure network security and allow dumb terminals to
access the network? ( )
A. MAC address authentication
B. 802.1X authentication
C. Portal authentication
68 Huawei Confidential
1. D
Quiz
B. IP address
C. ACL
D. UCL group
69 Huawei Confidential
2. ACD
Summary
⚫ User access control is the first line of defense to protect a network, where you can
deploy user authentication, such as MAC address authentication, 802.1X
authentication, and Portal authentication, to ensure security.
⚫ The implementation modes and application scenarios of these technologies are
different. You need to select and deploy them based on network characteristics
and requirements.
⚫ iMaster NCE-Campus can be used together with network products to provide an
advanced NAC solution that implements powerful functions such as terminal type
identification and policy automation.
70 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
⚫ On a traditional campus network, users' network access rights are controlled using the Network
Admission Control (NAC) technology, in conjunction with VLAN and ACL technologies. However, this
solution has many defects. For example, the association between ACLs and users takes effect only on
authentication points, resulting in poor flexibility; VLANs and ACLs need to be configured on a large
number of switches that function as authentication points in advance, causing a heavy deployment and
maintenance workload.
⚫ Mobile working requires that these defects be removed and employees access the network from any
place, any VLAN, or any IP network segment with controlled network access rights. To implement these,
the free mobility solution is introduced.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
3 Huawei Confidential
Mobility Requirements of Users on the Network
Scenario description
Solution challenges
1. How to ensure that users can access the campus network from any place?
2. How to ensure the security of user access to the campus network?
3. Can user information be managed in a centralized manner?
Move
4. Are the network configuration and configuration delivery simple enough?
5. Is it easy to adjust policies?
User A User A
4 Huawei Confidential
5 Huawei Confidential
• Mobile working requires that these defects be removed and employees obtain
consistent network access rights when accessing the network from any place, any
VLAN, or any IP network segment. In addition, administrators want to have a
simple policy control approach that is decoupled from network topologies and IP
addresses.
Overview of Free Mobility
⚫ The free mobility solution allows a user to obtain the same network access policy regardless of the
user's location and IP address on a campus network. iMaster NCE-Campus and switches work together
to enable network access rights to automatically move with users, improving mobile working
experience. Free mobility resolves the problems faced by traditional campus
networks in three aspects
1. Decoupling of service policies from IP addresses.
2. Centralized management of user information.
3. Centralized policy management.
6 Huawei Confidential
7 Huawei Confidential
• Free mobility introduces the concept of security group. Security groups are
related only to user identities and are completely decoupled from network
information such as user VLANs and IP addresses.
A large number of rules such as VLANs and ACLs need to be Based on security groups (UCL groups), only several user
Simplified configuration planned based on IP addresses during network design. These groups and inter-group policies need to be defined, greatly
and management rules are complex to configure and difficult to understand, simplifying planning and configuration. In addition, the policy
causing inconvenience in subsequent maintenance. control matrix is easy to understand and maintain.
8 Huawei Confidential
Basic Concepts in Free Mobility: Authentication and Policy
Enforcement
Policy enforcement
Core Core
Authentication point Policy enforcement point
Policy control center
Authentication Authentication
Access Access
9 Huawei Confidential
• Security group members can be network terminals such as PCs • Unknown (default): Users or resources that are not
and smartphones. They can be added by an administrator or dynamically or statically added to any security group belong
dynamically added upon successful authentication. to this group by default.
• Any (default): All users and resources belong to this group. It
▫ Static security group: It is a security group defined by
is typically used to configure default rules, and can be
statically binding IP addresses.
configured as the destination group only.
▫ Dynamic security group: Users who meet specified • Bypass security group (user-defined): When the IP-security
conditions are authorized a specific security group. group channel between the policy enforcement point and
• A dynamic security group has a higher priority than a static iMaster NCE-Campus is disconnected, unknown traffic is
controlled based on the policy configured for the bypass
security group. For example, a user with IP address 1 is
security group. Only one bypass security group can be
statically bound to security group 1, and the user is dynamically
configured, and members must be statically added to this
added to security group 2 upon successful RADIUS
group.
authentication. Eventually, the user belongs to security group 2.
10 Huawei Confidential
• Security group:
▫ An administrator can define security groups on iMaster NCE-Campus to
describe and organize the sources or destinations of network traffic, and
then configure policies to control mutual access between the security
groups.
▫ An administrator can add network objects that have the same access
requirements to the same security group, and configure a policy for this
security group. In this way, these network objects obtain the same
permissions as configured for the security group. For example, an
administrator can define the following security groups: R&D group (a
collection of individual hosts), printer group (a collection of printers), and
database server group (a collection of server IP addresses and ports).
Compared with the solution in which access control policies are deployed
for each user, the security group–based access control solution greatly
reduces the administrator's workload.
Basic Concepts in Free Mobility: Security Group (2)
Group Type Group Name Group ID Dynamic security group
Dynamic Sales 1
Dynamic Guest 2 • The IP addresses of users in dynamic security groups are not
Static Server 3 fixed, and are dynamically bound to security groups after the
users are authenticated. After users log out, the bindings are
dynamically canceled. These mappings remain valid only when
Dynamic security groups Static security groups
users are online.
• Network devices can obtain such mappings from iMaster NCE-
Campus or when they function as authentication points.
Sales Guest Server
group group group
11 Huawei Confidential
12 Huawei Confidential
Basic Concepts in Free Mobility: Resource Group
Disadvantages of security groups
• Administrators can bind static IP addresses of servers to static security groups, and iMaster NCE-Campus
delivers these bindings to devices through NETCONF.
• However, such static security groups cannot distinguish different services that use the same IP addresses.
Resource group
is a way out
13 Huawei Confidential
Sales
Server
14 Huawei Confidential
• When multiple policies are configured to control access from a source security
group to multiple destination groups, an administrator needs to configure
priorities of the policies to determine the sequence in which policies are matched.
For example, if the destination groups are resource groups with overlapping IP
addresses, the administrator can set a high priority for a policy so that the policy
can be matched preferentially.
• For unknown users:
▫ If a policy enforcement device does not find any security group
corresponding to an IP address, it considers that the IP address belongs to
the default security group named unknown, and enforces the matching
security group policy (default policy: permit).
• The following uses the traffic from the sales group to the server group as an
example to describe policy matching in the policy control matrix:
▫ The device (policy enforcement point) first searches for the policy of
controlling access from the sales group to the server group. If no such inter-
group policy is found in the policy control matrix, the device continues
matching policies.
▫ The device then searches for the policy of controlling access from the sales
group to the any group. If no such inter-group policy is found in the policy
control matrix, the device continues matching policies.
▫ Finally, the device matches traffic with the policy of controlling access from
the any group to the any group. By default, this policy exists in the policy
control matrix and defines the permit action. That is, traffic is permitted by
default if no policy is matched.
Basic Concepts in Free Mobility: IP-Security Group Entry
Subscription
IP-security group entry subscription IP-security group entry
IP Security Group
• If the authentication point and policy enforcement point are 192.168.1.1 Group1
located on different devices, the IP-security group entries of
authenticated users need to be pushed to the specified policy Core 192.168.2.1 Group2
enforcement point. Authentication Point
• An administrator can configure subscription on iMaster NCE-
Campus to specify the entries of which network segments or 2. IP-security
group entry push Policy control center
security groups to be pushed to which policy enforcement points. 1. Identity
authentication
15 Huawei Confidential
• A policy enforcement point can obtain IP-security group entries in either of the
following ways:
▫ The policy enforcement point obtains IP-security group entries during user
authentication when it is located on the same device as the authentication
point.
16 Huawei Confidential
Working Mechanism of Free Mobility: Overview
Authentication 1. Create users and security groups.
User point & policy
terminal enforcement point ▫ An administrator defines security groups on iMaster NCE-Campus.
▫ The administrator creates user accounts on iMaster NCE-Campus, and
Intranet configures authorization rules and results to bind the users to security
groups.
17 Huawei Confidential
19 Huawei Confidential
Working Mechanism of Free Mobility (2)
Group2
Server
User1 User2
192.168.1.1/24 192.168.2.1/24
20 Huawei Confidential
Group1
Core
Group2
Server
User1 User2
192.168.1.1/24 192.168.2.1/24
21 Huawei Confidential
Working Mechanism of Free Mobility (4)
22 Huawei Confidential
Working Mechanism of Free Mobility (5)
Online user entry 4
Security
MAC IP
Group
MAC-X 192.168.1.1 Group1 1. User1 attempts to access the network. The core switch
Firewall
functioning as the authentication point exchanges user
MAC-Y 192.168.2.1 Group2
authentication information with iMaster NCE-Campus.
Policy (permission control):
2. iMaster NCE-Campus checks the login information of User1
Source Destination
Action Core and associates User1 with the corresponding security group
Group Group
(Group1) in the authorization policy.
Group1 Group2 Deny
3. After User1 is authenticated, iMaster NCE-Campus associates
Group1 Server Permit the user IP address with Group1 and records the association in
Discard
... ... ... an IP-security group entry. In addition, the iMaster NCE-
Campus notifies the authentication point of the security group
5
to which the user belongs, and the core device at the
IP packet
authentication point generates an online user entry.
Source: 192.168.1.1
Destination: 192.168.2.1 4. The preceding process also applies to User2.
5. After receiving a service packet from a terminal, the core
User1 User2 switch that also functions as the policy enforcement point
192.168.1.1/24 192.168.2.1/24 identifies the security group that matches the source and
MAC-X MAC-Y destination IP addresses of the packet and enforces the
Authentication Point corresponding inter-group policy.
Policy enforcement point
23 Huawei Confidential
Contents
24 Huawei Confidential
Security Group Design
Dynamic security group (users) Static security group (network resources)
Users and terminals that can access the network only after being Terminals or network segments that use fixed IP addresses, such as
authenticated. servers and the Internet.
In most cases, dynamic security groups can be defined based on user Static security groups are defined based on service types provided by
identities, such as students and teachers in schools. In addition, network resources. For example, the school web server, the data
dynamic security groups can be customized based on 5W1H conditions. server for storing student information, and the exam resource server
can be divided into different static security groups.
The most important rule for defining a dynamic security group is to add users with the same network access
requirements to one security group.
25 Huawei Confidential
Permission Control Design
Define dynamic and static security groups for free mobility based on service requirements, and create a policy
control matrix based on the required network access rights.
26 Huawei Confidential
• A security group policy reflects whether two security groups can communicate
with each other. The administrator can configure policies to permit or deny
communication between every two security groups in a policy control matrix on
iMaster NCE-Campus. If no control policy is created for a source group and a
destination group, they can communicate with each other by default.
• When planning security group policies, pay attention to the direction of policies.
Generally, packets are transmitted in both directions between two terminals.
▫ For Huawei switches, traffic from switch A to switch B and traffic from
switch B to switch A match different policies. Whether traffic is permitted or
denied depends on the source and destination groups of the traffic. If the
permit action is configured for the A-to-B traffic and the deny action for
the B-to-A traffic, all packets sent from switch A to switch B are allowed to
pass through, but the packets sent from switch B to switch A are discarded,
regardless of which device initiates the request. If no matching policy is
found, a switch performs the default action — permit.
27 Huawei Confidential
Locations of Authentication Points and Policy Enforcement
Points
⚫ Typically, a user gateway functions as both the authentication point and policy enforcement point for
the following major reasons:
There are a large number of access switches on a network. Configuring the authentication function on each
access switch requires a heavy workload and leads to difficulties in management.
iMaster NCE-Campus needs to synchronize permission control policies to policy enforcement points. If access
switches act as both authentication points and policy enforcement points, there will be a great number of policy
enforcement points. This increases the workload and difficulties of device management on iMaster NCE-Campus
and prolongs the policy synchronization time.
⚫ To prevent users on a Layer 2 network connected to an upstream user gateway from communicating
with each other, configure Layer 2 isolation. In this way, communication traffic of the users must pass
through the user gateway.
28 Huawei Confidential
• If the authentication point and policy enforcement point are located on different
devices, the IP-security group entries of authenticated users need to be pushed to
the specified policy enforcement point. An administrator can configure
subscription on iMaster NCE-Campus to specify the entries of which network
segments or security groups to be pushed to which policy enforcement points.
Typical Free Mobility Solution
(Recommended) Core switch functioning as the user gateway,
authentication point, and policy enforcement point
Internet
• The core switch is used as the Layer 3 gateway and authentication
point for wired and wireless users, as well as the policy
enforcement point in the free mobility solution.
• As the policy enforcement point is deployed at the upper layer,
Core switch Intranet server
(user gateway) configure port isolation on access and aggregation switches to
prevent traffic from being directly transmitted through the access
or aggregation switches without passing through the core switch.
Aggregation switch • The policy enforcement points control mutual access between
users and access from users to network resources such as servers,
and are deployed on core switches.
Access switch
• When 802.1X authentication is used, configure transparent
transmission of 802.1X packets on the access and aggregation
Authentication point
switches if the authentication point is located on a core switch.
Policy enforcement point
29 Huawei Confidential
Quiz
1. (True or false) In the free mobility solution, a policy enforcement point must be
an authentication point and is typically deployed on a user gateway. ( )
A. True
B. False
B. False
30 Huawei Confidential
1. B
2. B
Summary
⚫ Free mobility transforms IP-based policies into security group–based policies, which
are easier to understand and decouple policies from IP addresses. This allows
network administrators to implement policy control between security groups
without considering the IP addresses of users.
⚫ Network objects of the same type and with the same permissions are added to one
security group. Members in a security group can be PCs, mobile phones, printers,
and servers. After network objects are divided into different security groups,
administrators can define security group policies to determine the network services
that each security group can use, including access rights and application control.
31 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Objectives
6. WLAN Design
9. O&M Design
3 Huawei Confidential
Large- and Medium-Sized Campus Networks
⚫ Different from the wide area network (WAN) and data center
network, a campus network typically refers to the internal
network of an enterprise or organization. A campus network is
built for more efficient running of key enterprise services.
⚫ In terms of network scale, campus networks can be classified
into large- and medium-sized campus networks as well as small-
and medium-sized campus networks. A large- or medium-sized
campus network typically has:
Over 2,000 end users
Over 100 network elements (NEs)
4 Huawei Confidential
Service Requirements and Challenges of Large- and
Medium-Sized Campus Networks
⚫ Enterprises' campus networks are the cornerstone of their digital transformation. Nowadays, mobile office, cloud
computing, SDN, Internet of Things (IoT), artificial intelligence (AI), and big data are gaining momentum. Driven by
this, new technologies and applications are constantly emerging and are making inroads to enterprise campus
networks, which poses many new challenges for the campus networks.
Converged network Automated network deployment User experience awareness
Requirements:
Requirements: Requirements:
Network deployment should be automated to
Diversified access terminals and services require Network O&M should become automated and
address the growing complexity in deployment
a converged campus network. intelligent, with insights into user experience
and policies due to the surge in applications and
Challenges: anytime, anywhere.
services.
• Wi-Fi and IoT services are independently Challenges:
Challenges:
planned, deployed, and managed, resulting in • Manual configuration is repetitive, complex, • Service faults cannot be detected in a timely
high network construction costs. and labor-intensive. manner.
• The network management and O&M • New service rollout requires configuring • Fault locating heavily relies on the O&M skills
workload is heavy. devices one by one, which is time-consuming and experience of professionals, so faults
and costly. cannot be quickly located.
• The workload of network policy deployment • The network cannot be self-optimized.
and adjustment is heavy.
5 Huawei Confidential
Huawei CloudCampus 3.0 Solution (CloudCampus Solution)
Rapid network provisioning, improving deployment efficiency
One-stop management
Analysis platform • Device plug-and-play: simplified device deployment, scenario-specific
Control guided configuration, template-based configuration
Management
• Simplified network deployment: network resource pooling, multi-
purpose network, automatic service provisioning
Design Deployment Policy
Fast service provisioning, improving user experience
• Free mobility: GUI-based policy configuration; access anytime anywhere,
Large- and medium- NETCONF/YANG Small- and medium- with consistent permission and experience during roaming
sized campus Campus sized campus • Intelligent terminal identification: anti-spoofing for terminal access,
interconnection with the accuracy of intelligent terminal identification reaching over 95%
• Intelligent HQoS: application-based traffic scheduling and shaping and
OA VN fine-grained bandwidth management ensure service experience of VIP
WAN/
users
Internet
R&D VN Quick intelligent O&M, improving network performance
• Real-time experience visualization: uses Telemetry for network
experience visualization at any moment, for any user, and in any area
Security Security Security • Precise fault analysis: proactively identifies typical network issues and
OA VN group 1 group 2 group 3 • Access policy provides suggestions; compares and analyzes real-time data to predict
• Bandwidth faults
Security Security • Priority • Intelligent network optimization: predictive optimization of wireless
R&D VN networks based on historical data, improving overall network performance
group 4 group 5
6 Huawei Confidential
CloudCampus Highlights: Simplified Deployment
Physical and virtual network automation User policy automation
• Automated deployment of a physical network: Devices can be pre- • Centering on users, services, and experience, policies can migrate with
configured for plug-and-play. users, ensuring a consistent service experience.
▫ iMaster NCE-Campus provides a GUI for automated deployment of ▫ The free mobility solution uses iMaster NCE-Campus to plan security
devices, as well as route orchestration and interworking configuration of groups and inter-group policies and automatically deliver policies to
underlay networks. network devices.
• Automated provisioning of virtual networks: Virtual networks can be ▫ When an authenticated user accesses the network using different
automatically created to achieve "one network for multiple purposes". terminals at different locations, iMaster NCE-Campus automatically
▫ With iMaster NCE-Campus, fabric networks can be deployed, and VXLAN identifies the user and delivers relevant user policies to the corresponding
tunnels can be automatically set up based on the BGP EVPN control policy enforcement device on the network. This achieves consistent and
assured user access experience. A user can have consistent policies and
plane, so as to achieve automated virtual network construction,
centralized service configuration, and automatic service provisioning. service experience, irrespective of the access location.
VXLAN VXLAN
Overlay (virtual
network layer)
OSPF
Move
Underlay (physical network layer) User A User A
7 Huawei Confidential
CloudCampus Highlights: Wired and Wireless Convergence
⚫ Huawei campus switches integrate the WLAN access controller (AC) functionality to implement wired
and wireless convergence, providing unified management and experience for wired and wireless users.
NM Area
Unified forwarding
Wired and wireless traffic is centrally processed
by the core switch before being forwarded.
Native AC
Unified authentication
The core switch functions as the unified
CAPWAP authentication point and Layer 3 gateway for
both wired and wireless users.
8 Huawei Confidential
9 Huawei Confidential
CloudCampus Highlights: LAN and WAN Convergence (1)
LAN management SD-WAN Integrated GUI, improving deployment
Site Access Route Intelligent
configuration authentication management traffic steering and O&M efficiency
Resource Integrated deployment, integrated policy,
Campus VXLAN Free mobility WAN VPN
management
integrated O&M
Site management
10 Huawei Confidential
• The CloudCampus Solution provides two technologies for campus egress interconnection: IPsec VPN and SD-WAN EVPN.
▫ IPsec VPN is a static VPN technology that creates a VPN tunnel by setting up an IPsec tunnel between sites. It diverts
traffic to a VPN tunnel based on the configured static network segments so that the sites can access each other through
the VPN tunnel.
▫ SD-WAN EVPN is a dynamic VPN technology that establishes tunnels between sites on demand and dynamically advertises
routes. EVPN creates VPN tunnels between sites by setting up GRE tunnels between them. It supports IPsec encryption on
the GRE tunnels, securing data transmission.
• Application experience optimization policies provided on the WAN side:
▫ Application identification, intelligent traffic steering, QoS, NAT policy, application optimization, etc.
11 Huawei Confidential
• Application identification:
▫ Precise identification of applications on a network is the prerequisite and
basis for network services such as intelligent traffic steering, QoS,
application optimization, and security. Service policies can be applied in
subsequent service processes only after applications are identified.
• NAT policy:
Huawei operates the public cloud and MSPs purchase software, such as the
Customers purchase and own software
Scenario customers do not need to purchase the controller and analyzer, for operational
entities, such as the controller and analyzer,
definition controller or analyzer software. Instead, purposes. The software can be deployed in
which can be deployed in their data centers
customers just purchase Huawei's cloud their data centers or on the public cloud
or on the public cloud platform.
managed network service. platform.
Software
Perpetual license + SnS SaaS mode TBL subscription mode
transaction mode
13 Huawei Confidential
• Perpetual license + SnS: The perpetual license is sold together with SnS services,
such as software patches, software upgrades (including new features of new
releases), and remote support. In the perpetual license + SnS mode, a customer
needs to pay SnS fee for a certain period of time, in addition to purchasing the
license upon the first purchase. If the customer does not renew the SnS annual
fee after it expires, the customer can only use functions provided in the license
for the current version and cannot use the service functions covered in the SnS
annual fee.
• Term Based License (TBL) mode: This mode differs from the perpetual license +
SnS mode in that the licenses purchased by customers have limited validity
periods. If a customer does not renew the subscription after the license expires,
the customer can no longer use the software product.
• SnS: refers to Subscription and Support. It consists of two parts: software support
and software subscription. The complete software charging mode consists of the
annual software SnS fee and software license fee.
• Note: This course uses the on-premise deployment as an example.
CloudCampus Solution Components: iMaster NCE-Campus
⚫ iMaster NCE-Campus is the configuration and management platform used in the CloudCampus
Solution. It provides a portal for CloudCampus service configuration, O&M, and monitoring.
Management-
control-analysis layer • Unified data base
Converged Manage + Control
• Centralized
+ Analyze detection/locating/processing
iMaster NCE-Campus, an autonomous driving campus network management and control system
14 Huawei Confidential
CloudCampus Solution Components: iMaster NCE-
CampusInsight
AS-IS: Device-centric network management TO-BE: User experience-centric AI-powered intelligent O&M
15 Huawei Confidential
16 Huawei Confidential
• For more information about the WLAN, such as WLAN planning, SSID planning,
and radio calibration, see the Small- and Medium-Sized Cloud-Managed Campus
Network Design or HCIX-WLAN series courses.
CloudCampus Solution Components: Network Hardware
Products
CloudEngine S series switches NetEngine AR routers
17 Huawei Confidential
Network Architecture of the CloudCampus Solution (VXLAN-
based Virtualized Campus Network)
⚫ The following figure shows the typical network architecture of the CloudCampus Solution, which consists of the
network layer, management layer, and application layer.
Health Asset Intelligent
Application layer AAA MDM e-Schoolbag …
management management OAM
Open APIs
Management layer
SNMP
NETCONF/ Telemetry
YANG
VN 1 VN 3
VN 2
Virtual network
18 Huawei Confidential
• Network layer
▫ Virtualization technologies are introduced to divide the network layer into a
physical network and a virtual network.
• Application layer
▫ Based on iMaster NCE-Campus, Huawei CloudCampus Solution provides
open standards-compliant APIs, through which various information
including user identities, network resources, service quality, location
information, and network topology, is opened up to upper-layer services.
Third parties can use these APIs to customize innovative service applications
based on service demands, meeting service requirements in multiple fields
such as education, commerce, enterprise, and government.
Architecture of a Virtualized Campus Network
Network Network
egress services
Network
Wired access
service
resources Edge
VXLAN Fabric: a network with pooled resources abstracted from
Edge
External the underlay network. When creating an instantiated VN,
Border Wireless
network
Fabric access you can select network resources on the fabric.
20 Huawei Confidential
• This slide presents the virtualized campus network architecture. The underlay is
the physical network layer, and the overlay is the virtual network layer
constructed on top of the underlay using the Virtual Extensible LAN (VXLAN)
technology.
Network Nodes on a Virtualized Campus Network
• Egress gateway: is an egress device of the campus network,
which can be an AR router or a firewall.
• Firewall node: This node is required when Layer 4 to Layer 7
Egress gateway
security policies are deployed. It can be deployed in off-path
Firewall node mode or at the campus egress.
• Border node: implements communication between the fabric
Border node
and external networks. It is typically a core switch.
• Transparent node: It does not need to support VXLAN.
Transparent node • Edge node: is a fabric edge device that connects user-side
Fabric domain
devices to the fabric. Data packets from wired users enter the
(VXLAN)
VXLAN network through edge nodes.
• Access node: is typically an access switch (wired access node) or
Edge node an AP (wireless access node). Wired access nodes can function
as edge nodes, that is, VXLAN is deployed across core and access
Access domain
nodes. If wired access nodes do not need to support VXLAN,
Access node aggregation nodes can function as edge nodes — that is, VXLAN
is deployed across core and aggregation nodes — in which
scenario policy association can be deployed on wired access
VXLAN-capable nodes nodes and edge nodes.
21 Huawei Confidential
• Policy association:
22 Huawei Confidential
Key Technologies for Virtualized Campus: Admission
Authentication
User identity
verification
3
Egress Built-in server of iMaster NCE-Campus
RADIUS server & Portal server
Core Border
2 4
Transfer of User policy
user identity authorization
Aggregation VXLAN credential
23 Huawei Confidential
1. Request for user identity authentication: The terminal sends its identity
credential to the admission device.
2. User identity authentication: The admission device sends the identity credential
to the admission server for identity authentication.
3. User identity verification: The admission server stores user identity information
and manages users. After receiving the identity credential of the terminal, the
admission server verifies the identity of the terminal, determines whether the
terminal identity is valid, and delivers the verification result and policy to the
admission device.
4. User policy authorization: As a policy enforcement device, the admission device
implements policy control over the terminal based on the authorization result
provided by the admission server, for example, permitting or denying network
access, or performing more complex policy control on the terminal. Complex
policy control can be increasing or decreasing the forwarding priority of the
terminal, or restricting the network access rate of the terminal.
Key Technologies for Virtualized Campus: Policy Association
⚫ If access switches do not support VXLAN, policy association can be
Egress deployed between access and aggregation switches (gateways). The
gateway manages user access policies in a unified manner, and the
Core Border access switch enforces user access policies.
Authentication control points and enforcement points are connected
through CAPWAP tunnels (which are the management tunnels used by
policy association).
VXLAN
CAPWAP tunnels implement user association, message transmission, user
authorization policy delivery, user information synchronization, and other
Edge Edge Edge
functions.
L3
Aggregation
L2 After policy association is configured, authentication enforcement points
can transparently transmit BPDUs, report user logout and access locations
Policy Policy in real time, and enforce user access policies, thereby controlling user
association association access to the network.
AP
Access Access Access
Authentication control point Authentication enforcement point
24 Huawei Confidential
25 Huawei Confidential
• Free mobility introduces the concept of security group. Security groups are
related only to user identities and are completely decoupled from network
information such as user VLANs and IP addresses.
• User policy management and permission control are performed based on security
groups.
Key Technologies in CloudCampus: Terminal Identification
Requirements and challenges Terminal identification and policy automation
Terminal fingerprint
Example: higher education database Proactive
scanning
institution
>>
Example: an enterprise
Terminal type-based Terminal type-based Terminal type-based
10+ authentication faults
reported per day Automatic authentication Automatic authorization Bogus terminal detection
Recognized as a printer Recognized as a camera Recognized as an IP phone first
Difficult to locate bogus Automatic MAC address Automatically added to a video and then a PC
terminals. authentication, without the need surveillance group. Report a bogus terminal alarm.
of manual MAC address input.
26 Huawei Confidential
Policy 4 Policy
3 6 5
delivery delivery
Identification Identification
result display Administrator result display Administrator
Scan-
1
and- 3 Fingerprint
detect Fingerprint reporting
collection 2
2 Information
reporting
• Terminal visibility: collects terminal type statistics (by vendor and OS), displays the relationship between terminals and access ports,
queries access policies (VLAN, QoS, and authentication mode), and exports reports.
• Terminal policy automation:
Supports automatic terminal access based on terminal types, thereby achieving automatic MAC address authentication of dumb
terminals.
Authorizes policies (covering VLAN, security group, access permission, and QoS) on a per-terminal group basis; supports IPv4/IPv6
dual-stack terminals.
27 Huawei Confidential
28 Huawei Confidential
• When terminals access the network, network devices can collect terminal
information and report the information to iMaster NCE-Campus. Alternatively,
iMaster NCE-Campus can proactively scan terminals to identify the terminal type,
OS, and manufacturer.
Process of Automatic Policy Delivery Based on Terminal
Types
The administrator enables terminal
1
identification and configures terminal policies.
iMaster NCE-Campus matches the 1. On the iMaster NCE-Campus GUI, an administrator enables
terminal's fingerprint information
against the fingerprint database and the terminal identification function, selects terminal types, and
The network identifies the terminal type. specifies the corresponding policies.
device reports 4
terminal 3 2. iMaster NCE-Campus delivers terminal identification
fingerprint configurations to network devices.
information. 3. When terminals access the network, network devices collect
2 iMaster NCE-Campus
delivers configurations the fingerprint information of the terminals and report the
to network devices. information to iMaster NCE-Campus.
4. iMaster NCE-Campus automatically matches the terminals'
fingerprint information against the fingerprint database to
5 iMaster NCE-
identify the terminal types.
Campus delivers
admission and 5. iMaster NCE-Campus automatically delivers admission and
authorization policies authorization policies to the terminals based on the policies
for the terminal to
the network device. defined by the administrator.
29 Huawei Confidential
Key Technologies for Virtualized Campus: VXLAN-based
Multi-purpose Network
• Multiple services carried on one physical network
Internet Internet
• Automated physical network deployment
• Automated VN provisioning
• Automated service policy delivery
VXLAN VN3
VN1 VN2 Security
OA VN VC VN protection VN
30 Huawei Confidential
Access
Terminal Security zone
management
identification design design
design
Security
policy design
31 Huawei Confidential
Contents
6. WLAN Design
9. O&M Design
32 Huawei Confidential
Network Architecture Design Overview
Internet WAN
DC
⚫ Reliability considerations:
O&M zone
High reliability of nodes: CSS, iStack, and hot standby (AC,
Core layer firewall, etc.)
High reliability of links: redundant links and Eth-Trunk
Aggregation
layer
⚫ Network layer design principles:
Two-layer networking: The network layers are simple, and
faults are easy to locate.
33 Huawei Confidential
• Large- and medium-sized campus networks often use the tree topology with the
core layer as the root, as shown in the figure. This topology is stable and easy to
expand and maintain. A campus network can be divided into the following layers:
access layer, aggregation layer, core layer, and multiple zones including the
egress zone, DC zone, and O&M zone. Internal changes within a module have
limited impact on other modules, facilitating fault location.
• Terminal layer
▫ The terminal layer involves various types of terminals that access the
campus network, such as PCs, printers, IP phones, mobile phones, and
cameras.
• Access layer
▫ The access layer provides various access modes for users and is the first
network layer for terminals to access a campus network. The access layer is
usually composed of access switches. There are a large number of access
switches that are sparsely distributed in different places on the network. In
most cases, an access switch is a simple Layer 2 switch. If the terminal layer
has wireless terminals, the access layer provides APs that access the
network through access switches.
• Aggregation layer
▫ The aggregation layer connects the access layer to the core layer. The
aggregation layer forwards horizontal traffic between users and forwards
vertical traffic to the core layer. It can also function as the switching core
for a department or zone and connect the department or zone to the
exclusive server zone. In addition, the aggregation layer can further extend
the quantity of access terminals.
• Core layer
▫ The core layer is the core for data exchange on a campus network. It
connects various components of a campus network, such as the DC zone,
aggregation layer, and egress zone. The core layer is responsible for high-
speed interconnection of the entire campus network. High-performance
core switches need to be deployed to implement high bandwidth utilization
and fast convergence upon network faults. It is recommended that the core
layer be deployed if a campus has more than three departments. For a
wireless network, the core layer includes ACs. After a wireless terminal
accesses the network through an AP, the AP communicates with an AC
using a CAPWAP tunnel.
• Egress zone
• DC zone
▫ In the DC zone, service servers such as the file server and email server are
managed, and services are provided for internal and external users.
• O&M zone
Block 1 Block N
Application scenario: large campus networks with a large Application scenario: small- and medium-sized campus
number of users or involving multiple buildings (for networks involving only one building
example, campus networks of high education institutions)
35 Huawei Confidential
• Layered design:
▫ Each layer can be considered a well-structured module with specific roles
and functions. This layered structure is easy to expand and maintain,
reducing the design complexity and difficulty.
• Modular design:
• Redundancy design:
Single-layer N Y Y Three-layer
Quantity > 1? Quantity > 1?
architecture architecture
N Two-layer
architecture
36 Huawei Confidential
6. WLAN Design
9. O&M Design
38 Huawei Confidential
Underlay Network Design Outline
Routing design
39 Huawei Confidential
VLAN IP Address DHCP Routing Network Deployment Underlay Network Automation
VLAN Design
⚫ You are advised to assign consecutive VLAN IDs to ensure proper use of VLAN resources.
⚫
You are advised to reserve a certain number of VLANs for future expansion.
⚫
VLANs are classified into service VLANs, management VLANs, and interconnection VLANs.
⚫
Typically, VLANs are assigned based on interfaces. According to different design principles, interfaces of access switches are added to
different VLANs so that users of different service types can be isolated.
VLANIF 100
VLAN assignment based on 192.168.100.254
geographical areas
VLAN assignment based on VLAN assignment based on VLANIF 100 VLANIF 100
Management
logical areas the personnel structure 192.168.100.1 192.168.100.2
VLAN 100
40 Huawei Confidential
• Service VLAN:
▫ Assign VLANs by logical area, geographical area, personnel structure, or
service type.
▪ Assign VLANs by logical area. For example, VLANs 100 to 199 are
used in the core network zone, VLANs 200 to 999 are used in the
server zone, and VLANs 2000 to 3499 are used on the access network.
▪ Assign VLANs by service type. For example, VLANs 200 to 299 are
used in the web server zone, VLANs 300 to 399 are used in the app
server zone, and VLANs 400 to 499 are used in the database server
zone.
▫ If users are sensitive to the voice latency, the voice service must be
preferentially guaranteed. It is recommended that the voice VLAN be
planned for the voice service. Huawei switches can automatically identify
voice data, transmit voice data in the voice VLAN, and perform QoS
guarantee. When network congestion occurs, voice data can be
preferentially transmitted.
▫ If different users have the same multicast data service, you are advised to
plan a multicast VLAN and bind the user VLANs to the multicast VLAN. This
prevents the upstream gateway from copying multicast data in multiple
user VLANs.
▫ Do not use VLAN 1 as a service VLAN.
• Management VLAN:
IP Address Design
⚫ IP addresses of a campus network are classified into service, management, and interconnection IP addresses.
Management IP address Service and interconnection IP addresses
42 Huawei Confidential
▫ Management IP address:
▫ Interconnection IP address:
⚫
When planning an address pool, filter out static IP addresses.
⚫
The lease needs to be planned based on the online duration of a client.
⚫
On a large or midsize campus network, the DHCP server and hosts are
usually not on the same network segment. Therefore, you need to
DHCP clients enable the DHCP relay function on the gateway.
44 Huawei Confidential
VLAN IP Address DHCP Routing Network Deployment Underlay Network Automation
Routing Design
Three-layer networking: scenario 1 Three-layer networking: scenario 2
Aggregation Aggregation
OSPF area 0
OSPF area 1 OSPF area 2
⚫
Three-layer networking:
Scenario 1 (multi-area): The interconnection links between core switches belong to OSPF area 0, and the links connecting the core switch to each
aggregation switch belong to an independent OSPF area.
Scenario 2 (single-area): Core, aggregation, and access switches all work in OSPF area 0. If the number of switches to be deployed in a network area
is fewer than 100, scenario 2 is recommended.
⚫
Two-layer networking:
OSPF runs only between core switches and access switches. In this case, only OSPF area 0 needs to be planned on the entire network.
45 Huawei Confidential
• The routing design includes internal and egress routing design for a campus
network.
▫ Internal routing design:
▫ You are advised to use the IP addresses of loopback interfaces as the router
IDs.
▫ Areas are divided according to the core, aggregation, and access layers. It is
recommended that egress routers and core switches be deployed in the
backbone area. The design of non-backbone areas depends on the
geographical location and performance of devices.
• Note:
▫ This slide describes the routing design in the scenario when VXLAN is
deployed across core and access layers.
Aggregation
Plug-and-play:
Plug-and-play • Aggregation switch
Access • Access switch
• AP
47 Huawei Confidential
• Typically, egress and core devices on large- and medium-sized campus networks
are centrally deployed in a core equipment room. Services transmitted on these
devices are complex and their locations on the network are important. In most
cases, network engineers need to commission devices onsite during the
deployment. Therefore, you are advised to use the web system or CLI to deploy
devices at the core layer and upper layers (including core devices, standalone ACs
connected in off-path mode, and egress devices).
• Note: Core switches obtain basic configurations such as IP addresses using the
CLI. Once they establish management channels with iMaster NCE-Campus,
iMaster NCE-Campus will automatically deliver services to them.
VLAN IP Address DHCP Routing Network Deployment Underlay Network Automation
3. Upon receiving the request, the DHCP server sends a DHCP packet
SW1
containing Option 148 to SW1. Device to be deployed
4. SW1 registers with iMaster NCE-Campus and gets onboarded based on the
information carried in Option 148 (NETCONF enabling status, URL/IP address
and port number of iMaster NCE-Campus).
48 Huawei Confidential
VLAN IP Address DHCP Routing Network Deployment Underlay Network Automation
PnP VLAN
⚫ The Plug-and-Play VLAN (PnP VLAN) is defined for plug-and-play of switches. The default PnP VLAN of a switch is VLAN 1.
⚫
PnP VLANs consist of wired and wireless PnP VLANs, which are uniformly maintained by iMaster NCE-Campus. After a core
switch registers with iMaster NCE-Campus, iMaster NCE-Campus automatically delivers the PnP VLANs preconfigured on it to
the core switch.
The wired PnP VLAN is used to apply for the management IP PnP VLAN of a device to be deployed is not 1
address of a switch. 1. The core switch registers with iMaster NCE-
Campus and get onboarded. iMaster NCE-
The wireless PnP VLAN is used to configure the management Campus delivers the PnP VLANs of the devices to
VLAN of an AP. When a switch has an AP connected, the switch be deployed to the core switch.
automatically changes the PVID of the interface connected to Core
the AP to the wireless PnP VLAN ID. DHCP server
For a switch, wired and wireless PnP VLANs can be different, 2. The core switch sends the
but they are negotiated at the same time. If only a wired PnP PnP VLAN (not VLAN 1) to
SW1 through LLDP.
VLAN is configured, the PVID of the switch interface connected
to an AP is changed to the wired PnP VLAN ID. SW1
Device to be deployed
3. SW1 communicates with
the core switch through the
PnP VLAN and registers AP
with iMaster NCE-Campus. Device to be deployed
49 Huawei Confidential
• The DHCP server pushes PnP VLAN information to its downstream devices
through LLDP. Note that:
▫ If NETCONF is not enabled on the core switch (DHCP server), the core
switch cannot be onboarded on iMaster NCE-Campus. In this case, the
administrator needs to manually configure the PnP VLAN on the core
switch. Then the switch to be deployed can negotiate with the core switch
through LLDP to obtain the configured PnP VLAN.
• Note: The PnP VLAN and management VLAN of a switch can be the same or
different.
• LLDP: Link Layer Discovery Protocol
VLAN IP Address DHCP Routing Network Deployment Underlay Network Automation
Aggregation 2. After an access switch is powered on, it follows a similar process as the aggregation switch (step 1).
Device to be 3. The access switch identifies that its downstream device is an AP and changes the PVID of the interface
deployed connected to the AP to the wireless PnP VLAN ID. The AP obtains the AC address through DHCP Option
43. After the AP is associated with the AC and VLANIF 1 is configured as the CAPWAP source interface,
the AP gets onboarded on the AC.
Access 4. Switches use LLDP to discover the network topology and report their topology information to iMaster
Device to be NCE-Campus through NETCONF. iMaster NCE-Campus then discovers the network topology based on
deployed the received topology information.
AP
Device to be deployed 5. The administrator performs network planning and configuration provisioning on iMaster NCE-Campus.
50 Huawei Confidential
• An administrator deploys the DHCP server function on the core switch and configures DHCP Option 148.
• The administrator creates a campus site on iMaster NCE-Campus.
Egress gateway • The administrator plans the network topology using the template (an Excel file) provided by iMaster
NCE-Campus and then imports the template containing the planned data to iMaster NCE-Campus.
• The administrator configures the core switch so that it can be managed by iMaster NCE-Campus.
Core (native AC)
DHCP server
Device onboarding process
1. After the aggregation switch, access switch, and AP are powered on, they each complete PnP VLAN
Aggregation negotiation and DHCP message exchange processes, and then register with iMaster NCE-Campus.
Device to be 2. The aggregation switch, access switch, and AP are then managed by iMaster NCE-Campus and report
deployed their LLDP neighbor information to iMaster NCE-Campus. Subsequently, iMaster NCE-Campus compares
the received LLDP information with that in the network topology planning document uploaded by the
administrator. If any inconsistency is found, it reports an error. In this way, the administrator can correct
Access the topology error as prompted.
Device to be 3. The administrator performs offline device pre-configuration on iMaster NCE-Campus. The devices
deployed automatically obtain their configurations after they are onboarded.
AP
Device to be deployed
51 Huawei Confidential
Edge 3 Edge
Automatically completes OSPF configuration.
52 Huawei Confidential
▫ Network type: You can set the OSPF network type to broadcast, P2MP, or
P2P.
▫ Encryption: You can set the encryption mode between adjacent devices to
HMAC-SHA256, MD5, or none.
6. WLAN Design
9. O&M Design
53 Huawei Confidential
Fabric Design Overlay Design
54 Huawei Confidential
⚫
Recommended networking scenarios:
Centralized gateway, VXLAN deployed across core and aggregation layers, native AC deployed on the core device, or standalone AC attached to the
core device in off-path mode.
Distributed gateways, VXLAN deployed across core and aggregation layers, native AC deployed on the core device, or standalone AC attached to the
core device in off-path mode.
Networking Border Node Location Edge Node Location AC Deployment Mode Recommended
Native AC on the core device No
Access
Centralized Standalone AC attached to the core device in off-path mode No
Core
gateway Native AC on the core device Yes
Aggregation
Standalone AC attached to the core device in off-path mode Yes
Native AC on the core device Yes
Distributed Aggregation
Core Standalone AC attached to the core device in off-path mode Yes
gateway
Access Standalone AC attached to the core device in off-path mode No
55 Huawei Confidential
Fabric Design Overlay Design
CAPWAP VXLAN
Aggregation layer VXLAN CAPWAP
VXLAN range VXLAN across core and access layers VXLAN across core and aggregation layers
• Existing access switches on the live network need to be
• Automatic end-to-end service deployment is reused. Alternatively, low-cost Huawei switches that do
Application
required on the entire network. not support VXLAN need to be deployed at the access
scenarios
• Recommended: Number of switch nodes < 1,000 layer to reduce costs.
• Recommended: Number of switch nodes < 3,000
Network Compared with the VXLAN solution from the core Compared with the VXLAN solution from the core layer to
construction layer to the aggregation layer, this solution has the access layer, this solution has lower network
costs higher network construction costs. construction costs.
56 Huawei Confidential
Fabric Design Overlay Design
Layer 3
gateway
Layer 2 Layer 2 Layer 2/3 Layer 2/3
gateway gateway gateway gateway
57 Huawei Confidential
58 Huawei Confidential
• The centralized gateway solution supports only one border node, whereas the
distributed gateway solution supports multiple border nodes.
Fabric Design Overlay Design
Server zone
It is recommended that ENP cards be used for interconnection with
aggregation switches and that Eth-Trunk be deployed.
Core layer Border
⚫
Aggregation layer design:
Deploy a stack of aggregation switches or a single aggregation switch. It is
recommended that a cluster of modular switches or a stack of fixed
switches be deployed. Large-capacity switches (S12700E or S6700 series
switches) are recommended.
Aggregation
layer Eth-Trunk is recommended for interconnection with the core layer and
access layer.
⚫
Access layer design:
Wired access node: Each node can be a stack or a single device.
Access layer
Wireless access node: Fit AP
⚫
Server zone design:
It is recommended that iMaster NCE-Campus, analyzer, and DHCP server
CSS/iStack link be connected to the campus network through switches in the server zone.
59 Huawei Confidential
⚫
Server zone design:
Access layer
It is recommended that iMaster NCE-Campus, analyzer, and DHCP server
be connected to the campus network through switches in the server
zone.
CSS/iStack link
60 Huawei Confidential
Fabric Design Overlay Design
61 Huawei Confidential
Fabric Design Overlay Design
Green VRF Red VRF Green VRF Red VRF Edge1 Edge2
VN1 VN2 VN1 VN2
Application scenario: Application scenario: Application scenario:
Multiple VNs on a fabric share a Layer 3 egress, Each VN on the fabric network exclusively The border node does not function as the user
through which they communicate with the occupies a Layer 3 egress, through which it gateway, and the user gateway must be located
egress device, and these VNs use the same communicates with the egress device, and each outside the fabric.
security policies. VN uses differentiated security policies.
62 Huawei Confidential
• When the campus intranet needs to communicate with an external network, for
example, the Internet, data center, or another branch, traffic must pass through
the border node.
• There are three interconnection modes between the fabric network and egress
device:
▫ L3 shared egress:
▪ The external gateway connects to and accesses external networks via
VLANIF or VBDIF interfaces. VNs can access the public network or
private network specified by another site through the shared VRF
egress, and service traffic can be diverted to the firewall through the
shared VRF egress. When configuring a multi-border fabric, you can
configure multiple core devices in one external network.
▪ The L3 shared egress mode is applicable to the scenario where the
firewall does not need to perform security check on VNs, there are
low requirements on security control policies between VNs, and traffic
of all VNs is transmitted in the same security zone.
▪ To enable communication between VNs and external networks, you
must configure return routes to service subnets on the firewall. As a
result, service subnets of different VNs can communicate with each
other on the firewall. To isolate VNs on the firewall, configure policies
based on service network segments in the VNs.
▪ As shown in the figure, a shared VRF is created on the border node,
the shared L3 egress is bound to the VRF, and routes are configured
to enable the communication with external networks.
▫ L3 exclusive egress:
▫ L2 shared egress:
▪ The L2 shared egress mode applies to the scenario where the user
gateway is located outside the fabric. In higher education scenarios, if
a Broadband Remote Access Server (BRAS) is used as the user
authentication point and PPPoE dialup is required on the network, the
L2 shared egress mode can be used.
64 Huawei Confidential
▫ This network service resource model is mainly used for obtaining the DHCP
server address. When this model is used, the gateway of the VN subnet can
function as the DHCP relay agent and automatically configure the DHCP
server address after the gateway is created.
▫ As shown in the figure, after the external network and network service
resource are selected during VN creation, the Layer 3 egress on the border
node is bound to the VRF of the VN, and a route pointing to the external
network is created, enabling the VN to access the network service resource.
• Note: The models shown on this page are logical connectivity diagrams. The
actual connections are subject to the actual networking.
Fabric Design Overlay Design
The authentication control points for wireless users are deployed on the ACs. The design and planning for this type of authentication control point
depend on the AC type.
Border
Access interface design
66 Huawei Confidential
• "Fabric extended AP" and "Fabric extended switch": The two types of connections
are used to enable communication between the authentication control point and
authentication enforcement point through the policy association management
VLAN. In this scenario, the fabric extended switch functions as the authentication
enforcement point and can be connected to fabric extended APs and terminals.
VN Design Process
1 VN design
Fabric
2 Policy design
Security groups Security groups Security groups
• Divide users into security groups and VIP Sales Server Programmer Server Operations
define inter-group policies (policy
Marketing Guest Testing Code library … …
control matrix).
• Define inter-VN access policies based on VN3: production
VN1: OA network VN2: R&D network
network
the policy control matrix.
67 Huawei Confidential
• VN design:
▫ VNs are generally divided based on services on a campus network. An
independent service is assigned a VN, and VNs are isolated from each other
by default. For example, on a school campus network, guest, teaching, IoT,
and video surveillance services can each be assigned a separate VN. On an
enterprise campus network, office network services, production network
services, and R&D services can be allocated to different VNs.
• Policy design:
▫ Where: user access location, for example, access from within the campus, or
remote access.
▫ What: type of the terminal used by the access user, for example, mobile
phone or PC/laptop.
▫ When: time when a user accesses the network, for example, whether the
user accesses the network in the daytime or at night.
▫ Whose: device owner, for example, whether the device is company-issued or
BYOD.
VN Design
1. Network service abstraction
VRF+VNI VRF+VNI VRF+VNI Physical network resources are pooled through orchestration,
and the network is abstracted into Fabric as a Service (FaaS). A
VN 1 VN 2 VN 3 VN is a FaaS instance and includes:
• IP/VLAN segment
Overlay (virtual network layer)
• External network
External Network service
VN • Network service resource: The IP/VLAN segment is the
network resource
IP/VLAN segment capability provided by the VN for clients to use network
External network resources.
Network service resource • Access point: Terminals access VNs through access points.
Access point Fabric
Deploy VNs
Wired access Wireless access
Fabric
2. Network service orchestration
Deliver • Deliver the mappings between VNIs and BDs.
configurations
• Deliver the mappings between BDs and VLANs.
• Deliver the IP address segments corresponding to VBDIF
interfaces.
Underlay (physical network layer) • Deliver VRFs and bind them to VBDIF interfaces.
69 Huawei Confidential
Fabric Design Overlay Design
VN Access Design
⚫ Service data enters from a physical network to VNs through the edge node. Service data of different users enters different VN s depending on the VLANs to
which the users belong.
⚫ Wired user traffic is directly transmitted to VNs based on VLANs. After wireless user traffic is forwarded to the native AC, the native AC decapsulates
CAPWAP packets and forwards the packets to the corresponding BDs based on the VLANs.
Static VLANs Dynamically authorized VLANs
VN1 VN2
VN1 VN2
Configure a
static VLAN Native AC Native AC
• A static VLAN is configured for wired users on an interface of an • Authorized VLANs of wired users are delivered to the corresponding
access switch. authentication points, which then send received user traffic to different VLANs.
• A static service VLAN is configured for wireless users on an SSID. • Authorized VLANs of wireless users are delivered to the corresponding native
ACs, which then send received user traffic to different VLANs.
70 Huawei Confidential
• Application scenarios:
▫ The static VLAN mode applies when terminals access the network at fixed
locations and do not need to be authenticated. This access mode is more
secure but lacks flexibility. When the locations of terminals change, you
need to configure static VLANs for them again.
▫ The dynamically authorized VLAN mode applies when terminals need to
access the network from any place and need to be authenticated based on
the VLAN information delivered during user authentication. This access
mode is flexible and the configuration does not need to be modified when
the locations of terminals change. Dynamic access is more automated, easy
to manage and use, and is therefore recommended.
• VN access design for wireless users:
▫ If distributed gateways are used and the border nodes have the native AC
function deployed, traffic of wireless users is forwarded to the native AC
through CAPWAP tunnels. After the native AC decapsulates CAPWAP
packets, the decapsulated packets enter different VNs depending on the
VLANs to which the wireless users belong.
▫ If centralized gateways are used and the border nodes have the native AC
function deployed, it is recommended that traffic of wireless users be
directly forwarded to the native AC through CAPWAP tunnels. After the
native AC decapsulates CAPWAP packets, the decapsulated packets enter
different VNs depending on the VLANs to which the wireless users belong.
The administrator needs to configure different VLAN ranges for wired and
wireless terminals. The VLANs of wired terminals are bound to BDs on the
edge nodes, whereas the VLANs of wireless terminals are bound to BDs on
the border nodes.
• Note: 802.1X authentication and MAC address authentication both support
dynamically authorized VLANs.
Fabric Design Overlay Design
Border
VRF1 VRF2 VRF1 VRF2
VTEP1 VTEP2 VTEP1 VTEP2
(L3VNI 1000) (L3VNI 1001) (L3VNI 1000) (L3VNI 1001)
1.1.1.1 2.2.2.2 1.1.1.1 2.2.2.2
VBDIF 10.1.1.254 VBDIF 10.2.2.254 VBDIF 10.1.1.254 VBDIF 10.2.2.254
71 Huawei Confidential
▪ If two VNs belong to the same security zone and have low security
control requirements, devices on the two VNs can directly
communicate with each other through a border node. In addition,
permission control can be implemented based on the free mobility
policy. To implement communication between VNs, the border node
needs to import their respective network segment routes that are
reachable to each other.
▫ Through an external gateway
▪ If two VNs belong to different security zones and have high security
control requirements, it is recommended that devices on the two VNs
communicate through an external gateway (a firewall) and that a
security zone policy be configured on the firewall for permission
control.
Fabric Design Overlay Design
IP packet
FW
IP packet
Border Public Zone4
Security policy
IP packet
V V V Zone1
Border R R R IP packet
F F F Zone2
1 2 3 IP packet
Zone3
72 Huawei Confidential
• Traffic from a terminal enters the VN based on the VLAN to which the terminal
belongs.
Contents
6. WLAN Design
9. O&M Design
73 Huawei Confidential
User Management User Authentication Policy Control Terminal Identification
74 Huawei Confidential
User Management User Authentication Policy Control Terminal Identification
⚫
On large- and medium-sized campus networks, 802.1X authentication is recommended for employees, Portal authentication for
guests, and MAC address authentication for dumb terminals.
⚫
If a customer wants to use more than one authentication method on the same access point, a combination of authentication
methods (hybrid authentication) can be used. After hybrid authentication is configured, terminals can access the network after
passing any authentication in the combination. This mode is applicable to scenarios where one port provides access for multiple
types of users. For example, if a PC is connected upstream to an IP phone, you can configure hybrid authentication (MAC address
authentication + 802.1X authentication). In this way, the IP phone uses MAC address authentication, and the PC uses 802.1X
authentication.
75 Huawei Confidential
OA VN R&D VN 2 3
VLAN 10: 10.1.10.0/24 VLAN 30: 10.1.30.0/24 Send an Issue the authorization
authentication result (VLAN 10) after
VLAN 20: 10.1.20.0/24 VLAN 40: 10.1.40.0/24
request. successful user
authentication.
76 Huawei Confidential
User Management User Authentication Policy Control Terminal Identification
77 Huawei Confidential
User Management User Authentication Policy Control Terminal Identification
78 Huawei Confidential
User Management User Authentication Policy Control Terminal Identification
Aggregate the IP addresses of dispersed data center applications into a resource group, thereby simplifying
deployment.
79 Huawei Confidential
User Management User Authentication Policy Control Terminal Identification
• HR
Policy control matrix:
• R&D
Destination R&D Marketing
• OA
Sales code document Internet HR R&D Sales Guest
server
Source library library
• Guest
HR Permit Deny Deny Permit Permit Permit Deny
R&D Permit Permit Deny Permit Permit Permit Deny
Static security groups Sales Permit Deny Permit Permit Permit Permit Deny
Guest Deny Deny Deny Permit Deny Deny Deny
• OA server
• R&D code library
• Marketing document library
• Internet
80 Huawei Confidential
• Take the policy direction into account when planning inter-group policies.
Typically, packets are transmitted in two directions between two terminals.
▫ Huawei switches consider that traffic from A to B is unrelated to traffic
from B to A, so they match policies for the two types of traffic separately
and determine whether to forward the traffic based on the corresponding
policies. This means that a Huawei switch enforces policies on a packet by
considering only the source and destination security groups of that packet.
For example, the policy "A ->B permit, B -> A deny" means that all packets
sent from A to B will be permitted, whereas all packets sent from B to A
will be discarded, regardless of whether A or B initiates the access. The
default inter-group policy on a switch is permit.
User Management User Authentication Policy Control Terminal Identification
⚫ To prevent users connected to the same upstream user gateway from communicating with each other
at Layer 2, you can configure Layer 2 isolation. In this way, traffic between these users must pass
through the user gateway.
81 Huawei Confidential
82 Huawei Confidential
User Management User Authentication Policy Control Terminal Identification
• The core device also works as the policy enforcement point for free
mobility.
• The core device stores authentication information about all users on the
AGG1 AGG2
network. After traffic is forwarded to the core device, it enforces policies
based on the policy control matrix defined by the administrator.
Access1 Access2 • The network does not need to support or deploy VXLAN.
83 Huawei Confidential
User Management User Authentication Policy Control Terminal Identification
PC1 1.1.1.1 PC2 2.2.2.2 PC3 3.3.3.3 Synchronize IP-security Security group and policy
Sales user R&D user Marketing user group entries control matrix delivery
84 Huawei Confidential
User Management User Authentication Policy Control Terminal Identification
• The policy for traffic exchanged between users on the same aggregation
switch is enforced by the aggregation switch itself.
AGG1 AGG2
VXLAN • Traffic exchanged between users on different aggregation switches is
encapsulated using VXLAN. The source security group ID is encapsulated
into VXLAN-encapsulated traffic. Policies are enforced on the peer
Access1 Access2
aggregation switch.
Authentication point Policy enforcement point
PC1 1.1.1.1 PC2 2.2.2.2 PC3 3.3.3.3 Security group and policy
Sales user R&D user Marketing user control matrix delivery
85 Huawei Confidential
User Management User Authentication Policy Control Terminal Identification
86 Huawei Confidential
User Management User Authentication Policy Control Terminal Identification
Scenario description
• VXLAN-based virtualized campus network
• The AC functions as the authentication point for wireless users, and the
Core core switch functions as the gateway for wireless users.
Device enabled with
IP-security group AC Scenario characteristics
entry subscription
• The AC functions as the authentication point for wireless users and
interacts with iMaster NCE-Campus to complete user authentication.
• The core switch functions as the free mobility policy enforcement point, to
87 Huawei Confidential
User Management User Authentication Policy Control Terminal Identification
• The L2 shared egress mode is configured on the core switch through iMaster
VXLAN
NCE-Campus for the connection between the fabric and the external network, so
that the core switch can communicate with the third-party BRAS.
• The core switch functions as the free mobility policy enforcement point, to which
iMaster NCE-Campus synchronizes IP-security group entries.
Authentication point Policy enforcement point
Synchronize IP-security Security group and policy
PPPoE authentication group entries control matrix delivery
88 Huawei Confidential
• L2 shared egress mode: The border node is not the user gateway, and the user
gateway is a device outside the fabric. The border node connects to the egress
device through a Layer 2 interface, and the user gateway is deployed on the
egress device for access to the external network.
User Management User Authentication Policy Control Terminal Identification
89 Huawei Confidential
⚫
If the network administrator cannot determine the terminal identification method to be used, the following passive fingerprint-based
identification methods are recommended: MAC OUI, HTTP User-Agent, DHCP Option, LLDP, and mDNS.
⚫
It is recommended that Nmap be disabled by default because this identification takes a long time. If the passive fingerprint-based
identification methods cannot meet requirements, enable Nmap.
90 Huawei Confidential
User Management User Authentication Policy Control Terminal Identification
91 Huawei Confidential
6. WLAN Design
9. O&M Design
92 Huawei Confidential
WLAN Service Solution
⚫ On a large- or medium-sized campus network, the WLAN typically uses the "AC + Fit AP" networking architecture.
⚫ An AC can be deployed in in-path or off-path mode, depending on its location. A native AC (integrated on a switch)
must be deployed in in-path mode, whereas a standalone AC can be deployed in either in-path or off-path mode
(off-path mode is recommended).
Native AC solution Standalone AC solution
• Switches provide the native AC function. • Standalone AC (connected to the core switch in off-path mode).
• Free mobility is supported. Policies for wired and wireless users are • The free mobility solution is supported for wireless users, but it must be
centrally enforced on the switches. used together with the IP-security group entry synchronization solution.
• Unified management of wired and wireless users. • Separate management for wired and wireless users.
Native AC AC AC
93 Huawei Confidential
▫ Direct forwarding:
• Scenario 1: The switch used as the border node provides the native AC • Scenario 2: The switch used as the border node provides the native AC
function to manage network-wide APs. function to manage network-wide APs.
▫ It is recommended that the native AC function be deployed on the ▫ When the number of wireless users on the entire network exceeds
border node and the tunnel forwarding mode be used on APs. 50,000, the distributed gateway solution is recommended. In this
▫ Traffic of wireless users enters into VNs through the native AC, and the scenario, the tunnel forwarding mode is recommended for APs.
border node functions as the gateway of wireless users. ▫ Traffic of wireless users enters into VNs through the native AC, and the
▫ Free mobility is supported, and free mobility policies for wireless user border node functions as the gateway of wireless users.
groups are enforced on the border node. ▫ Free mobility is supported, and free mobility policies for wireless user
groups are enforced on the border node.
94 Huawei Confidential
▪ Wired traffic: Traffic enters VNs through the edge node, and free
mobility policies are enforced on the edge node.
▫ User gateway: edge node for wired users; border node for wireless users
▫ Authentication point: edge node for wired users; border node (native AC)
for wireless users
▫ Forwarding model:
▪ Wired traffic: Traffic enters VNs through the edge node, and free
mobility policies are enforced on the edge node.
Edge Edge
Edge Edge Layer 3 gateway Layer 3 gateway
for wired users for wired users
• The AC centrally manages APs. The tunnel forwarding mode is used. • The AC centrally manages APs. The tunnel forwarding mode is used.
Traffic of wireless users is encapsulated by the AP using the CAPWAP Traffic of wireless users is encapsulated by the AP using the CAPWAP
protocol and then sent to the AC. After being decapsulated by the AC, the protocol and then sent to the AC. After being decapsulated by the AC,
traffic enters the VN through the border node. the traffic enters the VN through the border node.
• The border node functions as the gateway for wireless users. • The border node functions as the gateway for wireless users.
• Free mobility is supported, and free mobility policies for wireless user • Free mobility is supported, and free mobility policies for wireless user
groups are enforced on the border node. groups are enforced on the border node.
95 Huawei Confidential
▪ Wired traffic: Traffic enters VNs through the edge node, and free
mobility policies are enforced on the edge node.
▪ Wireless traffic: Free mobility policies are enforced on the border node
(the border node needs to subscribe to IP-security group entries). The
tunnel forwarding mode is recommended. Traffic enters VNs through
the border node (traffic is forwarded from the standalone AC to the
border node and then enters VNs).
• Description of the distributed gateway scenario:
▫ User gateway: edge node for wired users; border node for wireless users
when tunnel forwarding mode is used
▫ Authentication point: edge node for wired users; AC for wireless users
▫ Forwarding model:
▪ Wired traffic: Traffic enters VNs through the edge node, and free
mobility policies are enforced on the edge node.
⚫ In new deployment scenarios or wired and wireless network reconstruction scenarios, the native AC is
recommended and tunnel forwarding mode is preferentially selected for APs.
97 Huawei Confidential
Contents
6. WLAN Design
9. O&M Design
98 Huawei Confidential
Network Egress Design Overview
⚫ As the boundary between a campus network and external networks
Internet WAN
(including the Internet and WAN), the egress zone is responsible for
communication and security protection between internal and external
Egress zone
networks.
⚫
The requirements for the egress zone design are as follows:
DC
O&M zone Network connectivity: Internal users can access external networks. If the
Core layer campus network provides access for external users, external users should be able
to access the internal network.
Aggregation Network security: To ensure that the campus network is secure and controllable,
layer especially border security, firewalls and the Intrusion Prevention System (IPS)
devices need to be configured. Security components are selected based on
Access layer security requirements and investment scales.
Flexible access modes: Various access modes are provided, including LAN-side
and WAN-side access.
Terminal layer Strong service control capability: Service deployment and isolation are easy to
implement, and various VPN access modes are provided, including IPsec VPN, SSL
iStack/CSS link VPN, and MPLS VPN.
99 Huawei Confidential
Egress Network Service Scenarios (1)
interconnection
Remote access
Multi-campus
Internet
packet forwarding paths. When a packet is transmitted between
Security
Security
Firewall and leased
NAT
interconnection
Remote access
Multi-campus
SSL VPN services for mobile office users (employees on
Security
Security
NAT
Must be ARs
▪ For non-Ethernet links, such as EI, CE1, and CPOS links, select routers
as egress devices.
▫ SD-WAN requirements:
CSS/iStack
Link aggregation
Core switch
Service packet
⚫ As shown in the figures, the firewalls act as egress devices of the campus network and are directly connected to the core switches.
The two firewalls are configured to work in HSB mode, and the Eth-Trunk links connecting the firewalls and core switches work in
active/standby mode. When the active firewall is faulty, the standby firewall takes over services from it and forwards service packets.
▫ Note: No return route needs to be configured for the return traffic in the
public system. After a return packet matches the session table in the public
system, the packet is directly forwarded to vsys1 for processing.
Security Zone Design
⚫ A security zone, also known as a zone, is a collection of networks connected through one or more interfaces, where users have the
same security attributes. There are typically three types of security zones: Trust, DMZ, and Untrust.
The Trust zone is a security zone with a high security level. It is typically used to define the zone where intranet users are located.
The DMZ is a security zone with a medium security level. It is typically used to define the zone where the servers that need to provide services for
external networks are located.
The Untrust zone is a security zone with a low security level. It is typically used to define insecure networks such as the Internet.
Untrust
Internet WAN Security zone planning
DMZ
• A campus intranet is considered secure, but is faced with
Data center
Trust security threats from the outside. Therefore, assign the Internet
to the Untrust zone and the campus intranet to the Trust zone.
Deploy security devices at the campus network egress to
Fabric isolate the intranet from the Internet and defend the intranet
against external threats. Allocate the data center to the DMZ,
and deploy firewalls in the DMZ to isolate traffic between the
campus intranet and servers in the data center.
• On a virtualized campus network, when the user gateways are located inside the
fabric, each Layer 3 egress interface for connecting the fabric to an external
network corresponds to a Layer 3 logical interface on the firewall. Each logical
interface can be bound to a security zone. If the user gateways are located
outside a fabric, you need to bind the gateways to security zones based on the
security policies of these gateways.
• Most security policies are implemented based on security zones. Each security
zone identifies a network, and a firewall connects networks. Firewalls use security
zones to divide networks and mark the routes of packets. When packets travel
between security zones, security check is triggered and corresponding security
policies are enforced. Security zones are isolated by default.
Security Policy Design
⚫ After security zones are created on the firewall, these security zones are isolated from each other by default. To
enable communication between security zones (for example, the campus intranet accesses the Internet), you need
to configure Layer 3 connectivity and security policies on the firewall.
VN1 VN2
Path for traffic from the Internet to DMZ
Path for traffic from VN1 to VN2
• As shown in the figure, after security policies are configured, VNs on the intranet
can communicate with each other, and the external networks can access servers
in the DMZ. In addition, different security protection policies can be applied to
traffic in different security zones.
Contents
6. WLAN Design
9. O&M Design
Egress zone
There is no absolutely secure network but only more
Egress
security comprehensive protection measures.
Server zone
Security is changing dynamically. Different networks have
Core layer different security requirements. Therefore, on-demand
network security design is the best choice.
Security is a system issue. Security design is required in
all aspects of the network. In addition to egress security,
Aggregation
layer Intranet campus networks also need to consider intranet security
security
and security compliance.
If employees need to access an external network, enable functions such as URL filtering and antivirus to defend against external threats and prevent
information leakage, thereby ensuring enterprise network security.
⚫
Egress security solution design: ⚫
Security protection functions:
Dedicated security devices, such as firewalls and intrusion Function Description
prevention systems, are recommended.
Compares traffic against the intrusion prevention signature
Intrusion
Routers with the abovementioned security functions can also be database to prevent application-layer attacks, such as buffer
prevention
overflows, Trojan horses, backdoor attacks, and worms.
used.
Inspects files transmitted on the network for viruses to protect
Antivirus intranets from data breaches and system crashes caused by
viruses.
URL Permits or denies access to URLs to control the online behavior
filtering of users.
• Security measures:
▫ Enable traffic suppression and storm control.
▪ Control broadcast, multicast, and unknown unicast packets to prevent
broadcast storms. Traffic suppression limits the traffic using the
configured threshold, and storm control blocks the traffic by shutting
down interfaces.
▫ Enable DHCP snooping and configure uplink interfaces as trusted interfaces.
▪ DHCP snooping defends against bogus DHCP server attacks, DHCP
server DoS attacks, bogus DHCP packet attacks, and other DHCP
attacks. DHCP snooping allows administrators to configure trusted
and untrusted interfaces, so DHCP clients can obtain IP addresses
from authorized DHCP servers. A trusted interface forwards the DHCP
packets it receives, whereas an untrusted interface discards the DHCP
ACK packets and DHCP Offer packets received from a DHCP server.
▪ An interface directly or indirectly connected to the DHCP server
trusted by the administrator needs to be configured as a trusted
interface, and other interfaces are configured as untrusted interfaces.
This ensures that DHCP clients obtain IP addresses only from
authorized DHCP servers and prevents bogus DHCP servers from
assigning IP addresses to DHCP clients.
▫ Enable IPSG and DAI.
▪ IPSG prevents unauthorized hosts from using IP addresses of
authorized hosts or specified IP addresses to access or attack the
network.
▪ You can configure DAI to defend against man-in-the-middle (MITM)
attacks and prevent theft of authorized user information. When a
device receives an ARP packet, it matches the source IP address,
source MAC address, VLAN ID, and interface number of the ARP
packet against binding entries. If a match is found, the device
considers the ARP packet valid and allows it to pass through.
Otherwise, the device discards the packet.
▫ Enable port isolation.
▪ You are advised to configure port isolation on the interfaces
connecting an access switch to terminals. This configuration secures
user communication and prevents invalid broadcast packets from
affecting user services.
▫ Enable CPU attack defense.
▪ CPU attack defense limits the rate of packets sent to the CPU so that
only a limited number of packets are sent to the CPU within a certain
period of time. This ensures that the CPU can properly process
services.
▪ Control Plane Committed Access Rate (CPCAR) is the core of CPU
attack defense. CPCAR limits the rate of protocol packets sent to the
control plane to ensure security of the control plane.
▫ Enable attack source tracing.
▪ Attack source tracing defends against DoS attacks. A device enabled
with attack source tracing analyzes packets sent to the CPU, collects
statistics on the packets, and allows a user to set a packet rate
threshold for the packets. Packets sent at a threshold-crossing rate
are considered as attack packets. The device finds the source user
address or source interface of the attacker by analyzing the attack
packets and generates logs or alarms to alert a network
administrator. The network administrator then takes measures to
defend against the attack or configure the device to discard packets
sent by the attack source.
▫ Enable port attack defense.
▪ Port attack defense is an anti-DoS attack method. It defends against
attacks based on ports and prevents protocol packets on ports from
occupying bandwidth and causing other packets to be discarded.
▪ By default, port attack defense is enabled on the device for common
user protocol packets, such as ARP, ICMP, DHCP, and IGMP packets. If
a user attack occurs, the device restricts the attack impact within the
port, reducing the impact on other ports.
▫ Enable user-level rate limiting.
▪ User-level rate limiting identifies users based on MAC addresses, and
rate-limits specified protocol packets, such as ARP, ND, DHCP
Request, DHCPv6 Request, IGMP, 802.1X, and HTTPS-SYN packets. If a
user undergoes a DoS attack, other users are not affected.
▪ Host CAR is the core of user-level rate limiting. By default, user-level
rate limiting is enabled.
Network Security QoS
Egress zone
⚫
WLAN security design involves the following:
Air interface security: identifies and defends against
attacks such as rogue APs, rogue STAs, unauthorized
Core layer ad-hoc networks, and DoS attacks.
Illegal data theft
STA access security: ensures the validity and security
Aggregation layer
of STAs' access to the WLAN.
Access layer
Service security: protects service data of authorized
users from being intercepted by unauthorized users
Rogue AP during transmission.
A rogue STA STAs access
goes online through a
rogue AP CSS/iStack link
Rogue STA
QoS Design
⚫ In addition to traditional data services such as web, email, and FTP services, large and medium-sized campus
networks also transmit services such as video surveillance, video conferencing, voice call, and production scheduling,
which have specific requirements on bandwidth, latency, and jitter. For example, video surveillance and video
conferencing require high bandwidth, low latency, and low jitter. The voice service does not require high bandwidth,
but requires low latency. When congestion occurs, the voice service must be processed first.
⚫ Quality of Service (QoS) is designed to provide different levels of service quality during transmission of data flows
to meet requirements of different services for performance indicators such as bandwidth, latency, jitter, packet loss
ratio, and throughput. A variety of QoS technologies can be used to improve the network service quality, such as
priority mapping, traffic policing, traffic shaping, queue scheduling, and congestion avoidance. These technologies
enable the network to deliver an optimal user experience with limited resources.
⚫ The QoS design process consists of requirement survey and analysis, traffic classification design, and scheduling
policy design.
▫ Voice signaling: signaling protocols such as SIP, H.323, H.248, and Media
Gateway Control Protocol (MGCP).
Network Security QoS
▫ Large-volume data services: for example, FTP, database backup, and file
dump.
Scheduling policy design for wired networks Scheduling policy design for WLANs
• The basic principle of traditional QoS design for wired • The network efficiency of WLANs is lower than that of wired
networks is to mark or re-mark packets at boundaries of networks, and STAs are more sensitive to user experience.
different DiffServ domains and perform bandwidth control. Therefore, you are advised to consider the following when
• Devices in the same DiffServ domain only need to schedule designing the QoS policies for STAs:
packets in queues based on the priorities marked on User bandwidth
boundary nodes. Channel preemption
• Service deployment typically involves the following: Signal strength of APs to which STAs are associated
Traffic identification at the access layer Multicast service experience
DiffServ deployment at the aggregation or core layer VIP user experience
Bandwidth control on the egress firewall
▪ Call admission control (CAC): This function controls STA access based
on the radio channel utilization and the number of online STAs or
signal-to-noise ratio (SNR), thereby ensuring the Internet access
service quality of online STAs.
6. WLAN Design
9. O&M Design
Key requirements: Telemetry-based Key requirements: client & network Key requirements: intelligent
precise detection profiling, experience perception fault identification
Interconnection between network devices and an SNMP server can be configured on iMaster NCE-Campus.
SNMP
iMaster NCE-Campus can manage traditional devices (NETCONF-incapable devices) using SNMP.
NTP Interconnection between network devices and an NTP server can be configured on iMaster NCE-Campus.
Interconnection between iMaster NCE-Campus and a Syslog server can be configured. After they are interconnected, iMaster NCE-
Syslog Campus uploads the logs obtained from network devices to the Syslog server.
Interconnection between network devices and a Syslog server can be configured on iMaster NCE-Campus.
LLDP can be enabled for network devices on iMaster NCE-Campus. LLDP is enabled on iMaster NCE-Campus by default. iMaster NCE-
LLDP
Campus can obtain network topology information through LLDP.
⚫ The intelligent O&M solution consists of iMaster NCE-CampusInsight, iMaster NCE-Campus, and devices. Currently,
iMaster NCE-CampusInsight can manage Huawei cloud switches and APs, and intelligently analyzes their data.
Devices need to periodically report data to iMaster NCE-CampusInsight and iMaster NCE-Campus can be
iMaster NCE-CampusInsight. Therefore, the deployed at different locations. They can collaborate with
campus network needs to reserve bandwidth for each other as long as network connectivity is achieved. To
data reporting. The average bandwidth avoid instability of the intermediate network, you are advised
consumed by each device is 3 kbit/s. to deploy them in the same location, for example, a same
data center.
B. Distributed gateway
C. Edge
D. Border
E. Access switch
F. Aggregation switch
1. ADF
Summary
⚫ Different from traditional campus networks that focus on standalone devices, a virtualized
campus network focuses on the overall service experience of the entire network and uses
iMaster NCE-Campus and virtual extensible local area network (VXLAN) technology to
flexibly schedule network resources. Virtualization technologies group physical network
resources into a network-wide resource pool that can be flexibly adjusted by the service
layer and allocated by iMaster NCE-Campus. A physical network is virtualized into multiple
logically independent virtual networks that carry various services and have independent
network resources. This virtualization decouples services from networks and facilitates
service management.
⚫ This course describes the deployment process and typical deployment cases of the VXLAN-
based virtualized campus network solution.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
3 Huawei Confidential
Three Deployment Modes of CloudCampus
Huawei operates the public cloud and MSPs purchase software, such as the
Customers purchase and own software
Scenario customers do not need to purchase the controller and analyzer, for operational
entities, such as the controller and analyzer,
definition controller or analyzer software. Instead, purposes. The software can be deployed in
which can be deployed in their data centers
customers just purchase Huawei's cloud their data centers or on the public cloud
or on the public cloud platform.
managed network service. platform.
Software
Perpetual license + SnS SaaS mode TBL subscription mode
transaction mode
4 Huawei Confidential
• Perpetual license + SnS: The perpetual license is sold together with SnS services,
such as software patches, software upgrades (including new features of new
releases), and remote support. In the perpetual license + SnS mode, a customer
needs to pay SnS fee for a certain period of time, in addition to purchasing the
license upon the first purchase. If the customer does not renew the SnS annual
fee after it expires, the customer can only use functions provided in the license
for the current version and cannot use the service functions covered in the SnS
annual fee.
• Term Based License (TBL) mode: This mode differs from the perpetual license +
SnS mode in that the licenses purchased by customers have limited validity
periods. If a customer does not renew the subscription after the license expires,
the customer can no longer use the software product.
• SnS: refers to Subscription and Support. It consists of two parts: software support
and software subscription. The complete software charging mode consists of the
annual software SnS fee and software license fee.
• Note: This course uses the on-premise deployment as an example.
Review: Virtualized Campus Network Architecture
Network Network
egress services
⚫ Underlay: a physical topology consisting of physical
VRF+VNI VRF+VNI IP/VLAN
network devices, such as switches, access points (APs),
Access point firewalls, and routers, to provide interconnection
Virtual network 1 Virtual network N Fabric instantiation capabilities for all services on the campus network,
Overlay (virtual network layer) building the basic bearer network for campus service
data forwarding.
Network
service Wired access ⚫ Fabric: a network with pooled resources abstracted from
resources
Edge
VXLAN the underlay network. When creating an instantiated
External Edge
networks Border Wireless virtual network, you can select the pooled network
Fabric access
resources on the fabric.
⚫
Virtual network: a logically isolated virtual network
Core instance that is constructed by instantiating a fabric. One
Aggregation Access
OSPF
virtual network corresponds to one isolated network
(service network), for example, research network.
Underlay (physical network layer) Aggregation Access
5 Huawei Confidential
Review: Network Nodes on a Virtualized Campus Network
⚫
Egress gateway: is an egress device of the campus network, which
can be an AR router or a firewall.
Egress gateway
⚫
Border node: implements communication between the fabric and
external networks. It is typically a core switch.
⚫
Edge node: is a fabric edge device that connects user-side devices to
Border node the fabric. Data packets from wired users are encapsulated into
VXLAN packets on edge nodes.
⚫
Transparent node: is a transparent device on the fabric, and does
Transparent
node Fabric domain not need to support VXLAN.
(VXLAN)
⚫
Access node: is typically an access switch (wired access node) or an
AP (wireless access node). Wired access nodes can be combined
Edge node with edge nodes, that is, VXLAN is deployed to the access layer. If
wired access nodes do not need to support VXLAN, aggregation
Access domain
nodes can be combined with edge nodes, that is, VXLAN is deployed
Access node
to the aggregation layer, and policy association is deployed on wired
access nodes and VXLAN edge nodes.
VXLAN-capable nodes
6 Huawei Confidential
• On a fabric, VXLAN tunnel endpoints (VTEPs) are further divided into the
following roles:
▫ Border: is a physical network device and provides data forwarding between
the fabric and external networks. In most cases, VXLAN-capable core
switches function as border nodes.
▫ Edge: is a physical network device. Access user traffic enters the fabric from
an edge node. Generally, VXLAN-capable access or aggregation switches
function as edge nodes.
Lab: Requirements
⚫
To implement multi-service convergence on a campus network, virtual
HQ
networks are deployed and configured on the campus network through
AR3
iMaster NCE-Campus. This enables different virtual networks on the
GE0/0/1
same physical network to be divided based on services.
Border
GE0/0/23 GE0/0/24
⚫
Using the VXLAN technology, virtual networks meet the following
requirements:
GE0/0/1 GE0/0/1
Edge_1 Edge_2
Network devices support DHCP-based plug-and-play provisioning.
GE0/0/24 GE0/0/24 Multiple services on the campus network share the same physical network, but
GE0/0/1 GE0/0/1 AP1 are logically isolated. Mutual access control can be implemented among these
ACC_1 ACC_2 services.
GE0/0/24
GE0/0/24 GE0/0/23 Service configuration is automated, and virtual network configurations are
delivered by iMaster NCE-Campus, removing the need to log in to devices to
manually configure them.
PC1 PC2 PC3
Users can access virtual networks from anywhere on the campus network,
implementing flexible user authentication, onboarding, and free mobility.
7 Huawei Confidential
Lab: Gateway Solution Selection
⚫ When designing the virtualized campus network solution, first determine the gateway solution to be
used. After the gateway solution is determined, you can perform end-to-end design on the entire
campus network based on the selected gateway solution.
User gateway
Border Edge
location
≤ 50,000 (This solution is recommended if the number 50,000 to 100,000 (This solution is recommended when
Terminal scale
of terminals does not exceed 50,000.) the number of terminals exceeds 50,000.)
8 Huawei Confidential
Lab: Physical and VXLAN Networking
⚫ HQ: ACC_1 and ACC_2 function as access devices that connect
GE0/0/24 to wired terminals and provide network services for wired users.
AR_Server_SW AP1 is connected to ACC_2 to provide network services for
GE0/0/3
wireless users. Edge_1 and Edge_2 serve as aggregation devices,
HQ GE0/0/9
and the Border functions as the core device. AR3 works as both
AR3
the campus egress and the DHCP server, which allocates IP
GE0/0/1 addresses to other devices and user terminals at the HQ. OSPF
Border is used for communication on the underlay network at the HQ.
GE0/0/23 GE0/0/24
⚫ Cloud: AR_Server_SW is used to simulate the cloud. It connects
GE0/0/1 VXLAN GE0/0/1
the HQ and iMaster NCE-Campus, and also functions as the
Edge_1 Edge_2
gateway of iMaster NCE-Campus.
GE0/0/24 GE0/0/24
GE0/0/1 GE0/0/1 AP1 ⚫
VXLAN network (fabric): The network topology for this lab
ACC_1 ACC_2 uses a distributed gateway model, in which VXLAN is deployed
GE0/0/24
GE0/0/24 GE0/0/23 across core and aggregation layers. Edge_1 and Edge_2
function as the edge nodes of the VXLAN network, whereas
PC1 PC2 PC3 Border functions as the border node of the VXLAN network.
9 Huawei Confidential
• Note: In this lab, the native AC is deployed on the border node to manage APs.
The border node also serves as the DHCP server to allocate IP addresses to APs.
Lab: Virtual Network
External networks Network service ⚫ Virtual network (VN): Two virtual networks are defined
resource
for access of different end users.
OA RD OA VN: for access of sales personnel (Sales_Wired and
DHCP_Email
(Internet) (Internet)
(DHCP/Other) Sales_Wireless security groups) and marketing personnel
(Market_Wired and Market_Wireless security groups)
10 Huawei Confidential
Lab: Security Group and Policy Control Matrix
Fabric Security group-based policy control matrix ⚫ Security group: Five security groups are defined to identify different end users.
OA_VN RD_VN personnel are assigned after they pass 802.1X or Portal authentication.
▫ RD: security group to which R&D personnel are assigned after they pass
802.1X authentication.
⚫ Resource group: One resource group is defined, indicating the email server.
Sales_ Sales_ Market_ Market_ RD
Wired Wireless Wired Wireless (802.1X)
(802.1X) (Portal) (802.1X) (Portal)
11 Huawei Confidential
▫ In the policy control matrix, only the communication that is allowed should
be permitted and other communication should be denied.
Contents
12 Huawei Confidential
Virtualized Campus Network Deployment Flowchart
Server and Network
Network device License Basic network
Start software Site creation service End
installation activation configurations
installation configurations
Install network Obtain the ESN Create an Configure network Configure access
Install servers.
devices. of iMaster NCE- administrator. resources. control.
Campus.
Configure the
egress network.
13 Huawei Confidential
• The following part of this course focuses on key operations in the deployment
process.
Contents
14 Huawei Confidential
Installing Servers and Software (1)
Installing iMaster NCE-Campus Installing iMaster NCE-CampusInsight
• iMaster NCE-Campus can be deployed in the on- • iMaster NCE-CampusInsight can be deployed
premises scenario, Huawei public cloud scenario, and independently or integrated with iMaster NCE-Campus.
MSP-owned cloud scenario. • It is recommended that iMaster NCE-CampusInsight be
• Large- and medium-sized campuses typically adopt the integrated with iMaster NCE-Campus in the
on-premises deployment mode, in which enterprises CloudCampus Solution.
install iMaster NCE-Campus by themselves. • For more information, see iMaster NCE-CampusInsight
• For more information, see iMaster NCE-Campus Product Product Documentation.
Documentation.
15 Huawei Confidential
Installing Servers and Software (2)
16 Huawei Confidential
Preconfiguring Devices
GE0/0/24
AR_Server_SW
GE0/0/3
HQ GE0/0/9
AR3 Task Preconfiguration Plan
GE0/0/1
1. Complete basic configurations such as assigning
Border
VLANs, creating VLANIF interfaces, and configuring
GE0/0/23 GE0/0/24
IP routing.
Preconfigure
GE0/0/1 GE0/0/1
2. Configure the DHCP server for plug-and-play of
VXLAN AR3.
devices at the site.
Edge_1 Edge_2 3. Configure the DHCP server for end user access.
GE0/0/24 GE0/0/24 4. Simulate the OA and RD external networks.
GE0/0/1 GE0/0/1 AP1
ACC_1 ACC_2
GE0/0/24
GE0/0/24 GE0/0/23
17 Huawei Confidential
Contents
18 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
19 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
20 Huawei Confidential
▪ Create sites one by one: You can create sites one by one when a small
number of sites need to be added.
▪ Create sites in a batch: You can create sites in a batch when a large
number of sites need to be added.
Devices to be
The switches obtain IP addresses and iMaster NCE-Campus
Edge_1 managed by Edge_2
address/port through AR3, and initiate registration requests to
iMaster NCE-
Campus iMaster NCE-Campus. They are managed by iMaster NCE-Campus
AP1
once registered.
ACC_1 ACC_2
⚫ Device management (by iMaster NCE-Campus)
Check the device registration status.
21 Huawei Confidential
• Device plug-and-play:
▫ Customer pain points: In traditional network deployment, engineers need to
commission network devices one by one onsite, resulting in heavy
configuration workload and low efficiency.
▫ Solution:
ACC_1 ACC2
VLAN VLAN
VXLAN tunnel
22 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
23 Huawei Confidential
24 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
25 Huawei Confidential
26 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
Task Procedure
1. Select a RADIUS server type. The iMaster NCE-Campus built-in RADIUS server is recommended.
Create a RADIUS server
2. Configure the RADIUS server IP address. If the iMaster NCE-Campus built-in RADIUS server is used,
template.
you do not need to configure the RADIUS server IP address.
1. Select a Portal server type. The iMaster NCE-Campus built-in Portal server is recommended.
2. Configure the Portal server IP address. If the iMaster NCE-Campus built-in Portal server is used, you
Create a Portal server
do not need to configure the Portal server IP address.
template.
3. Configure the Portal server URL. If the iMaster NCE-Campus built-in Portal server is used, you do
not need to configure the Portal server URL.
Create user 1. Select a user authentication mode, which is typically 802.1X authentication, MAC address
authentication authentication, or Portal authentication. A template can contain multiple authentication modes.
templates. 2. Select the RADIUS server template or Portal server template to be bound.
27 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
Configuring a Fabric
⚫ A fabric is a virtual network built on top of a physical network using the VXLAN technology, and has all
resources pooled.
Network
External
service
network
resources
Task Procedure
1. Create a fabric and complete automatic deployment of an underlay
HQ network.
Border 2. Create an external network, that is, configure the connectivity
between the fabric and external networks (including the
interconnection port, interconnection VLAN, interconnection IP
address, peer address, and route).
Fabric Configure a 3. Configure network service resources, that is, configure the
Edge_1 Edge_2 fabric. connectivity between the fabric and network service resources
(DHCP server, RADIUS server, Portal server, and other servers). The
connectivity configuration includes the device IP address,
AP1 interconnection VLAN, interconnection IP address, peer IP address,
ACC_1 ACC_2 and interconnection port.
4. Configure access management, that is, configure an interface on an
access device to invoke an authentication template.
28 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
29 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
HQ
Border
Fabric
Edge_1 Edge_2
Define the
networking type.
30 Huawei Confidential
▫ RR cluster ID: specifies the cluster ID of an RR. If there are multiple RRs in a
fabric, for example, if two RRs are configured on a dual-border network,
you need to configure a cluster ID for the RRs to prevent BGP routing loops.
The value is an integer ranging from 1 to 4294967295 or an IPv4 address.
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
HQ
Border
31 Huawei Confidential
• Role: specifies the role of a device in the fabric, including the border node, edge
node, and extended node. By default, the role of a device is an extended node.
• Route reflector: In a fabric, border devices are typically used as route reflectors,
which simplify full-mesh connections required by IBGP and reduce network and
CPU loads.
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
OSPF
Area 0
Edge_1 Edge_2
32 Huawei Confidential
HQ
Configure BGP EVPN on iMaster NCE-Campus.
Border
BGP EVPN
Edge_1 Edge_2
⚫ After this step is complete, a fabric is successfully created based on the physical network, and the underlay network
configuration (such as interconnection between network devices and OSPF configuration) is automatically
completed on iMaster NCE-Campus, laying a foundation for creating virtual networks.
33 Huawei Confidential
34 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
Network
connection mode.
External
service
network
resources
HQ
Border
35 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
HQ
Border
36 Huawei Confidential
• Basic information:
▫ If Internet connection is enabled, iMaster NCE-Campus uses a default
route to direct traffic to the corresponding external network. If Internet
connection is disabled, you need to specify a route prefix.
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
Network
External
service
network
resources
Peer IP address
HQ
• External route
• Port Border
• Local IP
address
• VLAN
Edge_1 Fabric Edge_2 Configure routing information for the external network.
37 Huawei Confidential
• Interconnection information:
▫ Select the border device to be connected to the external network, and
select the interconnection interface, interconnection IP address, and
interconnection VLAN.
▫ Note: The configured interconnection IP address cannot conflict with IP
addresses in the underlay automation resource pool. The configured
interconnection VLAN belongs to the global resource pool of the fabric.
• Routing information:
▫ After you click Apply, iMaster NCE-Campus creates a static route to the
external network for the border device. (The static route is delivered to the
border device only when the external network is invoked by the virtual
network.)
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
Task Procedure
1. Select a server type, which can be DHCP server, third-party RADIUS server, and third-party Portal server.
2. Configure the IP addresses for accessing network service resources, such as the DHCP service address and iMaster NCE-
Create network
Campus southbound IP address.
service resources.
3. Select an interconnection scenario, which can be directly connected to a server or directly connected to a switch.
4. Configure interconnection physical interfaces, VLANs, and IP addresses.
38 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
HQ
Border Define the server type.
39 Huawei Confidential
• Server configuration:
▫ Server type: server resource specified by the network service resource. In
this example, the defined network service resource are a DHCP server and a
E-mail server.
▫ DHCP server: IPv4 and/or IPv6 address of a DHCP server.
HQ
Border • Interconnection port
• Interconnection VLAN
• Interconnection IP
address
Configure
Edge_1 Fabric Edge_2 interconnection
information.
40 Huawei Confidential
• Device configuration:
▫ If Directly connected to a switch is selected, the border node adds the
interconnection port to the interconnection VLAN in tagged mode to
connect to network resources. If Directly connected to a server is selected,
the switch adds the interconnection port to the interconnection VLAN in
untagged mode.
▫ Interconnection device: Select the border node (Border). The device
functions as a border node that connects the fabric to the external network
service resource.
▫ Interconnection port: Select the port used by the border node to connect
to the network service resource.
▫ Interconnection IPv4 address: Select the IP address of the port used by the
border node to connect to the network service resource.
⚫ Access management configuration for the fabric varies depending on the gateway solution.
41 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
HQ
Border
Policy Configure an
association authentication
ACC_1 ACC_2 AP1 enforcement point.
42 Huawei Confidential
• Policy association:
▫ Configure the management VLAN and management IP address for policy
association.
HQ
Border
Policy Configure an
association authentication
ACC_1 ACC_2 AP1 enforcement point.
43 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
Logical Network
⚫ After a fabric is created, you can select network resources in the fabric to create virtual network instances.
⚫ To enable access users in different virtual networks to communicate with each other, you need to configure virtual
network interworking.
Network Task Procedure
External
service
network 1. Create virtual networks. Different virtual networks
resources
represent services of different users and can be
Logical used to isolate services of these users.
HQ network 2. Configure virtual network interworking to ensure
Border that there are reachable underlay network routes
between users in different virtual networks.
RD VN
OA VN VN Access User
Edge_1 Edge_2 Sales_Wired: 172.17.10.0/24
Sales_Wireless: 172.17.11.0/24
AP1 OA
Market_Wired: 172.17.20.0/24
ACC_1 ACC_2 Market_Wireless: 172.17.21.0/24
RD RD: 172.17.30.0/24
44 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
45 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
Task Procedure
1. (Optional) Select network service resources for communication between the virtual network and network service
resources (this step is typically performed).
2. (Optional) Select an external network for communication between the virtual network and external network
Create a (this step is typically performed).
virtual 3. Configure a user gateway, which can be manually specified or automatically allocated.
network. 4. Configure wired access: Select the access ports configured during fabric access management configuration, and
add the ports to the service VLAN configured on the user gateway.
5. Configure wireless access: Select the AC that connects to the wireless user subnet. Then the service VLAN
configured on the user gateway will be delivered to the AC.
46 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
HQ
Border
RD VN
OA VN
Edge_1 Edge_2
AP1
ACC_1 ACC_2
47 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
HQ
Border
RD VN
OA VN
Edge_1 Edge_2
AP1
VN Access User
ACC_1 ACC_2
Sales_Wired: 172.17.10.0/24
Sales_Wireless: 172.17.11.0/24
OA
Market_Wired: 172.17.20.0/24
PC1 PC2 PC3 Market_Wireless: 172.17.21.0/24
RD RD: 172.17.30.0/24
48 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
Network
External
service
network
resources
HQ
Border
RD VN
OA VN
Edge_1 Edge_2
AP1
ACC_1 ACC_2
49 Huawei Confidential
• User access is configured on the access points of the current virtual network.
• Wired access: Users on the OA virtual network need to access the network
through ACC_1 and ACC_2 and they all need to be authenticated. Therefore, in
the wired access configuration, you need to select the interfaces on which
authentication has been enabled on the two switches.
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
HQ
Border
RD VN
OA VN
Edge_1 Edge_2
AP1
ACC_1 ACC_2
50 Huawei Confidential
• Wireless access: Select the border device in the wireless access configuration. The
border device is a switch that provides the native AC, through which it manages
APs and provides the wireless access service.
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
Task Procedure
Configure 1. Select interconnection devices.
communication 2. Select the interworking mode, including full interworking and partial interworking.
between virtual 3. Configure the source virtual network, source IPv4 prefix, destination virtual
networks. network, and destination IPv4 prefix.
51 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
OA_VN RD_VN
Market_Wired RD
172.17.20.0/24 172.17.30.0/24
52 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
Service Deployment
⚫ On large campus networks, users are usually allowed access from any location, any VLAN, and any IP
network segment with controlled network access rights.
E_mail
Security group-based
Fabric policy control matrix Task Procedure
1. Configure free mobility, including creating
security groups, resource groups, and a policy
Sales_ Sales_ Market_ Market_ control matrix.
Wired Wireless Wired Wireless RD Service
2. Configure access authentication, including
deployment
creating user authentication accounts,
OA_VN RD_VN
authentication rules, authorization results, and
authorization rules, as well as page management.
53 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
OA_VN RD_VN
54 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
E_mail
Fabric
OA_VN RD_VN
55 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
HQ
Border
Fabric
Edge_1 Edge_2
AP1
ACC_1 ACC_2
56 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
OA_VN RD_VN
57 Huawei Confidential
• When multiple policies are configured to control access from a source security
group to multiple destination groups, the sequence in which these policies are
matched can be determined based on the policy priority. For example, if the
destination groups are resource groups, in which case the destination IP
addresses may be the same, you need to manually adjust the policy priorities to
ensure that a specific policy is matched first.
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
Access Authentication
802.1X authentication Portal authentication
⚫ 802.1X is a port-based network access control protocol. It verifies user ⚫ Portal authentication is also known as web authentication, and websites
identities and controls access permissions of users on ports of LAN access for Portal authentication are referred to as web portals. When a user
devices. accesses the network, the user must be authenticated on the web portal.
If the user fails the authentication, the user can access only specified
⚫ When iMaster NCE-Campus functions as a RADIUS server, 802.1X
network resources. The user can access other network resources only
authentication configuration on the server is illustrated in the following
after being authenticated successfully.
table:
⚫ When iMaster NCE-Campus functions as the Portal server and RADIUS
Task Procedure server, Portal authentication configuration on the server is illustrated in
the following table:
1. Create user authentication accounts.
Configure 802.1X 2. Configure authentication rules. Task Procedure
authentication. 3. Configure authorization results and
1. Create user authentication accounts.
authorization rules.
Configure Portal 2. Configure authentication rules.
authentication. 3. Configure authorization results and
authorization rules.
To enable a user client to be exempt from
(Optional) Configure authentication based on its MAC address within a
a MAC authentication period after the client passes Portal authentication
exemption policy. for the first time, configure a MAC authentication
exemption policy in the user control policy.
58 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
1. Create a 2. Create an
user group account in the
to which the matching user
user belongs. group.
59 Huawei Confidential
• For example, when creating an account named kris (RD user), deselect Change
password upon next login. As this user belongs to the RD user group, which
does not require Portal authentication, deselect Portal in the Available login
mode area.
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
60 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
61 Huawei Confidential
• After configuring authorization results, you need to bind the results to created
sites.
• iMaster NCE-Campus provides two default authorization results: permit access
and deny access. Once selected, the default authorization result takes effect for
all sites and cannot be modified or deleted.
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
62 Huawei Confidential
3. Bind the
authorization result to
the authorization rule.
63 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
WLAN Service
⚫ In the distributed gateway solution, if the fabric uses a networking model where VXLAN is deployed across the core
and aggregation layers and the border device provides the native AC function, APs need to go onboarded and get
managed by the border device. APs on the campus need to broadcast an SSID for wireless access, and STAs that
have associated with this SSID need to undergo Portal authentication.
Task Procedure
HQ
1. Add APs to the HQ site and associate the APs with the
Border Management IP address: border device.
Native AC 172.16.20.254 2. Create a management network segment and a
Management VLAN: VLAN 2 AP onboarding management VLAN for AP onboarding.
3. Configure the PnP management VLAN for wireless devices.
VXLAN 4. Configure the source interface for the CAPWAP tunnel on
Edge_1 Edge_2 the border device.
Wireless service
1. Create wireless authentication and configure Portal
AP1 configuration on the
authentication information.
ACC_1 ACC_2 controller
1. Configure an SSID profile.
Wireless service delivery
2. Configure a VAP profile, and bind the SSID profile and
(Web UI of the border
authentication profile to it.
device)
3. Bind the VAP profile to an AP group.
PC1 PC2 PC3
64 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
⚫ Choose Provision > Site Configuration, select the Fit AP Management function of the switch, click the border
device, and click Add to associate AP1 with the border device.
65 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
66 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
⚫ Then set the source address of the CAPWAP tunnel on the web UI of the border node. The AP can then obtain its
own IP address, AC address, and controller address from the address pool of the VLANIF2 interface and successfully
register with the border device and controller. After the registration, the AP status changes to normal.
67 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
68 Huawei Confidential
69 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
5. Select a wireless
authentication device.
70 Huawei Confidential
Site Device Network Fabric Logical Service WLAN
Management Management Planning Network Network Deployment Service
The WLAN service configuration on the web UI of the border device is not provided here.
71 Huawei Confidential
Quiz
72 Huawei Confidential
▫ Create sites in a batch: This mode applies when a large number of sites
need to be added.
2. ACD
Summary
73 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
⚫ This document mainly describes the design and planning methods of small- and medium-sized campus networks in
terms of the solution architecture, technical solution comparison, engineering design suggestions, and O&M.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
3 Huawei Confidential
Challenges Faced by Small- and Medium-Sized Campus
Networks
Accelerated industry changes Problems in traditional deployment and management solutions
Network cloudification brings rapid development in new ICT technologies, Low deployment efficiency, which slows down service provisioning
such as cloud computing, cloud security, big data, and IoT, leading to
• Site survey, planning, deployment, software commissioning,
tremendous changes in all industries.
configuration, and optimization must be completed onsite by
• Traditional retailers such as shopping malls and supermarkets offer free professional IT personnel.
Wi-Fi as a way to attract and retain customers, and they also use
Complex network management and high OPEX
wireless positioning and customer flow analytics to carry out precision
• Local professional O&M results in low O&M efficiency and high labor
marketing.
costs. The network management system (NMS), policy control server,
• In the education sector, e-classrooms are becoming more and more
charging system, and data analysis platform are deployed independently,
popular, and diversified multimedia teaching methods further stimulate
causing high management and maintenance costs.
students' interest in learning.
Poor network openness
• Smart healthcare enables hospitals and other healthcare institutions to
connect to each other through networks. This implements unified • The open data provided by multiple management systems on the
management and analysis of medical data and facilitates medical traditional network needs to be further integrated. In addition, due to
treatment. the incompatibility of API, the network and applications are connected at
a slower speed than application development.
As a pipe that carries upper-layer services and data, the network is
becoming more and more complex with a growing number of nodes.
4 Huawei Confidential
Service Requirement Analysis for Small- and Medium-Sized
Campus Networks
Plug-and-play network devices improve Cloud-based centralized O&M simplifies Open APIs accelerate business
deployment efficiency multi-site O&M application integration
Unified management and Centralized cloud management of multiple Openness and big data
centralized configuration branches and remote automatic O&M analytics capability
Cloud
management
Site platform
Network devices at a site network 2
Site
Site network Site network
network 1 Site
Plug-and-play and on- Site network
network N
demand expansion
• With open APIs and big data analytics
• Configurations of multiple sites are centrally • Geographically dispersed campus branch
capabilities, the cloud management platform
delivered, reducing onsite configuration and networks are centrally managed on the cloud
can interconnect with multiple management
commissioning workload and improving through the Internet.
systems to achieve unified network
deployment efficiency. • Troubleshooting and monitoring tools as well management.
• Network devices are plug-and-play and able as many other automation tools are
• It is also able to provide diversified value-
to be expanded on demand, requiring low integrated for remote automatic O&M.
added applications to lead enterprises into
cost for upgrades.
digital transformation.
5 Huawei Confidential
Small- and Medium-Sized Campus Network Trends
• Due to evolution to the cloud architecture, • Cloud security become more important than • The rise of IoT leads to a huge increase in
enterprises can focus more on their mission- ever. the number and types of terminals accessing
critical services, without paying too much • Facing cloudification, enterprises are the network, and these terminals generate a
attention to IT architecture construction. vulnerable to attacks that are fundamentally large amount of data.
• To support service cloudification, enterprises different from those on traditional networks • Diversified IoT sensing networks need to be
need to create a ubiquitous, intelligent, when providing various services. smoothly connected to the existing campus
controllable, and on-demand network. • Security has shifted from passive defense to network.
• The network needs to become more a service proactive defense. • The types of terminals connected to the
than a solution. • Detection and response have become as campus network are more complex than
important as defense. ever. As a result, the campus network
becomes a converged network that
accommodates multiple types of terminals
and media.
6 Huawei Confidential
Contents
7 Huawei Confidential
Huawei CloudCampus Cloud-Managed Network Solution
Ultra-broadband connection, improving network and application quality
Value-added
Industry-specific applications • All-scenario WLAN: large bandwidth, high concurrency, and low latency.
SaaS platform
• Secure, reliable platform and network: in compliance with the laws and
regulations of the industry and countries concerned.
• Open APIs: key driver of industry-specific applications and digital
transformation.
Cloud Simplified management, reducing OPEX
management
platform • Online network planning platform for both indoor and outdoor scenarios:
customized network planning templates; support for automatic generation
of network planning reports.
• Diversified scenario-specific configuration packages: one-stop configuration
of topologies as well as related device models and parameters.
• O&M based on GIS maps, logical topologies, and an easy-to-use mobile app
• Online centralized inspection of multiple branches; automatic inspection
report generation.
Multi-tenant
network AI-powered cloud-based Intelligent O&M
8 Huawei Confidential
RESTful API
RU
9 Huawei Confidential
• There are three layers in the architecture of Huawei CloudCampus Solution for
small- and medium-sized campus networks: multi-tenant network, cloud
management platform, and value-added SaaS platform.
Huawei support
ESDP platform PKI platform Huawei's support website ServiceTurbo-
system
(for licenses) (for device certificates) (for software versions & patches) Cloud
Cloud management
platform Registration center
Cloud
Deployment
environment Huawei public cloud
Cloud-managed devices
and a mobile app (for Firewall AR Switch AP WAC Central AP RU Mobile app
remote O&M)
11 Huawei Confidential
Management,
control, and analysis
Management + • Unified data base
layer All-in-one Control + Analysis • Centralized detection/locating/processing
iMaster NCE-Campus, an autonomous driving campus network management and control system.
12 Huawei Confidential
Solution Component: Registration Center
Synchronizes device
Devices are already preset with the registration center
information (ESN and Huawei Work out of
domain (register.naas.huawei.com) before factory
MAC address) the box
registration center delivery. No additional configuration is required.
At branches, devices can automatically go online on the cloud management platform without additional
configuration.
13 Huawei Confidential
Solution Component: iMaster NCE-CampusInsight
AS-IS: device-centric network management TO-BE: AI-powered intelligent O&M centered on user experience
• Visualized experience
• Topology management
mgmt. • User journey playback
• Performance • Potential fault
Traditional NMS mgmt. identification
• Alarm mgmt. • Root cause identification
• Configuration Telemetry • Predictive network
SNMP mgmt. Second-level network optimization
Minute-level network data collection
data collection
In addition to using algorithms to improve efficiency, intelligent O&M leverages scenario-based continuous learning and accumulated
expert experience to free O&M personnel from complex alarms and alerts, making O&M more automated and intelligent.
14 Huawei Confidential
The WLAN Planner is an efficient WLAN network planning tool. It enables signal simulation, helping determine AP
deployment locations and signal coverage results.
15 Huawei Confidential
E2E simplicity from planning and deployment, all the way to O&M.
16 Huawei Confidential
Solution Component: Hardware Products
CloudEngine S series switches NetEngine ARs
17 Huawei Confidential
Solution Technology: Plug-and-Play of Devices
• The time and labor costs for initial device installation and
configuration as well as upgrade are reduced.
Internet Internet Internet • After devices on the campus are powered on and connected
to the Internet, they can obtain the IP address of the
controller iMaster NCE and register with it through multiple
methods. All subsequent operations can be performed on
Firewall AP AR
the controller, without the need of onsite visits.
• Services are deployed on the iMaster NCE in advance,
Site network Site network Site network greatly shortening the deployment time.
• The configuration error rate is reduced due to GUI-based
operations.
18 Huawei Confidential
Plug-and-Play of Devices (1)
Through CloudCampus APP (barcode scanning) Through registration center
Administrator records
4 1 device information.
Tenant: Tenant X
Synchronize device information.
Site: Site Y Huawei
2 registration
Device: AP (ESN...) 1.1.1.1:8080
center
3
Register and
Internet Report AP Tenant: Tenant X
get managed. 3 information.
5 Register and 6
get managed. Internet iMaster NCE: 1.1.1.1:18008
Device: AP (ESN...)
Scan barcode 1
Automatically initiate a
Proactively initiate query request to Huawei
2 a registration registration center to
request to iMaster 5 4 obtain the IP address and
The CloudCampus APP obtains
NCE. port number of iMaster
the ESN and MAC address of
Site network the AP. Site network NCE.
19 Huawei Confidential
Plug-and-Play of Devices (2)
Through web system Through CLI
Web CLI
1 1
In the web system, configure Internet On the CLI, configure Internet access
access parameters and IP address/URL parameters and IP address/URL and
and port number of iMaster NCE. port number of iMaster NCE.
Site network Site network
Devices supported: AR, firewall, switch, AP Devices supported: AR, firewall, switch, AP
20 Huawei Confidential
Plug-and-Play of Devices (3)
Through DHCP Option 148
Internet
1 AR
• The network administrator has deployed the
4 Proactively initiate a
DHCP service on the network in advance (by DHCP response
deploying the DHCP service on the egress 3 carrying Option registration request to iMaster
DHCP request 2 NCE.
device or deploying an independent DHCP 148
server.)
• In addition to delivering IP addresses to the
devices to be deployed, the DHCP server uses Switch to be deployed
DHCP Option 148 to notify the devices of the Site network
iMaster NCE IP address and port number.
21 Huawei Confidential
Plug-and-Play of Devices (4)
Email-based deployment
Email server 3. The site deployment personnel log in to the email box on a PC at the site and
receive the deployment email.
Site network
4. During site deployment, the site deployment personnel connect the PC to the
AR AR in wired or wireless mode and click the hyperlink in the email body. The PC
then automatically logs in to the AR, parses the parameters in the hyperlink to
Site deployment
obtain the deployment configuration of the AR, and writes the configuration
personnel 4 into the AR.
3
3 5. The AR connects to the Internet and automatically sends a registration request
to iMaster NCE.
Devices supported: AR
22 Huawei Confidential
Solution Technology: Cloud Management
WLAN User
experience management
Higher management and O&M efficiency
Site Customer flow
Inter-site VPN
management analysis
Device Analysis Portal page • After devices go online, iMaster NCE provisions all required
management customization
configurations and services. iMaster NCE delivers
Management Control
One-stop management platform
configurations to devices at the branch sites through
NETCONF, without the need of CLI-based operations. This
NETCONF/YANG simplifies network O&M.
Internet Internet • iMaster NCE performs intelligent analysis and display of the
operating status of branch sites, presenting intuitive insights
Firewall AR
into site health.
Switch Small- and • iMaster NCE provides operating status monitoring,
AP Firewall AP AR medium-
sized intelligent analysis, and remote O&M, so that O&M
campus
personnel do not need to visit sites. This improves O&M
network
efficiency and reduces O&M costs.
23 Huawei Confidential
Highlights of Huawei CloudCampus Solution for Small- and
Medium-Sized Campus Networks
⚫ Automatic deployment: Devices can be easily and quickly deployed.
⚫ Cloud-based network planning and mobile O&M: WLAN design and device O&M are simplified.
⚫ Diversified product portfolios: Huawei provides different product portfolios, including full series of
network devices (switches, firewalls, ARs, and APs), meeting diversified network requirements of
tenants.
⚫ Dual-working-mode: All network devices used in this solution can work in either cloud-based or
traditional management mode. Tenants can implement cloud management of traditional devices after
devices are upgraded.
⚫ VASs: Terminal behavior analysis is a value-added application of iMaster NCE-Campus. More VASs can
be developed based on terminal behavior analysis.
24 Huawei Confidential
Contents
25 Huawei Confidential
Overall Design Process
Overall
Network management mode Network O&M mode License scheme
design
Networking
Network architecture Networking scheme Reliability WAN interconnection
design
26 Huawei Confidential
Choose the Network Management Mode
⚫ Which management mode to use: cloud management or on-premises?
Huawei's CloudCampus Solution
Customers purchase and own software Customers purchase Huawei public MSPs purchase cloud management
such as the controller and analyzer, and cloud management services and platform software, such as the controller
Scenario deploy the software in their data center or manage their networks using the and analyzer, and deploy the software in
definition on a public cloud IaaS platform to manage cloud management SaaS services their data center or on a public cloud IaaS
their own networks. They do not provide deployed on Huawei public cloud platform to provide network management
network management services. platform. services.
Target
Large- and medium-sized campus Small- and medium-sized campus Small- and medium-sized campus
application
networks networks networks
scenario
Small- and medium-sized campus networks are small in scale and are sensitive to CAPEX and OPEX. Therefore, the public cloud management mode
is recommended for such networks. In this mode, Huawei or MSPs provide SaaS services to manage the networks.
27 Huawei Confidential
• The public cloud management mode can be Huawei public cloud management
mode or MSP-owned cloud management mode. The two modes are essentially
the same. The only difference lies in the operational entity and the provider that
offers cloud management services.
• Unless otherwise specified, the Huawei public cloud management mode is used
as an example in this document.
Choose the Network O&M Mode
⚫ Which O&M mode to use: enterprise-managed O&M (enterprises perform O&M by themselves) or MSP-managed
O&M (enterprises authorize network O&M to MSPs)?
The network O&M mode is closely related to the network management mode. If an enterprise manages the network by itself,
O&M is also performed by the enterprise. This is called enterprise-managed O&M. If an enterprise authorizes network O&M to
an MSP, this is called MSP-managed O&M.
Huawei's CloudCampus Solution supports both enterprise-managed O&M and MSP-managed O&M. Enterprises can flexibly
choose either of them as required. Platform operator
Enterprises themselves have Enterprises require managing
O&M capabilities or their own networks
MSP 1
Enterprise-managed O&M
Authorizing network Authorizing network
O&M to MSP O&M to MSP
Enterprises have many branches and
Enterprises themselves do Tenant 1 Tenant 2 Tenant N
authorize MSPs to construct and
not have O&M capabilities or
maintain their networks
28 Huawei Confidential
• The following lists the differences between the deployment processes in the
tenant-managed construction and maintenance and MSP-managed construction
and maintenance scenarios:
• Tenant-managed construction and maintenance:
▫ The tenant administrator logs in to iMaster NCE using their own account
and deploys services.
• MSP-managed construction and maintenance:
▫ The MSP administrator helps the tenant install cloud managed devices
onsite and register the cloud managed devices.
▫ The tenant administrator logs in to iMaster NCE using their own account,
chooses System > System Management > Tenant Information,
enables Authorize MSP, and sets the authorization scope. Alternatively,
when creating a tenant administrator, the MSP administrator can
enable Authorize MSP. By default, the permission of the tenant
administrator role is granted.
▫ The MSP administrator logs in to iMaster NCE using their own account.
In Tenant List on the home page, the MSP administrator selects a tenant
who applies for MSP-managed construction and maintenance and has been
authorized. The Authorization status column is displayed as Authorized.
▫ Click the tenant name to access the page for MSP-managed construction
and maintenance. The MSP administrator helps the tenant deploy services.
Choose the License Transaction/Purchase Mode
⚫ Select the cloud management deployment scenario (Huawei public cloud or MSP-owned cloud), then select the
license transaction or purchase mode accordingly.
Scenario 1: Huawei public cloud Scenario 2: MSP-owned cloud
• Licenses control the available resources of tenants. • Licenses control the available resources of the CloudCampus cloud
management platform, but not the available resources of tenants.
• Online transaction mode is supported. That is, licenses can be
purchased online from HUAWEI CLOUD. License pooling is not • Only offline transaction mode is supported. The license file needs to
supported in this mode. be loaded on the CloudCampus cloud management platform. License
pooling and co-termination are supported in this mode.
• Offline transaction mode is also supported. License activation codes
need to be loaded on the CloudCampus cloud management platform. License transaction mode Offline transaction
License pooling and co-termination
Offlineare supported in this mode.
License transaction mode Online transaction
transaction
Huawei's customer (MSP) MSP, carrier
Offline
Huawei's customer Strategic/ Channel purchase Retail
(tenant) Core NAs partners customers CloudCampus cloud management platform
30 Huawei Confidential
Choose the License Consumption and Termination Modes
⚫ In the Huawei public cloud scenario, both the co-termination and non-co-termination licensing models are
supported.
31 Huawei Confidential
Overall
Network management mode Network O&M mode License scheme
design
Networking
Network architecture Networking scheme Reliability WAN interconnection
design
32 Huawei Confidential
Network Architecture Design: Intranet Architecture (1)
Internet
Internet
Firewall
or AR
Internet Internet Internet
Firewall Aggregation Switch
or AR layer
Access Access
layer layer
AP AR Firewall AP Switch AP AP Switch AP
Stack link
(Note: Unless otherwise
specified, the symbol
indicates stacking.)
Internet Internet Internet
Firewall Firewall or AR
or AR
Core Switch Core layer Switch
layer
34 Huawei Confidential
Network Architecture Design: WAN Interconnection
Hub
HQ HQ HQ
35 Huawei Confidential
• Full-mesh: All sites of an enterprise can communicate with each other. If traffic
needs to be transmitted between the headquarters and branches or between
branches, data is directly exchanged without traversing an intermediate node.
This model is applicable to scenarios where all sites of an enterprise need to
directly access each other. This model eliminates the delay caused by traffic
transmission through the headquarters.
• Partial-mesh networking
36 Huawei Confidential
Overall Design Process
Overall
Network management mode Network O&M mode License scheme
design
Networking
Network architecture Networking scheme Reliability WAN interconnection
design
37 Huawei Confidential
Single-Device Networking
Overview
• Applicable to single stores and small stores (such as agent stores and gas
stations)
• A single device provides gateway features, such as PPPoE dialup, DHCP, and
NAT.
Network scale < 50 terminals; area < 50 m2
• An AP is deployed if only wireless access is required and only one wired
Internet egress is available.
• An AR is deployed if wired access is needed and multiple uplinks, especially
a 3G/4G backup link, are required.
Networking AP AR Firewall • A firewall is deployed if security-sensitive stores, such as small logistics,
type office, and finance organizations, require advanced security features,
including URL filtering, security protection, and antivirus.
Internet Internet Internet
Constraints
• Wireless features such as roaming and load balancing are not supported.
3G/4G • The AP supports only one Internet link.
• The AP and AR support wired user access, but do not support wired user
authentication.
• The AR supports wireless user authentication in only Open, PSK, and Portal
authentication modes, but not 802.1X or MAC address authentication
mode. The firewall provides wired user authentication and supports only
Portal authentication.
• Currently, no firewall model supports Wi-Fi and LTE, and therefore it is not
recommended in actual deployments.
38 Huawei Confidential
Egress Gateway + AP
Overview
Network scale < 200 terminals; area < 300 m²
• Applies to small- and medium-sized clothing stores, supermarkets,
shopping malls, etc.
Networking AR + AP Firewall + AP
• The egress gateway provides features such as PPPoE, DHCP, NAT, and
type LTE.
Internet Internet • This networking mode supports continuous coverage of multiple APs,
as well as multiple uplinks, including a 3G/4G backup uplink.
• APs support mesh networking.
3G/4G
• A firewall is deployed at the egress for scenarios where advanced
security features, including URL filtering, security protection, and
antivirus, need to be met.
Constraints
• The AP and AR support wired user access, but do not support wired
user authentication.
• The firewall provides wired user authentication and supports only
Portal authentication.
• If the AR or firewall does not support PoE, the AP can use an external
PoE power adapter.
39 Huawei Confidential
Egress Gateway + Layer 2 Switch + AP
Network scale < 2000 terminals; area < 3000 m²
Overview
Networking type • Applies to small- and medium-sized clothing stores, retail stores, etc.
AR + Layer 2 switch + AP Firewall + Layer 2 switch + AP
• The egress gateway provides features, such as WAN access, DHCP, and
NAT.
Internet Internet
• The Layer 2 switch provides PoE extended access and wired terminal
access functions.
3G/4G • APs provide access services for wireless terminals at the site.
• APs support mesh networking.
• A firewall is deployed at the egress for scenarios where advanced
security features, including URL filtering, security protection, and
antivirus, need to be met.
Constraints
• The AR and firewall in cloud management mode do not support Eth-
Trunks and cannot connect to the switch through Eth-Trunks.
• If switches need to be stacked, it is recommended to deploy multiple
layers of switches.
• The AR can be deployed only in a single-node system.
40 Huawei Confidential
Egress Gateway + Layer 2 Switch + Distributed AP
Network scale < 2000 terminals; area < 3000 m² Overview
Networking type • Applies to dense-room building scenarios, such as dormitories and
hotels, where network planning is not required and each room
AR + Layer switch + Firewall + Layer switch + transmits signals separately.
distributed AP distributed AP • The AR functions as the egress gateway and provides features, such as
WAN access, DHCP, and NAT.
Internet Internet
• The Layer 2 switch provides PoE extended access and wired terminal
access functions.
3G/4G • APs provide access services for wireless terminals at the site.
• APs support mesh networking.
• A firewall is deployed at the egress for scenarios where advanced
security features, including URL filtering, security protection, and
antivirus, need to be met.
Constraints
• The AR and firewall in cloud management mode do not support Eth-
Trunks and cannot connect to the switch through Eth-Trunks.
• If switches need to be stacked, it is recommended to deploy multiple
layers of switches.
• The AR can be deployed only in a single-node system.
41 Huawei Confidential
Summary of Typical Networking Schemes (1)
Deployment
Network Scale Key Networking Requirements Networking Model Remarks
Scenario
Single store; wireless access only; single Internet
AP /
egress
Single store; mainly wireless access; Ethernet or LTE
AR /
< 50 terminals; uplink Singe-device
area < 50 m 2 networking
Single store; wired and wireless authentication and
Currently, firewalls
access; multiple Internet uplinks and LTE uplinks;
Firewall have no Wi-Fi/LTE
high security requirements (URL
models.
Many branches, filtering/IPS/security protection/antivirus)
where they are Wireless access only; multiple Internet uplinks and Currently, ARs and
no demands for AR + AP
LTE uplinks firewalls do not
branch < 200 terminals; Egress gateway have PoE models.
interconnection area < 300 m² Wired and wireless authentication and access; + AP APs need to
multiple Internet uplinks; high security requirements Firewall + AP connect to external
(URL filtering/IPS/security protection/antivirus) power supplies.
Wired and wireless access; multiple Internet uplinks AR + Layer 2
/
and LTE uplinks Egress gateway switch + AP
< 2000 terminals;
Wired and wireless authentication and access; + Layer 2 switch
area < 3000 m² Firewall + Layer 2
multiple Internet uplinks; high security requirements + AP /
switch + AP
(URL filtering/IPS/security protection/antivirus)
42 Huawei Confidential
Deployment
Network Scale Key Networking Requirements Networking Model Remarks
Scenario
Dense-room scenarios such as hotels and AR + Layer 2
Many branches, dormitories; wired and wireless access; multiple switch + central /
where they are Internet uplinks and LTE uplinks Egress gateway AP + RU
< 2000 terminals;
no demands for Dense-room scenarios such as hotels and + Layer 2 switch
area < 3000 m² Firewall + Layer 2
branch dormitories; wired and wireless access; multiple + distributed AP
interconnection switch + central /
Internet uplinks; high security requirements (URL
AP + RU
filtering/IPS/security defense/antivirus)
Same as that in the Only basic communication between branches and AP/AR/firewall as
Multiple IPsec VPN
"many branches, the headquarters is required. Third-party VPN the egress /
branches, interconnection
branches, where gateways may be deployed at the headquarters. gateway
where there are
they are no
demands for
demands for Multiple links are deployed between the
communication SD-WAN AR as the egress
branch headquarters and branches, and intelligent traffic /
with the Interconnection gateway
interconnection" steering is required.
headquarters
scenario
43 Huawei Confidential
Overall Design Process
Overall
Network management mode Network O&M mode License scheme
design
Networking
Network architecture Networking scheme Reliability WAN interconnection
design
44 Huawei Confidential
Network Reliability Design
AP Switch AP
45 Huawei Confidential
Link-Level Reliability Design (1)
• Multiple links can be deployed between switches and bonded using Eth-Trunks to improve link reliability.
• When switches are stacked, it is recommended that Eth-Trunks be used across switches to ensure link reliability.
Stacking Stacking
46 Huawei Confidential
Link-Level Reliability Design (2)
Multiple links are deployed at the campus egress and work in active/standby mode. The networking scheme is as follows:
• The "single device, multiple egress links" scheme or the "multiple devices, at least one egress link for each device" scheme can
be used. The latter scheme is recommended.
• To further improve reliability, it is recommended that different egress links be connected to different carrier networks.
ISP 1 ISP 2
Heartbeat
link
Single device, dual egress links Dual devices, dual egress links
47 Huawei Confidential
Device-Level Reliability Design
Stacking Switch
Heartbeat
link
Switch
48 Huawei Confidential
▫ Two devices are deployed in the egress zone of the campus network to
work in active/standby mode. Currently, in a two-node system, firewalls
support only the hot standby mirroring mode. ARs support dual-CPE
networking, and the two devices and two egress links can work
concurrently.
AP Switch AP
49 Huawei Confidential
Overall Design Process
Overall
Network management mode Network O&M mode License scheme
design
Networking
Network architecture Networking scheme Reliability WAN interconnection
design
50 Huawei Confidential
CloudCampus WAN Interconnection Solution
Static IPsec VPN SD-WAN interconnection
MPLS
Internet
Internet
Branch HQ Branch HQ
• An IPsec VPN is a type of static VPN, in which IPsec tunnels are • EVPN can be used to establish tunnels between sites and dynamically
established between devices at different sites to create VPN tunnels. advertise routes on demand. The forwarding plane supports GRE or
Traffic is diverted to the VPN tunnels based on the configured static GRE over IPsec. In addition, high-quality links can be selected based on
routes to implement inter-site communication. applications and policies for data transmission, implementing
• Egress devices can be APs, ARs, or firewalls (firewalls can be deployed application- and policy-based intelligent traffic steering.
in standalone or hot standby mode). • The egress devices must be ARs (in standalone or hot standby mode).
51 Huawei Confidential
• An IPsec VPN is a type of static VPN, in which IPsec tunnels are established
between devices at different sites to create VPN tunnels. Traffic is diverted to the
VPN tunnels based on the configured static routes so that services between sites
can be accessed through the VPN tunnels.
• An EVPN is a type of dynamic VPN that can establish tunnels between sites and
dynamically advertise routes on demand. EVPN establishes GRE tunnels between
sites to establish VPN tunnels and supports IPsec encryption on GRE tunnels to
ensure tunnel encryption security. In addition, the EVPN solution offers
application- and policy-based intelligent traffic steering, allowing high-quality
links to be selected based on applications and policies for data transmission.
IPsec VPN Interconnection Networking Model
Network interconnection model
• The hub-spoke and full-mesh models are supported.
• The hub-spoke model is applicable when data traffic is mainly transmitted between
branches and the HQ. In this model, branches can also communicate with each other
through the HQ.
• If branches are of similar scales and a large amount of traffic is transmitted between
the branches, the full-mesh model can be used. In this case, all egress devices must
Hub-spoke Full-mesh use public IP addresses, and only firewalls support this model. In the full-mesh model,
the number of sites is limited (32 at most). Therefore, the hub-spoke model is
Network interconnection model
recommended for IPsec interconnection.
Site networking Site networking
• APs, ARs, or firewalls can be used as egress devices based on site requirements.
Internet Internet Internet Internet Internet
• In some scenarios requiring high reliability, two egress links can be deployed. In
scenarios requiring wireless uplinks, the egress gateway must be an LTE-capable
AP AR Firewall device.
• For large campus networks, the egress gateways can be deployed in hot standby mode
to ensure high reliability. Currently, only firewalls support hot standby.
Internet • In the hub-spoke model, the hub site is usually the HQ or DC site, which requires high-
Heartbeat link performance devices, rich policies, and security configurations. Currently, the cloud
management mode supports only a few security and policy features. Therefore, it is
Internet recommended that the traditional management mode be configured for devices at the
hub site, and the devices work in hot standby mode.
52 Huawei Confidential
SD-WAN Solution Overview (1)
iMaster NCE Solution overview
• The EVPN interconnection mode of the SD-WAN solution is applicable
UI
to the scenarios where a large number of branches communicate with
Site configuration VN O&M the HQ/DC (hub site). This mode can meet the networking
requirements of multiple HQs/regional centers. In this mode, the
Southbound NE layer
branches can communicate with the HQ through multiple links. In
addition, this mode supports application- and quality-based intelligent
Solution constraints
Management Control plane: BGP
GRE/IPsec VPN
channel EVPN peer relationship • ARs deployed at the HQ and branches must support SD-WAN.
53 Huawei Confidential
SD-WAN Solution Overview (2)
Network model design Physical network design
Select a network model based on the site scale and data access model. • A single AR and a single egress link can be deployed at a
small branch site.
• Single-layer model
• Multi-link and dual-AR networking can be deployed at
▫ WAN sites of an enterprise can be directly connected or connected through one or
sites that require highly reliable egress links and gateways.
more hub sites. Typically, this model is used by small- and medium-sized enterprises
as well as large enterprises with fewer than 100 sites. • In network reliability-sensitive scenarios, it is
recommended that the RR be deployed independently. In
▫ This model can be further classified into hub-spoke, full-mesh, and partial-mesh.
network reliability-insensitive scenarios, the RR can be co-
• Hierarchical model
deployed with the AR at the HQ.
▫ This model is applicable to large enterprises that span multiple areas. In this model,
the entire overlay network is divided into multiple areas. Traffic between sites in
different areas is forwarded through a border site. The hub-spoke, full-mesh, or
partial-mesh topology can be used in an area.
54 Huawei Confidential
• The single-layer network model is also called the flat network model. In this
model, WAN sites of an enterprise can be directly connected or connected
through one or more hub sites. Typically, this model is used by small- and
medium-sized enterprises as well as large enterprises with fewer than 100 sites.
The single-layer network model can be further classified into hub-spoke, full-
mesh, and partial-mesh.
55 Huawei Confidential
Overall Design Process
Overall
Network management mode Network O&M mode License scheme
design
Networking
Network architecture Networking scheme Reliability WAN interconnection
design
56 Huawei Confidential
VLAN Planning
⚫ Classify VLANs into service VLANs, management VLAN Assignment Example
VLANs, and interconnection VLANs.
• Core network area: VLANs 100–199
• Server area: VLANs 200–999 (VLANs 1000–
⚫ Allocate consecutive VLAN IDs to ensure proper VLAN assignment by
1999 are reserved.)
logical area
use of VLAN resources. • Access network area: VLANs 2000–3499
• Service network area: VLANs 3500–3999
⚫ Reserve a specific number of VLANs for future
VLAN assignment by • Area A: VLANs 2000–2199
use. geographic area • Area B: VLANs 2200–2399
⚫ Typically, VLANs are divided based on interfaces. VLAN assignment by • Department A in area A: VLANs 2000–2009
personnel structure • Department B in area A: VLANs 2010–2019
According to different design principles,
interfaces of access switches are added to • Web server area: VLANs 200–299
VLAN assignment by
• Application server area: VLANs 300–399
service type
different VLANs so that users of different service • Database server area: VLANs 400–499
types can be isolated.
57 Huawei Confidential
IP Address Planning (1)
Management IP address Service IP address
192.168.1.254
VLANIF 100 192.168.5.254
192.168.100.254 192.168.100.254
58 Huawei Confidential
IP Address Planning (2)
Egress gateway Devices such as servers and printers
59 Huawei Confidential
IP Address Planning (3)
LAN-side devices
Internet Internet
Egress Egress
gateway gateway
Layer 3
interconnection
Layer 3 switch
AP
When the egress gateway interconnects with a Layer It is recommended that the DHCP server be
3 switch, it is recommended that the interconnection deployed on the gateway to dynamically
IP addresses be manually configured in static mode. allocate IP addresses to APs.
60 Huawei Confidential
Routing Design
Internet
61 Huawei Confidential
Overall Design Process
Overall
Network management mode Network O&M mode License scheme
design
Networking
Network architecture Networking scheme Reliability WAN interconnection
design
62 Huawei Confidential
Network Deployment and Automated Device Registration
Automated network deployment
• Huawei's Cloud-Managed Network Solution supports device plug-
and-play. If the following prerequisites are met, a device can
automatically connect to a given cloud management platform after
MSP/Tenant Huawei being powered on and obtain complete service configurations from
administrator registration center
the platform, achieving device plug-and-play and fast service
provisioning.
63 Huawei Confidential
AP √ √ √ √
Firewall √ √ √
Switch √ √ √
AR √ √ √ √ √
⚫ On the same network, devices at different locations may use different registration modes. Typically, devices to be
registered on a network are classified into:
Egress gateway
Intranet (LAN-side) device
64 Huawei Confidential
Egress Gateway Registration
⚫ Egress line configuration of the egress gateway usually depends on the carrier network. Therefore, the registration
mode is complex.
⚫ In the CloudCampus Solution, ARs, firewalls, and APs can function as egress gateways.
⚫ The registration modes of egress gateways vary with scenarios. For details, see the following table.
⚫ If a DHCP server exists on the live network, the egress gateway can be registered using the DHCP option only when
the DHCP server supports DHCP Option 148.
⚫ In LAN-WAN convergence scenarios, ARs support email-based and DHCP option-based registration modes. However,
in the DHCP option-based registration mode, the DHCP server must support DHCP Option 148.
Recommended Egress Gateway Registration Mode
Networking Scenario
AR Firewall AP
Huawei public The egress gateway cannot automatically obtain an IP address. Web system Web system CloudCampus APP
cloud scenario The egress gateway can automatically obtain an IP address. Registration center
MSP-owned The egress gateway cannot automatically obtain an IP address. Web system Web system CloudCampus APP
cloud scenario The egress gateway can automatically obtain an IP address. DHCP option Web system DHCP option
LAN-WAN convergence scenario (where the SD-WAN function needs to be Email --- ---
configured on the egress gateway)
65 Huawei Confidential
Intranet (LAN-Side) Device Registration
⚫ A LAN-side network refers to the network under the egress gateway, which is mainly built on LAN
switches and APs.
⚫ In Huawei public cloud scenarios, the Huawei registration center-based registration mode is
recommended.
⚫ If an enterprise does not want to synchronize device information to the registration center, the DHCP
option-based registration mode can be used.
LAN-Side Device Registration Mode
Networking Scenario
LAN Switch AP
Huawei public DHCP options cannot be configured on the network. Registration center
cloud scenario DHCP options can be configured on the network. Registration center or DHCP option
MSP-owned cloud DHCP options cannot be configured on the network. Web system CloudCampus APP
scenario DHCP options can be configured on the network. Registration center or DHCP option
66 Huawei Confidential
Scenario-Specific Automated Deployment
Solution overview
• The scenario-specific automated deployment function is provided to
further simplify network deployment.
• Network configurations, such as SSIDs, can be automatically generated
based on the industry scenario selected by a customer. This means that
users do not need to plan or configure the network in advance,
eliminating the need for complex configuration design and planning. In
addition, users can customize a scenario template to plan the site
network so that the site network configuration can be quickly
generated for deployment.
• Currently, templates for small- and medium-sized office scenarios are
preset in the solution. Templates for other scenarios will be added in
the future.
Key design points:
• Select a service scenario, that is, select a scenario template.
• Select related devices and network topologies.
• Confirm the related configuration or adjust the preset configuration.
67 Huawei Confidential
Overall
Network management mode Network O&M mode License scheme
design
Networking
Network architecture Networking scheme Reliability WAN interconnection
design
WLAN Networking SSID Radio
Roaming
Planning Planning Planning Calibration
68 Huawei Confidential
WLAN Planning Network Planning SSID Planning Roaming Radio Calibration
Common coverage area > –75 dBm Corridor, kitchen, storeroom, and dressing room
Indoor scenario Plan the coverage radius of 15–20 m for each AP.
Outdoor scenario Plan the coverage radius of 50–80 m for each AP.
Indoor high-density Use small-angle directional antennas. During network planning, select AP positions and spacing based on the
scenario antenna angle.
To guarantee a good access and roaming experience, you need to plan proper signal coverage depending on different
application scenarios; select proper AP models based on signal coverage demands and AP capabilities; and design a proper
WLAN using the WLAN Planner.
69 Huawei Confidential
WLAN Planning Network Planning SSID Planning Roaming Radio Calibration
70 Huawei Confidential
WLAN Planning Network Planning SSID Planning Roaming Radio Calibration
1. Environment setting
2. Region setting 3
With Huawei cloud-based WLAN
3. Device deployment Planner, users can complete
WLAN planning in just five steps. • Use the network planning report to
4 provide guidance for onsite construction.
4. Signal simulation
• The network planning result can be
imported into iMaster NCE.
5. Report export
71 Huawei Confidential
▫ This tool can generate network planning files and allows users to export the
files. Users can import network planning results on the tenant management
page of iMaster NCE to display AP locations and help tenants install APs.
▫ CampusInsight allows users to import network planning files. After network
deployment, users can view the actual signal heatmap of the network.
WLAN Planning Network Planning SSID Planning Roaming Radio Calibration
Network Planning
Internet
• Number of APs: Determine the number of APs based on the WLAN planning result.
Egress gateway
• Access switch selection: PoE switches are recommended. Select switches based on the
number of APs and PoE power supply requirements of APs.
Layer 2 switch • Number of access switches: Determine the number of access switches based on the
number of APs, access relationships, and the number of ports on the selected switches.
AP AP
72 Huawei Confidential
WLAN Planning Network Planning SSID Planning Roaming Radio Calibration
SSID Planning
SSID service planning
• An SSID represents a type of services. Plan the number of SSIDs based on project requirements. Different authentication modes can
be deployed for different SSIDs.
• SSIDs can also be used to distinguish different groups of users or different services/permissions. For example, employees and guests
are configured with different SSIDs.
73 Huawei Confidential
• SSIDs are used to represent WLANs. They are WLAN names displayed on a STA
such as a mobile phone when you search for WLANs available for access on the
STA. You can select an SSID to access the corresponding WLAN.
• For an SSID that is not intended for end users, for example, the SSID planned for
printers and scanners, you can hide this SSID to prevent it from being detected by
end users.
WLAN Planning Network Planning SSID Planning Roaming Radio Calibration
74 Huawei Confidential
• Definition of Layer 2 roaming: When a STA moves between APs, the STA
smoothly switches from the original AP to a new AP. This process is called
roaming. The SSID, service VLAN, and gateway of the STA remain unchanged
before and after roaming.
• Implementation of Layer 2 roaming:
▫ The service VLANs for the SSIDs of APs must be the same, and the uplink
switch must allow traffic from the service VLANs to pass through.
▫ Roaming neighbors are discovered through the air interface, which has high
requirements on AP deployment. APs in the continuous roaming area must
be able to detect each other.
WLAN Planning Network Planning SSID Planning Roaming Radio Calibration
Roaming neighbors
of the AP through
which the STA goes
online for the first Definition of Layer 3 roaming
time • Layer 3 roaming: The service VLANs for the SSIDs before and after STA
roaming are different and correspond to different gateways. In this case,
to keep the IP address of the roaming STA unchanged, the STA traffic
needs to be detoured to an AP that resides on the same network segment
as the AP through which the STA goes online for the first time.
HAP • AP through which the STA goes online for the first time: AP that the
STA first associates with in a mobility group
AP through which the • Home AP (HAP): is selected using the hash algorithm from the neighbors
STA goes online for that belong to the same Layer 2 roaming domain as the AP through
the first time FAP
which the STA goes online for the first time. Once selected, the HAP
Guest SSID Guest SSID forwards Layer 3 roaming traffic of the STA.
VLAN 100 VLAN 200
192.168.1.25 192.168.1.25
76 Huawei Confidential
WLAN Planning Network Planning SSID Planning Roaming Radio Calibration
77 Huawei Confidential
⚫
If the number of APs exceeds the management capability of a leader AP, network planning is required. Management VLANs need to
be planned for AP grouping. When there are a large number of APs in a management VLAN, the APs are automatically divided into
multiple groups.
⚫
Radio calibration is performed on WLANs in a continuous area. Therefore, it is recommended that APs be grouped by geographic
location such as by floor to ensure that APs in a group are in the same area. This maximizes the calibration effect.
Random grouping Grouping based on management VLANs
VLAN 1000
F1 F1
VLAN 1001
F2 F2
VLAN 1002
F3 F3
If manual intervention is not performed when the number of APs In a continuous area (such as adjacent APs or APs on the same
exceeds the upper limit, APs are randomly grouped, affecting the floor), management VLANs are planned for AP grouping. A leader
calibration effect. AP is elected in each group.
78 Huawei Confidential
The leader AP
Scheduled mode: APs perform global calibration at a scheduled time every day.
delivers the
Campus calibration result.
⚫
APs perform calibration detection according to the configured mode
and switch to other channels to scan neighboring APs. The scanning
5 lasts for 15 minutes.
⚫
During the detection, the APs report the detected data to the leader AP
2 every 10s.
All APs perform
detection. 4 3 ⚫
The leader AP performs computing and calibration every 5 minutes and
The leader AP The APs report
performs computing detection data. performs computing for three times to achieve algorithm convergence.
and calibration. ⚫
The leader AP delivers the calibration result to each AP in the group,
including the calculated channel and power.
79 Huawei Confidential
• During scheduled radio calibration, you can enable intelligent radio calibration
and use the analyzer to analyze historical data of the WLAN and predict
interference sources on the network. During network optimization, APs can avoid
possible interference sources on the network in advance to improve the quality of
the entire WLAN.
• 2.4 GHz frequency band: Channel sets 1, 6, and 11 are • 2.4 GHz frequency band: Only the 20 MHz
recommended. If APs are densely deployed, channel sets 1, frequency bandwidth can be selected.
5, 9, and 13 are recommended. • 5 GHz frequency band: The 40 MHz
• 5 GHz frequency band: When an AP uses a single 5 GHz frequency bandwidth is recommended. The
radio, it is recommended that high and low frequency 80 or 160 MHz frequency bandwidth can
channels of neighboring APs be staggered. When an AP be used in bandwidth-hungry scenarios.
uses dual 5 GHz radios, it is recommended that two 5 GHz
radios be planned at low and high frequencies respectively.
80 Huawei Confidential
Overall Design Process
Overall
Network management mode Network O&M mode License scheme
design
Networking
Network architecture Networking scheme Reliability WAN interconnection
design
81 Huawei Confidential
Access Control Scenarios (1)
iMaster NCE functions as an authentication server iMaster NCE interconnects with a third-party Portal server
API
Relay agent
Third-party
(HTTP/HTTPS)
Portal server
Internet Internet
• Authentication type: HACA Portal, 802.1X, and MAC address • Authentication type: HACA Portal relay solution
authentication • Scenario description: A Portal server has been deployed, and
• Scenario description: iMaster NCE functions as an interconnects with iMaster NCE through APIs. iMaster NCE
authentication server. functions as a relay agent.
82 Huawei Confidential
Third-party
RADIUS server
Internet
Internet
Third-party
authentication server
(Portal + RADIUS)
Authentication point Authentication point
• Authentication type: HACA Portal-to-RADIUS solution • Authentication type: Portal, HTTPS Portal, 802.1X, and MAC
• Scenario description: A RADIUS server has been deployed, address authentication
and interconnects with iMaster NCE through RADIUS. iMaster • Scenario description: The network device that functions as
NCE functions as a RADIUS relay agent. an authentication point directly interconnects with a third-
party server. (Note: HTTPS Portal is configured using CLIs.)
83 Huawei Confidential
Authentication Solution Deployment
Terminal Role Guest Enterprise employee Dumb terminal
Access Mode Wireless Wireless/Wired Wired
• Portal authentication (recommended for
Authentication Portal wireless users) MAC address
Type authentication • 802.1X authentication (optional for both authentication
wireless and wired users)
Internet
Access devices are recommended as authentication points. This has the following
advantages:
• Multiple access devices perform user authentication separately, reducing the
authentication load.
Authentication • Authentication points are closer to terminals, improving authentication security.
Point • The configuration planning is simple. If authentication points are deployed at the
upper layer, the following factors must be considered: performance specifications
of the devices acting as authentication points, Layer 2 isolation at the access layer,
and configuration for transparent transmission of 802.1X protocol packets at the
access layer.
Authentication Single-device networking: The authentication point is the local device, and Portal
point for wireless authentication is recommended. (In the cloud management scenario, ARs and
users Networking firewalls do not support 802.1X or MAC address authentication.)
Scenario Other networking scenarios:
Authentication • APs are used as authentication points for wireless users.
point for wired • Access switches are used as authentication points for wired users.
users
84 Huawei Confidential
Overall Design Process
Overall
Network management mode Network O&M mode License scheme
design
Networking
Network architecture Networking scheme Reliability WAN interconnection
design
85 Huawei Confidential
Panorama of Open Cloud Management Capabilities
MSP Business Education Manufacturing Healthcare OA • Focus on mainstream
▪ Log analysis ▪ Marketing reach ▪ e-Schoolbag ▪ AGV navigation ▪ Baby ▪ Asset application scenarios.
Application wristband management • All network service data is
layer open, meeting data
monetization and operational
Provided by partners requirements.
86 Huawei Confidential
• Open capabilities at all layers, for all services, and in all scenarios help MSPs, VAS
application partners, and customers quickly implement system interconnection,
service convergence, and data monetization.
Network Management Design: Management Level
Key points of network management design:
Platform carrier • Management level design is performed to determine whether multiple or
multi-level organizations are needed to manage different sites. Huawei's
Cloud-Managed Network Solution supports the design of multiple or
MSP 1
multi-level organizations for a tenant, which meets the requirements of
managing large branches. Each organization can manage multiple sites or
sub-organizations.
Tenant 1 Tenant 2 • (Optional) Organization planning and design: A large organization with
multiple branches needs to be managed by area. That is, the organization
is divided into multiple areas to manage the branches on demand.
Organization Organization
1 n • Site planning: A network with independent network management
services is managed as a site. It can be an independent campus/branch
network, or a relatively independent network on a campus/branch
Site Site Site Site network, for example, a network of a building or even a floor. Sites can be
flexibly planned based on actual management requirements.
• Rights- and domain-based management of network administrators' rights
is adopted.
87 Huawei Confidential
Network Management Design: Rights- and Domain-Based
Management
Authorization Scope Tenant Level MSP Level
• The super administrator can grant different rights
to tenant administrators.
• The super administrator can assign different
• To facilitate rights assignment and management,
Rights-based: controls rights to MSP administrators.
the system presets three roles with different
the functions that can be • Similarly, there are three types of roles:
rights: Monitor, Open API Operator, and Tenant
performed Monitor, Open API Operator, and MSP
Administrator.
Administrator.
• Tenant administrators authorize MSP
administrators based on the preceding three roles.
• The minimum granularity of domain-based
management is site. That is, tenant administrators
perform authorization by site. Different tenant
Domain-based management cannot be configured
Domain-based: controls administrators can manage devices at different
for MSPs at different levels. Once a tenant
the range of devices that sites.
authorizes an MSP administrator, the MSP
an administrator can • When a tenant administrator authorizes an MSP
administrator can manage all devices of the
manage administrator to manage its network, domain-
tenant whatever level the MSP administrator is at.
based management is not supported. Instead, the
MSP administrator can manage all sites of the
tenant.
88 Huawei Confidential
O&M Function Panorama of CloudCampus
Visualized management and monitoring Intelligent troubleshooting
89 Huawei Confidential
Quiz
B. False
90 Huawei Confidential
1. ABC
2. B
Summary
91 Huawei Confidential
Recommendations
92 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
2 Huawei Confidential
Contents
1. CampusInsight Overview
▫ Optimization
▫ Assurance
3 Huawei Confidential
Challenges Facing Campus Network O&M
Traditional O&M is based on SNMP During traditional O&M, only device During traditional O&M, network faults
and data is collected in minutes. metrics are monitored. However, can be detected only after receiving
Once a fault occurs, data at the fault user experience may be poor when clients' complaints. As a result, faults
occurrence time cannot be obtained the metrics are normal. Traditional cannot be effectively and proactively
in real time and no convenient O&M lacks means of correlatively identified and analyzed.
backtracking method is available. analyzing the client and network.
Difficult fault locating and analysis Difficult user experience measurement Difficult to proactively identify problems
4 Huawei Confidential
Campus Network O&M Requirements: AI-Powered
Intelligent O&M
Device-Centric Network Management User Experience-Centric AI-Powered Intelligent O&M
5 Huawei Confidential
• Each region: Intuitively display the • Proactive issue identification: Proactively • Real-time simulation feedback:
network status and user experience on identify 85% of potential network issues Evaluate channel conflicts on wireless
the entire network or in each region through the AI algorithms that are continuously networks in real time and provide
through multi-dimensional evaluation of trained via Huawei's 200,000+ terminals. optimization suggestions based on the
wired and wireless network health. • Fault locating within minutes: Locate issues neighbor relationship and radio
• Each client: Display network experience within minutes, identify the root causes of information of devices on each floor.
(who, when, which AP to connect, issues, and provide effective fault rectification • Predictive optimization: Identify edge
experience, and issue) of all clients in real suggestions based on the fault reasoning APs, predict the load trend of APs,
time throughout the journey. engine. perform predictive optimization on
• Each application: Perceive experience of • Intelligent fault prediction: Learn historical wireless networks, and compare the
audio and video applications in real time, data through AI to dynamically generate a gains before and after the optimization
demarcate faulty devices quickly and baseline, and compare and analyze the baseline based on historical data analysis. This
intelligently, and analyze the root cause with real-time data to predict possible faults. practice improves the network-wide
of poor quality. performance by 50%+ (Tolly-verified).
6 Huawei Confidential
CampusInsight: Enabling Exclusive Full-Stack Intelligent
O&M
Exclusive full-stack intelligent O&M for services, users, applications, and
Smart brain of networks
networks
7 Huawei Confidential
CampusInsight: Logical Architecture
Business Services: Data analysis service based on scenarios
• Issue identification: intelligent identification of connection, air interface
performance, roaming, and device issues.
Issue Connection Performance
Service Client Application • Access analysis & performance experience: analysis of connection and
analysis analysis experience
performance experience issues.
• User and network profiles: client journey retrospection and AP details
APIs analysis.
• Application analysis: audio and video quality detection.
Intelligent analysis system
Analysis: Big data platform common
AI engine
Campus- services Data Analysis: Big data platform and data analysis service
Insight Machine learning
Spark Druid Kafka HDFS • Data storage: real-time preprocessing flow, offline distributed processing
algorithm library
Performance Machine learning flow, and data storage service.
Syslog data
counter data framework • Data analysis: mode identification, AI engine, and data aggregation and
query.
Information Reporting
8 Huawei Confidential
CampusInsight: External Interfaces
⚫ The CampusInsight southbound interface implements interconnection between CampusInsight and
devices, enabling CampusInsight to manage devices. CampusInsight supports the following southbound
interface types: SNMP, HTTP2+ProtoBuf, Syslog.
SNMP HTTP2+ProtoBuf Syslog
• Supports standard SNMPv2c and • CampusInsight uses HTTP2+ProtoBuf • The Syslog protocol is a standard for
SNMPv3. interfaces to collect device metric packets. forwarding system logs on an IP
network.
• SNMP can be used to connect • The security layer of the HTTP2 protocol uses
CampusInsight to network devices. SSL and TLS to authenticate and encrypt • Industry standard protocol used to
management protocol based on • ProtoBuf is a data serialization protocol • CampusInsight receives log data
TCP/IP. It uses UDP as the transport- developed by Google (similar to XML, JSON, reported by devices through the
layer protocol to manage network and hessian). ProtoBuf can serialize data and Syslog protocol.
devices that support proxy processes. is widely used in data storage and
communication protocols.
9 Huawei Confidential
Device Analyzer
Syslog Collection service Kafka Spark Druid/HDFS
User log Streaming
Raw data
Real-time data
Telemetry processing
Device/User Spark
performance counters Aggregated data
Offline data
Data processing
SNMP
distribution/ AI Analyzed data
Device management Data receiving
buffering algorithm
After data subscription, the collection service collects data in seconds. After the data is buffered and distributed by a high-
throughput distributed message system, each application service completes data analysis and computing based on AI
algorithms and expert experience, and saves processed data to a fast and column-based distributed data storage system.
Then pages can access the data to display related functions.
10 Huawei Confidential
CampusInsight Deployment Scenario: Independent
Deployment (Local Deployment)
Scenario Description
Internet
SW AC
Network Description
11 Huawei Confidential
CampusInsight Deployment Scenario: CloudCampus
Deployment (Local Deployment)
Scenario Description
Internet
• CampusInsight is co-deployed with iMaster NCE-Campus.
• An enterprise purchases the Huawei cloud management platform (iMaster NCE-
Campus and CampusInsight) and deploys the platform in the enterprise data center.
O&M personnel of the enterprise maintains the cloud management platform and
enterprise network. The platform is used within the enterprise. The enterprise
SW AC
purchases related licenses from the Huawei service team.
Network Description
• Management and intelligent analysis are supported for Huawei cloud switches, cloud
AP AP ACs, and cloud APs. For details about supported device models, see the iMaster NCE-
CampusInsight Specifications List.
• An enterprise deploys CampusInsight and iMaster NCE-Campus in the enterprise data
center, and manages devices through iMaster NCE-Campus. CampusInsight
synchronizes device management information from iMaster NCE-Campus.
12 Huawei Confidential
CampusInsight Deployment Scenario: CloudCampus
Deployment (Huawei Public Cloud Scenario)
Scenario Description
Huawei
• In the Huawei public cloud scenario, the cloud management platform (iMaster
NCE-Campus and CampusInsight) is uniformly managed by the cloud
management and operations team of Huawei and provides the SaaS service for
Internet end users.
• Tenant network devices are connected to the Huawei cloud management
platform through the carrier network.
Network Description
AC AC
SW SW • Management and intelligent analysis are supported for Huawei cloud switches,
cloud ACs, and cloud APs. For details about supported device models, see the
Tenant 1 Tenant N iMaster NCE-CampusInsight Specifications List (CloudCampus).
• Huawei cloud management and operations team deploys CampusInsight and
iMaster NCE-Campus on Huawei data public cloud, and manages devices through
AP AP AP AP the iMaster NCE-Campus. CampusInsight synchronizes device management
information from iMaster NCE-Campus.
13 Huawei Confidential
14 Huawei Confidential
1. CampusInsight Overview
▫ Optimization
▫ Assurance
15 Huawei Confidential
Meeting Real-Time Analysis Requirements Based on the
Telemetry Technology
SNMP Telemetry
Traditional NMS
SNMP Telemetry
• Protocol development stagnation --- SNMP is designed for • Based on HTTP2 and ProtoBuf.
limited processing capabilities. • Subscription-based release and on-demand use.
• Polling technology --- The minute-level polling cycle • Efficient encoding and decoding technology to obtain
cannot meet the service requirements of real-time multiple data records at a time, implementing second-
management. level data acquisition.
• Rigid data structure --- Fixed data structures are defined, The quasi-real-time data acquisition capability is the key
and multiple data requests are required to complete each dependency for the analyzer to mine data.
effective data collection.
16 Huawei Confidential
Monitoring Telemetry Metrics on Wireless Networks
⚫ Monitor key metrics on wireless networks based on the telemetry technology, display the wireless
network quality from the AP, radio, and client dimensions, and proactively identify air interface
performance issues, such as weak-signal coverage, high interference, and high channel utilization.
Real-time data display Automatic issue identification
Display key metrics on wireless networks and Automatically identify air interface performance issues based on AI algorithms,
single out abnormal metric status. correlative analysis, and exception modes.
Measured
Measurement Metric Supported Device Type Default Collection Period
Object
AP CPU usage, memory usage, and number of online clients AP 1 minute
Client RSSI, negotiated rate, packet loss rate, and latency AP 1 minute
17 Huawei Confidential
Measured Default
Measurement Metric Supported Device Type
Object Collection Period
CPU usage Switch and AC 1 minute
Device/
Card Memory usage Switch and AC 1 minute
18 Huawei Confidential
Contents
1. CampusInsight Overview
▫ Optimization
▫ Assurance
19 Huawei Confidential
Health Quality Evaluation Radio Heat Spectrum Terminal
Reports Map Analysis Dialing Test
• Intuitive insights into campus network health based on multi-faceted wired and wireless network health monitoring, implementing intelligent,
simplified campus network O&M.
• Network health topology as a uniform portal for rapidly handling network and device problems in local buildings, simplifying network O&M.
20 Huawei Confidential
21 Huawei Confidential
Health Quality Evaluation Radio Heat Spectrum Terminal
Reports Map Analysis Dialing Test
22 Huawei Confidential
1. Choose Health > Wireless 2. In fulfillment rate rankings, the 3. Check data of the multiple dimensions. It is
Health. fulfillment rate of Shenzhen campus is found that the quality evaluation result of the
lower than that of other campuses. Click coverage is Good, which is below the industry
Shenzhen. The quality evaluation data of benchmark. Click the RSSI fulfillment rate metric
Shenzhen campus is displayed. to drill down data for analysis.
23 Huawei Confidential
Health Quality Evaluation Radio Heat Spectrum Terminal
Reports Map Analysis Dialing Test
4. On the RSSI fulfillment rate analysis page, two weak-signal coverage issues are detected. Click
the link in the Issue Name column to go to the issue details page and check the specific issue.
24 Huawei Confidential
Health Quality Evaluation Radio Heat Spectrum Terminal
Reports Map Analysis Dialing Test
3. View the abnormal monitoring item. Click Issues to go to the issue analysis page,
view the root cause and rectification suggestions, and resolve the anomaly.
25 Huawei Confidential
Health Quality Evaluation Radio Heat Spectrum Terminal
Reports Map Analysis Dialing Test
26 Huawei Confidential
3. Immediate Sending: Set Report Start and End Time and Receiving Mode for the
2. Scheduled Sending: Set Send Time and Notify User report. The report then is generated immediately. (Download immediately: The
Group for the report. The report then is sent to the
report can be directly downloaded from the browser. Send by email: The report is
specified email boxes at the specified interval. immediately sent to the specified email boxes.)
27 Huawei Confidential
Health Quality Evaluation Radio Heat Spectrum Terminal
Reports Map Analysis Dialing Test
Ability Description
Wi-Fi signal strength at each location of the
By RSSI
simulation floor.
Indicates the attainable Wi-Fi access rate at each
By rate
location of the simulation floor.
Simulate the signal strength and conflict of each Detect and rectify weak signal coverage
By Channel areas in a timely manner due to obstacles.
floor on the specified channel.
28 Huawei Confidential
• The service topology collects statistics on the status, access, congestion, and error
packet issues, displays the number of clients and traffic volume based on sites,
regions, buildings, and floors. This allows administrators to quickly search for and
view the buildings that users pass by, helping administrators quickly identify
campus network issues.
29 Huawei Confidential
Health Quality Evaluation Radio Heat Spectrum Terminal
Reports Map Analysis Dialing Test
Save
Using radio heat map, CampusInsight can simulate Wi-Fi coverage based on the radio signal transmission model upon changes of the radio
environment or signal configuration. In this manner, CampusInsight can proactively identify coverage holes and areas affected by conflicts,
and provide references for filling coverage holes and adjusting network configurations
30 Huawei Confidential
Health Quality Evaluation Radio Heat Spectrum Terminal
Reports Map Analysis Dialing Test
31 Huawei Confidential
• The Spectrum Analysis tab page displays the channel status and surrounding
interference of APs, including the channel utilization, current working channel,
historical trend of channel status, non-Wi-Fi interference sources, Wi-Fi
interference sources, and Wi-Fi interference source distribution, facilitating device
status analysis.
32 Huawei Confidential
Health Quality Evaluation Radio Heat Spectrum Terminal
Reports Map Analysis Dialing Test
The changes of
dialing test
metrics are
displayed in
different colors.
33 Huawei Confidential
• Note: Intranet servers are required for testing the intranet speed, intranet file
download rate, and video experience.
Health Quality Evaluation Radio Heat Spectrum Terminal
Reports Map Analysis Dialing Test
34 Huawei Confidential
Health Quality Evaluation Radio Heat Spectrum Terminal
Reports Map Analysis Dialing Test
Metrics
overview
Gateway
AP
Test
details
Dialing test terminal
(with CloudCampus APP installed)
35 Huawei Confidential
1. CampusInsight Overview
▫ Optimization
▫ Assurance
36 Huawei Confidential
CampusInsight: Individual and Group Issue Analysis
During campus network O&M, administrators encounter the following types of issues:
1. Individual issues: for example, access failures caused by incorrect client configurations.
2. Group issues: for example, group authentication failures caused by authentication server faults and group weak-signal
coverage issues caused by insufficient AP coverage.
37 Huawei Confidential
CampusInsight: Fault Reasoning
Fault analysis Precise root cause analysis
Symptom: Client access fails at the
authentication phase.
⚫ Accurate matching of fault scenarios
Data collection The authentication mode is 802.1x
⚫ Automatic identification of root causes
Fault occurring authentication.
Telemetry ⚫ Optimal rectification suggestions
Syslog ⚫ 140+ fault reasoning rules
The last packet for protocol interaction
is EAP-Failure.
38 Huawei Confidential
Individual Issue Group Issue
1. Unable to analyze the phase where access failures occur Identify network experience issues of individual
2. Unable to analyze client locations and experience clients in E2E mode and analyze the root causes
3. Unable to effectively detect application quality of the issues.
39 Huawei Confidential
Individual Issue Journey Analysis Access Analysis Experience Analysis Application Analysis
40 Huawei Confidential
Individual Issue Journey Analysis Access Analysis Experience Analysis Application Analysis
41 Huawei Confidential
Individual Issue Journey Analysis Access Analysis Experience Analysis Application Analysis
High packet loss rate, poor signal quality, and weak-signal coverage issue.
42 Huawei Confidential
Individual Issue Journey Analysis Access Analysis Experience Analysis Application Analysis
1. Click Clients. 2. Enter l0***14 in the search box, and click Search.
3. Click the MAC address to go to the client journey page. (For detailed operations, see the next slide.)
43 Huawei Confidential
• Note: The process of viewing wired user experience visibility is the same as that
of viewing wireless user experience visibility.
Individual Issue Journey Analysis Access Analysis Experience Analysis Application Analysis
2. Check the experience metric trend. The client experience deteriorates significantly after a period of connecting to the
Wi-Fi, with poor signal quality (< -65 dBm) and a high packet loss rate (> 5%).
44 Huawei Confidential
Individual Issue Journey Analysis Access Analysis Experience Analysis Application Analysis
Using client journey, CampusInsight focuses on the real Wi-Fi experience of clients and accurately traces the entire Wi-Fi access process of
each client (regarded as a sensor). The traced information includes: client, time, location, connected AP, experience, and issue.
45 Huawei Confidential
Individual Issue Journey Analysis Access Analysis Experience Analysis Application Analysis
Intuitive display of
abnormal phases.
Root Cause: Check root causes
3
Check possible causes and rectification Step 3 Analyze the root causes of issues based
suggestions. on the characteristics of protocol packets.
46 Huawei Confidential
Individual Issue Journey Analysis Access Analysis Experience Analysis Application Analysis
1. Click Protocol Trace. 2. Click the Switch Client icon. 3. Enter l0***14 in the search box, and click Select.
4. Related data is displayed. (For detailed operations, see the next slide.)
47 Huawei Confidential
• Note: The procedure for locating wired access problems is the same as that for
locating wireless access problems.
Individual Issue Journey Analysis Access Analysis Experience Analysis Application Analysis
3. During the DHCP interaction, the client sends a DHCP request to the DHCP
server, but the DHCP server sends back a NAK packet.
4. The most possible root cause of the fault is that the DHCP
address pool does not have available IP addresses. It is
recommended that the range of available IP addresses in the
address pool be expanded.
48 Huawei Confidential
Step2 AI Analysis
Use the correlation analysis
algorithm to analyze the
network metric with the
highest relevance and locate
the root cause.
49 Huawei Confidential
Individual Issue Journey Analysis Access Analysis Experience Analysis Application Analysis
Step3 AI Closed-loop
Management
Provide the most reasonable
rectification suggestions
based on Huawei's
accumulated O&M expertise.
50 Huawei Confidential
Individual Issue Journey Analysis Access Analysis Experience Analysis Application Analysis
Every Every
Every user
moment application
51 Huawei Confidential
• Application analysis:
▫ Application analysis monitors network-wide applications and supports
NetStream and service awareness (SA) data sources. This module displays
overview data such as the number of applications and traffic, and sorts
applications by traffic in ascending or descending order. In wired scenarios,
SA can be configured only on access switches, and the incoming and
outgoing traffic displayed on the page is the incoming and outgoing traffic
over the data reporting devices.
• eMDI: Enhanced Media Delivery Index
• RTP: Real-time Transport Protocol
• iPCA: Packet Conservation Algorithm for Internet
Individual Issue Journey Analysis Access Analysis Experience Analysis Application Analysis
52 Huawei Confidential
Individual Issue Journey Analysis Access Analysis Experience Analysis Application Analysis
53 Huawei Confidential
Individual Issue Journey Analysis Access Analysis Experience Analysis Application Analysis
⚫ Retrospect the application usage based on client journey. (For details, see "Journey Analysis".)
54 Huawei Confidential
Individual Issue Journey Analysis Access Analysis Experience Analysis Application Analysis
55 Huawei Confidential
• The application details page displays the application experience awareness and
poor-QoE analysis.
▫ The Metric Overview area displays the average packet loss rate, average
jitter, disorder rate, packet rate, and byte rate of the session.
▫ If the device role is correctly set on the resource side and LLDP is enabled,
the Analysis and Demarcation area displays the full link topology of the
session from the initiator to the responder. You can view devices such as
APs, switches, and ACs that the session passes through. When a device is
faulty, the device is marked in red and displayed as a poor-quality device.
▫ Application quality and air interface: You can click a device to view the
performance metrics of the device and its interface or air interface in the
session.
▪ The device metrics include the MOS value, packet loss rate, maximum
number of consecutively lost packets, jitter, disorder rate, and
deterioration time ratio.
1. Choose Clients. 2. In the VIP view, click the MAC address hyperlink of user d0***06.
56 Huawei Confidential
Individual Issue Journey Analysis Access Analysis Experience Analysis Application Analysis
57 Huawei Confidential
Individual Issue Journey Analysis Access Analysis Experience Analysis Application Analysis
⚫ Analysis and demarcation: Check the physical topology paths of application flows and actual application paths. The
location where air interface quality is poor is marked using a yellow line. The issue is suspected to be on AP4.
58 Huawei Confidential
Individual Issue Journey Analysis Access Analysis Experience Analysis Application Analysis
59 Huawei Confidential
1. In the digital era, passive O&M performed after events occur cannot ensure service experience.
2. More intelligent methods are required to automatically identify potential faults and accurately locate root causes to reduce the fault response time.
Identify potential faults: The fault response time is reduced from hours to minutes.
Roaming Device
⚫ Network status: Switch port error-down, Intermittent port
⚫ Repeated roaming disconnection, etc.
⚫ Roaming exception ⚫ Network performance: Layer 2 loop, Port congestion, etc.
⚫ Device environment: Device offline, Switch LPU fault, etc. Wireless
⚫ Device capacity: Abnormal switch ARP entry increasing,
Switch CPU threshold exceeded, etc. Wired
60 Huawei Confidential
Individual Issue Group Issue
61 Huawei Confidential
Individual Issue Group Issue
62 Huawei Confidential
Group Issue Connection Issues Performance Issues Device Issues
Number of clients
▫ Noise reduction for abnormal terminals (as shown by section B in
the right figure): Exclude impacts of individual terminal factors.
The access failure rate increases due to faulty terminals.
Although the access failure rate already exceeds the threshold,
but it does not indicate that a network fault occurs.
▫ Intelligent fault identification (as shown by section C in the right
Time axis
figure): Intelligently identify group issues with large impact Green curve: number of users
scopes (issues with a large number of failed clients and a large Blue curve: access failure rate
failure rate). Gray shadow: failure rate baseline
63 Huawei Confidential
Group Issue Connection Issues Performance Issues Device Issues
64 Huawei Confidential
Group Issue Connection Issues Performance Issues Device Issues
1. Click Issue Analysis. 2. Click the connection issue tab and click Timed Out Authentication.
The page of authentication failure issues is displayed.
3. Click Statistics and view the statistical analysis chart "Number of Clients & Authentication Failure Ratio".
(For the analysis details, see the next slide.)
65 Huawei Confidential
Group Issue Connection Issues Performance Issues Device Issues
4. Under Original Issue List, click the issue-specific hyperlink to navigate to the
issue details page.
66 Huawei Confidential
67 Huawei Confidential
68 Huawei Confidential
Group Issue Connection Issues Performance Issues Device Issues
1. Click Issue Analysis. 2. Click the air interface issue tab and click Weak-Signal Coverage. The page of weak-signal coverage
issues is displayed.
3. Click Original Issue List. In the issue list, click the first issue. The issue details page is displayed. (For
detailed operations, see the next slide.)
69 Huawei Confidential
Group Issue Connection Issues Performance Issues Device Issues
70 Huawei Confidential
71 Huawei Confidential
Group Issue Connection Issues Performance Issues Device Issues
72 Huawei Confidential
Group Issue Connection Issues Performance Issues Device Issues
1. Click Issue Analysis. 2. Click the air interface issue tab and click High Interference. The page of high interference issues is displayed.
3. Click Original Issue List. In the issue list, click the first issue. The issue details page is displayed.
(For detailed operations, see the next slide.)
73 Huawei Confidential
Group Issue Connection Issues Performance Issues Device Issues
74 Huawei Confidential
Group Issue Connection Issues Performance Issues Device Issues
3. CampusInsight provides the possible cause (co-channel interference by neighboring AP N5-2F-3) and suggestions
(radio calibration).
75 Huawei Confidential
• Monitors KPIs and exception logs of all ports based on the Telemetry + Syslog mechanism, identifies Layer 2 loop
ports, and quickly locates them.
• Displays the list and locations of loop ports.
• Works together with the controller to eradicate loops.
76 Huawei Confidential
• Key Technologies:
▫ To improve network reliability, redundant devices and links are usually used
on an Ethernet switching network. However, due to network adjustment,
configuration modification, upgrade, and cutover, data or protocol packets
are often forwarded in a ring, which inevitably leads to loops.
▫ Topology-based loop path display: Restores the loop path of a Layer 2 loop
based on the switch neighbor relationship.
Group Issue Connection Issues Performance Issues Device Issues
1. Choose Health > Pending Issues. This displays existing issues. From this list, we can see that a Layer 2 loop occurred. Expand the list
to view further details.
Issue details: Displayed the ports where the loop occurred, loop occurrence time, and issue status.
Topology restoration: Displayed information about the ports where the loop occurred, and
restored the devices and ports affected by the loop based on the topology.
77 Huawei Confidential
Group Issue Connection Issues Performance Issues Device Issues
Impact analysis: Detected a broadcast packet surge caused by the loop, which severely affected services.
78 Huawei Confidential
Outlier detection
79 Huawei Confidential
• Issue Identification:
▫ Outlier detection algorithm typical scenario: The negotiated rate supported
by a terminal is different from that supported by the switch port connected
to the terminal. As a result, the bit error rate of the port is significantly
higher than that of other switch ports.
2. Guide customers to test port cables in order to figure out whether error
packets are caused by cable aging or internal crosstalk.
Group Issue Connection Issues Performance Issues Device Issues
1. Choose Service Topology. 2. Error packets are detected on the network of Shenzhen.
Directly click the issue to bring up further details.
80 Huawei Confidential
Group Issue Connection Issues Performance Issues Device Issues
Skewness analysis: According to the historical big data Exception identification: Check the number of error
analysis and the skewness algorithm, the number of error packets on the port and discover that error packets
packets on the faulty port is significantly greater than that on on the port are persistent in each period.
other ports. This indicates that the port is faulty.
81 Huawei Confidential
Group Issue Connection Issues Performance Issues Device Issues
Root cause analysis: Troubleshooting suggests that the virtual-cable-test command is run on the device to test the
Ethernet cable. Crosstalk is discovered on the network and is rectified after the Ethernet cable is replaced.
82 Huawei Confidential
83 Huawei Confidential
Group Issue Connection Issues Performance Issues Device Issues
2. On the Pending Issues page, the port of Edge-1 device frequently alternates between Up and Down states.
84 Huawei Confidential
Group Issue Connection Issues Performance Issues Device Issues
Issue analysis: According to the statistics on port Down events, the port frequently alternates between Up and Down
states and this symptom persists for a long period of time.
85 Huawei Confidential
Group Issue Connection Issues Performance Issues Device Issues
86 Huawei Confidential
1. CampusInsight Overview
▫ Assurance
87 Huawei Confidential
AI-powered Intelligent Radio Calibration Improves Network-
wide Performance
88 Huawei Confidential
• Simulation feedback: CampusInsight evaluates the radio score and the number of
APs waiting for calibration based on the radio and neighbor information of APs,
displays the calibration simulation effect through the AI algorithm, and provides
channel adjustment suggestions. The APs with this function must be deployed on
the floor.
• Intelligent radio calibration: Historical big data is analyzed using the AI algorithm.
Network devices periodically request big data and the analytics results based on
the calibration policy to implement intelligent radio calibration.
Scenario 1: Providing Optimal Channel Planning Suggestions
Based on Neural Network Simulation Feedback (1)
Problem Challenge
An IT engineer optimizes the network in the area where a Expert experience-based optimization, high professional
fault is reported. However, faults are reported in requirements; heavy analysis workload; wireless network not
surrounding areas after the optimization. The optimization planned from the entire network perspective in manual
is performed multiple times in several days, but the mode.
optimization result is not satisfactory, and the network
stability becomes worse.
89 Huawei Confidential
Scenario 1: Providing Optimal Channel Planning Suggestions
Based on Neural Network Simulation Feedback (2)
Technical Root Cause Wireless Network Simulation Feedback Solution
Reinforcement learning
11 11 11 11 Opti mal i teration benefi ts
6 11 11 6 6 6
1 1 1 1 Real time data Input
Output
6 6 11 11 11 11 C onfi guration Signal
Configuration
6 6 6 6 and nei ghbor
C hannel
i nformati on AI
Interference between APs caused Two APs using channel 1 are too
by improper channel planning close to each other. As a result, the
two APs interfere with each other. Neural network reasoning Optimized benefit forecast
C onfi guration Quali ty scoring
recommendati on by
Technical root cause: The impact of inter-AP interference, probabi li ty
surrounding interference, and distance must be fully
Expected result: network-wide optimal reasoning to properly allocate
considered during AP configuration. In most cases,
air interface resources; simulation capability (customers evaluate the
optimization can only ensure that the local network is at its
simulation result based on network scores and determine whether to
optimal state, and comprehensive network-wide evaluation
deliver the simulation result).
cannot be provided.
90 Huawei Confidential
Scenario 2: AI-Powered Predictive Calibration
Challenge: How to efficiently use spectrum resources based on AP load data?
On a wireless network, APs are busy to different extents. How to accurately predict the load trend of each AP and perform differentiated predictive
calibration on the entire network?
Solution: Integrates multiple prediction models to accurately predict AP loads and implement differentiated radio calibration.
Load Trend Optimization Time Differentiated radio calibration: APs with heavy
loads preferentially select clean channels.
Traditional calibration:
based on historical data Device
Yesterday Today “Tomorrow” Data
91 Huawei Confidential
Case 14: AI-Powered Predictive Calibration (1)
Case: The wireless network office area of a company was upgraded and reconstructed. Employees were temporarily moved to building C4for centralized office.
As a result, the number of employees in building C4 increased, and the network load also increased. Employees complained that the wireless network response
was getting slower. Using the intelligent radio calibration, CampusInsight automatically identified high-load areas in building C4 and accordingly adjusted APs'
frequency bandwidth, thereby improving client bandwidth and network experience.
1. Choose Intelligent Radio 2. Enable intelligent radio calibration. You are advised to enable this function in
Calibration and Big Data Calibration. advance to improve the data training accuracy.
92 Huawei Confidential
Case 14: AI-Powered Predictive Calibration (2)
3. Click Next. On the Load Optimization page, many high-load APs are identified by 4C-3F.
93 Huawei Confidential
Case 14: AI-Powered Predictive Calibration (3)
4. On the second day after big data calibration is enabled, the bandwidth of the APs on the third floor of building C4 is
increased to 252 Mbps (by 50%) and the average channel utilization is reduced to 4% (by 50%).
94 Huawei Confidential
Case 14: AI-Powered Predictive Calibration (4)
5. Check the calibration details. The 5 GHz frequency band of the high-load APs on the third floor of building 4C is
changed from 20 MHz to 40 MHz. The Internet access experience is improved and no frame freezing occurs.
Note: If the frequency band of APs increases, the client bandwidth will also increase.
95 Huawei Confidential
1. CampusInsight Overview
▫ Optimization
◼ Assurance
96 Huawei Confidential
RSSI-Based Wireless Location and Fine-Tuned O&M Based
on Terminal Locations
Upper-layer applications
Application layer ……
Location
provided by partners.
(provided by a third party) Customer flow IT service
analysis statistics collection system
… Supported functions
• Walkable Path, Heat Map of
Pedestrian Flow, Interference,
Network layer Terminal Display
Major scenarios
Terminal layer • Shopping malls, supermarkets,
office spaces
97 Huawei Confidential
• Note:
▫ This version supports only RSSI-based wireless location, and other location
methods are not supported.
98 Huawei Confidential
Case 15: Wireless Location (1)
Case: During the pandemic, a scenic spot wishes to strictly control personnel contact to reduce the pandemic spreading risks. The wireless location function
enables administrators to check the client heat map in a specified period of time and identify crowded areas. In this manner, the scenic spot managers can
perform crowd dispersing in advance and reduce contact risks.
1. Choose Service Topology > Enter 2. Select Shenzhen > N5 > N5-2F from the left navigation tree, and click Wireless Location.
WLAN Topology.
99 Huawei Confidential
Case 15: Wireless Location (2)
3. On the Settings page, enable Heat 4. Check the Heat Map of Pedestrian Flow. The crowded location can be identified by
Map of Pedestrian Flow, and click OK. switching the time segment.
employees' office seats. The fault is rectified after the interference sources are eliminated.
1. Choose Issue Analysis > High Interference, click Original Issue List and click the issue.
2. On the high-interference issue analysis page, query the specific interference source information.
1. ABCD
Summary
⚫ Wide area networks (WANs) have undergone a long history, and the technologies
used on WANs have been updated many times. Enterprises have more diversified
requirements over WANs than campus networks. In addition, the requirements for
network connection mode, reliability, and security vary with enterprises.
⚫ To meet the interconnection requirements of different enterprises, a variety of
WAN interconnection technologies are developed.
⚫ This course will focus on the WAN interconnection technologies and their
application scenarios.
2 Huawei Confidential
Objectives
3 Huawei Confidential
Contents
4 Huawei Confidential
What Is a WAN?
⚫ WANs provide interconnection services across regions, cities, and countries. A WAN usually spans a
long distance (dozens or even thousands of kilometers). To meet long-distance transmission
requirements on a WAN, optical fibers are often used as the interconnection media.
LAN WAN LAN
DC
Branch
ISP
HQ Residents
5 Huawei Confidential
• LAN
• WAN
▫ WANs provide wider coverage than LANs and metropolitan area networks
(MANs). The communication subnet of a WAN mainly uses the packet
switching technology. The communication subnet of a WAN can use the
public packet switching network, satellite communication network, and
wireless packet switching network to interconnect the LANs or computer
systems in different areas for resource sharing.
enterprises. Branch
site Enterprise WAN
⚫ Generally, enterprise WAN interconnection
WAN
7 Huawei Confidential
Major Enterprise WAN Interconnection Modes
⚫ Generally, enterprise WANs can be interconnected in the Enterprise WAN interconnection networking
following modes:
Carriers' transmission or MPLS private lines are used to connect
regional networks. This mode is expensive and is applicable to HQ HQ
enterprises with high SLA requirements.
⚫ Usually, enterprise WANs are interconnected using a Branch site Branch site Branch site
combination of the preceding modes.
8 Huawei Confidential
• SLA is an agreement between the network service provider and the customer. It
defines terms such as service type, service quality, and customer payment.
9 Huawei Confidential
Enterprise WAN Interconnection Technologies: Internet and
VPN
⚫ With the development of the Internet, some enterprise services can be Internet and VPN technologies
carried over the Internet.
⚫ The Internet has security risks, so VPN technology is used to provide secure
Enterprise Enterprise
and reliable connections. HQ HQ
⚫ Virtual Private Dial-up Network (VPDN) technologies, such as Point-to-Point
Tunneling Protocol (PPTP), Layer 2 Tunneling Protocol (L2TP), and Point-to-
Point Protocol over Ethernet (PPPoE), allow terminal users or branches to
dial up to the carrier network or HQ network.
10 Huawei Confidential
Common Application Scenarios of Enterprise WAN
Interconnection Networking
⚫ Enterprise WAN interconnection needs to be deployed based on enterprise requirements. For example, in the financial service
industry, most enterprises lease transmission or MPLS private lines to guarantee network reliability and security. Considering network
costs, other enterprises usually lease MPLS private lines as primary lines and Internet + VPN lines as backup lines.
WAN interconnection in the financial service industry WAN interconnection for a wine enterprise
Enterprise
Core backbone network
HQ
Enterprise HQ
SDH/MSTP/MPLS
Branch service
network
Level-1 branch
Branch LAN MPLS (primary) Internet (backup)
SDH/MSTP/MPLS
GRE over IPsec
Level-2 Level-2
Branch LAN
branch branch
SDH/MSTP/MPLS
11 Huawei Confidential
Contents
12 Huawei Confidential
Enterprise WAN Interconnection Networking Solution
⚫ There are many interconnection modes for enterprise WANs. Generally, one or more interconnection
modes are used based on different enterprise requirements.
Bare
fiber/SDH/WDM/
Enterprise MSTP Transmission
branch private line
CE PE PE HQ
Enterprise MPLS VPN MPLS private
branch line
CE
Enterprise
branch
Internet
CE
Enterprise
branch 4G/5G
13 Huawei Confidential
Comparison Between Private Line and VPN Technologies
⚫ Private lines were introduced very early. They can meet interconnection requirements of enterprises and ensure high network
reliability and security. However, private lines are expensive.
⚫ As networks develop, VPN technologies start to occupy more market shares. However, some industries demanding high security and
reliability, such as the financial service industry, still prefer private line technologies.
⚫ Selecting private line or VPN technologies depend on enterprises' services. The following table compares the two technologies.
14 Huawei Confidential
Overview of Carriers' Private Lines
⚫ Carriers have a large number of line resources and launch different private line services based on different industries and scenarios.
⚫ Carriers' high-quality transmission private line services mainly include SDH, MSTP, and bare fiber services, which are expensive but
deliver excellent performance.
⚫ MPLS VPN is another type of private line services provided by carriers. MPLS VPN private lines provide slightly lower performance
than transmission private lines but are less expensive.
Carrier's private line (private line network in the financial service industry) Carrier's private line (MPLS VPN network of a provincial library)
15 Huawei Confidential
Overview of Enterprise-Built Private Line and VPN
⚫ Enterprises can establish VPNs, such as SSL VPN, DSVPN, and IPsec VPN, through carriers' networks.
⚫ Some large enterprises can lay out optical fibers by themselves and set up private lines. However, only few enterprises can lay out
optical fibers by themselves.
⚫ VPNs built by enterprises are more and more widely used because they are cost-effective, easy to expand, and controllable.
Enterprise-built VPN (VPN of a provincial library) Enterprise-built private line (MPLS VPN network of the energy industry)
Municipal Municipal
National backbone
library library
network
16 Huawei Confidential
Contents
17 Huawei Confidential
Overview of Private Line Technologies
⚫ Private line technologies were introduced very early. As networks develop, many private line
technologies, such as frame relay (FR) and ATM, are no longer used. Currently, the following
private line technologies are widely used:
Bare fiber: Carriers provide bare fibers along which no intermediate device is deployed. Therefore,
bare fibers are expensive.
SDH/MSTP/WDM: Transmission private lines use transmission devices to build hard pipes over
optical fibers, ensuring good performance. The price of such private lines is lower than that of bare
fibers.
MPLS VPN: MPLS private lines use Ethernet for network access and do not have hard pipes. The
performance of MPLS VPN is poorer than that of transmission private lines, but MPLS VPN is the
cheapest among all types of private lines.
18 Huawei Confidential
Overview of Bare Fibers
⚫ A carrier provides a bare fiber line along with no intermediate device is deployed. The network capacity
depends on the enterprise devices at both ends of the bare fiber.
⚫ Bare fibers are charged based on the distance. A longer distance indicates a higher cost. Generally, the
maximum transmission distance of a hop of an optical fiber is 300 km. If the distance between two
sites exceeds 300 km, a regeneration device needs to be deployed.
Optical network
19 Huawei Confidential
Exemplary Application Scenario of Bare Fibers
Application scenario of bare fibers
Main
campus ISP1 ISP2
• Carriers' bare fibers can be leased to build network connections between the main campus and branch campus in the
same city. This practice simplifies network management and access authentication management.
20 Huawei Confidential
Overview of SDH/MSTP/WDM Private Lines
⚫ Enterprises that require long-distance transmission and high network reliability and security can lease
SDH/MSTP/WDM private lines.
⚫ This type of private line is a transmission private line. Tenants exclusively occupy part of the bandwidth of the
transmission private line. Because multiple users share the transmission private line, its price is lower than that of
bare fibers. Although transmission private lines are shared by tenants, they exclusively occupy bandwidth and use
hard pipes. Therefore, they deliver high network reliability and security.
⚫ MSTP and WDM private lines are widely used on the live network, and SDH private lines are still used in a few
areas.
Enterprise branch Carrier Enterprise HQ
SDH/MSTP/ SDH/MSTP/
WDM WDM
device device
Transport network
21 Huawei Confidential
• WDM uses multiple lasers to transmit multiple beams of lasers with different
wavelengths over a single optical fiber. The transmission bandwidth of WDM
devices is high, and the live-network bandwidth can reach up to 8 Tbit/s.
Exemplary Application Scenario of SDH/MSTP/WDM Private
Lines
Application scenario of SDH/MSTP/WDM private lines
HQ
MSTP/SDH
Branch Branch
MSTP/SDH MSTP/SDH
Sub-branch Sub-branch
• To ensure high reliability and security, MSTP or SDH private lines are used for interconnection between financial service branches.
22 Huawei Confidential
MPLS VPN Private Line
⚫ MPLS VPN technology is widely used in enterprise interconnection scenarios. MPLS L2VPN or MPLS
L3VPN can be deployed based on enterprise requirements. MPLS VPN makes a compromise between
the cost and performance, so it is very popular.
⚫ For enterprises that can build their own WANs, such as railways and electric power companies, MPLS
VPN is an easy-to-manage and low-cost VPN technology. For enterprises that cannot build their own
WANs, MPLS VPN is expensive.
⚫ The enterprises that require high network reliability and security can use the MPLS VPN private line as
the primary link and the GRE over IPsec line as the backup link.
MPLS VPN P
PE PE
Branch Backbone HQ
CE CE
23 Huawei Confidential
Exemplary Application Scenario of MPLS VPN
Application scenario of MPLS VPN
RR RR
Provincial
Provincial
backbone network PE ASBR ASBR RR ASBR ASBR PE backbone network
Enterprise A
Enterprise
A
Core backbone network
Enterprise B Enterprise
B
RR RR
VPNv4 peer
MPLS L3VPN traffic
• The MPLS L3VPN solution is widely used on the live network. Some large networks may use inter-AS MPLS L3VPN.
24 Huawei Confidential
• There are three types of inter-AS MPLS L3VPN solutions: Option A, Option B, and
Option C.
• Option A applies to small inter-AS MPLS L3VPNs. Option B applies to midsize and
large inter-AS MPLS L3VPNs. Option C applies to large or super-large inter-AS
MPLS L3VPNs.
Contents
25 Huawei Confidential
Overview of VPN Technologies
⚫ VPN technologies are widely used in scenarios where enterprises build their own Internet.
⚫ VPN technologies can be classified into the following three types based on the service usage:
Access VPN (virtual private network for remote access): also called dial-up VPN or VPDN. Generally,
L2TP VPN technology is used.
Intranet VPN (internal virtual private network of an enterprise): connects gateways and connects
resources of the same company through the company's network architecture. Generally, GRE or
DSVPN technology is used.
Extranet VPN (extended internal virtual private network of an enterprise): is used to build an
extranet with the enterprise network of a partner. Generally, SSL VPN technology is used.
26 Huawei Confidential
• By service usage:
PC PC
Enterprise NAS
branch (LAC) Enterprise HQ
Dial-up
network
PC PC
LNS
Dialing user
VPDN tunnel
VPDN tunnel
VPDN
27 Huawei Confidential
PPTP Overview
⚫ PPTP is a type of VPN protocol and has a history of more than 20 years. This protocol relies on
encryption, authentication, and Point-to-Point Protocol (PPP) for negotiation. It requires only the user
name, password, and server address for connection setup.
⚫ PPTP is fast, but has weak encryption. Among all VPN protocols, PPTP has the lowest encryption level
and must be based on IP networks.
PPTP tunnel
Internet
PC PPTP PPTP PC
client client
28 Huawei Confidential
Access VPN Intranet VPN Extranet VPN
Overview Overview Overview
L2TP Overview
⚫ L2TP, an open standard of IETF, combines advantages of PPTP. L2TP is especially suitable for setting up
an access VPN and has become a de facto industry standard.
⚫ L2TP is only a tunneling protocol and does not provide encryption or privacy protection. Therefore,
L2TP is usually used together with IPsec.
⚫ L2TP is one of commonly used enterprise interconnection technologies. When L2TP is used, an AAA
server is required. L2TP is a good choice for constructing an L2VPN.
L2TP client
LNS
(LAC)
L2TP tunnel
Enterprise branch
Internet Enterprise HQ
29 Huawei Confidential
Access VPN Intranet VPN Extranet VPN
Overview Overview Overview
LNS Enterprise HQ
Internet
Traveling
employee
• L2TP connections can also be used between branch sites. However, L2TP cannot transmit multicast data or advertise
routes between the HQ and branches. Therefore, L2TP is mainly used for remote user access on the live network.
30 Huawei Confidential
Access VPN Intranet VPN Extranet VPN
Overview Overview Overview
PC
PC
Enterprise Enterprise HQ
branch
PC
PC
Internet
PC
Enterprise
branch
PC
31 Huawei Confidential
▫ GRE
▫ DSVPN
▫ DSVPN IPsec
Access VPN Intranet VPN Extranet VPN
Overview Overview Overview
GRE Overview
⚫ Generic Routing Encapsulation (GRE) is used to encapsulate packets of some network-layer protocols
(such as IP, IPX, and AppleTalk) so that the encapsulated packets can be transmitted over the network
on which another network-layer protocol is applied.
⚫ GRE is typically used on networks with a few branch sites.
PC
Enterprise GRE packet Enterprise PC
branch HQ
Internet
GRE Tunnel
Internet
PC
RTA RTB PC
32 Huawei Confidential
• The two ends of a GRE tunnel are tunnel interfaces which encapsulate and
decapsulate data packets. The tunnel interface that sends encapsulated packets is
called the tunnel source interface, and the one that receives these packets on the
peer end is called the tunnel destination interface.
▫ The IP protocol module checks the destination address in the packet header
to determine how to forward this packet. If the packet is destined for the
other end of the GRE tunnel, the IP protocol module sends the packet to
the tunnel interface.
▫ After receiving the packet, the tunnel interface encapsulates the packet
using GRE and delivers the packet to the IP protocol module.
▫ The IP protocol module encapsulates the GRE packet using a new IP packet
header. The source address is the address of the tunnel source interface,
and the destination address is the address of the tunnel destination
interface. Then the IP protocol module forwards the encapsulated IP packet
from the WAN interface (tunnel source interface) based on the destination
address and routing table.
▫ The GRE module verifies the checksum and key fields, removes the GRE
header, and sends the packet to the IP protocol module.
PC
PC
Internet
IPsec tunnel GRE tunnel
PC
PC
IPsec tunnel GRE tunnel
(external) (internal)
34 Huawei Confidential
• GRE over IPsec combines advantages of both GRE and IPsec. It enables a network
to support multiple upper-layer protocols and multicast packets, as well as
packet encryption, identity authentication, and data integrity check.
• GRE over IPsec encapsulates packets using GRE, and then IPsec.
▫ Tunnel mode
▫ Transport mode
Access VPN Intranet VPN Extranet VPN
Overview Overview Overview
DSVPN Overview
⚫ DSVPN overcomes defects of GRE over IPsec and enables
enterprises with a large number of branches to easily build
VPNs.
Hub Dynamic mGRE tunnel
⚫ DSVPN is a technology that dynamically establishes GRE Static mGRE tunnel
tunnels. It uses the Next Hop Resolution Protocol (NHRP) to Data between spokes
dynamically collect, maintain, and advertise information such
as the public IP address of each spoke, allowing the source
branch to obtain the public IP address of the destination Internet
branch.
⚫ DSVPN uses mGRE technology to enable VPN tunnels to
Spoke Spoke
transmit multicast and broadcast packets, and a tunnel
interface can establish VPN tunnels with multiple peers. Spoke
⚫ The GRE tunnel established by DSVPN can still use IPsec
technology to ensure tunnel security.
35 Huawei Confidential
▫ If spokes use dynamic addresses, problems may occur when P2P GRE is
deployed.
Access VPN Intranet VPN Extranet VPN
Overview Overview Overview
Branch
Enterprise HQ
Internet
Branch
• DSVPN is seldom used on the live network due to the following reasons: 1. Many enterprises expect that traffic
between branches can pass through the HQ to facilitate management. 2. Enterprise O&M personnel just have a
basic understanding of DSVPN, which is inconvenient for O&M.
36 Huawei Confidential
Access VPN Intranet VPN Extranet VPN
Overview Overview Overview
PC
Enterprise HQ
PC
Customer PC
SSL VPN/L2TP
Internet
PC
37 Huawei Confidential
Access VPN Intranet VPN Extranet VPN
Overview Overview Overview
38 Huawei Confidential
• SSL VPN is a VPN remote access technology based on SSL. Mobile users (referred
to as remote users in SSL VPN) can use SSL VPN to securely and conveniently
access enterprise intranets and intranet resources, improving work efficiency.
• Before SSL VPN is developed, VPN technologies such as IPsec and L2TP are used
to enable remote user access. However, these VPN technologies have the
following disadvantages:
39 Huawei Confidential
Contents
40 Huawei Confidential
Overview of Link Detection
⚫ Fluctuation of network link quality affects service quality. How to quickly detect the link quality
fluctuation is the first step in improving link quality.
⚫ There are many protocols and technologies for detecting link quality, which are classified into two
types: BFD, EFM, and
CFM are used to
Link connectivity detection technologies: detect network
link connectivity.
BFD, EFM,
◼ Bidirectional Forwarding Detection (BFD) CFM
◼ Ethernet in the First Mile (EFM)
◼ Connectivity Fault Management (CFM)
NQA and IP FPM
Link quality detection technologies: are used to
detect network
quality.
◼ Network Quality Analysis (NQA)
NQA, IP FPM
◼ IP Flow Performance Measurement (IP FPM)
⚫ On the live network, BFD is typically used to detect link connectivity,
and NQA or IP FPM is typically used to detect link quality.
41 Huawei Confidential
Overview of BFD
⚫ BFD provides a universal, standardized, media-independent, and protocol-independent fast failure detection
mechanism. It has the following advantages:
Provides low-overhead and fast failure detection for channels between adjacent forwarding engines.
Performs uniform detection for all media and protocol layers in real time.
⚫ BFD is a simple Hello protocol. Two systems establish a BFD session channel and periodically send BFD packets to
each other. If one system does not receive BFD packets from the other system within a certain period, the system
considers that a fault occurs on the channel.
BFD session
detection
Application layer Application layer
Transport layer Transport layer
Network layer Network layer
Data link layer Data link layer
Physical layer Physical layer
42 Huawei Confidential
• Only one BFD session can be established in a data path. If different applications
need to use different BFD parameters on the same data path, use the BFD
parameters that can meet the requirements of all applications to configure a
unique BFD session and enable the status changes of the BFD session to be
reported to all the applications bound with the BFD session.
Overview of NQA
⚫ To visualize the quality of network services and allow users to check whether the quality of network services meets
requirements, the following measures must be taken:
Enable devices to provide network service quality information.
Deploy probe devices to monitor network service quality.
⚫ The preceding measures require devices to provide statistical parameters such as the delay, jitter, and packet loss
rate and require dedicated probe devices. These requirements increase investments on devices.
⚫ When NQA is deployed on devices, dedicated probe devices do not need to be deployed, effectively reducing costs.
NQA can accurately test the network running status and output statistics.
⚫ NQA measures network performance and collects statistics about the response time, network jitter, and packet loss
rate in real time. TCP delay detection
43 Huawei Confidential
44 Huawei Confidential
▫ TLPs are interfaces on the edge nodes of the network and provide the
following functions:
▫ DCPs are edge nodes on the network and provide the following functions:
▫ MCPs are intermediate nodes on the network and provide the following
functions:
ISP2 • IP FPM colors and marks data packets to help ingress and
egress devices measure the packet loss or jitter of specific
traffic.
• NQA and BFD are usually associated with floating routes.
• IP FPM can measure end-to-end network quality. Therefore, it
• When NQA or BFD detects a link fault, the high-priority route
can measure the actual network quality of different links in
becomes invalid and the backup route is used.
the multi-link egress scenario.
46 Huawei Confidential
Contents
47 Huawei Confidential
Overview of Network Reliability
⚫ If a fault occurs on the network, the fault may not be detected or rectified in a timely manner. To
resolve this issue, redundancy technologies are required.
⚫ Common redundancy technologies include stack, link aggregation, and VRRP.
⚫ VRRP is the most widely used network redundancy technology on egress devices or gateways.
VRRP
Stack
Link aggregation
48 Huawei Confidential
Overview of VRRP
⚫ Hosts are connected to external networks through gateways. If a single gateway fails, services will be interrupted
for a long time. Adding egress gateways is a common method to improve system reliability. In this case, route
selection among multiple egresses becomes essential.
⚫ VRRP groups multiple routing devices into a single virtual routing device. If a gateway fails, VRRP selects a new
gateway to transmit data traffic, ensuring high network reliability.
The backup device
Only one device becomes the new
Internet provides services Internet
master device, and
externally. traffic is switched to it.
VRRP VRRP
Master Backup The master device fails. Master Backup -> Master
49 Huawei Confidential
Service Reliability
⚫ In the cloud computing era, network reliability cannot meet user requirements. Users want to
understand the live network status based on applications and adjust the network based on the
application status.
⚫ Such requirements pose the following challenges to traditional networks:
Traditional networks cannot accurately identify applications.
Traditional networks cannot be adjusted based on applications.
50 Huawei Confidential
Overview of SAC
⚫ Typically, routing and switching devices cannot identify application-layer information. Therefore, it is difficult to manage networks
based on applications. SAC technology helps routing and switching devices identify classified applications.
⚫ SAC uses service awareness (SA) and first packet identification (FPI) technologies to detect and identify Layer 4 to Layer 7
information (such as HTTP and RTP) in packets.
Service traffic
Network device
Application
Download
identification record
Traffic is directly forwarded
Signature at Layer 3 if the application
matching has been identified.
SAC identification
SA signature Video
database
51 Huawei Confidential
• After a packet enters an SAC-enabled device, the device determines whether the
corresponding application has been identified based on the 5-tuple information
carried in the packet. If the application has been identified, the device forwards
the packet at Layer 3 without identifying the application again. If the application
has not been identified, the device performs SAC application identification. The
device then processes the packet based on the SAC identification result and
forwards the packet at Layer 3. The SAC application identification process is as
follows: The device identifies an application based on the ACL rules defined in FPI.
If the application cannot be identified, the device identifies the application based
on the DNS entries defined in FPI. If the application still cannot be identified, the
device identifies the application based on the protocol and port mapping table
defined in FPI. If the application still cannot be identified, the device starts the SA
identification process.
Overview of SPR
⚫ In the cloud computing era, more users shift their attention from network connectivity to service
availability, such as service response speed and service quality. However, traditional networks cannot
detect link quality and service requirements, resulting in poor user experience.
⚫ SPR addresses this problem. It actively detects the link quality and matches service requirements to
select an optimal link to forward service data. SPR prevents network blackholes and flappings.
SRP deployment
HQ
Branch
SRP deployment
52 Huawei Confidential
Exemplary Application Scenario of Service Reliability
Technologies
⚫ Deploying both SAC and SPR can ensure the reliability of specific services on the network.
SAC uses the SA signature database and FPI signature database to identify applications and group traffic.
SPR determines the link quality and forwarding path based on the probe packets.
Application Application-based
identification Video application traffic steering MPLS
53 Huawei Confidential
Contents
54 Huawei Confidential
QoS Overview
⚫ Quality of Service (QoS) defines a service provider's ability to guarantee a certain level of performance required by
customers. The QoS-enabled device controls enterprise network traffic, implements congestion management and
congestion avoidance, reduces the packet loss rate, and provides dedicated bandwidth for enterprise users or
differentiated services (such as audio, video, and data services).
QoS implementation
Token
Video traffic
Queue 0
Scheduling
Other
Outbound
Queue 1
interface
Inbound
interface
Traffic processing
CAR Remark WRED GTS
classification Token methods Queue 2
Audio traffic bucket ... ...
Congestion Traffic
Traffic policing avoidance Queue N shaping
Congestion management
Data traffic
55 Huawei Confidential
• To meet SLA requirements of different services (such as audio, video, and data
services), the network is required to distinguish different communication modes
before providing corresponding QoS guarantee.
▫ The bandwidth used by the FTP service on the backbone network can be
limited, and a higher priority can be assigned to database access.
▫ An Internet service provider (ISP) can transmit real-time services such as
audio or video services. With QoS technology, the ISP can differentiate the
packets and provide differentiated services for users.
▫ High bandwidth and short delays can be guaranteed for the time-sensitive
multimedia services. If other services are available on the network, these
time-sensitive services are not affected.
QoS Application Example
⚫ In the enterprise WAN interconnection scenario, QoS is typically deployed on the egress link.
⚫ QoS technology is used to ensure high network bandwidth and short delays for high-value services.
57 Huawei Confidential
Overview of HQoS
⚫ Conventional QoS schedules traffic based on interfaces. Interfaces themselves can only differentiate service priorities. Traffic of the
same priority uses the same interface queue and compete for the same queue resources. Therefore, conventional QoS is unable to
provide differentiated services based on the types of traffic and users.
⚫ HQoS implements hierarchical scheduling based on multiple levels of queues, differentiating both services and users to provide fine-
tuned QoS guarantee.
Internet
• Three tenants: 20 Mbit/s bandwidth, IPTV service
• Three tenants: 50 Mbit/s bandwidth, VoIP service
• In home broadband scenarios, different families may lease different network bandwidths and network services. QoS cannot be used to implement
fine-tuned management of these families.
58 Huawei Confidential
HQoS Application Example
⚫ HQoS is mainly used in multi-tenant scenarios. For example, there are three families in a building. Family A has purchased 10 Mbit/s
bandwidth and subscribed to VoIP, IPTV, and HSI services. Family B has purchased 20 Mbit/s bandwidth and subscribed to IPTV and
HSI services. Family C has purchased 30 Mbit/s bandwidth and subscribed to the HSI service. These three families have different
requirements. HQoS is the best choice for this scenario.
Total bandwidth of
HSI (WFQ scheduling)
family C: 30 Mbit/s
Family C
59 Huawei Confidential
60 Huawei Confidential
Overview of FEC
⚫ An IP video call often encounters image distortion or audio interruption due to packet loss. To prevent this, error control
technologies are required.
⚫ Forward error correction (FEC) is such a technology. The sender attaches FEC redundant packets to the data to be transmitted. If an
error is detected, the receiver can correct the data based on the redundant packets.
⚫ FEC is applicable to networks where random packet loss occurs or the RTT is large.
FEC implementation
Key traffic
Key traffic
4 3 2 1 MPLS
P 4 3 2 1
FEC restoration
Internet
61 Huawei Confidential
• Error control technologies are classified into forward error correction (FEC) and
backward error correction (BEC).
▫ In FEC, both FEC redundant packets and data packets are sent to the
receiver. If an error is found, the receiver directly restores the lost data
packets by using the FEC redundant packets. In this mode, error correction
is performed on the receiver. This is why this mode is called FEC.
⚫ A-FEC technology can flexibly add redundant packets based on the live network quality.
When the network quality is good, A-FEC adds a few redundant packets or even does not add any redundant packet to improve bandwidth utilization.
When the network quality is poor, A-FEC adds more redundant packets to prevent data restoration failures caused by burst packet loss.
62 Huawei Confidential
Exemplary Application Scenario of FEC/A-FEC
⚫ FEC or A-FEC can be used to guarantee mission-critical video applications and reduce frame freezing
and artifacts.
Application scenario of FEC or A-FEC
• The A-FEC algorithm is used to flexibly increase redundant packets at the transmit end based on the application and link quality to
prevent continuous packet loss on the network. This helps prevent mission-critical video applications from frame freezing or
artifacts even when the packet loss rate reaches up to 20%.
63 Huawei Confidential
Quiz
1. (Multiple-answer question) Which of the following are private line technologies? ( )
A. SDH
B. L2TP
C. MPLS VPN
D. IPsec VPN
2. (True or false) SRP technology can flexibly select egress links based on the link quality. ( )
A. True
B. False
64 Huawei Confidential
1. AC
2. A
Summary
⚫ There are two WAN interconnection modes: private line and VPN.
⚫ To ensure WAN reliability, the link quality needs to be detected first, and then specific
technologies are used to select a proper egress or egress link based on the link quality.
⚫ There are many WAN optimization methods. Typically, QoS is used to control egress traffic
and FEC is used to ensure reliable data forwarding on WANs.
65 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
3 Huawei Confidential
GRE Fundamentals GRE Security Mechanisms GRE Application Scenarios
GRE Background
⚫ With the development of enterprises, more and more enterprises need to communicate between branches and headquarters. Private
lines (such as MPLS and SDH/MSTP private lines) need to be leased for communication between the headquarters and branches.
However, private lines are expensive. For small- and medium-sized enterprises or cross-border companies, the cost is high.
⚫ With the development of the Internet, the Internet has sufficient bandwidth and coverage. Therefore, it is more feasible to
implement communication on the intranet between the headquarters and branches through the Internet. GRE is proposed in this
background.
⚫
Through GRE tunnels, the enterprise network can be Branch
established between the branch and headquarters based on site
Branch
the Internet. site
HQ
Branch
site Interconnection between
branches and HQ
Internet
Internet
4 Huawei Confidential
GRE Fundamentals GRE Security Mechanisms GRE Application Scenarios
⚫ There are many tunneling technologies, such as MPLS, GRE, Layer 2 Tunneling Protocol (L2TP), and Virtual Extensible LAN (VXLAN).
The following figure shows the implementation of tunnel data forwarding.
5 Huawei Confidential
GRE Fundamentals GRE Security Mechanisms GRE Application Scenarios
⚫ GRE tunnels can transmit IPv4/IPv6 unicast, multicast, and broadcast packets.
⚫ GRE packet format:
L2 Header New IP Header GRE Header Raw IP Header Payload
Checksum (Option) 0
Key (Option)
32 bits
6 Huawei Confidential
Field Description
Checksum verification bit.
The value 1 indicates that the Checksum field is inserted into the GRE
C header.
The value 0 indicates that the GRE header does not contain the
checksum field.
Key bit.
The value 1 indicates that the Key field is inserted into the GRE header.
K
The value 0 indicates that the GRE header does not contain the
keyword field.
Number of layers where GRE packets are encapsulated. The value of
this field is increased by 1 after one GRE encapsulation is complete. If
Recursion the number of encapsulation layers is greater than 3, the packet is
discarded. This field is used to prevent packets from being encapsulated
continuously.
Flags Reserved field. The value must be 0.
Version Version. The value must be 0.
Type of the passenger protocol. A common passenger protocol is the
Protocol
IPv4 protocol, with the value of 0800.
Type
The protocol number of Ethernet over GRE is 0x6558.
Checksum Checksum of the GRE header and the payload.
Key Key used to authenticate the packet at the receive end.
GRE Fundamentals GRE Security Mechanisms GRE Application Scenarios
GRE Fundamentals
⚫ The GRE tunnel is a Layer 3 tunnel and mainly carries IPv4/IPv6 packets. GRE encapsulates the outer IP header so
that data can be transmitted on the public network. In this way, enterprise branches and the headquarters can
communicate with each other.
⚫ The following figure shows the process of forwarding packets over a GRE tunnel.
IPA IPB
IP1 Branch GRE tunnel HQ IP2
7 Huawei Confidential
GRE Fundamentals GRE Security Mechanisms GRE Application Scenarios
Keepalive Detection
⚫ The current GRE protocol does not have the link status detection function. If the remote interface is unreachable, the GRE tunnel
cannot be terminated immediately. As a result, the source continuously forwards packets to the peer. The peer, however, cannot
receive packets because the tunnel is unreachable. In this case, traffic is interrupted.
⚫ The keepalive detection function monitors tunnel status to check whether the remote end is reachable.
⚫
Keepalive timeout interval = Sending interval (5s by default) x Retry count (3 by default)
GRE tunnel
GRE Keepalive
Timeout timer
GRE Keepalive
Reply with a keepalive
message within the
timeout interval.
8 Huawei Confidential
⚫
There are potential risks in GRE tunnel establishment. Attackers can forge IP addresses to establish GRE tunnels between authorized
and unauthorized devices.
Data tampering
9 Huawei Confidential
GRE Fundamentals GRE Security Mechanisms GRE Application Scenarios
⚫
If the C bit in the GRE header is set to 1, the checksum is valid. The sender calculates the checksum based on the GRE header and
payload. Then it sends out the packet that carries the checksum. After receiving the packet, the receiver also calculates the checksum
and compares the result with the checksum carried in the packet. If they are the same, the receiver further processes the packet.
Otherwise, it discards the packet. Data verification used to prevent data tampering
GRE tunnel
Outer Header GRE Header Inner Header Payload
C=1,Checksum=A
Inconsistent checksum
10 Huawei Confidential
GRE Key
⚫ Key authentication is used to verify validity of a tunnel interface. This security mechanism prevents tunnel interfaces
on two devices at both ends of a GRE tunnel from incorrectly identifying and receiving packets from other devices.
⚫ If the K bit in the GRE header is set to 1, a four-byte Key field is inserted into the GRE header. Both the receiver and
the sender need to authenticate the key. The GRE key is used to prevent unauthorized GRE tunnel
establishment.
11 Huawei Confidential
• This field identifies traffic in a tunnel. Packets of the same traffic use the same
key. During packet decapsulation, GRE identifies data packets of the same traffic
based on the key. Packets will pass verification only when the two ends of the
tunnel use the same Key field. If packets fail the verification, they will be
discarded. Successful authentication requires that both ends are either configured
with the same Key field or not configured with the Key field.
GRE Fundamentals GRE Security Mechanisms GRE Application Scenarios
OSPF area 1
Branch 2
12 Huawei Confidential
GRE Fundamentals GRE Security Mechanisms GRE Application Scenarios
Internet
IPsec tunnel
13 Huawei Confidential
GRE Fundamentals GRE Security Mechanisms GRE Application Scenarios
Branch2 PE
Branch egress The VPN to which VPN2
traffic belongs DC2 egress
cannot be
identified.
14 Huawei Confidential
GRE Fundamentals GRE Security Mechanisms GRE Application Scenarios
15 Huawei Confidential
Contents
16 Huawei Confidential
Fundamentals Application Scenarios
L2TP Overview
⚫ By combining the advantages of the Layer 2 Forwarding (L2F) and Point-to-Point Tunneling
Protocol (PPTP), Layer 2 Tunneling Protocol (L2TP) is an industry standard defined by the
IETF. L2TP is a virtual private dialup network (VPDN) tunneling protocol that extends Point-
to-Point Protocol (PPP) applications. It is an important VPN technology that provides access
services for employees on the go to remotely access intranet resources.
17 Huawei Confidential
Fundamentals Application Scenarios
⚫ LNS
An L2TP network server (LNS) is the peer device of an LAC.
NAS Client
That is, an L2TP tunnel is established between them. (LAC) (LAC)
Dialup
⚫ Tunnel and session network
L2TP client
An L2TP tunnel is established between an LAC and an LNS. (LAC)
Multiple L2TP tunnels can be established between an LAC Enterprise L2TP tunnel
branch
and an LNS, and an L2TP tunnel can contain multiple L2TP
L2TP session
PPP terminal
sessions.
18 Huawei Confidential
• NAS
▫ A network access server (NAS) is maintained by an ISP and connects to a
dialup network. It is the nearest access point for PPP terminals. An NAS is
used on a traditional dialup network. An ISP deploys an LAC on an NAS to
provide L2TP services for remote dialup users and to establish tunnel
connections with the enterprise headquarters.
• LAC
▫ An L2TP access concentrator (LAC) provides PPP and L2TP processing
capabilities on a packet switched network. An LAC establishes an L2TP
tunnel connection with an L2TP network server (LNS) based on the user
name or domain name carried in PPP packets to extend PPP negotiation to
the LNS. Different networking environments can have different devices
functioning as an LAC.
▪ NAS-initiated scenario: On a traditional dialup network, an ISP deploys
an LAC on an NAS. Alternatively, on the Ethernet of an enterprise
branch, the ISP deploys a gateway for PPP terminals. The gateway
functions as both a PPPoE server and an LAC.
▪ L2TP client-initiated scenario: In an enterprise branch, an L2TP client
functioning as an LAC is configured on the gateway to initiate an L2TP
tunnel establishment request to an LNS. In this case, no dialup is
required in the remote system to trigger L2TP tunnel establishment.
▪ Client-initiated scenario: An employee on the go uses a PC or mobile
terminal to access the Internet and uses the L2TP dialup software on the
PC or mobile terminal. In this scenario, the PC or mobile terminal
functions as an LAC.
▫ An LAC can establish multiple L2TP tunnels to isolate data flows. That is, it
can carry multiple L2TP connections.
• LNS
▫ An LNS terminates PPP sessions. After being authenticated by the LNS,
remote users successfully set up PPP sessions with the LNS and can access
resources in the enterprise headquarters. For L2TP negotiation, the LNS is
the peer device of the LAC. That is, an L2TP tunnel is established between
the LAC and the LNS. For PPP, the LNS is the logical endpoint of a PPP
session. That is, a point-to-point virtual link is set up between the PPP
terminal and the LNS.
NAS
(LAC) LNS
Enterprise Dialup Enterprise
branch network HQ
20 Huawei Confidential
• Control message
▫ Control messages are used to establish, maintain, and tear down L2TP tunnels
and sessions. During the transmission of control messages, mechanisms such
as retransmission of lost messages and periodic detection of tunnel
connectivity are used to ensure the reliability of control message transmission.
Traffic control and congestion control on control messages are supported.
▫ Control messages are transmitted over an L2TP control channel. The control
channel encapsulates control messages with L2TP headers and transmits them
over an IP network.
• Data message
▫ Data messages are used to encapsulate PPP frames, which are transmitted
over tunnels, but such tunnels are unreliable. That is, a lost data message is
not retransmitted, and traffic control and congestion control on data
messages are not supported.
▫ Data messages carrying PPP frames are transmitted over unreliable data
channels. PPP frames are encapsulated using L2TP and then transmitted over
the IP network.
Fundamentals Application Scenarios
21 Huawei Confidential
▫ If an L2TP tunnel exists, the LAC and the LNS exchange control messages to
negotiate the session ID. If no L2TP tunnel exists, the LAC and the LNS
establish an L2TP tunnel first. The L2TP session carries LCP negotiation
information and user authentication information of the LAC. After
authenticating such information, the LNS notifies the LAC of the session
establishment. The L2TP session is identified by a session ID.
Mobile Office
⚫ Employees on the go connect to the intranet through L2TP. The LNS can authenticate access
users and assign private IP addresses to them. If ACLs are configured, the LNS can also
manage access rights of access users.
Employee on the go PC
(L2TP software) LNS
Enterprise HQ
L2TP encapsulation
22 Huawei Confidential
L2TP
PC Enterprise client LNS Enterprise PC
branch HQ
L2TP encapsulation
23 Huawei Confidential
• An enterprise has some branches located in other cities, and its branches use the
Ethernet and have gateways deployed for branch users to access the Internet.
The headquarters provides access services for branches. VPDN connections need
to be established between branches and the headquarters gateway. Any branch
user is allowed to access the headquarters network, and only the branch
gateways need to be authenticated. In this case, the headquarters gateway
functions as the LNS, and the branch gateways function as the L2TP clients.
Virtual dialup is created on the branch gateways to trigger L2TP tunnel
connections to the headquarters network. A virtual point-to-point connection is
established between an L2TP client and the LNS. After IP packets of branch users
reach an L2TP client, the L2TP client forwards the packets to the virtual dialup
interface. The virtual dialup interface forwards the packets to the LNS, which
then forwards the packets to the destination host.
Fundamentals Application Scenarios
L2TP
client LNS Enterprise
PC
Enterprise
branch HQ
PPPoE
PPP terminal
(PPPoE client)
L2TP encapsulation
24 Huawei Confidential
• An enterprise has some branches located in other cities, and its branches use the
Ethernet and have gateways deployed for branch users to access the Internet.
Headquarters users need to communicate with branch users, and the
headquarters uniformly manages access of branch users. Therefore, L2TP is used
to deploy the headquarters gateway as an LNS. Dialup packets of branch users
cannot be transmitted directly over the Ethernet. Therefore, PPPoE dialup
software needs to be deployed as a PPPoE client on the terminal that initiates the
dialup packets, and the branch gateway functions as a PPPoE server and an LAC
to forward call requests of branch users to the headquarters.
Contents
▫ IPsec Fundamentals
▫ IPsec Application Scenarios
25 Huawei Confidential
IPsec Overview IPsec Framework
IPsec Background
⚫ Enterprise branches often need to communicate with each other. They can communicate using many methods, for example, using
private lines or Internet links.
⚫
Considering costs and requirements, some enterprises choose to use Internet links for interconnection. However, data may be
intercepted when being transmitted on the Internet, posing security risks.
⚫
IPsec technology encrypts data packets to secure enterprise interconnections.
Branch
site
Branch
site
HQ
Branch
site Enterprise WAN
interconnection
Carrier network
WAN
26 Huawei Confidential
IPsec Overview IPsec Framework
IPsec Overview
⚫ The IPsec protocol suite is a series of security protocols developed by the Internet Engineering Task Force (IETF). It provides a
cryptology-based, interoperable, and high-quality security protection mechanism for end-to-end IP packet exchange.
⚫
IPsec encrypts and authenticates data to ensure secure data transmission on the Internet.
⚫
IPsec VPN technology can be used with multiple VPN technologies to provide flexible and secure enterprise interconnections.
Data Data
encryption and GRE tunnel encryption and
IPsec tunnel
authentication authentication
Carrier network
Enterprise
IPsec tunnel HQ
branch
Enterprise Enterprise
egress egress
Data is encrypted
• On the live network, GRE over IPsec technology is typically used for interconnection between branch sites. IPsec technology
ensures secure data transmission, and GRE technology ensures interconnection between enterprise intranets.
27 Huawei Confidential
IPsec Overview IPsec Framework
Data Encryption
⚫ Data encryption prevents data from being leaked during data forwarding. Two data encryption methods are available:
Symmetric encryption: The same password is used for encryption and decryption, which is highly efficient. However, the key may be intercepted during
key exchange.
Asymmetric encryption: The public key is used for encryption and the private key is used for decryption. Data security is high but the data encryption
and decryption efficiency is low.
RT1 RT2
RT1 RT2
The device automatically generates
a public key and a private key
The same key is
preconfigured or Key pair
transmitted in advance Public Private
Data Key A Key A Data Public key key B key B
Key exchange transmission
Encryption Decryption
Data Public key B Private key B Data
Encrypted Data forwarding Encrypted Public key Private key
data data encryption decryption
Encrypted Data forwarding Encrypted
data data
28 Huawei Confidential
Data Authentication
⚫ The main purpose of data authentication is to check whether data is tampered with. Data authentication is mainly
based on the hash algorithm.
A unique hash value is calculated based on the hash algorithm and then carried in the data before being forwarded to the peer device.
The peer device hashes the data again to obtain the hash value. It then compares the received hash value with the calculated one. If they are the same,
the data is not tampered with.
RT1 RT2
29 Huawei Confidential
IPsec Overview IPsec Framework
IPsec Encryption
⚫ IPsec uses both symmetric encryption and asymmetric encryption, ensuring data security and performance.
Uses an asymmetric algorithm to encrypt and transmit the key used for symmetric encryption.
Uses the exchanged symmetric key to encrypt data.
IPsec tunnel
Symmetric key Asymmetric encryption 1 Exchange the symmetric key Asymmetric encryption Symmetric key
Use the public key to encrypt data After the symmetric key is Use the public key to encrypt data
Use the private key to decrypt data exchanged, the symmetric key is Use the private key to decrypt data
used to encrypt and decrypt data.
User data Symmetric encryption 2 Exchange user data Symmetric encryption User data
30 Huawei Confidential
IPsec Overview IPsec Framework
SA
⚫ A security association (SA) is an agreement between two IPsec peers on certain elements. For example, Data
Encryption Standard (DES) is used as the encryption algorithm, Message Digest Algorithm 5 (MD5) is used as the
authentication algorithm, and tunnel is used as the encapsulation mode.
⚫ An IPsec SA can be established manually or through Internet Key Exchange (IKE) negotiation.
Establishing IPsec SAs manually Establishing IPsec SAs through IKE negotiation
31 Huawei Confidential
▫ IKE negotiation: The management cost of IPsec SAs established through IKE
negotiation is low. The encryption and authentication modes are generated
using the Diffie-Hellman (DH) algorithm, SA information is generated
periodically, and SAs are dynamically updated. This mode applies to small-,
medium-, and large-sized networks.
Key Exchange
⚫ On the live network, the Internet Key Exchange (IKE) protocol is typically used to exchange symmetric keys.
⚫ IKE is a UDP-based application-layer protocol. It is built upon the framework defined by the Internet Security
Association and Key Management Protocol (ISAKMP). IPsec uses IKE for key auto-negotiation and IPsec SA
establishment, simplifying IPsec configuration and maintenance.
IPsec tunnel
32 Huawei Confidential
• IKE supports the following authentication algorithms including MD5, Secure Hash
Algorithm 1 (SHA1), SHA2-256, SHA2-384, SHA2-512, and Senior Middle 3
(SM3).
• IKE supports the following encryption algorithms: DES, 3DES, AES-128, AES-192,
AES-256, SM1, and SM4.
• ISAKMP is defined in RFC 2408, which defines the procedures for negotiating,
establishing, modifying, and deleting SAs and defines the ISAKMP message
format. ISAKMP provides a general framework for SA attributes and the methods
of negotiating, modifying, and deleting SAs, without defining the specific SA
format.
• ISAKMP messages can be transmitted using UDP or TCP through port 500. In
most cases, ISAKMP messages are transmitted using UDP.
IPsec Overview IPsec Framework
IPsec uses the Hash-based Message Authentication Code (HMAC) function to compare digital signatures to check data integrity andauthenticity.
Discard
No ICV
Yes Whether
User Encryption algorithm Encrypted Authentication algorithm
they are
packet (decryption) packet (HMAC)
consistent
Encrypted
ICV
Symmetric key
Symmetric key
packet
exchange
exchange
Manually configured or
Manually configured or
automatically
negotiated through IKE automatically
negotiated through IKE
33 Huawei Confidential
• Integrity check value (ICV) is used by the receiver for integrity check. Available
authentication algorithms are MD5, SHA1, SHA2, and SM3.
• Common symmetric encryption algorithms used by IPsec include Data Encryption
Standard (DES), Triple Data Encryption Standard (3DES), Advanced Encryption
Standard (AES), and algorithms approved by State Cryptography Administration,
such as SM1 and SM4. DES and 3DES are not recommended because they are
insecure and pose security risks.
• Common authentication algorithms used by IPsec include MD5, SHA1, SHA2, and
SM3. MD5 and SHA1 are not recommended because they are insecure and pose
security risks.
• IPsec encryption cannot verify the authenticity or integrity of information after
decryption. IPsec uses the HMAC function to compare digital signatures to check
integrity and authenticity of data packets. In most cases, encryption and
authentication are used together. The IPsec sender uses the authentication
algorithm and symmetric key to generate a digital signature for the encrypted
packet and sends the IP packet and digital signature to the receiver. The receiver
uses the same authentication algorithm and symmetric key to process the
encrypted packet and then generates a digital signature. Then the receiver
compares the received and generated digital signatures to verify the data
integrity and authenticity. If the packet passes the verification, the receiver
decrypts it. Otherwise, the receiver discards it.
IPsec Overview IPsec Framework
Security Protocols
⚫ IPsec provides two transport layer protocols for authentication or encryption: Authentication Header (AH) and
Encapsulating Security Payload (ESP).
AH provides only authentication but no encryption capabilities.
ESP provides both authentication and encryption.
Authentication
Security Parameters Index (SPI)
Payload Data (Variable)
Encrypted
Sequence Number Padding
(0-255 Octets) ESP
Authentication Data (Variable) Trailer
Integrity Check Value (ICV) Pad Len Next Header
34 Huawei Confidential
• Key fields:
Encapsulation Modes
⚫ IPsec encapsulation is a process of adding AH or ESP fields to original IP packets for packet authentication and
encryption. This process is implemented in transport or tunnel mode.
⚫ On the live network, the tunnel mode is often used for encapsulation.
New IP AH Raw IP IP AH
AH Data AH Data
Header Header Header Header Header
Authenticated Authenticated
35 Huawei Confidential
36 Huawei Confidential
IPsec Mechanism
IPsec mechanism
IPsec device IPsec device
IPsec tunnel
Encrypts IPsec SA
negotiation packets
based on IKE SA
IPsec SA IPsec SA
37 Huawei Confidential
IKEv1
⚫ IKEv1 negotiation goes through two phases: In phase 1, two IPsec peers negotiate and establish a
secure tunnel (an IKE SA). In phase 2, the two IPsec peers establish a pair of IPsec SAs for secure data
transmission through the secure tunnel established in phase 1.
38 Huawei Confidential
IKEv1 IKEv2 Defining IPsec-Protected Data Flows
⚫ Phase 1 of IKEv1 negotiation supports two negotiation modes: main mode and aggressive mode.
39 Huawei Confidential
• The main mode requires three exchanges between the peers, totaling six ISAKMP
messages. The three exchanges are described as follows:
▫ Messages 1 and 2 are used for IKE proposal exchange.
▪ The initiator sends one or more IKE proposals to the responder. The
responder searches for the first matching IKE proposal and then sends it to
the initiator. IKE proposals of the initiator and responder match if they have
the same encryption algorithm, authentication algorithm, authentication
method, and DH group identifier.
▫ Messages 3 and 4 are used for key information exchange.
▪ The initiator and responder exchange the DH public value and nonce value
to generate the IKE SA authentication key and encryption key.
▫ Messages 5 and 6 are used for identity and authentication information
exchange. (Both parties use the generated keys to exchange information.)
▪ The initiator and responder use the generated keys to authenticate each
other and the information exchanged in main mode.
• The aggressive mode uses only three messages. Messages 1 and 2 are used to
negotiate IKE proposals and exchange the DH public value, mandatory auxiliary
information, and identity information. Message 2 also contains the identity
information sent by the responder to the initiator for authentication. Message 3
is used by the responder to authenticate the initiator.
• Compared with the main mode, the aggressive mode reduces the number of
exchanged messages and speeds up the negotiation. However, the aggressive
mode does not encrypt identity information.
IKEv1 IKEv2 Defining IPsec-Protected Data Flows
Quick mode
Initiator Responder
Sends acknowledged
3 Accepts the information.
data
Encrypted data
40 Huawei Confidential
• In IKEv1 phase 2, two IPsec SAs are established through three ISAKMP messages:
▫ Message 1 is used by the initiator to send local security parameters and
identity authentication information to the responder.
▪ The encryption key and authentication key used for secure data
transmission over IPsec SAs are generated based on the keys generated in
phase 1 and parameters such as the SPI and protocol. This ensures that
each IPsec SA has unique encryption and authentication keys.
▫ Message 3 is used by the initiator to send acknowledged information to
communicate with the responder. IKEv1 negotiation then ends and IPsec SAs
are established.
IKEv1 IKEv2 Defining IPsec-Protected Data Flows
IKEv2
⚫ The process of establishing SAs through IKEv2 negotiation is much simpler than that through IKEv1
negotiation. In normal cases, IKEv2 can establish a pair of IPsec SAs through only four messages in two
exchanges. One additional Create_Child_SA Exchange can be used to establish another pair of IPsec SAs
if required, during which only two messages are exchanged.
⚫ IKEv2 defines three exchanges: Initial Exchanges, Create_Child_SA Exchange, and Informational
Exchange.
41 Huawei Confidential
IKEv1 IKEv2 Defining IPsec-Protected Data Flows
Initiator Responder
2
Sends the matching IKE
Accepts the parameters
SA parameters
42 Huawei Confidential
Initiator Responder
43 Huawei Confidential
IKEv1 IKEv2 Defining IPsec-Protected Data Flows
Initiator Responder
Responds to control
Accepts the information 2
information Encrypted data
44 Huawei Confidential
IKEv1 IKEv2 Defining IPsec-Protected Data Flows
Use routes.
◼ Routes can be configured to define the data flows to be protected by an IPsec tunnel established through IPsec
tunnel interfaces. All packets routed to these interfaces will then be protected.
⚫ On the live network, GRE over IPsec typically defines protected flows based on routes.
45 Huawei Confidential
46 Huawei Confidential
GRE over IPsec
⚫ Leveraging advantages of GRE and IPsec, GRE over IPsec encapsulates multicast, broadcast, and non-IP
packets into ordinary IP packets and then securely transmits these IP packets through IPsec.
⚫ GRE over IPsec encapsulates packets using GRE and then IPsec.
Internet
IPsec tunnel
47 Huawei Confidential
• GRE over IPsec supports encapsulation in both tunnel and transport modes. An
IPsec header needs to be added to packets if GRE over IPsec in tunnel mode is
used, resulting in longer packets. In this case, packets are more likely to be
fragmented. Therefore, GRE over IPsec in transport mode is recommended.
• In the IP header added during IPsec encapsulation, the source and destination
addresses are the IP addresses of the local interface and remote interface to
which an IPsec policy is applied.
• IPsec protects data flows from the GRE tunnel source to the GRE tunnel
destination. In the IP header added during GRE encapsulation, the source and
destination addresses are the source and destination addresses of a GRE tunnel.
L2TP over IPsec
⚫ Layer 2 Tunneling Protocol (L2TP) over IPsec encapsulates packets using L2TP and then IPsec. It uses
L2TP for user authentication and address allocation and uses IPsec for secure communication. L2TP
over IPsec ensures that branches or traveling employees are securely connected to the headquarters.
IPsec tunnel
Internet
PPP data IPsec data PPP data
48 Huawei Confidential
▫ NAT Types
49 Huawei Confidential
Motivation Behind NAT
⚫ Network address translation (NAT) was proposed in 1994. NAT can be used when some hosts on a
private network have been assigned local IP addresses (that is, dedicated IP addresses used only on the
private network) and want to communicate with hosts on the Internet (without encryption).
⚫ NAT resolves the problem of insufficient public IP addresses and protects internal devices against
external attacks.
NAT for access from a private network to the Internet
Private network
Internet
NAT device
DIP: private DIP: public
Data Data
IP address IP address
NAT
50 Huawei Confidential
NAPT
⚫ Network address and port translation (NAPT) translates both IP addresses and port numbers for addresses in an address pool. In this
way, 1:n mapping between public and private addresses is implemented, which effectively improves public address utilization.
⚫
Easy IP is a special type of NAPT. It maps all private network sessions to an egress address. That is, Easy IP can be understood as
NAPT with one address in the NAT address pool. NAT mapping table
Internet
122.1.2.1
192.168.1.2/24 192.168.1.1/24
NAT Web server
SIP: 200.1.2.3 S Port: 80 SIP: 200.1.2.3 S Port: 80 200.1.2.3
Data Data
DIP: 192.168.1.1 D Port: 10321 DIP: 122.1.2.2 D Port: 1025
51 Huawei Confidential
• NAPT and Easy IP are also known as source NAT because they change only the
source address and port number of a packet.
NAT Server
⚫ NAT Server maps an internal server to a public network through a one-to-one mapping between a [public IP
address:port number] and a [private IP address:port number]. This function is used when the internal server
needs to provide services for the public network.
⚫ An external host proactively accesses the [public IP address:port number] to communicate with the internal
server. NAT mapping table
Private IP Public IP
Address:Port Address:Port
Private network Destination address + 192.168.1.10:80 122.1.2.1:8080
destination port translation
SIP: 200.1.2.3 S Port: 1025 SIP: 200.1.2.3 S Port: 1025
Data Data
DIP: 192.168.1.10 D Port: 80 DIP: 122.1.2.1 D Port: 8080
122.1.2.1 Internet
Web server NAT 200.1.2.3
192.168.1.10
SIP: 192.168.1.10 S Port: 80 SIP: 122.1.2.1 S Port: 8080
Data Data
DIP: 200.1.2.3 D Port: 1025 DIP: 200.1.2.3 D Port: 1025
52 Huawei Confidential
Route Advertisement in a NAT Address Pool
⚫ In some cases, the NAT device may not be the egress device, so the return traffic needs to be diverted to the NAT
device. To achieve this, you can import user network routes (UNRs) to a routing protocol.
⚫ UNRs are generated by non-interface IP addresses and do not exist on any interface. In a NAT scenario, the device
creates UNRs for addresses in the NAT address pool. For example, if the NAT address pool has addresses 122.1.2.2
and 122.1.2.3, the device automatically creates UNRs 122.1.2.2/32 and 122.1.2.3.3/32.
IP routing table
122.1.2.2/32 UNR NH: Local
122.1.2.3/32 UNR NH: Local
Routes are transmitted
NAT address R1 through OSPF.
After an address pool is
pool
configured, 32-bit UNRs are
122.1.2.2 IP routing table
automatically generated.
122.1.2.3 NAT device 122.1.2.2/32 OSPF NH: R1
122.1.2.3/32 OSPF NH: R1
Internet
Egress device Web server
OSPF
53 Huawei Confidential
Security Risks of the NAT Mapping Table
⚫ After forwarding a data packet, the NAT device generates a NAT mapping table. When receiving a return packet, the NAT device
considers the packet valid and forwards it only when a matching NAT mapping entry is found.
⚫
If an external host uses the public IP address and port number in the NAT mapping table to send a packet, will the data be
forwarded? NAT address pool NAT mapping table
122.1.2.2 Private IP Public IP
122.1.2.3
Address:Port Address:Port
Source 192.168.1.1:10321 122.1.2.2:1025 DIP: 122.1.2.2 D Port: 1025 Data
Destination 200.1.2.3:80 --------
External host
Source address +
Private network source port number translation
SIP: 192.168.1.1 S Port: 10321 SIP: 122.1.2.2 S Port: 1025
Data Data
DIP: 200.1.2.3 D Port: 80 DIP: 200.1.2.3 D Port: 80
PC2 PC1
Internet
NAT 122.1.2.1
192.168.1.2/24 192.168.1.1/24
Web server
SIP: 200.1.2.3 S Port: 80 SIP: 200.1.2.3 S Port: 80 200.1.2.3
Data Data
DIP: 192.168.1.1 D Port: 10321 DIP: 122.1.2.2 D Port: 1025
54 Huawei Confidential
55 Huawei Confidential
Basic Concepts of NAT Types
⚫ NAT can be classified into two types: cone NAT and symmetric NAT.
⚫ Cone NAT is further classified into full cone NAT, restricted cone NAT, and port restricted cone NAT.
56 Huawei Confidential
• NAPT and Easy IP are also known as source NAT because they change only the
source address and port number of a packet.
Full Cone NAT
⚫ One internal tuple is translated into one external tuple by NAT. Any external host can send packets with the address and port
number in the external tuple as the destination. When receiving such packets, the NAT device forwards them to the device
corresponding to the mapping internal tuple. Full cone NAT is simple but has security risks.
NAT address pool NAT mapping table DIP: 122.1.2.2 D Port: 1025 Data
122.1.2.2
122.1.2.3 Internal tuple Private IP Public IP External host
Address:Port Address:Port 202.2.2.1
External tuple
Private network Source 192.168.1.1:10321 122.1.2.2:1025
Destination 200.1.2.3:80 --------
Target tuple
PC2 PC1
122.1.2.1 Internet
192.168.1.2/24 192.168.1.1/24
NAT Web server
200.1.2.3
• After PC1 on a private network communicates with the web server, the NAT device generates a NAT mapping table. If full cone N AT is used and
an attacker sends a packet with the external tuple (122.1.2.2:1025) as the destination, the NAT device forwards this packet to PC1.
57 Huawei Confidential
Restricted Cone NAT
⚫ Restricted cone NAT is a restricted version of full cone NAT. When receiving a packet from an external host, the NAT device with
restricted cone NAT enabled no only checks whether the destination address and port number of the packet are the same as those in
the external tuple but also checks whether the source IP address of the packet is the same as the IP address in the target tuple. If
both conditions are met, the packet is forwarded.
Restricted cone NAT
122.1.2.1 Internet
192.168.1.2/24 192.168.1.1/24
NAT Web server
200.1.2.3
• After PC1 on a private network communicates with the web server, the NAT device generates a NAT mapping table. If restricted cone NAT is used
and an attacker sends a packet with the external tuple (122.1.2.2:1025) as the destination, the NAT device forwards this packet to PC1 only when
the source address of this packet is the IP address (200.1.2.3) in the target tuple.
58 Huawei Confidential
Port Restricted Cone NAT
⚫ Port restricted cone NAT is a restricted version of restricted cone NAT. When receiving a packet from an external host, the NAT device with port restricted
cone NAT enabled not only checks whether the source IP address and port number of the packet are the same as those in the external tuple but also
checks whether the destination IP address and port number of the packet are the same as those in the target tuple. If both conditions are met, the packet
is forwarded. This type of NAT is highly secure.
• After PC1 on a private network communicates with the web server, the NAT device generates a NAT mapping table. If port restri cted cone NAT is
used and an attacker sends a packet with the external tuple (122.1.2.2:1025) as the destination, the NAT device forwards this packet to PC1 only
when the source address and source port number of this packet are those in the target tuple (200.1.2.3:80).
59 Huawei Confidential
Symmetric NAT
⚫ When symmetric NAT is used, the same internal tuple and the same target tuple are translated into the same external tuple. However, if the internal or
target tuple is different, they are translated into different external tuples. The NAT device with symmetric NAT enabled processes returned packets in a
similar way to that with port restricted cone NAT enabled. Such a NAT device checks whether the source IP address + port number and the destination IP
address + port number of a return packet are the same as those in the external tuple and target tuple, respectively.
Symmetric NAT
NAT mapping table
Private IP Public IP SIP: 200.1.2.3 S Port: 53
Internal tuple Data
Address:Port Address:Port DIP: 122.1.2.3 D Port: 1025
60 Huawei Confidential
NAT Application Scenarios
⚫ On the live network, NAPT or Easy IP generally uses symmetric NAT.
⚫ When NAT traversal is required on the live network, cone NAT can be used.
Full cone
NAT
NAT device PC
Internet
Full cone
NAT
NAT device PC
61 Huawei Confidential
Contents
62 Huawei Confidential
Motivation Behind NAT Traversal
⚫ Although NAT enables users on a private network to access a public network, it has the following defects:
NAT generates NAT mapping entries for the traffic from the private network to the public network. These entries have aging ti me. If a session between
the two ends is silent for a long time, the connection is interrupted.
The private IP addresses of users are translated into the same public IP address by NAT. However, because servers may restrict the access frequency of
the same IP address to prevent DoS attacks, some users may fail to access the servers. Besides, some applications cannot effectively trace the original IP
devices, making it difficult for network management and fault locating.
⚫
Multiple NAT traversal technologies are developed to solve the problems encountered by end-to-end IP applications in the NAT
environment.
NAT traversal
Private Private
network Internet network
63 Huawei Confidential
Existing NAT Traversal Technologies
⚫ Currently, the mainstream NAT traversal technologies are as follows:
Universal Plug and Play (UPnP)
Application Level Gateway (ALG)
Middlebox Communications (MIDCOM)
Full Proxy
Session Traversal Utilities for NAT (STUN)
Traversal Using Relay NAT (TURN)
Interactive Connectivity Establishment (ICE)
STUN and TCP too (STUNT)
64 Huawei Confidential
Motivation Behind NAT ALG
⚫ Servers that provide various services (such as HTTP, DNS, and FTP) on the live network are usually deployed on a private network. Therefore, the NAT
Server function needs to be deployed on the NAT device so that external users can access these services. However, some services use multi-channel
protocols, such as FTP, DNS, and SIP. Deploying NAT Server cannot allow external users to access these services. For these multi-channel protocols, you can
use NAT ALG to solve the problem.
DIP: IP3 D Port: 21 Data DIP: IP3 D Port: 21 Data DIP: IP4 D Port: 21 Data
The management channel is The management channel is
established and FTP control established and FTP control
packets are exchanged. packets are exchanged.
DIP: IP3 D Port: 1025 Data DIP: IP3 D Port: 1025 Data No related information exists in the
Random target NAT mapping table, and the data
port allocated by channel fails to be established.
the FTP server
• NAT cannot enable external users to access the FTP server because FTP is a multi-channel protocol, regardless of whether active or passive FTP is used.
65 Huawei Confidential
Fundamentals of NAT ALG
⚫ NAT ALG can parse the payload of packets, identify and translate important information (such as the destination port of the FTP data channel) in the
payload, and generate NAT mapping entries based on the important information to enable external hosts to access the servers on a private network.
Passive FTP NAT ALG reads the FTP control NAT mapping table
packet, learns that the Private IP Public IP
destination port of the FTP data Address:Port Address:Port
The management
channel is 1025, and generates Destination IP4:21 IP3:21 channel is
a NAT mapping entry.
Destination IP4:1025 IP3:1025 established, and the
client is notified of
NAT device Internet NAT device the port used by the
NAT ALG data channel.
IP1 IP2 IP3 IP4
enabled
DIP: IP3 D Port: 21 Data DIP: IP3 D Port: 21 Data DIP: IP4 D Port: 21 Data
The management channel is
The management channel is
established and FTP control
established and FTP control packets are exchanged.
Random target
packets are exchanged.
port allocated by IP header FTP control packets
the FTP server
DIP: IP3 D Port: 1025 Data DIP: IP3 D Port: 1025 Data DIP: IP4 D Port: 1025 Data
66 Huawei Confidential
Disadvantages of NAT ALG
⚫ NAT ALG needs to read protocol packets. For new protocols, the NAT ALG feature needs to
be upgraded to support them. NAT ALG does not support proprietary multi-channel
protocols.
⚫ A large number of devices on the live network do not support NAT ALG. As a result, the
deployment cost is high.
⚫ NAT ALG solves the problems facing multi-channel protocols in the NAT Server scenario, but
does not support the communication between hosts on private networks.
67 Huawei Confidential
Overview of STUN
⚫ In addition to NAT ALG, cone NAT can also be used for NAT traversal. It creates NAT mapping entries on NAT
devices in advance and establish connections between private networks based on the NAT mapping entries.
⚫ STUN is mainly used to obtain the mapping between the private IP address + port and the post -NAT public IP
address + port on the NAT device. The data channel for NAT traversal needs to be established in other modes.
NAT traversal
68 Huawei Confidential
• In RFC 3489, STUN is a complete NAT traversal solution and its full name is
Simple Traversal of UDP Through NATs.
• In the new RFC 5389 revision, STUN is positioned to provide a tool for NAT
traversal rather than a complete solution. The full name of STUN is changed to
Session Traversal Utilities for NAT. Besides the full name difference, STUN in RFC
5389 differs from STUN in RFC 3489 in that STUN in RFC 5389 supports NAT
traversal for TCP.
Fundamentals of STUN
⚫ STUN uses the client/server model. The STUN client and STUN server exchange packets to discover the NAT device and determine
the IP address and port number allocated by the NAT device.
STUN fundamentals
NAT mapping table Reads the source IP
Private IP Public IP address and source
Address:Port Address:Port port number of the
data packet and adds
IP1:Port1 IP2:Port2
them to the STUN
STUN binding Address STUN binding binding response.
SIP: IP1 S Port: Port1 translation SIP: IP2 S Port: Port2
request request
Private
network IP1 IP2 Internet
STUN server
Port1 Port2
STUN client NAT device
STUN binding STUN binding
DIP: IP1 D Port: Port1 DIP: IP2 D Port: Port2
response Address response
translation
The STUN client records the
mapping between the private IP
address + port number and the IP=IP2, Port=Port2
public IP address + port number.
IP1:Port1 <-> IP2:Port2
69 Huawei Confidential
Application Example of STUN
⚫ In an SD-WAN scenario, STUN can be used to interconnect post-NAT devices and establish data channels.
STUN server
1 1
Private NAT device NAT device Private
network IP1 IP2 Internet IP3 IP4 network
Port1 Port2 Port3 Port4
STUN client 2 2 STUN client
70 Huawei Confidential
• STUN clients use BGP to learn each other's NAT information (IP addresses and
port numbers before and after NAT).
• The local STUN client uses the local pre-NAT IP address and port number and the
pre-NAT IP address and port number of the peer STUN client to construct a
STUN binding request and sends it to the peer STUN client. In addition, the local
STUN client uses the local pre-NAT IP address and port number and the post-
NAT IP address and port number of the peer STUN client to construct a STUN
binding request and sends it to the peer STUN client. The peer STUN client
performs the same operations.
• After receiving the STUN binding request, the peer STUN client sends a STUN
binding response to the local STUN client. The local STUN client performs the
same operations.
• After the preceding STUN messages are exchanged, a data channel is established
between the STUN clients so that packets can traverse the NAT devices.
Contents
▫ SRP
71 Huawei Confidential
Service Reliability
⚫ In the cloud computing era, network reliability cannot meet user requirements. Users want
to understand the live network status based on applications and adjust the network based
on the application status.
⚫ Such requirement poses the following challenges to traditional networks:
Traditional networks cannot accurately identify applications.
Traditional networks cannot be adjusted based on applications.
⚫ To cope with the challenges, two technologies are developed:
Smart Application Control (SAC): This technology can flexibly identify applications.
Smart Policy Routing (SPR): This technology can switch forwarding paths based on the network or
application status.
72 Huawei Confidential
Overview of SAC
⚫ Traditional networks are managed based on traffic. However, in the cloud computing era,
services are becoming increasingly important. Networks need to be managed and monitored
based on applications instead of Five-tuple information.
⚫ Traditional routing and switching devices cannot identify application-layer information.
Therefore, it is difficult to manage networks based on applications. Smart Application
Control (SAC) technology helps routing and switching devices identify classified applications.
⚫ SAC uses service awareness (SA) and first packet identification (FPI) technologies to detect
and identify Layer 4 to Layer 7 information (such as HTTP and RTP) in packets.
73 Huawei Confidential
SAC Signature Database
⚫ Signature identification is a basic function of SA technology. Different applications typically use different protocols,
and different application protocols have their own signatures. A signature that can identify a protocol is known as a
signature code. The system analyzes service flows passing through a device, and compares the analysis result with
the signature database on the device. It identifies an application by detecting the signature code in data packets.
⚫ SAC signature databases include FPI and SA signature databases. FPI signatures refer to signatures for identifying
FPI applications, and SA signatures refer to signatures for identifying SA applications.
⚫ SAC working mechanism
QoS policy
Service traffic
Matching the web
SAC detection Traffic policy
page service
Signature matching
Audio/Video
Signature optimization
database
74 Huawei Confidential
• The SAC signature database file can only be updated through upgrades and
cannot be manually modified.
• The SAC signature database can be updated in either of the following modes:
▫ Online update: The SAC signature database can be updated through the
security center platform or intranet update server.
▫ Local update: The upgrade package is downloaded from the security center
platform and uploaded to the device through FTP for the update of the SAC
signature database.
SAC Application Identification Process
⚫ During SAC application identification, the system checks whether an application is identified. If the application is not
identified, the system checks the FPI signature database and SA signature database in sequence.
Network device
Service traffic
Application
Download
identification record
Forwarding table
Voice
SAC detection FPI signature
database Web page
Signature
matching
SA signature Video
database
75 Huawei Confidential
• After a packet enters the device, the device determines whether the
corresponding application has been identified based on the 5-tuple information
carried in the packet. If the application has been identified, the device forwards
the packet at Layer 3 without identifying the application again. If the application
has not been identified, the device performs the SAC application identification
process. The device then processes the packet based on the SAC identification
result and forwards the packet at Layer 3. The SAC application identification
process is as follows: The device identifies an application based on the ACL rules
defined in FPI. If the application cannot be identified, the device identifies the
application based on the DNS entries defined in FPI. If the application still cannot
be identified, the device identifies the application based on the protocol and port
mapping table defined in FPI. If the application still cannot be identified, the
device starts the SA identification process.
SA
⚫ After receiving data, the device can use service awareness (SA) technology to match applications.
⚫
SA uses the SA signature database to detect services. The existing SA signature database is embedded with more than 6000
applications, ensuring a high identification rate for public applications. In most cases, the SA signature database can only be updated
online or locally and cannot be manually modified.
Signature
matching Voice
Service traffic
SA behavior
SAC detection Video
signature matching
Web page
76 Huawei Confidential
FPI
⚫ There is a problem in matching applications based on the SA signature code. That is, the application corresponding to the first
several packets may fail to be identified based on the SA signature code. As a result, the processing on the first and subsequent
packets may be inconsistent. First packet identification (FPI) enables a device to identify an application by matching the first packet
of a flow.
⚫
FPI identifies applications based on 5-tuple information, DSCP values, protocols, and DNS domain names. The system provides a
predefined FPI signature database to help SAC identify applications. You can also define FPI applications to identify new applications.
Signature
matching Voice
Service traffic
FPI signature
SAC detection Video
database
Web page
Matching
Application
conditions
Destination IP1, EF Voice
Destination Port1,
Web page
protocol number 6
Destination IP2, AF4 Video
77 Huawei Confidential
78 Huawei Confidential
Overview of SPR
⚫ In the cloud computing era, more users shift their attention from network connectivity to service availability, such
as service response speed and service quality. However, traditional networks cannot detect link quality and service
requirements, resulting in poor user experience.
⚫ Smart Policy Routing (SPR) addresses this problem. It actively detects the link quality and matches service
requirements to select an optimal link to forward service data. SPR prevents network blackholes and flappings.
SRP deployment
HQ Branch
SRP deployment
79 Huawei Confidential
SPR Service Differentiation
⚫ SPR differentiates traffic based on the protocol type, packet application, and packet information.
⚫ Different link quality parameter thresholds can be set for different services. You can set the delay (D), jitter (J),
packet loss rate (L), and composite measure indicator (CMI).
⚫ CMI is calculated based on the delay, jitter, and packet loss rate.
⚫ SPR selects routes based on the CMI.
Based on the packet application DSCP, VPN, TCP-flag… SPR module Branch
Based on packet
Source IP, Source Port, Destination IP…
information
80 Huawei Confidential
• When SPR selects routes for services based on the NQA detection result, the CMI
is calculated using the following formula:
• When SPR selects routes for services based on the IP FPM detection result, the
CMI is calculated using the following formula:
▫ CMI = D + J + L
▫ If IP FPM is used, a smaller CMI value indicates better link quality.
SPR Detection Link and Link Group
⚫ SPR obtains quality indicators of detection links through probes (NQA or IP FPM) and then selects an optimal link.
⚫ A link group can contain one or more detection links.
⚫ SPR defines three roles for links: primary link group, backup link group, and best-effort link. When no suitable link is
available in the primary and backup link groups, SPR activates the best-effort link to forward service data.
Primary
link group
Internet
Network
device MPLS
LTE
Backup
link group
81 Huawei Confidential
SPR Link Selection
⚫ SPR periodically obtains the NQA or IP FPM detection result to determine whether a link meets service requirements. If the link does
not meet service requirements, a link switchover is triggered.
⚫
The SPR link selection process is as follows:
Link selection based on the NQA test result Link selection based on the IP FPM test result
The NQA detection
result is read. The IP FPM detection
result is read.
Is there a primary link Yes The link with the optimal
whose quality meets CMI in the primary link Is there a primary link The link with the optimal
service requirements? group is used. Yes
whose quality meets CMI in the primary link
No service requirements? group is used.
Is there a backup link Yes The link with the optimal No
whose quality meets CMI in the backup link Is there a backup link Yes The link with the optimal
service requirements? group is used.
whose quality meets CMI in the backup link
No
service requirements? group is used.
Is the CMI of the No The link with the optimal
No
primary and backup link CMI in the primary and
groups 0? backup link groups is used. Is the CMI of the No The link with the optimal
primary and backup link CMI in the primary and
Yes groups 9000? backup link groups is used.
The best-effort link is
started. Yes
End
End
82 Huawei Confidential
⚫
iMaster NCE maintains site adjacency information and application policies, and SPR is configured on routers. Traffic-triggered link
selection allows for on-demand generation of SPR configurations. This prevents a large number of configurations from being created
on the device and reduces the impact of link selection (based on IP FPM) on the CPU, significantly reducing the burden on the
device.
⚫
iMaster NCE can use SAC to classify service traffic based on applications.
Network device
Site adjacency list Site adjacency list
83 Huawei Confidential
Quiz
B. L2TP
C. MPLS VPN
D. IPsec VPN
2. (True or false) SRP technology can flexibly select egress links based on the link quality.
( )
A. True
B. False
84 Huawei Confidential
1. AC
2. A
Summary
⚫ GRE over IPsec is used for WAN interconnection, and L2TP over IPsec is used for remote
intranet access.
⚫ Based on IKE SA information, IPsec SA information can be securely transmitted on the
public network. Based on IPsec SA information, service data can be securely transmitted on
the public network.
⚫ To establish a WAN connection between two private network devices, you need to use a
NAT traversal technology. The common NAT traversal technology is STUN.
⚫ To ensure WAN reliability, the link quality needs to be detected first, and then a proper
egress or egress link is selected based on the link quality through specific technologies.
85 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
3 Huawei Confidential
Challenges Brought by Cloud Computing to Enterprise WAN
Interconnection
⚫ Before cloud computing is widely used, there are only a
small number of network applications. The network
service quality depends only on the bandwidth, and
service traffic does not need to be managed in a
refined manner. The Internet is built on a network- HQ
centric design.
⚫ The advent of the cloud computing era leads to a
significant increase in the number of network
WAN
applications. Enterprises have difficulty in striking a
balance between the line price and service quality in Growing services of
the enterprise
the face of soaring traffic.
4 Huawei Confidential
Challenges Brought by Multiple Services to Enterprise WAN
Interconnection
⚫
Enterprises are unable to detect service quality in real time and therefore cannot effectively guarantee key services. In addition,
enterprises cannot monitor service traffic in real time, and therefore are unable to quickly adjust service traffic.
Difficulty in managing key services such as voice, video, and SaaS
No application visibility, causing difficulty in traffic scheduling
applications
Unknown
application
5 Huawei Confidential
Challenges Brought by Large Numbers of Branches to
Enterprise WAN Interconnection
⚫
With the development of an enterprise, it will have more and more cross-city, cross-province, and cross-country branches, causing
the following problems in managing branch site networks:
Too many branches result in high O&M costs.
It takes a long time to provision new services in branches.
It is difficult to rectify faults on branch networks.
Branch 1
Branch site
Branch 2 Branch site
Branch site
Branch site
…
Branch n
6 Huawei Confidential
Emergence of SD-WAN
⚫ Software Defined Wide Area Network (SD-WAN) technology can better address the challenges faced
by enterprise WAN interconnection in the cloud computing era.
⚫ SD-WAN is a combination of software-defined technology and WAN technology. It leverages SDN to
reshape WANs by applying the SDN architecture and concepts to WANs.
Characteristics of SD-WAN
by ONUG
deployment efficiency.
⚫
Dynamically adjusts traffic paths by application type,
SD-WAN characteristics defined by making traffic steering more flexible and convenient.
Gartner
⚫
Provides automatic and intelligent O&M capabilities to
implement centralized management and control and
network-wide status visualization.
SD-WAN characteristics defined by MEF
⚫
Provides value-added services (VASs) such as WAN
optimization and security to implement fast service
provisioning.
7 Huawei Confidential
• Gartner: It is the world's most authoritative IT research and advisory company. Its
research scope covers all IT industries. It provides objective and fair
demonstration reports and market research reports for customers in terms of IT
research, development, evaluation, application, and market, thereby assisting
customers in market analysis, technology selection, project demonstration, and
investment decision-making.
• The Metro Ethernet Forum (MEF) is a non-profit organization dedicated to
solving the technical problems of the Metro Ethernet. It aims to widely apply the
Ethernet technology to the construction of the Metro Ethernet as switching and
transmission technology. The objective of MEF is to promote the implementation
of existing and new standards, Ethernet service definitions, test procedures, and
technical specifications, developing Ethernet-based MANs into carrier-class
networks. The major tasks of MEF also include providing LSO-based solutions
(LSO is short for Lifecycle Service Orchestration) and architectures for carriers'
managed service markets and defining northbound interfaces (NBIs) to enable
multi-vendor interoperability.
Contents
9 Huawei Confidential
Overview of Huawei SD-WAN Solution
Customer Benefits Key Technologies
5G uplink: 5G supported by all CPE series
Benefits for Enterprises ... products
• Lower O&M cost • Large bandwidth: 230 Mbit/s for uplink, 900
Cloud applications Self-service portal Mbit/s for downlink
• Higher WAN utilization
• Minute-level service provisioning • Support for all network generations: 5G/4G/3G/2G
(location independent) networks
• Improved O&M efficiency, cloud High performance: no congestion during
Optimization
management & automation forwarding
• Increased revenue Subscription O&M • CPU+NP heterogeneous forwarding architecture
Develop new B2B business fields: VAS, Optimal experience: application-based intelligent
connectivity, Managed LAN traffic steering, ensuring experience of key
Deployment Adjustment applications
• Smooth evolution, openness, and quick
integration Automation Insights Visualization • Application-based intelligent traffic steering,
RESTful API, CPE/vCPE enabling on-demand 5G+fiber scheduling.
Simplified O&M: full-process automation and
plug-and-play
Hybrid WAN • Visibility of application, branch, device, and link
status, and centralized management
Public
Branch 1 cloud
Internet Edge
Edge xDSL/Ethernet ERP, HQ/DC
/LTE...
Edge video... site
MPLS
Branch 2 Edge LTE Legacy
IWG network
10 Huawei Confidential
Architecture of Huawei SD-WAN Solution
Self-developed portal or third-party BSS/OSS
Product
RESTful API
Role Funcation
Management layer Form
1) Network service orchestration
2) Network performance
Management iMaster
monitoring and visualization
layer NCE
Control layer 3) Network O&M
4) Network device management
RR NETCONF/SSH 1) Routing and tunnel information
distribution
Telemetry RR (AR
Control layer 2. IPsec key exchange
BGP/DTLS Router)
Network layer 3) VPN topology definition
4) NAT Stun service
1) EDGE: egress CPEs at enterprise
Public
cloud site branches, headquarters, DCs, and
Network
Branch Internet cloud sites AR Router
site
EDGE layer
2) GW: multi-tenant gateway
EDGE HQ/DC
device
Branch site
site MPLS EDGE
EDGE MPLS
legacy site
GW
11 Huawei Confidential
• The overall architecture of the SD-WAN solution consists of the network layer,
control layer, and orchestration layer. The layers are associated with each other
through standard interfaces and communication protocols.
Northbound
RESTful SNMP Trap Syslog
interfaces
Visualized
Service functions Plug-and-play Traffic policy Security policy
O&M
Southbound
NETCONF HTTP/2
interfaces
12 Huawei Confidential
Network Layer Overview
⚫ An enterprise SD-WAN network can be divided into two layers: physical network (underlay) and virtual network
(overlay), which are completely decoupled from each other.
Physical network: refers to the underlay WAN provided by a carrier or built by the enterprise, including the private line network
and the Internet.
Virtual network: also called the overlay network. Huawei SD-WAN Solution uses the IP overlay virtualization technology to build
one or more virtual overlay networks on top of the physical network. Service policies are deployed on virtual networks and are
decoupled from the physical network, thereby separating services from the WAN.
GW
Legacy
site
EDGE
Branch
site EDGE/RR
HQ
EDGE
Branch
site Overlay
Virtual network
Carrier network/
Self-built network
Underlay
Physical network
13 Huawei Confidential
• Multiple virtual networks can be deployed to provide different services for the
same tenant (for example, services for multiple departments) or provide different
services for different tenants.
• In terms of network device functions, the network layer of the SD-WAN Solution
consists of two types of NEs: CPE and gateway (GW).
EDGE Overview
⚫ A EDGE is essentially an edge node of the SD-WAN network. EDGEs are interconnected using the IP overlay tunneling technology.
⚫
Traditional hardware EDGEs are typically used on the HQ and branch sites, and virtual devices can be deployed at sites on the public
cloud.
⚫
All SD-WAN EDGEs of an enterprise are centrally managed and maintained in iMaster NCE-WAN by the tenant administrator.
Central
management
VPC/vNet
EDGE
Branch
Virtual site
Device(vCPE) EDGE
Branch
site EDGE/RR
HQ
EDGE
Hardware Branch
Device (CPE) site
Overlay
Virtual network
14 Huawei Confidential
RR Overview
⚫ A route reflector (RR) is used to transmit BGP routes.
⚫ In Huawei SD-WAN Solution, RRs also control routes
and network topologies. Therefore, RRs are also called
Filter overlay routes
Control overlay topology regional controllers in this solution.
RR
Regional
controller
⚫ Both RRs and EDGEs at edge sites are managed by
Branch
site
iMaster NCE-WAN.
MPLS EDGE
⚫ Control channels are established between RRs as well as
HQ/DC site
between RRs and edge sites.
EDGE
Internet
⚫ RRs are managed by iMaster NCE-WAN and control
Branch route sending and receiving at edge sites based on the
site
EDGE overlay network topology model. In this way, sites can
communicate with each other based on the user-
Management channel BGP EVPN peer relationship
configured overlay topology model.
15 Huawei Confidential
• RR site: The CPE at the site functions as an RR and distributes EVPN routes
between CPE gateways at edge sites based on VPN topology policy.
• If the tenant administrator assigns the role of "gateway + RR" to an egress CPE
when adding the CPE, the site where the CPE resides is an RR site. If no device at
a site is assigned the "gateway + RR" role, the site is an edge site.
• An edge site can establish IBGP peer relationships with two RRs that back up
each other.
• Multiple RRs can be deployed for a tenant. All RRs are connected in full-mesh
mode on the control plane.
Gateway Overview
⚫ New SD-WAN sites of an enterprise need to communicate with its legacy sites or third-party services.
Some legacy sites are interconnected through MPLS VPN, and SD-WAN sites are interconnected
through IP overlay tunnels. Therefore, the legacy network and SD-WAN network cannot directly
communicate with each other.
⚫ An SD-WAN gateway can connect to both the SD-WAN and legacy networks. It can function as an
intermediate gateway to implement interconnection between SD-WAN and legacy networks.
PE
Enterprise 1 Enterprise 1
Gateway
MPLS SD-WAN
network Enterprise 2
ASBR-PE
Enterprise 2
PE
Enterprise 3
Legacy MPLS domain SD-WAN domain
16 Huawei Confidential
Branches in small or
midsize enterprises EDGE
AR6120 series AR6140 series
NetEngine An AR
AR6100 series
router can
RR
be used as a
Small enterprise EDGE, RR,
NetEngine AR650 series or gateway.
AR650 series
Gateway
SOHO
NetEngine AR610 series
AR610 series
17 Huawei Confidential
Contents
18 Huawei Confidential
Major Functions of Huawei SD-WAN Solution
⚫ Huawei SD-WAN Solution provides the following functions:
ZTP, enabling service provisioning to be completed within 1 hour
Visualized
RR O&M
Forwarding-control separation, enabling flexible networking
Forwarding-
Control control
Application optimization, enabling service controllability and visibility separation
channel
Complete security protection system, eliminating security risks
EDGE
ZTP Branch
Visualized O&M for quick fault locating Security
site hardening
EDGE
Branch
site EDGE
HQ
EDGE
Branch
site Overlay
Virtual network
Carrier network/
Self-built network
Underlay
Physical network
19 Huawei Confidential
• ZTP: Multiple ZTP modes are available to enable EDGEs to quickly register with
iMaster NCE-WAN.
• Forwarding-control separation enables flexible networking: Each EDGE
establishes a management channel with iMaster NCE-WAN through NETCONF,
and iMaster NCE-WAN delivers configurations to EDGEs to establish IP overlay
tunnels between the EDGEs.
• Visualized O&M for quick fault locating: iMaster NCE-WAN collects network-wide
data and displays key indicators, helping O&M personnel quickly locate faults.
ZTP Flexible networking Application optimization Security
ZTP Overview
⚫ With the development of network technologies such as SDN and cloud computing, a growing number of enterprise
networks are using cloud-based management mode, but most sites still need to be deployed by technical engineers
onsite, leading to high deployment costs and long deployment periods. To address these problems, Huawei
develops the Zero Touch Provisioning (ZTP) function.
ZTP process
1 Configure the
ZTP file. 3
Log in to
the PC.
Internet/MPLS
20 Huawei Confidential
▫ Email-based deployment
▫ DHCP-based deployment
▫ USB-based deployment
ZTP Flexible Networking Application Optimization Security
ZTP Modes
⚫ Huawei SD-WAN Solution supports the following ZTP modes:
Multi-tenant Subscription
management and self-service
MSP/Carrier Enterprise
21 Huawei Confidential
(management channel)
technologies — such as Layer 2 switching, Layer 3 RR
NETCONF
routing, and VPN isolation — to achieve on-demand, 2
flexible, and automatic connections between
enterprise branches, DCs, and the cloud, with full
management support provided by iMaster NCE-WAN. MPLS
3
⚫ Huawei SD-WAN Solution uses the following HQ/DC site GRE/GRE over IPsec (data channel) Branch site
channels to implement flexible networking: EDGE EDGE
• Management channel:
• Data channel:
▫ EDGEs set up data channels with each other.
▫ EDGEs forward data based on GRE or GRE over IPsec tunnels. The extended
GRE header carries VN IDs to differentiate tenants or departments, thereby
transmitting data of multiple VNs over the same tunnel.
ZTP Flexible Networking Application Optimization Security
Management Channel
⚫ Huawei iMaster NCE-WAN establishes management Service presentation layer
Site
channels with CPEs through NETCONF. NTP configuration
IPsec
interconnection
configuration
configuration
⚫ iMaster NCE-WAN delivers configurations through Wireless network Wired network IP service
configuration configuration configuration
control channels to achieve the following functions: Routing protocol Routing policy
…
configuration configuration
Unified management of CPEs, automatic service
delivery, and unified control of overlay networks Configure parameters
Network
on iMaster NCE-WAN.
administrator 1
Application visualization and automatic application
Control
optimization layer
23 Huawei Confidential
ZTP Flexible Networking Application Optimization Security
Control Channel
⚫
After iMaster NCE-WAN delivers configurations to a CPE through the management channel, the CPE establishes a control channel with an RR
through BGP EVPN.
⚫
The control channel is used to transmit transport network port (TNP) information, IPsec SA information, and service routes.
⚫
After the control channel is established, iMaster NCE-WAN controls route transmission and overlay topology establishment by deploying
policies on the RR.
Control layer
NETCONF Deliver configurations
Network layer (management channel) through NETCONF.
1
4 Control route
Establish a BGP EVPN peer
transmission relationship with the RR
based on policies. based on configurations. 2
MPLS
3
Transmit TNP, IPsec SA, and Internet
service route information
through BGP EVPN.
24 Huawei Confidential
• A TNP is a WAN port on a CPE used for connecting to a transport network. The
key TNP information includes the site ID, CPE router ID, transport network ID,
public IP address, private IP address, and tunnel encapsulation mode.
ZTP Flexible Networking Application Optimization Security
Data Channel
⚫ Huawei SD-WAN Solution uses GRE or GRE over IPsec to establish data channels.
⚫ CPEs establish GRE or GRE over IPsec tunnels based on the TNP and IPsec SA information transferred through BGP
EVPN.
⚫ CPEs forward data based on the service routes transferred through BGP EVPN.
Network layer
Service Service
network GRE or GRE over IPsec (data channel) network
segment segment
Internet
25 Huawei Confidential
ZTP Flexible Networking Application Optimization Security
⚫ To address these problems, Huawei SD-WAN Solution provides the application experience optimization solution
that offers the following functions:
Typical application optimization process
Application identification
Intelligent traffic steering
QoS EDGE
Packet loss mitigation
Application Intelligent
Receive Packet loss Forward
identificati traffic QoS
packets mitigation packets
on steering
26 Huawei Confidential
ZTP Flexible Networking Application Optimization Security
2 Application-
1 Application based traffic
Video steering
identification MPLS
applications
SAC SPR
Voice
functional functional
module applications module
27 Huawei Confidential
• For details about SAC and SPR, learn the course HA Technologies.
ZTP Flexible Networking Application Optimization Security
Packet
2 loss
Add FEC Key traffic 2
redundancy
packets. P 4 3 1
Key traffic 1
HQoS Key traffic
4 3 2 1 MPLS
P 4 3 2 1
Application
identification and
traffic steering
Restore packets
Internet
3 through FEC.
28 Huawei Confidential
ZTP Flexible Networking Application Optimization Security
Security Overview
⚫ The advent of SD-WAN stimulates the transition
of the enterprise WAN architecture from the
traditional closed architecture to an open one.
This increases the attack surface and brings new
Security hardening
security challenges, such as unauthorized access,
(management channel)
for iMaster NCE-
WAN 1
data leakage, and network attacks.
1
NETCONF
Management RR
⚫ The security of Huawei SD-WAN Solution channel
security Control 1
involves two aspects: channel
security
1. System security: includes inter-component security 1 Security
hardening
and component security. MPLS for EDGEs
29 Huawei Confidential
ZTP Flexible Networking Application Optimization Security
(management channel)
NETCONF over SSH
RR
1 SSH ensures the IPsec ensures the 1
management control channel
channel security. security. Local attack defense,
2
authentication, and
other features ensure
MPLS the CPE security.
HQ/DC site GRE or GRE over IPsec (data channel) Branch site
CPE CPE
Internet IPsec ensures the 1
data channel security.
30 Huawei Confidential
ZTP Flexible Networking Application Optimization Security
31 Huawei Confidential
Visualized O&M Overview
Quickly obtain Quickly locate faulty Optimize WAN investment
abnormal traffic devices or sites and configuration policies
32 Huawei Confidential
Contents
33 Huawei Confidential
SD-WAN Business Model: Enterprise-Built
iMaster NCE-WAN
Products
Functions
Involved
RR
As the core of the SD-WAN Solution, it
iMaster centrally manages CPEs, automatically
CPE Enterprise NCE-WAN delivers services, and uniformly controls
CPE HQ/DC the overlay network.
It is the distributed control component
MPLS RR that distributes VPN routes between
EDGEs based on VPN topology policies.
Internet LTE Egress EDGEs of enterprise branches,
Cloud EDGE
headquarters, and DCs.
CPE An intermediate gateway device that
Enterprise SD-WAN
branch connects an SD-WAN network with a
SD-WAN Legacy gateway
non-SD-WAN network.
gateway site
⚫
SD-WAN: iMaster NCE-WAN is deployed on the WAN to centrally manage EDGEs and implement ZTP, thereby shortening the
service provisioning time. This helps enterprises cope with challenges brought by cloud services and change services on demand.
⚫ Large enterprises with a vast number of branches, such as financial institutions, retail chains, and gas stations, can deploy iMaster
NCE-WAN at the headquarters to set up SD-WAN networks and manage SD-WAN services on their own.
34 Huawei Confidential
SD-WAN Business Model: MSP Resale
iMaster NCE-WAN
RR
Enterprise
HQ/DC
EDGE
EDGE Internet
Internet
MSP's multi-PoP LTE
LTE
backbone network MPLS
MPLS
Enterprise branch
PoP PoP
⚫
A managed service provider (MSP) provides a unified SD-WAN controller (iMaster NCE-WAN) to offer SD-WAN services for multiple
enterprises. The MSP builds a PoP backbone network, to which an enterprise can connect through the nearest PoP provided by the
MSP, thereby achieving high-quality enterprise interconnection. A PoP supports multiple tenants and provides PoP access for
multiple enterprises at the same time.
⚫ Enterprises, as tenants, lease SD-WAN services provided by MSPs. An enterprise tenant can manage the SD-WAN services of all sites
belonging to it, but it cannot view the SD-WAN services of other tenants.
35 Huawei Confidential
SD-WAN Business Model: Carrier Resale
Carrier DC ⚫ A carrier provides SD-WAN services for multiple
Carrier's management center enterprises through iMaster NCE-WAN.
iMaster NCE-WAN
RR RR
⚫ Enterprises, as tenants, lease SD-WAN services provided
Carrier's backbone
by carriers. An enterprise tenant can manage the SD-
network WAN services of all sites belonging to it, but it cannot
Carrier network
SD-WAN gateway
SD-WAN gateway SD-WAN gateway view the SD-WAN services of other tenants. Enterprises
either manage and control their SD-WAN services
Retail company Retail company
HQ/DC HQ/DC based on the tenant permissions assigned by carriers, or
EDGE EDGE
they can entrust their SD-WAN services to carriers for
Enterprise network
management and control.
Internet
MPLS Internet
LTE ⚫ SD-WAN gateways are used to implement flexible
interconnection and fast compatibility between SD-
EDGE EDGE EDGE EDGE WAN networks and carriers' legacy backbone networks.
36 Huawei Confidential
Section Summary
⚫ SD-WAN solves the problems of difficult management, and expensive construction and maintenance
costs in multi-branch interconnection scenarios. It also guarantees the quality of key services.
⚫ Huawei SD-WAN Solution provides the following functions:
ZTP, enabling service provisioning to be completed within 1 hour
Forwarding-control separation, enabling flexible networking
Application optimization, enabling service controllability and visibility
Complete security protection system, eliminating security risks
Visualized O&M for quick fault locating
⚫ Huawei SD-WAN Solution is offered in three business models: enterprise-built, MSP resale, and carrier
resale.
37 Huawei Confidential
Contents
38 Huawei Confidential
Overview of Networking Design for Huawei SD-WAN
Solution
⚫ SD-WAN networking design includes site design, tunnel design, and VPN design.
VPN1
VPN design
EDGE EDGE/RR VPN2
Branch
site Active DC
Overlay
(virtual network)
Carrier network/
enterprise-built network
Underlay
(physical network)
39 Huawei Confidential
Networking Design Process for Huawei SD-WAN Solution
Dual-CPE interconnection
NAT traversal design VPN route design
design
Specifications-exceeded
network design
40 Huawei Confidential
Contents
41 Huawei Confidential
Site Design Panorama
⚫ SD-WAN sites refer to sites for which SD-WAN is deployed for interconnection, and are
managed and monitored by iMaster NCE-WAN. EDGE/RR EDGE/RR RR2
RR1 Hub
⚫ Site design generally covers:
WAN-side network design
LAN-side network design MPLS Internet
Dual-CPE interconnection design
WAN-side Dual-CPE
network interconnection
design design
42 Huawei Confidential
WAN-Side Network Design LAN-Side Network Design Dual-CPE Interconnection Design
MPLS
/Internet MPLS Internet MPLS Internet LTE/5G
Dual-device networking
43 Huawei Confidential
• An SD-WAN site can be deployed with a single CPE or dual CPEs. For small sites,
a single CPE can be deployed. For sites with high reliability requirements, dual
CPEs are recommended to provide device-level redundancy.
• A maximum of 10 WAN links can be deployed for each CPE at an SD-WAN site.
During actual deployments, to enhance reliability and facilitate O&M, it is
recommended that a maximum of three WAN links be deployed for a single CPE
at a site, and a maximum of six WAN links be deployed for a site with two CPEs.
WAN-Side Network Design LAN-Side Network Design Dual-CPE Interconnection Design
44 Huawei Confidential
WAN-Side Network Design LAN-Side Network Design Dual-CPE Interconnection Design
Internet
Enterprise
intranet
CPE
MPLS
• WAN interfaces of CPEs support OSPF, EBGP, and static routing protocols. The routing protocol to be used must be the
same as that of the LAN-side network device.
• On the live network, if static routes are used, services may be interrupted because WAN network faults on indirect links
cannot be detected.
45 Huawei Confidential
WAN-Side Network Design LAN-Side Network Design Dual-CPE Interconnection Design
VRRP
VRRP
46 Huawei Confidential
▫ At small sites with a simple intranet structure, and CPEs typically connect to
the intranet of the site at Layer 2.
VRRP
• In the single-CPE architecture, LAN-side interfaces can be • In a dual-CPE architecture, VRRP is usually deployed.
directly connected to terminals at small sites. • Switches can be deployed on the LAN side to form a
• If the number of required LAN-side interfaces is beyond stack.
the CPE specifications, access switches can be connected • An interlink needs to be established between CPEs to
to the CPE. forward service packets between CPEs.
47 Huawei Confidential
▫ For small sites, for example, SOHO sites, LAN-side interfaces can be directly
connected to terminals at the sites.
• In the dual-CPE architecture, VRRP is usually configured for the CPEs to prevent
the dual-CPE architecture from affecting the LAN side.
▫ Multiple switches can be deployed on the LAN side to form a stack. If two
CPEs are deployed at a site, they can be interconnected directly or through
the LAN.
• In the Layer 3 interconnection scenario, if only one CPE is deployed, the network structure is
simple. In such a scenario, only the routing protocol needs to be configured on the LAN side
based on requirements of LAN-side devices.
48 Huawei Confidential
• For large enterprise sites, the network structure is complex as Layer 3 core
devices are deployed on the network. Therefore, egress routers must support
interconnection with Layer 3 devices. They can be connected to a Layer 3 network
directly or in dual-homing mode. BGP, OSPF, and static routes are supported.
• In the Layer 3 interconnection scenario, if only one CPE is deployed, the network
structure is simple. In such a scenario, only the routing protocol needs to be
configured on the LAN side based on requirements of LAN-side devices.
WAN-Side Network Design LAN-Side Network Design Dual-CPE Interconnection Design
49 Huawei Confidential
WAN-Side Network Design LAN-Side Network Design Dual-CPE Interconnection Design
Interlink
CPE1 CPE2 CPE1 CPE2
Interlink
LAN LAN
Site A Site A
50 Huawei Confidential
• Solution 1 is recommended. In this solution, the interlink and service links are
independent of each other. When WAN-side links are adjusted, the interlink will
not be affected, and the service flow direction is clear.
Contents
51 Huawei Confidential
Tunnel Design Overview
⚫ Tunnels in the SD-WAN Solution can be classified into: management tunnel, control tunnel,
and data tunnel. Control tunnels are established between RRs and EDGEs, and data tunnels
are established between EDGEs. Data tunnels carry services.
EDGE/RR EDGE/RR
Hub
⚫ Tunnel design generally covers: Specifications-exceeded
network design
RR design
RR1 RR2
Data tunnel design
RR design
NAT traversal design
MPLS Internet
Specifications-exceeded network design
Data tunnel
NAT device
design
NAT traversal
EDGE EDGE CPE design
Branch Branch
52 Huawei Confidential
Basic Concepts of Data Tunnel RR NAT Traversal Specifications-Exceeded
Tunnels Design Design Design Network Design
RD: MPLS
• WAN link: a link connecting to a WAN interface. A WAN link has a
RD: Internet
one-to-one mapping with a WAN interface. The IP address
obtaining mode, link negotiation rate, and bandwidth can be
GE0 GE1
configured for a WAN link.
GE0 GE1
• Transport network port (TNP): WAN interface through which a
CPE4 CPE5 CPE connects to a TN. Key information includes the site ID, CPE
CPE3
3.3.3.3 4.4.4.4 5.5.5.5 router ID, transport network ID, public IP address, private IP
(CPE router ID) (CPE router ID) (CPE router ID) address, and tunnel encapsulation.
Branch site 1 Site ID: BBB Site ID: CCC Branch site 2
53 Huawei Confidential
• The CPE router ID is used to establish BGP peer relationships between different
sites.
• TNPs are used to establish tunnels.
Basic Concepts of Data Tunnel RR NAT Traversal Specifications-Exceeded
Tunnels Design Design Design Network Design
TNP
⚫ A TNP mainly describes WAN link information of a site and is mainly used to establish control and data
tunnels.
⚫ The main information about a TNP is as follows: RD: RD1
TNP Information Example Description
MPLS-ISPA Internet-
Site ID 111 Site of the TNP. (TN1) ISPB (TN2)
54 Huawei Confidential
• The public and private IP addresses are used as the source or destination IP
addresses of control and data channels.
▫ Some CPEs are deployed behind the NAT device. To establish data channels
between CPEs, you need to know the post-NAT public IP address.
▪ CPEs typically use the Session Traversal Utilities for NAT (STUN)
technology to detect public IP addresses.
Basic Concepts of Data Tunnel RR NAT Traversal Specifications-Exceeded
Tunnels Design Design Design Network Design
Tunnel Enumeration
⚫ CPEs enumerate tunnels based on the RD and TN in
TNP information.
CPE1 CPE2
⚫ Tunnel enumeration ensures SD-WAN network GE0 GE1 GE0
CPE3
55 Huawei Confidential
• Data tunnels are enumerated before being established to ensure that all
available data tunnels are established.
• Tunnels can be enumerated only when the following conditions are met:
Installation 3
engineer Data channel
TNP
2 2
EDGE/RR EDGE EDGE
IPsec SA
EDGE EDGE
1. The administrator configures WAN link
parameters for EDGEs or RRs on iMaster 1. After iMaster NCE-WAN delivers 1. EDGEs reflect their respective TNP and
NCE-WAN. configurations to EDGEs and RRs through IPsec SA information through RRs.
2. The installation engineer delivers the the management channel, the EDGEs and 2. EDGEs reflect their service routes through
configuration to EDGEs or RRs through RRs establish a DTLS management channel RRs.
ZTP. with iMaster NCE-WAN. 3. After the TNP and IPsec SA information is
3. EDGEs or RRs proactively register with 2. EDGEs exchange TNP and IPsec SA advertised, a data channel is established
iMaster NCE-WAN and establish a information with RRs. through routes.
NETCONF channel (management channel) 3. A BGP EVPN control channel is established
with iMaster NCE-WAN. based on TNP and SA information.
56 Huawei Confidential
• The management channel is used to establish control channels and deliver basic
configurations.
• Control channels are used to establish data channels.
TN RD Site A TN RD Site A TN RD
Site A
MPLS-A RD1 Internet-A RD1 Internet-A RD1
• Sites A and B are connected through two • Sites A and B are connected through two • Sites A and B are connected through two
links and are isolated on the underlay links and can communicate with each other links and can communicate with each other
network. Different RDs are planned. Two on the underlay network. They are planned on the underlay network. They are planned
tunnels are established between the sites. in the same RD and set up a full-mesh in different RDs. Two tunnels are
network. established between the sites.
57 Huawei Confidential
Basic Concepts of Data Tunnel RR NAT Traversal Specifications-Exceeded
Tunnels Design Design Design Network Design
• Same RD for different TNs: The networking reliability is • Different RDs for different TNs: The number of
enhanced, but more virtual connection resources of the connections is reduced, and the networking scale is
device are consumed. expanded. However, the networking is less reliable.
58 Huawei Confidential
Basic Concepts of Data Tunnel RR NAT Traversal Specifications-Exceeded
Tunnels Design Design Design Network Design
RR Deployment Mode
Method 1: co-deployment of the RR Method 2: independent deployment Method 3: deployment of RRs in
and EDGE of RRs multiple areas
Area A
HQ/DC RR site HQ/DC
EDGE RR EDGE
(RR) EDGE
RR
RR RR
• A site that functions as an RR not only • Sites that function as RRs do not have • Multiple areas are created, in each of which
implements control on the control layer LAN-side networks and do not function at least one pair of RRs are deployed. RRs in
but also forwards service traffic of the as hubs for other sites to communicate different areas establish BGP EVPN peer
site on the forwarding layer. with each other. The RR does not relationships with each other to advertise
process service data and only performs and learn VPN routes of different areas.
control-layer operations.
59 Huawei Confidential
▫ To prevent site network adjustment from affecting the stability of RRs, you
are advised to use method 2, that is, independent deployment of RRs.
▫ Use high-performance devices as RRs. For details about the devices that can
function as RRs, see the specifications list.
▫ Configure a public IP address for an RR, or deploy a NAT device before the
RR. Only 1:1 static NAT is supported.
▫ An EDGE site can connect to a maximum of two RR sites. Two EDGEs can
be deployed at each RR site deployed for a tenant. If there are a large
number of EDGEs, multiple RRs can be deployed, and each RR serves some
EDGE sites.
▫ When one EDGE is connected to two RR sites, the EDGE establishes a BGP
connection with each RR at the RR sites.
▫ If a branch site has a standby link, for example, the branch or the RR has a
standby link, and the active link is normal, no control channel is established
for the standby link. When all active links from the branch site to the RR
are down, the standby link is involved in the establishment of control
channels.
▫ It is not recommended that standby links be established at RR sites.
▫ If the number of EDGEs on the network exceeds the RR control
specification, you are advised to assign sites to different areas. An
independent RR is deployed in each area, and BGP peer relationships are
established between RRs in each area to exchange routes between areas.
▫ When deploying RRs, consider the total number of routes on the LAN side
of each site to prevent the route specifications of the RR from being
exceeded.
▫ The BGP peer relationship is established between the EDGE and RR using
the loopback address. If multiple tunnel connections are available between
the EDGE and RR, a random connection is used to establish the BGP peer
relationship. When a WAN link fails, BGP automatically switches services to
another link, and services between sites are not affected. When all RRs are
faulty, the connections with EDGEs are unavailable, interrupting services
between sites. Therefore, RR reliability must be ensured during actual
deployment. For example, deploy two EDGEs at an RR site, specify two RR
sites for the edge, and use distributed RR sites (each RR site is responsible
for some EDGEs). This prevents network-wide service interruption caused
because the only RR deployed on the network is faulty.
Basic Concepts of Data Tunnel RR NAT Traversal Specifications-Exceeded
Tunnels Design Design Design Network Design
RR Deployment Principles
Co-deployment of ⚫ Considering the importance of RRs, follow the principles
the RR and EDGE
Independent below when deploying RRs:
RR deployment EDGE/RR
Hub EDGE/RR
Redundancy must be implemented for RRs. That is, at least two
RR1 RR2
RRs must be deployed on the live network. This prevents
network-wide services from being interrupted because the only
RR deployed on the network fails.
An edge site must be connected to two RRs to implement egress
MPLS Internet
backup.
It is recommended that RRs be independently deployed to ensure
stability.
If RRs cannot be deployed independently, select routers at core
EDGE EDGE EDGE
positions as RRs and ensure that the device performance can
Branch Branch
meet the requirements.
Use the RR models recommended in the specifications list.
61 Huawei Confidential
• For small networks (for example, a network with fewer than 50 sites), RRs and
hubs can be deployed in co-located mode.
• RRs require strong BGP connection capabilities (number of BGP peers), large
number of EVPN connections, and high route reflection capability and efficiency.
In actual deployments, select the RR models recommended in the specifications
list, for example, AR6300/AR6280.
Basic Concepts of Data Tunnel RR NAT Traversal Specifications-Exceeded
Tunnels Design Design Design Network Design
• Small and midsize enterprises have a small number of • Large enterprises have a large number of sites. If these
branch sites. If the traffic between branches and the enterprises have high network reliability requirements,
HQ/DC is not heavy, it is recommended that the RR be independent RR deployment is recommended.
co-deployed with the EDGE. The hub site functions as the
RR to carry the control plane.
62 Huawei Confidential
Basic Concepts of Data Tunnel RR NAT Traversal Specifications-Exceeded
Tunnels Design Design Design Network Design
Enterprise A
⚫ Advantages:
Enterprise B
HQ/DC HQ/DC The control plane of SD-WAN networks of all
EDGE EDGE
enterprise customers is centrally managed.
RRs can be flexibly allocated to different
MPLS Internet MPLS Internet
tenants.
In addition to RRs deployed by MSPs, carriers
EDGE EDGE EDGE EDGE
or MSPs can provide multi-tenant gateway
Branch 1 Branch 2 Branch 1 Branch 2 access services for enterprise customers.
63 Huawei Confidential
NAT Traversal
⚫ On the live network, some enterprise branches use home broadband to access the network.
In this case, traffic needs to pass through the NAT device. Therefore, tunnels cannot be directly established for such enterprise branches.
⚫
In SD-WAN scenarios, NAT traversal technology is required for interconnection between such enterprise branches.
1 1
Private Private
network IP1 IP2 Internet IP3 IP4 network
Port1 Port2 Port3 Port4
EDGE NAT device NAT device EDGE
(STUN client) STUN binding response STUN binding response (STUN client)
2 2
Private IP Address: Public IP Address: Private IP Address: Public IP Address:
Port Number Port Number Port Number Port Number
IP1:Port1 IP2:Port2 IP4:Port4 IP3:Port3
64 Huawei Confidential
Basic Concepts of Data Tunnel RR NAT Traversal Specifications-Exceeded
Tunnels Design Design Design Network Design
Internet 10031: southbound port, which is used by devices to connect to iMaster NCE-WAN through
HTTP.
NAT device NAT device 18008: northbound port, which is used for web login.
80: northbound port, which is used for web login.
EDGE EDGE 18018: northbound port, which is used by PCs to upload files to iMaster NCE-WAN.
Branch Branch
18021: file server port, which is used by iMaster NCE-WAN to update files.
⚫ The NAT Server can be deployed. Therefore, NAT traversal is not involved in this
scenario.
65 Huawei Confidential
Basic Concepts of Data Tunnel RR NAT Traversal Specifications-Exceeded
Tunnels Design Design Design Network Design
Internet
EDGE EDGE
Branch Branch
66 Huawei Confidential
Basic Concepts of Data Tunnel RR NAT Traversal Specifications-Exceeded
Tunnels Design Design Design Network Design
STUN session
a EDGE is deployed on the private network behind the
NAT device, NAT traversal is required for communication
with another EDGE, especially in scenarios where two
Internet
EDGEs at two sites are deployed on the private network
NAT device NAT device
behind the NAT device.
NAT traversal
EDGE EDGE
Branch Branch
67 Huawei Confidential
Basic Concepts of Data Tunnel RR NAT Traversal Specifications-Exceeded
Tunnels Design Design Design Network Design
Area 1 Area 2 Area 3 Area 4 iMaster NCE-WAN can manage a large number of sites. In most cases,
you do not need to pay attention to the networking specification
30 170 15 85 calculation.
68 Huawei Confidential
• Different device models have different BGP peer specifications and tunnel
specifications.
• For details about the product specifications, see the product documentation.
Basic Concepts of Data Tunnel RR NAT Traversal Specifications-Exceeded
Tunnels Design Design Design Network Design
MSP administrator
Area1 Area2
Tenant 1 Tenant 2
HQ HQ
EDGE Hub EDGE EDGE EDGE HQ
Hub HQ
EDGE Hub EDGE EDGE EDGE
Hub
RR RR RR RR
RR RR RR RR
MPLS MPLS
/Internet /Internet MPLS MPLS
/Internet /Internet
• If the specifications are exceeded at the hub site, multiple hub • If the specifications are exceeded at the hub site and rights- and
sites can be deployed, and multiple areas can be created within a domain-based management is required, networks can be created
tenant, forming the area-based networking. based on tenants and centrally managed by the MSP
administrator.
69 Huawei Confidential
• Area-based networking:
▫ Multiple areas are created under a tenant, and multiple hub sites are
deployed in the HQ/DC. Each area is associated with one or two hub sites.
• Tenant-based networking:
▫ The MSP administrator creates multiple tenants, and multiple hub sites are
deployed in the HQ/DC. Each tenant is associated with one or two hub
sites.
▫ Branch sites are grouped by their geographical areas and are added to
different tenants.
▫ RRs can be independently deployed. Each pair of RRs are associated with
sites in an area.
▫ Traffic between inter-area sites is transmitted through the LAN side of the
hub.
Contents
70 Huawei Confidential
VPN Design Panorama
⚫ The SD-WAN Solution uses VPNs to isolate services for multiple departments of a single tenant. In this
case, the network of each department under a tenant is an independent service VPN.
⚫ VPN design generally covers: VPN design
VPN1 VPN2
VPN design
Topology design
Topology design
VPN route design
RR
Core switch EDGE VPN route design
Overlay
Branch
(virtual network)
71 Huawei Confidential
VPN Design Topology Design VPN Route Design
SD-WAN VPN
⚫ VPN is short for virtual private network on SD-
WAN. Each VPN is an independent IP Layer 3
VPN1 VPN2 private network. Multiple VPNs are logically
isolated from each other, from the tunnel
established at a site to the EDGE at the site.
Therefore, these VPNs cannot directly
Virtual network (overlay network)
communicate with each other.
HQ Branch
edge MPLS edge Each VPN can use an independent topology model,
including hub-spoke, full-mesh, partial-mesh, and
Branch Internet Branch hierarchical networking.
edge edge
Service policies, such as traffic steering policies and
Physical network (underlay network)
QoS policies, can be independently configured for
each VPN.
72 Huawei Confidential
VPN Design Topology Design VPN Route Design
LAN-side
Plan initial policies for different departments, including
VLANIF physical
interface traffic steering policies, Internet access policies, QoS
interface
policies, legacy site access policies, and URL, IPS, and
firewall policies.
73 Huawei Confidential
VPN Design Topology Design VPN Route Design
HQ/DC HQ/DC
Site4 Site4
Site1 Site1
Site3
Site3
Site2 Site2
HQ/DC HQ/DC
Site4 Border 2
Border 1
Site1
Site3 Site4
Site1 Site2
Site3
Site2
74 Huawei Confidential
• Hub-spoke:
▫ In the topology, different branches can directly communicate with each other,
without the need to divert traffic through intermediate nodes.
• Partial-mesh:
Hub-Spoke Networking
⚫ Solution Overview
Generally, the enterprise HQ/DC functions as a hub site, and enterprise branches
function as spoke sites. Server applications deployed in the HQ/DC are accessed
HQ/DC through the WAN in a centralized manner.
Hub
If branches of an enterprise need to communicate with each other, traffic
between them is transmitted through the hub site. All external access traffic of
branch sites is first sent to the hub site.
Spoke
Enterprise applications are centrally stored on servers at the HQ/DC. The main
Branch Branch service traffic is from branch sites to the hub site.
Only small traffic is transmitted between branch sites.
A typical example is chain stores. The major traffic of a chain store is destined to
the HQ/DC, and there is almost no traffic between chain stores.
75 Huawei Confidential
VPN Design Topology Design VPN Route Design
Full-Mesh Networking
• Solution Overview
76 Huawei Confidential
VPN Design Topology Design VPN Route Design
Partial-Mesh Networking
• Solution Overview
A partial-mesh network can be considered a type of special full-mesh
network. If direct underlay network connections are available between
HQ/DC
sites, traffic is directly transmitted between the sites. Otherwise, traffic
Edge
between sites is forwarded through a redirect site, to which both sites
(Redirect)
are connected.
• Application Scenario
MPLS Internet
Branch sites cannot directly communicate with each other over the
underlay network and use a redirect site for communication instead.
77 Huawei Confidential
VPN Design Topology Design VPN Route Design
Hierarchical Networking
• Solution Overview
Edge
The hierarchical networking model can be considered as the
combination of the single-layer networking model. A WAN is
divided into multiple areas, which are interconnected through a
Level-1 MPLS Internet centralized backbone area to implement inter-area communication
network between a large number of sites.
For example, a multinational enterprise can be divided into
Border multiple areas (China, Europe, America, etc.) based on its
management structure. Each area uses a single-layer networking
Level-2 model, which can be hub-spoke or full-mesh. In addition, each area
uses one or more sites as their border sites. The border sites of
network
each area form the backbone area for interconnection between
MPLS Internet MPLS Internet areas, that is, the level-1 network. In this way, border sites connect
to both the level-2 area network and level-1 network.
• Application Scenario
The hierarchical networking is applicable to enterprises with a
large number of sites or multinational enterprises with widely
Edge
distributed sites. The hierarchical networking has a clear network
structure and good network scalability.
78 Huawei Confidential
VPN Design Topology Design VPN Route Design
BGP, OSPF
side routing protocol and then sent to the peer EDGE through
EDGE Direct, static route the BGP EVPN protocol of the WAN.
RR
LAN-side routes: LAN-side interfaces of EDGEs support OSPF, BGP,
HQ and static routing protocols. The routing protocol to be used must be
the same as that of the LAN-side network device.
MPLS Internet WAN-side overlay routes: Generally, BGP EVPN is deployed to
establish BGP peer relationships with RRs and advertise overlay
Branch network domain routes. The configuration is automatically
orchestrated by the controller.
79 Huawei Confidential
Section Summary
⚫ SD-WAN networking design includes site design, tunnel design, and VPN
design.
Site design: includes WAN/LAN networking design and dual-CPE design.
Tunnel design: includes data tunnel design, RR design, NAT design, and
specifications-exceeded network design.
VPN design: includes VPN design, topology design, and VPN route design.
80 Huawei Confidential
Contents
81 Huawei Confidential
Overview of Service Design for Huawei SD-WAN Solution
⚫ SD-WAN service design includes application service design and network service design.
EDGE EDGE/RR
Branch Standby
site DC
EDGE EDGE/RR
Branch
site Active DC
Internet Overlay
Legacy (virtual
GW
Network service design
network network)
82 Huawei Confidential
Service Design Process for Huawei SD-WAN Solution
83 Huawei Confidential
Contents
84 Huawei Confidential
Application Service Design Panorama
⚫ Enterprises have diverse applications, such as production, coordination, and entertainment applications. Different
applications have different requirements on bandwidth and link quality.
⚫ Application service design generally covers:
Intelligent traffic steering design
QoS design
Packet loss optimization design
Application
identification
4 3 1 Packet loss
optimization design
2
85 Huawei Confidential
Application Identification
⚫ Traditional routing and switching devices cannot identify application-layer information. Therefore, it is difficult to
manage networks based on applications. Smart Application Control (SAC) technology helps routing and switching
devices identify and classify applications.
⚫ SAC first checks whether an application has been identified. If an application has not been identified, SAC checks
the first-packet inspection (FPI) signature database and service awareness (SA) signature database in sequence.
Network device
Service traffic
Application
identification Download
record
Layer 3 forwarding for
Signature identified applications
Forwarding table
matching
Voice
FPI signature
database Web
browsing
SAC
Signature
matching
SA signature Video
database
86 Huawei Confidential
• After a packet enters the device, the device determines whether the
corresponding application has been identified based on the 5-tuple information
carried in the packet. If the application has been identified, the device forwards
the packet at Layer 3 without identifying the application again. If the application
has not been identified, the device performs the SAC application identification
process. The device then processes the packet based on the SAC identification
result and forwards the packet at Layer 3.
5 4
87 Huawei Confidential
Intelligent Traffic Steering Design QoS
QoS Design Packet
Packet Loss Optimization
Optimization Design
Design
4 3 2 1
High-bandwidth link
Branch HQ
EDGE EDGE
Low-bandwidth link
4 3 2 1
88 Huawei Confidential
Intelligent Traffic Steering Design QoS
QoS Design Packet
Packet Loss Optimization
Optimization Design
Design
High-priority High-priority
3 2 1
applications applications
5 4 5 4
3 2 1 5 4
5 4 3 2 1
5 4
Low-priority High-quality link High-quality link
Low-priority
applications applications 3 2 1
Traffic switching
Network
of low-priority
Branch HQ congestion Branch HQ
applications
EDGE EDGE EDGE EDGE
Low-quality link Low-quality link
5 4
89 Huawei Confidential
Intelligent Traffic Steering Design QoS Design Packet
Packet Loss Optimization
Optimization Design
Design
Email 60%
VPN1 ⚫
Multiple departments of an enterprise
40%
Local
An enterprise usually has multiple departments of different
SaaS
breakout importance. Traffic of each department needs to be isolated, and
40% WAN different bandwidths need to be allocated to each department.
interface
100 Mbit/s ⚫ Solution
VoIP
Overlay
70%
Different HQoS policies, including queue scheduling, CAR, and
Email VPN2 shaping, can be configured for each VPN based on applications.
60%
Local The ratio of the minimum guaranteed bandwidth can be specified for
SaaS
breakout each VPN. This prevents failures of services in some VPNs when
30%
bandwidth resources of these VPNs are preempted by other VPNs
with heavy traffic upon network congestion.
90 Huawei Confidential
▫ Internet access traffic and traffic for communication with legacy sites needs
to be controlled separately.
Intelligent Traffic Steering Design QoS
QoS Design Packet Loss Optimization Design
⚫ After FEC is deployed and the network runs for a period of time, you can view the packet loss mitigation effect on
iMaster NCE-WAN to determine whether the FEC design is proper.
91 Huawei Confidential
Contents
92 Huawei Confidential
Network Service Design Panorama
⚫ SD-WAN sites may also need to access the Internet or legacy sites. Therefore, specific
network services need to be deployed.
⚫ Network service design generally covers: HQ Gateway
EDGE Legacy site
Internet
Internet access design resources
Legacy site
Legacy site access design access design
Internet
access design
Internet
EDGE EDGE
Branch Branch
93 Huawei Confidential
Internet Access Design Legacy Site Access Design
HQ
modes:
EDGE
Local Internet access: The Internet access traffic of a site is routed from
Internet
resources the local EDGE to the Internet.
Centralized Centralized Internet access: The Internet access traffic of all sites is
Internet access
diverted to the centralized Internet access site and then to the Internet.
Local Internet Hybrid Internet access: combination of local Internet access and
Internet
access
centralized Internet access.
◼ Local Internet access (default) + centralized Internet access: By default, all Internet
access traffic is routed out from the local device. When the local Internet access
interface is faulty, Internet access traffic is forwarded through the centralized
EDGE EDGE gateway.
Branch Branch ◼ Centralized Internet access (default) + Local Internet access for specified traffic: By
default, Internet traffic is routed out through the centralized Internet access site.
Traffic of some specified services is directly routed to the Internet through the local
WAN-side link.
94 Huawei Confidential
Internet Access Design Legacy Site Access Design
IWG
Description
MPLS Internet • The Internet access traffic of a site is routed out from the local Internet link to the Internet.
• Local Internet access policies can be configured on a per-department and per-site basis.
• Local Internet access can be implemented in the following modes:
1. All Internet access traffic is routed out from the local device to the Internet.
2. Internet access traffic of specified applications is routed out from the local device to the
Internet.
EDGE1 EDGE2
• Outbound interfaces must be configured for local Internet access. A maximum of three
outbound interfaces can be configured. If multiple outbound interfaces are configured, they
back up each other, and the outbound interface is selected based on the priority.
• In local Internet access mode, whether to enable the NAT function can be configured based
Branch Branch on the outbound interface. Currently, NAT in Easy IP mode is provided. That is, the IP
address of the outbound interface is used as the post-NAT public IP address.
95 Huawei Confidential
• If local Internet access is enabled, the default route on the underlay WAN needs
to be configured. The default route can be a static route (mainly for Internet
access through the Internet network interface) or BGP/OSPF route (mainly for
Internet access through the MPLS network interface).
Internet Access Design Legacy Site Access Design
Description
MPLS Internet
• All sites of a tenant access the Internet through a centralized Internet access site.
• Either of the following solutions can be used for Internet access through the centralized
gateway site:
If the centralized Internet access site has the Internet egress on the LAN side, all
Internet access traffic is routed out through the LAN side of the centralized Internet
EDGE1 EDGE2
access site. In this mode, you need to configure a default route or dynamic routing
protocol on the LAN side so that the default route can be learned from the LAN side.
If the centralized Internet access site accesses the Internet through the WAN-side
interface, all Internet access traffic is transmitted to the Internet through the WAN
Branch side of the centralized Internet access site. (Note: For the site that functions as a
HQ (centralized
centralized gateway, the local Internet access function must also be enabled.)
Internet access
gateway)
96 Huawei Confidential
Internet Access Design Legacy Site Access Design
97 Huawei Confidential
Internet Access Design Legacy Site Access Design
98 Huawei Confidential
Internet Access Design Legacy Site Access Design
99 Huawei Confidential
Internet Access Design Legacy Site Access Design
Communication through the IWG: Carriers use this mode to provide communication with legacy sites for multiple enterprises.
Generally, three communication solutions are available in this scenario:
◼ Inter-AS Option B
◼ Inter-AS Option A (Layer 3 VXLAN)
◼ Inter-AS Option A (Layer 3 VLAN)
MPLS 1
Local breakout
Legacy SD-WAN
site site
• In the local access solution, only traffic of users in one SD-WAN VPN can be transmitted to users of the VPN at the
corresponding legacy sites on the underlay network through local breakout.
• Multiple traffic models are supported in this scenario, and you can choose one
based on your service requirements.
▫ Distributed local access: This model applies if all SD-WAN sites can access
legacy sites over the underlay MPLS network through local breakout. In this
model, traffic of each site is directly forwarded through the local site,
without the need of being forwarded through overlay tunnels.
▫ Centralized local access: If some SD-WAN sites cannot access legacy sites
through local breakout, you can configure a site that can communicate
with the legacy sites as the centralized access site. Traffic from other SD-
WAN sites is sent to the centralized access site through overlay tunnels, and
then forwarded to the legacy sites through local breakout.
▫ Hybrid local access: The SD-WAN Solution enables multi-link sites using the
distributed local access model to use local access preferentially, with
centralized local access as a backup. This enhances reliability. Traffic from a
site that uses the distributed local access model is preferentially transmitted
to a legacy site through local breakout. If the MPLS link for local access
fails, traffic is automatically switched to the overlay tunnel of another link
and transmitted to the centralized access site. The centralized access site
then forwards the traffic to legacy sites.
Internet Access Design Legacy Site Access Design
IWG
⚫ The IWG can connect both SD-WAN sites and legacy MPLS VPN sites for multiple enterprise tenants. Each time a
tenant is added, only one MP-EBGP peer needs to be configured to interconnect with the peer ASBR-PE.s
Tenant 1:
Legacy network VPN 1 SD-WAN network
ASBR-PE IWG
MPLS 1 MP-BGP
MPLS 2
PE
• A pair of public interfaces are configured on the IWG and ASBR-PE, and MPLS is enabled. MP-EBGP is used to exchange labeled
VPN-IPv4 routes. BGP is used to transmit inter-AS labels. Therefore, LDP is not required between the IWG and ASBR-PE.
VPN1
Legacy network SD-WAN network
ASBR-PE IWG
▫ Security Design
MPLS
NAT device
Security
Site reliability
design
design
EDGE EDGE EDGE
Legacy site
Branch Branch
Controller deployment
Hub site reliability design System security design
reliability design
Controller networking
RR site reliability design Service security design
reliability design
▫ Security Design
IWG site reliability design
Standby IWG
EDGE EDGE EDGE
IWG site
Legacy site reliability Branch Branch
design
DCI
DCI DC DC
DC DC
Hub1 Hub2
Hub1 Hub2
Branch services
Office services Production Internet Branch services in
in Region A are MPLS
are mainly MPLS Internet services are mainly Region B are mainly
mainly destined
destined for Hub1. destined for Hub2. destined for Hub2.
for Hub1.
Spoke Spoke
Spoke
Primary Primary
path Branch Branch path
Branch Branch
Backup Backup
Office Production path path
services services
One RR site, two RRs at such site Two RR sites, one RR at each site Two RR sites, two RRs at each site
RR site RR site RR site RR site RR site
• Low reliability: If one RR is faulty, some • Multiple links are deployed on the RR side. • Multiple links are deployed at the branch site.
branch sites will lose connection with the RR This ensures reliable connections between This ensures reliable connections between
site, causing service interruptions. EDGEs and RRs. EDGEs and RRs.
PE CE
MPLS
Branch
Standby
IWG ASBR-PE
Internet
EDGE
Branch
▫ Security Design
Controller
networking
reliability design
Internet/MPLS
Data processing
Service Provides service processing capabilities, such as CPE
cluster
processing management, overlay network configuration delivery, and
cluster traffic policy configuration.
Data processing Provides functions such as CPE performance data storage
Nginx cluster
cluster and data aggregation.
Serves as a high-performance HTTP proxy server that
Nginx cluster forwards concurrent connection requests and implements
Linux Virtual L4-L7 load balancing for northbound traffic.
Server (LVS) Works as a load balancing component and implements L1-
LVS
L4 load balancing for southbound and northbound traffic.
Controller cluster
standby cluster does not provide services. Data in the active cluster
is synchronized to the standby cluster in real time to ensure data
consistency.
⚫ The same domain name solution is used for northbound and
southbound interfaces of the active and standby controller clusters.
Data replication link
Tenants and devices access the active controller cluster through this
unified domain name. After active/standby switchover, this domain
name is mapped to the new active controller cluster.
⚫ Active/standby switchover is performed manually and can be
completed within 10 minutes. In the case of component-level faults
in the controller cluster, services are still guaranteed through
reliability technologies, including clustering and fault tolerance.
⚫ Geo-redundant DR network requirements: latency ≤ 20 ms;
bandwidth ≥ 125 Mbit/s.
CPE CPE
Private
CPE Internet CPE line/Public
NAT GW network
Branch HQ DC Branch HQ DC
Private
Private line/Public
line network
CPE CPE
• The controller is deployed inside the HQ DC, and uses public IP • The controller is deployed inside the HQ DC.
addresses to provide services for CPEs. • The private line network needs to send the network segment where
• 1:1 static NAT is deployed on the public network egress device at HQ. the controller resides to VPN networks.
• NAT-related public IP addresses need to be advertised into the private • On the public network, 1:1 static NAT must be deployed on the public
line network. network egress device. Static NAT uses the same public IP address.
• Communication between CPEs and the controller through the public
network or private line must traverse the NAT device on the public
network.
Primary
CPE DC Use the same southbound
High
Private and northbound IP addresses.
Branch priority
line/Internet Low
priority
Backup
DC Standby controller
CPE
• On a pure private line network, the southbound and northbound IP addresses of the active and standby controllers need to be a dvertised to the private
line network through EBGP peers. Additionally, routing policies are used to ensure the route destined for the active controller is preferentially selected.
• On a pure public network, 1:1 static NAT needs to be deployed for southbound and northbound IP addresses, and the NAT configurations on the two
egress gateways must be the same. Routes related to NAT addresses are advertised to the public network through EBGP, and routing policies are used to
ensure the NAT-related route destined for the primary DC is preferentially selected.
• The active controller is deployed in the primary DC, and the standby controller in
the backup DC. A heartbeat tunnel is established between the active and standby
controllers to synchronize data and verify the controller status.
• The active and standby controllers use the same southbound and northbound IP
addresses. In public network scenarios, the same NAT address must also be
configured.
Contents
▪ Security Design
hardening
WAN Solution must be met. In this way, the entire
channel)
1
RR system can run securely and stably.
1 2. Service security: The security requirements of services
1 Control channel
Management security carried by the SD-WAN Solution must be met.
channel security 1
CPE security Appropriate security protection measures are flexibly
MPLS hardening
selected as required, thereby ensuring secure and
reliable running of user services.
HQ/DC site GRE or GRE over IPsec (data channel) Branch site
2 Data 1
EDGE Service EDGE
Internet channel
traffic security
security
(management channel)
need to configure them.
MPLS
HQ/DC site GRE or GRE over IPsec (data channel) Branch site
GRE
tunnel
MPLS
LDAP server authentication: iMaster NCE-WAN connects to an LDAP server (such as a general-purpose LDAP server or Windows AD server). When a
tenant administrator logs in to iMaster NCE-WAN, the LDAP server authenticates the tenant administrator.
⚫
When a device administrator logs in to a CPE through the CLI, the device administrator can be authenticated in either of the
following modes:
Local authentication: The tenant administrator can set passwords for device administrators on iMaster NCE-WAN, which then delivers the passwords to
CPEs. When a device administrator logs in to a CPE, the CPE authenticates the device administrator.
TACACS authentication: A CPE connects to a TACACS server through the underlay network. When a device administrator logs in to the CPE, the TACACS
server authenticates the device administrator.
Data security: A CPE must be able to encrypt sensitive information, such as service data, user names, and passwords, to prevent sensitive information
leakage. A CPE must also control data access permissions to prevent unauthorized access to data.
Authentication: A CPE must provide system permission control and account permission management functions to implement strict identity
authentication and permission control on login behaviors. It also must support security mechanisms such as account/password protection, password
complexity check, and anti-brute force cracking of passwords.
Attack defense: A CPE must be able to defend against various network attacks, such as IP flood attacks, ICMP flood attacks, m alformed packet attacks,
and fragment attacks.
Security audit: A CPE must have a comprehensive log system to log all configuration operations and abnormal status during sys tem running for future
audit.
Branch HQ Branch HQ
• Internet access traffic from all branch sites is diverted to the HQ site • Internet access traffic from the branch site and HQ site directly goes
and then goes to the Internet. to the Internet through their respective local CPE.
• Enable the firewall function on the CPE at the HQ site to isolate • Enable the firewall function on the CPEs at the branch site and HQ
internal and external networks. site to isolate internal and external networks.
Firewall
HQ • A physical firewall is deployed in off-path mode. It
Physical firewall provides advanced security protection functions for
EDGE deployed in off-
path mode centralized Internet access traffic from the site.
• After VASs are deployed, centralized Internet
access traffic is diverted to the physical firewall on
MPLS Internet the LAN side of the HQ CPE. After being processed
by the firewall, centralized Internet access traffic
then goes to the Internet through the underlay
network.
EDGE EDGE
Branch Branch
Application scenario
iMaster NCE-WAN
• To improve network reliability, the third-party cloud
security gateway generally provides two access points to
EDGE Third-party cloud establish tunnels with the EDGE, and the EDGE uses GRE
security gateway
Branch tunnels to connect to such access points.
Single-gateway scenario
Internet One CPE establishes two GRE tunnels (active and standby) with
the two access points of the third-party cloud security gateway.
Dual-gateway scenario
SaaS cloud
applications Two CPEs establish four GRE tunnels (active and standby) with
Branch
the two access points of the third-party cloud security gateway.
EDGE
⚫ Reliability and security design for Huawei SD-WAN Solution covers site
reliability design, controller reliability design, and security design.
Site reliability design: hub site reliability design, RR site reliability design, and
IWG site reliability design.
Controller reliability design: controller deployment reliability design and
controller networking reliability design.
Security design: system security design and service security design.
1. (Multiple-answer question) Which of the following overlay network topology types are
supported by Huawei SD-WAN Solution? ( )
A. Hub-spoke
B. Full-mesh
C. Partial-mesh
D. Hierarchical networking
2. (True or false) The intelligent traffic steering function can dynamically adjust data
forwarding links based on link quality. ( )
A. True
B. False
1. ABCD
2. A
Summary
⚫ Huawei SD-WAN Solution efficiently addresses the challenges facing today's WANs.
⚫ Huawei SD-WAN Solution provides abundant functions, including ZTP, flexible
networking, intelligent traffic steering, and service security.
⚫ Design for Huawei SD-WAN Solution mainly covers three parts:
Networking design: site design, tunnel design, and VPN design
Service design: application service design and network service design
Reliability and security design: site reliability design, controller reliability design, and
security design
⚫ A wide area network (WAN) is a computer network that connects local area networks
(LANs) or metropolitan area networks (MANs) in different regions. A WAN allows
information and network resources to be shared in a large scope.
⚫ An enterprise IP bearer WAN is a backbone WAN used to implement cross-region
communication inside an enterprise. In enterprise network scenarios, various sectors, such as
government, finance, education, and power, widely use IP bearer WANs to connect sites and
clouds in different geographical locations, facilitating digitalization.
⚫ This course first describes basic WAN concepts and the evolution of WAN bearer
technologies, and then introduces Huawei's CloudWAN solution and key technologies.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
3 Huawei Confidential
Enterprise WAN Overview
Enterprise Enterprise WAN Cloud
Public
cloud
Industry
Enterprise cloud
HQ
Private
Enterprise
cloud
branch
Data
center
4 Huawei Confidential
Enterprise IP bearer WAN
Network Network
egress egress
Enterprise IP bearer
WAN
Public
cloud
Enterprise Industry
HQ cloud
Enterprise Private
branch cloud
Enterprise WAN = Enterprise network egress + enterprise IP bearer WAN (built by the enterprise
or carrier)
5 Huawei Confidential
Three Types of WAN Connections Provided by Carriers
⚫ Carriers provide three types of WAN connections for enterprises: Internet, MPLS private lines, and transmission
private lines.
Internet MPLS private line Transmission private line
• • Provides MPLS L3VPN and L2VPN • Provides transmission private lines, such
Provides Internet access services for
common users and enterprises. services for large enterprises. as SDH, MSTP, bare fiber, and
WDM/OTN private lines, for large
enterprises. Enterprises build their own
IP bearer networks over transmission
private lines.
Internet
L3VPN
L2VPN
Individual Enterprise Data
Transmission private line
user campus center
6 Huawei Confidential
• Internet:
▫ Site-to-Internet private line: Ethernet private line/xPON private line/xDSL
private line. The access is restricted by geographic locations. It applies to
inter-enterprise communication over Internet-based encrypted tunnels.
▫ Dial-up connection: low bandwidth and low tariff. The access is not
restricted by geographical locations. It applies to individual users.
▫ BGP: applies to data center Internet egresses.
Core layer
Core layer (P):
• Generally adopts the Full-mesh
+ dual-plane architecture.
• It forwards traffic between
different regions over stable,
reliable, and service quality-
guaranteed connections.
7 Huawei Confidential
Typical Bearer Technologies of the Enterprise IP Bearer WAN
8 Huawei Confidential
Enterprise IP Bearer WAN Moving Towards the IPv6+ Era
9 Huawei Confidential
Enterprise IP Bearer WAN Technologies Evolving Towards
SRv6
⚫ With the development of technologies and service requirements, VPN becomes the mainstream bearer technology adopted by the
WAN. The control and forwarding plane technologies of the WAN keep evolving.
⚫
The bearer WAN continuously evolves towards segment routing (SR) and IPv6.
10 Huawei Confidential
• BGP Labeled Unicast (BGP-LU) (RFC 3017) is both an inter-AS and an intra-AS
routing protocol.
Contents
11 Huawei Confidential
Two Major Changes Brought by Digital Transformation
1. Cloudification of millions of enterprises 2. IP-based production network
Cloud adoption by Multi-cloud adoption by Multiple TDM private networks > One IP bearer network
IEC and UIC propose IP-based transformation for power and
enterprises enterprises transportation sectors, respectively.
Local processing > Private cloud > Hybrid cloud
Service cloudification Power relay • Multicast
• Delay < 5 ms
protection technology
Public Power Traditional relay
cloud cloud protection > Wide-
area relay protection
Financial Financial Government • Bandwidth > • Clock precision
cloud cloud cloud 100 Mbit/s
Train control and < 3 µs
dispatching
Manual monitoring > Over-
the-horizon monitoring
12 Huawei Confidential
3 Challenges Facing the WAN in the Cloud Era
Cloudification of millions of Production service bearer Connection scale x 100 ↑
enterprises
Can IP provide deterministic How can O&M be simpler and
How can networks be as experience? networks more reliable?
agile as clouds?
13 Huawei Confidential
CloudWAN 3.0: Leading WANs into the Intelligent Cloud-
Network Era
One-hop cloud access: flexible cloud-network connection
• SRv6 enables service provisioning within minutes and agile service
Manager Controller Analyzer
cloudification.
IFIT NETCONF/YANG
One-fiber multipurpose transport: deterministic experience
• Hierarchical slicing
• Patented fingerprint-based slicing technology, simplifying deployment
SRv6
One-click fast scheduling: cloud-network coordinated
scheduling
FlexE-based slicing • SDN + intelligent cloud-map algorithm, improving cloud-network
resource utilization
Network
iMaster NCE = U2000 (management) + Controller (control) + uTraffic (analysis)
management
Metro router
NetEngine 8000 NetEngine 8000
M8 M6
15 Huawei Confidential
CloudWAN 3.0: Management, Control, and Analysis Platform
iMaster NCE-IP
Management
• NE management: topology, alarm, configuration, and
inventory management
• Service management: tunnel and VPN service management
Manager Controller Analyzer
NETCONF/YANG Telemetry
• Centralized path computation: path computation based on
Controller
multiple constraints
• Logical topologies: cost, delay, and bandwidth topologies
Backbone
Analysis
Metro Metro • Basic network analysis: display and analysis of performance,
Simplified architecture, intelligent traffic, and quality
connection, intelligent O&M • Analysis-based prediction: traffic, fault, and exception prediction
16 Huawei Confidential
One-Hop Cloud Access: SRv6-based Fast, Simplified Service
Provisioning Across Domains
• Siloed networks, isolated data islands • Multi-cloud data convergence
• Layered and segmented networks, and sharing
difficult for cloud access • SRv6-based one-hop cloud
access, enabling fast provisioning
Education Healthcare Government
Education, healthcare,
data data data • Protocol simplification: replacement of
government...
multiple original network protocols with
SRv6 + IGP/BGP
• E2E connection: E2E service provisioning
MPLS
MPLS
MPLS
industries
Education private
Healthcare private
network
MPLS
MPLS
MPLS
SRv6
SRv6
SRv6
network
AS AS AS AS AS AS
within minutes
MPLS
MPLS
MPLS
AS AS AS AS AS AS
17 Huawei Confidential
• In the past, most of our networks were siloed private networks, such as education,
healthcare, and government private networks. These networks were independent
physical private networks and could not communicate with each other. The
handling of some services may involve multiple private networks. Moreover, a
service may be deployed segment by segment even on one private network. For
example, multiple ASs may exist on a network due to the division of
administrative domains, and one network service may be deployed across ASs
(on a common network, service data is generally carried over MPLS). In this
situation, a large number of device configurations and personnel communication
are required. The network administrator needs to perform a large number of
configurations on AS boundary devices, and it takes a long time to migrate the
service to the cloud. The acceleration of enterprise digital transformation drives
alignment between networks and clouds.
• Now, increasingly more industries are deploying data to the cloud, making it
easier to converge or share data. The introduction of SRv6 can remove process
barriers and accelerate service provisioning. Simply put, SRv6 can be deployed on
both ends of an SRv6 tunnel to implement one-hop cloud access.
• In the MPLS era, a large number of control-plane protocols, such as IGP, BGP,
LDP, and RSVP-TE, are required to carry VPN services on a network or implement
traffic engineering. On the forwarding plane, there are protocols such as MPLS,
GRE, and L2TP or native IP. The network configuration and configuration
modification are complex. Huawei's CloudWAN solution simplifies network
deployment by replacing multiple network protocols with SRv6+IGP/BGP. SRv6
uses IPv6 as the forwarding plane protocol. On a WAN where IPv6 is deployed, it
is easy to deploy an end-to-end tunnel, even in inter-AS scenarios. The SDN
controller can be used to implement automated SRv6 service provisioning within
minutes.
One Fiber Multipurpose Transport: Hierarchical Slicing for
Refined, Deterministic Experience Assurance
Security protection Media
video cloud cloud
• Hierarchical slicing:
Collaboration implements flexible bearer of
cloud
multiple services and reduces
network construction costs.
Production private network
• Differentiated network
10+ private networks >
1 network with N slices services: provide differentiated
Good balance SLAs for diversified service
Multi-network
convergence requirements.
Private network • Slice lifecycle management:
experience
One private uses the controller for slice
network
planning, construction,
maintenance, and optimization.
Remote Video Enterprise Remote Video Enterprise
control surveillance office control surveillance office
18 Huawei Confidential
1 Coloring: service
identification
Counting and
2 timestamping
Easy deployment
10-6 high precision and real services • On-demand hop-by-hop measurement (for
E2E/hop-by-hop KPI measurement
• Measurement based on real service flows purposes such as detection of E2E KPI
• KPIs: delay, packet loss, jitter
threshold-crossing events)
• High precision: packet loss measurement
• Service mode: MPLS/SR/SRv6/L3VPN/EVPN
precision as high as 10-6 • Complete configurations are required only
on the ingress and egress.
19 Huawei Confidential
• iFIT integrates the RFC 8321 coloring technology and in-band detection
technology to directly measure service packets. It works with second-level
telemetry data collection and iMaster NCE for unified management, computation,
and visualization. In this way, it implements real-time visualization and proactive
monitoring of network quality SLAs and fast fault demarcation and locating.
One-Click Fast Scheduling: Cloud-Network Coordinated
Scheduling, Improving Cloud-Network Resource Utilization
Unbalanced cloud-network Cloud-network coordinated optimization for
loads, wasting investments efficient utilization of cloud-network resources
Cost Bandwidt
Cloud access Intelligent cloud- h
12% 50% map algorithm
based on cloud
Cloud resource Cloud Network
factors
2 information
Storage factors factors Reliability
DC2 DC2
Cloud management
platform Computing Delay
90% 45%
power
25% 47%
• The intelligent cloud-map algorithm
combines the cloud and network
factors.
DC1 DC3 DC1 DC3
• Load balancing is performed based
on service conditions and cloud
loads. Services are intelligently
scheduled to the most appropriate
cloud based on SRv6 and SDN
1 Traffic technologies.
optimization
based on
network
Before Now factors
20 Huawei Confidential
Contents
21 Huawei Confidential
e-Government Extranet of a Certain Province
Before Now
Cloud-network separation: difficult for Cloud-network integration:
the network to match cloud agility multi-cloud access through
one network Integrated digital government
Provincial platform
government Policing
89.9%
Provincial Policing System
Surveillance government cloudification rate
Municipal
government Municipal SDN + SRv6
Surveillance
government
Service cloudification time
Weeks Hours
HRSS Healthcare Civil affairs HRSS Healthcare Civil affairs
22 Huawei Confidential
"We hope that traffic optimization can be 1. Policy-based routing is manually configured hop by hop. A single
automatically or manually triggered based on optimization operation takes more than 2 hours and is prone to errors.
factors such as time range, traffic threshold, 2. Traffic optimization often needs to be performed at night and requires the
and traffic burst." attendance of dedicated personnel.
— Senior network architect
23 Huawei Confidential
Multi-Service Bearer Through Network
Office service
Physical network slicing: TDM-
DCN based FlexE divides a physical
network into multiple slices on
Campus Various office demand to isolate different services
surveillance services FlexE slice 1 and ensure service SLAs.
Office
automation
Flexible, convenient service
Customer
FlexE slice 2 deployment
service
Video surveillance
Office phone Production and
Unified bearer: NCE is used to deploy
O&M
network resources in a unified
FlexE slice 3
Production manner for power service transport,
service Dispatch phone achieving intelligent optimization.
Video
surveillance FlexE slice 4 Support for network evolution over the
Production Relay protection next 10 years:
and O&M Smooth upgrade to 100/200 Gbit/s
Smooth evolution to SRv6/SR/EVPN
WAMS
Dispatch
phone
Relay
protection
24 Huawei Confidential
Quiz
C. iFIT
D. Telemetry
25 Huawei Confidential
1. B
Summary
⚫ An enterprise IP bearer WAN is a backbone WAN used to implement cross-region
communication inside an enterprise. In enterprise network scenarios, various sectors, such as
government, finance, education, and power, widely use IP bearer WANs to connect sites and
clouds in different geographical locations, facilitating digitalization.
⚫ Bearer WAN technologies evolve from MPLS to SRv6. In the cloud era, networks are
expected to meet requirements regarding visualization, awareness, optimization,
deterministic delay, openness, and programmability.
⚫ Huawei's CloudWAN solution meets all the preceding requirements. We will explore more
about this solution in subsequent learning.
26 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
3. VPN Service
5. SLA
6. Network Reliability
3 Huawei Confidential
Typical Architecture of the Bearer WAN
Data
DC-CE center
• DC-P: builds a high-speed
interconnection network with
DC-PE the two-city three-center
architecture.
• DC-PE: aggregates data center
DC-P City B or intra-city services.
• DC-CE: functions as the data
center access device.
DC-CE DC-PE DC-P DC-P DC-PE DC-CE • WAN-P: aggregates traffic from
Data Data
the uplinks of provincial
center center branches.
• RR: reflects regional routes on
the bearer WAN.
• BR-PE: functions as the branch
RR RR edge device on the bearer WAN.
City A WAN-P WAN-P WAN-P City A • BR-CE: functions as the branch
access device.
4 Huawei Confidential
• The Ps for intra-city data center are directly connected using WDM or bare
optical fibers. The link bandwidth can reach 10 Gbit/s. To reduce costs, consider
connecting local data centers with remote data centers through carriers' MSTP
links.
Typical Architecture of the Bearer WAN
⚫ The typical architecture of a bearer WAN is divided into three layers: access layer, aggregation layer,
and core layer.
5 Huawei Confidential
Technologies Used by the Typical Bearer WAN Architecture
Service tunnels are established between PEs for
VPN service recursion. For example:
• MPLS LDP tunnels
• MPLS TE tunnels
For CEs accessing the same PE, • SR-MPLS BE/TE tunnels
VPNs are used to isolate services: • SRv6 BE tunnels
• L2VPN: Layer 2 communication Data forwarding:
• L3VPN: Layer 3 communication • MPLS or IPv6 forwarding
P P PE
Service 1 Service 1
CE CE
Service 2 PE Service 2
CE P P PE CE
Bearer WAN
6 Huawei Confidential
Contents
3. VPN Service
5. SLA
6. Network Reliability
7 Huawei Confidential
MPLS SR-MPLS SRv6
MPLS Overview
⚫ MPLS is located between the data link layer and the network layer in the TCP/IP protocol stack and can
provide services for all network layers.
⚫ An MPLS header is added between a data-link-layer header and a network-layer header, and data can
be forwarded quickly based on the MPLS header.
IP network IP network
Ethernet MPLS IP
header header packet
8 Huawei Confidential
MPLS SR-MPLS SRv6
⚫
Label switching router (LSR): a routing device, such as a router or switch, that runs MPLS. An LSR that resides at the edge of an
MPLS domain and connects to a non-MPLS network is called a label edge router (LER). An LSR that resides inside an MPLS domain is
called a core LSR.
⚫
The path that MPLS packets take in an MPLS network is called a label switched path (LSP). The LSP is a unidirectional path that
transmits traffic from the ingress to the egress.
⚫
The start node of an LSP is called the ingress, an intermediate node of the LSP is called the transit node, and the end node of the
LSP is called the egress. An LSP has one ingress, one egress, and zero, one, or multiple transit nodes.
IP network IP network
9 Huawei Confidential
MPLS SR-MPLS SRv6
LSP1
R4 R5
Purpose: 10.0.1.1
MPLS domain
IP network IP network
10.0.1.0/24
10.0.2.0/24
R1 R2 R3
Purpose: 10.0.2.1
IP network
R6 R8 LSP2 R7
Ethernet header IP packet
10 Huawei Confidential
11 Huawei Confidential
MPLS SR-MPLS SRv6
Company A Company A
Network in province X Network in province Y
Company B Company B
Bearer WAN for MPLS VPNs
Network in province X Network in province Z
12 Huawei Confidential
MPLS SR-MPLS SRv6
MPLS TE Overview
⚫ MPLS TE, as its name suggests, is a combination of MPLS and TE. It provides functions such as path planning, traffic
optimization, and fault protection for MPLS VPN services.
⚫ Compared with MPLS LDP, MPLS TE enhances VPN traffic control and protection.
13 Huawei Confidential
MPLS SR-MPLS SRv6
MPLS TE Tunnel
⚫ MPLS TE often associates multiple LSPs with a virtual tunnel interface, and such a group of LSPs is
called an MPLS TE tunnel.
⚫ An MPLS TE tunnel provides SLA assurance, but requires complex configuration and manual planning.
Primary path
R3
Backup path
14 Huawei Confidential
MPLS SR-MPLS SRv6
R2 R2
R1 R1
R3 R3
R4 R4
15 Huawei Confidential
MPLS SR-MPLS SRv6
SR-MPLS Overview
⚫ SR is designed to forward data packets on a network using the source routing model.
⚫ SR-MPLS, as its name suggests, is SR based on MPLS label forwarding.
16 Huawei Confidential
MPLS SR-MPLS SRv6
SR-MPLS BE SR-MPLS TE
• Forwarding path: Similar to an MPLS LDP LSP, an SR-MPLS BE LSP is • Forwarding path: An SR-MPLS TE path is created using SR based on TE
calculated using the IGP shortest path first (SPF) algorithm. An SR- constraints. An SR-MPLS TE tunnel generally uses multiple layers of
MPLS BE LSP has only one label layer (destination node). labels to implement path control and supports primary and backup
• In the production environment, SR-MPLS BE is generally used as the paths.
DR solution for SR-MPLS TE. For example, if a controller fault causes a • SR-MPLS TE is usually used with a controller. After the controller
tunnel delivery failure, the IGP can be used to generate forwarding globally computes a path, it delivers a label stack to the corresponding
tunnels. ingress.
SR-MPLS TE Tunel
500 500
Constrained path Primary path
17 Huawei Confidential
MPLS SR-MPLS SRv6
SR-MPLS Policy
⚫ The SR-MPLS Policy, also called the SR-MPLS TE Policy, is one of the mainstream SR-MPLS implementation modes.
⚫ As defined in the corresponding RFC, an SR Policy is identified by <headend, color, endpoint> and contains multiple
candidate paths.
SR Policy model SR Policy application scenario
⚫ A candidate path can contain multiple segment lists, and ⚫
The controller collects information such as the global
load balancing can be implemented among these segment topology, network bandwidth, and link delay. After
lists based on weights. computing an SR Policy path based on service
⚫
Candidate paths work in primary/backup mode based on requirements, the controller uses BGP to deliver the path
their preferences. to the ingress.
Segment list 1
Primary path
Weight
Controller
SR Policy Candidate path 1 Segment list 2
<Headend, Preference 200 Weight BGP SR Policy
color,
endpoint>
Candidate path 2 Segment list 1 Green
Preference 100 Weight
Backup path
18 Huawei Confidential
SRv6 Overview
⚫ SRv6 is designed to forward data packets on an IPv6 network using the source routing model.
⚫ Both SRv6 and SR-MPLS comply with the SR architecture. Their main difference lies in data plane instructions. The
former is based on the IPv6 network and uses IPv6 addresses as instructions. In contrast, the latter is based on the
MPLS network and uses MPLS labels as instructions.
R3 R5 R7
FC00::5 FC00::7
19 Huawei Confidential
MPLS SR-MPLS SRv6
20 Huawei Confidential
MPLS SR-MPLS SRv6
DC-PE
Enterprise bearer WANs can be
Bearer WAN
DC-P roughly classified into two
types: MPLS network and IPv6
DC-CE DC-PE DC-P DC-P DC-PE DC-CE
network.
Data Data
• MPLS network:
center center
MPLS LDP
MPLS TE
RR RR SR-MPLS
WAN-P WAN-P WAN-P
• IPv6 network:
SRv6
BR-PE BR-PE
Enterprise Enterprise
BR-CE BR-CE
branch branch
21 Huawei Confidential
Contents
3. VPN Service
◼ WAN VPN Overview
5. SLA
6. Network Reliability
22 Huawei Confidential
VPN Classification
⚫ The VPN technology is widely used as a virtual private tunneling technology. VPN can be classified into various
types from different perspectives. For example, VPN can be classified into Layer 3 VPN (L3VPN), Layer 2 VPN
(L2VPN), and Virtual Private Dial-up Network (VPDN) by implementation layer.
⚫ VPWS, VPLS, and BGP/MPLS IP VPN are more widely used on bearer WANs.
⚫ GRE VPN and IPsec VPN, which are mainly used on the Internet, are beyond the scope of this course.
VPWS
L2 VPN
VPLS
VPN
VPDN BGP/MPLS IP
Classification
VPN
Covered in
IPsec VPN
this course
23 Huawei Confidential
• L3VPN is also called Virtual Private Routing Network (VPRN), including RFC
2547-based BGP/MPLS IP VPN as well as IPsec VPN and GRE VPN carried over
IPsec or GRE tunnels.
WAN VPN Service Overview
⚫ An enterprise establishes a bearer WAN to provide wide-area interconnection for its internal and external services, such as
production, office, external connection, and test services. These services are logically isolated but share the same physical network
resources. Therefore, these services are called WAN VPN services.
⚫
WAN VPN can be classified into L2VPN and L3VPN.
PE L2VPN PE L2VPN
PE PE
BGP l2vpn-ad BGP EVPN
24 Huawei Confidential
• A traditional L2VPN does not have any control plane and does not transmit
service route information (MAC addresses). It uses BGP as the signaling protocol
to establish VCs.
• For details about VPN classification, see the book SRv6 Network Programming:
Ushering in a New Era of IP Networks.
Traditional WAN L2VPN Overview
⚫ The traditional WAN L2VPN is based on the MPLS network. VPWS provides a point-to-point Layer 2 network, and
VPLS provides a point-to-multipoint Layer 2 network.
⚫ The basic MPLS L2VPN architecture is composed of the attachment circuit (AC), VC, and tunnel.
AC: independent physical or virtual circuit connecting a CE and a PE. An AC interface can be either a physical or logical interface.
VC: logical connection between two PEs. A VC is established using a signaling protocol, such as BGP AD.
Tunnel: used to transparently transmit service data. Typical tunnels include MPLS LDP tunnels and MPLS TE tunnels.
⚫ VPLS and VPWS are widely used on carrier networks to provide MPLS Layer 2 private line services for enterprises.
MPLS domain
VC
AC AC
Tunnel
CEA PEA PEB CEB
P
25 Huawei Confidential
⚫ BGP/MPLS L3VPN is widely used on carrier networks to provide MPLS Layer 3 private line services for enterprises.
Route transmission
Control plane 1 through BGP
26 Huawei Confidential
WAN EVPN Overview
⚫ EVPN was initially designed as an L2VPN technology based on BGP extensions. With the development of protocol
extensions, EVPN can also support L3VPN now.
⚫ EVPN can well serve as the control plane protocol for WAN VPN. It can be used with traditional VPN technologies
to provide EVPN VPLS, EVPN VPWS, and EVPN L3VPN.
EVPN
• The EVPN standard is gradually maturing, unifying all services on the control plane.
27 Huawei Confidential
WAN EVPN Application
⚫ On a WAN, EVPN can be used with multiple tunneling technologies to support multiple application scenarios.
⚫ EVPN, as a control plane protocol, can work with MPLS LDP, MPLS TE, SR-MPLS, and SRv6 tunnels, as shown in the
figure.
⚫ On Huawei devices, EVPN L2VPN and L3VPN services share the same address family.
SRv6
SR-MPLS
CE MPLS TE
PE P P PE CE
MPLS LDP
WAN
28 Huawei Confidential
Summary: WAN VPN
⚫ The VPN technology is widely used in various enterprise scenarios. VPNs can be built over either the
Internet or a private network.
⚫ L2VPN (VPLS and VPWS), L3VPN (BGP/MPLS IP VPN), and L2/L3 EVPN can be deployed on a bearer
WAN built by an enterprise.
⚫ EVPN, as a control plane protocol, can work with different bearer technologies (such as MPLS LDP,
MPLS TE, SR-MPLS, and SRv6) to provide integrated and unified VPN services for enterprises.
⚫ When multiple tunneling technologies are deployed on an enterprise bearer WAN, VPNs must recurse
to tunnels based on tunnel policies.
29 Huawei Confidential
Contents
3. VPN Service
▫ WAN VPN Overview
◼ Tunnel Management Overview
5. SLA
6. Network Reliability
30 Huawei Confidential
Tunnel Management
⚫ Huawei devices use a tunnel management (TNLM) module to manage tunnels. It selects a certain tunnel for an
application according to specific configurations and notifies the application of the tunnel's status.
⚫ Common VPN tunnels include LSPs (MPLS LDP), MPLS TE tunnels, GRE tunnels, SR-MPLS Policies, and SRv6 Policies.
⚫ Tunnel management configuration includes two parts: configuring a tunnel policy and applying a tunnel policy to a
VPN.
Application
VPN1 SRv6
MPLS TE
Application
MPLS LDP
VPN2
Tunnel policy 2
31 Huawei Confidential
• GRE: GRE can be applied to both L2VPN and L3VPN. Generally, the bearer WAN
for MPLS VPN uses LSPs as public network tunnels. If the bearer WAN (P devices)
has only IP functions but not MPLS functions, and the PEs at the network edge
have MPLS functions, the LSPs cannot be used as public network tunnels. In this
case, GRE tunnels can be used to replace LSPs to provide L3VPN or L2VPN
solutions on the bearer WAN.
• You can configure tunnel policies or tunnel policy selectors for tunnel
management. This course uses tunnel policy configuration as an example. Tunnel
policy selectors apply to inter-AS VPN scenarios. For details, see the product
documentation for NetEngine products.
Configuring a Tunnel Policy
⚫
A tunnel policy determines the types and sequence of tunnels to be selected.
⚫
By default, a VPN service recurses only to one LSP. If multiple LSPs are available, a tunnel policy can be used for load balancing
among these LSPs.
⚫
In this example, to implement load balancing between MPLS LDP LSPs and TE tunnels, you need to configure a tunnel policy for the
VPN and apply the tunnel policy to the VPN. The tunnel policy policy1 requires tunnels to be selected in the sequence of first CR-
LSPs and then LSPs, and the number of tunnels for load balancing is 2. The system preferentially selects two CR-LSPs. If only one or
no CR-LSP is available on the network, the system selects one or two LSPs, respectively, for service transmission. In the scenario
where only one CR-LSP is available, it works together with the selected LSP.
MPLS TE
MPLS LDP
PE1 PE2
32 Huawei Confidential
• The configuration of tunnel policy parameters involves many details. For example,
CR-LSP-based tunnels include RSVP-TE tunnels and SR-MPLS TE tunnels. The
system determines the priorities of these tunnels based on their up time. For
details, see "VPN Tunnel Management Configuration" in the product
documentation for Huawei NetEngine routers.
Applying a Tunnel Policy to a VPN
⚫ After being configured, a tunnel policy needs to be applied to a VPN. The mode in which a tunnel
policy is applied to a VPN varies according to the VPN type.
⚫ This example shows how to apply a tunnel policy to an L3VPNv4 instance.
MPLS TE
MPLS LDP
PE1 PE2
33 Huawei Confidential
• For the application of other types of VPN, such as VPNv6, L2VPN, and EVPN, see
the product documentation for NetEngine routers.
Extension: SR Policy-based Traffic Diversion
⚫ Tunnel policies are designed by Huawei for VPN service recursion in the MPLS era. They effectively decouple tunnel establishment
from tunnel selection. In this way, the traffic of a VPN can be directed to multiple tunnels for load balancing. After the SR
technology is introduced, the implementation mode changes. SR Policies integrate tunnel establishment (SR forwarding path) and
tunnel policies (color-based traffic diversion by default). SR Policies cannot be selected together with other types of tunnels.
⚫
An SR Policy is identified by <headend, color, endpoint> and can contain multiple forwarding paths. A VPN service selects an SR
Policy based on the color attribute.
34 Huawei Confidential
3. VPN Service
5. SLA
6. Network Reliability
35 Huawei Confidential
Network Congestion Background
Drawback of fixed bandwidth-based route selection and
Drawback of sequenced tunnel establishment and related solution
related solution
Tunnels are established in the following sequence: A-E > A-G > C-H.
A B
Tunnel C-H, however, fails to be established due to insufficient
1G/5G bandwidth.
2 3
2G/10G B C D
C
6G/5G A F G H E
Used bandwidth/Total 1
D E
bandwidth
The network computes forwarding paths based on Global path computation for optimal tunnel path adjustment:
bandwidth. The link from Router C to Router D is the
shortest forwarding path. The rate of service traffic from
2 C
Router C to Router D exceeds the link bandwidth, and B D
packet loss occurs. Although other links are idle, the
3
algorithm still selects the shortest path for traffic
A 1 F G H E
forwarding. From a global perspective, the optimal
traffic forwarding path is C -> A -> D in this situation.
36 Huawei Confidential
Network Traffic Optimization Overview
⚫
Network traffic optimization is to perform global analysis on network congestion, obtain the path computation result based on a
proper optimization policy (ensuring the SLA of critical services), and apply the computation result to the network for congestion
elimination.
⚫
Network traffic optimization can be divided into three phases: network information collection, path computation for network traffic
optimization, and optimization result delivery.
2. Path computation for network traffic 3. Optimization result delivery
1. Network information collection
optimization
The controller collects global network The controller computes paths based on the The controller delivers the
information, including: optimization target. Optimization targets include: computation result to network
devices in any of the following
⚫ Network topology ⚫ Least path cost
modes:
⚫ Network bandwidth ⚫ Shortest path delay ⚫ NETCONF
⚫ Link delay ⚫ Maximum link bandwidth utilization ⚫ PCEP
⚫ Network traffic and other ⚫ ... ⚫ BGP SR Policy
information
...
37 Huawei Confidential
Network Information Collection
⚫ The collection of network information, including the network topology, interface bandwidth, link delay, and traffic
statistics, is the prerequisite for network traffic optimization.
Network topology and interface bandwidth collection
• In the industry, SNMP is generally used to collect basic
Collector, controller, and analyzer network topology and device information.
• BGP-LS is used to collect IGP and TE topology information
(including interface bandwidth).
• SNMP • PCEP and BGP SR Policy are used to collect TE tunnel
• BGP-LS information.
• PCEP
• Telemetry Link delay collection
… • The link delay is collected using TWAMP, flooded in the IGP
domain, and then reported to the controller through BGP-LS.
38 Huawei Confidential
Constraint Description
39 Huawei Confidential
• Bandwidth-balanced path: path with more remaining bandwidth among all paths
that meet the constraints and have the same cost.
• Maximum-availability path: path with the maximum availability among all paths
that meet the constraints.
Optimization Result Delivery
⚫ After the controller computes a network path, you can choose whether to apply the computation result to the
network. There are multiple implementation modes:
1 NETCONF/YANG
• The controller delivers the computation result to
Controller network devices as configurations.
• The YANG model is standardized and provides good
compatibility with different vendors.
1. NETCONF/YANG 2 PCEP
2. PCEP Computation
• The controller delivers PCEP messages to create or update
3. BGP SR Policy result delivery LSPs.
• The PCEP standard does not define a tunnel model, and
vendor-specific protocols cannot interoperate with each other.
3 BGP SR Policy
• The controller uses BGP extensions to deliver tunnels.
• The RFC defines the tunnel model and data packet
structure in a unified manner, facilitating product
interoperability between different vendors.
40 Huawei Confidential
Contents
3. VPN Service
5. SLA
6. Network Reliability
41 Huawei Confidential
New Requirements for Bearer Network SLA Assurance
⚫
An SLA is a formal commitment between a service provider and a customer. In the WAN service field, in addition to basic
connectivity requirements, the SLA also focuses on deterministic delay, bandwidth, reliability, and isolation (security).
⚫
Generally, a bearer path carries the traffic of multiple types of services. When different types of service traffic are transmitted on the
same path, differentiated bearer needs to be provided based on SLA requirements. Traditional QoS uses statistical multiplexing to set
different priorities for specific services to ensure smooth experience of high-priority services. However, QoS falls short of meeting the
isolation and deterministic delay requirements.
⚫
Network slicing can divide a bearer network into virtual networks of different service levels and provide dedicated logical channels
for services with high quality and security requirements.
Delay
Bandwidth ⚫
For example, fund settlement services between
QoS
requirements financial enterprises require high security and
Jitter
stable delay; the file transfer service within an
Packet loss rate enterprise requires high bandwidth; and
enterprise voice services require low jitter.
Deterministic delay
Service
requirements Isolation
42 Huawei Confidential
Slice-based Bearer Network: One Network for Multiple
Purposes (Carrying Multiple Services), Lowering Costs
⚫ The IP network uses statistical multiplexing to greatly improve network utilization and reduce per-bit transmission costs. However,
statistical multiplexing brings uncertainty to the quality assurance levels of different services. Moreover, it is inappropriate to prepare
resources based on the highest SLA requirements to meet the requirements of all types of private lines and customers. The
converged bearer network needs to balance multi-service isolation and statistical multiplexing to meet the SLA requirements of each
service.
⚫
Slice resource reservation technologies, such as FlexE, channelized sub-interfaces, and QoS queues, can be used to direct services to
respective service slices. These slices are isolated from each other and do not affect each other, providing different SLA levels.
Controller
43 Huawei Confidential
QoS Channelized Sub-interface FlexE
QoS Overview
⚫ QoS provides differentiated service quality for different applications.
⚫ Generally, QoS provides three service models: best-effort service, integrated service (IntServ), and
differentiated service (DiffServ).
⚫ DiffServ is the most widely used QoS model on IP networks.
• Applications can send any number of packets at
Best-effort service any time.
• The network tries its best to send packets and
does not provide delay or reliability guarantee.
44 Huawei Confidential
QoS Channelized Sub-interface FlexE
Rate limiting (traffic policing and shaping): This component limits the rate of service traffic. It does this by discarding excess traffic when the service
traffic exceeds the rate limit. Traffic policing controls the traffic receiving rate, and traffic shaping controls the traffi c sending rate.
Congestion management: This component buffers packets in queues upon network congestion and determines the forwarding order using a specific
scheduling algorithm.
Congestion avoidance: This component monitors network resource use. When congestion becomes severe, some packets are discarded to prevent
network overload.
⚫ Traffic classification and marking is the prerequisite and foundation for implementing differentiated services.
⚫
Traffic policing, traffic shaping, congestion management, and congestion avoidance are used to control network traffic from different
aspects.
45 Huawei Confidential
QoS Channelized Sub-interface FlexE
Service
packets Receiving Behavior Searching the
Parsing Multi-field
optical/electr aggregate forwarding CAR ...
packets classification
ical signals classification table
Interface Queue Scheuding Queue
card Packet forwarding engine (PFE) entering leaving
TM
SFU
46 Huawei Confidential
48 Huawei Confidential
QoS Channelized Sub-interface FlexE
CS
6 6 6 48-55 CS6 (48)
5 5 5 40-47 EF EF (46)
4 4 4 32-39 AF4 AF41 (34) AF42 (36) AF43 (38)
3 3 3 24-31 AF3 AF31 (26) AF32 (28) AF33 (30)
AF
2 2 2 16-23 AF2 AF21 (18) AF22 (20) AF23 (22)
1 1 1 8-15 AF1 AF11 (10) AF12 (12) AF13 (14)
0 0 0 0-7 BE BE (0)
49 Huawei Confidential
QoS Channelized Sub-interface FlexE
Congestion
management
Queue 0
Incoming
Scheduling
Outgoing
traffic Traffic Traffic Other Queue 1 traffic
classification policing processing. Queue 2
and marking (CAR) .. ...
Queue N
Traffic
Congestion avoidance shaping
50 Huawei Confidential
QoS Channelized Sub-interface FlexE
Queue 0
Scheduling
Incoming Other Queue 1 Outgoing traffic
Traffic Traffic
traffic processing
policing classification Queue 2
(CAR) and marking ... ... Traffic
Congestion Queue N shaping
avoidance
51 Huawei Confidential
• Weighted Random Early Detection (WRED): The system discards packets based
on the drop policies configured for data packets or queues with different
priorities. WRED is a congestion avoidance mechanism used to discard packets to
prevent queues from being congested. For details, see the product
documentation for Huawei NetEngine products.
• FIFO: FIFO does not classify packets. FIFO allows packets to be queued and
forwarded in the same order as they arrive at an interface.
• SP: Queues are scheduled strictly according to their priorities. Packets in queues
with a low priority can be scheduled only after all packets in queues with a
higher priority are scheduled.
• WFQ: The egress bandwidth is allocated to each flow according to the queue
weight.
• Other scheduling algorithms, such as RR polling, WRR weighted polling, and DRR
differential polling, are not described here.
QoS Channelized Sub-interface FlexE
Queue 1
PQ Start
queue ... SP
Queue m Perform a
Is the PQ No
round of PQ
queue empty?
scheduling.
Destination
interface
WFQ Queue 1 Yes
... WFQ SP Perform a round
queue Is the WFQ No
of WFQ
Queue i queue empty?
scheduling.
Yes
Perform a round
Is the LPQ No of LPQ
Queue 1 queue empty?
LPQ scheduling.
queue ... SP
Yes
Queue k
52 Huawei Confidential
• PQ queue
▫ PQ queues use the SP scheduling algorithm. That is, the packets in the
queue with the highest priority are scheduled first. In this way, an absolute
priority can be provided for different service data, the delay of delay-
sensitive applications such as VoIP can be guaranteed, and the use of
bandwidth by high-priority services can be absolutely prioritized.
▫ Disadvantage: If the bandwidth of high-priority packets is not limited, low-
priority packets may fail to obtain bandwidth and be scheduled.
• WFQ queue
Data
center
Data Data
City A center City B
center
WAN-P
Behavior aggregate classification is
deployed on the VPN access interfaces of
WAN-P WAN-P PEs for different services. Packets are
mapped to queues based on DSCP values
and then redirected to different tunnels
on the WAN.
BR-PE BR-PE
City C City D
54 Huawei Confidential
• If the CE or the downstream device of the CE does not have the traffic marking
capability, deploy multi-field classification on the ingress PE on the bearer WAN
to mark traffic for queuing. This, however, affects the forwarding performance of
the bearer WAN.
QoS Channelized Sub-interface FlexE
55 Huawei Confidential
QoS Channelized Sub-interface FlexE
QoS Limitations
⚫ QoS itself cannot solve the congestion problem or provide isolation and deterministic delay assurance for services:
QoS involves only single-hop behaviors and does not change the network topology.
QoS does not change service behaviors. If the bursty traffic of a single flow is too heavy, congestion still occurs.
The number of QoS queues is small, and SLA assurance cannot be provided for specific users. As a result, deterministic delay
assurance cannot be provided.
The QoS mechanism is an experience system for resource management and cannot provide independent resources for users.
56 Huawei Confidential
QoS Channelized Sub-interface FlexE
QoS HQoS
57 Huawei Confidential
QoS Channelized Sub-interface FlexE
58 Huawei Confidential
QoS Channelized Sub-interface FlexE
59 Huawei Confidential
QoS Channelized Sub-interface FlexE
delay bandwidth
Statistical
High
IP
IP 80G multiplexing
multiplexing
QoS
Statistical
QoS scheduling PHY PHY scheduling
Deterministic Low
MAC Statistical FlexE
100G 100G 10G multiplexing
PHY
PHY
delay
TDM MAC
10G switching
QoS FlexE
60 Huawei Confidential
QoS Channelized Sub-interface FlexE
FlexE shim
FlexE shim
FlexE client
FlexE client
61 Huawei Confidential
Comparison of Slicing Technologies
PIC QoS: All traffic shares eight queues. QoS schedules resources
SQ GQ VI DP TM
CS7 in a unified manner to maximize the statistical multiplexing
MAC PHY
BE capability. It cannot differentiate users, and so cannot
Channelized sub-interface provide independent resource reservation for different users.
SQ GQ VI TM PIC
CS7
BE Channelized sub-interface: Queue resources are isolated.
DP Hierarchical scheduling is used to implement flexible and
Channelized sub-interface
...
MAC PHY
refined management of interface resources, provide
SQ GQ VI
CS7 bandwidth guarantee, and work with the controller to
BE
provide E2E resource reservation.
TM PIC
SQ DP
CS7 FlexE: Queue and interface resources are isolated. Every
FlexE client
BE
resource is divided by TDM timeslot. This meets the
...
MAC FlexE shim PHY requirements for exclusive resource use and resource
SQ DP
CS7 FlexE client isolation and provides flexible and refined management of
BE
interface resources.
62 Huawei Confidential
Slicing Technology Implementation Modes
Interface
Usage Scenario and Feature Description
Name
A physical interface in standard Ethernet mode has fixed bandwidth. FlexE, however, can enable one or more physical interfaces to work in
FlexE mode and add them to a group. The total bandwidth of this group can be allocated on demand to logical interfaces in the group. The
group to which physical interfaces are added is referred to as a FlexE group. The logical interfaces that share bandwidth of the physical
interfaces in the FlexE group are called FlexE interfaces (also referred to as FlexE service interfaces).
FlexE sub- FlexE interface bandwidth varies, which allows services to be isolated. Compared with traditional technologies, FlexE technology permits bit-
interface (also level interface bundling, which solves uneven per-flow or per-packet hashing that challenges traditional trunk technology. In addition, each
called client FlexE interface has a specific MAC address, and forwarding resources between interfaces are isolated. This prevents head-of-line (HOL)
interface) blocking that occurs when traditional logical interfaces such as VLAN sub-interfaces are used for forwarding.
FlexE interface technology especially fits scenarios in which high-performance interfaces are required for converged bearer, such as mobile
bearer, home broadband, and private line access. Services of different types are carried on different FlexE interfaces and are assigned
bandwidth based on FlexE interfaces. In this way, FlexE achieves service-specific bandwidth control, meeting network slicing requirements in
5G scenarios.
A channelized interface can strictly isolate interface bandwidth. A VLAN channelized sub-interface is a channelization-enabled sub-interface
VLAN
of an Ethernet physical interface. Different types of services are carried on different channelized sub-interfaces and assigned bandwidth based
channelized
on channelized sub-interfaces. This implementation strictly isolates bandwidth among different channelized sub-interfaces on the same
sub-interface
physical interface and achieves service-specific bandwidth control, preventing bandwidth preemption among different sub-interfaces.
An Ethernet sub-interface is a virtual interface configured on a main interface and has Layer 3 features. You can configure an IP address for
an Ethernet sub-interface to implement inter-VLAN communication. The main interface can be either a physical interface or a logical
Ethernet sub-
interface. The sub-interface inherits the physical layer parameters of the main interface but has its own link layer and network layer
interfaces
parameters. You can activate or deactivate the sub-interface, without affecting the performance of the main interface. The change of the
main interface status, however, affects the sub-interface.
63 Huawei Confidential
Network Slicing Solution Example: SRv6 & Slice ID
Slice service 1 Slice service 1
VLAN VRF1 VRF1 VLAN
⚫
Slice ID description
Slice service 2 Slice service 2
VLAN VRF2 VRF2 VLAN Globally unique network slice identifier.
Corresponding to all forwarding resources on the
Slice service 3 Slice service 3
slice plane
VLAN VRF3 VRF3 VLAN
Slice ID carried in packets on the forwarding plane
Physical main interface Slice tunnel 1 end to end
SliceID1
Default slice + Each forwarding node matching a set of slice
IPv6 Header = Slice tunnel 2
SRH
64 Huawei Confidential
• Different VLANs are used for service access. Logical interfaces correspond to VPN
instances VRF1, VRF2, VR3... on the network slice.
• The ingress PE encapsulates the VPN SID and SRv6 Policy information into the
service flow on the network slice with the slice ID being 2, and inserts an
extension header with the Hop By Hop Slice ID being 2 between the IPv6 header
and SRH of each packet.
• Each transit node queries the SRv6 SID in the SRH hop by hop to obtain the
physical outbound interface, and then queries the specific "resource reservation"
sub-interface of the physical outbound interface based on the slice ID. The Hop
By Hop Slice ID remains unchanged throughout this process.
• The egress PE pops the Hop By Hop extension header and forwards the packet to
the AC interface of the corresponding VPN instance based on the VPN SID.
• By default, the slice ID is 0, and the IPv6 Hop By Hop extension header does not
need to be inserted. The packet format on the forwarding plane is the same as
that of traditional L3VPN over SRv6 Policy.
Contents
3. VPN Service
5. SLA
6. Network Reliability
65 Huawei Confidential
WAN Reliability Overview
⚫ WAN reliability covers two parts: device reliability and network reliability.
⚫ Device reliability: includes router reliability and controller reliability.
Controller reliability is implemented through cluster deployment and disaster recovery
(DR) system deployment.
Router reliability can be implemented using device features such as non-stop routing
(NSR). These features are beyond the scope of this course.
⚫ Network reliability: reduces the impact of link and node faults on services through
fast detection and convergence mechanisms at each layer.
66 Huawei Confidential
• Because different WAN VPN technologies use different terms, this section briefly
describes various protection mechanisms, but does not describe specific
protection technologies.
TE Tunnel Protection Technology Basics
⚫
MPLS TE tunnel protection can be provided from two perspectives: local protection and E2E protection. TE tunnels, including MPLS
TE tunnels, SR-MPLS TE tunnels, and SR-MPLS Policies can all be protected from the two perspectives, but their technical
implementation is slightly different.
⚫
E2E protection: establishes multiple CR-LSPs between the ⚫
Fast reroute (FRR), also called local protection, is a
ingress and egress of a tunnel, with each CR-LSP traversing temporary protection measure. If a transit node/link fails,
a different path. When detecting that the primary CR-LSP is local protection is triggered. A backup CR-LSP is then
faulty, the ingress switches traffic to the backup CR-LSP. established locally for traffic switching. In addition, the
tunnel ingress is instructed to recompute a path and switch
⚫
In E2E protection, path switching is slow. Therefore, E2E
traffic to the backup path in a timely manner.
protection needs to be used with a detection mechanism for
fast path switching.
Path 1: Primary CR-LSP
primary path
MPLS TE tunnel
Configuring FRR
R1 R2 Triggering local
protection Local backup CR-LSP
Path 2: backup path
67 Huawei Confidential
• MPLS TE E2E protection is classified into HSB and ordinary backup. In HSB
protection, the backup path and primary path are created at the same time.
• Segment Routing adopts Topology Independent-Loop Free Alternate (TI-LFA), an
enhancement of FRR, for local protection.
• Fast detection mechanism: Fast detection mechanisms represented by BFD
support fast detection of communication faults between devices.
TI-LFA FRR
⚫ TI-LFA FRR provides link and node protection for SR tunnels. If a link or node fails, traffic is rapidly
switched to the backup path.
Limitations of the traditional LFA algorithm TI-LFA algorithm
• The traditional LFA algorithm has topological limitations. As • Using the source routing capability of SR, TI-LFA computes a
shown in the figure, SIP traffic is forwarded to the DIP backup path on each node to protect the failure point. When
through R1. If the R1-R3 link fails, R1 forwards the traffic to a node detects a failure, traffic is rapidly switched to the
R2. However, no backup path can be formed before R2 backup path.
detects the failure. Primary R1-R3 path: 4.4.4.4; segment list: R1, R3
SIP: 1.1.1.1 Backup R1-R3 path: 4.4.4.4; segment list: R1, R2, R4, R3
R1 R2
SIP: 1.1.1.1 R1 R2
Cost=10 Cost=10
Cost=10 Cost=10
R3 R4 R3 R4
68 Huawei Confidential
Primary path
P1 P2 PE2
MPLS TE tunnel
69 Huawei Confidential
VPN FRR
⚫ VPN FRR sets the primary and backup forwarding paths pointing to the active and standby PEs on the
remote PE in advance. It works with fast PE fault detection to accelerate fault-triggered E2E service
convergence in scenarios where a CE is dual-homed to two PEs.
Primary path of tunnel 1
Tunnel 1
Backup path of tunnel 1
Primary path
Tunnel 2 Primary path of tunnel 2
of tunnel 1
P1 P2 PE2
Backup path of
CE1 PE1 tunnel 1 CE2
P3 P4 PE3
VPN FRR backup path (primary path of tunnel 2)
70 Huawei Confidential
IP FRR
⚫ If the link between PE2 and CE2 fails but PE2 still functions properly, the tunnel between PE1 and PE2
is still available. In this case, E2E tunnel switching is not required. PE2 selects PE3 as the backup next
hop. If the link between PE2 and CE2 or CE2 fails, IP FRR is implemented to rapidly switch IP traffic.
⚫ IP FRR is applicable to the IP network between CEs and PEs.
Primary path of tunnel 1
Tunnel 1
Backup path of tunnel 1
Primary path
Tunnel 2 Primary path of tunnel 2 of tunnel 1
P1 P2 PE2 CE2
IP FRR
CE1 PE1
P3 P4 PE3 CE3
71 Huawei Confidential
Summary: Multi-Level Network Protection
⚫ To sum up, different protection measures are taken to ensure tunnel reliability based on the locations
of faults on E2E paths.
⚫ From the perspective of E2E forwarding paths, it is recommended that multi-level protection be used:
Protection against faults on
Protection against Tunnel egress Protection against
the intermediate links and
CE access faults protection remote CE faults
nodes of tunnels
E2E path
CE1
72 Huawei Confidential
Contents
3. VPN Service
5. SLA
6. Network Reliability
73 Huawei Confidential
WAN Management and O&M
⚫ Among mainstream WAN solutions provided by different vendors, the SDN solution is preferred. The SDN controller
centrally manages and delivers WAN services to forwarders.
⚫ In Huawei's solution, the controller not only provides "control" functions, but also provides "management" and
"analysis" functions.
Network analysis
(Management+control+
• The AI algorithm is used to obtain network analysis
analysis)
results based on massive amounts of network
performance and monitoring data.
NETCONF Telemetry, SNMP, BGP-LS
Network
collection/management
Ingress Transit Transit Egress
• Multiple protocols and channels are used to collect network
configuration data, performance data, and monitoring data.
• Efficient network configuration management is provided.
Network measurement
TWAMP
• Network performance indicators, such as the delay,
iFIT
jitter, and packet loss rate, are measured.
74 Huawei Confidential
• This figure does not show protocols related to tunneling and traffic statistics
collection.
SNMP
75 Huawei Confidential
NETCONF
SNMP's drawbacks
NETCONF
Managed device NETCONF overview
(NETCONF server)
76 Huawei Confidential
Telemetry
⚫ Telemetry, also known as network telemetry, is mainly used to monitor networks, including packet check and analysis, intrusion and
attack detection, intelligent data collection, and application performance management. Generally, it is used together with NETCONF.
The analyzer analyzes the data collected by telemetry and then instructs the controller to automatically modify device configurations
based on analysis results.
⚫
Advantages of telemetry:
Is developed based on the YANG model. Analyzer
Collects a wide variety of data with high precision to fully reflect network status.
Continuously reports data with only one-time data subscription. Collector Controller
Locates faults rapidly and accurately.
NETCONF-
Telemetry-
based
Subseconds based data
configuration
uploading
delivery
Network device
YANG model
77 Huawei Confidential
BGP-LS
⚫ BGP-LS introduces new NLRI into BGP. The NLRI carries link, node, topology prefix, and other information, and is also referred to as
the link state NLRI.
⚫
BGP-LS can aggregate network-layer topology, bandwidth, delay, and other information and send the information to the controller
for path computation.
Controller
BGP-LS aggregates information collected
BGP-LS BGP-LS
by various network layer protocols,
(topology, bandwidth, delay) including:
⚫ IGP: IGP information of each AS
⚫ TWAMP: measurement information, such
as interface delay
IGP TWAMP TE SR
⚫ TE: TE information, such as bandwidth
⚫ SR: SR information, such as SR labels
78 Huawei Confidential
TWAMP
⚫ Two-Way Active Measurement Protocol (TWAMP) measures the two-way delay, jitter, and packet loss rate between
devices on an IP network. It performs negotiation over a TCP connection and uses UDP data packets as
measurement packets.
⚫
Control-Client: establishes, starts, and stops a test session and
TWAMP communication model
also collects statistics.
⚫
Server: responds to the Control-Client's request for establishing,
Test plane
Session-Sender Session-Reflector starting, or stopping a test session
Test
⚫ Session-Sender: proactively sends probes for performance
statistics after being notified by the Control-Client.
⚫
Session-Reflector: replies to the probes sent by the Session-
Control
Control-Client Server Sender with response probes after being notified by the Server.
Control plane
79 Huawei Confidential
80 Huawei Confidential
• The standard TWAMP version uses TCP for control plane negotiation, and test
packets are based on UDP. The reflector needs to know the session status so that
devices of different vendors can communicate with each other.
• TWAMP Light does not involve control plane negotiation, and test packets are
also based on UDP. The implementation and configuration are simple, and the
reflector does not need to know the session status.
TWAMP Application Scenarios
⚫ With TWAMP, NEs do not need to generate or maintain IP network performance statistics. The performance
management system can easily obtain statistics about the entire network by managing only the TWAMP clients
initiating statistics collection requests. In this way, IP performance statistics are collected quickly and flexibly.
⚫ TWAMP is used on enterprise WANs to measure the delay, jitter, and packet loss rate between any two nodes,
providing a reference for troubleshooting and traffic optimization.
81 Huawei Confidential
iFIT
Traditional out-of-band measurement principles
iFIT
(ping, traceroute, TWAMP...)
Test packet path • Link delay = Receiving time of the local node – Sending time of the
upstream node
Ingress Egress • Packet loss location: Telemetry reports information about each node
and compares the information to obtain the packet loss location.
Coloring Coloring
period T1 T2 Controller period T1 T2
Ingress Egress
E2E KPI
Sampled • Per-flow: Service packets are checked to reflect the actual
packets • Only pipe-based detection is available.
Service-level detection is not supported. service path and delay information.
• Packets are sent at intervals, and the • Per-packet: Packets are checked one by one, accurately
sampling precision is low. reflecting service packet loss.
82 Huawei Confidential
VRF 100
END.DT4 SID: B::1:1:D100
PE1 P1 P3 PE2
ETH ETH ETH ETH
ETH
Payload DA: B::1:1:D100 DA: B::1:1:D100 Payload
DA: B::1:1:D100
SRH basic header SRH basic header
SRH basic header
iFIT (E2E/Trace) iFIT (E2E/Trace)
iFIT (E2E/Trace)
Payload Payload
Payload
83 Huawei Confidential
• An End.DT4 SID (PE endpoint SID) identifies an IPv4 VPN instance on a network.
• For MPLS packets, the iFIT header is inserted between the MPLS label and MPLS
payload.
iFIT for SRv6 Policy Scenarios
⚫ In an SRv6 Policy scenario:
The iFIT extension header is encapsulated into the Optional TLV field of the SRH.
SRv6-capable nodes can report iFIT statistics in either E2E or hop-by-hop mode.
A node that does not support SRv6 but supports IPv6 forwarding can properly forward service packets carrying iFIT information.
iMaster NCE-IP
Telemetry
VRF 100
END.DT4 SID: B::1:1:D100
PE1 P1 P3 PE2
ETH ETH ETH ETH ETH
Payload DA: P1 DA: P3 DA: PE2 Payload
SRH basic header SRH basic header SRH basic header
(PE2,P3,P1)SL=2 (PE2,P3,P1)SL=1 (PE2,P3,P1)SL=0
iFIT (E2E/Trace) iFIT (E2E/Trace) iFIT (E2E/Trace)
Payload Payload Payload
84 Huawei Confidential
iFIT-based Service Path Display
⚫ In each measurement period, a device reports the flow direction, interface number, and TTL information when
reporting packet statistics.
⚫ iMaster NCE-IP restores the path information of the flow based on the information reported by each node.
⚫ The implementation is independent of the tunnel type (SRv6/SRv6 Policy/SR-MPLS TE/SR-MPLS BE/MPLS...).
Path restoration
iMaster NCE-IP
GE 1/0/2 GE 1/0/0
GE 1/0/0 R2 R4 GE 1/0/2
TTL=254 TTL=253
TTL=255 R1 R6 TTL=252
R3 R5
85 Huawei Confidential
iFIT-based Fault Locating
⚫ Path aggregation is performed based on the physical topology, end nodes of poor-QoE services, and
the built-in AI algorithm of iMaster NCE-IP to determine the minimum area that causes poor service
quality, helping further locate and demarcate faults.
R1 R3 R5 R6
86 Huawei Confidential
Quiz
B. False
B. SRv6
C. MPLS LDP
D. MPLS TE
87 Huawei Confidential
1. A
2. ABCD
Summary
⚫ This course introduces the concepts and principles of the enterprise bearer WAN's
typical architecture, bearer technologies, VPN services, traffic optimization, SLA,
reliability, and network management and analysis. To introduce these key aspects,
this course uses a large enterprise with three data centers in two cities and
multiple branches in different regions as an example.
⚫ On a real production network, engineers need to determine the network
architecture and technical applications based on the live network conditions and
enterprises' services.
88 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
3 Huawei Confidential
Problems in MPLS LDP and RSVP-TE
MPLS LDP RSVP-TE
R2 R2
R1 R1
R3 R3
R4 R4
• LDP itself does not have the path computation capability and • RSVP-TE configuration is complex and load balancing is not
requires an IGP for path computation. supported.
• Both the IGP and LDP need to be deployed for the control plane, • To implement TE, devices need to exchange a large number of
and devices need to exchange a large number of packets to RSVP packets to maintain neighbor relationships and path states,
maintain neighbor relationships and path states, wasting link wasting link bandwidth and device resources.
bandwidth and device resources. • RSVP-TE uses a distributed architecture, so that each device only
• If LDP-IGP synchronization is not achieved, data forwarding may knows its own state and needs to exchange signaling packets with
fail. other devices.
4 Huawei Confidential
5 Huawei Confidential
• The solution to this issue is to enable services to drive networks and define the
network architecture. Specifically, after an application raises requirements (e.g.
latency, bandwidth, and packet loss rate), a controller is used to collect
information (e.g. network topology, bandwidth usage, and latency) and compute
an explicit path according to the requirements.
SR Roadmap
⚫ Simplifies protocols and extends existing protocols.
Service-defined
The extended IGP/BGP supports label distribution.
Controller network
Therefore, LDP is not required on the network, achieving
protocol simplification. In addition, devices require only
software upgrades instead of hardware replacement,
protecting the investment on the live network.
The source routing mechanism is introduced.
The specific forwarding policy is instantiated as a label list
R2
on the ingress to control the traffic forwarding path.
IGP/BGP
⚫ Enables networks to be defined by services.
After an application raises requirements (e.g. latency,
R1 R3
bandwidth, and packet loss rate), a controller is used to
R4
collect information (e.g. network topology, bandwidth
usage, and latency) and compute an explicit path
according to the requirements.
6 Huawei Confidential
SR Solution
⚫ After services raise network requirements (e.g. latency, bandwidth, and packet loss rate), a controller
computes an explicit path in a centralized manner and delivers an SR path to carry the services.
Controller Service Explicit
requirement path
PCEP/NETCONF/BGP
High-bandwidth path
Low-latency path
Data download
Video
Voice
Low-packet-loss-rate path
7 Huawei Confidential
SR Overview
⚫ SR is designed to forward data packets on a network using the source routing model.
⚫ SR divides a network path into several segments and assigns a segment ID (SID) to each segment and forwarding
node. The segments and nodes are sequentially arranged into segment lists to form a forwarding path.
⚫ SR encapsulates segment list information that identifies a forwarding path into the packet header for transmission.
After a node receives the packet, it parses the segment list information. If the top SID in the segment list identifies
the local node, the node removes the SID and executes the follow-up procedure. Otherwise, the node forwards the
packet to the next hop in equal cost multiple path (ECMP) mode.
⚫ SR has the following characteristics:
Extends existing protocols (e.g. IGP) to facilitate network evolution.
Supports both controller-based centralized control and forwarder-based distributed control, providing a balance between the
two control modes.
Enables networks to quickly interact with upper-layer applications through the source routing technology.
8 Huawei Confidential
• https://datatracker.ietf.org/doc/rfc8402/
SR Advantages
Simplified control • SR uses a controller or IGP to uniformly compute paths and allocate labels, without the need to use
plane of the MPLS tunneling protocols such as RSVP-TE and LDP.
network • SR can be directly used in the MPLS architecture, without requiring changes to the forwarding plane.
Efficient TI-LFA • SR works with remote loop-free alternate (RLFA) FRR to provide efficient topology-independent loop-free
FRR protection alternate (TI-LFA) FRR.
against path • TI-LFA FRR offers node and link protection for all topologies, addressing the weakness in traditional
failures tunnel protection technologies.
• As SR is designed based on the source routing model, the ingress controls packet forwarding paths.
Smoother
• SR can work with the centralized path computation module to flexibly and easily control and adjust paths.
evolution to SDN
• SR supports both traditional networks and SDN networks and is compatible with existing devices, ensuring
networks
smooth evolution to SDN networks.
9 Huawei Confidential
Contents
10 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
11 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
12 Huawei Confidential
• The label values used in this course are only examples. For details about the label
allocation scope, see the corresponding product documentation.
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
400
400 R2 R4 R6
1046 2
800 GE0/0/2 ⚫ Source routing: The source node selects a
1046
1 3 forwarding path and encapsulates an
ordered segment list into a packet. After
receiving the packet, other nodes forward
R1 1 R8
800 it based on the segment list information.
R3 R5 R7
13 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
10.1.1.0/24 10.2.2.0/24
16001 1001 1002 16002
R1 R2 R3
Category Description
Identifies the prefix of a destination address on a network.
Generation mode: manual configuration
Prefix segment Prefix segments are propagated to other devices through an IGP. They are visible to and
effective on all the devices.
Node segments are special prefix segments.
Identifies an adjacency on a network.
Generation mode: dynamic allocation by the ingress through a protocol
Adjacency segment
Adjacency segments are propagated to other devices through an IGP. They are visible to all the
devices but effective only on the local device.
Prefix SID Node SID Adjacency SID Note: SIDs are identified in the same way in the following parts.
14 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
10.1.1.0/24 10.2.2.0/24
16001 16002
R1 R2 R3
Prefix Segment
• Identifies the prefix of a destination address on a network. Prefix segments are propagated to other devices through an
IGP. They are visible to and effective on all the devices.
• Node segments are special prefix segments used to identify specific nodes.
• When an IP address is configured as a prefix for a node's loopback interface, the prefix SID of the node is the node SID.
15 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
16 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
10.1.1.0/24 10.2.2.0/24
16001 16002
R1 1001 R2 1002 R3
Adjacency Segment
Identifies an adjacency on a network. Adjacency segments are propagated to other devices
through an IGP. They are visible to all the devices but effective only on the local device.
17 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
10.1.1.0/24 10.2.2.0/24
16001 16002
R1 1001 R2 1002 R3
18 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
SR-Algorithm TLV Advertises the algorithm that is used. Type 10 Opaque LSA
Advertises SR-MPLS SIDs or MPLS OSPFv2 Extended Prefix TLV and OSPF Extended Prefix Range
SID/Label Sub-TLV
labels. TLV in OSPFv2 Extended Prefix Opaque LSA
19 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
20 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
21 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
SR Policy Example
100
1012
1002
1 Traffic 16002 2 Tunnel-based forwarding
steering SR Policy
SR Policy:
• Can be generated using different modes, such as CLI, NETCONF, PCEP, and BGP SR Policy.
• Contains segment lists to guide traffic steering and forwarding.
22 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
IP IPv6
packet R2 packet R2
R1 R1
R3 R3
R2 R2
• Data forwarding plane: based on MPLS • Data forwarding plane: based on IPv6
• MPLS labels are used as SIDs. • IPv6 addresses are used as SIDs.
• Segment list information is encoded as a label stack. The segment • Segment list information is encoded as a label stack and carried using
to be processed is at the stack top. Once a segment is processed, the IPv6 Segment Routing header (SRH).
the corresponding label is removed from the label stack.
23 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
1013 1024
R2 R4 100 1045 Stitching
1032 label
1024 1013 1056
1046 1032 R2 R4
1024 100
R1 R6 1024
1032 1045
R1 R6
1032
R3 R5
R3 R5
• A label stack is an ordered set of labels used to identify a complete
LSP.
• Each adjacency label in the label stack identifies an adjacency, and the • If the label stack depth exceeds the maximum depth supported by
entire label stack identifies all adjacencies along the LSP. forwarders, the controller needs to allocate multiple label stacks to the
• During packet forwarding, a node searches for the corresponding forwarders and a special label to an appropriate node to stitch these
adjacency according to each adjacency label in the label stack, label stacks, thereby implementing segment-by-segment forwarding.
removes the label, and then forwards the packet. After all the • This special label is called a stitching label, and this appropriate node is
adjacency labels in the label stack are removed, the packet traverses called a stitching node. The controller allocates a stitching label to the
the entire LSP and reaches the tunnel destination. stitching node and pushes it to the bottom of the label stack.
24 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
25 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
Cost=10 Cost=10
A prefix segment-based forwarding path is computed by an IGP using the SPF algorithm.
1. After the prefix SID (100) of R2 is propagated using an IGP, all devices in the IGP domain learn the SID.
2. R1 is used as an example (the implementation for other devices is similar to this). It runs SPF to compute
the shortest path to R2.
Prefix segment-based forwarding paths are not fixed, and the ingress cannot control the entire packet
forwarding path.
26 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
1056 Loopback1
R1 1034
1078 2.2.2.2/32
R2
1078
1056
An adjacency segment is allocated to each adjacency on the network, and a segment list
containing multiple adjacency segments is defined on the ingress.
This method can be used to specify any strict explicit path, facilitating SDN implementation.
27 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
Loopback1
R1 1034 2.2.2.2/32
100
Prefix SID=100
R2
100
Adjacency and node segments can be used together. An adjacency segment can be specified to force a
path to traverse an adjacency. The node corresponding to a node segment can run SPF to compute the
shortest path that supports ECMP.
Paths established in this mode are not strictly fixed, and therefore, they are also called loose explicit paths.
28 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
SR-MPLS BE
606
Packet
R1 R2 R3 SR-MPLS BE
6.6.6.0/24
16002
29 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
SR-MPLS TE
202
1025
606
Packet 202
R1 R2 R3 SR-MPLS TE
6.6.6.0/24
16002
30 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
SR-MPLS BE LSP
⚫ An SR-MPLS BE LSP is a label forwarding path established using the SR technology. It uses a
prefix or node segment to guide packet forwarding.
⚫ An SR-MPLS BE LSP is the optimal SR LSP computed by an IGP using the SPF algorithm.
⚫ The creation and data forwarding of SR-MPLS BE LSPs are similar to those of LDP LSPs. SR-
MPLS BE LSPs do not have tunnel interfaces.
SRGB SRGB SRGB SRGB
20000-65535 30000-65535 40000-65535 50000-65535
Loopback1
4.4.4.4/32
Prefix index 100
R1 R2 R3 R4
Advertise the Advertise the Advertise the
prefix SID and prefix SID and prefix SID and
SRGB SRGB SRGB
31 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
32 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
33 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
Traffic Engineering
⚫ Traffic engineering (TE) is one of the most important network services. The traditionally popular TE
technology is based on MPLS and therefore is called MPLS TE. It can accurately control the path
through which traffic passes, maximizing bandwidth utilization.
34 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
35 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
36 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
Control IGP extensions are used for signaling control, reducing the RSVP-TE needs to be used as the MPLS control
plane number of required protocols. protocol, complicating the control plane.
37 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
Controller Controller
BGP-LS
IGP
R1 R2 R3 R1 R2 R3
R4 R5 R6 R4 R5 R6
The IGP configured on forwarders is used to collect network BGP-LS is used to report TE information and network
topology information, SR adjacency labels, and node labels. topology information with SR labels to the controller.
38 Huawei Confidential
• For SR-capable IGP instances, all IGP-enabled outbound interfaces are allocated
with SR adjacency labels, which are propagated to the entire network through an
IGP.
• In Huawei's early solutions, an IGP can also be used to collect network topology
information. Due to IGP area-related restrictions, BGP-LS is mainly used at
present.
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
Controller
BGP-LS
39 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
40 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
R1 SR-MPLS TE tunnel
R2
Path 2: backup path
⚫ SR-MPLS TE tunnel creation involves tunnel attribute configuration and tunnel establishment.
41 Huawei Confidential
Manual Configuration of a Tunnel with an Explicit Path NETCONF-based Tunnel Configuration Delivery by a Controller
SR-MPLS TE tunnels are established and managed using tunnel interfaces. As such, you need to configure a
tunnel interface on the ingress of each SR-MPLS TE tunnel.
42 Huawei Confidential
43 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
NETCONF
High-bandwidth path
PCEP
44 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
45 Huawei Confidential
46 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
⚫ Using tunnel interfaces to implement SR is simple and easy to understand, but has the following disadvantages:
Tunnel interfaces and traffic steering are implemented separately, leading to complex traffic steering and
low performance.
Tunnels need to be configured and deployed in advance, imposing a restriction in scenarios where the tunnel
destination cannot be determined.
The application scenarios of tunnel interface-based ECMP are limited.
47 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
SR Policy Overview
⚫ An SR Policy uses a segment list to specify a forwarding path, without the need to use tunnel
interfaces.
⚫ SR Policies are classified into SR-MPLS Policies and SRv6 Policies based on segments. This document
focuses on SR-MPLS Policies.
⚫ The controller computes paths based on the color attribute that represents SLAs and delivers the
computation results to forwarders to form SR-MPLS Policies. (In this example, the forwarder's tunnel
information is different from SR-TE tunnel information.) According to the color attribute and next hop
of the involved service route, the headend recurses the route to the corresponding SR-MPLS Policy for
service forwarding.
<PE1>display tunnel-info all
Tunnel ID Type Destination Status
----------------------------------------------------------------------------------------
0x0000000001004c4c04 ldp 1.0.0.12 UP
0x000000002900000004 srbe-lsp 1.0.0.12 UP
0x000000000300002001 sr-te 1.0.0.12 UP
0x00000000320000c001 srtepolicy 1.0.0.12 UP
0x000000003400002001 srv6tepolicy FC01::12 UP
48 Huawei Confidential
• https://datatracker.ietf.org/doc/draft-ietf-spring-segment-routing-policy/
• An SR Policy is a framework that enables instantiation of an ordered list of
segments on a node for implementing a source routing policy with a specific
intent for traffic steering from that node.
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
⚫ Color and endpoint are used to identify a forwarding path on the specific headend of an SR-
MPLS Policy.
49 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
50 Huawei Confidential
51 Huawei Confidential
• BGP-LS connection:
▫ Collects tunnel topology information for SR Policy path computation.
▫ BGP-LS supports the collection of SR Policy status information, based on
which the controller displays tunnel status.
https://datatracker.ietf.org/doc/draft-ietf-idr-te-lsp-distribution/
Primary Weight
path SR policy P1 <headend, color, endpoint>
Candidate-path CP1 <Protocol-Origin, Originator,
SR Policy Candidate path 1 Segment list 2 Discriminator>
Preference 200
<headend, Preference 200 Weight Weight W1, SID-List1 <SID11...SID1i>
color, Weight W2, SID-List2 <SID21...SID2j>
endpoint>
Candidate-path CP2 <Protocol-Origin, Originator,
Candidate path 2 Segment list 1 Discriminator>
Preference 100
Preference 100 Weight
Weight W3, SID-List3 <SID31...SID3i>
Backup Weight W4, SID-List4 <SID41...SID4j>
path
52 Huawei Confidential
• An SR Policy can contain multiple candidate paths (e.g. CP1 and CP2). Each of
the paths is uniquely determined by the triplet <Protocol-Origin, Originator,
Discriminator>.
• CP1 is the primary path because it is valid and has the highest preference. The
two SID lists of CP1 are delivered to the forwarder, and traffic is balanced
between the two paths based on weights. For SID-List <SID11...SID1i>, traffic is
balanced according to W1/(W1+W2). In the current mainstream implementation,
a candidate path has only one segment list.
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
Binding SID
⚫ To achieve better scalability, network opacity, and service independence, the binding SID (BSID) mechanism is
introduced to SR. (RFC 8402-5.Binding Segment) A BSID can be defined for each candidate path.
⚫ Similar to RSVP-TE tunnels, SR-MPLS TE tunnels can also function as forwarding adjacencies. If an SR-MPLS TE
tunnel is used as a forwarding adjacency and an adjacency SID is allocated to it, this SID is called a BSID. A BSID
identifies an SR-MPLS TE tunnel.
sr-te policy P1
Only one BSID can be configured for an SR-MPLS Policy. It can be
binding-sid 200
used for SR-MPLS TE path computation as other types of SIDs.
endpoint 5.5.5.5 color 100
53 Huawei Confidential
• The headend of an SR Policy forwards packets over the SR Policy based on the
BSID. For example, when the headend receives a packet carrying a BSID, it uses
the corresponding SR Policy to forward the packet.
• BSIDs are used in label-based traffic steering scenarios, especially label stitching
scenarios and tunnel protocol interworking scenarios, such as LDP over SR.
• For details, see draft-ietf-spring-segment-routing-policy-6.Binding SID.
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
4.4.4.4 20004
54 Huawei Confidential
• Preparations:
1. Controller planning: You can plan the color attribute and the mapping
between the color attribute and SR tunnels' SLA requirements (path
computation constraints) on the controller based on the SLA requirements
of services.
4.4.4.4 20004
55 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
4.4.4.4 20004
56 Huawei Confidential
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
57 Huawei Confidential
• The steps in this document do not represent the actual configuration sequence.
They are only used to help you understand the implementation process. In real-
world situations, the controller may deliver SR Policies and use NETCONF to
deliver configurations at the same time.
Basic Concept Fundamentals SR-MPLS BE SR-MPLS TE SR-MPLS Policy
4.4.4.4 20004
58 Huawei Confidential
59 Huawei Confidential
60 Huawei Confidential
TI-LFA FRR Anycast FRR Hot-Standby VPN FRR Microloop Avoidance SBFD BFD
Egress
Local
protection TI-LFA FRR
E2E
protection Egress
⚫ Detection-dependent
fast switching
Hot Standby
⚫ E2E paths protected
Ingress
61 Huawei Confidential
TI-LFA FRR Anycast FRR Hot-Standby VPN FRR Microloop Avoidance SBFD BFD
TI-LFA FRR
⚫ Topology-independent loop-free alternate (TI-LFA) FRR provides link and node protection for SR tunnels. If a link or
node fails, traffic is rapidly switched to the backup path.
Cost=10
R3 R4 Cost=10
R3 R4
62 Huawei Confidential
Link Node
High priority
protection protection
Protection Protection
SIP: 1.1.1.1 R1 R2 SIP: 1.1.1.1 R1 R2
path path
Original Original
path path
DIP: 4.4.4.4 DIP: 4.4.4.4
R3 R4 R3 R4
63 Huawei Confidential
• For details about TI-LFA FRR, see the "TI-LFA FRR" section in NE series product
documentation.
TI-LFA FRR Anycast FRR Hot-Standby VPN FRR Microloop Avoidance SBFD BFD
[Router] isis 1
[Router-isis-1] frr
[Router-isis-1-frr] loop-free-alternate level-2
[Router-isis-1-frr] ti-lfa level-2
IS-IS 1 Level-2
64 Huawei Confidential
TI-LFA FRR Anycast FRR Hot-Standby VPN FRR Microloop Avoidance SBFD BFD
Packet
TI-LFA cannot protect services
16006 against explicit node failures.
16004
16002 16004 16006
16001 R2 R4 R6
R1 16003 16005
R3 R5
65 Huawei Confidential
TI-LFA FRR Anycast FRR Hot-Standby VPN FRR Microloop Avoidance SBFD BFD
Anycast FRR
⚫ Anycast FRR can protect services against failures of specified nodes.
⚫ Assume that R4 and R5 advertise the same SID. This SID is called an anycast SID. The anycast SID is advertised in
the IGP, with the next hop pointing to the nearest node on the path, such as R4. In this case, R4 is the optimal node
of the anycast SID, and R5 is the backup node.
Set the same SID (anycast SID) for
different devices.
16001 R4 Optimal R6
R2
node
R1 16003
Backup
R3 R5 node
66 Huawei Confidential
TI-LFA FRR Anycast FRR Hot-Standby VPN FRR Microloop Avoidance SBFD BFD
16100
16002 16006
16001
R2 16100 R4 R6
Virtual
node
R1 16003
Backup
R3 R5 path
67 Huawei Confidential
• The cost values of the links from R4 and R5 to the virtual node are both 0.
However, the cost values of the links from the virtual node to R4 and R5 are
infinite.
TI-LFA FRR Anycast FRR Hot-Standby VPN FRR Microloop Avoidance SBFD BFD
Hot Standby
⚫ SR hot standby enables the controller to compute a backup path that is different from the primary
path to implement E2E path protection.
⚫ For SR-MPLS Policies, the primary and backup candidate paths implement hot standby protection. The
primary and backup candidate paths belong to the same SR-MPLS Policy.
Candidate path 1 Primary
SR-MPLS Policy
Candidate path 2 candidate path
16002 16004 16006
16001 P1 P2 PE2
P3 Backup P4 PE3
candidate path
68 Huawei Confidential
TI-LFA FRR Anycast FRR Hot-Standby VPN FRR Microloop Avoidance SBFD BFD
Backup
candidate path
⚫ Multiple candidate paths of an SR-MPLS Policy
SR policy P1 <headend, color, endpoint>
Candidate-path CP1 <Protocol-Origin, Originator, Discriminator>
implement hot standby protection. If a segment list
Preference 200 fails, a failover is triggered.
SID-List <SID11...SID1i>
Candidate-path CP2 <Protocol-Origin, Originator, Discriminator> ⚫ SR-MPLS Policy fault detection depends on
Preference 100
SID-List <SID21...SID2i> detection mechanisms such as BFD or SBFD.
69 Huawei Confidential
TI-LFA FRR Anycast FRR Hot-Standby VPN FRR Microloop Avoidance SBFD BFD
16001 P1 P2 PE2
Backup
candidate
CE1 PE1 16003 path 16005 16007 CE2
P3 P4 PE3
70 Huawei Confidential
TI-LFA FRR Anycast FRR Hot-Standby VPN FRR Microloop Avoidance SBFD BFD
VPN FRR
⚫ VPN FRR uses the VPN route-based fast switching technology. It presets primary and backup forwarding paths
pointing to the master and backup PEs, respectively, on the ingress PE and implements fast PE failure detection to
reduce E2E service convergence time when a PE failure occurs in an MPLS VPN scenario where a CE is dual-homed
to two PEs.
Candidate path 1
SR-MPLS Policy 1
Candidate path 2
SR-MPLS Policy 2 - Candidate path 1 Primary candidate path of SR-MPLS Policy 1
16001 P1 P2 PE2
Backup candidate path
of SR-MPLS Policy 1
CE1 PE1 16003 16005 16007 CE2
P3 P4 PE3
VPN FRR backup path (SR-MPLS Policy 2)
71 Huawei Confidential
• In VPN FRR, service convergence time depends on only the time required to
detect remote PE failures and change tunnel status, making service convergence
time irrelevant to the number of VPN routes on the bearer network.
• In this example, VPN FRR primary and backup paths exist from PE1 to PE3. They
are not all displayed in the figure.
TI-LFA FRR Anycast FRR Hot-Standby VPN FRR Microloop Avoidance SBFD BFD
72 Huawei Confidential
• Fault detection in hot standby and VPN FRR scenarios depends on detection
mechanisms such as BFD or SBFD.
TI-LFA FRR Anycast FRR Hot-Standby VPN FRR Microloop Avoidance SBFD BFD
16001 P1 P2 PE2
P3 P4 PE3
73 Huawei Confidential
TI-LFA FRR Anycast FRR Hot-Standby VPN FRR Microloop Avoidance SBFD BFD
Converged
16001 P1 P2 PE2
P3 P4 PE3
74 Huawei Confidential
TI-LFA FRR Anycast FRR Hot-Standby VPN FRR Microloop Avoidance SBFD BFD
P3 P4 PE3
75 Huawei Confidential
TI-LFA FRR Anycast FRR Hot-Standby VPN FRR Microloop Avoidance SBFD BFD
⚫
As shown in the figure, the link between PE2 and PE3 fails. If P2 has converged but P1 has not, a loop occurs between P1 and P2.
⚫
With remote microloop avoidance enabled, after P2 converges, it computes the microloop avoidance segment list <16003,16037> for
traffic accessing PE3. In this case, P1 still forwards traffic from P3 to PE3 even if P1 has not converged.
[P2] isis 1
[P2-isis-1] avoid-microloop segment-routing
16001
P1 P2 PE2
16003 16007
PE1
16037
P3 PE3
76 Huawei Confidential
TI-LFA FRR Anycast FRR Hot-Standby VPN FRR Microloop Avoidance SBFD BFD
77 Huawei Confidential
TI-LFA FRR Anycast FRR Hot-Standby VPN FRR Microloop Avoidance SBFD BFD
SBFD Overview
⚫ If BFD detects a large number of links, the negotiation time of the state machine is prolonged, which is not suitable for SR. To
address this issue, seamless bidirectional forwarding detection (SBFD), which is a simplified BFD mechanism, is introduced to detect
SR tunnels. With a simplified BFD state machine, SBFD shortens the negotiation time and improves network-wide flexibility.
BFD SBFD
Initiator negotiation Initiator Initiator negotiation Reflector
Down Down
BFD Down
Reflection only
Down -> Init Down -> Init Down
BFD Down Multiple
Down -> Up initiators share
Down -> Up Down -> Up one reflector.
78 Huawei Confidential
TI-LFA FRR Anycast FRR Hot-Standby VPN FRR Microloop Avoidance SBFD BFD
SBFD Implementation
Initiator Reflector
SBFD state
Admin Down machine of the
(Timer) Up
SBFD Control Packet initiator
79 Huawei Confidential
• Because the state machine has only Up and Down states, the initiator can send
packets carrying only the Up or Down state and receive packets carrying only the
Up or Admin Down state. The initiator starts by sending an SBFD packet carrying
the Down state to the reflector. The destination and source port numbers of the
packet are 7784 and 4784, respectively; the destination IP address is a user-
configured address on the 127 network segment; the source IP address is the
locally configured LSR ID.
• The reflector runs no SBFD state machine or detection mechanism. For this
reason, it does not proactively send SBFD Echo packets. Instead, it only reflects
back received SBFD packets. The destination and source port numbers in the
looped-back SBFD packet are 4784 and 7784, respectively; the source IP address
is the locally configured LSR ID; the destination IP address is the source IP
address of the initiator.
TI-LFA FRR Anycast FRR Hot-Standby VPN FRR Microloop Avoidance SBFD BFD
One-Arm BFD
⚫
BFD/SBFD requires that devices at both ends support this function. If a Huawei device needs to communicate with a BFD-incapable
device, you can configure one-arm BFD (also called one-arm BFD echo) for the Huawei device. A one-arm BFD Echo session can be
established on the BFD-capable device. After receiving a BFD Echo packet, the BFD-incapable device immediately loops back the
packet for quick link detection.
⚫
One-arm BFD Echo does not require Echo negotiation capabilities at both ends; that is, BFD can be configured on only one end. The
device with one-arm Echo enabled sends special BFD packets (source and destination IP addresses in the IP header are the IP address
of the local device, and the local and remote discriminators in the BFD packet are the same). After receiving the packets, the peer
device directly loops them back to the local device to check whether the link is normal. This function equips Huawei devices with a
stronger adaptability to low-end devices.
BFD-capable BFD-incapable
Router A Router B
80 Huawei Confidential
Contents
81 Huawei Confidential
Intra-AS SR-MPLS BE
MP-IBGP ⚫ SR-MPLS BE applies to services that do not
have strict SLA requirements or require path
planning.
⚫ Downstream routers allocate SIDs to
IGP (OSPF or IS-IS)
SR upstream routers to form SR-MPLS forwarding
PE1 PE2
MPLS MPLS MPLS
paths.
P1 P2 ⚫ MP-BGP is used on the control plane to
advertise VPN labels.
SID SID SID
advertisement advertisement advertisement ⚫ SR-MPLS BE can be used as a backup solution
CE1 CE2 for SR-MPLS TE services on a production
network.
82 Huawei Confidential
Intra-AS SR-MPLS TE
⚫ SR-MPLS TE applies to scenarios that have strict SLA requirements and require path planning, such as DCI scenarios.
⚫
SR labels are advertised by an IGP. The controller uses BGP-LS to collect information (e.g. network topology, bandwidth, latency, and
label information).
⚫ The controller computes qualified forwarding paths based on constraints and delivers path computation results to forwarders
through PCEP or NETCONF. Engineers can also manually configure strict forwarding paths and delegate the paths to the controller
through PCEP.
Controller
83 Huawei Confidential
Intra-AS SR-MPLS Policy
⚫ SR-MPLS Policy applies to scenarios that have strict SLA requirements and require path planning.
⚫
SR labels are advertised by an IGP. The controller uses BGP-LS to collect information (e.g. network topology, bandwidth, latency, and
label information).
⚫ The controller computes qualified forwarding paths based on constraints and delivers path computation results to forwarders
through BGP SR Policy or PCEP. Engineers can also manually configure strict forwarding paths and delegate the paths to the
controller through PCEP.
Controller
BGP-LS, NETCONF,
and BGP SR Policy/PCEP
IGP
84 Huawei Confidential
• PCEP was first proposed in the optical transport field. It is seldom deployed on
enterprises' production networks due to its few applications on IP networks,
difficult interoperability between vendors, and poor performance. Therefore, BGP
SR-Policy is recommended on an SR-MPLS network.
Inter-AS E2E SR-MPLS TE (1)
⚫ In inter-AS access scenarios, it is recommended that the controller perform centralized computation and deliver E2E
SR-MPLS TE paths.
⚫ BGP egress peer engineering (EPE) is configured on ASBRs for them to allocate a BGP peer SID to each other.
⚫ The ASBRs then use BGP-LS to report the BGP EPE-generated labels and network topology information.
Controller
85 Huawei Confidential
Inter-AS E2E SR-MPLS TE (2)
⚫ Before an E2E SR-MPLS TE tunnel is created, the controller needs to create intra-AS SR-MPLS TE
tunnels.
⚫ To reduce the label stack depth, you can configure a BSID for each intra-AS tunnel.
⚫ In this example, BSID 1000 is configured for the tunnel from PE1 to one ASBR, and BSID 2000 for the
tunnel from PE2 to the other ASBR. Controller
BSID 1000 BSID 2000
BGP EPE
86 Huawei Confidential
Inter-AS E2E SR-MPLS TE (3)
⚫ The controller performs global computation, integrates path labels into a label stack, and then delivers
it to forwarders.
⚫ In this example, the label stack for the path from PE1 to PE2 is <1000, 304, 2000>.
⚫ In the label stack, 1000 and 2000 are BSIDs, which will be replaced with corresponding SR label stacks
during intra-AS forwarding.
BSID 1000 Controller BSID 2000
87 Huawei Confidential
Contents
89 Huawei Confidential
L3VPN over SR-MPLS BE (2)
AS 100
Loopback0 Loopback0 Loopback0
10.0.1.1/32 10.0.2.2/32 10.0.3.3/32
VPN: vpna VPN: vpna PE1 configurations are as follows: (P and PE2
PE1 P PE2
10.0.12.0/24 10.0.23.0/24 configurations are not provided.)
.1 .2 .2 .3
[~PE1] ospf 1
10.0.14.0/24 10.0.35.0/24 [*PE1-ospf-1] opaque-capability enable
[*PE1-ospf-1] quit
Loopback1 Loopback1 [~PE1] mpls lsr-id 10.0.1.1
10.1.4.4/32 10.1.5.5/32 [*PE1] mpls
[~PE1-mpls] quit
CE1 AS 65000 AS 65001 CE2
[~PE1] segment-routing
[*PE1-segment-routing] quit
Configuration roadmap: [*PE1] ospf 1
1. Configure interface IP addresses and OSPF. (Configuration details [*PE1-ospf-1] segment-routing mpls
are not provided.) [*PE1-ospf-1] segment-routing global-block 16000 23999
2. Enable MPLS, configure SR, and establish SR LSPs on the [*PE1-ospf-1] quit
[*PE1] interface loopback 0
backbone network. [*PE1-LoopBack1] ospf prefix-sid index 1 Configure the
3. Establish an MP-BGP peer relationship between PE1 and PE2. [*PE1-LoopBack1] quit same SRGB.
4. Enable the VPN instance IPv4 address family on each PE. [*PE1] commit
5. Configure a tunnel policy for the PEs to preferentially select SR LSPs.
6. Verify the configuration. P: index 2
PE2: index 3
90 Huawei Confidential
▫ Run the mpls lsr-id lsr-id command to configure an LSR ID for the local
device.
▫ Enable SR globally.
92 Huawei Confidential
L3VPN over SR-MPLS BE (4)
PE1 configurations are as follows: (PE2 configurations are
AS 100 not provided.)
Loopback0 Loopback0 Loopback0
[~PE1] tunnel-policy p1
10.0.1.1/32 10.0.2.2/32 10.0.3.3/32
VPN: vpna VPN: vpna [*PE1-tunnel-policy-p1] tunnel select-seq sr-lsp load-balance-number 2
PE1 P PE2 [*PE1-tunnel-policy-p1] quit
.1 10.0.12.0/24 .2 .2 10.0.23.0/24 .3 [*PE1] commit
[~PE1] ip vpn-instance vpna
[*PE1-vpn-instance-vpna] ipv4-family
10.0.14.0/24 10.0.35.0/24 [*PE1-vpn-instance-vpna-af-ipv4] tnl-policy p1
[*PE1-vpn-instance-vpna-af-ipv4] quit
Loopback1 Loopback1
[*PE1-vpn-instance-vpna] quit
10.1.4.4/32 10.1.5.5/32
[*PE1] commit
CE1 AS 65000 AS 65001 CE2
Configuration roadmap: Run the display tunnel-info all command on PE1 to
1. Configure interface IP addresses and OSPF. (Configuration check SR LSP information.
details are not provided.) <PE1>display tunnel-info all
2. Enable MPLS, configure SR, and establish SR LSPs on the Tunnel ID Type Destination Status
backbone network. -------------------------------------------------------------------------------
3. Establish an MP-BGP peer relationship between PE1 and PE2. 0x000000002900000042 srbe-lsp 10.0.3.3 UP
4. Enable the VPN instance IPv4 address family on each PE. 0x000000002900000043 srbe-lsp 10.0.2.2 UP
5. Configure a tunnel policy for the PEs to preferentially
select SR LSPs. ID of the tunnel to PE2
6. Verify the configuration.
93 Huawei Confidential
▫ Run the ipv4-family command to enter the VPN instance IPv4 address
family view.
▫ Run the tnl-policy policy-name command to apply a tunnel policy to the
VPN instance IPv4 address family.
▫ Run the commit command to commit the configuration.
L3VPN over SR-MPLS BE (5)
AS 100
Loopback0 Loopback0 Loopback0 Check VPNv4 routing information on PE1.
Loopback0
10.0.1.1/32 10.0.2.2/32 10.0.3.3/32 <PE1>display bgp vpnv4 all routing-table 10.1.5.5
VPN: vpna VPN: vpna 10.0.3.3/32
PE1 P PE2
BGP local router ID : 10.0.1.1
.1 10.0.12.0/24 .2 .2 10.0.23.0/24 .3 Local AS number : 100
94 Huawei Confidential
L3VPN over SR-MPLS BE (6)
95 Huawei Confidential
L3VPN over SR-MPLS BE (7)
AS 100
Loopback0 Loopback0 Loopback0 Tracert the SR LSP on PE1.
10.0.1.1/32 10.0.2.2/32 10.0.3.3/32 <PE1>tracert lsp segment-routing ip 10.0.3.3 32
VPN: vpna VPN: vpna
PE1 P PE2 LSP Trace Route FEC: SEGMENT ROUTING IPV4 PREFIX 10.0.3.3/32 ,
press CTRL_C to break.
.1 10.0.12.0/24 .2 .2 10.0.23.0/24 .3 TTL Replier Time Type Downstream
0 Ingress 10.0.12.2/[16003 ]
10.0.14.0/24 10.0.35.0/24 1 10.0.12.2 8 ms Transit 10.0.23.3/[3 ]
2 10.0.3.3 9 ms Egress
Loopback1 Loopback1
10.1.4.4/32 10.1.5.5/32
CE1 AS 65000 AS 65001 CE2 Question: How are the labels computed?
Configuration roadmap:
1. Configure interface IP addresses and OSPF. (Configuration Verify the configuration on CE1.
details are not provided.)
<CE1>ping -a 10.1.4.4 10.1.5.5
2. Enable MPLS, configure SR, and establish SR LSPs on the PING 10.1.5.5: 56 data bytes, press CTRL_C to break
backbone network. Reply from 10.1.5.5: bytes=56 Sequence=1 ttl=254 time=1 ms
3. Establish an MP-BGP peer relationship between PE1 and PE2. Reply from 10.1.5.5: bytes=56 Sequence=2 ttl=254 time=1 ms
4. Enable the VPN instance IPv4 address family on each PE. Reply from 10.1.5.5: bytes=56 Sequence=3 ttl=254 time=1 ms
5. Configure a tunnel policy for the PEs to preferentially Reply from 10.1.5.5: bytes=56 Sequence=4 ttl=254 time=1 ms
Reply from 10.1.5.5: bytes=56 Sequence=5 ttl=254 time=1 ms
select SR LSPs.
6. Verify the configuration.
96 Huawei Confidential
Contents
AS 100
Loopback0 Loopback0 Loopback0
10.0.1.1/32 10.0.2.2/32 10.0.3.3/32
VPN: vpna VPN: vpna
PE1 P PE2 Configuration roadmap:
.1 10.0.12.0/24 .2 .2 10.0.23.0/24 .3
1. Configure interface IP addresses and OSPF. (Configuration
10.0.14.0/24 10.0.35.0/24 details are not provided.)
Loopback1 Loopback1 2. Enable MPLS, configure SR, and establish SR-MPLS TE LSPs
10.1.4.4/32 10.1.5.5/32
on the backbone network.
CE1 AS 65000 AS 65001 CE2
3. Establish an MP-BGP peer relationship between PE1 and PE2.
Networking requirements: 4. Enable the VPN instance IPv4 address family on each PE.
1. Connect PE1 and PE2 to different CEs that belong to VPN 5. Establish an MP-IBGP peer relationship between the PEs.
instance vpna. 6. Configure a tunnel policy for the PEs to preferentially select
SR-MPLS TE LSPs.
2. Deploy L3VPN service recursion to SR-MPLS TE tunnel on
7. Verify the configuration.
the backbone network so that CE1 and CE2 can
communicate through Loopback1.
98 Huawei Confidential
L3VPN over SR-MPLS TE (2)
99 Huawei Confidential
▪ Run the mpls lsr-id lsr-id command to configure an LSR ID for the
local device.
Loopback1 Loopback1
10.1.4.4/32 10.1.5.5/32
Configure an SR-MPLS TE tunnel interface. PE1
configurations are as follows: (PE2 configurations
CE1 AS 65000 AS 65001 CE2 are not provided.)
Configuration roadmap: [*PE1] interface tunnel1
1. Configure interface IP addresses and OSPF. (Configuration [*PE1-Tunnel1] ip address unnumbered interface LoopBack1
details are not provided.) [*PE1-Tunnel1] tunnel-protocol mpls te
2. Enable MPLS, configure SR, and establish SR-MPLS TE [*PE1-Tunnel1] destination 10.0.3.3
LSPs on the backbone network. [*PE1-Tunnel1] mpls te tunnel-id 1
3. Establish an MP-BGP peer relationship between PE1 and PE2. [*PE1-Tunnel1] mpls te signal-protocol segment-routing
[*PE1-Tunnel1] mpls te path explicit-path te1
4. Enable the VPN instance IPv4 address family on each PE. [*PE1-Tunnel1] commit
5. Establish an MP-IBGP peer relationship between the PEs. [~PE1-Tunnel1] quit
6. Configure a tunnel policy for the PEs to preferentially select
SR-MPLS TE LSPs.
7. Verify the configuration.
Configuration roadmap:
1. Configure interface IP addresses and OSPF. (Configuration Verify the configuration on CE1.
details are not provided.)
<CE1>ping -a 10.1.4.4 10.1.5.5
2. Enable MPLS, configure SR, and establish SR-MPLS TE LSPs
PING 10.1.5.5: 56 data bytes, press CTRL_C to break
on the backbone network. Reply from 10.1.5.5: bytes=56 Sequence=1 ttl=254 time=1 ms
3. Establish an MP-BGP peer relationship between PE1 and PE2. Reply from 10.1.5.5: bytes=56 Sequence=2 ttl=254 time=1 ms
4. Enable the VPN instance IPv4 address family on each PE. Reply from 10.1.5.5: bytes=56 Sequence=3 ttl=254 time=1 ms
5. Establish an MP-IBGP peer relationship between the PEs. Reply from 10.1.5.5: bytes=56 Sequence=4 ttl=254 time=1 ms
6. Configure a tunnel policy for the PEs to preferentially select Reply from 10.1.5.5: bytes=56 Sequence=5 ttl=254 time=1 ms
SR-MPLS TE LSPs.
7. Verify the configuration.
AS 100
Loopback0 Loopback0 Loopback0
10.0.1.1/32 10.0.2.2/32 10.0.3.3/32
VPN: vpna VPN: vpna
PE1 P PE2
Configuration roadmap:
.1 10.0.12.0/24 .2 .2 10.0.23.0/24 .3
1. Configure interface IP addresses and OSPF. (Configuration
10.0.14.0/24 10.0.35.0/24 details are not provided.)
Loopback1 Loopback1 2. Enable MPLS and configure an SR-MPLS Policy on the
10.1.4.4/32 10.1.5.5/32
backbone network.
CE1 AS 65000 AS 65001 CE2
3. Establish an MP-BGP peer relationship between PE1 and PE2.
Networking requirements: 4. Enable the VPN instance IPv4 address family on each PE.
1. Connect PE1 and PE2 to different CEs that belong to VPN 5. Configure the color attribute for routes on the PEs and
• In this example, adjacency SIDs are configured statically. The values of adjacency
SIDs are shown in the figure.
L3VPN over Static SR-MPLS Policy (3)
AS 100 Configure an SR-MPLS Policy. PE1 configurations are as
Loopback0 Loopback0 Loopback0 follows: (P and PE2 configurations are not provided.)
10.0.1.1/32 10.0.2.2/32 10.0.3.3/32
VPN: vpna VPN: vpna [~PE1] segment-routing
PE1 P PE2 [~PE1-segment-routing] segment-list pe1
330012 330021 330023 330032
[*PE1-segment-routing-segment-list-pe1] index 10 sid label 330012
[*PE1-segment-routing-segment-list-pe1] index 20 sid label 330023
[*PE1-segment-routing-segment-list-pe1] quit
10.0.14.0/24 10.0.35.0/24 [*PE1-segment-routing] sr-te policy policy100 endpoint 10.0.3.3 color 100
Loopback1 Loopback1 [*PE1-segment-routing-te-policy-policy100] binding-sid 115
10.1.4.4/32 10.1.5.5/32 [*PE1-segment-routing-te-policy-policy100] mtu 1000
[*PE1-segment-routing-te-policy-policy100] candidate-path preference 200
CE1 AS 65000 AS 65001 CE2 [*PE1-segment-routing-te-policy-policy100-path] segment-list pe1
Configuration roadmap: [*PE1-segment-routing-te-policy-policy100-path] quit
1. Configure interface IP addresses and OSPF. (Configuration [*PE1-segment-routing-te-policy-policy100] quit
[*PE1-segment-routing] quit
details are not provided.) [*PE1] commit
2. Enable MPLS and configure an SR-MPLS Policy on the
backbone network.
3. Establish an MP-BGP peer relationship between PE1 and PE2.
4. Enable the VPN instance IPv4 address family on each PE. Configure a destination address and color for
5. Configure the color attribute for routes on the PEs and the SR-MPLS Policy.
enable the PEs to exchange routing information.
6. Configure a tunnel policy on the PEs.
7. Verify the configuration.
▪ Run the index index sid label label command to specify a next-hop
SID for the segment list.
− You can run the command multiple times. The system generates
a label stack for the segment list by index in ascending order. If
a candidate path in an SR-MPLS Policy is preferentially selected,
traffic is forwarded using the segment list of the candidate path.
A maximum of 10 SIDs can be configured for each segment list.
▫ Configure an SR-MPLS Policy.
▪ The value of label-value must be within the range defined using the
local-block begin-value end-value command.
▪ (Optional) Run the mtu mtu command to configure an MTU for the
SR-MPLS Policy.
▪ The segment list must have been created using the segment-list
(Segment Routing view) command.
L3VPN over Static SR-MPLS Policy (4)
PE1 configurations are as follows: (PE2 configurations
AS 100 are not provided.)
Loopback0 Loopback0 Loopback0
10.0.1.1/32 10.0.2.2/32 10.0.3.3/32 [~PE1] ip vpn-instance vpna
VPN: vpna VPN: vpna
PE1 P PE2 [*PE1-vpn-instance-vpna] ipv4-family
330012 330021 330023 330032 [*PE1-vpn-instance-vpna-af-ipv4] route-distinguisher 100:1
[*PE1-vpn-instance-vpna-af-ipv4] vpn-target 111:1 both
[*PE1] interface loopback1
10.0.14.0/24 10.0.35.0/24 [*PE1-LoopBack1] ip binding vpn-instance vpna
[*PE1-LoopBack1] ip address 10.1.4.4 24
Loopback1 Loopback1 [*PE1-LoopBack1] quit
10.1.4.4/32 10.1.5.5/32 [~PE1] route-policy color100 permit node 1
CE1 AS 65000 AS 65001 CE2 [*PE1-route-policy] apply extcommunity color 0:100
[~PE1] bgp 100
Configuration roadmap: [~PE1-bgp] peer 10.0.3.3 as-number 100
1. Configure interface IP addresses and OSPF. (Configuration details [*PE1-bgp] peer 10.0.3.3 connect-interface loopback 0
are not provided.) [*PE1-bgp] ipv4-family vpnv4
2. Enable MPLS and configure an SR-MPLS Policy on the backbone [*PE1-bgp-af-vpnv4] peer 10.0.3.3 enable
[*PE1-bgp-af-vpnv4] peer 10.0.3.3 route-policy color100 import
network.
[~PE1-bgp-af-vpnv4] quit
3. Establish an MP-BGP peer relationship between PE1 and PE2. [*PE1-bgp]ipv4-family vpn-instance vpna
4. Enable the VPN instance IPv4 address family on each PE. [*PE1-bgp-vpna]import-route direct
5. Configure the color attribute for routes on the PEs and [*PE1-bgp-vpna]commit
enable the PEs to exchange routing information.
6. Configure a tunnel policy on the PEs.
7. Verify the configuration. Add the color attribute to the received route.
• The color attribute is added to a route through a route-policy. This enables the
route to recurse to an SR-MPLS Policy based on the color value and next-hop
address in the route.
▫ Configure a route-policy.
B. Type 2
C. Type 7
D. Type 10
1. D
Quiz
B. 3784
C. 6784
D. 7784
2. AD
Summary
⚫
SR is designed to forward data packets on a network using the source routing model. Compared with LDP and RSVP-
TE, SR-MPLS simplifies the control plane of an MPLS network, enabling information such as labels to be carried only
through IGP extensions. It provides higher scalability, freeing transit nodes from maintaining path information. The
packet forwarding path can be controlled only by using the ingress. In addition, SR-MPLS can work with the
centralized path computation module to flexibly and easily control and adjust paths, achieving smoother evolution to
SDN.
⚫
SR-MPLS supports three types of LSPs: SR-MPLS BE, SR-MPLS TE, and SR-MPLS Policy. SR-MPLS provides multiple
detection and protection mechanisms for these different LSPs, such as TI-LFA FRR, anycast FRR, hot standby, VPN FRR,
microloop avoidance, BFD, and SBFD.
⚫
SR-MPLS supports both traditional and SDN networks, is compatible with existing devices, and supports multiple
scenarios such as inter-AS interconnection. To facilitate understanding, this course provides examples for configuring
SR-MPLS using commands. In the following courses, we will introduce how to use the controller to configure SR-MPLS.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. SRv6 Overview
2. SRv6 Fundamentals
3 Huawei Confidential
IP/MPLS Network Introduction
⚫ As a Layer 2.5 technology that runs between Layer 2 and Layer 3, MPLS adds connection-oriented attributes to connectionless IP
networks. Traditional MPLS label-based forwarding improves the forwarding efficiency of IP networks. However, as hardware
capabilities continue to improve, MPLS no longer features distinct advantages in forwarding efficiency. Nevertheless, MPLS provides
good QoS guarantee for IP networks through connection-oriented label forwarding and also supports TE, VPN, and FRR.
⚫ IP/MPLS networks have gradually replaced dedicated networks, such as ATM, frame relay (FR), and X.25. Ultimately, MPLS is applied
to various networks, including IP backbone, metro, and mobile transport, to support multi-service transport and implement the
Internet's all-IP transformation.
IP/MPLS network
Ethernet MPLS IP
Header Header Packet
4 Huawei Confidential
R2 R2
R1 R1
R3 R3
R4 R4
6 Huawei Confidential
SR Origin and Solution
⚫ The SDN concept has a great impact on the network industry, and many protocols used for SDN implementation
emerge in the industry, including OpenFlow, Protocol Oblivious Forwarding (POF), Programming Protocol-
independent Packet Processors (P4), and SR. Compared with revolutionary protocols, SR considers compatibility with
the existing network and smooth evolution, and also provides programmability. It is a de facto SDN standard.
7 Huawei Confidential
Forwarding
plane Push Swap Pop Push Continue Next
MPLS 2004 MPLS 1368 MPLS 222
MPLS 1949 MPLS 1949 MPLS 111 MPLS 111 IPv6 + SRH IPv6 + SRH
Payload Payload Payload Payload Payload Payload Payload Payload Payload Payload Payload Payload
✓ Simplified protocols
✓ High scalability
Control plane simplification Forwarding plane simplification ✓ Programmability
8 Huawei Confidential
Thanks to the network programming capability, SRv6 can not only better implement path programming to meet service SLAs but also connect
networks and applications to build intelligent cloud-networks. Promotion of
Controller cloud-network
Compatibility convergence
with existing
networks
Path programming
to meet service
Common IPv6 router SLAs
SRv6 router
Data
download Improved
Video inter-AS
experience
Ingress
AS 65000 AS 65001
9 Huawei Confidential
Contents
1. SRv6 Overview
2. SRv6 Fundamentals
◼ Basic Concepts of SRv6
▫ SRv6 Policy Path Establishment and Traffic Steering
▫ Typical SRv6 Applications
Ingress D
11 Huawei Confidential
SRv6 SRH SRv6 Node SRv6 Forwarding
IPv6 SRH
⚫ RFC 8754 defines the IPv6 SRH added to IPv6 packets. The SRH format is as follows:
Destination Address
Segment List: an ordered list of SRv6 segment identifiers
(SIDs).
Routing Segments
Next Header Hdr Ext Len Segments Left (SL): number of remaining SRv6 segments. The
Type=4 Left SL value is decremented and the destination IP address (DIP)
Last Entry Flags Tag is changed to an active SID to complete traffic forwarding
segment by segment.
Segment List [0] (128-bit IPv6 address)
Active Tag: tags a packet as part of a class or group of packets to
Segment List [1] (128-bit IPv6 address) segment implement group-based policies.
Segment List [2] (128-bit IPv6 address) SRH TLVs (e.g. NSH metadata, HMAC TLV, and Padding TLV):
Optional TLV objects (variable) can be used as global parameters of SIDs in segment lists.
IPv6 Payload
12 Huawei Confidential
• The biggest difference between SRv6 and SR-MPLS lies in the IPv6 SRH. SRv6
uses IPv6 extension headers to implement Segment Routing.
• For details, see https://datatracker.ietf.org/doc/rfc8754.
SRv6 SRH SRv6 Node SRv6 Forwarding
SRv6 Segment
⚫ SRv6 segments are expressed using IPv6 addresses and usually called SRv6 SIDs.
⚫ As shown in the figure, an SRv6 SID usually consists of three fields: Locator, Function, and Arguments.
They are expressed in the Locator:Function:Arguments format. Note that the total length (Locator +
Function + Arguments) is less than or equal to 128 bits. If the total length is less than 128 bits, the
reserved bits are padded with 0.
⚫ If the Arguments field does not exist, the format is Locator:Function. The Locator field occupies the
most significant bits of an IPv6 address, and the Function field occupies the remaining part of the IPv6
address.
IPv6 SRH (IPv6 Extension Header)
IPv6 Header IPv6 Payload
128 bits 128 bits 128 bits
13 Huawei Confidential
SRv6 SRH SRv6 Node SRv6 Forwarding
IPv6 prefix
⚫ The Locator field identifies the location of a network node, and is used for other nodes to route and forward
packets to this identified node so as to implement network instruction addressing.
⚫ A locator has two important characteristics: routable and aggregatable. After a locator is configured for a node, the
system generates a locator route and propagates the route throughout the SR domain using an IGP, allowing other
nodes to locate the node based on the received locator route information. In addition, all SRv6 SIDs advertised by
the node are reachable through the route.
⚫ In the following example, a locator with the 64-bit prefix 2001:DB8:ABCD:: is configured for a Huawei device.
14 Huawei Confidential
Opcode Optional
⚫ The Function field identifies the forwarding behavior to be performed. In SRv6 network programming, forwarding
behaviors are identified using different functions. For example, RFC defines End, End.X, End.DX4, and End.DX6
behaviors.
⚫ An End.X SID is similar to an adjacency SID in SR-MPLS and is used to identify a link. A configuration example is as
follows:
⚫
The opcode corresponding to the function is ::1. In this example, the Arguments field is not carried,
and the SRv6 SID is 2001:db8:abcd::1.
⚫
This function guides packet forwarding from the specified interface (G3/0/0) to the corresponding
neighbor (2001:DB8:200::1).
15 Huawei Confidential
16 Huawei Confidential
• In addition to L3VPN services, SRv6 can carry L2VPN services. L2VPN-related SIDs
are as follows:
▫ End.DX2: Indicates a Layer 2 cross-connect endpoint SID that identifies an
endpoint. The corresponding function is to decapsulate packets, remove the
IPv6 header (along with all its extension headers), and then forward the
remaining packet data to the outbound interface associated with the SID.
This SID can be used in EVPN VPWS scenarios. If a bypass tunnel exists on
the network, an End.DX2L SID is generated automatically.
18 Huawei Confidential
SRv6 SRH SRv6 Node SRv6 Forwarding
⚫ An End.X SID is a Layer 3 cross-connect endpoint SID that identifies a link. It is similar to an adjacency SID in SR-MPLS. After an End.X SID is generated on
a node, the node propagates the SID to all the other nodes in the SRv6 domain through an IGP. Although the other nodes can all obtain the SID, only the
node generating the SID knows how to implement the instruction bound to the SID.
⚫ An End.DT4 SID is a PE-specific endpoint SID that identifies an IPv4 VPN instance. The instruction bound to the End.DT4 SID is to decapsulate packets and
search the routing table of the corresponding IPv4 VPN instance for packet forwarding. The End.DT4 SID is equivalent to an IPv4 VPN label and used in
L3VPNv4 scenarios. It can be either manually configured or automatically allocated by BGP within the dynamic SID range of the specified locator.
Loopback1 Loopback1
10.1.4.4/32 10.1.5.5/32
CE1 AS 65001 AS 65002 CE2
19 Huawei Confidential
SRv6 SRH SRv6 Node SRv6 Forwarding
SRv6 Flavors
⚫ Flavors are additional behaviors defined for SRv6 segment enhancement. These behaviors are optional
and used to enhance SRv6 segment-based actions in order to meet diverse service requirements.
⚫ SRv6-Network-Programming defines the following additional behaviors: penultimate segment pop of
the SRH (PSP), ultimate segment pop of the SRH (USP), and ultimate segment decapsulation (USD).
Decapsulates the outer IPv6 header on the ultimate End, End.X, End.DT2, End.DT4,
USD
endpoint node. and End.DT6
20 Huawei Confidential
• Different flavors can be combined. For example, if an End SID carries PSP and
USP flavors, the PSP action is performed on the penultimate node, and the USD
action is performed on the ultimate node.
SRv6 SRH SRv6 Node SRv6 Forwarding
21 Huawei Confidential
• static static-length: specifies the static segment length in the Function field. This
length determines the number of static opcodes that can be configured in the
specified locator.
• args args-length: specifies the length of the Arguments field. The Arguments
field is located at the end of a SID. If args args-length is configured, the
Arguments field is reserved and will not be occupied by configured static SIDs or
generated dynamic SIDs.
SRv6 SRH SRv6 Node SRv6 Forwarding
An End.X SID identifies a Layer 3 adjacency of an SRv6 node. Therefore, you need to specify an interface and the
next hop address of the interface during the configuration.
22 Huawei Confidential
SRv6 SRH SRv6 Node SRv6 Forwarding
⚫ In this example, the locator 2001:DB8:ABCD:: is configured, and its length is 64 bits. The static segment occupies 32 bits, the dynamic
segment 32 bits, and the Args field 0 bits. The value range is as follows:
Static segment: The start value is 2001:DB8:ABCD:0000:0000:0000:0000:0001, and the end value is 2001:DB8:ABCD:0000:0000:0000: FFFF:FFFF.
Dynamic segment: The start value is 2001:DB8:ABCD:0000:0000:0001:0000:0000, and the end value is 2001:DB8:ABCD:0000:FFFF:FFFF:FFFF:FFFF.
Statically configuring End and End.X SIDs is recommended. Dynamically allocated SIDs will change
after a device restart, adversely affecting maintenance.
23 Huawei Confidential
SRv6 SRH SRv6 Node SRv6 Forwarding
SRv6 Node
⚫ RFC 8754 defines three types of SR nodes:
SR source node: a source node that encapsulates packets with SRv6 headers.
Transit node: an IPv6 node that forwards SRv6 packets but does not perform SRv6 processing.
SRv6 segment endpoint node: a node that receives and processes SRv6 packets in which the
destination IPv6 address is a local SID or local interface address of the node.
CE2: End.DT4
CE1 R1 R2 R3 R4 FC04::400 CE2
24 Huawei Confidential
SRv6 SRH SRv6 Node SRv6 Forwarding
CE2: End.DT4
CE1 R1 R2 R3 R4 FC04::400 CE2
IPv6 Header
SRH (SL = 2) FC01:: /96 Locator
FC04::400 FC04::4 FC03::3 FC01::1 End SID
Payload
SRv6 Policy
25 Huawei Confidential
SRv6 SRH SRv6 Node SRv6 Forwarding
Encapsulates an outer IPv6 header and SRH for a received Layer Payload
H.Encaps.L2 2 frame, and searches the corresponding routing table for
forwarding.
Encapsulates an outer IPv6 header and reduced SRH for a
H.Encaps.L2.Red received Layer 2 frame, and searches the corresponding routing
table for forwarding.
26 Huawei Confidential
• The difference between a reduced SRH and an SRH is that the segment list in a
reduced SRH does not contain the first segment in an existing IPv6 DA.
SRv6 SRH SRv6 Node SRv6 Forwarding
Transit Node
⚫ A transit node is an IPv6 node that does not participate in SRv6 processing on the SRv6 packet forwarding path.
That is, the transit node just performs ordinary IPv6 packet forwarding.
⚫ After receiving an SRv6 packet, the node parses the IPv6 DA field in the packet. If the IPv6 DA is neither a locally
configured SRv6 SID nor a local interface address, the node considers the SRv6 packet as an ordinary IPv6 packet
and searches the routing table for packet forwarding without processing the SRH.
CE2: End.DT4
CE1 R1 R2 R3 R4 FC04::400 CE2
IPv6 Header
FC01:: /96 Locator
SRH (SL = 2)
FC01::1 End SID
FC04::400 FC04::4 FC03::3
Payload
27 Huawei Confidential
SRv6 SRH SRv6 Node SRv6 Forwarding
Endpoint Node
⚫ An endpoint node is a node that receives an SRv6 packet destined for itself (a packet of which the IPv6 destination address is a local
SID).
⚫
For example, R3 searches its local SID table based on the IPv6 DA FC03::3 of the packet and finds a matching End SID. Then, R3
decrements the SL value by 1, uses the SID whose SL value is 1 as the destination IPv6 address, searches the routing table, and
forwards the packet.
⚫ There may be multiple endpoint nodes on the data forwarding path. Each endpoint node provides services such as packet
forwarding, encapsulation, and decapsulation.
Source Node Transit Node Endpoint Node Endpoint Node
FC01:: /96 FC02:: /96 FC03:: /96 FC04:: /96
FC01::1 FC02::2 FC03::3 FC04::4
CE2: End.DT4
FC04::400
CE1 R1 R2 R3 R4 CE2
IPv6 Header
SRH (SL = 1)
FC01:: /96 Locator
FC04::400 FC04::4 FC03::3
FC01::1 End SID
Payload
28 Huawei Confidential
• Each SRv6 node maintains a local SID table that contains all SRv6 SIDs generated
on the node, and an SRv6 FIB can be generated based on the table. The local SID
table provides the following functions:
⚫ In the initial phase of SRv6 deployment, SRv6 BE can be used to quickly provision services based on
IPv6 route reachability, offering unparalleled advantages. During future evolution, transit nodes can be
upgraded on demand and SRv6 Policy can be deployed to meet the requirements of high-value
services.
29 Huawei Confidential
SRv6 SRH SRv6 Node SRv6 Forwarding
30 Huawei Confidential
SRv6 SRH SRv6 Node SRv6 Forwarding
R1 R2 R3 R4 R5
DIPv6: FC05::5 DIPv6: FC05::5 DIPv6: FC05::5 DIPv6: FC05::5
SIPv6: FC01::1 SIPv6: FC01::1 SIPv6: FC01::1 SIPv6: FC01::1
Payload Payload Payload Payload
FC01:: /96 Locator
FC01::1 End SID
31 Huawei Confidential
SRv6 SRH SRv6 Node SRv6 Forwarding
R1 R2 R3 R4 R5
DIPv6: FC03::3 DIPv6: FC03::3 DIPv6: FC04::4 DIPv6: FC05::5 DIPv6: FC05::5
SIPv6: FC01::1 SIPv6: FC01::1 SIPv6: FC01::1 SIPv6: FC01::1 SIPv6: FC01::1
SRH (SL = 2) SRH (SL = 2) SRH (SL = 1) SRH (SL = 0) Payload
FC05::5 FC05::5 FC05::5 FC05::5
FC04::4 FC04::4 FC04::4 FC04::4 If the type of the SID whose SL
FC03::3 FC03::3 FC03::3 FC03::3 value is 0 is End, End.X, or End.DT,
the SRH is removed on the
Payload Payload Payload Payload
penultimate segment by default.
FC01:: /96 Locator
FC01::1 End SID
⚫ Different from SR-MPLS label processing, SRv6 SRH processing is implemented from the bottom up, and segments in the SRv6 SRH
are not popped after being processed by a node. Therefore, the SRv6 header can be used for path backtracking.
32 Huawei Confidential
• In MPLS, different removal options are defined using the Implicit-Null and Non-
null options. Penultimate hop popping (PHP) in the MPLS data plane refers to
the process in which the outermost label of the MPLS label stack is removed by
an LSR before the packet reaches the adjacent label edge router (LER). If PHP is
not enabled on the MPLS network, the LER is responsible for removing the label.
• These behaviors are defined as two functions in SRv6: PSP and USP.
Contents
1. SRv6 Overview
2. SRv6 Fundamentals
▫ Basic Concepts of SRv6
◼ SRv6 Policy Path Establishment and Traffic Steering
▫ Typical SRv6 Applications
34 Huawei Confidential
• https://datatracker.ietf.org/doc/draft-ietf-spring-segment-routing-policy/
SRv6 Policy Identification
⚫ An SRv6 Policy is identified by the tuple <headend, color, endpoint>.
⚫ For an SRv6 Policy with a specified headend, it is identified only using <color, endpoint>.
Headend: node where an SRv6 Policy is originated. Generally, it is a globally unique IP address.
Color: 32-bit extended community attribute. It is used to identify a type of service intent (e.g. low delay).
Endpoint: destination address of an SRv6 Policy. Generally, it is a globally unique IPv6 address.
⚫ On the specified headend, the color and endpoint are used to identify the forwarding path of the
corresponding SRv6 Policy.
Color 15
SRv6 Policy 1 <color 15, endpoint 1>
Color 20 Endpoint 1
Color 20 Endpoint 2
SRv6 Policy 3 <color 25, endpoint 2>
Color 25
35 Huawei Confidential
▫ The endpoint node in SRv6 refers to the type of the device that processes
the SRH.
⚫ Weights can be configured for segment lists to control load balancing among SRv6 paths.
Segment list 1
SR Policy P1 <headend, color, endpoint>
Weight Candidate-path CP1 <Protocol-Origin, Originator,
Primary path Discriminator>
SRv6 Policy Candidate path 1 Segment list 2 Preference 200
Weight W1, SID-List1 <SID11...SID1i>
Preference 200 Weight Weight W2, SID-List2 <SID21...SID2j>
<Headend, color,
Candidate-path CP2 <Protocol-Origin, Originator,
endpoint>
Discriminatorr>
Candidate path 2 Segment list 1 Preference 100
Weight W3, SID-List3 <SID31...SID3i>
Preference 100 Weight Weight W4, SID-List4 <SID41...SID4j>
Backup path
36 Huawei Confidential
• An SR Policy can contain multiple candidate paths (e.g. CP1 and CP2). Each of
the paths is uniquely determined by the triplet <Protocol-Origin, Originator,
Discriminator>.
• CP1 is the primary path because it is valid and has the highest preference. The
two SID lists of CP1 are delivered to the forwarder, and traffic is balanced
between the two paths based on weights. For the SID list <SID11...SID1i>, traffic
is balanced according to W1/(W1+W2).
SRv6 Policy Path Establishment Traffic Steering to SRv6 Policies
The controller uses BGP IPv6 SR Policy to deliver SRv6 Policy information (e.g. headend, color, and endpoint) to the headend.
⚫ Huawei's SRv6 Policy solution also uses NETCONF to deliver other configurations, such as service interfaces and route-policies (with
the color attribute).
⚫
In addition to delivering SRv6 Policies through iMaster NCE-IP, you can also manually deploy SRv6 Policies.
Extended IS-IS
1. BGP-LS
Color
2. BGP IPv6 SR Policy
3. NETCONF
Headend Endpoint
37 Huawei Confidential
38 Huawei Confidential
• BGP-LS connection:
39 Huawei Confidential
▫ BGP routes delivered by the controller carry the color community attribute,
which can be transmitted. The headend finds a matching BGP route and
recurses it to the corresponding SRv6 Policy based on the color and
endpoint information.
⚫
In an AS, devices can use an extended IGP (extended OSPFv3 or IS-IS) to obtain intra-AS SID information. In inter-AS scenarios,
however, BGP egress peer engineering (EPE) needs to be used to transmit SID information.
FC02::1C FC03::1C
FC01::1 FC02::2 FC03::3 FC04::4
40 Huawei Confidential
• BGP EPE can allocate BGP peer SIDs to inter-AS paths. Peer SIDs are classified
into the following types:
▫ A Peer-Node SID identifies a peer node. The peers at both ends of each BGP
session are allocated with Peer-Node SIDs. An EBGP peer relationship
established based on loopback interfaces may traverse multiple physical
links. In this case, the Peer-Node SID of a peer is mapped to multiple
outbound interfaces. Peer-Node SIDs are End SIDs.
⚫
Path stitching is mainly implemented using stitching SIDs and nodes.
A stitching SID (also called binding SID) can be used to represent an SRv6 Policy's forwarding path.
A stitching node, which is generally an ABR or ASBR, is responsible for processing the binding SID and adding SRH information.
Assume that the
stack depth CE1 PE1 AS 65001 ASBR1 ASBR2 AS 65002 PE2 CE2
supported by FC03::1C
The stack depth
the device is 4. FC04::100
cannot FC02::1C FC03::100
accommodate the
CE1->CE2 FC01::1 E2E segment list. FC02::2 FC03::3 FC04::4 CE1->CE2
IPv6 Header IPv6 Header IPv6 Header IPv6 Header IPv6 Header
SRH (SL = 3) SRH (SL = 3) SRH (SL = 1) SRH (SL = 0)
SRH (SL = 2) SRH (SL = 0)
Segment List (0)
Stack FC04::100 FC04::100 FC04::100 FC04::4 FC04::100
Segment List (1) FC03::100 FC03::100 FC03::100
depth FC03::100
Segment List (2) SRH (SL = 0)
FC02::1C FC02::1C FC02::1C FC02::1C
Segment List (3) FC04::100
FC02::2 FC02::2 FC02::2 FC02::2
FC03::100
FC02::1C End.X SID CE1->CE2 CE1->CE2 CE1->CE2 FC02::1C CE1->CE2
FC03::4 End SID FC02::2
Internal Internal Internal
FC03::100 Binding SID Sent from PE1 processing on processing on CE1->CE2 processing on
ASBR1 ASBR1 Sent from PE2 Insert mode
FC04::100 End.DT4 SID
ASBR2
41 Huawei Confidential
• On a large network, the SRv6 SRH may be of a large size. Considering device
limitations and forwarding efficiency, the number of SIDs in the SRH must be
limited.
• Generally, there are two methods for reducing the SRH size:
▫ SRv6 header compression
▪ Binding SIDs are used to stitch different SRv6 paths together, so that
the SRH of each SRv6 path is not too large.
• The SRv6 stack depth is generally determined by device capabilities.
• SRv6 mainly supports the following four types of binding SIDs:
▫ End.B6.Insert
▫ End.B6.Insert.Red
▫ End.B6.Encaps
▫ End.B6.Encaps.Red
SRv6 Policy Path Establishment Traffic Steering to SRv6 Policies
IPv6 Header IPv6 Header IPv6 Header IPv6 Header IPv6 Header
SRH (SL = 3) SRH (SL = 3) SRH (SL = 1) SRH (SL = 0)
SRH (SL = 2) SRH (SL = 0)
Segment List (0)
Stack FC04::100 FC04::100 FC04::100 FC04::4 FC04::100
Segment List (1) FC03::100 FC03::100 FC03::100
depth FC03::100
Segment List (2) IPv6 Header
FC02::1C FC02::1C FC02::1C FC02::1C
Segment List (3) FC02::2 FC02::2 SRH (SL = 0) FC02::2
FC02::2
FC02::1C End.X SID FC04::100
CE1->CE2 CE1->CE2 CE1->CE2 CE1->CE2
FC03::100
FC03::4 End SID Internal Internal FC02::1C Internal
FC03::100 Binding SID Sent from PE1 processing on processing on FC02::2 processing on
FC04::100 ASBR1 ASBR1 PE2
End.DT4 SID CE1->CE2 Encaps mode
Sent from
ASBR2
42 Huawei Confidential
• The End.B6.Encaps instruction used in Encaps mode can be disassembled into End
+ B6 + Encaps, where B6 indicates the application of an SRv6 Policy and Encaps
indicates the encapsulation of an outer IPv6 header and SRH. This instruction
includes the following operations: decrements the SL value of the inner SRH by 1,
copies the SID to which the SL field is pointing to the DA field of the inner IPv6
header, encapsulates an IPv6 header and SRH (including segment lists), sets the
source address to the address of the current node and the destination address to
the first SID of the involved SRv6 Policy, sets other fields in the outer IPv6 header,
looks up the corresponding table, and forwards the new IPv6 packet accordingly.
SRv6 Policy Path Establishment Traffic Steering to SRv6 Policies
43 Huawei Confidential
• Configure a tunnel policy on PE1. After receiving the BGP routes (Net1 and Net2),
PE1 recurses the routes to different SRv6 Policies based on the color values (0:15
and 0:20) and the next hop (PE2). Before forwarding packets to specified subnets
(Net1 and Net2), PE1 adds specific SRv6 SID stacks to the packets.
• The color attribute in route entries can be modified before the local router (for
example, PE2) sends routes or after the peer router (for example, PE1) receives
routes.
• You can also directly configure the color attribute for the VPN instance of the
originating router (for example, PE1), so that all traffic of the VPN instance is
forwarded over the specified SRv6 Policy.
SRv6 Policy Path Establishment Traffic Steering to SRv6 Policies
44 Huawei Confidential
• In DSCP-based traffic steering, the color attribute in route entries is mainly used
to find a matching mapping policy.
• The color attribute in route entries can be modified in the outbound direction of
the originating router (for example, PE2) or in the inbound direction of the
receiving router (for example, PE1).
• You can also directly configure the color attribute for the VPN instance of the
originating router (for example, PE1), so that all traffic of the VPN instance is
forwarded over the specified SRv6 Policy.
Contents
1. SRv6 Overview
2. SRv6 Fundamentals
▫ Basic Concepts of SRv6
46 Huawei Confidential
▫ The transit node P1 forwards the packet hop by hop based on SRH
information.
▫ After receiving the packet, the endpoint PE2 searches the My Local SID
Table and finds an End SID that matches the IPv6 DA FC03::3 in the packet.
According to the instruction bound to the SID, PE2 decrements the SL value
of the packet by 1 and updates the IPv6 DA to the VPN SID FC03::300.
▫ Based on the VPN SID FC03::300, PE2 searches the My Local SID Table and
finds a matching End.DT4 SID. According to the instruction bound to the
SID, PE2 decapsulates the packet, removes the SRH and IPv6 header,
searches the routing table of the VPN instance corresponding to the VPN
SID FC03::300 according to the DA in the inner packet, and forwards the
packet to CE2.
L3VPN over SRv6 BE
⚫ When SRv6 BE is used to carry VPN traffic, the P between PEs does not function as an endpoint.
MP-BGP Route
Prefix NHP Ext-Community
Net2 PE2 FC03::300 + RT
IGP Route IGP Route
Prefix NHP 65000 Prefix NHP
Net2 PE1 FC01:: /96 FC02:: /96 FC03:: /96 Net2 CE2
FC01::1 FC02::2 FC03::3
Net2
End.DT4
VPNA FC03::300 VPNA
CE1 PE1 P1 PE2 CE2
DIP: Net2 DIPv6: FC03::300 DIPv6: FC03::300 DIP: Net2
SIP: CE1 SIPv6: FC01::1 SIPv6: FC01::1 SIP: CE1
Forwards the
Payload DIP: Net2 packet based on DIP: Net2 Payload
SIP: CE1 the outer IPv6 SIP: CE1
Forwards the IP header. PE2 removes the
Payload Payload
packet over an outer IPv6 header
SRv6 Policy. and forwards the FC01:: /96 Locator
packet as a
FC01::1 End SID
common IP one.
48 Huawei Confidential
▫ The transit node P1 forwards the packet hop by hop based on SRH
information.
▫ After receiving the packet, the endpoint PE2 searches the My Local SID
Table and finds an End SID that matches the IPv6 DA FC03::3 in the packet.
According to the instruction bound to the SID, PE2 decrements the SL value
of the packet by 1 and updates the IPv6 DA to the VPN SID FC03::300.
▫ Based on the VPN SID FC03::300, PE2 searches the My Local SID Table and
finds a matching End.DT4 SID. According to the instruction bound to the
SID, PE2 decapsulates the packet, removes the SRH and IPv6 header,
searches the routing table of the VPN instance corresponding to the VPN
SID FC03::300 according to the DA in the inner packet, and forwards the
packet to CE2.
Native IPv6 over SRv6 Policy
⚫ Common IPv6 data can also be carried using SRv6.
BGP Route
Prefix NHP Ext-Community
Net2 PE2 0:15
IGP Route IGP Route
Prefix NHP 65000 Prefix NHP
Net2 PE1 FC01:: /96 FC02:: /96 FC03:: /96 Net2 CE2
FC01::1 FC02::2 FC03::3
Net2
Color 15
CE1 PE1 P1 PE2 CE2
DIPv6: Net2 DIPv6: FC02::2 Forwards the DIPv6: FC03::3 DIPv6: Net2 DIPv6: Net2
SIPv6: CE1 SIPv6: CE1 packet based on SIPv6: CE1 SIPv6: CE1 SIPv6: CE1
the outer IPv6
Payload SRH (SL = 2) SRH (SL = 1) SRH (SL = 0) Payload
header.
Net2 Net2 Net2
Removes the SRH
Forwards the IPv6 FC03::3 FC03::3 FC03::3
FC02::2 FC02::2 FC02::2 and forwards the
packet over the packet as a common
corresponding SRv6 Payload Payload Payload IPv6 one.
Policy based on the
color value.
FC01:: /96 Locator
FC01::1 End SID
50 Huawei Confidential
▫ SRv6 and SRv6 VPN are configured on each PE, and IPv6 or SRv6 is enabled
on the transit node.
▫ After PE1 receives the IPv6 route, if the next hop in the route is reachable
and the route matches the BGP import policy, PE1 performs a series of
actions, including route recursion to an SRv6 path and route selection.
▫ PE-to-CE route advertisement: CE1 can learn the IPv6 route from PE1
through a static route or a routing protocol (RIP, OSPFv3, IS-IS, or BGP).
The route advertisement process is similar to that from CE2 to PE2.
• Packet forwarding process:
▫ After receiving a unicast IPv6 packet from CE1, PE1 searches the IPv6
routing table and finds that the outbound interface of the route is an SRv6
Policy interface. PE1 then inserts an SRH carrying the SID list of the SRv6
Policy and encapsulates an IPv6 header into the packet. After completing
these operations, PE1 forwards the packet to P1.
▫ The transit node P1 forwards the packet hop by hop based on SRH
information.
▫ After receiving the packet, the endpoint PE2 searches the My Local SID
Table and finds an End SID that matches the IPv6 DA FC03::3 in the packet.
According to the instruction bound to the SID, PE2 decrements the SL value
of the packet by 1 and updates the IPv6 DA to the End SID Net2.
▫ Based on the End SID Net2, PE2 searches the My Local SID table, finds a
matching End SID, removes the SRH and IPv6 header, and forwards the
packet to CE2.
Contents
1. SRv6 Overview
2. SRv6 Fundamentals
Voice user
experience
Impact of network faults on voice services Impact of network faults on IPTV services
GOP
Imperceptible
Slightly
perceptible Obviously I B B P B B P B B I
perceptible Session
interrupted
0 50 ms 500 ms 2s
Reference standard: I-frame damage caused by packet loss is the key cause of erratic display.
YD/T 1071-2000 <IP Telephone Gateway technical specification>
53 Huawei Confidential
Overview of Multi-Layer Reliability Solutions
⚫ WAN bearer networks require high reliability to be provided at device, network, and service layers to
achieve E2E high availability of 99.999% and fast protection switching of all services within 50 ms.
• VPN FRR
EVPN L3VPN
Service layer
54 Huawei Confidential
Overview of Reliability Technologies for Multi-Layer
Networks
Detection Protection
Detection Object Technology Technology
HSB
SBFD for
LSP SRv6 Policy
Mixed VPN FRR
Midpoint
BFD for IGP protection
IGP
TI-LFA
BFD for
Physical link Microloop
interface
avoidance
55 Huawei Confidential
Usage Scenarios of Reliability Technologies for Multi-Layer
Networks
CE PE P P PE CE
Access network
6 8 10
Access network
2 4
1 3 5 7 9 11
CE PE P P PE CE
Intermediate network
Bearer network
Service Protection
Tunnel Type Failure Point Detection Technology Protection Technology Specification
Category Type
1. TI-LFA (SRv6 BE + SRv6 Policy)
Local 4 to 8 BFD for interface 50 ms
2. Midpoint TI-LFA (SRv6 Policy)
Common protection, E2E SRv6 BE,
services protection SRv6 Policy 3 and 9 BFD for locator VPN FRR 50 ms
1, 2, 10, and 11 BFD for interface VPN mixed FRR, IP FRR 50 ms
4 to 8 SBFD for SRv6 Policy HSB 50 ms
Services with Local
high SLA protection, E2E SRv6 Policy 3 and 9 SBFD for SRv6 Policy VPN FRR 200 ms/50 ms
requirements protection
1, 2, 10, and 11 BFD for interface VPN mixed FRR, IP FRR 50 ms
56 Huawei Confidential
Contents
1. SRv6 Overview
2. SRv6 Fundamentals
SBFD Ping/Tracert
Tracert
SBFD
SRv6 tunnel
SRv6 tunnel
Ping
• SBFD can be used to detect tunnel connectivity in an E2E • SRv6 SID ping is mainly used to check network connectivity
manner. and host reachability.
• However, SBFD cannot detect the specific fault location on Ping tests are classified into segment-by-segment tests and non-
the network. As such, it is usually used with HSB or VPN segment-by-segment tests.
FRR. • In addition to checking network connectivity and host
reachability, SRv6 SID tracert can be used to analyze the
specific fault location on the network.
58 Huawei Confidential
▫ The IPv6 address of the SBFD reflector must be the same as the endpoint of
the corresponding SRv6 Policy.
• As SRv6 simply adds a new type of routing extension header to implement
forwarding based on the IPv6 data plane, ICMPv6 ping and tracert can be directly
used on an SRv6 network for connectivity check based on common IPv6
addresses, without requiring any changes to hardware or software. ICMPv6 ping
and tracert both support packet forwarding to a destination address over the
shortest path, thereby checking the reachability to the destination. If the
destination address is an SRv6 SID, the check can be performed through either
ICMPv6 ping & tracert or SRv6 OAM extensions. Currently, SRv6 OAM can be
extended in either of the following ways:
59 Huawei Confidential
• Because the state machine has only Up and Down states, the initiator can send
packets carrying only the Up or Down state and receive packets carrying only the
Up or Admin Down state. The initiator starts by sending an SBFD packet carrying
the Down state to the reflector. The destination and source port numbers of the
packet are 7784 and 4784, respectively; the destination IP address is a user-
configured address on the 127 network segment; the source IP address is the
locally configured LSR ID.
• The reflector does not have any SBFD state machine or detection mechanism. For
this reason, it does not proactively send SBFD Echo packets, but rather, it only
reflects SBFD packets. The destination and source port numbers in the looped-
back packet are 4784 and 7784, respectively; the source IP address is the locally
configured LSR ID; the destination IP address is the source IP address of the
initiator.
Introduction to SRv6 Ping and Tracert
60 Huawei Confidential
• Currently, SRv6 ping and tracert can be implemented using the following two
methods:
▫ One method is to use the O-bit (OAM bit) in the SRH. Because the O-bit is
carried in the SRH, each SRv6 endpoint node needs to process and respond
to ICMPv6 ping and tracert requests. Therefore, segment-by-segment tests
can be implemented based on the O-bit. You can run the ping ipv6-sid and
tracert ipv6-sid commands to initiate tests based on one or more SIDs.
▫ The other method is to introduce End.OP SIDs, which instruct data packets
to be sent to the control plane for OAM processing. In the case of an SRv6
Policy test, the headend encodes an End.OP SID into the segment list.
Because only the SRv6 endpoint that has generated an End.OP SID can
process ICMPv6 ping and tracert request packets, E2E tests can be
implemented based on End.OP SIDs.
▪ For SID stack-based tests, specify one or more End.OP SIDs in the
ping ipv6-sid and tracert ipv6-sid commands.
▪ For SRv6 Policy-based tests, specify the end-op parameter in the ping
srv6-te policy and tracert srv6-te policy commands.
SRv6 Ping Implementation
⚫ SRv6 ping can be classified into segment-by-segment ping and non-segment-by-segment
ping.
PE1 P1 PE2 PE1 P1 PE2
FC01::1 FC02::2 FC03::3 FC01::1 FC02::2 FC03::3
DIPv6: FC01::1
SIPv6: FC03::3
Segment-by-segment ICMPv6 Reply Non-segment-by-segment
ping test ping test
61 Huawei Confidential
▫ After receiving the ICMPv6 Request packet, PE2 sends an ICMPv6 Reply
packet to PE1.
62 Huawei Confidential
▫ After receiving the UDP packet, P1 changes the value of the Hop Limit field
to 63, sends an ICMPv6 Port Unreachable message to PE1, and forwards
the UDP packet to PE2.
▫ After receiving the UDP packet, PE2 changes the value of the Hop Limit
field to 62 and sends an ICMPv6 Port Unreachable message to PE1.
• For a non-overlay test:
▫ PE1 initiates a tracert operation to PE2. Specifically, it constructs a UDP
packet carrying the SRv6 SID of P1 and the End SID of PE2, encapsulates an
SRH into the packet, and then forwards the packet. In this case, the value
of the Hop Limit field in the IPv6 header is set to 1 and decrements by 1
each time the packet passes through a device. When the value of the Hop
Limit field is 0, the packet is discarded, and then an ICMPv6 Time Exceeded
message is sent to PE1.
▫ After receiving the UDP packet, P1 changes the value of the Hop Limit field
to 0 and sends an ICMPv6 Time Exceeded message to PE1.
▫ After receiving the ICMPv6 Time Exceeded message from P1, PE1
increments the value of the Hop Limit field by 1 (the value now becomes 2)
and continues to send the UDP packet.
▫ After receiving the UDP packet, P1 changes the value of the Hop Limit field
to 1 and forwards the packet to PE2.
▫ After receiving the UDP packet, PE2 changes the value of the Hop Limit
field to 0, determines that the SID type is End SID, and checks whether the
upper-layer protocol header is a UDP or an ICMPv6 header.
Overview of Tunnel Protection Technologies
⚫ SRv6 tunnel protection can be classified into local protection and E2E protection.
Egress
TI-LFA FRR
Local Protection Midpoint TI-LFA FRR
• Fast switching Microloop avoidance
• Only links and Ingress
nodes protected
E2E protection
Egress
• Detection-dependent HSB
fast switching
• E2E paths protected ECMP
64 Huawei Confidential
Local Protection Technology E2E Protection Technology
TI-LFA FRR
⚫ TI-LFA FRR provides link and node protection for SRv6 tunnels. It enables traffic to be rapidly switched to the
backup path if a link or node failure occurs.
PE1 PE2 ⚫ As shown in the figure, the shortest path from PE1 to PE2 is PE1 -> P1 ->
DIPv6: FC05::5 FC01::1 FC06::6 DIPv6: FC06::6 P4 -> PE2, which is the primary path. P1 needs to compute a TI-LFA backup
SIPv6: FC01::1 SIPv6: FC01::1 path to PE2 through the following operations:
SRH (SL = 1) SRH (SL = 0) 1. Excludes the primary next hop (link P1 -> P4) and computes the post-
FC06::6 FC06::6 convergence shortest path: P1 -> P2 -> P3 -> P4 -> PE2.
FC05::5 FC05::5
2. Computes the P space and Q space, which are (P1, P2) and (P3, P4, PE2),
FC02::2 FC05::5 Payload respectively.
Payload P1 P4
3. Computes the TI-LFA backup path. In this case, any path can be
DIPv6: FC05::5 represented as a multi-segment path (source node <-> P <-> Q <->
SIPv6: FC01::1 destination node). Both the segments from the source node to the P
DIPv6: FC03::C4 node and from the Q node to the destination node are loop-free. The P-
SIPv6: FC01::1 P2 FC03::3 FC04::4 P3 SRH (SL = 1) to-Q path is expressed using a strict explicit path (End.X SID), ensuring
SRH (SL = 0) FC06::6 that the entire TI-LFA strict explicit path is loop-free. To simplify repair
FC03::C4 End.X FC05::5 path computation, P2 (which is farthest from the source node and
P space FC03::C4 Q space Payload resides in the P space), P3 (which is farthest from the destination node
SRH (SL = 1) and resides in the Q space), and a link between the P and Q spaces are
FC06::6 DIPv6: FC05::5
selected.
FC05::5 SIPv6: FC01::1
4. After detecting that the P1-to-PE2 link goes down, P1 uses backup
Payload SRH (SL = 1) forwarding entries and encapsulates a new SRH into the packet, with the
FC06::6 segment list being <FC03::C4, FC06::6>. In addition, the node changes the
FC05::5 IPv6 destination address to FC03::C4 and then forwards the packet to the
Payload backup outbound interface in the B-to-C direction.
65 Huawei Confidential
▫ TI-LFA computes a backup path that meets both the SRLG disjoint and
node protection conditions. If multiple backup paths meet the two
conditions, TI-LFA selects the path with the minimum cost.
▫ If no qualified backup path is available, TI-LFA computes a backup path
that meets both the SRLG disjoint and link protection conditions. If multiple
backup paths meet the two conditions, TI-LFA selects the path with the
minimum cost.
▫ If no qualified backup path is available, TI-LFA computes a backup path
that meets the node protection condition with the minimum cost.
Cost: 10
DIPv6: FC04::C4
SIPv6: FC0::1
SRH (SL = 1) Cost: 10 Cost: 10
FC03::3
FC04::C4
SRH (SL = 1) FC04::4 FC05::5 FC06::6
Cost: 100 Backup path
FC06::6
FC03::3
End.X FC04::C4 Primary path
P3 P4 PE2
Payload
67 Huawei Confidential
Local Protection Technology E2E Protection Technology
Cost: 10
DIPv6: FC03::3
SIPv6: FC01::1
SRH (SL = 1) Cost: 10 Cost: 10
FC06::6
FC03::3
Payload FC04::4 FC05::5 FC06::6
Cost: 100 Backup path
68 Huawei Confidential
Local Protection Technology E2E Protection Technology
69 Huawei Confidential
Local Protection Technology E2E Protection Technology
Microloop Introduction
⚫ TI-LFA FRR and midpoint protection can maintain data forwarding for a short time before IGP convergence is
complete. After IGP convergence, however, data is forwarded through IGP routes instead of FRR (tunnel mode).
⚫ However, the convergence speed of devices on the live network may be different. As a result, a temporary loop,
which is called a microloop, may be generated. The loop disappears only after all routers on the forwarding path
complete convergence. PE1 PE2
DIP: A
SIP: B P1 completes IGP
convergence and
Payload If the primary path does not forward
fails, traffic is traffic based on
DIPv6: C forwarded along P1 P4
FRR.
SIPv6: A the FRR path. P1 considers that the
SRH (SL=1) DIP: PE2 packet destined for PE2
FRR path D should be sent to P2, but
SIP: PE1
C P2 considers that the
After IGP Payload packet destined for PE2
Payload
convergence, data should be sent to P1.
P2 does not
is forwarded Cost: 1000
DIP: A complete IGP P2 P3
along the primary
SIP: B convergence and
path.
forwards data based
Payload on the original
routing table.
70 Huawei Confidential
Local Protection Technology E2E Protection Technology
71 Huawei Confidential
Local Protection Technology E2E Protection Technology
PE1 PE2
forwarding path after the involved node has already completed
FC01::1 FC06::6 convergence for a period of time. This prevents the loop caused by
DIPv6: FC06::6 DIPv6: FC06::6 IGP convergence on the node adjacent to the failed node. The
SIPv6: FC01::1 SIPv6: FC01::1 detailed process is as follows:
Payload Payload
After P1 detects the fault of the link connected to P4, it enters the TI-LFA
FC02::2 FC05::5 process and forwards the packet to PE2 along the TI-LFA backup path.
P1 P4
DIPv6: FC03::C4
The P1 continues to P1 starts a timer. Before the timer expires, the forwarding table retains
SIPv6: FC01::1 DIPv6: FC06::6
forward traffic unchanged, and the TI-LFA backup path continues to be used for packet
SRH (SL = 1) along the TI-LFA SIPv6: FC01::1
FC06::6 backup path before forwarding.
Payload
FC03::C4 the timer expires. When the timer expires, other nodes on the network have completed
Payload FC03::3 FC04::4
convergence. P1 can now perform convergence and then forward the
P2 P3
End.X FC03::C4 packet along the post-convergence path.
DIPv6: FC06::6 ⚫ Because each TI-LFA backup path is loop-free, the packet can be
SIPv6: FC01::1
forwarded along a TI-LFA backup path for a period of time, and
Payload
then the TI-LFA process can exit after the other nodes complete
convergence.
72 Huawei Confidential
Local Protection Technology E2E Protection Technology
P2 completes IGP P2
P2 converges first and computes the P2 -> P1 -> P5 -> PE2 path as the
convergence and new path to PE2. As such, after arriving at P2, the traffic is sent back to
forwards data based
on the post- P1 instead of being forwarded to P3.
convergence routing P3 P4
table. Because P1 has not completed convergence, it still forwards the traffic
along the P1 -> P2 -> P3 -> P4 -> P5 -> PE2 path. As a result, the traffic
is sent back to P2, forming a loop.
73 Huawei Confidential
Local Protection Technology E2E Protection Technology
⚫ As shown in the following figures, the loop-free TI-LFA path P2 -> P1 -> P5 -> PE2 is computed after P2 converges. The loop-free path computed by P3 can
be either a strict explicit one or a loose one. PE1 PE2
PE1 PE2 FC01::1 FC07::7
FC01::1 FC07::7 DIPv6: FC07::7
DIPv6: FC07::7 SIPv6: FC01::1
SIPv6: FC01::1
Payload FC02::2 FC06::6
Payload FC02::2 FC06::6 End.X FC02::C4
End.X FC02::C4 P1 P5
P1 P5
DIPv6: FC03::C4
DIPv6: FC03::C4 SIPv6: FC01::1
FC03::C4
SIPv6: FC01::1
SRH (SL = 1)
End.X
74 Huawei Confidential
Local Protection Technology E2E Protection Technology
75 Huawei Confidential
Local Protection Technology E2E Protection Technology
FC02::C4 FC02::C4
End.X
FC03::C4
Payload
Payload FC03::3 FC04::4 FC03::3 FC04::4
P2 P3 P2 P3
76 Huawei Confidential
Local Protection Technology E2E Protection Technology
SRv6-
incapable
CE1 CE2
Primary path
Backup path
PE2 P2 P4 PE4
77 Huawei Confidential
Local Protection Technology E2E Protection Technology
CE1 CE2
ECMP path
PE2 P2 P4 PE4
78 Huawei Confidential
Local Protection Technology E2E Protection Technology
BGP 100
ipv6-family vpn-instance vpn1
segment-routing ipv6 traffic-engineer best-effort
PE1 P1 P3 PE3
The primary
path fails. The backup
CE1 CE2
path fails.
Primary path
PE2 P2 P4 Traffic is carried PE4
Backup path
over SRv6 BE.
Best-effort path
79 Huawei Confidential
Contents
1. SRv6 Overview
2. SRv6 Fundamentals
⚫ If a fault occurs on the endpoint, it is mainly rectified through VPN FRR. In addition, it can also be rectified through anycast FRR or
mirror protection.
A fault on a transit link or node
can be rectified through both local A fault on the endpoint
protection and E2E protection. cannot be rectified
through local protection
PE1 P1 P3 PE3 or E2E protection.
Local
CE1 protection path CE2
Primary path
81 Huawei Confidential
• Anycast FRR and mirror protection technologies are complex and therefore rarely
used on live networks.
VPN FRR
⚫ VPN FRR helps rectify endpoint faults by directly forming VPN backup routes. It is implemented as follows:
The source PE pre-computes primary and backup routes based on the two learned VPN routes with different next-hop PEs and
then delivers the computed routes to the FIB table. In addition, after detecting a remote PE fault through BFD, the source PE
switches VPN traffic to the backup path before VPN route convergence.
BGP Route
Prefix NHP
PE1's BGP Route Net2 PE2
Prefix NHP
Net2 PE2
Backup PE3
P1 PE2
PE1 Net2
CE1 CE2
P2 PE3
82 Huawei Confidential
Anycast FRR
⚫ Anycast FRR implements SRv6 egress protection by deploying the same locator and VPN SID on the PEs
to which a CE is dual-homed. P1 where TI-LFA is
DIPv6: FC05::100 deployed pre-
SIPv6: FC01::1 computes a backup
path to FC05:: /96.
Payload PE3
PE1 P1 FC05:: /96
FC01:: /96
CE1 CE2
Payload: Payload:
CE1 -> CE2 CE1 -> CE2
End.X
PE2 P2 FC04::C4 FC05:: /96
DIPv6: FC04::C4 PE4
SIPv6: FC01::1
SRH (SL = 1) Primary path
FC05::100
FC04::C4 Local protection path
Payload
83 Huawei Confidential
• Anycast FRR can be used in both egress protection and local protection scenarios.
• Although anycast FRR can provide protection against PE failures, it has the
following drawbacks:
▫ VPN SIDs must be manually configured to ensure that the two PEs
configured with the same VPN instance have the same VPN SID.
▫ Only IGP route selection (not VPN route selection) can be performed. For
example, if VPN services need to be load-balanced between PE3 and PE4 or
the route advertised by PE3 needs to be preferentially selected, VPN route
selection cannot be performed if the route advertised by PE4 is
preferentially selected through an IGP on the path to FC05::.
▫ If there is a PE-CE link interface failure, such as a failure on the link
between PE3 and CE2, traffic is still forwarded to PE3 and then to PE4,
resulting in a traffic loop that cannot be eliminated.
SRv6 Access Protection
⚫ When a CE is dual-homed to PEs, if the link between the CE and endpoint PE fails, traffic may be lost. In this case,
mixed FRR can be used to resolve this problem.
PE2's BGP Route
Prefix NHP Out-Int
Net2 CE2 PE2 -> CE2 link interface
When the path from PE2
Backup PE3 SRv6 Tunnel
to CE2 fails, the
forwarding path becomes
PE2 -> PE3 -> CE2.
P1 PE2
PE3
CE1 PE1 advertises a Net2
VPN route to
PE2. CE2
P2 PE3 CE2 advertises Primary path
common routes to
PE2 and PE3. Backup path
⚫ PE2 receives a VPN route from CE2 and another VPN route from PE3, forming FRR protection. When the link
between PE2 and CE2 fails, PE2 detects the fault and steers all relevant traffic to the backup path to PE3. In this
case, the next hop of the primary path is an access interface and the backup path is an SRv6 tunnel, forming mixed
FRR protection.
84 Huawei Confidential
Contents
1. SRv6 Overview
2. SRv6 Fundamentals
85 Huawei Confidential
L3VPNv4 over SRv6 BE (1)
AS 100
Loopback0 Loopback0 Loopback0
2001:DB8:1::1/128 2001:DB8:2::2/128 2001:DB8:3::3/128
PE1 P PE2 Configuration roadmap:
:1 2001:DB88:12::/96 :2 :2 2001:DB88:23::/96 :3
1. Configure interface IPv6 addresses and IS-IS. (Configuration
10.0.14.0/24 10.0.35.0/24 details are not provided.)
Loopback1 Loopback1 2. Establish an MP-BGP peer relationship between PE1 and PE2.
10.1.4.4/32 10.1.5.5/32 3. Enable SR and establish an SRv6 BE path on the backbone
CE1 AS 65000 AS 65001 CE2
network.
Networking requirements: 4. Enable the VPN instance IPv4 address family on each PE.
5. Establish an MP-IBGP peer relationship between the PEs for
1. Connect PE1 and PE2 to different CEs that belong to VPN
them to exchange routing information.
instance vpna.
6. Verify the configuration.
2. Deploy L3VPN service recursion to SRv6 BE paths on the
backbone network to enable CE1 and CE2 to communicate
through Loopback1.
86 Huawei Confidential
AS 100
Loopback0 Loopback0 Loopback0 Establish an MP-IBGP peer relationship between the PEs.
2001:DB8:1::1/128 2001:DB8:2::2/128 2001:DB8:3::3/128 The configuration on PE1 is used as an example.
PE1 P PE2 [~PE1] bgp 100
:1 2001:DB88:12::/96 :2 :2 2001:DB88:23::/96 :3 [~PE1-bgp] peer 2001:DB8:3::3 as-number 100
[*PE1-bgp] peer 2001:DB8:3::3 connect-interface loopback 0
10.0.14.0/24 10.0.35.0/24 [*PE1-bgp] ipv4-family vpnv4
[*PE1-bgp-af-vpnv4] peer 2001:DB8:3::3 enable
Loopback1 Loopback1 [*PE1-bgp-af-vpnv4] commit
10.1.4.4/32 10.1.5.5/32 [~PE1-bgp-af-vpnv4] quit
[~PE1-bgp] quit
CE1 AS 65000 AS 65001 CE2
Check the VPNv4 peer relationship on PE1.
Configuration roadmap:
1. Configure interface IPv6 addresses and IS-IS. (Configuration <PE1>display bgp vpnv4 all peer
details are not provided.)
BGP local router ID : 10.0.1.1
2. Establish an MP-BGP peer relationship between PE1 and PE2. Local AS number : 100
3. Enable SR and establish an SRv6 BE path on the backbone Total number of peers : 1 Peers in established state : 1
network.
4. Enable the VPN instance IPv4 address family on each PE. Peer V AS MsgRcvd MsgSent Up/Down State
5. Establish an MP-IBGP peer relationship between the PEs for 2001:DB8:3::3 4 100 3 4 00:00:04 Established
them to exchange routing information.
6. Verify the configuration.
87 Huawei Confidential
L3VPNv4 over SRv6 BE (3)
AS 100
Loopback0 Loopback0 Loopback0 Establish an SRv6 BE path between the PEs. PE1 configurations are
2001:DB8:1::1/128 2001:DB8:2::2/128 2001:DB8:3::3/128 as follows: (PE2 configurations are not provided here, and the P
does not require such configurations.)
PE1 P PE2
:1 2001:DB88:12::/96 :2 :2 2001:DB88:23::/96 :3 [~PE1] segment-routing ipv6
[*PE1-segment-routing-ipv6] encapsulation source-address
2001:DB8:1::1
10.0.14.0/24 10.0.35.0/24 [*PE1-segment-routing-ipv6] locator as100 ipv6-prefix 2001:DB8:100::
Loopback1 Loopback1 64 static 32
10.1.4.4/32 10.1.5.5/32 [*PE1-segment-routing-ipv6-locator] quit
[*PE1-segment-routing-ipv6] quit
CE1 AS 65000 AS 65001 CE2 [*PE1] bgp 100
Configuration roadmap: [*PE1-bgp] ipv4-family vpnv4
[*PE1-bgp-af-vpnv4] peer 2001:DB8:3::3 prefix-sid
1. Configure interface IPv6 addresses and IS-IS. (Configuration
[*PE1-bgp-af-vpnv4] quit
details are not provided.) [~PE1-bgp] quit
2. Establish an MP-BGP peer relationship between PE1 and PE2. [~PE1] isis 1
3. Enable SR and establish an SRv6 BE path on the backbone [~PE1-isis-1] segment-routing ipv6 locator as100
network. [*PE1-isis-1] commit
4. Enable the VPN instance IPv4 address family on each PE. [~PE1-isis-1] quit
5. Establish an MP-IBGP peer relationship between the PEs for
them to exchange routing information.
6. Verify the configuration.
88 Huawei Confidential
AS 100
Loopback0 Loopback0 Loopback0 Enable the VPN instance IPv4 address family on each PE.
2001:DB8:1::1/128 2001:DB8:2::2/128 2001:DB8:3::3/128 PE1 configurations are as follows: (PE2 configurations
are not provided.)
PE1 P PE2
:1 2001:DB88:12::/96 :2 :2 2001:DB88:23::/96 :3 [~PE1] ip vpn-instance vpna
[*PE1-vpn-instance-vpna] ipv4-family
10.0.14.0/24 10.0.35.0/24 [*PE1-vpn-instance-vpna-af-ipv4] route-distinguisher 100:1
[*PE1-vpn-instance-vpna-af-ipv4] vpn-target 111:1 both
Loopback1 Loopback1 [*PE1-vpn-instance-vpna-af-ipv4] quit
10.1.4.4/32 10.1.5.5/32 [*PE1-vpn-instance-vpna] quit
[~PE1] bgp 100
CE1 AS 65000 AS 65001 CE2
[*PE1-bgp] ipv4-family vpn-instance vpna
[*PE1-bgp-vpna] peer 10.0.14.4 as-number 65000
Configuration roadmap: [*PE1-bgp-vpna] segment-routing ipv6 best-effort
1. Configure interface IPv6 addresses and IS-IS. (Configuration [*PE1-bgp-vpna] segment-routing ipv6 locator as100
details are not provided.) [*PE1-bgp-vpna] commit
2. Establish an MP-BGP peer relationship between PE1 and PE2. [~PE1-bgp-vpna] quit
[~PE1-bgp] quit
3. Enable SR and establish an SRv6 BE path on the backbone
network.
4. Enable the VPN instance IPv4 address family on each PE.
5. Establish an MP-IBGP peer relationship between the PEs for
them to exchange routing information.
6. Verify the configuration.
90 Huawei Confidential
• Configure VPN routes to recurse to SRv6 BE paths based on the carried SIDs.
AS 100
Loopback0 Loopback0 Loopback0 Check the local SID table containing all types of SRv6 SIDs on PE2.
2001:DB8:1::1/128 2001:DB8:2::2/128 2001:DB8:3::3/128 <PE2>display segment-routing ipv6 local-sid forwarding
PE1 P PE2
My Local-SID Forwarding Table
:1 2001:DB88:12::/96 :2 :2 2001:DB88:23::/96 :3 -------------------------------------
SID : 2001:DB8:300::1:0:0/128 FuncType : End
10.0.14.0/24 10.0.35.0/24 LocatorName: as100 LocatorID: 2
91 Huawei Confidential
L3VPNv4 over SRv6 BE (6)
AS 100
Loopback0 Loopback0 Loopback0 Check VPNv4 routing information on PE1.
2001:DB8:1::1/128 2001:DB8:2::2/128 2001:DB8:3::3/128 <PE1>display bgp vpnv4 al routing-table 10.1.5.5
PE1 P PE2 BGP local router ID : 10.0.1.1
Local AS number : 100
:1 2001:DB88:12::/96 :2 :2 2001:DB88:23::/96 :3 Total routes of Route Distinguisher(100:1): 1
BGP routing table entry information of 10.1.5.5/32:
10.0.14.0/24 10.0.35.0/24 Label information (Received/Applied): 3/NULL
From: 2001:DB8:3::3 (10.0.3.3)
Loopback1 Loopback1 Route Duration: 0d00h15m54s
10.1.4.4/32 10.1.5.5/32 Relay IP Nexthop: FE80::DE99:14FF:FE7A:C301
CE1 AS 65000 AS 65001 CE2 Relay IP Out-Interface: GigabitEthernet0/3/0.12
Relay Tunnel Out-Interface:
Original nexthop: 2001:DB8:3::3
Configuration roadmap: Qos information : 0x0
1. Configure interface IPv6 addresses and IS-IS. (Configuration Ext-Community: RT <111 : 1>
details are not provided.) Prefix-sid: 2001:DB8:300::1:0:20
2. Establish an MP-BGP peer relationship between PE1 and PE2. AS-path Nil, origin incomplete, MED 0, localpref 100, pref-val 0, valid,
3. Enable SR and establish an SRv6 BE path on the backbone internal, best, select, pre 255, IGP cost 20
network. Not advertised to any peer yet
4. Enable the VPN instance IPv4 address family on each PE.
5. Establish an MP-IBGP peer relationship between the PEs for IPv6 address of the peer; SID corresponding to 10.1.5.5
them to exchange routing information. (the same as that locally allocated on PE2)
6. Verify the configuration.
92 Huawei Confidential
L3VPNv4 over SRv6 BE (7)
AS 100
Loopback0 Loopback0 Loopback0 Check vpna's routing information on PE1.
2001:DB8:1::1/128 2001:DB8:2::2/128 2001:DB8:3::3/128 <PE1> display ip routing-table vpn-instance vpna 10.1.5.5 verbose
PE1 P PE2 Route Flags: R - relay, D - download to fib, T - to vpn-instance, B -
black hole route
:1 2001:DB88:12::/96 :2 :2 2001:DB88:23::/96 :3 ------------------------------------------------------------------------------
Routing Table : vpna
10.0.14.0/24 10.0.35.0/24 Summary Count : 1
93 Huawei Confidential
L3VPNv4 over SRv6 BE (8)
AS 100
Loopback0 Loopback0 Loopback0
2001:DB8:1::1/128 2001:DB8:2::2/128 2001:DB8:3::3/128 Verify the configuration on CE1.
<CE1>ping -a 10.1.4.4 10.1.5.5
PE1 P PE2
PING 10.1.5.5: 56 data bytes, press CTRL_C to break
:1 2001:DB88:12::/96 :2 :2 2001:DB88:23::/96 :3 Reply from 10.1.5.5: bytes=56 Sequence=1 ttl=254 time=1 ms
Reply from 10.1.5.5: bytes=56 Sequence=2 ttl=254 time=1 ms
10.0.14.0/24 10.0.35.0/24 Reply from 10.1.5.5: bytes=56 Sequence=3 ttl=254 time=1 ms
Reply from 10.1.5.5: bytes=56 Sequence=4 ttl=254 time=1 ms
Loopback1 Loopback1 Reply from 10.1.5.5: bytes=56 Sequence=5 ttl=254 time=1 ms
10.1.4.4/32 10.1.5.5/32
CE1 AS 65000 AS 65001 CE2
Configuration roadmap:
1. Configure interface IPv6 addresses and IS-IS. (Configuration
details are not provided.)
2. Establish an MP-BGP peer relationship between PE1 and PE2.
3. Enable SR and establish an SRv6 BE path on the backbone
network.
4. Enable the VPN instance IPv4 address family on each PE.
5. Establish an MP-IBGP peer relationship between the PEs for
them to exchange routing information.
6. Verify the configuration.
94 Huawei Confidential
Contents
1. SRv6 Overview
2. SRv6 Fundamentals
95 Huawei Confidential
L3VPNv4 over SRv6 Policy (1)
AS 100
Loopback0 Loopback0 Loopback0
2001:DB8:1::1/128 2001:DB8:2::2/128 2001:DB8:3::3/128 Configuration roadmap:
PE1 P PE2
1. Configure interface IPv6 addresses and IS-IS.
:1 2001:DB88:12::/96 :2 :2 2001:DB88:23::/96 :3
(Configuration details are not provided.)
10.0.14.0/24 10.0.35.0/24 2. Establish an MP-BGP peer relationship between PE1
Loopback1 Loopback1 and PE2.
10.1.4.4/32 10.1.5.5/32
3. Enable SR and establish an SRv6 Policy on the
CE1 AS 65000 AS 65001 CE2
backbone network.
Networking requirements: 4. Enable the VPN instance IPv4 address family on each
1. Connect PE1 and PE2 to different CEs that belong to VPN PE and establish an MP-IBGP peer relationship between
96 Huawei Confidential
L3VPNv4 over SRv6 Policy (2)
AS 100
End End End Establish an MP-IBGP peer relationship between the PEs.
2001:DB8:1000::111 2001:DB8:2000::222 2001:DB8:3000::333 [~PE1] bgp 100
PE1 P PE2 [~PE1-bgp] peer 2001:DB8:3::3 as-number 100
[*PE1-bgp] peer 2001:DB8:3::3 connect-interface loopback 0
:1 2001:DB88:12::/96 :2 :2 2001:DB88:23::/96 :3 [*PE1-bgp] ipv4-family vpnv4
[*PE1-bgp-af-vpnv4] peer 2001:DB8:3::3 enable
10.0.14.0/24 10.0.35.0/24 [*PE1-bgp-af-vpnv4] commit
[~PE1-bgp-af-vpnv4] quit
Loopback1 Loopback1 [~PE1-bgp] quit
10.1.4.4/32 10.1.5.5/32
CE1 AS 65000 AS 65001 CE2 Check the VPNv4 peer relationship on PE1.
Configuration roadmap: <PE1>display bgp vpnv4 all peer
1. Configure interface IPv6 addresses and IS-IS. (Configuration
BGP local router ID : 10.0.1.1
details are not provided.) Local AS number : 100
2. Establish an MP-BGP peer relationship between PE1 and PE2. Total number of peers : 1 Peers in established state : 1
3. Enable SR and establish an SRv6 Policy on the backbone
network. Peer V AS MsgRcvd MsgSent Up/Down State
4. Enable the VPN instance IPv4 address family on each PE and 2001:DB8:3::3 4 100 3 4 00:00:04 Established
establish an MP-IBGP peer relationship between the PEs for
them to exchange routing information.
5. Configure a tunnel policy and import VPN traffic.
6. Verify the configuration.
97 Huawei Confidential
• The SIDs of PE1, the P, and PE2 are 2001:DB8:1000::111, 2001:DB8:2000::222, and
2001:DB8:3000::333, respectively.
• In this experiment, the SRv6 Policy is established based on specified End SIDs.
L3VPNv4 over SRv6 Policy (3)
AS 100
End End End Configure an SRv6 SID. PE1 configurations are as follows:
2001:DB8:1000::111 2001:DB8:2000::222 2001:DB8:3000::333 (P and PE2 configurations are not provided.)
PE1 P PE2 [~PE1] segment-routing ipv6
:1 2001:DB88:12::/96 :2 :2 2001:DB88:23::/96 :3 [*PE1-segment-routing-ipv6] encapsulation source-address
2001:DB8:1::1
[*PE1-segment-routing-ipv6] locator as1000 ipv6-prefix
10.0.14.0/24 10.0.35.0/24 2001:DB8:1000:: 64 static 32
[*PE1-segment-routing-ipv6-locator] opcode ::111 end
Loopback1 Loopback1
[*PE1-segment-routing-ipv6-locator] quit
10.1.4.4/32 10.1.5.5/32 [*PE1-segment-routing-ipv6] quit
CE1 AS 65000 AS 65001 CE2 [*PE1] bgp 100
[*PE1-bgp] ipv4-family vpnv4
Configuration roadmap: [*PE1-bgp-af-vpnv4] peer 2001:DB8:3::3 prefix-sid
1. Configure interface IPv6 addresses and IS-IS. (Configuration [*PE1-bgp-af-vpnv4] quit
details are not provided.) [~PE1-bgp] quit
2. Establish an MP-BGP peer relationship between PE1 and PE2. [~PE1] isis 1
3. Enable SR and establish an SRv6 Policy on the backbone [~PE1-isis-1] segment-routing ipv6 locator as1000 auto-sid-disable
[*PE1-isis-1] commit
network. [~PE1-isis-1] quit
4. Enable the VPN instance IPv4 address family on each PE and
establish an MP-IBGP peer relationship between the PEs for
Manually configure an SRv6 End SID.
them to exchange routing information.
5. Configure a tunnel policy and import VPN traffic.
6. Verify the configuration.
98 Huawei Confidential
• SRv6 paths are established using SIDs. Static SRv6 SIDs are recommended. The
configuration procedure is as follows:
1. Run the locator locator-name [ ipv6-prefix ipv6-address prefix-length [
static static-length | args args-length ] * ] command to configure an SRv6
locator.
2. Run the opcode func-opcode end command to configure a static End SID
opcode.
99 Huawei Confidential
2. Run the segment-routing ipv6 command to enable SRv6 and enter the
SRv6 view.
3. Run the segment-list list-name command to configure a segment list (an
explicit path) for an SRv6 Policy candidate path and enter the segment list
view.
4. Run the index index sid ipv6 ipv6address command to specify a next-hop
SID for the segment list.
▪ You can run the command multiple times. The system generates a SID
stack for the segment list by index index in ascending order. If a
candidate path in the SRv6 Policy is preferentially selected, traffic is
forwarded using the segment lists of the candidate path. A maximum
of 10 SIDs can be configured for each segment list.
5. Run the commit command to commit the configuration.
• Configure an SRv6 Policy.
1. Run the system-view command to enter the system view.
2. Run the segment-routing ipv6 command to enable SRv6 and enter the
SRv6 view.
3. Run the srv6-te-policy locator locator-name command to associate a
locator with the SRv6 Policy to be created. This configuration allows you to
specify a binding SID for the SRv6 Policy in the locator range.
▪ The segment list must have been created using the segment-list
(SRv6 view) command.
AS 100 Enable the VPN instance IPv4 address family on each PE.
End End End
2001:DB8:1000::111 2001:DB8:2000::222 2001:DB8:3000::333 PE1 configurations are as follows: (PE2 configurations are
not provided.)
PE1 P PE2
:1 2001:DB88:12::/96 :2 :2 2001:DB88:23::/96 :3 [~PE1] ip vpn-instance vpna
[*PE1-vpn-instance-vpna] ipv4-family
10.0.14.0/24 10.0.35.0/24 [*PE1-vpn-instance-vpna-af-ipv4] route-distinguisher 100:1
[*PE1-vpn-instance-vpna-af-ipv4] vpn-target 111:1 both
Loopback1 Loopback1 [*PE1-vpn-instance-vpna-af-ipv4] quit
10.1.4.4/32 10.1.5.5/32 [*PE1-vpn-instance-vpna] quit
CE1 AS 65000 AS 65001 CE2 [*PE1-bgp] ipv4-family vpn-instance vpna
[*PE1-bgp-vpna] segment-routing ipv6 traffic-engineer best-effort
Configuration roadmap: [*PE1-bgp-vpna] segment-routing ipv6 locator as1000
1. Configure interface IPv6 addresses and IS-IS. (Configuration [*PE1-bgp-vpna] commit
details are not provided.) [~PE1-bgp-vpna] quit
[~PE1-bgp] quit
2. Establish an MP-BGP peer relationship between PE1 and PE2.
3. Enable SR and establish an SRv6 Policy on the backbone
network.
4. Enable the VPN instance IPv4 address family on each PE
and establish an MP-IBGP peer relationship between the
PEs for them to exchange routing information.
5. Configure a tunnel policy and import VPN traffic.
6. Verify the configuration.
AS 100
End End End Configure a tunnel policy and import VPN traffic. PE1
2001:DB8:1000::111 2001:DB8:2000::222 2001:DB8:3000::333 configurations are as follows: (PE2 configurations are
not provided.)
PE1 P PE2
:1 2001:DB88:12::/96 :2 :2 2001:DB88:23::/96 :3
[~PE1] route-policy p1 permit node 10
10.0.14.0/24 10.0.35.0/24 [*PE1-route-policy] apply extcommunity color 0:101
[*PE1-route-policy] quit
Loopback1 Loopback1 [*PE1] bgp 100
10.1.4.4/32 10.1.5.5/32 [*PE1-bgp] ipv4-family vpnv4
CE1 AS 65000 AS 65001 CE2 [*PE1-bgp-af-vpnv4] peer 2001:DB8:3::3 route-policy p1 import
[*PE1-bgp-af-vpnv4] quit
Configuration roadmap: [*PE1-bgp] quit
1. Configure interface IPv6 addresses and IS-IS. (Configuration [*PE1] tunnel-policy p1
details are not provided.) [*PE1-tunnel-policy-p1] tunnel select-seq ipv6 srv6-te-policy load-
2. Establish an MP-BGP peer relationship between PE1 and PE2. balance-number 1
3. Enable SR and establish an SRv6 Policy on the backbone [*PE1-tunnel-policy-p1] quit
[*PE1] ip vpn-instance vpna
network. [*PE1-vpn-instance-vpna] ipv4-family
4. Enable the VPN instance IPv4 address family on each PE and [*PE1-vpn-instance-vpna-af-ipv4] tnl-policy p1
establish an MP-IBGP peer relationship between the PEs for [*PE1-vpn-instance-vpna-af-ipv4] commit
them to exchange routing information. [~PE1-vpn-instance-vpna-af-ipv4] quit
5. Configure a tunnel policy and import VPN traffic. [~PE1-vpn-instance-vpna] quit
6. Verify the configuration.
AS 100
End End End Check SRv6 Policy information on PE1.
2001:DB8:1000::111 2001:DB8:2000::222 2001:DB8:3000::333 <PE1>display srv6-te policy
PE1 P PE2 PolicyName : policy1
Color : 101 Endpoint : 2001:DB8:3::3
:1 2001:DB88:12::/96 :2 :2 2001:DB88:23::/96 :3 TunnelId :1 Binding SID : 2001:DB8:1000::100
TunnelType : SRv6-TE Policy DelayTimerRemain :
10.0.14.0/24 10.0.35.0/24 Policy State : Up
Admin State : UP Traffic Statistics : Disable
Loopback1 Loopback1 Candidate-path Count : 1
10.1.4.4/32 10.1.5.5/32 Candidate-path Preference : 100
CE1 AS 65000 AS 65001 CE2 Path State : Active Path Type : Primary
Protocol-Origin : Configuration(30) Originator : 0, 0.0.0.0
Configuration roadmap: Discriminator : 100 Binding SID : 2001:DB8:1000::100
1. Configure interface IPv6 addresses and IS-IS. (Configuration GroupId :1 Policy Name : policy1
details are not provided.) DelayTimerRemain :- Segment-List Count : 1
2. Establish an MP-BGP peer relationship between PE1 and PE2. Segment-List : list1
Segment-List ID :1 XcIndex :1
3. Enable SR and establish an SRv6 Policy on the backbone List State : Up DelayTimerRemain : -
network. Weight :1 BFD State :-
4. Enable the VPN instance IPv4 address family on each PE and SID :
establish an MP-IBGP peer relationship between the PEs for 2001:DB8:2000::222
them to exchange routing information. 2001:DB8:3000::333
5. Configure a tunnel policy and import VPN traffic.
6. Verify the configuration. Color of the specified SRv6 Policy
AS 100
End End End Check VPNv4 routing information on PE1.
2001:DB8:1000::111 2001:DB8:2000::222 2001:DB8:3000::333 <PE1> display bgp vpnv4 all routing-table 10.1.5.5
PE1 P PE2 BGP local router ID : 10.0.1.1
Local AS number : 100
:1 2001:DB88:12::/96 :2 :2 2001:DB88:23::/96 :3 Total routes of Route Distinguisher(100:1): 1
BGP routing table entry information of 10.1.5.5/32:
10.0.14.0/24 10.0.35.0/24 Label information (Received/Applied): 3/NULL
From: 2001:DB8:3::3 (10.0.13.3)
Loopback1 Loopback1 Route Duration: 0d00h03m30s
10.1.4.4/32 10.1.5.5/32 Relay IP Nexthop: FE80::DE99:14FF:FE7A:C301
CE1 AS 65000 AS 65001 CE2 Relay IP Out-Interface: GigabitEthernet0/3/0.12
Relay Tunnel Out-Interface:
Configuration roadmap: Original nexthop: 2001:DB8:3::3
1. Configure interface IPv6 addresses and IS-IS. (Configuration Qos information : 0x0
details are not provided.) Ext-Community: RT <111 : 1>, Color <0 : 101>
Prefix-sid: 2001:DB8:3000::1:0:1E
2. Establish an MP-BGP peer relationship between PE1 and PE2.
AS-path 65000, origin incomplete, MED 0, localpref 100, pref-val 0,
3. Enable SR and establish an SRv6 Policy on the backbone network. valid, internal, best, select, pre 255, IGP cost 20
4. Enable the VPN instance IPv4 address family on each PE and Not advertised to any peer yet
establish an MP-IBGP peer relationship between the PEs for them
to exchange routing information.
5. Configure a tunnel policy and import VPN traffic. The route recurses to the
6. Verify the configuration. corresponding SRv6 Policy based on
the color attribute.
1. SRv6 Overview
2. SRv6 Fundamentals
R2
R1 R4 R3
• IGP: generates network topology information, such as bandwidth, delay, and SID
information, on a router.
• BGP-LS: collects topology information and reports collected information to the
controller. If an RR exists on the network, you only need to deploy BGP-LS on the
RR and establish a BGP-LS peer relationship between the RR and controller.
• BGP IPv6 SR Policy: Such a peer relationship is established between the controller
and forwarder, so that the controller can deliver an SRv6 Policy to the forwarder
through the peer relationship to direct traffic forwarding. To reduce the number
of peer relationships, you can deploy an RR and configure PEs and the controller
to function as RR clients.
• NETCONF: delivers service configurations from the controller to forwarders. This
document does not describe service delivery or NETCONF-related configuration.
SRv6 Policy Advertisement Process
⚫ To facilitate configuration, the controller provides
3 Automatic path
the following functions: planning by the
controller 2
Requirement
Directly creates a bidirectional tunnel between the input
ingress and egress. In other words, a tunnel from
4 Network
the egress to the ingress is automatically created Forwarding Network
1 administrator
path
BGP-LS
topology
when a tunnel from the ingress to the egress is deployment reporting
created. PE1 RR PE3
• The process of planning and deploying forwarding paths through iMaster NCE-IP
is as follows:
▫ Devices use BGP-LS to report network topology information to the
controller, which then generates forwarding paths based on requirements.
▫ The controller delivers the computed paths to the devices through BGP IPv6
SR Policy.
R2
⚫
Basic IGP configurations are as follows:
Global IS-IS configurations
[P1]isis 1
[P1-isis-1] is-level level-2
[P1-isis-1] cost-style wide //TE information (such as bandwidth information) required in TE scenarios cannot be carried in narrow mode. Therefore, the wide
type needs to be set.
[P1-isis-1] network-entity 49.0001.0010.0000.0005.00
[P1-isis-1] is-name P1
[P1-isis-1] ipv6 enable topology ipv6
[P1-isis-1] ipv6 bgp-ls enable level-2 //The device is enabled to send topology information collected by IS-IS to the controller through BGP-LS. This function
only needs to be configured on the RR. That is, only one device in the IGP domain needs to send topology information to the controller through BGP-LS.
[P1-isis-1] ipv6 advertise link attributes //The device is enabled to carry link attribute-related TLVs in LSPs. TLV informationincludes the IPv6 addresses and
indexes of interfaces.
[P1-isis-1] ipv6 metric-delay advertisement enable level-1-2 //The device is enabled to advertise IPv6 delay information. Intra-domain IPv4 link delay
information is collected and flooded through IS-IS and then reported to the controller through BGP-LS. Based on the delay information, the controller
computes the optimal path on the P2P network.
[P1-isis-1] ipv6 traffic-eng level-2 //IS-IS TE is enabled so that link bandwidth information is reported to the TE module.
Interface-specific IS-IS configurations
[P1]interface GigabitEthernet0/3/0
[P1-GigabitEthernet0/3/0] isis ipv6 enable 1
[P1-GigabitEthernet0/3/0] isis circuit-type p2p //The IS-IS interface's network type must be set to P2P. Otherwise, the required network topology cannot be
formed on the controller.
⚫
BGP-LS deployment solutions:
iMaster NCE-IP
iMaster NCE-IP
BGP-LS
PE1 RR PE2
PE1 P1 PE2
CE1 CE2
CE1 CE2 ⚫ Solution 2: Establish BGP-LS peer relationships between iMaster
⚫ Solution 1: Establish BGP-LS peer relationships between NCE-IP and RRs and between the RRs and other devices.
iMaster NCE-IP and all PEs and between iMaster NCE-IP ⚫
Solution 2 is recommended to reduce the number of BGP peers
and all Ps. maintained by iMaster NCE-IP.
BGP-LS
2000::102 FC01::5
• BGP-LS peer relationships can be established using IPv4 or IPv6 addresses. This
course uses IPv6 addresses to establish such relationships.
SRv6 Policy Path Computation and Deployment
⚫ With the SRv6 Policy path computation algorithm, the controller can provide the following path computation results if specified
constraints are met:
Minimum cost: path with the minimum cost among all qualified paths
Minimum delay: path with the minimum delay among all qualified paths
Bandwidth balancing: path with the most remaining bandwidth among all qualified paths that have the same cost
⚫
During SRv6 Policy creation, you need to specify a color value for each SRv6 Policy.
• Optional constraints:
▫ Delay limit constraint: ensures that the path delay of a service does not
exceed the configured delay limit.
▫ Hop limit constraint: ensures that the number of links that a service
traverses does not exceed the configured hop limit.
▫ Affinity constraint: determines which types of links are allowed and which
types of links are not allowed for services.
BGP IPv6 SR Policy Deployment
⚫ BGP IPv6 SR Policy is mainly used to deliver SRv6 tunnel information. As such, iMaster NCE-IP needs to establish a
BGP IPv6 SR Policy peer relationship with the ingress of the involved tunnel.
⚫ BGP IPv6 SR Policy deployment solutions:
iMaster NCE-IP
iMaster NCE-IP
CE1 CE2
CE1 CE2
⚫
Solution 2: Establish BGP IPv6 SR Policy peer relationships
⚫ Solution 1: Establish BGP IPv6 SR Policy peer between iMaster NCE-IP and RRs and between the RRs
relationships between iMaster NCE-IP and all PEs. and other devices.
⚫ Solution 2 is recommended to reduce the number of BGP
peers maintained by iMaster NCE-IP.
BGP IPv6
2000::102 FC01::5
SR Policy
• BGP IPv6 SR Policy peer relationships can be established using IPv4 or IPv6
addresses. This course uses IPv6 addresses to establish such relationships.
VPN Service Forwarding over SRv6 Policies
⚫ The following types of VPNs are available in enterprise network scenarios:
L2VPN: Customer IP addresses are on the same network segment.
L2VPN L3VPN EVPN
L3VPN: Customer IP addresses are on different network segments.
EVPN: Customer IP addresses are either on the same network segment (L2VPN
Tunnel policy-based tunnel
scenario) or on different network segments (L3VPN scenario).
type selection
⚫ A tunnel policy is used by an application module to select tunnels for
services. There are two types of tunnel policies:
SRv6 Policy SRv6 Policy Group
(Preferred mode) Tunnel type prioritizing policy: recurses services to a tunnel
based on the tunnel type priority and the number of tunnels participating in load
balancing. A forwarding path is selected
among tunnels of the same type in
Tunnel binding policy: binds a destination address to a tunnel, so that the traffic of
either of the following modes:
VPN services referencing the policy and destined for this address will be
transmitted over the tunnel.
⚫ VPN services first select tunnels in the up state based on the tunnel policy, Color DSCP
and then select a forwarding path from qualified tunnels.
1. (Short-answer question) An SRv6 SID has 128 bits. What are the three fields of
an SRv6 SID?
2. (Short-answer question) In SIDs corresponding to SRv6 endpoint behaviors, which
types of SIDs are similar to the node segments and adjacency segments in SR-
MPLS?
1. An SRv6 SID has 128 bits and consists of the Locator, Function, and Arguments
fields.
2. End SIDs and End.X SIDs.
Summary
⚫ This course describes the concept of SRv6 network programming, SRv6 instruction sets (endpoint node
behaviors, source node behaviors, and flavors), SRv6 Policy, and basic SRv6 SID configurations on
Huawei NetEngine series routers.
⚫ Leveraging the programmability of 128-bit IPv6 addresses, SRv6 enriches the network functions
expressed by SRv6 instructions. For example, in addition to identifying an instruction that can indicate a
forwarding path, a network function can identify a VAS (e.g. firewall, application acceleration gateway,
user gateway). To deploy a new network function, you only need to define a new instruction, without
the need to change the protocol mechanism or deployment.
⚫ SRv6 Policy information is carried by extending new NLRIs based on MP-BGP. The controller establishes
BGP IPv6 SR Policy peer relationships with forwarders to deliver SRv6 Policies to them.
1 Huawei Confidential
2 Huawei Confidential
Contents
3 Huawei Confidential
Enterprise Bearer WAN Overview
⚫
Bearer WANs can be classified into IP bearer networks and transmission bearer networks by network layer. For most enterprises,
transmission bearer networks cannot be built by themselves (optical fiber layout requires qualification certificates). Therefore, they
usually lease transmission lines from carriers. An enterprise can build its own IP bearer network over the transmission bearer
network.
⚫
The IP bearer network built by an enterprise is called the enterprise bearer WAN, which is also called the enterprise backbone
network or enterprise core network.
⚫
The enterprise bearer WAN carries the enterprise's internal cross-region interconnection services, such as synchronization services
between data centers and voice services between enterprise branches and the HQ.
Branch Data
site center
Branch HQ
site
IP bearer
network
Transmission
bearer network
4 Huawei Confidential
• The bearer WAN mentioned in this course mainly refers to the IP bearer WAN.
Enterprise Bearer WAN Architecture
⚫ While the bearer WANs of different enterprises vary greatly in scale and actual topology, their architecture can be
generally divided into the access, aggregation, and core layers.
Access layer
Access layer:
provides access for enterprise
sites in different regions or Core layer Core layer:
serves as the top-layer
different types of services.
Aggregation layer: interconnection area to
Aggregates traffic by provide high-speed mutual
service type or geographical access between services.
location and then transmits
aggregated traffic to the
core backbone network.
Branch HQ
site
5 Huawei Confidential
Development Trend of the Enterprise Bearer WAN
⚫ The emergence of new technologies such as cloud computing and big data promotes the development of enterprise
services and poses new requirements on enterprise bearer WANs.
Multi-network convergence
Flexible multi-service bearer Data Flexible multi- Data
HQ
center 1 service bearer center 2
High reliability
Easy O&M
NMS/Controller
Production Office bearer
bearer network network
bearer network
Converged
Easy O&M
Multi-network
convergence
High reliability
Branch Branch
site site
6 Huawei Confidential
• Multi-network convergence:
▫ The bearer network uses one physical network to carry production, office,
and other services. Powerful BGP routing policies are used to control traffic
on the bearer network. Traffic diversion policies are deployed based on
service attributes so that different types of services, such as production and
office services, can run on different paths based on the customized policies.
• Flexible multi-service bearer:
▫ As multiple services are migrated to the cloud and multiple networks are
converged, issues such as low network resource utilization and unbalanced
traffic distribution become more prominent. The segment routing
technology can be used to flexibly plan paths to carry traffic, improving
network utilization.
• High reliability:
▫ Reliability is classified into network reliability and service reliability.
▫ The import of traffic into tunnels, tunnel bandwidth, paths, and node traffic
are dynamically controlled.
8 Huawei Confidential
• Multi-service isolation:
▫ Due to the convergence of multiple networks, the originally physically
isolated production and office networks are now carried on the same
network. The service isolation requirements of some enterprises can be met
using the VPN technology. However, for other enterprises, services need to
be isolated using hard pipes.
• Network resource and traffic path planning:
10 Huawei Confidential
Contents
11 Huawei Confidential
Solution Overview Main Functions Application Scenarios
NETCONF/YANG Telemetry
3. New pipe: FlexE-based hard slicing, ensuring bandwidth
• Zero preemption between FlexE-based slices,
E2E SRv6 VIP services ensuring bandwidth
Common services • Network slicing granularity (1 Gbit/s at least)
12 Huawei Confidential
NE
IP optimization BGP-LS Traffic analysis Fault diagnosis
management
13 Huawei Confidential
• Based on the cloud platform, iMaster NCE-IP provides three logical modules
(Manager, Controller, and Analyzer) and various scenario-specific applications to
achieve flexible modular deployment based on customer requirements.
Solution Overview Main Functions Application Scenarios
Internet
Cloud
14 Huawei Confidential
• Huawei has all-scenario SRv6 product capabilities and can provide access, metro,
and backbone network routers for carriers and enterprises.
Solution Overview Main Functions Application Scenarios
HQ
Automatic path
deployment
Branch
site
Backup path
IP bearer network
Low-delay slice
Network slice
Default slice
15 Huawei Confidential
Solution Overview Main Functions Application Scenarios
BGP-LS
follows: information.
Devices use BGP-LS to report network topology information PE1 RR PE3
to the controller, which then generates forwarding paths
based on requirements.
The controller uses PCEP or BGP SR-Policy to deliver
computed paths to devices.
Target traffic travels along delivered paths.
PE2 P1 PE4
16 Huawei Confidential
• BGP SR-Policy delivers data forwarding path information to the headend through
the BGP route. The headend then directs traffic to a specific SR Policy. Segment
lists in SR Policies are used to guide traffic forwarding. A segment list is calculated
based on a series of optimization objectives and constraints, such as delay, affinity,
and SRLG.
17 Huawei Confidential
• TWAMP is a standard protocol and can be deployed on IP, MPLS, and L3VPN
networks. TWAMP is easy to obtain and deploy and does not require clock
synchronization.
• iFIT measures the packet loss rate and delay of service packets transmitted on an
IP network to determine network performance. It is easy to deploy and provides
an accurate assessment of network performance.
Solution Overview Main Functions Application Scenarios
QoS
CS7
FlexE, channelized sub-interface, and QoS BE
MAC PHY
Channelized sub-
SQ GQ VI TM PIC
CS7
from each other and do not affect each other,
interface
BE
DP
…
providing different SLA levels. Channelized sub-interface MAC PHY
SQ GQ VI
CS7
⚫ Slicing is an SLA assurance method in essence. It BE
FlexE
…
MAC FlexE shim PHY
SQ DP
CS7 FlexE client
BE
18 Huawei Confidential
19 Huawei Confidential
Contents
20 Huawei Confidential
Basic Design Overview for the Enterprise Bearer WAN
⚫ Basic design for the enterprise bearer WAN includes physical network design, IP address
planning, and routing design.
Route
Design
IS-IS PE
network
PE
Bearer
IP address
BGP
1.1.1.1/32 planning
1::1/128
PE P PE
RR
PE P P PE
21 Huawei Confidential
Physical Network Design for the Enterprise Bearer WAN
1. Physical network
2. IP address planning 3. Routing design
design
22 Huawei Confidential
Core Layer Design Aggregation Layer Design Access Layer Design
City A City C
New site
23 Huawei Confidential
• The service volume involves two aspects. The first is the service flow direction,
that is, where the services concentrate. The second is the service volume size. The
two aspects are complementary to each other. Generally, a greater concentration
indicates a larger service volume. The core nodes must be nodes where services
concentrate and the service volume is large.
• Core nodes in the same city are interconnected through WDM, and core nodes in
different cities are interconnected through inter-provincial or inter-metro carrier
private lines. The number of core nodes must be comprehensively considered and
cannot be too large.
Core Layer Design Aggregation Layer Design Access Layer Design
Model 1: Data center/Service center Model 2: Municipal metro Model 3: Regional branch
aggregation aggregation aggregation
Core layer Core layer Core layer Core layer Core layer Core layer
24 Huawei Confidential
Core Layer Design Aggregation Layer Design Access Layer Design
25 Huawei Confidential
Bearer Network Private Line Selection
⚫ Only a few enterprises have the capability to build their own transmission private lines. Most enterprises need to
purchase transmission private lines from carriers and build their own bearer networks over these transmission
private lines.
⚫ Currently, the transmission private lines provided by carriers are mainly MSTP and OTN private lines:
MSTP private lines or MPLS VPNs can be used to transmit services from branches to the access layer of the bearer network.
MSTP private lines can be used between the access and aggregation layers of the bearer network.
If the aggregation layer and core layer are in different equipment rooms, MSTP/OTN private lines can be used between them.
MSTP/OTN private lines can be used between core-layer devices. DWDM private lines can also be used between core-layer
devices if bare fibers are available.
PE P P PE
26 Huawei Confidential
IP Address Planning Roadmap for the Enterprise Bearer
WAN
1. Physical network
2. IP address planning 3. Routing design
design
27 Huawei Confidential
IP Address Planning Overview
⚫ With the development of services, increasingly more networks are deployed as IPv4/IPv6 dual-stack
networks. Dual-stack address planning is essential to dual-stack networks.
⚫ IP address planning is generally classified into the following:
IPv4 address planning
100.0.0.0/24
IPv6 address planning 100::/64
SRv6 locator planning
PE PE
Bearer network
SRv6 locator
IPv4 address planning
planning
Locator: FC00::1
1.1.1.1/32 PE P PE
10.0.0.0/30
1::1/32 2000::/64
IPv6 address
planning
PE P P PE
28 Huawei Confidential
IPv4 Address Planning IPv6 Address Planning SRv6 Locator Planning
IPv4 address design rules IPv4 address allocation range on the bearer WAN
⚫ Uniqueness
Hosts on the backbone network must use unique IP addresses. Try to
allocate a different address to each host even if they support VPN
address overlapping. PE/CE Loopback address
interconnection Controller of a backbone
⚫
Contiguity address network device
address
Routes with contiguous addresses can be easily summarized on a
CE PE P PE CE
hierarchical network, reducing the routing table size and accelerating
route calculation.
⚫
Scalability Interconnection
address of a backbone
Addresses need to be reserved at each layer to ensure contiguity of
network device
addresses when the network is expanded.
⚫
Meaningfulness
CE PE P PE CE
A well-planned IP address denotes the device to which the IP address
belongs.
29 Huawei Confidential
IPv4 Address Planning IPv6 Address Planning SRv6 Locator Planning
Used for
communication
between the device Used to establish BGP
and controller. peer relationships
between devices.
CE PE P PE CE
Used to establish LDP
peer relationships
between devices.
⚫
Use 32-bit masks for loopback addresses.
Allocate loopback addresses based on physical locations and reserve sufficient address space.
Allocate loopback addresses for the same geographical location by plane. If there are two planes, allocate IP addresses to planes 1 and 2 in sequence.
30 Huawei Confidential
IPv4 Address Planning IPv6 Address Planning SRv6 Locator Planning
31 Huawei Confidential
IPv4 Address Planning IPv6 Address Planning SRv6 Locator Planning
Loopback IP addresses
allocated in descending order
.25
.13
.5
.37
Odd IP address for the device
Odd IP address for
Bearer network
128.1.1.24/30
128.1.1.12/30
128.1.1.36/30
128.1.1.4/30
the device near
layer interconnection)
the core layer
Even IP address for Even IP address for the device
the device far away with a larger number (intra-
from the core layer layer interconnection)
.38
.14
.26
.6
32 Huawei Confidential
IPv4 Address Planning IPv6 Address Planning SRv6 Locator Planning
2000:EAB8:2203:5505::1/127
CE PE P PE CE
33 Huawei Confidential
• Hierarchy: The massive IPv6 address space poses higher requirements on the
route summarization capability. The primary task of IPv6 address planning is to
reduce network address fragments, enhance the route summarization capability,
and improve the network routing efficiency.
• Security: Services with shared attributes have the same security requirements.
Mutual access between services needs to be controlled. Services with shared
attributes are allocated with addresses in the same address space, which
facilitates security design and policy management.
Fixed Network
Allocatable Address Block Host Address
Prefix Type
⚫ Network Type: indicates the type of a network. For example, 0 indicates a backbone
network, 1 indicates a data center, and 2 to F are reserved.
34 Huawei Confidential
IPv4 Address Planning IPv6 Address Planning SRv6 Locator Planning
⚫
Fixed Prefix: indicates a fixed-length prefix applied for by an enterprise from an address allocation
organization.
⚫ Subnet:
Attribute ID: is used to distinguish address types. It is used for level-1 address classification.
Network Type: identifies the type of a network.
Address Type: identifies the type of an address on the network.
Area ID: identifies an area on the network.
Allocatable Address Block: is reserved for future address allocation.
⚫ Interface Address: indicates the last 64 bits of an IP address. It is equivalent to the host ID in an IPv4 address.
35 Huawei Confidential
IPv4 Address Planning IPv6 Address Planning SRv6 Locator Planning
IPv6 interconnection address: 2001 : : 1 : 1 : 101 : 100 : 0/127 IPv6 loopback address: 2001 : : 1 : 100 : 0 : 0/128
2001::1:1:304:400:0/127
2001::1:2:304:400:0/127
2001::1:2:102:200:0/127
Bearer network
Bearer network
.1 .1 .1 .1
.1 .0 .0 .1 .0 .1
2001::1:1:204:300:0/127 2001::1:102:404:200:0/127 2001::1:2:204:300:0/127
CE2 PE2 P2 P4 PE4 CE4
L0: 2001::1:200:0:0/128 L0: 2001::1:400:0:0/128 L0: 2001::2:400:0:0/128 L0: 2001::2:200:0:0/128
36 Huawei Confidential
IPv4 Address Planning IPv6 Address Planning SRv6 Locator Planning
37 Huawei Confidential
• The locator is an IPv6 network segment. All IPv6 addresses in this network
segment can be allocated as SRv6 SIDs. After a locator is configured for a node,
the system generates a locator route. The node can be located based on the
locator route. In addition, all SIDs advertised by the node can reach the node
through the locator route.
• The Function field is also called opcode, which can be dynamically allocated using
an IGP or statically configured using the opcode command. When configuring a
locator, you can use the static static-length parameter to specify the length of
the static segment, which determines the number of static opcodes that can be
configured in the locator. When an IGP dynamically allocates opcodes, it applies
for opcodes outside of the static segment range to ensure that SRv6 SIDs do not
conflict.
• The Args field is determined by the args args-length parameter. The Args field is
optional in SRv6 SIDs and is determined by the command configuration.
IPv4 Address Planning IPv6 Address Planning SRv6 Locator Planning
IPv6 prefix
38 Huawei Confidential
IPv4 Address Planning IPv6 Address Planning SRv6 Locator Planning
Fixed
Subnet Reserved Site ID Node ID Function Args
prefix
Dynamic End&End.X,
End.DT
/Static etc.
88 bits
1 bit 15 bits 12
32 bits bits
39 Huawei Confidential
• End.DT SIDs can be classified into End.DT4 SIDs and End.DT6 SIDs.
▫ An End.DT4 SID (PE endpoint SID) identifies an IPv4 VPN instance on a
network.
network
Bearer
Bearer
40 Huawei Confidential
Routing Design Roadmap for the Enterprise Bearer WAN
1. Physical network
2. IP address planning 3. Routing design
design
41 Huawei Confidential
Routing Design Overview
⚫ Routing protocols are generally classified into IGP and BGP. These two types of protocols have different
functions and therefore are designed for different purposes.
⚫ Routing design can be classified into the following types:
IGP routing design
BGP routing design BGP routing
design
BGP
CE PE P/RR PE CE
IS-IS IS-IS
IGP routing
design
CE PE P/RR PE CE
Bearer network
42 Huawei Confidential
IGP Route Planning BGP Route Planning
IGP Overview
⚫ On a bearer WAN, an IGP functions as a basic support protocol to collect and flood Layer 3 topology information on
the entire network, and works with protocols such as TWAMP and iFIT to collect network status information, such
as link delay.
⚫ Generally, OSPF or IS-IS can be used on the backbone network for route reachability. However, the application
scenarios of the two protocols are different to some extent.
43 Huawei Confidential
IGP Route Planning BGP Route Planning
CE PE P/RR PE CE
IS-IS IS-IS
L2 L2
CE PE P/RR PE CE
Bearer network
⚫
IS-IS: One IS-IS process is configured on the entire network, and an
IS-IS level-2 area is configured in E2E mode.
44 Huawei Confidential
▫ OSPF router ID: The global router ID is used. Generally, the router ID is the
same as the loopback0 address.
▫ Interface type: To speed up convergence, all interfaces are of the P2P type.
45 Huawei Confidential
IGP Route Planning BGP Route Planning
RR RR
Data center A
Data center B
20 10
10 200
CE PE P P PE CE
RR
10 PE CE
Enterprise branch
Bearer network
20
P
PE CE
IGP: IS-IS/OSPF
46 Huawei Confidential
IGP Route Planning BGP Route Planning
BGP-LS
EBGP EBGP
Data RR Enterprise
center branch
CE PE PE CE
Data Enterprise
center branch
CE PE PE CE
47 Huawei Confidential
• Deploy independent RRs and establish IBGP peer relationships for RRs on the
backbone network.
• In addition to EBGP, IGPs such as OSPF, IS-IS, and RIP can also be used between
PEs and CEs on the bearer network. Static routes can also be used to meet the
requirements of flexible access in various scenarios.
IGP Route Planning BGP Route Planning
BGP AS Planning
⚫ An enterprise network usually uses a private AS number ranging from 64512 to 65534 during BGP
deployment.
⚫ It is recommended that one AS be deployed as the high-speed forwarding core of the entire bearer
network, independent ASs be deployed for data centers and enterprise branches in different regions,
and EBGP peer relationships be established between these ASs and the bearer network AS.
EBGP EBGP
RR Enterprise
Data center branch
AS 65001 CE PE PE CE AS 65003
48 Huawei Confidential
IGP Route Planning BGP Route Planning
Enterprise
Plane B traffic is forwarded on the
branch
center
Data
49 Huawei Confidential
• PE3 changes the MED value to 100 for the route whose next hop is PE1 (a PE on
the same plane) and changes the MED value to 200 for the route whose next hop
is PE2 (a PE on a different plane).
• PE4 changes the MED value to 100 for the route whose next hop is PE2 (a PE on
the same plane) and changes the MED value to 200 for the route whose next hop
is PE1 (a PE on a different plane).
• If PE1 and PE2 on the left learn the same VPN route and advertise the route to
PE3 and PE4 on the right through the RR, PE3 and PE4 preferentially select the
VPN route on the same plane as them. After the route is advertised to the CE,
traffic from the CE preferentially travels along the route advertised by PE3
(because the MED value of the route advertised by PE3 is only increased by 10).
IGP Route Planning BGP Route Planning
50 Huawei Confidential
Contents
51 Huawei Confidential
Tunnel and VPN Design Overview for the Enterprise Bearer
WAN
⚫ Enterprises usually use VPN to isolate services and SR to establish tunnels for traffic optimization and
path planning.
⚫ VPN traffic is carried over tunnels to isolate enterprise services while ensuring service quality.
HQ
VPN design
Branch
site
Backup tunnel
Tunnel design IP bearer network
52 Huawei Confidential
Tunnel Design Roadmap for the Enterprise Bearer WAN
53 Huawei Confidential
Basic Tunnel Concepts SR-MPLS Tunnel Design SRv6 Tunnel Design
54 Huawei Confidential
Basic Tunnel Concepts SR-MPLS Tunnel Design SRv6 Tunnel Design
R2 R2
R1 R1
R3 R3
R4 R4
55 Huawei Confidential
• MPLS is a tunneling technology that guides data forwarding in essence and has
complete tunnel creation, management, and maintenance mechanisms. The
preceding mechanisms are driven by network operation and management
requirements, not by applications.
Basic Tunnel Concepts SR-MPLS Tunnel Design SRv6 Tunnel Design
Solution Provided by SR
⚫ Simplifying protocols and extending existing protocols
Service-defined
The extended IGP/BGP supports label distribution. Therefore, LDP
Controller network is not required on the network, achieving protocol simplification.
In addition, devices require only software upgrades instead of
hardware replacement, protecting investments on the live
network.
The source routing mechanism is introduced. The forwarding
policy is instantiated into a segment list on the ingress to control
the forwarding path of service traffic.
⚫ Enabling networks to be defined by services
R2 After an application raises requirements (e.g. delay, bandwidth,
and packet loss rate), the controller collects information (e.g.
network topology, bandwidth usage, and delay) and computes an
IGP/BGP explicit path according to the requirements.
R1 R3
R4
56 Huawei Confidential
Basic Tunnel Concepts SR-MPLS Tunnel Design SRv6 Tunnel Design
SR-MPLS Classification
SR-MPLS BE SR-MPLS Policy
The IGP is used to RSVP-TE is no longer needed,
distribute labels, and LSDB simplifying the configuration. LSDB
LDP is not required. Moreover, load balancing and
strict explicit paths are
R2 supported. R2
LSDB LSDB
R1 R1
R3 R3
LSDB R4 LSDB R4
• An extended IGP has the label distribution capability. An LSDB can be • Extended BGP/IGP sends the LSDB that carries label information to the
formed based on the SRGB, prefix SID, link state, and other information controller, which then globally computes paths. There is no need to use
distributed through the IGP, and the SPF algorithm can be used to RSVP-TE packets to apply for paths or maintain path status.
compute the shortest forwarding paths based on labels. Therefore, LDP • Node SIDs and adjacency SIDs are used to implement load balancing
is no longer required on the network. and strict explicit paths.
• Because only the IGP/BGP is used, the network does not have traffic • Path computation and service delivery are performed by the controller,
blackholes and does not need to maintain LDP peer relationships. simplifying configuration.
57 Huawei Confidential
Basic Tunnel Concepts SR-MPLS Tunnel Design SRv6 Tunnel Design
SR Domain
SR Domain
58 Huawei Confidential
▫ PE1 then sends the packet to P1, which swaps the outer label of the packet
based on the SR-MPLS BE tunnel entry and sends the packet to P2. The
process on P2 is similar to that on P1.
▫ Upon receipt of the packet, PE2 sends the packet to a specific VPN site
based on the inner label (PHP is not considered in this case).
• When an SR-MPLS Policy is used to carry VPN traffic, the forwarding path must
be pre-computed and delivered to the ingress (PE1) as a segment list.
▫ After receiving a VPN packet from CE1, PE1 searches the corresponding
table and pushes the related segment list into the packet.
▫ PE1 then sends the packet to P1, which determines the forwarding path
based on the outer label, pops out the outer label, and sends the packet to
P2.
▫ After receiving the packet, P2 determines the forwarding path based on the
outer label, pops out the outer label, and sends the packet to PE2.
▫ PE2 sends the packet to the specified VPN site according to the inner label.
Basic Tunnel Concepts SR-MPLS Tunnel Design SRv6 Tunnel Design
SRv6 Overview
⚫ SRv6, or Segment Routing IPv6, is designed to forward IPv6 data packets on a network based on the source routing
paradigm.
⚫ SRv6 forwarding is no longer based on MPLS, simplifying the forwarding plane. SRv6 implements hop-by-hop
forwarding by adding a Segment Routing header (SRH) into IPv6 packets, encapsulating an explicit IPv6 address
stack into the SRH, and continuously updating destination addresses on transit nodes.
59 Huawei Confidential
Basic Tunnel Concepts SR-MPLS Tunnel Design SRv6 Tunnel Design
IPv6 Domain
IPv6 Domain
60 Huawei Confidential
• When SRv6 BE is used to carry VPN traffic, data packets carry two layers of IPv6
headers. The outer IPv6 header address is used to identify the VPN to which the
data belongs, and the inner IPv6 header identifies the actual destination address
of the data.
▫ The outer IPv6 address is generated by the locator of PE2 and advertised to
PE1 through BGP. PE2 advertises the locator to other devices in the form of
a route.
▫ After PE1 receives a packet destined for the destination network segment
(2001:: 64), PE1 encapsulates the packet with an outer IPv6 header and
forwards the packet based on the routing table.
▫ Ps (P1 and P2) forward the packet based on the outer IPv6 header.
▫ After receiving the packet, PE2 matches the packet with the corresponding
VPN instance based on the outer IPv6 header and forwards the packet
based on the routing table.
• When SRv6 Policy is used to carry VPN traffic, data packets carry two layers of
IPv6 headers. The outer IPv6 header address is replaced by each hop based on the
SRH information, and the inner IPv6 header identifies the actual destination
address of the data.
▫ Upon receipt of a packet destined for 2001:: 64, PE1 adds an outer IPv6
header (including the SRH) to the packet and sends the packet to the next
hop based on the header.
▫ After receiving the packet, P1 replaces the outer IPv6 header based on the
SRH information and forwards the packet. P2 processes the packet in a
similar way.
▫ After receiving the packet, PE2 determines the VPN to which the packet
belongs based on the outer IPv6 header and forwards the packet based on
the routing table.
Basic Tunnel Concepts SR-MPLS Tunnel Design SRv6 Tunnel Design
Ease of optimization: Ensure that the traffic on each tunnel is not too heavy. Otherwise, bandwidth optimization
will be difficult.
Reliability: Ensure that main services are under protection, and key services can be quickly converged.
Scalability: Consider possible network expansion in the future.
62 Huawei Confidential
SR domain
L2 VPN
L3 VPN
E2E SR-MPLS
Policy
63 Huawei Confidential
64 Huawei Confidential
• If iFIT is used to measure the network delay, 1588v2 must be enabled on the
entire network. Therefore, there are restrictions on application scenarios.
• TWAMP requires only NTP in network delay measurement.
• For a tunnel planned based on bandwidth, the actual traffic volume of the tunnel
cannot be limited on devices after the tunnel is delivered. The traffic volume of a
tunnel needs to be limited on the ingress, and the QoS or network slicing
technology needs to be used.
Basic Tunnel Concepts SR-MPLS Tunnel Design SRv6 Tunnel Design
FTP FTP
service service
HTTP HTTP
service service
65 Huawei Confidential
Segment list 1
<Headend, color, Candidate path 1 (weight: 20)
endpoint> (preference: 200) Segment List 2
SR-MPLS (weight: 10)
Policy
Candidate path 2 Segment list 1
(preference: 100) (weight: 10)
Tunnel
Selection
SR-MPLS BE
66 Huawei Confidential
• An SR-MPLS Policy can have multiple candidate paths, such as CP1 and CP2. Each
path is uniquely identified by a 3-tuple <protocol, origin, discriminator>.
• CP1 is the activated path because it is valid and has a higher priority. The two SID
lists (also called segment lists) of CP1 are delivered to the forwarder, and traffic is
balanced between the two tunnel paths based on weight. For example, traffic
along the SID list <SID11, SID12> is balanced based on W1/(W1+W2). In the
current mainstream implementation, a candidate path has only one segment list.
FTP FTP
service service
HTTP HTTP
service service
67 Huawei Confidential
• Similar to LDP tunnels, SRv6 BE tunnels are calculated based on IGP/BGP optimal
paths. Unlike label-featured MPLS, SRv6 BE uses the shortest path first (SPF)
algorithm to calculate forwarding paths based on SRv6 SIDs in an IGP domain.
SRv6 BE requires only one segment to identify a forwarding path and the carried
services. Traffic forwarding along paths depends on cost planning. Traffic is
forwarded based on the least-cost route.
• This section describes SRv6 TE Policy design.
Basic Tunnel Concepts SR-MPLS Tunnel Design SRv6 Tunnel Design
68 Huawei Confidential
• If iFIT is used to measure the network delay, 1588v2 must be enabled on the
entire network. Therefore, there are restrictions on application scenarios.
• TWAMP requires only NTP in network delay measurement.
• For a tunnel planned based on bandwidth, the actual traffic volume of the tunnel
cannot be limited on devices after the tunnel is delivered. The traffic volume of a
tunnel needs to be limited on the ingress, and the QoS or network slicing
technology needs to be used.
Basic Tunnel Concepts SR-MPLS Tunnel Design SRv6 Tunnel Design
Segment list 1
<Headend, color, Candidate path 1 (weight: 20)
endpoint> (preference: 200) Segment list 2
(weight: 10)
SRv6 Policy
Candidate path 2 Segment list 1
(preference: 100) (weight: 10)
Tunnel
Selection
SRv6 BE
69 Huawei Confidential
VPN Design Roadmap for the Enterprise Bearer WAN
70 Huawei Confidential
VPN Classification VPN Route Transmission
VPN Classification
⚫ Different enterprises have different requirements for VPN division. Most enterprises use one VPN for
major services (including production and office services), one VPN for non-major services, one VPN for
external services, and one VPN for Internet services.
IS-IS PE PE
network
Bearer BGP
PE P PE
RR
PE P P PE
VPN access point
71 Huawei Confidential
VPN Classification VPN Route Transmission
VPN route learning BGP BGP The BGP route formats are different.
Whether RR-based
route reflection is Supported Supported
supported
VPN FRR, IP FRR, TE-HSB (MPLS),
Failover Supported Supported
CBTS, TI-LFA (SRv6), Mirror-SID
72 Huawei Confidential
VPN Classification VPN Route Transmission
⚫ When SRv6 is used to transmit IPv6 services, it is recommended that the BGP EVPN address family be used to
transmit VPN routes.
VPN route learning BGP BGP The BGP route formats are different.
Whether RR-based
route reflection is Supported Supported
supported
VPN FRR, IP FRR, TE-HSB, CBTS, TI-FLA,
Failover Supported Supported
Mirror-SID
73 Huawei Confidential
Contents
74 Huawei Confidential
SLA and Reliability Design Overview for the Enterprise
Bearer WAN
⚫ The enterprise bearer WAN uses reliability and SLA technologies to effectively ensure the quality of
carried services. Therefore, reliability and SLA design are very important.
Reliability design
HQ
Branch
site
Backup tunnel
IP bearer network
Low-delay slice
75 Huawei Confidential
SLA Design Roadmap for the Enterprise Bearer WAN
Controller reliability
QoS design
design
Slice design Device reliability
design
Network reliability
design
76 Huawei Confidential
SLA Technology Overview
⚫ In Huawei's CloudWAN solution, iMaster NCE-IP can compute paths based on bandwidth requirements and deliver
forwarding paths (SR Policies) to network devices.
⚫ Although the controller can compute paths based on bandwidth requirements, the delivered path information does
not contain any traffic rate limiting policy. As a result, the traffic rate on the forwarding path (SR Policy) may
exceed the planned bandwidth.
⚫ To ensure that the traffic rate does not exceed the planned bandwidth, SLA technologies need to be deployed on
the network to limit traffic bandwidth.
⚫ SLA technologies mainly include QoS and network slicing.
Deploys a
Plans paths based on
tunnel with
bandwidth requirements.
a bandwidth
of 1 Gbit/s.
technology
PE1 RR PE3
SLA
2 Gbit/s
1 Gbit/s traffic SR Policy
traffic
77 Huawei Confidential
QoS Design Slice Design
78 Huawei Confidential
QoS Design Slice Design
Determined based on
AF2 Office service WFQ NA WRED
live network conditions.
79 Huawei Confidential
QoS Design Slice Design
CE PE P/RR PE CE
2. Desired flows must be
specified on the PE ingress, Bearer network
and rate limiting must be
configured on the PE ingress.
80 Huawei Confidential
QoS Design Slice Design
TM PIC
Channelized sub-interface SQ DP
TM PIC CS7
CS7 SQ GQ VI FlexE client
BE
BE
DP
…
MAC FlexE shim PHY
…
• Channelized sub-interface: Queue resources are isolated. Hierarchical • FlexE: Queue and interface resources are isolated. Every resource is
scheduling is used to implement flexible and refined management of divided by TDM timeslot. This meets the requirements for exclusive
interface resources, provide bandwidth guarantee, and work with the resource use and resource isolation and provides flexible and refined
controller to provide E2E resource reservation. management of interface resources.
81 Huawei Confidential
QoS Design Slice Design
82 Huawei Confidential
QoS Design Slice Design
IP bearer IP bearer
network network
MSTP network OTN
Transmission Transmission
bearer network bearer network
83 Huawei Confidential
QoS Design Slice Design
Gold service
External communication
Silver service service slice
Network slice
Bronze service (bandwidth: 5 Gbit/s)
IP bearer network
App service
Internet service slice
Internet access (bandwidth: 1 Gbit/s)
MSTP network service
Transmission
bearer network
New service slice
Because the transmission network New service
(bandwidth: 1 Gbit/s)
uses MSTP, only channelized sub-
interface-based network slicing can
be used as the slicing technology.
84 Huawei Confidential
Enterprise Bearer WAN Reliability Design
85 Huawei Confidential
Controller Reliability Design Device Reliability Design Network Reliability Design
86 Huawei Confidential
87 Huawei Confidential
• During the operation of the DR system, NCE monitors the association status of
the primary and secondary sites over the heartbeat link and synchronizes data
over the replication link. If the heartbeat or replication link between the primary
and secondary sites is abnormal, the controller reports an alarm. The fault can be
either manually rectified or automatically processed by the arbitration service.
GR GR
CE PE P/RR PE CE
CE PE P/RR PE CE
Bearer network
88 Huawei Confidential
1+1 active/standby
protection for main
control boards
Maximum backup
for power supplies
89 Huawei Confidential
90 Huawei Confidential
Controller Reliability Design Device Reliability Design Network Reliability Design
CE PE P P PE CE
Source network
2
1 3
Original path
CE PE P P PE CE
Protection path
Bearer network
91 Huawei Confidential
Controller Reliability Design Device Reliability Design Network Reliability Design
92 Huawei Confidential
• The transit network may fail to meet service requirements due to insufficient
bandwidth or long delay. To detect the network bandwidth or delay, network
quality detection technologies such as TWAMP or iFIT need to be deployed.
Controller Reliability Design Device Reliability Design Network Reliability Design
Destination
2 4
network
2. Link fault between a destination PE and a P
3. Destination CE fault
4. Link fault between a destination PE and a destination CE
⚫ The following method can be used to protect the
network against the type 1 and type 2 faults:
CE PE P P PE CE
Deploy BFD to quickly detect network link faults.
Node/link
Use mirror SID or anycast FRR to switch traffic to the Bearer network protection path
standby destination PE.
⚫
The following method can be used to protect the
network against the type 3 and type 4 faults:
Deploy BFD to quickly detect network link faults.
Compute backup paths through IP FRR (mainly based on the
LFA/RLFA algorithm).
93 Huawei Confidential
Contents
94 Huawei Confidential
Optimization and O&M Design Overview for the Enterprise
Bearer WAN
⚫ Network operation becomes the new focus after the initial stage of network construction is complete. Network
optimization and O&M are essential to smooth network operation.
⚫ To better support subsequent network optimization and O&M, network optimization and O&M design must be
performed in advance. Maintenance Normal O&M design
window running
Bearer network
PE P PE
Network
optimization
design
RR
PE P P PE
95 Huawei Confidential
Optimization Design Roadmap for the Enterprise Bearer
WAN
1. Network optimization
2. O&M design
design
96 Huawei Confidential
Network Performance Network Traffic Application
Monitoring Design Optimization Design Optimization Design
97 Huawei Confidential
Network Performance Network Traffic Application
Monitoring Design Optimization Design Optimization Design
PE TWAMP P TWAMP PE
Used to detect
network link quality
RR
PE P P PE
98 Huawei Confidential
Network Performance Network Traffic Application
Monitoring Design Optimization Design Optimization Design
PE P P PE
Bearer network
99 Huawei Confidential
Network Performance Network Traffic Application
Monitoring Design Optimization Design Optimization Design
PE1 RR 2 PE3
Severe packet loss
P1 occurs on links.
PE2 PE4
TWAMP
1
TWAMP or iFIT is
used to measure
network quality.
• Automatic optimization:
▫ Scheduled optimization: You can set the interval for automatically
optimizing network paths to 5 minutes or longer to ensure that the current
service paths are optimal.
▫ Automatic optimization upon bandwidth threshold crossing: You can set the
link threshold. Then, when the bandwidth usage of a link exceeds the
threshold, the system automatically adds tunnels over the link to the path
computation queue and performs optimization when the optimization
period arrives.
• Optimization policy:
▫ Traffic-based optimization: In this mode, the link threshold must be set. If
the bandwidth usage of links exceeds the threshold, the controller
determines whether to perform local or global optimization based on the
number of threshold-crossing links.
▫ Delay-based optimization: In this mode, the controller traverses and
compares the configured delay of all tunnels with the accumulated delay
collected from forwarders, and performs local optimization on all the
tunnels whose accumulated delay exceeds the configured delay.
▫ Delay+traffic-based optimization: If either of the preceding trigger
conditions is met, traffic optimization is performed.
Network Performance Network Traffic Application
Monitoring Design Optimization Design Optimization Design
CE PE P PE
Service 1 DSCP EF
RR CE
PE P P PE
SR Policy
CE P PE
Service 1 DSCP EF
1. Network optimization
2. O&M design
design
Administrators
Monitors SMManagers
Operators
The function of monitoring user sessions does not involve users' personal information.
Traffic bypasses
the maintained
device.
B. SRv6 BE tunnel
C. SR-MPLS Policy
D. SRv6 Policy
1. ABCD
Summary
⚫ When designing the enterprise bearer WAN, you need to design the infrastructure network first,
including the physical network, IPv4/IPv6 addresses, and IGP/BGP.
⚫ Tunnels, including SR-MPLS BE tunnels, SR-MPLS Policies, SRv6 BE tunnels, and SRv6 Policies, can be
established on the infrastructure network. During tunnel design, pay attention to the tunnel path
planning, traffic diversion, and best-effort forwarding mode.
⚫ After a tunnel is established, it can carry VPN services. VPN planning must be based on enterprise
service types and requirements.
⚫ Reliability and SLA assurance are also very important for services. QoS and network slicing design helps
ensure service SLA, and high reliability design for controllers, devices, and networks helps ensure
service reliability.
⚫ A network needs optimization and maintenance after it is constructed. Optimization design needs to
cover both performance monitoring and traffic optimization. The maintenance scope needs to be
divided based on user roles, and the network needs to be maintained at a proper time.
⚫ Given that IPv6 addresses are abundant, secure, and scalable, they have become an
inevitable trend for network evolution. IP Enhanced Innovation (IPE) is a further
development and application of IPv6 technologies and an upgrade of the IPv6-based next-
generation Internet, and can create greater value for users.
⚫ This course introduces the basic concepts, development trends, and key technical
applications of IPE.
⚫ This course also introduces IPv6 network evolution solutions for scenarios such as DCs,
WANs, and campus networks, covering IPv6 network evolution phases and technologies and
network architectures adopted in each phase.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
3 Huawei Confidential
Datacom Network: Cornerstone for Digitalization
DC
Computing power
Enterprises Individuals
4 Huawei Confidential
Understanding IP Forwarding on a Datacom Network
Through a Network Model
Application layer
Transport layer Destination Next
Protocol
Network layer Network layer Network/Mask Hop
Data link layer Data link layer 192.168.2.0/24 OSPF R3 R5
Physical layer Physical layer … … …
High High
bandwidth bandwidth
192.168.1.1 192.168.2.1
Low bandwidth
PC1 R1 R2 R3 PC2
• IP is one of the most important protocols at the network layer.
Source IP:
Source Port • A device performs IP encapsulation on the payload and
Source MAC 192.168.1.1
Destination Payload forwards the payload on the network.
Destination MAC Destination IP:
Port
192.168.2.1 • Network devices search their routing tables for a matching
Ethernet header IP header TCP header
forwarding entry based on the destination IP address of the
packet and forward the packet along the shortest paths.
5 Huawei Confidential
Emergence and Application of MPLS
Label
Ethernet MPLS IP TCP
header
IP packet
Low
header header header header
bandwidth
Source MAC Source IP Source Port
Label
Destination Destination Destination Payload IP
header 1024
MAC IP Port packet
IP
1036
packet
IP
1061
packet
6 Huawei Confidential
History of IP Network Transformation
7 Huawei Confidential
Forwarding
plane Push Swap Pop Push Continue Next
✓ Simplified protocols
✓ High scalability
Control plane Forwarding plane ✓ Programmability
simplification simplification
8 Huawei Confidential
IPE Technology System: Comprehensively Enabling Next-
Generation Mobile Networks and the Cloud era
⚫ IPE is a technology system oriented to the next-generation mobile networks and cloud era. It uses "IPv6 +
intelligent computing + protocol innovation" to meet next-generation mobile Internet bearer and cloud-network
synergy requirements, such as flexible networking, fast service provisioning, on-demand services, and differentiated
assurance, simplifying network O&M and improving user experience.
9 Huawei Confidential
• Phase 1:
▫ SRv6 is used to simplify protocols, resolve the low efficiency problem caused
by segment-based configuration and manual cross-domain configuration
on traditional MPLS networks, and achieve fast E2E service provisioning
across domains.
▫ In addition, SRv6 Policies can quickly adjust and optimize paths, improving
network-wide flexibility and laying a foundation for autonomous networks.
• Phase 2:
▫ Network slicing and FlexE are introduced to provide deterministic
forwarding and differentiated dedicated network experience. Layer 2 FlexE
and Layer 3 network slicing provide dedicated network resources for
different services, E2E service isolation, and manageable and controllable
paths. In this way, different services can be transmitted on the same
network. Abundant slices ensure that each service can enjoy dedicated
network experience and deterministic forwarding with controllable delay
and jitter.
▫ Moreover, the in-band flow measurement mechanism reports service traffic
status in real time, enabling network experience visualization. This allows us
to determine whether service quality deteriorates in a timely manner. If
service quality deteriorates, we can adjust service configurations in a timely
manner to ensure optimal user experience.
• Phase 3:
▫ In this phase, we not only need to ensure service experience, but also need
to deliver experience assurance at a finer granularity (application level).
▫ IPv6 apps can directly carry application information in IPv6 extension
headers, enabling the network to identify user and application information
and provide fine-grained differentiated network channels.
Contents
11 Huawei Confidential
SRv6 Network Slicing In-band Flow Measurement New Multicast
As-Is: Cleaned traffic is diverted through network A (without VPN To-Be: Native IPv6-based SRv6 VPN is deployed, allowing the service scale
isolation). The supported traffic scale is limited. to expand by 10 times.
Cloud DC Cloud DC
Network B has the VPN service
Traffic will be diverted capability, but the supported SRv6 only needs to be Cloud ASBR
again due to a lack of the service scale is limited during enabled on egress Cleaned traffic is
VPN service capability on 2 traffic diversion. nodes and cloud ASBRs diverted by the
the network. 1 to implement E2E VPN. native IPv6 VPN.
12 Huawei Confidential
• This figure shows a typical SRv6 deployment case. A carrier provides network
security services for customers. To prevent DDoS attacks, the traffic to the DC
needs to be cleaned by the DDoS cleaning center first. Such traffic traverses the
backbone network.
▫ The carrier has two backbone networks. Network A has high bandwidth but
does not have the VPN service capability. As a result, cleaned traffic may be
sent back to the cleaning center if network A is used.
▫ Network B has the VPN service capability but does not have high
bandwidth. It is unable to support the cleaning of all service traffic.
▫ The volume of to-be-cleaned traffic is large. If such traffic is diverted
through network A (without VPN isolation), cleaned traffic may be diverted
back to the cleaning center, causing a loop. If such traffic is diverted
through network B, the bandwidth resources of network B become a
bottleneck as the service scale expands.
• In this situation, SRv6 can be deployed on network A to direct traffic to this high-
bandwidth backbone network. This implementation can provide protection for
hundreds of DCs. SRv6 is easy to deploy and supports fast service provisioning.
SRv6 Network Slicing In-band Flow Measurement New Multicast
1 Cloud-network separation, with cloud resources 1 Cloud-network convergence, with cloud PEs pre-
interconnected case by case based on enterprise requirements. integrated with numerous cloud resources.
2 Segment-by-segment deployment, multi-party 2 E2E EVPN over SRv6 deployed between CPEs and
collaboration required, deployment taking 1 to 2 months. cloud PEs to enable one-hop cloud access.
13 Huawei Confidential
• Currently, large numbers of enterprises are deploying their services on the cloud.
Carriers must consider how to quickly provision site-to-cloud private lines for
enterprises.
▫ Traditional private lines, such as MPLS private lines, may involve multiple
ASs. Different ASs are managed and maintained by different management
teams. The provisioning of a private line for one-hop cloud access involves
collaboration and coordination among multiple departments.
▫ With SRv6, the deployment is easy. An E2E SRv6 logical private line can be
established between the enterprise CPE and cloud PE to carry cloud-based
services, achieving one-hop cloud access. Moreover, private line provisioning
is very fast in this case.
14 Huawei Confidential
15 Huawei Confidential
• Solution highlights:
▫ In SRv6 scenarios, tunnel-level iFIT can be enabled to
Cloud measure the quality of each SRv6 segment list and select the
optimal link. The link currently in use is periodically compared
Aggregation
layer Core layer Cloud with the optimal link for path selection and optimization,
CPE
implementing intelligent traffic steering.
Outlet Branch Head office Cloud ▫ One controller is deployed to perform centralized O&M on
Candidate path 1 the entire financial network and implement E2E management
SRv6 Candidate path 2
... and scheduling.
iFIT measurement domain
16 Huawei Confidential
• One WAN for all services is a technology that provides cross-domain network
services through coordination among different networks. In the financial industry,
tier-2 banks, outlets, subsidiaries, and external organizations access the head
office DC through tier-1 banks, which aggregate service traffic and forward
aggregated traffic to the bank core network.
• The financial industry has high requirements on SLA performance. With the
development of banking services, diversified service types have emerged in
outlets. In addition to traditional production and office services, there are also
security protection, IoT, public cloud, and other services. This poses higher O&M
requirements on the one-financial-WAN-for-all-services scenario. Against this
backdrop, Huawei proposes the iFIT tunnel-level measurement solution.
SRv6 Network Slicing In-band Flow Measurement New Multicast
Multicast Technical
Benefits New services
Reduced
network load
⚫ While the potential applications of multicast are booming, the trend of adopting IPv6-based networks becomes
more and more prominent. As IPv6 becomes more widely adopted and new service scenarios require higher
bandwidth and better user experience, multicast technologies on IPv6 networks need to continuously evolve in
order to keep pace with new service scenarios and technology development trends.
17 Huawei Confidential
SRv6 Network Slicing In-band Flow Measurement New Multicast
18 Huawei Confidential
• BIER overview:
▫ This multicast technology encapsulates a set of destination nodes of
multicast packets in a BitString in the packet header before sending the
packets. With this multicast technology, transit nodes do not need to
establish a multicast distribution tree (MDT) for each multicast flow, or
maintain the states of multicast flows. Instead, the transit nodes replicate
and forward packets according to the BitString in the packet header.
▫ In BIER, each destination node is a network edge node. For example, on a
network with no more than 256 edge nodes, each node needs to be
configured with a unique value ranging from 1 to 256. In this case, the set
of destinations is represented by a 256-bit (32-byte) BitString, and the
position or index of each bit in the BitString indicates an edge node. This
explains the meaning of Bit Index Explicit Replication.
• Advantages of BIER:
▫ Supports large-scale multicast service scenarios and reduces resource
consumption as BIER does not need to establish an MDT for each multicast
flow or maintain the states of multicast flows.
▫ Improves multicast group joining efficiency of multicast users in SDN
network scenarios because requests of the multicast users do not need to
be forwarded along the MDT hop by hop, and instead their requests are
directly sent by leaf nodes to the ingress node. This is more suitable for the
controller on an SDN network to directly deliver the set of destinations to
which multicast packets are to be sent after collecting the set.
• BIERv6 inherits the advantages of BIER and uses IPv6 to program paths,
functions, and objects, facilitating multicast forwarding on SRv6-based networks.
SRv6 Network Slicing In-band Flow Measurement New Multicast
0:0010 Data packet BitString is 0111 (set of the BFR-IDs of PE1, PE2, and
PE4, edge node, BFR-ID: 4
PE3, edge node, BFR-ID: 3 PE3).
0:0100 Data packet 2. P2 -> PE3: In the packet sent from P2 to PE3, the
BFR-PE4 BIFT BFR-P2 BIFT BFR-P1 BIFT BitString is 0100 (containing only the BFR-ID of PE3).
ID F-BM NBR ID F-BM NBR ID F-BM NBR 3. P2 -> P1: In the packet sent from P2 to P1, the BitString
1 0111 P2 1 0011 P1 1 0001 PE1 is 0011, which contains the set of BFR-IDs of PE1 and
2 0111 P2 2 0011 P1 2 0010 PE2
PE2, with the BFR-ID of PE3 removed.
3 0111 P2 3 0100 PE3 3 1100 P2
4 1000 PE4 4 1000 PE4 4 1100 P2 4. P1 -> PE1: In the packet sent from P1 to PE1, the
• The ID refers to a BFR-ID. To forward packets to the node of a specified BFR-ID, the device BitString is 0001 (containing only the BFR-ID of PE1).
needs to query the entry corresponding to the BFR-ID.
• F-BM is short for Forwarding BitMask. It indicates the set of BIER domain edge nodes that 5. P1 -> PE2: In the packet sent from P1 to PE2, the
are reachable through the next hop after packets are replicated and sent to the next hop. BitString is 0010 (containing only the BFR-ID of PE2).
• NBR is short for neighbor. It indicates the next hop neighbor through which packets can
reach a node of a specified BFR-ID.
19 Huawei Confidential
• Bit allocation fundamentals: BIER floods the mapping between bit positions (BFR-
IDs) of nodes and prefixes through IS-IS LSPs (IS-IS for BIER is used as an
example). Devices learn the complete BIFT (BIER neighbor table) through
flooding. The BIFT has the following characteristics:
▫ In the neighbor table, each directly connected neighbor has one entry.
▫ Each entry contains information about the edge nodes that are reachable
to a neighbor.
BIERv6
⚫ In terms of unicast forwarding, SRv6, which is based on the IPv6 data plane, has developed rapidly and surpassed
SR-MPLS, which is based on the MPLS data plane. In terms of multicast, however, a solution was urgently needed to
use the BIER architecture and encapsulation in order to implement MPLS-independent technologies and match the
development trend of IPv6 networks. Against this background, BIERv6 was proposed in the industry.
⚫ BIERv6 inherits the core design concept of BIER. It uses the BitString to guide multicast packet replication and
forwarding to specified receivers, eliminates the need for transit nodes to establish MDTs, thereby implementing
stateless forwarding.
BIER encapsulation BIERv6 encapsulation
Ethernet Ethernet
MPLS Label IPv6 Header
(VPN)
BIER
VPN Label BIER
Payload Payload
⚫ The main difference between BIERv6 and BIER is that BIERv6 is a multicast solution based on native IPv6 rather
than MPLS labels.
20 Huawei Confidential
• Advantages of BIERv6:
▫ Simplified network protocols:
▪ BIERv6 uses IPv6 addresses to carry Multicast VPN (MVPN) and GTM
services, further simplifying protocols and eliminating the need to
allocate, manage, and maintain MPLS labels.
Multicast traffic
22 Huawei Confidential
23 Huawei Confidential
Overview DC WAN Campus Network Other Systems
24 Huawei Confidential
• Enterprise services can be classified into Internet services, DMZ services, and
enterprise-built service systems. Internet services and DMZ services depend on
external network applications and user environments and require long-term
coexistence of IPv4 and IPv6 user access. This factor must be considered during
IPv6 reconstruction of enterprise networks.
Overview DC WAN Campus Network Other Systems
Internet
WAN
25 Huawei Confidential
• DCN:
▫ Based on the service scope, enterprise DC services can be classified into
external services and internal applications.
Future v6 v6 v6 v6 v6 v6 v6 v6 v6
27 Huawei Confidential
• The overall IPv4-to-IPv6 network migration principle is "DCN first, WAN second,
and campus network reconstruction on-demand".
▫ Phase 1: Deploy dual-stack services in the DC's public service and test zones
and IPv4 single-stack services on the WAN's underlay network and dual-
stack services on the WAN's overlay network, and pilot dual-stack services
on the campus network .
▫ Phase 2: Gradually apply dual-stack to the DC's internal applications and
the campus network's office campus part and apply dual-stack to the
campus network's production campus part.
▫ Phase 3: Comprehensively apply IPv6 single stack to the DC's internal
applications and ensure that the WAN gradually evolves to IPv6-only
networks.
Overview DC WAN Campus Network Other Systems
Network
Phase 1: Dual-Stack Service Phase 2: Dual-Stack Service Phase 3: Single-Stack Service
Layer
Management
IPv4/IPv6 dual-stack management
and control IPv4 management channel IPv6 management channel
channel
layer
Traditional DC: dual stack
VXLAN underlay IPv6 + overlay dual
DCN VXLAN underlay IPv6 + overlay IPv6
VXLAN underlay IPv4 + overlay dual stack
stack
Dual stack over MPLS (6VPE)
Bearer WAN Native IP dual stack Dual stack over SRv6 IPv6 over SRv6
28 Huawei Confidential
• DCN:
▫ The reconstruction solutions for the Internet access zone include NAT64, IVI,
and dual-stack reconstruction. It is recommended to use the dual-stack
solution to provide IPv6 addresses and service capabilities.
▪ The IPv6 address structure of the IVI is limited and does not meet the
IPv6 address planning principles. Therefore, the IVI is not
recommended for large-scale deployment.
▫ Internal network resource pool reconstruction mainly uses dual-stack
solutions, including VXLAN underlay IPv4 + overlay dual stack and VXLAN
underlay IPv6 + overlay dual stack.
▪ VXLAN underlay IPv4 + overlay dual stack can be used for initial dual-
stack reconstruction to quickly provide IPv6 service bearer capabilities.
▪ VXLAN underlay IPv6 + overlay dual stack can be used for new DCN
deployment and existing DCN reconstruction. This facilitates gradual
evolution to IPv6-only networks.
• WAN:
▫ WAN IPv6 reconstruction solutions mainly include dual stack, 6VPE, and IPE.
▪ Networks without VPN services can use native IPv4 and native IPv6
dual-stack forwarding. Increasing SLA requirements, such as
requirements for on-demand optimization and intelligent O&M, will
gradually drive network evolution to IPE, so that these networks can
provide better service assurance and experience capabilities. Finally,
these networks will evolve to IPv6-only networks.
• Campus network:
30 Huawei Confidential
• DCN architecture:
▫ The underlay network refers to the physical network or infrastructure
network. It is required that any two nodes on the physical network be
routable to each other. The spine-leaf architecture is recommended for
underlay networking.
IPv4 Internet resource pool (DMZ) IPv6 Internet resource pool (DMZ)
32 Huawei Confidential
Intranet core Core (IPv4) Intranet core Core (dual stack) Intranet core Core (IPv6)
33 Huawei Confidential
34 Huawei Confidential
Overview DC WAN Campus Network Other Systems
Step 1: Prepare for Step 2: Construct the network Step 3: Remove the legacy
the evolution. and cut over services. network after service cutover.
IP/MPLS
Lower- Lower-
Lower-
level Traditional level Traditional
level Traditional subnet
subnet subnet DC
DC DC
IPE
Create an IPE single-stack network Deploy IPE single stack on the
to carry IPv6 services. entire WAN to carry IPv6 services.
35 Huawei Confidential
• Overall strategy: Deploy IPE single stack to carry both IPv4 and IPv6 services, and
gradually evolve office, production, management, and other services from IPv4 to
IPv6.
▫ Integration verification: Design and verify the IPE evolution solution and
prepare a feasibility report.
▫ Service cutover: Gradually migrate services from the traditional WAN to the
new IPv6 WAN based on diversified service requirements.
▫ O&M observation: After services are migrated from the traditional network
to the IPE network, set an observation period to observe the service running
status.
▫ Legacy network removal: Remove the legacy network only when there are
no major service issues during the observation period. The IPE evolution of
the WAN is then complete.
Overview DC WAN Campus Network Other Systems
Step 1: Prepare for the Step 2: Reconstruct the edge and Step 3: Reconstruct the entire
evolution. enable basic IPE capabilities. network and enable higher-order IPE
capabilities.
Lower-
Lower-level Lower-level level Traditional
Traditional Traditional
subnet subnet subnet DC
DC DC
Upgrade some devices to support IPE and deploy Upgrade all WAN devices to support IPE and
SRv6 and IP/MPLS, so that these devices can deploy SRv6 for these devices to transmit IPv6
transmit both IPv6 and IPv4 services. services.
37 Huawei Confidential
• Overall strategy: Upgrade and replace nodes one by one from the edge to the
core. Gradually deploy IPE features (simple features first, then complex features)
and cut over services (common services first, then critical services).
▫ Integration verification: Design and verify the IPE evolution solution and
prepare a feasibility report.
PE1 ASBR1 ASBR3 PE3 • For different service scenarios, the SRv6 WAN bearer
solution uses SRv6 at the overlay layer to carry Layer 2,
IPv4, and IPv6 services and IPv6 single stack at the
underlay layer. This design prevents the IGP from
PE2 ASBR2 ASBR4 PE4 maintaining both IPv4 and IPv6 protocol stacks, reducing
IGP IGP the pressure on device protocol maintenance.
Underlay MP-BGP MP-BGP MP-BGP Basic ▫ The underlay layer uses routing protocols such as IS-IS for IPv6
routing and MP-BGP to advertise basic routes (such as loopback routes
and SRv6 locator routes), delivering basic IPv6 route reachability
EVPN VPWS over SRv6
Layer 2 service and laying a foundation for SRv6 to carry overlay services.
L3VPNv4/EVPN L3VPNv4 over SRv6 ▫ The overlay layer selects different BGP address families based
Overlay IPv4 service
L3VPNv6/EVPN L3VPNv6 over SRv6 on service types to transmit user information (such as IP and
IPv6 service MAC address information).
39 Huawei Confidential
▫ Layer 3 IPv6 services: Use either SRv6 L3VPNv6 or SRv6 EVPN L3VPNv6.
Using SRv6 EVPN L3VPNv6 is recommended.
Overview DC WAN Campus Network Other Systems
BGP EPE/BGP-LS
PE1 PE2 PE3 PE4
P1 P2
PE2 PE4
IS-IS for IPv6 (Level 2)
Loopback route
Locator route
IBGP
EBGP
40 Huawei Confidential
• Loopback routes and SRv6 locator routes need to be advertised in an IGP domain.
Loopback routes are used for network management or BGP peer relationship
establishment. Locator routes are used to guide the forwarding of data traffic
over SRv6 tunnels in an IGP domain.
• BGP Egress Peer Engineering (EPE) is used to allocate SRv6 SIDs to BGP peers
between ASs in inter-AS scenarios.
Overview DC WAN Campus Network Other Systems
41 Huawei Confidential
Overview DC WAN Campus Network Other Systems
advertisement
IS routes. IS routes.
2002:1::/64 2002:1::/64
Route
Advertises Advertises the EVPN route 2100::1/128, Advertises
IPv6 routes. with the next hop being PE2, and the IPv6 routes.
2100::1/128 VPN SID being 2002:1::D100. 2100::1/128
Data forwarding
SA=2001:1::1 SA=2001:1::1
DA=2002:1::D100 DA=2002:1::D100
SA=2200::1 SA=2200::1 SA=2200::1 SA=2200::1
DA=2100::1 DA=2100::1 DA=2100::1 DA=2100::1
Payload Payload Payload Payload
Note: SRv6 BE route advertisement and
data forwarding are used as an example.
42 Huawei Confidential
• Route advertisement:
1. PE2 generates an End SID based on the configured SRv6 locator.
2. PE2 advertises the locator route 2002:1::/64 corresponding to the specified
End SID to PE1 through an IGP. PE1 installs the route to its IPv6 routing
table.
4. After receiving the VPN IPv6 route advertised by CE2, PE2 converts it into
an EVPN IP prefix route and advertises it to PE1 through the BGP EVPN
peer relationship. The route carries an SRv6 VPN SID — VPN End.DT6 SID
2002:1::D100.
5. After receiving the EVPN route, PE1 leaks it to the IPv6 routing table of the
corresponding VPN instance, converts it into a common IPv6 route, and
advertises it to CE1.
• Data forwarding:
1. CE1 sends a common IPv6 packet to PE1.
2. After receiving the packet through the interface bound to a VPN instance,
PE1 searches the IPv6 routing table of the corresponding VPN instance for
a matching IPv6 prefix and finds the associated SRv6 VPN SID and next
hop. Then, the device directly uses the SRv6 VPN SID 2002:1::D100 as the
destination address and encapsulates the packet into an IPv6 one.
3. PE1 finds the route 2002:1::/64 based on the longest match rule and
forwards the packet to the P device over the shortest path.
4. Similarly, the P device finds the route 2002:1::/64 based on the longest
match rule and forwards the packet to PE2 over the shortest path.
5. PE2 searches Local SID Table based on 2002:1::D100 and finds a matching
End.DT6 SID. According to the instruction bound to the SID, PE2 removes
the IPv6 header and searches the IPv6 routing table of the VPN instance
corresponding to the End.DT6 SID for packet forwarding.
• Note:
Phase 1 (IPv6 dual stack) Phase 2 (IPv6 dual stack) Phase 3 (IPv6 only)
• IPv4 for management networks • Dual stack for management networks • IPv6 only for management networks
• Dual stack for campus egress networks • Dual stack for campus egress networks • IPv6 only for campus egress
• Underlay IPv4 + overlay dual stack for • Underlay IPv6 + overlay dual stack for networks
campus networks campus networks • IPv6 only for campus networks
⚫ After an enterprise campus network completes dual-stack reconstruction, terminals on the network can access both
IPv4 and IPv6 services.
⚫ Generally, the IPv6 capabilities of live network devices need to be evaluated during the reconstruction of existing
networks. If their IPv6 capabilities do not meet the reconstruction requirements, these devices need to be replaced
or upgraded.
44 Huawei Confidential
▪ In the scenario where only a single Internet private line is leased for
backhaul, the campus egress generally connects to the intranet over
an IPsec tunnel. One of the following solutions can be used: dual-
stack traffic over IPsec6, dual-stack traffic over IPsec4, and dual-stack
traffic over GRE over IPsec6/4.
▪ In the scenario where only an MPLS VPN private line is leased for
backhaul, the MPLS VPN private line needs to be upgraded to support
IPv4/IPv6 dual-stack connections. Campus egress routes can flexibly
interwork with carriers' MPLS VPN private lines using BGP, IGP, or
static routes.
46 Huawei Confidential
47 Huawei Confidential
48 Huawei Confidential
▫ If multiple egresses are involved, BGP can be used for interconnection with
external networks and IGPs can be used to advertise default routes on the
internal network. The campus network internally advertises default egress
routes to ensure that internal service packets can reach egress routers. The
egress routers connect to the Internet using BGP to implement optimal
path selection and load balancing.
Overview DC WAN Campus Network Other Systems
49 Huawei Confidential
Overview DC WAN Campus Network Other Systems
Access layer
AP AP
Terminal layer
50 Huawei Confidential
• Service forwarding:
▫ The overlay IPv6 design is similar to the original overlay IPv4 design. The
underlay configuration from the access layer to the core layer remains
unchanged. The VXLAN control plane uses BGP EVPN, and core switches are
configured as RRs. Enable IPv6 on the centralized gateway and configure an
IPv6 address for the VBDIF interface to ensure Layer 2 IPv6 communication.
▫ Edge nodes on the access side can associate forwarded packets with overlay
BDs based on interface VLANs, enabling terminals to be assigned to
different gateway areas. In VXLAN Layer 3 forwarding, terminal packets are
first advertised to the centralized gateway, and horizontal and vertical
traffic are forwarded by the gateway in a unified manner.
▫ For design details about internal network interconnection and external
network interconnection involved in the network egress zone, see the
traditional campus network solution.
• Access authentication:
▫ Edge nodes on the campus network provide access for dual-stack users.
Single authentication and dual-stack service policy association needs to be
implemented for dual-stack users. This helps prevent dual-stack terminals
from undergoing two separate authentications when accessing IPv4 and
IPv6 services.
▫ A campus network with VXLAN underlay IPv4 + overlay dual stack must
support various authentication modes (such as 802.1x, Portal, and MAC
address authentication) for IPv6 users, so that authentication schemes can
be implemented flexibly based on user terminals (such as Portal
authentication for guest terminals and 802.1x authentication for internal
office terminals). The deployment of network authentication points, policy
enforcement points, and access points in the IPv6 solution is consistent with
that in the original IPv4 solution. The authentication server uses a unified
controller to provide authentication policy services.
Overview DC WAN Campus Network Other Systems
Egress zone
AC
• As shown in the figure, an AC connects to core
Core layer
switches in bypass mode, and APs connect to access
L3 switches. The APs are configured with multiple SSIDs
Aggregation layer
L2
for IPv6 single-stack users using internal office
terminals and guest terminals to access the wireless
Access layer network. The authentication point is on the AC.
AP
Terminal layer
CAPWAP6 tunnel
51 Huawei Confidential
• AP management solution:
▫ The CAPWAP tunnel supports both IPv4 and IPv6. However, only IPv4 or
IPv6 can be selected at one time. That is, the AC can manage APs only in
either IPv4 or IPv6 mode. The default mode is IPv4.
▫ APs can go online in either IPv4 or IPv6 mode. That is, an AP can obtain
only one IP address. The AC's IP address is manually configured. The AC can
use DHCPv6 or SLAAC to assign IP addresses to APs.
• Note: You can run the capwap ipv6 enable command to enable the IPv6
function for the CAPWAP tunnel.
Overview DC WAN Campus Network Other Systems
52 Huawei Confidential
Overview DC WAN Campus Network Other Systems
53 Huawei Confidential
1. (Multiple-answer question) Which of the following deployment solutions may be used during WAN
IPv6 evolution? ( )
A. Dual stack
B. 6VPE
C. SRv6
2. (True or false) IPE technologies include network programming, network slicing, deterministic
networking, in-band flow measurement, new multicast, and application awareness. ( )
A. True
B. False
54 Huawei Confidential
1. ABC
2. A
Summary
⚫ Enterprise networks generally involve DCNs, WANs, and campus networks. IPv6 evolution
needs to take into consideration the overall capability upgrade and coordination of
applications, terminals, and networks to ensure that the user experience of existing services
is not affected during IPv6 evolution. IPv6 solution design must ensure smooth and
continuous network evolution. During the solution design, consider using the optimal IPv6
technologies to build next-generation IPv6 informatization infrastructure and facilitate
sustainable service development.
⚫ This course describes the evolution trends of IPv6 networks in scenarios such as DCs, WANs,
and campus networks and the technical application of IPE technologies.
55 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
4. Network AI
3 Huawei Confidential
Background: Complex Networks
⚫ From the first day when the computer network is generated, the network is complex and difficult to
manage, which is reflected in the following aspects:
There are various network devices such as routers, switches, firewalls, and intrusion detection system (IDS).
Devices from different or even the same vendors are managed in different ways.
Complex devices result in complex network management.
4 Huawei Confidential
• There are different device management modes, such as SNMP, CLI, IPFIX, and Web UI.
Background: Network Architecture Transformation
⚫ Software defined networking (SDN) brings about network architecture transformation. It introduces a network
controller to implement centralized control from a global perspective, achieving objectives such as fast service
deployment, traffic optimization, and network service openness.
NBI
SBI
Data
Device layer
forwarding
5 Huawei Confidential
• NBIs: NBIs are used by the controller to interconnect with the orchestration application
layer. The main NBIs are RESTful interfaces.
• SBIs: SBIs are protocols used for interaction between the controller and devices,
including NETCONF, SNMP, OpenFlow, and OVSDB.
Basic Network Automation
⚫ Network automation means that tools are used to implement automatic network deployment,
operation, and maintenance, gradually reducing the dependency on human resources.
⚫ There are many open-source tools that implement network automation in the industry, such as Ansible,
SaltStack, Puppet, and Chef. These tools connect to devices through SSH to implement batch operation
and management, achieving basic network automation.
Network automation
Chef keywords SaltStack
NMS
tool
6 Huawei Confidential
• Network automation tools implement basic network automation. That is, tools connect
to devices through SSH to implement batch operation and management.
Development of Network Automation
⚫ In basic network automation, networks are managed on the CLI. The pain point is that network devices return
unstructured data (text display), which is inconvenient for computers to process. The basic requirement of network
automation development is that devices provide structured data, which can greatly promote the development of
network automation. Devices provide NETCONF/RESTCONF interfaces to provide data in XML or JSON format.
Structured data: easy to understand for machines
{ "Interfaces":
{ "GigabitEthernet0/0/0":
Unstructured data: easy to understand for humans { "InUti": "10", "OutUti": "20", "inErrors": "0", "outErrors":
Interface InUti OutUti inErrors outErrors "0" },
GigabitEthernet0/0/0 10% 20% 0 0 "GigabitEthernet0/0/1":
GigabitEthernet0/0/1 20% 30% 0 0 {"InUti": "20", "OutUti": "30", "inErrors": "0",
... "outErrors":"0"}
}
}
CLI/SSH, SNMP
NETCONF, RESTCONF
Network devices
7 Huawei Confidential
• Unstructured data can be easily understood by humans, but it is difficult for machines
to understand and difficult for automatic data collection.
Network Openness and Programmability
⚫ Network openness and programmability is to use programming methods to implement automated
networks on the premise of open networks.
⚫ In the early stage of SDN commercial use and in the future, traditional networks and SDN networks
will coexist on a large scale. Network openness is implemented at two levels: device openness and SDN
platform openness. RESTful API
Intent
Design Conversion
Verification
Intent engine
Automation Analytics
Management unit Control unit Decision
Sensing Analysis
making
Automation engine
Analytics engine
9 Huawei Confidential
• iMaster NCE is not only a controller, but also provides analysis and network
management functions.
Contents
4. Network AI
10 Huawei Confidential
Network Automation Engineers
⚫ Network engineers:
Network engineers are professionals who master network technologies, have professional skills,
competence, and project management experience in the network engineering field. They are able to
fully communicate with customers or other project stakeholders onsite. In addition, they can
develop implementation solutions and project plans (recognized by project stakeholders) based on
customer requirements and environment factors, fully mobilize resources of all parties to ensure
timely and high-quality project implementation, and provide training for stakeholders and deliver
engineering documents after the project is implemented.
11 Huawei Confidential
Comprehensive Competence Model
⚫ Compared with the comprehensive competence model of network engineers, network automation
engineers have the same basic competence and professional skills, but have different skill requirements
in terms of expertise.
12 Huawei Confidential
Expertise
⚫ The expertise of network automation engineers must be all-rounders who master skills of network
engineers, system engineers, and development engineers to some extent, including but not limited to
the following capabilities:
Source code management Source code control to help developers manage and store code
Operating system (OS) Understanding the basic principles and mechanism of the OS
Network technology A good command of basic network protocol principles and network engineering technologies
Open network architecture A good command of the data structure and resource structure of open networks
Other professional knowledge Other related professional knowledge, such as database knowledge
13 Huawei Confidential
• Network automation developers may need to have more professional knowledge, such
as database, algorithm, cryptography, software development lifecycle management,
development framework, big data, cloud computing, and artificial intelligence (AI),
depending on the specific work content and scenario.
Contents
14 Huawei Confidential
Device Openness and Programmability
⚫ Device openness and programmability aim to provide engineers with guidance on how to implement network
automation through programming based on device openness capabilities.
⚫ The following figure shows the open capabilities of Huawei network devices. This course module focuses on how to
use Python modules. Python code
#!/usr/bin/env python
...
15 Huawei Confidential
• Part 1 of this course module describes how to use Python modules, including
paramiko, pysnmp, ncclient, requests, and grpc, to communicate with devices.
• Part 2 focuses on the OPS. The OPS refers to open programmability provided by
Huawei devices. You can upload Python code to a device, and the device runs the code
to implement specified functions.
NCE Northbound Openness
⚫ The openness and programmability of the controller provide engineers with guidance on how to implement
network automation through programming based on the open capabilities of the SDN controller.
⚫ Huawei iMaster NCE includes controllers and provides northbound RESTful APIs. This course module focuses on how
to use tools to invoke NCE NBIs.
RESTful API
Network devices
16 Huawei Confidential
Huawei NCE Service Openness and Programmability
RESTful API Web UI
• NCE service openness and programmability is a
Open programmability subsystem of NCE. It provides E2E programing
framework of Huawei NCE
capabilities including the openness of NE-layer
17 Huawei Confidential
• An SND abstracts device capabilities based on a device YANG model. A user can
generate an SND based on device YANG files and a few Python code. After the SND is
uploaded to NCE, device management and service provisioning can be implemented.
SND types include NETCONF SNDs, CLI SNDs, and customized SNDs.
▫ NETCONF SND: provides the capability of converting YANG files into NETCONF
files.
▫ CLI SND: provides the conversion capability from YANG to CLI.
4. Network AI
19 Huawei Confidential
AI: New General Purpose Technology
9000 BC to 1000 AD 15th to 18th Century 19th Century 20th Century 21st Century
20 Huawei Confidential
• General Purpose Technology (GPT) is the main driving force for economic and social
transformation. From the agricultural society to the industrial society and then to the
information society, the production mode, life mode, and management mode of the
human society have undergone tremendous changes and experienced unprecedented
economic and social transformation. For a long time, people have been thinking and
exploring the drivers of economic and social development and transformation. From
the first technological revolution represented by steam engine to the second
technological revolution represented by electricity technology, looking at the industrial
and technological revolution of the past 300 years, we can see that science and
technology are important sources for promoting sustained economic growth. AI has
become a new general purpose technology. Currently, popular AI technologies are
being implemented, enabling a wide range of industries.
• https://en.wikipedia.org/wiki/General_purpose_technology
L2 L3 L4 L5
L0 L1
Partially Restricted Highly Fully
Definition/Level Manual Tool-assisted
autonomous autonomous autonomous autonomous
operation automation
networks networks networks networks
Repeated
Man Man-Machine Machine Machine Machine Machine
execution
Context
Man Man Man-Machine Machine Machine Machine
awareness
Analysis and
Man Man Man Man-Machine Man-Machine Machine
decision-making
Service
Man Man Man Man Man-Machine Machine
experience
Service
Public ICT
Scope N/A Subtask level Unit level Domain level level/Cross-
infrastructure
domain
21 Huawei Confidential
Many Challenges in AI Implementation
Data optimization
Model upgrade
22 Huawei Confidential
• Technically, AI case training requires joint development across domains (such as data,
algorithm, and expert experience). Model optimization requires continuous iterative
training, which has the following difficulties:
23 Huawei Confidential
Example: Intelligent Traffic Sorting
⚫ Requirement description:
Data center networks carry various services, including big data, distributed storage, high-
performance computing, and GPU cluster services. Traffic sorting is a process in which
data center switches identify and classify traffic packets and determine the service to
which each data flow or data packet belongs.
It is required that an AI algorithm for traffic classification be implemented based on the
embedded AI platform APIs (compatible with TensorFlow and Caffe) of Huawei's AI
Fabric switches.
24 Huawei Confidential
Training of the Intelligent Traffic Sorting Model
⚫ The dataset, algorithm model, and training environment required for intelligent traffic
sorting can be provided by the iMaster NAIE.
Training dataset
Training result
Algorithm model
(prediction result)
Training environment
Test dataset
iMaster NAIE
25 Huawei Confidential
• The final objective of the experiment is to deploy the trained model in a real
environment. Therefore, it is expected that the trained model can obtain a good
prediction effect on real data. That is, it is expected that a smaller error between a
prediction result of the model and the real result on real data is better. The best
method is to divide real data into a training dataset and a test dataset. We can use the
training dataset to train the model, and then use the error of the test dataset as the
error of the final model in actual scenarios. With the test dataset, to verify the final
effect of the model, we can calculate the error of the trained model only based on the
test dataset. A smaller error indicates a better algorithm model.
• For detailed operations, see the following website:
https://devstar.developer.huaweicloud.com/devstar/code-
templates/e9078ee2d7024ffabbac3f8fd1bad806
• For more information about AI, refer to Huawei AI certification documents.
Quiz
B. SNMP
C. OpenFlow
D. RESTful
26 Huawei Confidential
1. ABC
Summary
⚫ Network programing and automation is to use programming methods to implement automated
networks on the premise of open networks. Network openness is implemented at two levels: device
openness and SDN platform openness.
⚫ Network automation engineers must be all-rounders who master skills of network engineers, system
engineers, and development engineers to some extent to support enterprise network automation.
⚫ This course consists of four modules: programming basics, device openness and programmability, NCE
northbound openness, and NCE service openness and programmability. Next, let's learn network
programmability.
⚫ The combination of network and AI is the development trend of the network industry.
⚫ Huawei iMaster NAIE provides network-based AI services, making network AI openness easier.
27 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
⚫ To achieve efficient O&M and enhance agility amid increasingly complex service
requirements and network architecture, network automation is gaining
momentum and ever evolving. Currently, Secure Shell (SSH) is the most common
method used by engineers to log in to devices for remote management. As such,
engineers are expected to learn about and use an automation tool to implement
SSH remote login, simulate man-machine interaction with O&M personnel, and
automatically transfer files.
⚫ In this course, we will use the Python Paramiko module to write automation scripts
to implement SSH-based preliminary network automation.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. Introduction to SSH
◼ Overview of SSH
3. SSH Practices
3 Huawei Confidential
Overview of SSH
⚫ Secure Shell (SSH) is a protocol for secure remote login and other secure network services over an
insecure network.
⚫ SSH consists of the following sub-protocols: SSH transport layer protocol, SSH user authentication
protocol, and SSH connection protocol.
User
SSH connection protocol Establishes a session connection.
Authentication
Protocol
SSH user authentication Authenticates users (password and key).
protocol
SSH transport layer Negotiates the version and algorithm and exchanges keys.
protocol
4 Huawei Confidential
SSH Transport Layer Protocol
⚫ SSH transport layer protocol is a secure transport protocol. The SSH transport layer is usually
established over TCP/IP connections. It can also be established over any other reliable data flow.
⚫ The SSH transport layer protocol negotiates all key exchange algorithms, public key algorithms,
symmetric encryption algorithms, and message authentication algorithms.
5 Huawei Confidential
• The SSH transport layer protocol uses the Diffie-Hellman key exchange algorithm to
implement PFS.
• For details, see section 9.3.7 "Forward Secrecy" in RFC 4251
(https://www.ietf.org/rfc/rfc4251.txt).
SSH User Authentication Protocol
⚫ The SSH user authentication protocol authenticates the client-side user to the server. It runs over the
transport layer protocol.
⚫ The SSH user authentication protocol provides two authentication methods: password authentication
and public key authentication.
Password authentication: The client uses the user name and password for authentication before successfully
logging in to the server.
Public key authentication: The server decrypts the digital signature of the client by using a public key.
6 Huawei Confidential
session
SSH connection
X11
forwarded-tcpip
direct-tcpip
7 Huawei Confidential
• A TCP/IP connection can forward network data of other TCP ports through SSH
channels, ensuring security.
• Data of Telnet, SMTP, IMAP, and other TCP/IP-based insecure protocols can be
forwarded through SSH, which prevents the transmission of user names, passwords,
and privacy information in plaintext and therefore enhances security. In addition, if the
firewall restricts the use of some network ports but allows the SSH connection,
communication can be implemented through the SSH TCP/IP connection.
• In X11, X refers to the X protocol, and 11 is the eleventh version of the X protocol. The
Linux graphical user interface (GUI) is based on the X protocol at the bottom layer.
When remote interaction with graphical applications on the Linux server is required, a
method for enhancing communication security is to use SSH to display the GUI on the
local client through the X11 tunnel.
• A session is a remote execution of a program. A program can be a shell, an
application, a system command, or some built-in subsystems. Multiple session channels
can be active at the same time. An interactive login session can be implemented using
the invoke_shell() method, and the remote command can be implemented using the
exec_command() method, which will be described in detail later.
Contents
1. Introduction to SSH
▫ Overview of SSH
◼ Working Principles of SSH
3. SSH Practices
8 Huawei Confidential
Working Principles of SSH
⚫ In the entire communication process, to implement a secure SSH connection, the server and client go through the following five
phases:
Version negotiation phase: Two versions of SSH are available: SSH Version 1 (SSHv1) and SSH Version 2 (SSHv2). The server and client determine the
version to be used through negotiation.
Algorithm negotiation phase: SSH supports multiple encryption algorithms. The server and client negotiate the encryption algo rithm to be used based
on the algorithms that they support.
Key exchange phase: A session key is generated by using a key exchange algorithm. The subsequent sessions between the server and client are
encrypted by using the session key.
User authentication phase: The SSH client sends an authentication request to the server, and the server authenticates the SSH client.
Session interaction phase: After the authentication succeeds, the server and client exchange information.
User
Transport Layer Connection
Authentication
Protocol Protocol
Protocol
Client Server
9 Huawei Confidential
Version Negotiation Phase
⚫ The client and server exchange SSH version negotiation packets to determine whether to use SSHv1 or SSHv2.
Client Server
10 Huawei Confidential
• Port 22 is enabled on the server, waiting for the client to connect. The client initiates a
TCP connection to the server. The two parties complete the handshake and establish a
connection. The client sends a packet to the server. The packet contains the version
field, in the format of Major version number.Secondary version number-Software
version number. After receiving the packet, the server parses it to obtain the protocol
version number. If the protocol version number of the client is earlier than that of the
server and the server supports the earlier version of the client, the server uses the
protocol version number of the client. Otherwise, the server uses its own protocol
version number.
Algorithm Negotiation Phase
⚫ The client and the server exchange a list of algorithms that they support. The list includes specific names of the four types of
supported algorithms.
11 Huawei Confidential
• The algorithm negotiation process is as follows: The server obtains the first algorithm
from the algorithm list of the client and searches its own algorithm list for the same
algorithm. If the same algorithm is found, the negotiation succeeds, and the server
continues to negotiate the algorithm of the next type. Otherwise, the server searches
its own algorithm list for the next algorithm in the client's algorithm list until a match
is found.
Key Exchange Phase
⚫ Based on the key exchange algorithm, the server and client dynamically generate a session key for subsequent
session encryption. The session key cannot be intercepted by a third party, enhancing security and reliability.
Client Server
The server and client agree on the prime
Data numbers p and g. Data
The client generates a random private key Xc, calculates a p, g
p, g public key Yc, and sends the public key Yc to the server.
1
Xc Xs
The server generates a random private key Xs, calculates the
Yc public key Ys, and sends the public key Ys to the client. 2
Ys
The client calculates the session The server calculates the session
key based on the public key Ys key based on the public key Yc
3 4
and private key Xc. and the private key Xs.
12 Huawei Confidential
• The client and the server first agree on two public prime numbers p and g.
• The client and server each randomly generate a private key Xc and Xs, respectively.
• The client and server each calculate their own public key Yc and Ys, respectively.
• The client and server calculate the session key for encryption based on the public and
private keys.
• The Diffie-Hellman key exchange algorithm is used for key exchange, which is based
on the mathematical discrete logarithm and is not described in this course. During key
exchange, the private keys Xc and Xs are not transferred and, due to the difficulty in
computing discrete logarithms, they cannot be decrypted by other users even if p, g,
Yc, and Ys are obtained. This ensures the confidentiality of the session keys.
• Note that the public and private keys generated in this phase are used only to
generate session keys and are irrelevant to subsequent user authentication. After the
key exchange phase is complete, all subsequent packets are encrypted based on the
session keys.
User Authentication Phase: Password Authentication
⚫ There are two user authentication modes: password authentication and public key authentication.
⚫ During password authentication, the client sends an authentication request carrying the user name and password,
and the server authenticates the received user information against the local user information.
Client Server
SSH_MSG_USERAUTH_REQUEST
Initiate an 1
authentication request.
13 Huawei Confidential
User Authentication Phase: Public Key Authentication
⚫ During public key authentication, a client sends an authentication request carrying a digital signature,
and the server decrypts the digital signature based on the public key to implement authentication.
Client Server
Authentication
publickey
method
Public key algorithm ssh-rsa/ssh-dss …
Decrypt the digital signature using the
Public key ssh-rsa AAAAB3NzaC1yc2EA… locally stored public key, and check the
Contains data such as the user name, correctness of the public key and digital
Digital signature session ID, public key algorithm, and
public key. signature provided by the client. If they
2 are correct, an authentication success
SSH_MSG_USERAUTH_SUCCESS message is returned.
14 Huawei Confidential
• The digital signature is encrypted by client’s private key. To see the content, we need
public key to decrypt it.
Session Interaction Phase
⚫ After the user is authenticated, the client sends a request to the server for establishing a channel to
transmit data. Client Server
SSH_MSG_CHANNEL_OPEN
Initiate a request 1
to establish a
session channel.
SSH_MSG_CHANNEL_OPEN_CONFIRMATION
2
Check whether the channel type is
supported. If so, a message is
returned, indicating that the session
Transmit data. channel is successfully created.
15 Huawei Confidential
• For details, see section 4.9.1 "Connection Protocol Channel Types" in RFC4250 at
https://www.ietf.org/rfc/rfc4250.txt.
1. Introduction to SSH
3. SSH Practices
16 Huawei Confidential
Overview of Paramiko
⚫ Paramiko is a Python module that implements the SSHv2 protocol. It supports
password authentication and public key authentication and implements functions
such as secure remote command execution and file transfer.
⚫ Engineers can compile Python code based on the Paramiko module to implement
SSH functions.
Paramiko Script
17 Huawei Confidential
• In HCIA courses, we learned how to use the telnetlib module for Telnet remote
connections. In the production environment, the more secure Paramiko module is
recommended for SSH remote connections.
Paramiko Component Architecture
⚫ The following figure shows the components of the Paramiko module. SSHClient and SFTPClient are its
most commonly used classes, which provide the SSH and SFTP functions, respectively.
Key Key-related
SSH agents Host keys
handling classes
Common
Channel Message Packetizer Transport SSHClient SFTPClient protocol
classes
Paramiko
18 Huawei Confidential
Common Paramiko Classes
⚫ Channel: This class is used to create a secure channel over the SSH transport layer.
⚫ Message: An SSH message is a stream of bytes that encodes some combinations of strings, integers,
bools, and infinite-precision integers (known in Python as longs).
⚫ Packetizer: This class is used for packet handling.
⚫ Transport: This class is used to create a transport session object over an existing socket or socket-like
object.
⚫ SFTPClient: This class creates an SFTP session connection through an open SSH transport session and
performs remote file operations.
⚫ SSHClient: This class is an advanced representation of a session with the SSH server. This class
integrates the Transport, Channel, and SFTPClient classes.
Common
Channel Message Packetizer Transport SSHClient SFTPClient protocol
classes
19 Huawei Confidential
• The Channel class provides methods for executing commands, requesting X11 sessions,
sending data, and opening interactive sessions. Generally, these common methods
from the Channel class have been packaged in the SSHClient class.
• The Message class provides methods for writing bytes to a stream and extracting
bytes.
• The Packetizer class provides methods for checking handshakes and obtaining channel
IDs.
• The Transport class provides methods such as public key authentication, private key
authentication, and channel opening.
• The SSHClient class provides methods for establishing connections and opening
interactive sessions.
• The SFTPClient class provides methods such as file upload and download.
Key-Related Classes of the Paramiko Module
⚫ SSH Agent: This class is used for the SSH agent.
⚫ Host keys: This class is related to the OpenSSH known_hosts file and is used to
create a host keys object.
⚫ Key handling: This class is used to create instances of the corresponding key type, for
example, RSA keys and DSS (DSA) keys.
20 Huawei Confidential
Transport class
Set up an SSH session
connection tran.connect(username=‘client’, pkey=key)
SFTPClient class
Send related instructions sftp = paramiko.SFTPClient.from_transport(tran)
sftp.get(remote_path, local_path)
Transport class
Close the session channel
tran.close()
21 Huawei Confidential
• This course describes methods of four classes: Transport, key handling, SSHClient, and
SFTPClient.
• This process uses the Paramiko SFTP session as an example. Because the SSHClient
class integrates the Transport, Channel, and SFTPClient classes, the preceding methods
can be implemented by the SSHClient class. This is especially true for SSH sessions.
Contents
1. Introduction to SSH
3. SSH Practices
22 Huawei Confidential
Transport Class and Its Methods
⚫ Transport class: An SSH transport connects to a stream (usually a socket) to negotiate and encrypt
sessions and perform authentication. Channels can then be created based on the encrypted sessions.
Multiple channels can be multiplexed in a single session connection (in fact, this is often the case, such
as port forwarding).
⚫ The following is an example of the method:
tran = paramiko.Transport(('192.168.56.100', 22))
tran.connect(username=‘client’, password=‘test’)
23 Huawei Confidential
• For ease of use, you can use an address (as a tuple) or a host string as the sock
parameter. The host string is the host name with an optional port, separated by a
colon (:). If a port is transferred, it is converted to a tuple in the format (host name,
port).
Contents
1. Introduction to SSH
3. SSH Practices
24 Huawei Confidential
Key Handling Class and Its Methods
⚫ The key handling class is used to create instances of the corresponding key type, for example, RSA keys
and DSS (DSA) keys. This class provides methods for reading and writing keys.
⚫ The following is an example of the method:
key=paramiko.RSAKey.from_private_key_file(r'C:\Users\exampleuser\.ssh\id_rsa')
DSSKey.from_private_key_file(filename) Reads the DSS private key from a file to create a key object.
25 Huawei Confidential
Contents
1. Introduction to SSH
3. SSH Practices
26 Huawei Confidential
SFTPClient Class and Its Methods
⚫ The SFTPClient class creates an SFTP session connection through an open SSH transport session and
performs remote file operations.
⚫ The following is a typical example:
key=paramiko.RSAKey.from_private_key_file(r'C:\Users\exampleuser\.ssh\id_rsa')
tran = paramiko.Transport(('192.168.56.100', 22))
tran.connect(username=‘client’, pkey=key)
sftp = paramiko.SFTPClient.from_transport(tran)
local_path=r'C:\Users\exampleuser\.ssh\vrptest.cfg'
remote_path= '/vrpcfg.cfg'
sftp.get(remote_path, local_path)
27 Huawei Confidential
Method from_transport
⚫ from_transport(): This method creates an SFTP client channel from the enabled Transport session
channel.
⚫ The following is an example of the method:
t = paramiko.Transport((‘192.168.56.100’, 22))
sftp = paramiko.SFTPClient.from_transport(t)
Parameter Description
T An authenticated and enabled Transport session, in the format of (hostname,port).
max_packet_size Maximum size of the SFTP session window. This parameter is optional.
28 Huawei Confidential
Method get
⚫ get(): This method copies a remote file (specified by remotepath) from the SFTP server to the
destination path (specified by localpath) on the local host. Any exception raised by operations will be
passed through.
⚫ The following is an example of the method:
local_path=r'C:\Users\exampleuser\.ssh\vrptest.cfg'
remote_path= '/vrpcfg.cfg'
sftp.get(remote_path, local_path)
Parameter Description
remotepath Remote file.
Destination path on the local host. The path must contain the file name. If only a directory is
localpath
specified, an error may occur.
29 Huawei Confidential
Method put
⚫ put(): This method copies a local file (specified by localpath) from the local host to the destination
path (specified by remotepath) on the SFTP server. Any exception raised by operations will be passed
through.
⚫ The following is an example of the method:
local_path=r'C:\Users\exampleuser\.ssh\vrptest.cfg'
remote_path= '/vrpcfg.cfg'
sftp.put(localpath, remotepath)
Parameter Description
localpath Local file.
Destination path on the SFTP server. The path must contain the file name. If only a directory
remotepath
is specified, an error may occur.
30 Huawei Confidential
Contents
1. Introduction to SSH
3. SSH Practices
31 Huawei Confidential
SSHClient Class and Its Methods
⚫ The SSHClient class is an advanced representation of a session with an SSH server. This class contains
the Transport, Channel, and SFTPClient classes for session channel establishment and authentication.
The following is a typical example:
client=paramiko.client.SSHClient()
client.connect(hostname=192.168.56.100’,port=22,username=‘client’,password=‘123456’)
stdin,stdout,stderr=client.exec_command(‘ls –l’)
32 Huawei Confidential
Method connect
⚫ connect(): This method is used to connect to a remote server and implement authentication.
⚫ The following is an example of the method:
client.connect(hostname='192.168.56.100',port=22,username=‘client',key_filename='id_rsa')
client.connect(hostname='192.168.56.100',port=22,username=‘client',password=‘123456')
Parameter Description
hostname Target host to be connected. Only this parameter is mandatory.
port Specified port. The default value is 22.
username User name for authentication. This parameter is left empty by default.
password Password of the user to be authenticated. This parameter is left empty by default.
key_filename Private key file name or list. This parameter is left empty by default.
pkey Private key used for identity authentication.
... ...
33 Huawei Confidential
Method set_missing_host_key_policy
⚫ set_missing_host_key_policy(): This method specifies a policy to be used when the connected server
does not have a known host key.
⚫ The following is an example of the method:
client.set_missing_host_key_policy(paramiko.client.AutoAddPolicy())
Parameter Description
Automatically adds the host name and host key to the local HostKeys object, without
AutoAddPolicy depending on the configurations of the load_system_host_keys method. That is, when a new
SSH connection is set up, you do not need to enter yes or no for confirmation.
Logs a Python-style warning for an unknown host key and accepts it. This method provides
WarningPolicy functions similar to AutoAddPolicy. The difference lies in that this method will display a
message, indicating that the connection is a new connection.
Automatically rejects the unknown host name and key. This method depends on the
RejectPolicy
configuration of the load_system_host_keys method. This is the default option.
34 Huawei Confidential
• OpenSSH records the public key of each computer that a user has accessed in
~/.ssh/known_hosts. When the same computer is accessed next time, OpenSSH checks
the public key. If the public keys are different, OpenSSH generates a warning to
prevent man-in-the-middle attacks. Generally, when a client connects to the SSH
server for the first time, you need to enter Yes or No for confirmation.
Method load_system_host_keys
⚫ load_system_host_keys(): This method loads the host key from the system file. If no parameter is
specified, the system attempts to read the key from the known hosts file on the local host.
⚫ The following is an example of the method:
client.load_system_host_keys(filename)
Parameter Description
filename File name. This parameter is left empty by default.
35 Huawei Confidential
Method exec_command
⚫ exec_command(): This method is used to run Linux commands on a remote server.
⚫ The following is an example of the method:
36 Huawei Confidential
Method invoke_shell
⚫ invoke_shell(): This method starts an interactive shell session based on the SSH session connection.
⚫ The following is an example of the method:
cli = client.invoke_shell()
37 Huawei Confidential
Method open_sftp
⚫ open_sftp(): This method creates and opens an SFTP session on the SSH server.
⚫ The following is an example of the method:
sftp=client.open_sftp()
38 Huawei Confidential
Contents
1. Introduction to SSH
3. SSH Practices
◼ Practices in SSH Python Scripts
39 Huawei Confidential
Case: Using SSH to Log In to a Device
⚫ Description:
As shown in the figure below, after the STelnet server function is enabled on the switch that functions as the
SSH server, the PC functioning as the SSH client can log in to the SSH server in password or RSA authentication
mode.
This case uses RSA user authentication as an example to describe how to configure a client so that it logs in to a
server through SSH using the Paramiko module of Python.
192.168.56.100 192.168.56.1
GE1/0/0
Stelnet Server Stelnet Client
40 Huawei Confidential
Configuration Roadmap
Enable STelnet on the Configure Generate a Configure the Verify the
Compile Python code
device users key pair public key configuration
192.168.56.100 192.168.56.1
GE1/0/0
Stelnet Server Stelnet Client
Configure STelnet. Specially, configure a management IP address, ▫ Generate a key pair. Specifically, generate a public key
enable the STelnet function, and configure the user interface. and a private key locally.
Configure users. Specially, create a local user and an SSH user, ▫ Compile Python code.
and configure the service type and authentication mode for the ▫ Verify the configuration.
users.
41 Huawei Confidential
Case: Configuring STelnet on the Server
Enable STelnet on the Configure Generate a Configure the Verify the
Compile Python code
device users key pair public key configuration
192.168.56.100 192.168.56.1
GE1/0/0
Stelnet Server Stelnet Client
1. Configure an IP address for the management network port 2. Enable STelnet on the server and configure the VTY
on the server. user interface.
<HUAWEI>system-view immediately [SSH Server] stelnet server enable
[HUAWEI] sysname SSH Server [SSH Server] user-interface vty 0 4
[SSH Server] interface GE 1/0/0 [SSH Server-ui-vty0-4] authentication-mode aaa
[SSH Server-GE1/0/0] ip add 192.168.56.100 24 [SSH Server-ui-vty0-4] protocol inbound ssh
[SSH Server-GE1/0/0] quit [SSH Server-ui-vty0-4] user privilege level 3
[SSH Server-ui-vty0-4] quit
42 Huawei Confidential
Case: Configuring Users on the Server
Enable STelnet on the Configure Generate a Configure the Verify the
Compile Python code
device users key pair public key configuration
192.168.56.100 192.168.56.1
GE1/0/0
Stelnet Server Stelnet Client
3. Create a local user on the server, add the user to the administrator group, and configure the service type for the user.
4. Create an SSH user on the server and configure the authentication mode and service type for the user.
43 Huawei Confidential
Case: Creating an RSA Key Pair on the Client
Enable STelnet on the Configure Generate a Configure the Verify the
Compile Python code
device users key pair public key configuration
5. On the client, use Git Bash to create an RSA key pair (private key id_rsa and public key id_rsa.pub) and check the
public key.
exampleuser@exampleuser MINGW64 ~
Generate an RSA public/private key pair -- $ ssh-keygen -t rsa
Generating public/private rsa key pair.
Set the path for storing the key. (Press Enter to use the default path.) -- Enter file in which to save the key (/c/Users/exampleuser/.ssh/id_rsa):
Enter the pass phrase. (Press Enter to use the default pass phrase.) -- Enter passphrase (empty for no passphrase):
Enter the pass phrase again. (Press Enter to use the default pass phrase.) -- Enter same passphrase again:
Path for storing the private key file of the client. -- Your identification has been saved in /c/Users/exampleuser/.ssh/id_rsa
Path for storing the public key file of the client. -- Your public key has been saved in /c/Users/exampleuser/.ssh/id_rsa.pub
44 Huawei Confidential
Case: Configuring a Public Key on the Server
Enable STelnet on the Configure Generate a Configure the Verify the
Compile Python code
device users key pair public key configuration
6. On the server, add the public key generated by the client and allocate it to the user.
45 Huawei Confidential
7. Compile and run Python code on the client to log in to the server through SSH.
46 Huawei Confidential
Case: Verifying the Configuration on the Client
Enable STelnet on the Configure Generate a Configure the Verify the
Compile Python code
device users key pair public key configuration
8. Run the code. The current configuration of the SSH server is displayed.
Info: The max number of VTY users is 5, the number of current VTY users online is 1,
and total number of terminal users online is 2.
<SSH Server>screen-length 0 temporary
Info: The configuration takes effect on the current user terminal interface only.
<SSH Server>display cu
!Software Version V200R005C10SPC607B607
#
……
47 Huawei Confidential
Contents
1. Introduction to SSH
3. SSH Practices
▫ Practices in SSH Python Scripts
◼ Practices in SFTP Python Scripts
48 Huawei Confidential
Case: Using SFTP to Upload and Download Files
⚫ Description:
SSH File Transfer Protocol (SFTP) is a secure file transfer protocol based on SSH. SFTP not only provides all functions of FTP, but also has higher
security and reliability.
As shown in the figure below, after the SFTP server function is enabled on the switch that functions as the SFTP server, the PC functioning as a client
can log in to the SFTP server in password or RSA authentication mode to upload or download files.
This case uses RSA user authentication as an example to describe how to upload and download files on the client through SFTP using the Paramiko
module of Python.
192.168.56.100 192.168.56.1
GE1/0/0
SFTP server SFTP client
49 Huawei Confidential
Configuration Roadmap
Configure SFTP on the Configure Generate a Configure the Verify the
Compile Python code
device users key pair public key configuration
192.168.56.100 192.168.56.1
GE1/0/0
SFTP server SFTP client
Configure SFTP. Specifically, configure the management IP ▫ Generate a key pair. Specifically, generate a public key
address and enable SFTP on the device. and a private key locally.
Create a user. Specifically, create an SSH user and configure the ▫ Compile Python code.
service type, authentication mode, and SFTP path. ▫ Verify the configuration. Specifically, check the
Configure a public key. Specially, add the public key generated downloaded files.
by the client and allocate it to the user.
50 Huawei Confidential
Case: Configuring SFTP and Users on the Server
Configure SFTP on the Configure Generate a Configure the Verify the
Compile Python code
device users key pair public key configuration
192.168.56.100 192.168.56.1
GE1/0/0
SFTP server SFTP client
1. Configure the management IP address for the SFTP 2. Create the SSH user client and configure the
server and enable the SFTP server function. authentication type and service type for the user.
<HUAWEI>system-view immediately [SFTP Server] ssh user client
[HUAWEI] sysname SFTP Server [SFTP Server] ssh user client authentication-type rsa
[SFTP Server] interface GE 1/0/0 [SFTP Server] ssh user client service-type sftp
[SFTP Server-GE1/0/0] ip add 192.168.56.100 24 [SFTP Server] ssh user client sftp-directory cfcard:
[SFTP Server-GE1/0/0] quit [SFTP Server] ssh authorization-type default root
[SFTP Server] sftp server enable
51 Huawei Confidential
Case: Creating an RSA Key Pair on the Client
Configure SFTP on the Configure Generate a Configure the Verify the
Compile Python code
device users key pair public key configuration
3. On the client, use Git Bash to create an RSA key pair (private key id_rsa and public key id_rsa.pub) and check the
public key.
52 Huawei Confidential
Case: Configuring a Public Key on the Server
Configure SFTP on the Configure Generate a Configure the Verify the
Compile Python code
device users key pair public key configuration
4. On the server, add the public key generated by the client and allocate it to the user.
53 Huawei Confidential
5. Compile and run Python code on the client to log in to the server through SFTP and upload and download files.
54 Huawei Confidential
Case: Verifying the Configuration on the Server and Client
Configure SFTP on the Configure Generate a Configure the Verify the
Compile Python code
device users key pair public key configuration
6. Run the code. The client successfully downloads the specified file to the local host.
7. Run the dir command on the server. The specified file is successfully uploaded to the server.
<SFTP Server>dir
Directory of cfcard:/
55 Huawei Confidential
Quiz
56 Huawei Confidential
1. ABCDE
Summary
⚫ This course describes the concepts of Paramiko and SSH, and illustrates the working
principles of SSH.
⚫ This course also describes the components and common methods of Paramiko. In the last
part, this course uses example scripts of Python SSH and SFTP to show the use and practices
of Paramiko methods, thereby implementing preliminary network automation based on
SSH.
⚫ For more information, visit Paramiko's official website, read SSH RFC documents, and learn
upper-layer SSH libraries such as Fabric. Fabric is developed based on Paramiko and is
further encapsulated to improve SSH-based application deployment and system
management efficiency.
57 Huawei Confidential
More Information
⚫ Paramiko official websites
docs.paramiko.org/en/latest/index.html
www.paramiko.com
⚫ SSH RFC documents
https://tools.ietf.org/html/rfc4251.html
https://tools.ietf.org/html/rfc4252.html
https://tools.ietf.org/html/rfc4253.html
https://tools.ietf.org/html/rfc4254.html
Fabric official website
https://fabric-chs.readthedocs.io/zh_CN/chs/tutorial.html
58 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
2. NETCONF Protocol
4. RESTCONF Protocol
3 Huawei Confidential
Introduction to Device Data
• Data is the carrier of information. Information
that can be obtained from a running device is
SNMP Telemetry classified into configuration data and status
data.
Configuration data is writable. It can change the
Configuration system status, for example, from the initial state
Status data
data
to the current state.
CLI
Status data is read-only non-configuration data
in a system, for example, status information and
statistics information.
4 Huawei Confidential
Configuring a Network Device
⚫ You can configure and manage a device in multiple ways. You can use the console cable to directly
connect to the device or use SSH to remotely log in to the device, and then use the CLI to configure the
device. You can also use the NMS server to set parameters in the MIB node of the device through
SNMP set.
⚫ With the increase of network scale and complexity, the preceding two methods cannot satisfy the
configuration management requirements. To resolve this problem, NETCONF based on Extensible
Markup Language (XML) is introduced.
Console RESTCONF
5 Huawei Confidential
• SNMP is based on UDP and is stateless, unordered, and unreliable for configuration
management.
• SNMP can be configured for only one object, not for one service. During the concurrent
configuration of multiple objects, if some objects are successfully configured but some
objects fail to be configured, unknown impacts will be caused on the network.
• The SNMP interface is difficult to understand.
Typical Configuration Management Methods
Advantage Disadvantage
1. It uses a text interface, 1. Vendors have different definitions. Carriers need to learn and develop
which is easy to adaptation scripts for each vendor.
2. Configuration scripts are unstructured, unpredictable, and easy to change,
CLI understand. which makes parsing complex. CLI scripts are difficult to maintain, and
2. Based on Telnet/SSH, automatic parsing is difficult to implement.
it is easy to use.
1. Based on the UDP protocol, it is stateless, unordered, and unreliable.
1. It uses an interface 2. Configuration can be performed on objects only one by one, but does not
between machines. orient to a service. During the concurrent configuration of multiple objects,
The data model file if some objects are successfully configured but some objects fail to be
SNMP (MIB) is available. configured, unknown impacts may be caused on the network.
3. SNMP manages only a single device and does not support network-level
2. It is mainly used for configuration or multi-device configuration collaboration.
network monitoring. 4. The binary interface is difficult to understand.
5. It is insecure.
No matter how configuration automation technologies develop, the CLI is still used in essence.
6 Huawei Confidential
Requirements for Network Management
Proper internal configuration
Role-based access control and
01 Ease of use 06 sequence, minimizing the impact 11 minimum authorization
caused by configuration changes
Clear distinction between Supports configuration backup and Support for consistency check of
02 configuration data and status data 07 restoration 12 access control lists across devices
⚫ At the 2002 IAB Network Management Workshop, 14 essential requirements for network management
were raised.
7 Huawei Confidential
2002 2006 2008 2009 2010 2011 2012 2014 2016 2017
8 Huawei Confidential
• The IETF gradually implements the conclusions of the IAB meeting. Different work
groups gradually improve the 14 requirements.
• NETCONF 1.0 has no requirements on the model language. The combination between
NETCONF 1.1 and YANG is determined.
Process for an Engineer to Configure Devices
⚫ The command line is an interactive language between humans and devices. Engineers query the
product documentation and configure a device using the CLI.
⚫ Command lines are nested to implement device configuration.
Device Description
CLI
Interface SSH/Console
name
Interfaces
MTU
[Router] interface GE 1/0/0
[Router-GE1/0/1] mtu 1500
Router System name
Attributes
...
...
9 Huawei Confidential
Process for NETCONF to Configure Devices
⚫ A YANG file describes device data in another way.
⚫ The YANG model uses the module-container-leaf structure to describe devices. For example, the YANG model
defines field types and specifications for router interfaces and attributes.
10 Huawei Confidential
• This example is not a real example. The YANG model does not take the entire device
as one YANG file. Instead, the YANG model splits it into multiple YANG files by
function.
Contents
2. NETCONF Protocol
4. RESTCONF Protocol
11 Huawei Confidential
NETCONF Overview
⚫ NETCONF provides a network device management mechanism. You can use NETCONF to add, modify,
or delete configurations of network devices, and obtain configurations and status of network devices.
NETCONF server
NETCONF Network
NETCONF message
NETCONF Server
Device
Device 1 Device 2 Device 3
12 Huawei Confidential
NETCONF Protocol Framework
NETCONF is partitioned into four layers, as described in the
following table.
⚫ Secure transport layer: provides a communication path for
interaction between the client and server. Currently, Huawei uses
Config&Status Notification
Data Data SSH as the transport protocol of NETCONF.
Content layer
⚫ Messages layer: provides a simple RPC request and response
mechanism independent of the transport protocol layer. The
<edit-config>
<get-config>
>.etc NETCONF client uses an <rpc> element to encapsulate RPC
Operations layer request information and sends the information to the NETCONF
server. Upon receipt, the NETCONF server uses an <rpc-reply>
<rpc>
<rpc-reply> <notification> element to encapsulate RPC response information and returns
Messages layer the information to the NETCONF client.
⚫ Operations layer: defines a group of basic operations as RPC
SSH BEEP SOAP TLS
invoking methods. These operations constitute basic NETCONF
Secure transport layer
capabilities.
⚫ Content layer: describes configuration data involved in network
NETCONF management. The configuration data depends on vendors'
devices. Currently, mainstream data models include the Schema
model and YANG model.
13 Huawei Confidential
XML Encoding
⚫ XML is the encoding format of NETCONF. NETCONF uses text files to represent complex hierarchical data.
The XML document forms a tree structure, unfolding from the root.
The <note><to><from><heading><body> tag is private. The XML language does not have predefined tags, allowing users to
customize tags and document structures.
Content is nested in the tag format. The slash (/) indicates the end of the current tag.
14 Huawei Confidential
Transport layer Messages layer Operations layer Content layer
SSH
The RPC framework is independent of the transport layer, and is used to indicate NETCONF requests and responses.
⚫ <rpc>: encapsulates NETCONF requests from the client to the server. The header defines the message-id
identification sequence.
⚫ <rpc-reply>: response message sent by the user server to the <rpc>. The values of message-id in the headers are the
same.
<rpc-error> is sent in <rpc-reply>. One <rpc-reply> element can contain multiple <rpc-error> elements.
If <ok> is sent in <rpc-reply>, no error or data is returned.
15 Huawei Confidential
16 Huawei Confidential
Transport layer Messages layer Operations layer Content layer
Router/
Switch <edit-config>
<validate>
<copy-config> Restart/Recovery
Candidate Startup
configuration Running configuration
configuration
database database
<copy-config> database
<candidate> <commit> <running>
<startup>
<copy-config>
<discard-changes> <delete-config>
File
<lock> / <unlock> <url>
17 Huawei Confidential
Transport layer Messages layer Operations layer Content layer
18 Huawei Confidential
• <config> may contain the optional attribute <operation>, which is used to specify an
operation type for a configuration item. If the <operation> attribute is not carried, the
<merge> operation is performed by default. The <operation> attribute values are as
follows:
▫ merge: In the database, modify the existing data or create data that does not
exist. This is the default operation.
▫ create: Add configuration data to the configuration database only when the
configuration data to be created does not exist in the configuration database. If
the configuration data exists, <rpc-error> is returned, in which the <error-tag>
value is data-exists.
19 Huawei Confidential
• Schema is a language that Huawei extends private syntax based on the W3C XML
standard. Before the NETCONF standard is bound to the YANG model, VRPV8 has
implemented Schema.
20 Huawei Confidential
• For details, see the NETCONF YANG API Reference released at the official website.
Transport layer Messages layer Operations layer Content layer
21 Huawei Confidential
NETCONF Configuration
1. Enter the NETCONF view.
[Huawei] netconf
Run the netconf command in the system view to enter the NETCONF view.
3. Enable NETCONF.
Enable the NETCONF services of the SSH server on TCP port 22.
• Either snetconf server enable or protocol inbound ssh port 830 command can be used to enable NETCONF. If both
commands are executed, the client can use port 22 or 830 to establish a NETCONF connection with the server.
• NETCONF uses SSH as the transport protocol. Therefore, you must configure SSH before using NETCONF.
22 Huawei Confidential
Contents
2. NETCONF Protocol
4. RESTCONF Protocol
23 Huawei Confidential
Origin of YANG
⚫ Although the NETCONF protocol is standardized, data content is not standardized. How can we
describe a piece of data?
√ √ ×
A data model is an abstraction and expression of data features.
24 Huawei Confidential
YANG Language Overview
⚫ Yet Another Next Generation (YANG) is a data modeling language.
⚫ The YANG model defines the hierarchical structure of data and can be used for NETCONF-based
operations. Modeling objects include configuration, status data, remote procedure calls, and
notifications. This allows a complete description of all data exchanged between a NETCONF client and
server. YANG has the following features:
Hierarchical tree-like structure modeling.
Data models are presented as modules and sub-modules.
It can be converted to the YANG Independent Notation (YIN) model based on the XML syntax without any loss.
Defines built-in data types and extensible types.
25 Huawei Confidential
• YANG originates from NETCONF but is not only used for NETCONF. Although the
YANG modeling language is unified, YANG files are not unified.
• YANG files can be classified into three types: vendor-specific YANG files, IETF-defined
YANG files, and OpenConfig YANG files.
• The Config&Status Data, Notification Data, and bottom-layer RPC messages in
NETCONF can be modeled using the YANG model. YANG model files can be converted
into XML/JSON files using a tool and then encapsulated into NETCONF/RESTCONF
messages.
• For details, see RFC 7950.
Introduction to YANG Files – Module
module example-system {
• A YANG file can be defined as a module or
yang-version 1.1;
namespace "urn:example:system"; submodule. Modules and submodules can reference
prefix "sys";
other modules' model files to use the data types and
organization "Example Inc."; structures defined by other modules.
contact "joe@example.com"; • Each module contains multiple declarations,
description
"The module for entities implementing the Example system.";
including:
YANG version, which is 1.0 or 1.1.
revision xxxx-xx-xx { YANG namespace, which is IETF YANG or Openconfig
description "Initial revision.";
YANG.
}
Organization information
container system { Contact
leaf host-name {...} File description
container login{...}
Change history
}
container X {...}
}
26 Huawei Confidential
⚫ A leaf node has sub-declarations and values but no sub-nodes. In this example, host-name contains two sub-
declarations: type and description.
type indicates the value type. In this example, the value is string.
27 Huawei Confidential
28 Huawei Confidential
Introduction to YANG Files – List Node
⚫ A list node is used to define a higher-level data
XML encoding
node. Each list node is uniquely identified by a key
<user>
and can contain multiple leaf nodes.
<name>glocks</name>
29 Huawei Confidential
Introduction to YANG Files – Container Node
YANG model XML encoding
container system { <system>
container login {
<login>
leaf message {
<message>Good morning</message>
type string;
description
</login>
"Message given at start of login session."; </system>
}
list user {
key "name";
leaf name {
type string; • Container nodes are used to define data
}
leaf full-name { sets in a larger scope. Each container node
type string; has only different sub-nodes, but does not
}
leaf class { have any value. These sub-nodes can be
type string; container, leaf, leaf-list, or list nodes.
}
}}
}
30 Huawei Confidential
Introduction to YANG Files – Grouping
grouping target { ⚫ Grouping is used to define nodes that can be
leaf address { reused. Generally, grouping is used together
with uses. In this example, target defines leaf
type inet:ip-address;
address and port. If use target is specified in
description "Target IP address."; the container peer, the leaf model is reused.
}
leaf port {
type inet:port-number;
description "Target port number.";
}
}
container peer {
container destination {
uses target;
}
}
31 Huawei Confidential
Introduction to YANG Files – Configuration Data and Status Data
list interface { ⚫ YANG files can declare data types.
key "name";
config true;
• The config declaration is used to distinguish
leaf name {
type string; configuration data from status data.
} ▫ config true indicates configuration data.
leaf speed {
▫ config false indicates status data.
type enumeration {
enum 10m;
enum 100m;
enum auto;
}
}
leaf observed-speed {
type uint32;
config false;
}
}
32 Huawei Confidential
Device
Huawei YANG
OpenConfig YANG
YANG file translation
NETCONF Schema
34 Huawei Confidential
Contents
2. NETCONF Protocol
4. RESTCONF Protocol
35 Huawei Confidential
Origin of RESTCONF
⚫ Doctoral thesis of Roy Thomas Fielding in 2000
"Architectural Styles and the Design of Network-based Software Architectures“
GET/POST/PUT/DELETE
API
36 Huawei Confidential
RESTCONF Overview
⚫ RESTCONF allows web applications to access configuration data, status data, and event notifications of
network devices in a modular and scalable manner. It has the following features:
RESTCONF uses HTTP methods to perform operations (CRUD) on data defined by YANG.
YANG files can be shared by NETCONF and RESTCONF.
The data encoding format can be XML or JSON.
NETCONF
YANG NETCONF Client
Device
DataStore Web APP Management platform SDN controller
RESTCONF
Compared with NETCONF, RESTCONF uses different operation methods and data encoding formats.
37 Huawei Confidential
⚫ NETCONF operates multiple configuration libraries of a device. The transaction mechanism and rollback
mechanism are available.
⚫ RESTCONF uses HTTP operations, which are stateless, have no transaction mechanism, and does not support
rollback.
38 Huawei Confidential
Typical RESTCONF Interaction
⚫ A complete RESTCONF interaction includes a request and a response.
⚫ In this example, the client uses the OPTIONS method to obtain the operations supported by the device.
⚫ The device response supports the following operations: POST, DELETE, GET, HEAD, PATCH, and
OPTIONS.
RESTCONF request
RESTCONF response
39 Huawei Confidential
RESTCONF request
Description
Method HTTP method, performed on the resource identified by the request URI.
URI Uniform Resource Identifier.
HTTP/Version HTTP version.
Header of a request packet, which has specific field requirements. The
Header : value
format is header field and value.
Request body (Optional) Request body. Some methods do not carry body information.
40 Huawei Confidential
• A request header may contain multiple fields, such as Accept, Authorization, Host, and
From. For details, see RFC 2916.
RESTCONF Request Example
⚫ The IP address of the RESTCONF request object is 192.168.56.100. Change the value of domainName to abc and
the value of accessLimit to 10.
HTTP method URI HTTP/Version
Request body
41 Huawei Confidential
RESTCONF Response Packet
RESTCONF response
Description
HTTP/Version HTTP method, performed on the resource identified by the request URI.
Status code HTTP status code.
Message HTTP status message.
Header of a response packet, which has specific field requirements. The
Header : value
format is header field and value.
Response body (Optional) Response body. Some methods do not carry body information.
42 Huawei Confidential
• Header information contains details about Response Header and Entity Header. For
details, see sections 6.2 and 7.1 in RFC 2916.
HTTP Status Code
⚫ An HTTP status code is a three-digit number indicating the status of a response from the server. It is used to return
the operation result to the client.
Status Code Description
(Informational) The request is
1XX 100 Continue If the request is received, go to the next step.
received.
200 OK Success. The response body is available.
(Successful) The request is A resource is successfully created, and the URI of the newly created
2XX 201 Created
successful. resource exists in the location field.
204 No Content Success. The response body is unavailable.
(Redirection) Further
A new URI is allocated to the target resource, and all future resources
3XX operations need to be 301 Moved Permanently
will be associated with the new URI.
performed.
400 Bad Request The request body is incorrect and carries error information.
401 Unauthorized Authorization failed. For example, the certificate does not match.
4XX (Client Error) Request error. Access denied. The possible cause is that the user attempts to perform
403 Forbidden operations beyond the permission or the login user name or password is
incorrect.
404 Not Found The requested resource cannot be found.
The request cannot be executed due to an internal server error. The
500 Internal Server Error
5XX (Server Error) Server error. user needs to resend the request later.
501 Not Implemented The function has not been implemented.
43 Huawei Confidential
Content-Type:application/yang-data+xml
Header
Content-Length:0
44 Huawei Confidential
Quiz
45 Huawei Confidential
1. Huawei uses SSH as the transport layer protocol. Before enabling the NETCONF
function on a device, you need to create an SSH user as the NETCONF user for login.
2. YANG is a modeling language used to describe the content layer of NETCONF and
RESTCONF. The difference between NETCONF and RESTCONF is as follows:
RESTCONF constructs the transport layer, messages layer, and operations layer based
on HTTP, while NETCONF has defined the operations layer and uses SSH as the
transport layer and RPC as the messages layer.
Summary
46 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. Introduction to Telemetry
◼ Technical Background
▫ Overview
3 Huawei Confidential
Technical Background: Introduction to Network Device
Monitoring
⚫ An O&M platform mainly provides unified
monitoring and performance management
4 Huawei Confidential
Technical Background: Bottlenecks of Traditional Data
Sampling Technologies
⚫ The Nyquist Sampling Theorem states that a signal must be sampled at more than twice the highest frequency
component of the signal to ensure that no information will be lost.
Time
5 Huawei Confidential
Summary: Traditional Network O&M Faces Many Challenges
⚫ On a traditional network, data is sampled in pull mode at an interval of 5 to 15 minutes on average. Data sampling
in pull mode at a shorter interval will result in network breakdown.
Pulling Model
SNMP
Data collection Data analysis Error correction
sFlow
6 Huawei Confidential
7 Huawei Confidential
1. Introduction to Telemetry
▫ Technical Background
◼ Overview
8 Huawei Confidential
Telemetry Overview
⚫ Telemetry, also called network telemetry, is a technology that remotely collects data from physical or virtual devices
at a high speed. Devices periodically send interface traffic statistics, CPU usage, and memory usage to collectors in
push mode. Compared with the traditional pull mode (question-answer interaction), the push mode provides faster
and real-time data collection.
Analyzer
Telemetry-based
data push
Collector Controller
Device
9 Huawei Confidential
• There is also a view in the industry that SNMP is considered as a traditional telemetry
technology, and telemetry is currently referred to as streaming telemetry or model-
driven telemetry.
10 Huawei Confidential
Telemetry Advantages
⚫ Telemetry obtains abundant monitoring data in push mode in a timely manner. The data helps quickly locate
network faults. In addition, telemetry provides a uniform data stream format, which simplifies data collection and
analysis to solve problems in traditional network O&M.
Refined monitoring
The collected data is of high precision and various types,
which can fully reflect the network status.
11 Huawei Confidential
Telemetry Network Model
Telemetry in a
• The telemetry network model is defined in two ways:
broad sense
▫ In a broad sense, telemetry is a self-closed-loop
Analyzer
Data sending system consisting of network devices, a collector, an
Response
and analysis
analyzer, and a controller.
12 Huawei Confidential
Telemetry Application Scenario: WAN
⚫ Interface data of routers is reported in real time to help you gain insight into the traffic direction.
Internet
AS 1 AS 2 AS 3 Domestic
interconnected
peers
IGW
Content CDN settings
supervision Routing policy
Node addition
or deletion
Cost
adjustment Link capacity
expansion
Data analysis
Data collection
13 Huawei Confidential
Telemetry Application Scenario: Campus Network
⚫
On a campus network, telemetry can be used to monitor and report device status and wired and wireless data to the analyzer at the same time,
implementing intelligent O&M.
Measurement
WAN Metric
iStack/CSS link Object
CPU usage, memory usage, and number of online
Egress zone AP
clients
Number of online users, channel usage, noise, traffic,
Radio
Data center backpressure queue, interference rate, and power
NMS O&M zone/Analyzer
User RSSI, negotiated rate, packet loss rate, and latency
14 Huawei Confidential
Telemetry Application Scenario: Data Center
⚫
Upon the receipt of data sent through telemetry, the analyzer calculates the forwarding path, forwarding latency, and link latency of packets. In addition, it
analyzes the application interaction relationship and associates applications with network paths. The analyzer can collect statistics, analyze data, and
display analysis results, implementing intelligent O&M.
Measurement
Metric
Object
Campus Device CPU and memory usages
Internet WAN
network
CPU, memory, FIB entry, and MAC entry
Board
usages
NMS O&M zone/Analyzer Chip TCAM usage
Number of received/sent packets, number
Core switch Telemetry/ERSPAN of bytes, number of lost packets, number
Port
of error packets, and numbers of
broadcast, multicast, and unicast packets
Queue Buffer size
Spine Receive/Transmit optical power, current,
Optical module
voltage, and temperature
Packet loss behavior Detection of packet loss due to congestions
Leaf
15 Huawei Confidential
• The collector in the data center collects device performance data through telemetry
and collects device flow mirroring data through ERSPAN.
Contents
1. Introduction to Telemetry
16 Huawei Confidential
Telemetry Framework
⚫ The framework of telemetry in a narrow sense consists of four modules: data source, data generation,
data subscription, and data push.
Data analysis
Data Analysis
Data
Data Export
Subscription gRPC gRPC UDP
Data subscription Data push
Data Generation
Data generation Protobuf
Data Source
Data source NP
17 Huawei Confidential
• For details about the framework, see the corresponding RFC draft at
https://tools.ietf.org/html/draft-song-ntf-02.
• Google Remote Procedure Call (gRPC) is an open-source remote procedure call (RPC)
system developed by Google.
• User Datagram Protocol (UDP) provides a method for an application to send
encapsulated IP packets without establishing a connection.
• Protocol buffers (Protobuf) is a mechanism for serializing structured data.
Telemetry Protocol Stack
⚫ The telemetry protocol stack is divided into the transport layer, communication layer, data encoding
layer, and data model layer.
Network device Telemetry data user end
Data encoding
BER XML JSON GPB BER XML JSON GPB
layer
18 Huawei Confidential
19 Huawei Confidential
Data Source Data Subscription Data Generation Data Push
20 Huawei Confidential
Huawei provides two subscription modes for telemetry: static and dynamic.
Data analysis In static telemetry subscription, a device functions as a client and a collector functions as the
server. The device proactively initiates a connection to the collector to collect and send data.
This mode is applicable to long-term inspection.
gRPC Data collection In dynamic telemetry subscription, a collector functions as a client and initiates a connection to
a device functioning as a server to collect data. This mode is applicable to short-term
monitoring.
21 Huawei Confidential
Data Source Data Subscription Data Generation Data Push
22 Huawei Confidential
Data Source Data Subscription Data Generation Data Push
system-view
Telemetry
Configure the destination-group
The NMS subscribes to collector. ipv4-address
sampled data, and the router IP address, port number, protocol, and
continuously sends data at an encryption mode for the collector
interval of λ seconds.
system-view
Configure the telemetry
T=λ data to be sensor-group
sampled. sensor-path
Sensor sampling path
system-view
telemetry
subscription
Create a
sensor-group
subscription.
ΣT = ∞ Associate the sampling sensor group, and
configure a sampling period, redundancy
suppression, and a heartbeat interval.
display telemetry sensor
Verify the display telemetry destination
configuration. display telemetry subscription
display telemetry sensor-path
23 Huawei Confidential
Data Source Data Subscription Data Generation Data Push
24 Huawei Confidential
Data Source Data Subscription Data Generation Data Push
25 Huawei Confidential
system-view
grpc
Configure the device grpc server // Enters the gRPC server
so that its data can view.
be subscribed. source-ip // Specifies a source IP
address to be listened on.
server-port // Specifies the
Configure the number of a port to be listened
T=λ
collector. on.
service enable // Enables the gRPC
service.
(Optional) acl
ΣT = λn
(Optional) idle-timeout
(Optional) ssl-policy
(Optional) ssl-verify peer
commit
Verify the
display telemetry dynamic-subscription
configuration.
26 Huawei Confidential
Data Source Data Subscription Data Generation Data Push
gRPC
⚫ gRPC is a language-neutral, platform-neutral, and open-source remote procedure call (RPC) system. It can be used
to perform secondary development for both communication parties (NMS and devices). This development focuses
on services and shortens interconnection development periods.
⚫ gRPC supports the following languages: C++, Node.js, Python, Ruby, Objective-C, PHP, C#, Java, and Go.
⚫ gRPC is based on HTTP/2, which is better than HTTP/1 in performance. HTTP/2 features include bidirectional
streaming, flow control, header compression, and multiplexing request of a single connection.
gRPC
HTTP2
gRPC encapsulation
TLS
TCP
27 Huawei Confidential
Data Source Data Subscription Data Generation Data Push
gRPC
HTTP2
gRPC encapsulation
TLS
TCP
28 Huawei Confidential
Data Source Data Subscription Data Generation Data Push
Server streaming RPCs: The client sends a request to the server, and the server continuously sends a
stream back.
◼ Example: rpc Subscribe(SubsArgs) returns(stream SubsReply) {};
Client streaming RPCs: The client continuously sends a stream to the server and waits for a response
from the server.
◼ Example: rpc LotsOfGreetings(stream HelloRequest) returns (HelloResponse) {};
Bidirectional streaming RPCs: Both the client and server send a stream.
◼ Example: rpc dataPublish(stream serviceArgs) returns(stream serviceArgs) {};
29 Huawei Confidential
Data Source Data Subscription Data Generation Data Push
30 Huawei Confidential
Data Source Data Subscription Data Generation Data Push
GPB Encoding
⚫ GPB uses a .proto file to describe the message format and uses digits to replace flag names (keyword names).
31 Huawei Confidential
• GPB transmits data in binary mode with a small number of bytes for each
transmission, and therefore stands out from other encoding methods, such as XML and
JSON, in terms of transmission efficiency. Data collection efficiency is a key concern of
Telemetry.
• For more information, see https://developers.google.com/protocol-buffers/.
Data Source Data Subscription Data Generation Data Push
Data analysis
Data source NP
32 Huawei Confidential
Data Source Data Subscription Data Generation Data Push
NP C C
33 Huawei Confidential
• The collector functions as the gRPC client, and the device functions as the gRPC server.
• The collector constructs data in GPB or JSON format based on the subscribed event,
compiles a .proto file through Protocol Buffers, establishes a gRPC channel with the
device, and sends a request message to the device using gRPC.
• After receiving the request, the device parses the .proto file using Protocol Buffers to
restore the data for processing.
• After data sorting is complete, the device re-compiles the data using Protocol Buffers
and sends a response to the collector using gRPC.
• The collector receives the response message. So far, the gRPC interaction ends.
Data Source Data Subscription Data Generation Data Push
NP C C
34 Huawei Confidential
Data Source Data Subscription Data Generation Data Push
TLS layer This layer is optional. It is based on the TLS 1.2–encrypted channel and bidirectional certificate authentication.
gRPC is based on HTTP/2, which is better than HTTP/1 in performance. HTTP/2 features include bidirectional
HTTP/2 layer
streaming, flow control, header compression, and multiplexing request of a single connection.
gRPC layer Defines the protocol interaction format for RPCs.
The device proactively initiates an RPC request to the collector, which is defined in the huawei-grpc-
dialout.proto file.
RPC layer
A collector proactively initiates an RPC request for dynamic subscription to a device, which is defined in the
huawei-grpc-dialin.proto file.
35 Huawei Confidential
Data Source Data Subscription Data Generation Data Push
Hierarchy Description
UDP layer Underlying communication protocol, which is connectionless based on UDP.
This layer is optional. It is based on the TLS 1.2–encrypted channel and bidirectional certificate
DTLS layer
authentication.
This layer describes the message header format of pushed telemetry data. The IETF definition is
available at
Message header layer https://datatracker.ietf.org/doc/draft-ietf-netconf-udp-pub-channel/01/?include_text=1
The draft has six versions ranging from 00 to 05. Currently, telemetry is implemented based on the 01
version, as shown in the following figure.
Telemetry
This is defined in the huawei-telemetry.proto file.
layer
Notificatio Service data at this layer needs to be encoded by the .proto file of the corresponding service, and the
n message NMS needs to decode the data using the .proto file of the corresponding service as well. For example, if
layer Service data
the sampling path is huawei-debug:debug/cpu-infos/cpu-info, the huawei-debug.proto file needs to
layer
be used for data encoding and decoding.
36 Huawei Confidential
Contents
1. Introduction to Telemetry
37 Huawei Confidential
Case: Configuring Static Telemetry Subscription
⚫ Description:
A company has deployed a CE12800 switch with the management IP address 192.168.56.100. To
better collect device performance data, it is required that the device push CPU information to the
collector in static telemetry subscription mode.
192.168.56.100 192.168.56.1
GE1/0/0 Collector
Network device (Local PC in this example)
38 Huawei Confidential
Configuration Roadmap
Configure a Configure data Configure static Compile .proto Compile Verify the
destination collector. sampling. subscription. files. Python code. configuration.
192.168.56.100 192.168.56.1
GE1/0/0
Network device Collector
(Local PC in this example)
39 Huawei Confidential
Configuring a Destination Collector
Configure a Configure data Configure static Compile .proto Compile Verify the
destination collector. sampling. subscription. files. Python code. configuration.
192.168.56.100 192.168.56.1
GE1/0/0
Network device Collector
(Local PC in this example)
40 Huawei Confidential
Configuring Data Sampling and Static Subscription
Configure a Configure data Configure static Compile .proto Compile Verify the
destination collector. sampling. subscription. files. Python code. configuration.
192.168.56.100 192.168.56.1
GE1/0/0
Network device Collector
(Local PC in this example)
41 Huawei Confidential
Compiling .proto Files for the Collector (1)
Configure a Configure data Configure static Compile .proto Compile Verify the
destination collector. sampling. subscription. files. Python code. configuration.
42 Huawei Confidential
Compiling .proto Files for the Collector (2)
Configure a Configure data Configure static Compile .proto Compile Verify the
destination collector. sampling. subscription. files. Python code. configuration.
⚫ Compile .proto files to obtain the method invoked by the server. You can create a Python script, for example, run_codegen.py, and
compile .proto files with the following codes:
from grpc_tools import protoc protoc.main(
protoc.main( (
( '',
'', '-I./protos',
'-I./protos', '--python_out=.',
'--python_out=.', '--grpc_python_out=.',
'--grpc_python_out=.', ‘./protos/huawei-telemetry.proto’, # telemetry file path
‘./protos/huawei-grpc-dialout.proto’, #dialout file path )
) )
)
protoc.main(
(
'',
'-I./protos',
'--python_out=.',
'--grpc_python_out=.',
'./protos/huawei-devm.proto', # devm file path
)
)
43 Huawei Confidential
• After the files are compiled successfully, multiple Python files are generated in the
current folder.
Compiling .proto Files for the Collector (3)
Configure a Configure data Configure static Compile .proto Compile Verify the
destination collector. sampling. subscription. files. Python code. configuration.
⚫ Run the run_codegen.py script file to obtain related files generated in the current directory after .proto files are
compiled in Python.
44 Huawei Confidential
Compiling Python Code (1)
Configure a Configure data Configure static Compile .proto Compile Verify the
destination collector. sampling. subscription. files. Python code. configuration.
_ONE_DAY_IN_SECONDS = 60 * 60 * 24
def serve():
Create a gRPC server object. -- server = gRPC.server(futures.ThreadPoolExecutor(max_workers=10))
Register the data listening service. -- huawei_gRPC_dialout_pb2_gRPC.add_gRPCDataserviceServicer_to_server(Telemetry_CPU_Info(),
server)
Set the socket listening port. -- server.add_insecure_port('192.168.56.1:20000')
Start the gRPC server. -- server.start()
try:
while True:
Infinite loop listening. -- time.sleep(_ONE_DAY_IN_SECONDS)
except KeyboardInterrupt:
server.stop(0)
45 Huawei Confidential
• The gRPC module is installed by running the pip install grpc command.
46 Huawei Confidential
Verifying the Configuration
Configure a Configure data Configure static Compile .proto Compile Verify the
destination collector. sampling. subscription. files. Python code. configuration.
cpuInfos {
cpuInfo {
entIndex: 16842753
interval: 8
ovloadThreshold: 90
position: "1"
systemCpuUsage: 6
unovloadThreshold: 75
}
}
47 Huawei Confidential
Quiz
B. UDP
C. gRPC
48 Huawei Confidential
1. BC
⚫ Telemetry remotely collects data from physical or virtual devices at a high speed.
⚫ In a narrow sense, the telemetry framework consists of four modules: data source,
data generation, data subscription, and data push.
⚫ The data source uses YANG models to define devices. Data is generated using the
GPB encoding method. Data subscription can be implemented in static or dynamic
mode. Sampled data can be pushed based on gRPC or UDP.
⚫ Python scripts can be run to subscribe to sampled device data through telemetry.
49 Huawei Confidential
More Information
50 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
⚫ Huawei has launched the open programmability system (OPS) to provide openness and
programmability capabilities for network devices and enable users to perform secondary development,
fully unleashing the potential of devices.
⚫ This course introduces the OPS, describes its principles and application scenarios, and provides a case.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. OPS Overview
3 Huawei Confidential
OPS Overview (1)
⚫ In the following scenarios:
During network deployment, services need to be configured for a large number of devices after hardware
installation.
The network administrator wants devices to automatically take actions when alarms are generated.
The network is disconnected when the network administrator wants to remotely deliver commands and
periodically collect device information through compiled scripts.
4 Huawei Confidential
• Traditional network devices are relatively closed and cannot meet flexible and
differentiated network management requirements.
OPS Overview (2)
⚫ Huawei offers the OPS.
⚫ The OPS allows users and third-party developers to develop and deploy network management policies using open
RESTful APIs. It implements rapid service expansion, automatic function deployment, and intelligent device
management, helping reduce network operation and maintenance costs and simplify network operations.
Script
RESTful API
Administrator
System
Capability
5 Huawei Confidential
• With the OPS, you can compile scripts based on their requirements and import the
scripts to network devices for running, which is flexible and efficient.
OPS Architecture
⚫ The OPS is developed on Huawei Versatile
Routing Platform (VRP). It uses open RESTful python Java C/C++ ……
APIs to work with VRP's management plane,
control plane, and data plane, allowing for
RESTful API
function expansion on a device.
⚫ The OPS provides managed objects (MOs) to
open devices. Each MO is uniquely identified by a Management Plane
Uniform Resource Identifier (URI). The client can
perform operations on objects using standard Control Plane
HTTP methods, such as GET, PUT, POST, and
DELETE. Data Plane
1998
6 Huawei Confidential
• The VRP system is developed by Huawei based on years of research and network
application experience and its intellectual property rights is owned by Huawei.
• Managed object (MO): an object that can be used to manage network devices by
invoking RESTful APIs, such as CPU information, system information, and interface
information.
• Uniform Resource Identifier (URI): identifies a specific resource. In the OPS, URIs are
used to identify MOs. For example, the URI of the CPU information is
/devm/cpuInfos/cpuInfo, which uniquely identifies the CPU information.
• Uniform resource locator (URL): A URL is a URI that can be used to present a resource
and specify how to locate the resource, for example, http://www.ietf.org/rfc/rfc2396.txt
and ftp://ftp.is.co.za/rfc/rfc1808.txt.
• Huawei network devices that support the OPS provides a running environment for
Python scripts. Scripts in Java and C/C++ languages are not supported.
Introduction to RESTful APIs
⚫ Representational State Transfer (REST) is a style of software architecture. The design concepts and
principles are as follows:
All elements on networks can be abstracted as resources.
Each resource has a unique resource ID. Operations on resources do not change the resource IDs.
Standard methods are used to operate resources. The core operations are GET, PUT, POST and DELETE defined
in HTTP.
⚫ RESTful API: application programming interfaces (APIs) that comply with the REST architecture.
⚫ The OPS defines a set of RESTful APIs and uses URIs to identify open MOs. You can access MOs using
standard HTTP methods (GET, PUT, POST, and DELETE).
7 Huawei Confidential
• An API is a particular set of rules and specifications that are used for communication
between software programs.
• For more information about RESTful, see the HCIP Programming and Automation
Course — RESTful Fundamentals and Practices.
OPS RESTful API Interaction Example
⚫ With RESTful APIs defined by the OPS, you can write Python scripts to send HTTP requests to perform
operations on MOs of network devices. Network devices will return HTTP response messages based on
the operation results.
MOs:
CPU Information
8 Huawei Confidential
• The OPS allows you to compile Python scripts, install the scripts on network devices,
and send HTTP requests when the scripts are running to manage network devices.
OPS RESTful API Description Example
⚫ The HTTP requests sent by a user must be constructed based on the RESTful APIs defined by the OPS.
The API for obtaining system information is described as follows:
Request example including the HTTP header Response example including the HTTP header
(XML format): (XML format):
GET /system/systemInfo HTTP/1.1 HTTP/1.1 200 OK
Host: localhost Cache-Control: no-cache
Accept-Encoding: identity Content-Type: application/xml
Content-Length: 66
Content-type: application/xml <?xml version="1.0" encoding="UTF-8"?> <systemInfo>
Accept: application/xml <sysName>HUAWEI</sysName>
<platformName>VRP</platformName>
<?xml version="1.0" encoding="UTF-8"?> <platformVer>v800r007c00</platformVer>
<systemInfo> <productName>Device</productName>
</systemInfo> <productVer>V800R007C00</productVer>
<patchVer></patchVer>
<esn>123456789</esn>
<mac>00e0-fc34-1234</mac>
</systemInfo>
9 Huawei Confidential
• The formats of the OPS RESTful API request and response packets are similar to those
of the HTTP request and response packets described in the previous slide.
• Currently the OPS RESTful APIs use the XML format to transmit data. In a later version,
the APIs can use the JavaScript Object Notation (JSON) format to transmit data.
Therefore, the body of the OPS RESTful API request and response packets is in XML
format.
• You can download RESTful API Reference on the network device page of
http://support.huawei.com.
Usage of Python Scripts
⚫ Currently, the OPS RESTful APIs can be used only in the Embedded Running Environment (ERE). You
can compile Python scripts based on OPS APIs and install them on the devices that provide a Python
running system. When a Python script is running, an HTTP request is sent to the system to manage
devices.
• The following figure shows the Python script execution process.
10 Huawei Confidential
• The maintenance assistant is a function of Huawei network devices. You can set the
trigger conditions and the Python script to be executed when the conditions are met.
The system monitors device running in real time. When the specified trigger condition
is met, the network device system automatically executes the Python script to
complete the actions defined in the script. For more information about the
maintenance assistant, see the Huawei network device product documentation.
Contents
1. OPS Overview
11 Huawei Confidential
Scenario 1: Automatic Deployment of Unconfigured Devices
⚫ The OPS can implement automatic deployment of unconfigured devices without the need of on-site
installation, reducing labor costs and improving deployment efficiency.
② Download the
Python script
Script file
server
Software and
configuration
file server
12 Huawei Confidential
• DHCP server: allocates the temporary IP address, default gateway, and script file server
address to the device to be automatically deployed.
Switch Server
13 Huawei Confidential
Switch Server
14 Huawei Confidential
Contents
1. OPS Overview
15 Huawei Confidential
Configuration Roadmap
⚫ The configuration roadmap is as follows: The core is to compile Python scripts, which will be detailed later. For the
operation modes and involved commands of the other three steps, see the following figure.
Compile the Python script Assume that a Python script has been compiled. Perform the following
three steps to complete the configuration.
16 Huawei Confidential
Compiling a Python Script (1)
⚫ Python scripts are used to deliver HTTP requests to the system for management. Huawei provides Python script
templates. You only need to search for RESTful APIs based on the functions to be implemented and modify code.
17 Huawei Confidential
Compiling a Python Script (2)
"Content-type": "text/xml",
"Accept": "text/xml"
} ⚫ Methods defined in the OPSConnection class:
self.conn = None
def _init_(): is an initialization method that
# Disable an HTTP connection. creates an HTTP connection.
def close(self):
"""Close the connection""" def close(): shuts down an HTTP
self.conn.close()
connection.
# Create device resources. def create(): creates device resources.
def create(self, uri, req_data):
"""Create operation""" def delete(): deletes device resources.
ret = self.rest_call("POST", uri, req_data)
return ret
18 Huawei Confidential
Compiling a Python Script (3)
# Query device resources.
def get(self, uri, req_data = None):
⚫ Methods defined in the OPSConnection class:
"""Get operation"""
ret = self.rest_call("GET", uri, req_data) def get(): queries device resources.
return ret
def set(): modifies device resources.
# Modify device resources.
def set(self, uri, req_data): def rest_call(): indicates a class method
"""Set operation""" that is invoked by a method mentioned
ret = self.rest_call("PUT", uri, req_data)
return ret
above (create, delete, get, or set).
19 Huawei Confidential
Compiling a Python Script (4)
print(body)
if self.conn:
self.conn.close()
⚫ You need to compile a method to invoke the
self.conn = httplib.HTTPConnection(self.host, self.port) RESTful API through an instance of the
20 Huawei Confidential
Compiling a Python Script (5)
<startupInfo>
</startupInfo>
⚫ You can obtain the values of uri and req_data from
'''
# The response data of the system startup information is similar to the following: RESTful API Reference based on the site
''' requirements.
<?xml version="1.0" encoding="UTF-8"?>
<rpc-reply>
⚫ The system startup information in this document is
<data> described in the RESTful API Reference as follows:
<cfg xmlns="http://www.huawei.com/netconf/vrp" format-version="1.0"
content-version="1.0"> Operation URI Description
<startupInfos>
<startupInfo> /cfg/startupinfos/star Obtain system startup
GET
tupinfo information
<position>6</position>
<nextStartupFile>flash:/vrpcfg.cfg</nextStartupFile>
<configedSysSoft>flash:/system-software.cc</configedSysSoft> Request example
<curSysSoft>flash:/system-software.cc</curSysSoft> <?xml version=“1.0” encoding=“UTF-8”?>
<nextSysSoft>flash:/system-software.cc</nextSysSoft>
<curStartupFile>flash:/vrpcfg.cfg</curStartupFile> <startupInfo>
<curPatchFile>NULL</curPatchFile> </startupInfo>
<nextPatchFile>NULL</nextPatchFile>
</startupInfo>
21 Huawei Confidential
Compiling a Python Script (6)
</startupInfos>
</cfg>
⚫ According to the RESTful API Reference, the HTTP
</data>
</rpc-reply> operation corresponding to the RESTful API for
''‘ obtaining system startup information is GET.
Therefore, the get method of the OPSConnection
# Execute a GET operation request.
ret, _, rsp_data = ops_conn.get(uri, req_data)
class instance is invoked.
if ret != httplib.OK: ⚫ You can change the get method to the create, delete,
return None
or set method of the OPSConnection class based on
22 Huawei Confidential
Compiling a Python Script (7)
rsp_data = get_startup_info(ops_conn) ⚫ You can invoke the method compiled based
# Disable an HTTP connection.
on the RESTful API in the main() method, for
ops_conn.close()
return example, the get_startup_info method in this
document, to complete the desired function.
except:
errinfo = traceback.format_exc() ⚫ The main() method can flexibly implement
print(errinfo)
various management functions of a network
return
device by using various RESTful APIs and
if __name__ == "__main__": structures of Python such as loops and if-else.
main()
⚫ The last line of the script indicates that the
main() method is executed.
23 Huawei Confidential
Case: Obtaining CPU Information of a Device
⚫ Description: A network administrator compiles a Python script and uploads the script to a
network device to obtain CPU information by using the OPS function of the device. The
networking is as follows.
GE1/0/0
Python Script
192.168.56.100
192.168.56.1
Network Network
administrator device
24 Huawei Confidential
Compiling a Python Script (1)
⚫ Based on the function of obtaining device CPU information to be implemented, obtain the
URI, request message, and response message by referring to the RESTful API Reference. The
result is as follows.
URI information:
25 Huawei Confidential
• After knowing the format of the response message, you can parse the response
message in the Python script. In this case, the response message is only displayed. You
can try to parse the response message to implement more complex functions.
Compiling a Python Script (2)
⚫ Modify the related code in the Python script template based on the URI and request content. Other code in the template does not
need to be modified.
Define the get_cpu_info method. Invoke the get_cpu_info method in the main method.
def get_cpu_info(ops_conn): def main():
uri = “/devm/cpuInfos/cpuInfo“ #URI corresponding to the CPU """The main function.""“
information
req_data = \ #Set the content of the request for host = "localhost"
obtaining CPU information.
try:
'''<?xml version='1.0' encoding='UTF-8'?>
# Establish an HTTP connection.
<cpuInfo>
ops_conn = OPSConnection(host)
<position></position>
# Invoke the function for obtaining CPU information.
<entIndex></entIndex>
rsp_data = get_cpu_info(ops_conn)
<systemCpuUsage></systemCpuUsage>
# Disable an HTTP connection.
<ovloadThreshold></ovloadThreshold>
ops_conn.close()
<unovloadThreshold></unovloadThreshold>
return
</cpuInfo>
'''
except:
ret, _, rsp_data = ops_conn.get(uri, req_data) #Execute the get operation.
errinfo = traceback.format_exc()
if ret != httplib.OK:
print(errinfo)
return None
return
return rsp_data
26 Huawei Confidential
Uploading a Python Script
⚫ After the Python script is compiled, save it as cpu_demo.py. The network administrator enables the FTP server on
the local PC, and the network device functions as the FTP client to download the Python script.
27 Huawei Confidential
• For details about how to enable the FTP server on the local PC, you can easily search
the way from a search engine.
Compiling a Python Script
⚫ After the Python script is uploaded, run the ops install file file-name command to install the script.
28 Huawei Confidential
Running the Python Script (1)
⚫ Run the ops run python file-name command to run the Python script.
<CE1>ops run python cpu_demo.py
|---------------------------------- request: ----------------------------------| # Content of the get operation
GET /devm/cpuInfos/cpuInfo HTTP/1.1
29 Huawei Confidential
Running the Python Script (2)
<cpuInfos> # Returned CPU information. In this case, the netwo rk device has
<cpuInfo> two cpus.
<position chassis=“1” slot=“1”>1</position> # position indicates the CPU position information.
<entIndex>16842753</entIndex> # entIndex indicates the CPU index information.
<systemCpuUsage>4</systemCpuUsage> # systemCpuUsage indicates the CPU usage.
<ovloadThreshold>90</ovloadThreshold> # ovloadThreshold indicates the CPU overload clearance threshold.
<unovloadThreshold>75</unovloadThreshold> # unovloadThreshold indicates the CPU non-overload threshold.
</cpuInfo>
<cpuInfo>
<position chassis="1" slot="17">17</position>
<entIndex>17891329</entIndex>
<systemCpuUsage>4</systemCpuUsage>
<ovloadThreshold>90</ovloadThreshold>
<unovloadThreshold>75</unovloadThreshold>
</cpuInfo>
</cpuInfos>
</devm>
</data>
</rpc-reply>
|------------------------------------------------------------------------------|
30 Huawei Confidential
Quiz
B. PUT
C. POST
D. DELETE
31 Huawei Confidential
1. ABCD
Summary
32 Huawei Confidential
More Information
⚫ For more REST information, see the paper written by Dr. Roy Fielding.
https://www.ics.uci.edu/~fielding/pubs/dissertation/top.htm
33 Huawei Confidential
• The REST software architecture was first mentioned by Roy Fielding in his doctoral
paper. Roy Fielding is one of the major authors of the HTTP specifications.
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
⚫ This course aims to help development engineers understand the concepts and functions of SDN, REST
and RESTful, working principles of HTTP, and typical practices in invoking RESTful APIs.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. SDN Overview
3 Huawei Confidential
SDN Origin
⚫ SDN was developed by the Clean Slate Program at Stanford University as an innovative new network architecture.
The core of SDN is to separate the control plane from the data plane of network devices to implement centralized
control of the network control plane and provide good support for network application innovation.
⚫ SDN has three characteristics in initial phase: forwarding-control separation, centralized control, and open
programmable interfaces.
SDN application
Control plane
OpenFlow
OpenFlow interconnection
Forwarding plane
Forwarding plane
OpenFlow Switches
OpenFlow switches have
only the data plane.
4 Huawei Confidential
• OpenFlow was defined in the initial phase of SDN. With technology development,
many other southbound interface (SBI) protocols are defined between the controller
and network devices.
Essential Requirements of SDN
⚫ The essence of SDN is to make networks more open, flexible, and simple. It builds a core brain for a network and
implements fast service deployment, traffic optimization, or network service openness through centralized control in
the global view.
⚫ Highlights:
Provides centralized management, simplifying network management and O&M.
Shields technical differences, simplifying network configuration and reducing O&M costs.
5 Huawei Confidential
• SDN is a broader concept, not limited to OpenFlow. Separation between the control
and data planes is a method rather than the essence of SDN.
SDN Architecture
⚫ An SDN architecture consists of the application layer, control layer, and infrastructure layer. To communicate
between these layers, SDN uses open interfaces where the northbound interfaces (NBIs) communicate between the
infrastructure and control layers and the southbound interfaces (SBIs) communicates between the application and
the control layers. OpenFlow is an SBI protocol.
NBI
SBI
6 Huawei Confidential
• Application layer: provides various upper-layer applications for service intents, such as
OSS and OpenStack. The OSS is responsible for service orchestration of the entire
network, and OpenStack is used for service orchestration of network, compute, and
storage resources in a DC. There are also other applications at this layer. For example,
a user deploys a security app. This app invokes NBIs of the controller, such as Block
(Source IP,DestIP), regardless of the device locations. Then the controller delivers
different instructions to network devices based on different southbound protocols.
• Control layer: The SDN controller is deployed at this layer and is the core of the SDN
network architecture. The control layer is the brain of the SDN system and implements
network service orchestration.
• Infrastructure layer: A network device receives instructions from the controller and
performs data forwarding.
• NBI: NBIs, mainly RESTful APIs, are used by the controller to interconnect with the
application layer.
• SBI: SBIs are used by the controller to interact with devices through protocols such as
NETCONF, SNMP, OpenFlow, and OVSDB.
Huawei SDN Network Architecture
⚫ Huawei SDN network architecture supports various SBIs and NBIs, including OpenFlow, OVSDB, NETCONF, PCEP,
RESTful, SNMP, BGP, JSON-RPC, and RESTCONF interfaces.
Network
application Cloud platform EMS Orchestration Apps
NBI
SBI
Forwarding
device AP Switch CPE Router Security gateway VNF
7 Huawei Confidential
• Cloud platform: resource management platform in a cloud DC. The cloud platform
manages network, compute, and storage resources. OpenStack is the most mainstream
open-source cloud platform.
• MTOSI or CORBA is used to interconnect with the BSS or OSS. Kafka or SFTP can be
used to connect to a big data platform.
Huawei SDN Solution - Integrating Management, Control,
and Analysis to Build an Intent-Driven Network
Application Cloud Self-service Mobile Third-party …
layer platform portal app app
Network
management
and control Manager Controller Analyzer
layer
AP AP
DC fabric
Campus Campus
CPE CPE
Network layer WAN/DCI WAN/DCI
DC fabric
Branch SD-WAN
CPE Branch
CPE
8 Huawei Confidential
Introduction to iMaster NCE
⚫ Huawei iMaster NCE is an industry intelligent network automation platform that integrates management, control,
analysis, and AI capabilities.
SDN-based automatic service Unified data base Full lifecycle management
configuration and deployment Centralized detection, location Simulation verification and
AI-based intelligent analysis, and troubleshooting monitoring optimization
prediction, and troubleshooting
Planning + Construction + Maintenance
Automated + Intelligent Manager + Controller + Analyzer
+ Optimization
2 3 4
Autonomous Driving
Manager Controller Analyzer Network System
=
Network
9 Huawei Confidential
• iMaster NCE effectively connects physical networks with business intents and
implements centralized management, control, and analysis of global networks. It
enables resource cloudification, full lifecycle automation, and data analytics-driven
intelligent closed-loop management according to business and service intents and
provides open network APIs for rapid integration with IT systems.
• Huawei iMaster NCE can be used in the enterprise data center network (DCN),
enterprise campus, and enterprise branch interconnection (SD-WAN) scenarios to
make enterprise networks simpler, smarter, open, and secure, accelerating enterprise
service transformation and innovation.
iMaster NCE Application
10 Huawei Confidential
Contents
1. SDN Overview
▫ Overview of REST
11 Huawei Confidential
Basic Concepts of Southbound and Northbound
⚫ Southbound and northbound are relative concepts. Generally, the interfaces provided by an upper-layer system for
a lower-layer system are called southbound APIs, and the interfaces provided by a lower-layer system for an upper-
layer system are called northbound APIs.
OSS
Controller
Southbound API
12 Huawei Confidential
• The operation support system (OSS) is a necessary support platform for telecom
services.
⚫ Devices may use diverse northbound APIs such as SNMP, CORBA, and REST. Nowadays, these APIs are gradually
unified into the REST style.
OSS OSS
MTOSI/CORBA/SNMP REST
Controller Controller
13 Huawei Confidential
API Evolution: Unified URI Naming Conventions
⚫ REST standardizes universal resource identifier (URI) naming conventions. Resource-oriented URI
names are easy to understand.
⚫ A URI identifies the location of a resource.
Without REST: URIs were randomly named. With REST: URIs are independent and methods are clear.
URIs without constraints on naming conventions: URIs with naming conventions of REST:
• Reserving a meeting room: /reserve/meetingroom/B25R • Reserving a meeting room: /meetingroom/B25R, with the
• Canceling a reserved meeting room: calling method being POST
/cancel/meetingroom/B25R • Canceling a reserved meeting room: /meetingroom/B25R,
• Querying the meeting room status: with the calling method being DELETE
/meetingroom/B25R?method=query • Querying the meeting room status: /meetingroom/B25R,
with the calling method being GET
14 Huawei Confidential
API Evolution: Stateless Design
⚫ REST uses a stateless design to enhance system scalability.
⚫ Stateful: The server needs to save and maintain the state information of previous requests. Each subsequent state depends on the
previous state.
⚫ Stateless: The server sends back the same response for invocation of the same request, function, or method, without depending on
other requests. The server does not need to maintain state information, facilitating expansion. At least one URI is available to locate
a resource.
Without REST: both stateful and stateless used With REST: stateless
15 Huawei Confidential
• Stateful request: A server generally needs to save and maintain the status information
of previous requests. Each request can use information about the previous requests by
default.
• Stateless request: The processing result on the server must be based on the
information carried in the same request.
Contents
1. SDN Overview
16 Huawei Confidential
Overview of REST
⚫ Representational State Transfer (REST) was proposed by Roy Thomas Fielding, HTTP's leading designer,
in his doctoral dissertation in 2000. In short, REST is a design style.
Presentation
17 Huawei Confidential
• Abstract of Roy's doctoral dissertation Architectural Styles and the Design of Network-
based Software Architectures:
State transfer:
Resource: Presentation layer:
HTTP actions for create, read,
URI for locating Format for
update, delete (CRUD)
resources presenting resources
operations
GET/POST/PUT/DELETE
API
18 Huawei Confidential
• REST is short for Representational State Transfer, in which the main entity — resource
— is not presented.
REST Concepts - Presentation Layer
⚫ Representation is the way a resource is presented.
⚫ For example, a text can be presented in TXT, HTML, XML, JSON, or even binary format; an image can
be presented in JPG, PNG, or other formats.
GET/POST/PUT/DELETE
API
19 Huawei Confidential
GET/POST/PUT/DELETE
API
20 Huawei Confidential
RESTful and RESTCONF
⚫ RESTful APIs comply with the REST design style. There are no mandatory requirements on RESTful APIs, and
therefore RESTful APIs can be defined freely.
⚫ RESTCONF APIs also comply with the REST design style. Unlike RESTful APIs, RESTCONF APIs must comply with
RFC 8040 defined by Internet Engineering Task Force (IETF). RFC 8040 defines RESTCONF APIs and their
specifications. RESTCONF APIs are based on HTTP and are used to access data defined in Yet Another Next
Generation (YANG). RESTCONF allows web applications to access configuration data, status data, and event
notifications of network devices in a modular and scalable manner.
REST + Configuration
21 Huawei Confidential
Request
URI
method
HTTP request
Message Status
header code
HTTP response
Message
body
All the preceding fields are contained in HTTP packets. Therefore, REST makes full use
or heavily relies on HTTP.
22 Huawei Confidential
▫ The URL is a subset of the URI. The former must be an absolute path, while the
latter can be an absolute path or a relative path. For example,
http://127.0.01:8080/AppName/rest/product/1 is a URL, and
AppName/rest/product/1 is a URI.
Contents
1. SDN Overview
▫ HTTP/1.1
23 Huawei Confidential
• As mentioned earlier, REST makes full use or heavily relies on HTTP. Next, we will
move on to HTTP.
Development of HTTP
⚫ HTTP was proposed by Tim Berners-Lee in 1990. After the WWW Alliance was established, the IETF working group
further optimized and released the HTTP protocol. Over the evolution from HTTP/0.9 to HTTP/3, HTTP offers
increasingly high performance.
24 Huawei Confidential
http://WWW
25 Huawei Confidential
• The data transmitted using HTTP can be HTML, images, texts, and so on.
Working Principle of HTTP
⚫ HTTP is based on the client/server (C/S) architecture. The HTTP request and response process is as follows:
A client establishes a TCP connection with the server.
The client sends an HTTP request, which consists of a request line, request header, empty line, and request data.
The server receives the request and sends back an HTTP response, which consists of a status line, response header, empty line,
and response body.
The client parses the status line, response header, and response body in sequence and displays the response packet. If the bo dy
contains HTML data, the client formats the data based on the HTML syntax and displays the data.
HTTP request
26 Huawei Confidential
• When a TCP connection is released, if the value of the Connection field in the packet
header is close, the server proactively closes the TCP connection, and the client
passively closes and releases the TCP connection. If the value of Connection is
keepalive, the connection lasts for a period of time and can continue to receive
requests.
Features of HTTP
⚫ HTTP has the following features:
Connectionless: Only one request is processed for each connection. After processing the client's request, the
server disconnects from the client.
Media independent: Any type of data can be sent by HTTP as long as both the client and the server know how to
handle the data content. It is required for the client as well as the server to specify the content type using
appropriate MIME-type.
Stateless: The server and client are aware of each other only during a current request. Afterwards, both of them
forget about each other. This facilitates quick processing of a large number of transactions and enhances the
protocol scalability.
Media
Connectionless Stateless
independent
HTTP request
27 Huawei Confidential
• The browser differentiates the displayed content such as HTML, XML, GIF, and flash
based on MIME-type.
• Advantages of the connectionless feature: This mode saves the transmission time and
improves the concurrent performance. No persistent connection is established. Instead,
one response is made to each request. However, if a connection is repeatedly
established and torn down, the efficiency is affected. In HTTP/1.1, a TCP connection is
maintained between the browser and the server for a period of time and will not be
disconnected immediately after a request ends.
• Stateless means that, if the processing of subsequent packets requires the previously
exchanged information, the information must be retransmitted. Although HTTP/1.1 is
a stateless protocol, cookies are introduced to implement the function of maintaining
status information.
• A cookie is a text file stored on a client. This file is associated with a specific web page
and saves the information about the web page accessed by the client.
Contents
1. SDN Overview
28 Huawei Confidential
• HTTP/1.1 has been widely used since it was proposed in 1999 and has become a
mainstream standard for more than 20 years. In the following part, we will introduce
HTTP packets, which are based on HTTP/1.1.
Client Request Message
⚫ An HTTP request message sent by a client consists of a request line, request header, empty line, and
request data. The following figure shows the format of a request message.
Request Carriage
Request line Space URI Space Protocol version Linefeed
method return
Carriage
Header field name:Value Linefeed
return
Carriage
Header field name:Value Linefeed
return
Carriage
Empty line Linefeed
return
29 Huawei Confidential
Request Line Request Header Request Data
Request Carriage
Space URI Space Protocol version Linefeed
method return
Carriage
Header field name:Value Linefeed
return
...
Carriage
Header field name:Value Linefeed
return
Carriage
Linefeed
return
Data
30 Huawei Confidential
Request Line Request Header Request Data
Method Function
GET Requests the specified page information. The server returns the specific data.
POST Submits data, for example, a form.
Similar to the GET method. However, the response does not contain any specific data. HEAD is used
HEAD
to obtain the header.
PUT Updates and modifies data.
DELETE Deletes a specified page.
CONNECT Implements HTTP proxy.
OPTIONS Allows the client to check the server performance.
TRACE Echoes back the request received by the server. This is used for testing or diagnosis.
PATCH Partially updates known resources.
31 Huawei Confidential
Request Line Request Header Request Data
Request Carriage
Space URI Space Protocol version Linefeed
method return
Carriage
Header field name:Value Linefeed
return
...
Carriage
Header field name:Value Linefeed
return
Carriage
Linefeed
return
Data
32 Huawei Confidential
Request Line Request Header Request Data
33 Huawei Confidential
• In HTTP 1.0, each connection involves only one request and response and is closed
after the request is processed. HTTP 1.0 does not have the Host field. In HTTP 1.1,
multiple requests and responses can be transmitted in the same connection, and
multiple requests can be processed concurrently.
• WWW-Authenticate is a simple and effective user identity authentication technology in
the early stage.
• The browser differentiates the displayed content such as HTML, XML, GIF, and flash
based on MIME-type.
• For more information, refer to RFC HTTP 1.1 at https://www.ietf.org/rfc/rfc2616.html.
Request Line Request Header Request
Request Data
Data
Request Carriage
Space URI Space Protocol version Linefeed
method return
Carriage
Header field name:Value Linefeed
return
...
Carriage
Header field name:Value Linefeed
return
Carriage
Linefeed
return
Data
34 Huawei Confidential
Server Response Message
⚫ An HTTP response consists of four parts: status line, response header, empty line, and response body.
Protocol Carriage
Status line Space Status code Space Reason phrase Linefeed
version return
Carriage
Header field name:Value Linefeed
return
Carriage
Header field name:Value Linefeed
return
Carriage
Empty line Linefeed
return
35 Huawei Confidential
Status line Response header Response
Request Data
body
Protocol Carriage
Space Status code Space Reason phrase Linefeed
version return
Carriage
Header field name:Value Linefeed
return
...
Carriage
Header field name:Value Linefeed
return
Carriage
Linefeed
return
Data
36 Huawei Confidential
Status line Response header Response
Request Data
body
Status Code
⚫ An HTTP status code is a three-digit number indicating the status of a response from the server. It is used to return the operation
result to the client.
37 Huawei Confidential
Status line Response header Response
Request Data
body
Protocol Carriage
Space Status code Space Reason phrase Linefeed
version return
Carriage
Header field name:Value Linefeed
return
...
Carriage
Header field name:Value Linefeed
return
Carriage
Linefeed
return
Data
38 Huawei Confidential
• The response header describes the basic information about the server and data. The
server uses the response header to notify the client of how to process the data that it
replies to.
Status line Response header Response
Request Data
body
Encoding method of a document. The content type specified by Content-Type can be obtained
Content-Encoding
only after decoding.
Content-Length Content length. This field is required only when the client uses a persistent HTTP connection.
Location from which the client obtains resources. This field is used together with status code
Location
302 to specify a new URI as the recipient.
Type of authorization information that the client should provide in the Authorization header.
WWW-Authenticate
This field is mandatory in a response that contains the 401 (Unauthorized) status line.
39 Huawei Confidential
• The HTTP response header is often combined with the status code. For example, the
status code 302 (indicating that the location has changed) is usually used together
with the Location header, and the status code 401 (Unauthorized) must be used
together with a WWW-Authenticate header. The response header can be used to set
the cookie, specify the date, instruct the client to refresh the page at the specified
interval, and so on.
Status line Response header Response body
Request Data
Protocol Carriage
Space Status code Space Reason phrase Linefeed
version return
Carriage
Header field name:Value Linefeed
return
...
Carriage
Header field name:Value Linefeed
return
Carriage
Linefeed
return
Data
40 Huawei Confidential
Client Request Message - Example
⚫ A client sends a request containing the user name and password to the server for login authentication.
Request Carriage
Space URI Space Protocol version Linefeed
method return
Carriage
Header field name:Value Linefeed
return
...
Carriage
Header field name:Value Linefeed
return
Carriage
Linefeed
return
Data
41 Huawei Confidential
Server Response Message - Example
⚫ The server sends a response to the client, indicating that the authentication is successful.
HTTP/1.1 200 OK
Status line
Date: DD MM YYYY HH:MM:SS Time zone
Content-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
Response header
Content-Type: text/html
Connection: keep-alive
Empty line
Protocol Carriage
Space Status code Space Reason phrase Linefeed
version return
Carriage
Header field name:Value Linefeed
return
...
Carriage
Header field name:Value Linefeed
return
Carriage
Linefeed
return
Data
42 Huawei Confidential
Contents
1. SDN Overview
▫ HTTP/1.1
◼ HTTPS and HTTP/2
43 Huawei Confidential
Overview of HTTPS
⚫ Based on HTTP, Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS) uses SSL/TLS for
encryption, enhancing security.
Plaintext
Client Server Client Ciphertext Server
• Identity
HTTP authentication
HTTP • Information
TLS encryption
• Integrity check
TCP
TCP
IP
IP
44 Huawei Confidential
Risks of HTTP communication without using SSL/TLS Features of HTTPS communication using SSL/TLS
1. Eavesdropping: HTTP transmits information in plaintext, and 1. Data integrity: HTTPS uses SSL/TLS to encrypt and transmit all
third parties can obtain communication data. HTTP packets. All information is encrypted and cannot be
2. Tampering: Third parties can tamper with the communication intercepted or tampered with by third parties.
3. Pretending: Third parties can pretend others to participate in tampered with, the communication parties can immediately detect
45 Huawei Confidential
⚫ HTTP/2 greatly improves web performance without changing HTTP semantics, methods, status codes, URIs, and
header fields.
HTTP/1.1 HTTP/2
Latency: 57 ms Latency: 38 ms
Load time: 7.84s Load time: 3.6s
30% 80%
46 Huawei Confidential
⚫ In HTTP/1, data is transmitted in text mode, which has some defects. This is because various scenarios need to be
considered to achieve robustness, due to the diversity of text formats. On the contrary, the binary format involves
only 0s and 1s, featuring significant convenience and robustness.
HTTP/1.1
POST http://www.w3.org HTTP/1.1
Accept: text/html
Application Content-Type: text/html;charset=utf-8
Connection: keep-alive
layer (HTTP)
user=admin&password=123456
Session layer
HTTP/2
Transport layer
Header
Network layer Frame
47 Huawei Confidential
• Enhancements to HTTP/2:
• Header compression: The HPACK algorithm is used to compress headers to reduce the
header size and improve performance.
• Multiplexing: A request message can be divided into frames, which are sent in
sequence and are reassembled at the other end. In HTTP/1.1, when a client sends
multiple requests through a TCP connection, the server can only respond to the
requests in sequence. Subsequent requests may be blocked.
• Resource pushing: In addition to responding to client requests, the server can push
additional resources to clients.
• Priority: HTTP/2 defines complex priority rules. A browser can request multiple
resources at a time and specify priorities to help the server determine how to process
these resources, avoiding resource competition.
Quiz
1. (Single-answer question) Which of the following HTTP request methods does not
need to contain request data in an HTTP request? ( )
A. POST
B. GET
C. PUT
D. DELETE
48 Huawei Confidential
1. B
Summary
49 Huawei Confidential
More Information
⚫ REST dissertation
https://www.ics.uci.edu/~fielding/pubs/dissertation/rest_arch_style.htm
⚫ RFC HTTP/1.1
https://www.ietf.org/rfc/rfc2616.html
⚫ RFC HTTP/2
https://www.ietf.org/rfc/rfc7540.html
⚫ RFC HTTPS
https://www.ietf.org/rfc/rfc2818.html
50 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. Solution Overview
3 Huawei Confidential
Huawei CloudCampus Solution
Open architecture: Pre-integration and easy integration
Open • Pre-integrates the offerings from 30+ ecosystem partners and
Customer a feature database of 360+ terminals.
Application Electronic Energy Asset ... ecosystem • Provides 300+ APIs of four types for easy integration with
shelf efficiency flow third-party vendors.
layer mgmt.
label mgmt. analysis
Simplified deployment: Automated deployment and cloud-
based architecture
• Automation: automatic deployment based on the policy
Open API engine, with 50% higher efficiency.
Platform • Virtualization: VXLAN-based network virtualization, achieving
Internet one network for multiple purposes.
layer • Cloudification: full-lifecycle cloud management service,
Intent engine Security engine deploying a branch network in minutes.
Secure threat defense: Proactive threat defense and
Smart collaborative network protection.
Campus
iMaster NCE • Collects real-time data through security probes to implement
Insight network network-wide security situation awareness.
• Proactively identifies and handles security threats based on a
Policy engine Analytics engine security engine, with a threat identification rate of over 99%.
NETCONF/YANG Telemetry/Context Intelligent O&M: Experience visibility and prediction-based
optimization.
• Data collection in seconds through telemetry, achieving user
Virtual office experience awareness throughout the journey.
network • 85% fault identification rate based on expert experience and
Virtual production Virtual security AI-based dynamic baseline exception detection.
network protection network
Network Ultra-broadband bearer: Scenario-specific innovations and ultra-
Overlay broadband.
layer Ultra- • Ultra-broadband forwarding: 100GE core switches, ensuring non-
Central AP blocking high-speed forwarding.
broadband • Ultra-broadband access: Industry's first commercial Wi-Fi 6 APs,
successfully delivered to 10+ customers.
Small campus Medium-sized
Large-sized campus connection • Scenario-specific innovations: All-scenario WLAN solutions ideal
campus for coverage needs in different scenarios.
Underlay • IoT: Convergence of IoT and Wi-Fi (Zigbee, RFID, BLE, and UWB).
4 Huawei Confidential
1 Basic network API 2 Value-added service API 3 Third-party API 4 LBS API
Basic Network Terminal App data Platform RSSI API
Platform service API configuration API data API API
Portal + RADIUS
layer AP RSSI API
O&M and Policy service Traffic data
IoT API Authorization API
monitoring API API API Bluetooth API
Solution platform layer (intent engine, policy engine, security engine, and analytics engine)
5 NETCONF/YANG/Telemetry/Syslog/SNMP/NetStream
Network
layer
Firewall AR Switch WLAN AP 6
IoT card
RFID
Terminal 30.0 ... ... Bluetooth ZigBee
layer Electronic Asset tag Baby Smart wrist Mobile IP phone Tablet Camera Partners
shelf label wristband strap
5 Huawei Confidential
• Platform layer: It provides four types of APIs and supports industry-standard network
interconnection protocols.
• Network layer: It provides various open interfaces, such as NETCONF, YANG, and
Telemetry, improving device manageability. APs are compatible with third-party IoT
cards to implement IoT.
• Terminal layer: It supports access of IoT terminals (such as ZigBee, RFID, and BLE), and
access of wired and wireless terminals (such as mobile phones, IP phones, tablets, and
cameras).
Typical Cooperation Scenarios and Open APIs
Typical cooperation
scenarios Authentication Network Location- Crowd
Smart IoT
and authorization O&M based service profiling
▪ Energy efficiency
management
▪ Asset management
▪ IoT-based positioning
▪ Electronic shelf label
1 Basic network API 2 Value-added service API 3 Third-party API 4 LBS API
Platform Basic service Network Terminal data App data Platform RSSI API
Portal + RADIUS
layer API configuration API API API
AP RSSI API
O&M and Traffic data
Policy service API IoT API Authorization API Bluetooth API
monitoring API API
5 NETCONF/YANG/Telemetry/Syslog/SNMP/NetStream
6
Network IoT card
layer RFID
Firewall AR Switch WLAN AP ZigBee
Bluetooth
6 Huawei Confidential
Contents
1. Solution Overview
▫ LBS
▫ Crowd Profiling
▫ Network O&M
▫ Smart IoT
7 Huawei Confidential
Introduction to Authentication and Authorization
⚫ Authentication and authorization: A third-party authentication and authorization platform interworks with iMaster NCE-Campus to
perform network access authentication and accounting for terminals that access Huawei intent-driven campus networks.
8 Huawei Confidential
10.Delivers authorization to the device through the HACA channel. 9. Invokes the authorization API.
11.Returns the authorization result.
12.Invokes the API for querying
authorization status.
13.The portal server sends the authentication result to the user through the HTTP page.
14. The authentication is successful. The user obtains the
network access permission and downloads the app. Internet 15.Brings the user offline
according to the third-party
policy.
9 Huawei Confidential
• To access the Internet, a user connects to the SSID of a Wi-Fi network and logs in to
the portal pushed by a developer app. The developer app calls the authorization API of
Huawei iMaster NCE-Campus to deliver the user's Wi-Fi access permission to the AP.
The user then can access the Internet.
• NAC is short for network access control.
• Huawei Agile Cloud Authentication (HACA) is based on the mobile Internet protocol
HTTP/2.
Interconnection Using the Authorization API
Sample Code (Windows)
Request Response
POST STATUS CODE 200
/controller/cloud/v2/northbound/accessuser/haca/authorization
{ {
"deviceMac":"AA:AA:AA:00:00:89", "errcode": "",
"deviceEsn":"AA50082935AAAA000088", "errmsg": "",
"ssid":"YWFh", "psessionid":
"policyName":"dfdsffd", "846d65a4e1bb38c350a280f46e6d2f6ab0a688df7edbb72b77bc5d03e3
"terminalIpV4":"10.11.11.11", 926cd6"
"terminalMac":"ff-ff-ff-ff-ff-f1", }
"username":"liao",
"nodeIp":"10.186.40.148",
"apMac":"AA:AA:AA:00:00:89"
}
10 Huawei Confidential
11 Huawei Confidential
1. Solution Overview
▫ Crowd Profiling
▫ Network O&M
▫ Smart IoT
12 Huawei Confidential
LBS Introduction
⚫ A location-based service (LBS) is deployed on a third-party LBS application platform and used to detect and locate terminals
managed on Huawei intent-driven campus networks. The LBS provides the customer flow analysis, Wi-Fi marketing, and navigation
based on the terminal locations.
13 Huawei Confidential
• Location-based service (LBS) uses various locating technologies to obtain the current
locations of devices and pushes information and basic service for these devices through
mobile Internet.
• iMaster NCE-Campus aggregates the terminal location data collected by cloud APs and
periodically sends the data to the third-party LBS platform. After parsing and analyzing
the location data with a series of algorithms, the LBS platform provides VASs, such as
heatmap, tracking, and customer flow analysis, for customers.
• Remarks: Partners need to meet related standards based on application scenarios, such
as EU General Data Protection Regulation (GDPR).
Data Reporting Process: HTTP + JSON Solution
Client AP iMaster NCE-Campus Third-party platform (LBS server)
1. Generates the
interconnection URL and
2. Configures the secret.
interconnection URL and the
secret field.
3. Generates the validator field.
Preparation 4. Sets the validator field
5. Sends a GET request using HTTPS.
One-time
6. Returns the validator value.
8. Enables the data reporting
Configuration function and delivers the 7. Verifies the validator value.
configuration.
9. Collects terminal
location data. 10.Reports RSSI data to
Send RSSI data iMaster NCE-Campus.
to the third- 11.Reports RSSI data in JSON format to the
party platform. third-party platform.
Periodic
14 Huawei Confidential
• iMaster NCE-Campus can directly report terminal location data to a third-party LBS
platform. In this solution, iMaster NCE-Campus function as a relay agent.
• For details about this process, see "Wi-Fi Terminal Location Practice in Huawei
CloudCampus Solution" in the HCIP-Datacom-NCE Northbound Openness Lab Guide.
Data Example: HTTP + JSON Solution
Sample Code (Windows)
{
• secret: Used by a third-party LBS platform to verify the data
"data":[
{ sent by iMaster NCE-Campus. If the secret does not match
"apMac":"4C:FA:CA:D8:23:A0",
"terminallist":[ that associated with the reported URL, the data is discarded.
{ The value is generated by the third-party LBS platform, and
"terminalMac":"88:19:08:F1:88:45",
"rssi":-68, is a string of 32 hexadecimal characters.
"timestamp":1557460789000
}, • validator: Before sending data, iMaster NCE-Campus checks
{ whether the validator returned by the peer end is correct. If
"terminalMac":"90:2E:1C:6A:2A:57",
"rssi":-57, the validator does not match that associated with the
"timestamp":1557460789000
}
reported URL, iMaster NCE-Campus does not send Wi-Fi
] terminal location data to the third-party LBS platform.
}
],
"secret":"Test@1234",
"type":"Aplocation"
}
15 Huawei Confidential
AP
Terminal
16 Huawei Confidential
17 Huawei Confidential
1. Solution Overview
▫ LBS
◼ Crowd Profiling
▫ Network O&M
▫ Smart IoT
18 Huawei Confidential
Crowd Profiling
• Crowd profiling: A third-party big data analysis platform analyzes the locations and status of terminals detected and
managed on Huawei intent-driven campus networks to obtain the characteristics of crowd profiles in an area, so
that target content can be pushed to the customers to provide personalized services.
Application Scenario
• The business industry has the requirements for precision
Method 1: VAS API marketing. Direct marketing can tag specific people based on
Open API crowd profiles, and push target content to provide personalized
services based on these tags. Crowd profiling requires two types of
MSP 3rd-party data: one is the data left online; the other type of data is left in
service
Method 2: LBS API brick-and-mortar stores (offline data), which can be collected
using Wi-Fi probes and from network access data of customers.
Cloud AP Cloud AP Cloud AP
Integration Solution Suggestions
LBS API Terminal location information is provided.
Terminal login and logout information, network application
VAS API
information, and network traffic information are provided.
19 Huawei Confidential
Invoking a VAS API
20 Huawei Confidential
1. Solution Overview
▫ LBS
▫ Crowd Profiling
◼ Network O&M
▫ Smart IoT
21 Huawei Confidential
Network O&M Overview
⚫ Network O&M: Third-party network management platforms (such as MSP-owned or mainstream network
management and monitoring platforms) can manage or monitor devices managed by iMaster NCE-Campus.
Application Scenario
• MSPs and customers use their existing network management platform to
manage or monitor devices that are supposed to be managed by iMaster
Method 1: VAS API NCE-Campus, such as creating tenant administrator accounts, managing
devices, configuring networks for specified devices, and monitoring
Open API
device status and alarms.
3rd-party • Currently, two methods are available to implement network O&M:
MSP
service Network service APIs: The third-party network management platform
manages and monitors devices through RESTful APIs.
Method 2: APIs based on Traditional device APIs based on NETCONF, YANG, Telemetry, and
NETCONF, YANG, Telemetry,
SNMP: Network management platforms can directly configure,
Syslog, SNMP, and NetStream
manage, and maintain devices through these APIs.
22 Huawei Confidential
Interconnecting with a Third-Party Network Management
and Monitoring Platform
Third-party network
Device iMaster NCE-Campus management and
monitoring platform
The tenant administrator creates a The partner obtains the account and
northbound API administrator account. password, obtains the Token_id through
postman, and carries the Token_id in the
head of the invoked API to perform API-
based authorization.
Adds a tenant administrator account.
Configures an SSID.
Invokes the SSID configuration API.
Delivers configurations. Configures the SSID on iMaster NCE-Campus.
23 Huawei Confidential
1. Solution Overview
▫ LBS
▫ Crowd Profiling
▫ Network O&M
◼ Smart IoT
24 Huawei Confidential
Introduction to Smart IoT
⚫ Smart IoT: A third party expands an AP into an IoT base station through the open card capability of the AP to
implement functions such as energy efficiency management, asset management, IoT locating, and electronic shelf
label.
Application Scenario
• When partners want to deploy IoT applications (such as
3rd-party
service electronic shelf label, IoT locating, energy efficiency
Electronic shelf management, and asset management), they can use
IoT locating
label Huawei's network infrastructure to provide IoT signal
Energy efficiency Asset coverage (ZigBee, Bluetooth, and RFID), without the
management management need to deploy a secondary IoT network.
Open API
• Based on Huawei Cloud Campus Solution, partners can
develop IoT cards and IoT service software on the cards
to provide IoT services based on the network
infrastructure.
▫ Huawei provides the network infrastructure, open
AP hardware, and basic IoT card management and
monitoring.
Cloud AP ▫ Partners develop IoT cards, card software, and IoT
service software.
25 Huawei Confidential
Smart IoT: Open Cards
Built-in card External card
Card
26 Huawei Confidential
1. Solution Overview
27 Huawei Confidential
Unified Cloud-based Wi-Fi Management in XX
• How to ensure Wi-Fi signal quality and
user access experience in diversified
tenant environments.
• XX provides Wi-Fi services over
Background Challenges • O&M for massive devices. A large
more than 800 cities and has
number of tenants have devices scattered
1.5 million users.
in difference places, resulting in high
installation and O&M costs.
Customer Benefits
Solution Implementation
System Authentication iMaster NCE-Campus implements plug-and-play Network High-quality Wi-Fi
management /Accounting and fast deployment of devices and provides full- coverage coverage
lifecycle cloud-based and centralized
management, simplifying O&M. It provides open
iMaster 3rd-party APIs to seamlessly interconnect with third-party
platform Cloud-
NCE-Campus authentication and accounting management based 80% lower OPEX
platforms, implementing secure network mgmt
management.
Cloud AP Cloud AP
Cooperation Scenario and API
Smooth Securer customer
... Authentication and authorization: Portal + upgrade investment
RADIUS API
28 Huawei Confidential
XX Builds the Future Business
• Consumer experience: The customer requires high-
• XXX is a large city complex that integrates density, high-quality wireless network access to provide
industry R&D, apartments, hotels, and precise indoor navigation in more than 160 stores and
businesses. 30,000 parking spaces.
Background Challenges • Smart operations: The customer wants to use big data
• It is a landmark building group in XXX.
Wireless networks are an important analytics technology to describe consumer behavior and
infrastructure. visualize staff locations in support of marketing and
operational decision-making.
29 Huawei Confidential
Digital Transformation of the XX Supermarket
• XX is a well-known chain supermarket • Shopping experience: The customer wants to provide
in China. high-quality wireless network access to improve
• One of China's top 500 enterprises and customers' shopping experience.
Background Challenges • Manpower: The customer wants to reduce manpower
leading enterprise in China's national
merchandising and agricultural and O&M costs, and improve the accuracy of
industrialization supermarket services.
Internet
Dual-network convergence Customer Benefits
Store Huawei AP4050DN-E provides built-in slots for IoT
Network managemnt modules to converge Wi-Fi and IoT networks, achieving Converged high-quality
Converged
management system unified planning of the two networks. mgmt.
Wi-Fi
platform Electronic shelf label and IoT networks
Electronic shelf labels interwork with the supermarket
WAC Switch management system and customer's Enterprise Resource
ESL-based smart
Planning (ERP) system to display prices in real-time and Smart
provide interactive functions such as code scanning, operations operation
supermarket
coupon claiming, and out-of-stock warning.
AP4050DN-E AP4050DN-E
+ IoT card Wireless Internet service
+ IoT card
Huawei AP4050DN-E helps build a high-quality wireless
Wireless
network for customers to scan QR codes for shopping or Improved customers'
Internet
entertainment. access shopping experience
30.0 30.0 Cooperation Scenario and API
Electronic shelf label Electronic shelf label
Smart IoT: IoT card
30 Huawei Confidential
Quiz
B. Platform layer
C. Network layer
D. Terminal layer
31 Huawei Confidential
1. ABCD
Summary
32 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
⚫ NCE service openness and programmability are based on the open architecture driven by the YANG
model. Huawei enables openness and programmability at the NE and network layers in the form of
Specific NE Driver (SND) and Specific Service Plugin (SSP) packages, implementing quick
interconnection between new devices and fast rollout of new network services.
⚫ This course introduces the background of service openness and programmability and Huawei's
practices.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. Background
3. Key Capabilities
4. Related Concepts
5. Practice Cases
3 Huawei Confidential
Network O&M Adjustment in the 5G/Cloud Era
4 Huawei Confidential
• First, let's take carriers as an example. Globally, most carriers face the problems of
revenue decrease and OPEX increase. Moreover, as OTT providers continue to preempt
market shares, more and more carriers take OTT providers as their competitors. These
factors drive carriers to transform their networks. In this case, carriers are faced with
the following problems: how to implement multi-network convergence, multi-vendor
collaboration, and fast and efficient management of converged networks.
• In the 5G era, everyone predicts that 5G will lead to new businesses and services.
However, carriers raise requirements for the rollout of new services, and device
vendors implement the requirements. The rollout period is half a year or several years.
It takes only a few months for OTT providers to launch new services, which makes it
impossible for carriers and OTT providers to compete equally. There are many reasons
for slow service rollout. One of the reasons is that there is a gap between carriers and
vendors. That is, carriers do not understand devices, and vendors do not understand
carrier services. It is an urgent issue to eliminate the impact of this gap and enable
carriers and vendors to play their roles in the fields they are familiar with and quickly
provision new services.
• Finally, the products provided by vendors are universal, that is, they are applicable to
most operators. Carriers want systems to match their service requirements and
enterprise cultures. Therefore, they have customization requirements. For example, a
carrier writes the customization capability into its bidding document or customizes
enterprise specifications. From the perspective of vendors, customization requirements
of customers generate high costs. Therefore, the best solution is to provide the
customization capability and let customers complete customization by themselves.
• For other enterprises, they also face the same problem in the cloud era. Cloudification
is a trend. Infrastructures need to be managed by the cloud platform in a unified
manner. In addition, frequent service changes in the cloud data center have high
requirements on automation. These requirements require a more open network.
Evolution from CLI to Full Automation
6 Huawei Confidential
• In this case, enterprises can directly control the forwarding plane of network devices
through the application programming interface (API) exposed on the control plane,
which paves the way for modern network automation.
• On a modern network with forwarding-control decoupling, the separation of the
forwarding and control planes and centralization of the control plane change the
network automation object from "one-to-many" to "one-to-one". Network engineers
no longer need to worry about device adaptation. With PCEP (RFC 5440), FORCES (RFC
5810), BGP-LS (RFC 7752), and NETCONF/YANG (RFC 6241/RFC 7950) contributed by
the open source community, software vendors can build a set of industry-standard
models to describe managed objects, and the APIs generated based on these models
are called by automation scripts or network configuration applications.
• The benefits of using model-based APIs are significant. Because each model is
decoupled from protocols and encoding rules, one model can adapt to multiple
protocols and encoding rules. This provides a solution to uniformly adapt to network
devices that support different network management protocols. Thanks to a unified
device adaptation solution, we have a new direction to do things that we could not do
before.
▫ (1) Using model-based APIs, enterprises can quickly implement telemetry of
devices on the entire network and automatically collect device-level and service-
level network running data, helping network O&M engineers learn about the
network running status promptly.
▫ (2) Model-based APIs can also help enterprises build a tool chain to implement
user intent identification, automatic service provisioning, automatic network-wide
telemetry, and automatic network adjustment and optimization based on data
analysis, thereby implementing intent-driven networks.
Huawei's NCE Service Openness and Programmability Practice
⚫ iMaster NCE (NCE for short) is an innovative
network cloudification engine of Huawei. The Overall Openness and Programmability of NCE (Open
overall openness and programmability of NCE API)
Automation Analytics
• Huawei open programmability system (OPS), a Administration Control Awareness Analysis Decision
unit unit
closed-loop component of the automation Automation engine Analytics engine
engine, are crucial to the entire open
programming system of iMaster NCE.
OPS
8 Huawei Confidential
1. Background
3. Key Capabilities
4. Related Concepts
5. Practice Cases
9 Huawei Confidential
Introduction (1)
⚫ Similar to the operating system on a computer, NCE service openness and programmability are crucial to networks.
Service Management
Operating System ⚫ Build new network services based on
service requirements.
⚫ View NE-level configurations
Program Management decomposed based on services.
⚫ Provide other functions such as
rollback upon a transaction failure.
Hardware Management
Device Management
⚫ Manage device status and
configurations.
Driver ⚫ Provide functions such as device
grouping and device configuration
synchronization.
Device Driver
⚫ Know devices.
⚫ Understand device capabilities.
Other Third-party
Mouse Keyboard CX600 NE40E
hadware device
10 Huawei Confidential
• The open architectures of different industries are similar. Similar to the operating
system on a computer, NCE service openness and programmability are crucial to
networks.
• To connect the operating system to managed hardware, such as the mouse and
keyboard, you need to install corresponding drivers. The drivers enable the operating
system to recognize the hardware. NCE service openness and programmability have
similar functions. The difference is that switches and routers are managed in the
datacom industry. First, we need to understand and manage these switches and
routers. That is, load device drivers first, and then add and understand the specific
capabilities of the devices.
• At the top layer, the operating system provides program management to manage
various applications, such as Word and Excel. Note that the mouse and keyboard
capabilities are required for using these programs. NCE service openness and
programmability implement service management at the top layer, that is, building
network service capabilities based on application scenarios. In addition, NCE provides
capabilities such as rollback up on a transaction failure and automatic detection of
device configuration changes to improve O&M.
Introduction (2)
⚫ NCE service openness and programmability are implemented based on two key software packages: Specific NE
Driver (SND) and Specific Service Plugin (SSP). By compiling and loading two driver packages, you can quickly
interconnect new devices and build new services.
11 Huawei Confidential
• NCE service openness and programmability depend on two software packages: SND
and SSP.
▫ Specific NE Driver (SND): provides a data model for the iMaster NCE OPS to
interact with NEs.
▫ Specific Service Plugin (SSP): defines a data model for completing network
service configuration.
• Engineers compile SND packages and load them to iMaster NCE to quickly
interconnect with new devices. Then, engineers compile SSP packages and load them
to iMaster NCE to quickly construct new services.
Architecture
Open device and service programmability
Web UI RESTCONF CLI
1. Open device capabilities: Device capability openness is
3 3
enabled by loading the YANG model of an NE.
SSP 2. Open service definition capabilities: Service capability
Project
management openness is enabled by customizing and loading service
2 Service YANG model
iMaster NCE
12 Huawei Confidential
• Service YANG model: YANG files generated by abstracting service models can be used
to generate northbound interfaces and configuration GUIs.
• Easymap: a mapping logic algorithm that decomposes network-layer services into NE-
layer services.
Principles
⚫
NCE service openness and programmability consist of the design state and running state. The design state is used to design and develop service logic. The
running state automatically generates service and device management GUIs and northbound interfaces based on the model defined in the design state.
Users can configure devices and deliver services through the GUIs and northbound interfaces.
Design state Running state
Service management Device API gateway
Service YANG model management
Automatic UI NE management
generation
management management
Mapping GET
Synchronization
Reconciliation
Service
Inconsistency
Comparison
CRUD
discovery
NE YANG model Dry run/Preview POST
NE YANG model
Huawei Jinja2 3rd Jinja2 Operated by users
Deliver
configuration/Reset PUT Provided by Huawei
CRUD
Device
Huawei SND 3rd SND or a third party
Dry run/Preview
Deliver DELETE Base
Protocol Stack
configuration/Reset Programmed
NETCONF STelnet Web UI NBI by the user
Common Foundation
Transaction
User management
mechanism Phase 2 Globalization NCE portal ...
13 Huawei Confidential
• The design state is used to establish the mapping between the service YANG model
and NE YANG model. The system provides the mapping logic algorithm to decompose
network-layer services into NE-layer services. Currently, the NCE service openness and
programmability framework supports two layers of mapping logic: 1. Mapping from
the service model to the device model, which is processed by the SSP package. 2.
Mapping from the device model to protocol packets, which is processed by the SND
package.
• The running state uses the mappings established in the design state to manage devices
and provision services. Specifically:
▫ Service management automatically generates a service management GUI based
on the service YANG model to add, delete, modify, and query services.
• The running state provides the dryRun function to help users preview the results of the
current operation and the modification of related device configurations.
• Jinja2 is a Python template engine. NCE service openness and programmability use
Jinja2 to quickly complete the template-based processing of SSP packages.
Development Process
⚫ The overall development process is led by the customer, including requirement analysis and design, SND package development, SSP
package development, and commissioning and verification.
Incremental design
After
⚫ The customer analyzes Develop the SND Develop the Define the Develop service Perform verification is
requirements based on package based on southbound service YANG code and logic code testing and
completed,
service scenarios. the configurations Jinja2 model based based on service verification in a
enter the
⚫ The customer performs to be delivered template on service scenarios. lab production
HLD and outputs the and the involved based on the scenarios. environment.
environment.
configurations to be device types. driver
delivered and the involved package.
device types.
14 Huawei Confidential
▫ First, analyze requirements based on service scenarios and output the high level
design (HLD). In this phase, analyze the configuration commands to be delivered
and the involved device types, and then start the development of a Specific NE
Driver (SND) package. The SND package is developed as required. If the SND
package of a device exists and the SND package to be delivered is supported, you
do not need to develop the SND package again.
▫ Then, develop a Specific Service Plugin (SSP) package. Step 1: Develop the
southbound Jinja2 template. The southbound Jinja2 template can be considered
as the tailoring of the open interfaces of the device. There are many open
capabilities of devices. However, we only need to use some of them. Therefore,
find and select the required ones. Step 2: Define the service YANG model and
determine northbound input parameters. Step 3: Develop the service logic. This
step is optional. If the service layer can directly map and use the southbound
template, skip this step.
1. Background
3. Key Capabilities
4. Related Concepts
5. Practice Cases
15 Huawei Confidential
Overview of Key Capabilities
Key Capabilities
Device capability
Batch configuration
openness
Service capability
Transaction mechanism
openness
Shielding of device
Service conflict detection
differences for services
Multi-protocol
Security audit
interconnection
16 Huawei Confidential
Device Capability Openness
⚫ Open atomic capabilities of devices. Driven by the device YANG model, the iMaster NCE OPS automatically
generates northbound interfaces and configuration GUIs to quickly manage Huawei and third-party devices. It
supports device data consistency comparison, configuration reconciliation, and configuration synchronization.
17 Huawei Confidential
Service Capability Openness
⚫ Open service configuration mapping capabilities. Driven by the service YANG model, the iMaster NCE OPS automatically generates
northbound and southbound interfaces to quickly build new services. The Easymap algorithm in the mechanism is used. Users only
need to write the creation process. The update and deletion processes are calculated by the algorithm, thereby simplifying
programming and reducing development difficulties.
18 Huawei Confidential
• Easymap: a mapping logic algorithm that decomposes network-layer services into NE-
layer services. Currently, the NCE service openness and programmability framework
supports two layers of mapping logic: 1. Mapping from the service model to the device
model, which is processed by the SSP package. 2. Mapping from the device model to
protocol packets, which is processed by the SND package.
Multi-Protocol Interconnection
⚫ Support NETCONF- and STelnet-based device interconnection in the southbound direction. New devices
can be interconnected using NETCONF, and existing devices can be interconnected using commands.
NETCONF STelnet
19 Huawei Confidential
Service
Bearer mode during running
NCE service openness and
programmability
SSP YANG
YANG driver Easymap
STelnet/NETCONF
20 Huawei Confidential
Batch Configuration
⚫ Provide batch configuration capabilities. Devices with the same configuration can be grouped. A template is preset
in the system first, and then configurations are delivered in batches.
21 Huawei Confidential
Transaction Mechanism
⚫ Provide a transaction mechanism to ensure data consistency between the device and controller in both success and failure scenarios.
The dryRun function enables the customer to check the correctness of configurations before delivery. The configurations can be
repeatedly modified, and then the dryRun function is implemented until the configurations are correct. Then, the Commit operation
can be started to commit the configurations to the device.
22 Huawei Confidential
Service Conflict Detection
⚫ Provide service conflict detection capabilities. The OPS supports source tracing of configured data sources. Configuration conflicts
between different services can be detected before delivery. If the configurations of a device are modified by a third party, the device
can automatically detect the modifications and re-deploy the configurations to restore the services interrupted by the modifications
by the third party.
⚫ Implement in-depth difference discovery. The controller directly compares the NE-level data decomposed by services with device
data to check data consistency.
SSP1 SSP2
In-depth difference
Configuration diff discovery
conflict
Configuration
consistency check
23 Huawei Confidential
Security Audit
⚫ Provide security audit capabilities. Historical configuration points can be recorded and rolled back, and
service association configurations can be visualized.
24 Huawei Confidential
Contents
1. Background
3. Key Capabilities
4. Related Concepts
5. Practice Cases
25 Huawei Confidential
Function Package
Specific NE Driver (SND) Specific Service Plugin (SSP)
A type of software package that A type of software package that defines a data model
provides a data model for interaction for completing network-level service configurations.
between the OPS and NEs. The data model usually contains a Jinja2 template file,
The data model usually contains a .py a Python mapping script, and a service YANG model.
file and a data model (YANG) of Specifically:
several features. Specifically: ⚫ The Jinja2 template describes the data structure of
⚫ The former is used to define services and uses the Jinja2 syntax to perform
information related to an NE, such operations such as interpolation, condition
as device type, vendor, and judgment, and recursion.
connection information. ⚫ The Python mapping script describes how to fill the
⚫ The latter describes the data data submitted by users into the template and map
structure of NE-related features. the data to the NE data structure.
⚫ The service YANG model describes service
parameters and is constructed based on service
input.
26 Huawei Confidential
Package Mapping Mechanism
RESTful API Web-UI
Packet mapping supports two layers of mapping logic:
During the mapping from the service model to the device
NCE service openness and
programmability framework model, the logic is processed by the SSP package. During
the mapping from the device model to protocol packets,
Service package the logic is processed by the SND package.
YANG
• NCE automatically generates northbound interfaces or
Specific Service YANG
Plugin (SSP) configuration GUIs based on service models.
• Users send configuration requests to the service logic
Service callback logic Python
compiled by users through the interface provided by
the service model.
NE template 1 NE template 2 Jinja2 • The service processing consists of two parts:
▫ Python code processing, which processes service
NE driver package logic. For example, allocate resources and read NE
Specific NE Driver or service information.
(SND) NE YANG 1 NE YANG 2 YANG
▫ Jinja2 template processing, which processes
vendor-related logic. A template is actually the
data delivered to a device model. Devices from
Automatically generate NETCONF packets or deliver CLI commands
to devices through SSH. different vendors have different templates.
27 Huawei Confidential
• Currently, the NCE service openness and programmability framework supports two
layers of mapping logic: 1. Mapping from the service model to the device model, which
is processed by the SSP package. 2. Mapping from the device model to protocol
packets, which is processed by the SND package.
• For SND package processing, if the device is a NETCONF device, NCE service openness
and programmability automatically convert the model data into NETCONF packets.
NETCONF
NETCONF is a protocol defined by the IETF for installing,
maintaining, and deleting configuration data on NEs. All
NETCONF operations are implemented using XML-encoded
RPCs. NCE service openness and programmability use
NETCONF NETCONF to communicate with NEs.
⚫ Content layer: It needs to transmit configuration data
and notification data.
NETCONF server NETCONF client ⚫ Operations layer: It defines an XML-encoded operation
set for implementing RPC operations.
Content layer Data configuration Notification data ⚫ Messages layer: It implements a simple framing
mechanism based on the requirements of the transport
Operations layer <edit-config>...
protocol to encapsulate RPC messages or notification
Messages layer <rpc>, <rpc-reply> <notification> messages.
Secure SSH, TLS, BEEP/TLS, SOAP/HTTP/TLS ⚫ Secure transport layer: It provides a communication
transport layer
path between the client and server. The NETCONF
message hierarchy mechanism is implemented by using
the communication paths that meet related conditions.
28 Huawei Confidential
• For more information about NETCONF, see NETCONF/YANG Principles and Practices.
YANG Model
⚫ YANG, short for Yet Another Next Generation, is a standard-based and extensible data modeling language. It can be used to model
the configuration and running status data of network devices, remote procedure calls, and server event notifications. YANG was
originally designed to model network management data and provide a standardized content layer for the NETCONF model.
module hbng {
Module namespace http://www.huawei.com/hbng;
prefix hbng;
A module is a collection of related
definitions. Each module contains the
module header, revision, and description import ietf-inet-types {
statements. prefix inet;
}
In a module, you can use the include
statement to import submodules or use the
include foo-bar-types;
import statement to import other modules.
You can also use the augment statement in
a module to extend a specified module. description “This module can configure and manage the HBNGs (Huawei NE40-
X8)”;
A module may include the following four
main types of data nodes, including Leaf, revision YY-MM-DAY {
Leaf-list, Container, and List nodes.
description “Initial revision”;
}
augment “/app:applications” { … }
}
29 Huawei Confidential
• import and include introduce two modules for subsequent node definition.
• augment "/app:applications" { ... } indicates that the current module hbng is extended
to the /app:applications directory of the app module.
YANG: Data Nodes
Container container system {
container login {
A container is used to group nodes. It has leaf message {
only sub-nodes, but does not have any
type string;
value. A sub-node can be a container,
description “Message given at start of login session.”;
leaf, leaf-list, or list node.
}
leaf-list prohibited-users {
Leaf & Leaf-list type: string;
A leaf node contains simple data, such as
description: “List of users not allowed to login.”;
integers and character strings. It has only }
one value of a specific type and has no
sub-nodes. list user {
A leaf-list node defines a sequence of key “name”;
values of a specific type. unique “name”;
leaf name {
type string;
List }
A list node is a set of data nodes, which
are identified by key. The unique leaf level {
parameter specifies the data nodes that type uint8;
must be unique. A sub-node can be a }
container, leaf, or leaf-list node. ……
30 Huawei Confidential
• In this example, a container node named system is created, including the login
container sub-node for recording login information.
▫ A leaf node named message, which records the login prompt information.
31 Huawei Confidential
• In this example, the list interface is defined. config true indicates that the list is
configuration data, and config false in observed-speed indicates that this leaf is status
data.
• The leaf node name is a character string. The leaf node speed provides three options.
type enumeration indicates that the enumerated values are 10m, 100m, and auto.
The leaf node observed-speed is a positive integer of the uint32 type.
YANG: Reuse & Selection
32 Huawei Confidential
• In this example, a group node named ip-port is defined, including two leaf sub-nodes:
ip and port.
• The container quadruple contains the source and destination information containers,
both of which use the IP address and port information. The group node ip-port is
reused.
• The container transfer-protocol is used to indicate the transmission protocol. The UDP
and TCP protocols are provided. Either of them can be selected using the choice
function. case a indicates that the UDP protocol is used, and case b indicates that the
TCP protocol is used.
YANG: Operations
RPCs & Actions module server-farm { leaf address {
yang-version: 1.1; type: inet;
YANG allows the following operation namespace: “urn:example:server-farm”; }
definitions: prefix: “sfarm”;
• Operations at the top layer of the leaf location {
module are defined using RPC import ietf-yang-types { type: string;
statements. An RPC node usually prefix: yang; }
consists of an input node and an }
output node. The input and action reset {
output nodes can contain rpc reset-specified-servers { input {
container, list, leaf, and leaf-list input { leaf reset-at {
nodes. leaf-list servers { type: yang:date-and-time;
• Operations in a container or list type: “inet:ip-address”; }
node are defined by action } }
statements. Generally, an action }
node contains an input node and } output {
an output node. leaf complete-at {
• The difference between RPC and list servers { type: yang:date-and-time;
action is that RPC does not key: “name”; }
directly operate data, but action is leaf name { }
directly bound to the node in the type: string; }
data storage. }
33 Huawei Confidential
34 Huawei Confidential
• The Jinja2 template is only a text file, which can be based on any text format (HTML,
XML, CSV, etc.). In this example, the XML format is used.
• A template contains variables and expressions. The variables and expressions are
converted to corresponding values when the template is used. It has the following
common syntaxes:
▫ {% ... %} contains Control Structures. In this example, {% for dev in
nesInterfacesCfg.nes %} indicates that the for loop starts, and {% endfor %}
indicates that the loop ends.
▫ {{...}} contains an expression, which can be a constant, variable, mathematical
formula, or logical statement.
▫ {# ... #} indicates the comment.
• The variables in {{...}} can be modified using filters. Filters and variables are separated
by vertical bars (|). For example, {{ 'abc' | capitalize }} indicates that the first letter is
capitalized and the filtering result is Abc. In this example, {{dev.neName | to_ne_id}}:
to_ne_id is a user-defined filter, indicating that the variable device name dev.neName
is converted to the device ID.
• For more information, see the Template Designer Document at
https://jinja.palletsprojects.com/en/2.11.x/.
Contents
1. Background
3. Key Capabilities
4. Related Concepts
5. Practice Cases
35 Huawei Confidential
Case 1: Fast Interconnection with New Devices and
Automatic Generation of NBIs Implementation process
OSS/Orchestrator
iMaster NCE
1 Generating the SND template
GUI NBI ⚫ In the OPS, choose Project Management > Software
Package Management and generate an SND
1 template.
Project Public key Software package System
management management management configuration 2 Developing the SND package
Service HVPN SRV6 Service ⚫ Download the generated SND template and import it
…
management Service Service template to the local IDE tool.
3 ⚫ Develop the SND package based on the device type.
NE Device
Device group NE template Loading the SND package
management management 3
2 ⚫ Load the developed SND package to NCE.
SND Huawei NE Driver 3rd NE Driver ⚫ Add a new device. Device information is the same as
that in the imported SND package.
Protocol
⚫ Automatically generate configuration GUIs and NBIs
Protocol NETCONF STelnet for new devices.
parameter
4
4
IDE Delivering basic device configurations
Python ⚫ Apply basic device configurations through the GUIs or
NBIs.
36 Huawei Confidential
• NCE uses the Specific NE Driver (SND) package to quickly interconnect and manage
Huawei and third-party devices and open device configuration capabilities. To manage
third-party devices, you need to obtain the YANG file of the device from the vendor's
website. If third-party devices support only command lines and do not support
NETCONF interconnection, Huawei can customize interconnection capabilities.
• Key capabilities:
1. Quickly manage Huawei and third-party devices.
37 Huawei Confidential
• In this example, the service openness capability is used. Similar to the device atomic
capability openness, the system is developed based on the standard NETCONF protocol.
The internal data model uses the YANG modeling language to automatically generate
configuration GUIs and northbound interfaces based on the YANG model of services. In
addition, the Easymap algorithm is provided for customers to write only the creation
process, and the update and deletion are calculated by comparing algorithms. This
simplifies customer programming.
• The service layer shields differences between devices, supports interconnection with
different device types, and delivers configurations through different protocols. The
maintenance personnel or upper-layer system only needs to view corresponding
services. They do not need to know the specific vendor and protocol of the device. This
feature improves interconnection efficiency and reduces the pressure on maintenance
personnel.
• Key capabilities:
2
⚫ To apply one template to multiple devices, you can
NE Device
management
Device group NE template add these devices to the same device group.
management
1 3
SND Huawei NE Driver 3rd NE Driver
3 Delivering configurations in batches
Protocol
Protocol NETCONF STelnet by device group can be preset for common
parameter ⚫ Some templates
configurations (such as underlay), and device groups
can be selected for batch delivery.
38 Huawei Confidential
• Devices with the same configuration can be grouped. A preset template can be applied
to the system for batch configuration delivery. Currently, more than 60 templates are
preset in the enterprise DCN for users to apply.
Case 4: Configuration Correctness Pre-check Using the
dryRun Function
OSS/Orchestrator
iMaster NCE
Implementation process
1 Configuring services
GUI NBI
Configure services on the Service Management page as
Project Public key Software package System
required.
management management management configuration
⚫ Create a service.
1 2 ⚫ Select an existing service and modify the configuration
Service HVPN SRV6 Service parameters.
…
management Service Service template ⚫ Select an existing service and delete it.
NE Device
Device group NE template 2 Checking before service configuration delivery
management management
3
⚫ Perform dryRun and check whether the generated
SND Huawei NE Driver 3rd NE Driver configurations are correct.
39 Huawei Confidential
• Before service configurations are delivered, the OPS provides the dryRun function to
check the correctness of delivered configurations in advance. If an error occurs, modify
the dryRun function. After the configurations are correct, commit the configurations
again. The system provides a transaction mechanism to ensure data consistency
between the device and controller. If the data fails to be synchronized, the system
automatically rolls back the data to ensure that no residual data exists. For a service
that is successfully delivered, you can view the delivered configurations of the
associated device. In addition, you can view the delivered configurations in historical
records. You can roll back the configurations based on the rollback point.
• Key capabilities:
1. Use the dryRun function to check whether the delivered configurations are
correct in advance.
2. Provide a transaction mechanism to ensure data consistency between the device
and controller. If a failure occurs, automatic rollback will be performed.
40 Huawei Confidential
Quiz
1. (Short-answer question) What are the core function packages of Huawei iMaster
NCE service openness and programmability?
C. Jinja2 template
41 Huawei Confidential
2. ACD
Summary
⚫ Network service openness and programmability pave the way for development of
the network industry. Enabling the capabilities of network service openness and
programmability is the cornerstone of building an open network ecosystem.
⚫ Huawei OPS is a practice offered by Huawei in this field. Users can compile SND
and SSP packages to quickly interconnect new devices and construct new services.
⚫ To learn this chapter, you need to have a good understanding of Python,
NETCONF, YANG, and Jinja2.
42 Huawei Confidential
More Information
⚫ Log in to the HUAWEI CLOUD developer community and click the Datacom Network Openness and
Programmability tab to obtain related tools and documents.
https://developer.huaweicloud.com/resource/network.html#AOC
⚫ Key documents:
Datacom Network Openness and Programmability Development Guide: This document describes the development
process and methods of related driver packages, and provides guidance for developers to develop SND and SSP
packages, load the packages to the system, and automatically generate configuration GUIs and NBIs.
Datacom Network Openness and Programmability User Guide: This document describes operations related to the
configuration GUIs and NBIs, and provides guidance for O&M personnel to deliver device and service
configurations.
43 Huawei Confidential
Recommendations
44 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.