Zain-Bng HLD-LLD Draft Ph1v0.1
Zain-Bng HLD-LLD Draft Ph1v0.1
Zain-Bng HLD-LLD Draft Ph1v0.1
Jan 2019
v 0.1 [DRAFT]
© Nokia 2019. All rights reserved.
About Nokia
Nokia is a global leader in the technologies that connect people and things. Powered by the
innovation of Bell Labs and Nokia Technologies, the company is at the forefront of creating and
licensing the technologies that are increasingly at the heart of our connected lives.
With state-of-the-art software, hardware and services for any type of network, Nokia is uniquely
positioned to help communication service providers, governments, and large enterprises deliver on
the promise of 5G, the Cloud and the Internet of Things.
http://www.nokia.com || http://networks.nokia.com
Table of contents
1. Document history ............................................................... 7
2. Introduction ........................................................................ 8
2.1 PURPOSE ............................................................................................. 8
2.2 SCOPE ................................................................................................. 8
2.3 Assumptions........................................................................................ 8
OM ID # 3 / 82
7.1.2 Global VPRN parameters ............................................................................. 26
7.1.3 Interfaces configuration ............................................................................. 27
7.2 IP Routing Design .............................................................................. 27
7.2.1 Static Routing ............................................................................................. 27
7.2.2 BGP on GRT................................................................................................. 28
7.2.3 BGP on HSI VPRN ........................................................................................ 30
7.2.4 SDP configuration ....................................................................................... 31
Table of Figures
Figure 1: Network Architecture ............................................................................................................ 9
Figure 2: 7750SR-12 Chassis Overview ............................................................................................. 12
Figure 3: SFM5-12+CPM5 ................................................................................................................... 13
Figure 4: IOM4-e-B ............................................................................................................................. 14
Figure 5: 1-port 100GE CFP2 MDA-e ................................................................................................. 14
Figure 6: 10-port 10GE SFP+ MDA-e .................................................................................................. 15
Figure 7: RIY-BNG Chassis Layout ...................................................................................................... 16
Figure 8: JED-BNG Chassis Layout ..................................................................................................... 17
Figure 9: DMM-BNG Chassis Layout ................................................................................................... 17
Figure 10: 7750 SR service components ........................................................................................... 19
Figure 11: SDP concept ...................................................................................................................... 20
Figure 12: SAP concept ...................................................................................................................... 21
Figure 13: physical topology .............................................................................................................. 22
Figure 14: Directly connected interfaces & static routing ................................................................ 28
Figure 15: BGP peering in GRT ........................................................................................................... 29
Figure 16: default scheduler .............................................................................................................. 34
Figure 17: Overall Redundancy Design-Phase 0 ................................................................................ 42
Figure 18: Overall BNG Redundancy Design-Phase 1 ........................................................................ 42
Figure 19: BNG Redundancy blocs ..................................................................................................... 43
Figure 20: DHCP Redundancy-Phase 0 .............................................................................................. 45
Figure 21: DHCP Redundancy-Phase 1 .............................................................................................. 46
Figure 22: SRRP failure detection ...................................................................................................... 51
Figure 23: Multi-Chassis Synchronization (MCS)................................................................................ 51
Figure 24: SRRP-Aware Routing ......................................................................................................... 59
Figure 25: BNG Service Migration-Step 0 ............................................................................................... 63
Figure 26: BNG Service Migration-Step 1 ................................................................................................ 64
Figure 27: BNG Service Migration-Step 2 ................................................................................................ 64
OM ID # 5 / 82
Figure 28: BNG Service Migration-Step 3 ............................................................................................... 65
List of Tables
OM ID # 6 / 82
1. Document history
OM ID # 7 / 82
2. Introduction
2.1 PURPOSE
The purpose of the document is to provide High level and low level transcript for the introduction
of 7750 SR in Zain Network as BNG for PPPOE termination using ESM (Enhanced subscriber
Management feature).
The primary intended audience is Zain Network Design, Network Operation, Engineering and
planning teams and the Nokia Engineering community assigned to this project.
2.2 SCOPE
The scope of this document is to provide a High-Level and Low-Level Design considerations to
ensure a successful, future-save capacity expansion on Nokia BNG by swapping the existing 7750
SR-7 chassis by the SR-12 along with optimizing the geo-redundancy according to Zain
requirement, including the explicit command line configuration commands (CLI).
2.3 Assumptions
It is assumed that readers of this document have some familiarity with the existing Zain network
deployment.
It is assumed that the readers of this document have some understanding of IP/MPLS and
PPP/PPPoE/RADIUS messaging from a functional perspective.
BNG routers will be interconnected to Zain Backbone network (IPBB) to reach both Access part and
Internet Gateway routers.
Following is the high level overview of the BNG connectivity within Zain Network deployed during
Phase 0. The same connectivity design will be used for Phase 1 (except the change from 10G lag to
100G).
Phase 1 plans to swap the existing chassis from SR-7 to SR-12. The 10GE interfaces with the IPBB
are removed and replaced by 2x 2-port 100GE line cards at each site.
Along with the BNG SR-7 chassis swap, the geo-redundancy will be changed according to Zain
requirement. The new geo-redundancy plan besides the change will be reviewed in detail within
this document.
Release 15 SFM5
Key Description
3 MDA (installed)
4 Impedance panel
5 SF/CPM slots
7 Rack-mounting brackets
8 Air vent
9 ESD plug
The SFM5-12+CPM5 combination module is composed of two parts: an SFM5-12 that connects
directly to the backplane, and a pluggable CPM5 that is inserted in the SFM5-12. The 7450 ESS-12
and 7750 SR-12 can operate with a minimum of one SFM5-12+CPM5 combination module. Two
combination modules are required for redundancy. The combination module is supported in slot A
or slot B. Figure 3 shows the combination module.
Figure 3: SFM5-12+CPM5
The SFM5-12 performs the switching functions between all slots for the chassis. The
fabric modules are 1+1 redundant with an active-active load-sharing design. The
SFM5-12 is a full-height module that is modular in design and houses the pluggable
CPM5.
The SFM connects directly to the backplane and carries traffic between line modules.
The backplane provides high-speed access to the SFM, ISMs, IMMs, IOMs, and
MDAs.
The CPM5 is a pluggable module housed in the SFM5-12. The CPM5 provides the management,
security, and control plane processing for the system. Redundant CPMs operate in a hitless,
stateful, failover mode. Central processing and memory are intentionally separated from the
forwarding function on the interface modules to ensure system resiliency.
4.1.2 IOM/IMM/MDA
IOMs are optimized for flexibility in deploying a variety of mobile, multiservice and Ethernet-based
applications. Each IOM supports up to two pluggable MDAs and can also be used to house
Integrated Service Adapters.
MDAs are pluggable line modules that provide physical interface connectivity. MDAs are available in
a variety of interface and density configurations.
IMMs are line modules that provide integrated processing and physical interfaces on a single
board. IMMs support high-capacity Ethernet interfaces, including variants with integrated tunable
DWDM optics.
The following IOM/IMM/MDA cards are used within Zain network:
Figure 4: IOM4-e-B
The IOM4-e is FP3-based cards that support up to two pluggable MDA-e modules. Each
pluggable MDA-e can provide up to 100 Gb/s (full-duplex) line rate throughput.
Card repartition within Zain BNG nodes for project phase 1 is shown in the following chassis
layouts. Please note that only slots that have card type filled are used. Slots marked in grey are not
used.
Note, no reboot is required; the scaling limits associated with chassis mode “d” will be available.
To show the operational chassis mode
/show chassis
Within Zain design, two CPM5 cards are housed within the SFM5-12. There is no need to explicitly
configure these types of boards. They will be positioned in slot ‘A’ and slot ‘B’.
Following CLI commands will be used to provision the equipped MDA in IOM slots:
5.4 SW release
The new 7750SR-12 into Zain network will be deployed with the 15.0 release (SROS 14.0.R10) for
phase 1.
To show the running SROS version:
/show version
Figure 7 illustrates the relationships between the entities making up the service model.
The terms customers, clients and subscribers are used synonymously. The most basic required
entity is the customer ID/client ID value, which is assigned when the customer account/client is
created. To provision a service, a customer ID/client ID must be associated with the service at the
time of service creation.
A Service Distribution Path (SDP) acts as a logical way to direct traffic from one 7750 SR to another
7750 SR through a unidirectional (one-way) service tunnel. The SDP terminates at the far-end
7750
SR which directs packets to the correct service egress SAPs on that device. A distributed service
Consists of a configuration with at least one SAP on a local node, one SAP on a remote node, and
an SDP binding the service to the service tunnel. An SDP can use MPLS (LDP or RSVP-TE) or GRE as
the transport tunneling technique. In Zain BNG design, LDP SDPs will be used for transport
between the redundant BNG 7750SR PEs.
Each service type is configured with at least one Service Access Point (SAP). A SAP identifies the
customer interface point for a service on an Nokia 7750 SR. The SAP configuration requires that
Slot, MDA, and port information be specified. A SAP is a local entity to the 7750 SR and is Uniquely
identified by the following
• The physical Ethernet port, FR, ATM, POS port and channel
To avoid the project delay by lack of 100G ports in the other devices (VSS, EOR), a temporary
physical topology based on multiple 10G links could be used.
The 100G links facing the IPBB (IP Backbone) PE will be deployed based on the following design
guidelines:
• Single-Mode Fiber
• Encapsulation: QinQ
• Mode: Hybrid
• Ethernet MTU: 9212 bytes.
• Down-on-internal-error: brings port operationally down in the event the systems has
detected internal max transmit errors.
• Ethernet port hold-time up: 5 seconds
The below ports will be allocated for the connectivity to IPBB routers:
A:BNG>config>port# info
----------------------------------------------
ethernet
mode hybrid
encap-type qinq
down-on-internal-error
hold-time up 5
exit
no shutdown
----------------------------------------------
100G links between BNG router and EOR switch will be aggregated into LAG.
LACP is to be used in active mode on the LAG to allow member ports negotiation.
Following is LAG configuration on BNG. in this example ports 1/1/1 and 2/1/1 are members of the
LAG:
A:BNG>config>lag# info
----------------------------------------------
HSI BNG functionality will be enabled on the 7750SR in the context of independent BNG Internet
(HSI) VPRN in each site that spans the redundant distributed routers. The HSI VPRN will terminate
PPPoE session of the residential HSI subscribers and thel business HSI subscribers without private
VPRN.
Below are the design guidelines for the BNG HSI service on the 7750SR PEs.
Since hot swap will be performed, the IP Plan design will be preserved.
The system interface practically the first L3 interface that we configure on a Nokia IP node. It is
associated with a network entity (such as a specific router or switch), not a specific interface. The
system interface is also referred to as the loopback address. The system interface is associated
during the configuration of the following entities:
- Termination point of service tunnels
- Hops when configuring MPLS paths and LSPs
- Addresses on a target router for BGP and LDP peering
The system interface is used to preserve connectivity (when routing re-convergence is possible)
when an interface fails or is removed. The system interface is used as the router identifier, and a
system interface must have an IP address with a 32-bit subnet mask.
RIY-BNG 10.158.177.1/32
JED-BNG 10.158.177.2/32
DMM-BNG 10.158.177.3/32
Other interface parameters are provided in the following table. Details on different interface types
and usage will be described in respective section in this document.
A system IP address must be configured on the 7750SR node as the loopback address to identify
the node. It must be a /32 address. System address is used in routing protocols, MPLS, AAA, SDPs
and system management.
BFD will be enabled for fast node failure detection and re-convergence of the routing table.
configure
router
interface "system"
address 172.31.1.82/32
no shutdown
exit
The BNG HSI Internet VPRN on the 7750SR PEs will have:
configure
service
customer 1 create
exit
vprn 10 customer 1 create
description "HSI VPRN"
autonomous-system 64665
route-distinguisher <system-ip-address>:64665
no shutdown
exit all
Interfaces are configured between all BNGs in GRT (Global Routing Table) to ensure direct L3
reachability between them.
This is not mandatory as L3 reachability could be ensured via interconnection with IPBB. But Zain
choice is to use IPBB as L2 transport and not involve it in GRT L3 interconnection between BNGs.
On HSI VPRN, BNGs are interconnected to IPBB over the 10GE LAG. and L3 interfaces are
configured according to Table 4 shown in the beginning of this section.
Following is an example of interface towards IPBB using LAG-10, VLAN 900, and IP address
10.158.181.202/30:
A:BNG# configure service vprn 10 interface "PE-HSI-900" create
address 10.158.181.202/30
sap lag-10:900.0 create
exit
----------------------------------------------
Static routing will be used within GRT to ensure BNG reachability to other BNGs system addresses
through the directly connecting interfaces.
The following example shows static routes on RIY-BNG to reach JED-BNG and DMM-BNG system
addresses:
configure router
static-route-entry 10.158.177.2/32
next-hop 10.158.177.58
no shutdown
exit
exit
static-route-entry 10.158.177.3/32
next-hop 10.158.177.42
no shutdown
exit
exit
On each BNG, 1GE link is used to interconnect with IPBB and is used to allow reachability to BNGs
to Zain Management systems.
For phase 1, the GE link will be removed since the reachability between BNG and Zain Management
Systems will be over the LAG interface. Hence, the 1G IMM card will not be re-inserted in the new
SR-12 chassis after BNG swap.
BGP is used between BNGs GRT and IPBB PEs mainly for management purpose:
- BNGs will advertise their system addresses to IPBB. policy “export-to-bgp” will be used for
this.
- and IPBB will advertise default-route (0.0.0.0/0) to BNGs
- IPBB AS# is: 43766
- BNG AS# is: 64665
- “min-route-advertisement” of 1 second will be used to accelerate BGP convergence for
new updates
- “rapid-widhdrawal” will be used to accelerate convergence by immediately advertising any
updates containing withdrawn NLRIs.
Within HSI VPRN eBGP peers with IPBB PE routers, and will be used for routing of the following
prefixes:
Configure
router
policy-options
begin
# create prefix list matching all dhcp subnets that will be redundant
prefix-list "dhcp-redundant-subnets"
prefix 10.112.128.0/17 exact
prefix 10.113.128.0/17 exact
prefix 10.158.173.0/24 exact
prefix 10.158.177.128/25 exact
exit
policy-statement "export-bgp-vprn10"
entry 10
description "set MED 10 if SRRP master"
from
protocol direct
prefix-list "dhcp-redundant-subnets"
state srrp-master
/configure
service vprn 10
bgp
min-route-advertisement 1
rapid-withdrawal
group "PE"
family ipv4
export "export-bgp-vprn10"
peer-as 43766
bfd-enable
neighbor <peer-ip-address>
authentication-key <password>
exit
neighbor <peer-ip-address>
authentication-key <password>
exit
exit
no shutdown
exit all
configure service
sdp 102 create
description “to-jed-bng”
far-end 10.158.177.2
keep-alive
shutdown
exit
no shutdown
exit
sdp 103 create
description “to-jed-bng”
far-end 10.158.177.3
keep-alive
shutdown
exit
no shutdown
exit
Since hot swap will be performed, the same QoS design of phase 0 will be used.
While competing for bandwidth to the destination, each scheduler determines which queue will be
Serviced next. During congestion (packets existing on multiple queues), queues are serviced in the
following order:
1. Queues associated with the high-priority scheduler operating within their CIR.
2. Queues associated with the low-priority scheduler operating within their CIR.
3. All queues with traffic above CIR and within PIR will be serviced by a biased round robin.
The 7750SR QoS features are flexible and allow modifications to the forwarding class
characteristics and the CIR and PIR queue parameters. The only fundamental QoS mechanisms
enforced within the hardware are the association of the forwarding classes with the high priority or
low priority scheduler and the scheduling algorithm. Other parameters can be modified to
configure the appropriate QoS behavior.
In Zain, for each HSI subscriber, one egress queue and one ingress policer will be allocated;
Subscriber policers and queues are instantiated on the IOM/IMM on which the subscriber SAP
resides. All subscriber traffic will be mapped to Best Effort (BE) Forwarding Class (FC), i.e. default-
FC. When policers are used, the BE FC will be explicitly mapped to ‘policer 1’ created within the QoS
policy. By default, FCs that are not explicitly mapped to the policer will be mapped to the default
queue ‘queue 1’. This will unnecessarily instantiate one ingress default queue per subscriber (with
the corresponding hardware queues). To avoid instantiation of the default queue, all unused FCs
will also be mapped to ‘policer 1’.
For policers and queues, the Peak Information Rate (PIR) will be set according the user profiles as
the peak rate allowed for the user in the respective direction (upload or download).which profile
each subscriber will use is communicated by Radius server upon user authentication.
The ingress QoS policy configuration is given below. Configuration must be applied on all three
BNG routers.
configure
qos
sap-ingress 1000 create
description "Profile X Upload"
queue 1 create
exit
queue 11 multipoint create
exit
policer 1 create
rate <uplink-rate-in-kbps>
exit
fc "af" create
policer 1
exit
fc "be" create
policer 1
exit
fc "ef" create
policer 1
exit
fc "h1" create
policer 1
exit
fc "h2" create
policer 1
exit
fc "l1" create
policer 1
exit
fc "l2" create
policer 1
exit
fc "nc" create
policer 1
exit
egress QoS policy configuration is given below. Configuration must be applied on both BNG
routers in the same site.
configure
qos
sap-egress 3000 create
description "Profile X Download"
queue 1 create
rate <download-rate-in-kbps>
exit
fc be create
queue 1
exit all
• Zain has two RADIUS servers, The IPv4 addresses of the servers are listed in Table 6.
• 7750SR allows to configure up to 16 RADIUS servers within RADIUS Server policy for
Authentication, Accounting.
• One of RADIUS servers are the primary while the other will be backup, BNG routers will be
Manually configured to use the backup RADIUS servers instead of primary just when
there is an issue in primary
• Communication between the BNG and the RADIUS servers will be through HSI VPRN
• RADIUS packets will use the loopback IPv4 address of the BNG inside HSI VPRN as a source
IPv4 address.
• Shared secret for Authentication, Accounting and CoA.
• The following UDP ports will be used for RADIUS communication:
- Authentication: 1812 (default)
- Accounting: 1813 (default)
- CoA: 3799 (default)
An example for the radius configuration commands to include in HSI VPRN will look like:
configure
service vprn 10
radius-server
server "JED-AAA" address 10.157.107.196 secret <secret> create
accept-coa
exit
server "RIY-AAA" address 10.157.106.196 secret <secret> create
accept-coa
exit
exit
exit all
#
/configure aaa
radius-server-policy "radius-auth-server-policy-1" create
servers
router 10
source-address <hsi-loopback-address>
server 1 name "RIY-AAA"
server 2 name "JED-AAA"
exit
exit
And domain name of “sa.zain.com” will be appended to subscribers username for authentication.
configure
subscriber-mgmt
authentication-policy "auth-policy-1" create
ppp-user-name append "sa.zain.com"
accept-authorization-change
pppoe-access-method pap-chap
include-radius-attribute
nas-port "*8p"
nas-identifier
mac-address
exit
radius-server-policy "radius-auth-server-policy-1"
exit
In the Access-Accept message, the BNG expects the default and standard attributes to be
Returned from RADIUS.
8.2.3 Accounting
In Zain Network session accounting will be sent periodically by BNGs to AAA server.
In addition to the default and standard accounting RADIUS attributes, the below attributes will be
included in the RADIUS Accounting-Requests:
• calling-station-id mac
• framed-ip-addr
• mac-address
• nas-identifier
• nas-port "*8p"
• nas-port-id
• remote-id
• sla-profile
• sub-profile
• subscriber-id
configure
subscriber-mgmt
radius-accounting-policy "AAA-BILLING" create
no queue-instance-accounting
host-accounting interim-update
update-interval 10
include-radius-attribute
calling-station-id mac
framed-ip-addr
mac-address
nas-identifier
nas-port "*8p"
nas-port-id
remote-id
sla-profile
sub-profile
subscriber-id
user-name
std-acct-attributes
exit
session-id-format number
radius-server-policy "radius-auth-server-policy-1"
exit
exit
A subscriber host is a device identified by a unique combination of IP address and MAC address, it
can be an end-user device, such as a PC, VoIP phone or a set top box, or it can be the user’s
Residential Gateway (RGW) if the RGW is using Network Address Translation (NAT).
A subscriber (in the context of the 7750 SR) is a collection of subscriber hosts getting common
(overall) treatment. It is expected that this group of hosts originate from the same site and all
hosts
of a subscriber are reached by the same physical path (such as a DSL port). A subscriber is uniquely
identified by a subscriber identification string, aka ‘subscriber-id’
a unique subscriber-id will be generated by the 7750SR for each PPPoE and IPoE user. The
automatically generated subscriber ID will have the format for PPPoE: mac | session-id
Where:
mac is the MAC address of the RGW or subscriber host initiating the PPPoE session.
session-id is the PPPoE session ID.
An example of the configuration of the format of the auto-generated subscriber id is given below.
Configuration must be applied on both BNG routers in the same site.
configure
subscriber-mgmt
auto-sub-id-key
ppp-sub-id-key mac session-id
exit
exit all
8.3.2 Session ID
Every PPPoE session is identified by: session-ID and a peer MAC address (subscriber’s and BNG’s
MAC addresses). By default, all PPPoE sessions with different MAC address on a given SAP have
session-id 1.
There are though some CPE routers that do not check MAC address to identify if the Ethernet
frame is destined to them or not.
In an Access network that is behaving without MAC learning (HUB behavior), those CPEs may
receive messages that are not sent to them and will interact with them.
Special case is when those CPE routers receive PADT (session termination) message sent by BNG
to another subscriber. but those CPEs will overlook the MAC address and only check session ID
which is by default “1” and terminate their session.
To help those kind of CPEs differentiate PPPoE messages, there is a knob in SROS to enable BNG
assign different session-id values to different sessions even from different MAC addresses:
configure subscriber-mgmt
ppp-policy "ppp-policy-1" create
unique-sid-per-sap
exit
In general, a SUB-profile defines the overall subscriber bandwidth. It’s a template which contains
Hierarchical QoS (HQoS) and accounting settings which are applicable to all hosts belonging to the
Same subscriber. It will include:
Within Zain BNG design default SUB-profiles for HSI, will be configured locally on the BNG and will
have the previously configured RADIUS accounting policy AAA-BILLING.
configure
subscriber-mgmt
sub-profile "DefSubProfile" create
radius-accounting
policy "AAA-BILLING" #previously create Accounting Policy
exit
exit
Within Zain BNG design SLA-profiles for HSI are configured locally on the BNG and the configured
SLA-profile will be associated to subscribers on RADIUS server. The profiles used on Zain BNG are:
• FTTH_20Mbps
• FTTH_50Mbps
• FTTH_75Mbps
• FTTH_100Mbps
• FTTH_500Mbps
• FTTH_
And those SLA profile will be configured to use the previously configured QoS parameters:
configure
subscriber-mgmt
sla-profile <sla-profile-name> create
ingress
qos <sap-ingress-qos>
exit
exit
egress
qos <sap-egress-qos>
Note: The locally configured SLA-profile is referenced by a name that can be 32 characters.
One of the main applications of the subscriber identification policy is to create mapping entries for
SUB-profiles and SLA-profiles. Each entry maps a SUB-profile string received in Alc-Subsc-Prof-
Str
VSA or an SLA-profile string received in Alc-SLA-Prof-Str VSA to one subscriber profile or SLA
profile configured on BNG. This could be required if the received string and the name of the
referenced profile are different.
configure
subscriber-mgmt
sub-ident-policy "sub-ident-all" create
sub-profile-map
use-direct-map-as-default
exit
sla-profile-map
use-direct-map-as-default
exit
exit
exit all
during phase 1, the geo-redundancy design will be reviewed to reflect the Zain requirement.
Hence, the new pairs of BNGs will be (RIY-DMM, DMM-JED, JED-RIY). The overall redundancy
design for phase 1 is illustrated below:
When we will discuss redundancy in the following section, we will refer to single pair of BNGs. Same
approach will be applicable for other BNG pairs.
The concept of BNG Master/Backup will be related to SRRP instances, so that each BNG is Master
for a set of subscribers and Backup for others, ensuring session load balancing between all BNGs.
It is important to note that with stateful BNG mode, sessions are synchronized between both BNGs
subject to synchronization; each PPPoE session is instantiated on both BNGs, but only one is
assuming the communication with subscriber. So, each session is in fact represented with two
sessions. The impact of this is that maximum PPPoE sessions supported by both BNGs is not the
sum of maximum that each BNG can support, but the maximum sessions is the max of one BNG.
The diagram below summarizes the redundancy design blocks for a pair of BNGs:
Please note that to distinguish between Access part and Routing to IGW in the diagram above, the
connectivity between BNGs and IPBB is logically represented as separate interconnections and is
not representing real physical topology.
Within Zain BNG design, HSI PPPoE will be assigned IPv4 addresses dynamically.
For dynamic IPv4 address assignment, redundant local DHCPv4 servers will be deployed on each
BNG routers for IPv4 address management, within the HSI VPRN instance serving the HSI IPv4
dynamic subscribers. Each local DHCPv4 server in each service context will be associated with IPv4
loopback interface.
In Zain design Framed-Pool attribute absence in the RADIUS access-accept, in that case the
“giaddr” field of the DHCP relay message is used to find a matching subnet within the locally
configured pools, once a pool has been selected, an address is allocated from any subnet within
the selected pool; “use-gi-address scope pool”.
DHCP Redundancy is relying on configuring DHCP servers on two BNGs, using exact same Pools
and subnets, and synchronize between them (using MCS).
Within Zain network, and to ensure maximum flexibility, TWO DHCP servers will be created on each
BNG node: and each DHCP server will be redundant (and synchronized) on the different BNG.
(please refer to figure below).
During normal operation, the local DHCPv4 server on BNG will be active for all subnets and address
ranges that are configured with “failover LOCAL” and will be standby for all subnets and address
ranges configured with “failover REMOTE”.
When one BNG leases IPv4 address to PPPoE subscriber from a pool, DHCPv4 lease is synchronized
with adjacent BNG router. DHCPv4 lease is renewed to both local DHCPv4 servers if the PPPoE
session is up. Upon failure of the active DHCPv4 server (local-dhcp-server on the BNG), the
redundant DHCPv4 server will detect the failure of the active DHCPv4 server and will change its
state to PartnerDown after partner-down-delay. Upon entering the PARTNERDOWN state, the
management of ‘Remote’ pool addresses will be taken over immediately without waiting for
Maximum Client Lead Time (MCLT) safety timer to expire while in PARTNER-DOWN state.
Since the DHCP lease synchronization failure can be caused by the failure of the
intercommunication link (and not necessary the entire node), there is a possibility the redundant
DHCP servers become isolated in the network. In other words, they can serve DHCP clients but
they cannot synchronize the lease. This can lead to duplicate assignment of IP addresses, since the
servers have configured overlapping IP address ranges but they are not aware of each other’s
leases.
- partner-down-delay: The purpose of the partner-down-delay is to prevent the IP lease
duplication during the intercommunication link failure by not allowing new IP addresses to be
assigned from the remote IP address range. This timer is intended to provide enough time to
remedy the failed situation and to avoid duplication of IP addresses/prefixes during the failure.
During the partner-down-delay time, the prefix designated as remote will be eligible only for
renewals of the existing DHCP leases that have been synchronized by the peering node.
- Startup-wait-time is the time the local DHCP server will wait after boot before start assuming
active DHCP role. This is to ensure enough time to MCS to synchronize before starting DHCP
operation.
Only after the sum of the partner-down-delay and the maximum-client-lead-time will the prefix
designated as remote be eligible for delegation of the new DHCP leases. When this occurs, we say
that the remote IP address range has been taken over.
Within Zain implementation, fast takeover is required in case one BNG crashes. So, partner-down-
delay sill be set to 10s (allowing for any underlaying protocol reconvergence in case connectivity
between BNGs experience some problems), and MCLT will be set to 0 (ignore-mclt-on-takeover).
For phase 1, the DHCP redundancy configuration will follow the design below:
First, Multi-Chassis Synchronization (MCS) for local DHCP server application must be enabled
before configuring DHCP server failover (redundancy), then local DHCPv4 server configuration can
be applied. In the configuration example, two pools are created POO. Each pool may be configured
with one or multiple subnets. Each subnet is configured with one or multiple address ranges.
Note that one address range can contain at most 16384 addresses.
Note also that the parameter ‘failover local’ is default and can only be shown using ‘info detail’.
The following example is from RIY-BNG for DHCP Redundancy configuration with both JED-BNG
and DMM-BNG.
A:RIY-BNG# configure
redundancy
multi-chassis
# configuration to peer with Jeddah
peer 10.158.177.2 create
...
sync
...
local-dhcp-server
...
no shutdown
exit
no shutdown
exit
# configuration to peer with Dammam
peer 10.158.177.3 create
...
sync
...
local-dhcp-server
...
no shutdown
exit
no shutdown
A:RIY-BNG# configure
service vprn 10
dhcp
# create Local DHCP Server to be synchronized with DMM
local-dhcp-server "DHCP-DMM-RIY" create
use-gi-address scope pool
use-pool-from-client
# create Pool for Dawiyat subnets
pool "POOL-DAW-DMM-B" create
options
dns-server 79.170.51.61
lease-time days 1
lease-renew-time hrs 12
lease-rebind-time hrs 18
exit
subnet 10.113.128.0/17 create
options
default-router 10.113.128.1
exit
# note the failover remote, to indicate it is standby.
address-range 10.113.128.4 10.113.191.255 failover remote
address-range 10.113.192.0 10.113.255.255 failover remote
exit
exit
failover
peer 10.158.177.3 tag "dhcp-dmm-riy"
ignore-mclt-on-takeover
partner-down-delay sec 10
no shutdown
exit
no shutdown
exit
# create Local DHCP Server to be synchronized with JED
local-dhcp-server "DHCP-RIY-JED" create
use-gi-address scope pool
use-pool-from-client
pool "POOL-DAW-RIY-A" create
options
dns-server 79.170.51.61
lease-time days 1
lease-renew-time hrs 12
lease-rebind-time hrs 18
exit
subnet 10.112.128.0/17 create
options
default-router 10.112.128.1
exit
address-range 10.112.128.4 10.112.191.255
address-range 10.112.192.0 10.112.255.255
exit
exit
failover
peer 10.158.177.2 tag "dhcp-riy-jed"
ignore-mclt-on-takeover
partner-down-delay sec 10
no shutdown
exit
no shutdown
exit
exit
interface "dhcp-daw-riy" create
address 10.158.177.8/32
dhcp
no shutdown
exit
local-dhcp-server "DHCP-RIY-1-A"
loopback
exit
interface "dhcp-daw-dmm" create
When local DHCP Server redundancy/synchronization is used, using address-range “failover local |
remote”, in conjunction with PPPoE in multi-chassis environment, both DHCP servers must be
referenced under the corresponding group-interface on each node.
subscriber-interface <sub-if>
group-interface <grp-if>
dhcp
server <local-dhcp-ip-address> <remote-dhcp-ip-address>
It is also necessary for the successful renewal of the IP address on the remote DHCP server, that
the remote DHCP server has a valid return path back to the gi-address of the forwarder of the
renewal request. (Please refer to section “8.9.2 Subscriber Interface” for details).
When new subscriber tries to connect (assuming it will get dynamic IP address), BNG that is SRRP
master (let’s assume it is BNG-1) will attempt getting IP address from its Local DHCP server
(because it is the first configured DHCP server). Local DHCP server will then provide address as
soon as it has free addresses from subnets that are “failover local”. When local DHCP server
addresses are all leased to subscribers, and a new subscriber tries to connect, BNG-1 will not find
any IP address locally to allocate and will then send request to DHCP server on BNG-2 (because it is
the second configured server) that will reply with address from its “failover local” subnets.
configure
subscriber-mgmt
ppp-policy "ppp-policy-1" create
keepalive 30 hold-up-multiplier 3 # default
no max-sessions-per-mac # default (means 1 session/MAC)
unique-sid-per-sap
ppp-initial-delay
exit all
Once a host is identified on one node, the MCS peering is used to inform the other node that the
host exists and conveys the dynamic DHCP lease state information of the host (if applicable). MCS
creates a common association between the virtual ports (SAPs) shared by a subscriber. This
association is configured at the MCS peering level by defining a tag for a port and range of SAPs.
The same tag is defined on the other nodes peering context for another port (does not need to be
the same port- ID) with the same SAP range. In this manner, a subscriber host and QinQ tag sent
across the peering with the appropriate tag will be mapped to the redundant SAP on the other
node.
Once SRRP is active on the group IP interface, the SRRP instance will attempt to communicate
through in-band (over the group IP interfaces SAPs) and out-of-band (over the group IP interfaces
redundant IP interface) messages to a remote router. If the remote router is also running SRRP
with
the same SRRP instance ID, one router will enter a master state while the other router will enter a
backup state. For proper operation, each subscriber subnet associated with the SRRP instance
must have a GW address defined.
Within Zain BNG design, one SRRP policies (like VRRP policy) will be tracking the following:
• Presence of default route in HSI VRF table that is learned via static
Absence of this condition will cause SRRP priority decrement (decrement by 40). If SRRP priority
goes below standby SRRP priority, SRRP switchover will take place, gratuitous ARP will be sent from
the new master SRRP and consequently all PPPoE subscribers that are bound to this SRRP instance
will be switched to the newly promoted master BNG.
Please note the usage of “context” keyword when creating policy, this will identify HSI VPRN
service (that will be used for validating presence or not of default route).
configure
vrrp
policy 1 context 10
description "HSI-SRRP-Policy"
priority-event
route-unknown 0.0.0.0/0
priority 40 delta
exit
exit
exit
exit
SRRP instance will be created for each Group-Interface using a chosen QinQ VLAN tags to
transport SRRP messages. This message path is assumed to use the same links as subscribers
traffic on L2 backhaul so that any L2 connectivity problem impacting subscribers’ access to BNG
will be also detected by SRRP.
Within Zain Network SRRP instances will be used according to the following principles:
- SRRP 12: between RIY-BNG and JED-BNG
▪ VLAN 35.4094 for messaging
▪ RIY is master, JED is standby
- SRRP 23: between JED-BNG and DMM-BNG
▪ VLAN 36.4094 for messaging
▪ JED is master, DMM is standby
- SRRP 31: between DMM-BNG and RIY-BNG
▪ VLAN 37.4094 for messaging
▪ DMM is master, RIY is standby
Please note: that per current design, it is assumed that IPBB aggregation network is ensuring
redundancy and resiliency within MPLS network (FRR, standby LSP) and VPLS services (STP or
similar feature). BNG is not aware of, and is not expected to detect, any failure occurring within
IPBB network. BNG failure detection is based on the failure of the directly attached ports.
The synchronization process provides the means to manage distributed database (the Multi-
Chassis Synchronization (MCS) database), which contains the dynamic state information created on
any of the nodes by any application using its services.
The individual entries in the MCS database are always paired by peering-relation, sync-tag and
application-id. At any time the given entry is related to the single redundant-pair objects (two SAPs
on two different nodes) and hence stored in a local MCS database of the respective nodes.
Internally, peering-relation and sync-tag are translated into a port and encapsulation value
identifying the object (SAP) that the given entry is associated with. The application-id then
identifies the application which created the entry on one of the nodes.
An MCS peer must be configured and operational when subscriber hosts have a redundant
connection to two nodes.
Each time the connection between the redundant pair nodes is (re)established the MCS database
will be re-synchronized. There are several levels of connectivity loss which may have different
effect on amount of data being lost. To prevent massive retransmissions when the
synchronization connection experiences loss or excessive delay, the MCS process implementation
will take provisions to ensure following:
- In the case of a reboot of one or both nodes or establishing the peering for the first time,
the full MCS database will be reconciled.
- In the case that the MCS communication is lost and then re-established but neither node
rebooted during the connection loss, only the information not synchronized during this time
will be reconciled (using sequence numbers helps identify information which was not
synchronized).
- In the case that MCS communication is lost because of excessive delay in ACK messages
but no information has been effectively lost, the MCS process indicates a loss of
synchronization but no reconciliation is performed.
In redundant BNG deployments where one BNG is acting as Master and the redundant BNG is
acting as Backup, the redundant-interface is used in the downstream direction. Traffic arriving on
the Network links on the Backup node is shunted over to the Master node over the redundant-
interface.
This is required to ensure consistent QoS and accounting functionality across the nodes (upstream
and downstream traffic on the access links for a subscriber must traverse the same BNG node). A
redundant interface is a Layer 3 spoke SDP-based interface (please refer to section 7.2.4 for SDP
details) that allows delivery of packets between the two nodes. The redundant interface can be
assigned /31 or /30 IP addresses.
An example of the redundant interface within the BNG HSI VPRN is given below. When using /30
addressing, remote peer address is required to be specified. When /31 IP addresses is used,
remote-ip keyword will not be required.
configure
service
vprn 10 customer 1 create
redundant-interface "red-riy-dmm" create
address 10.158.177.38/31
spoke-sdp 103:100 create
no shutdown
exit
no shutdown
exit
exit
exit
In Nokia ESM deployment, a subscriber interface allows subnet sharing between multiple group
interfaces (access nodes).
Within Zain BNG design, one subscriber interface will be created per HSI service instance. All
dynamic subscriber subnets will be defined under that subscriber interface (set of addresses from
all Local DHCP address-ranges). For a given pair of BNGs, On BNG1, the subscriber interface will be
assigned the second IPv4 address of the subscribers’ subnet. On BNG2, the subscriber interface
will be assigned the third IPv4 address of the subscribers’ subnet. The first IPv4 address of the
subscriber’s subnet will be the SRRP floating IP address.
In Zain design, state of different SRRP instances will be tracked under the subscriber interface and
hence, downstream routing (traffic from IGW to BNG) will be based on the associated SRRP state.
At any time, advertising the subscriber prefixes will be preferred from the current SRRP Master,
thereby allowing Downstream traffic to be routed towards the optimal path and minimizing the
usage of shunt (redundant) interface. This is done using routing policy applied towards the
subscriber-interface route.
Within Nokia ESM deployment, a group interface allows multiple SAP’s on the same port to be
configured as part of a single interface.
For phase 0 implementation of Zain network, QinQ VLAN model is used. different Service VLAN per
GPON is assigned, but still User-VLAN is the same and not used for differentiation. Therefore, In
order to achieve a load balancing over the three redundant BNGs, the service VLANs are
distributed between them as following:
Since the geo-redundancy will be changed in phase 1, the new VLANs distribution will be as follow:
Group interfaces will be created with the following high-level design guidelines:
Within Zain network, SRRP-Aware routing will be implemented, allowing controlled and balanced
routing in steady situation.
In this scenario, we call BNG-1 and BNG-2 any pair of BNGs that are acting as SRRP Active/Standby
(RIY-JED, JED-DMM, DMM-RIY). Route Advertisement is based on the SRRP state:
- Route advertisement policy is configured on both BNG-1 and BNG-2. SRRP state is
monitored. BNG that is in SRRP master state, will advertise subscriber prefixes to the IGW.
- Requires that each Group-interface has its own dedicated DHCP subnets in order for
routing of those subnets to follow SRRP state. Which is fulfilled within Zain deployment.
To achieve that, the following policy is used to export routes into BGP within HSI VPRN:
Configure
router
policy-options
begin
# create prefix list matching all dhcp subnets that will be redundant
prefix-list "dhcp-redundant-subnets"
prefix 10.112.128.0/17 exact
prefix 10.113.128.0/17 exact
prefix 10.158.173.0/24 exact
prefix 10.158.177.128/25 exact
exit
policy-statement "export-bgp-vprn10"
entry 10
description "set MED 10 if SRRP master"
from
protocol direct
prefix-list "dhcp-redundant-subnets"
state srrp-master
exit
to
protocol bgp
exit
action accept
metric set 10
exit
exit
/configure
service vprn 10
bgp
min-route-advertisement 1
rapid-withdrawal
group "PE"
family ipv4
export "export-bgp-vprn10"
peer-as 43766
bfd-enable
neighbor <peer-ip-address>
authentication-key <password>
exit
neighbor <peer-ip-address>
authentication-key <password>
exit
exit
no shutdown
exit all
And also to ensure the policy is updated upon SRRP events (switchover), SRRP tracking needs to be
configured on the Subscriber-interface:
configure
service
vprn 10
subscriber-interface "BNG1-HSI-sub-intf-1" create
allow-unmatching-subnets
address 10.158.173.2/24 gw-ip-address 10.158.173.1 track-srrp 12
address 10.112.128.2/17 gw-ip-address 10.112.128.1 track-srrp 12
address 10.113.128.3/17 gw-ip-address 10.113.128.1 track-srrp 31
...
exit
exit
Based on the previous, the one-shoot hot swap procedure will be adopted to migrate the BNG
chassis from 7750 SR-7 to 7750 SR-12. The highlight of the migration method is illustrated in the
table below:
Considering the swap of BNG-1, we will switch all traffic to BNG-2. This switchover should be non-
service affecting since stateful redundancy is deployed. Upon BNG-1 failover, the following will
occur:
Once old BNG-1 is offloaded and subscribers are switched to BNG-2, the migration continues by
swapping the physical links between BNG and VSS from old to the new one. Two scenarios can be
used:
- In case the 100G ports are available on VSS/EOR, the links on new BNG-1 will be 100G.
- If the 100G ports are not ready on VSS/EOR, we will use a n*10G bundle between the new
BNG-1 and the VSS. The number of 10G links will be defined by Zain.
After laying the physical cables on the new device, connectivity test will be performed to confirm
the status of fiber and optical transceiver.
The Nokia 7750 SR-Series routers do not contain a boot EEPROM. The boot loader code is
loaded from the boot.ldr file located on the Compact Flash (CF) card #3 on the CPM. The BOF file
(located on CF #3 as well) performs the following tasks:
1. Sets up the CPM Ethernet port (speed, duplex, auto).
2. Assigns the IP address for the CPM Ethernet port.
3. Creates static routes for the CPM Ethernet port.
4. Sets the console port speed.
5. Configures the Domain Name System (DNS) name and DNS servers.
6. Configures the primary, secondary, tertiary configuration source.
7. Configures the primary, secondary, and tertiary SROS image source.
8. Configures operational parameters.
The most basic BOF configuration should have the following:
• Active CPM Ethernet port address
• Primary SROS image location
• Primary configuration file location
Below are the guidelines for configuring the BOF parameters on the 7750SR:
Persistency will be disabled for both BNGs as 5620 SAM will not be present in Zain Network.
The 7750 SRs will be deployed with dual Switch Fabric/Control Processor Modules (SF/CPM) for 1:1
redundancy. Typically, the first CPM card installed in a 7750 chassis assumes the active role,
regardless of being inserted in Slot A or B, whilst a subsequent CPM installed in the same chassis
will assume the role of standby CPM.
Redundancy methods facilitate system synchronization between the active and standby CPM so
that
They maintain identical operating parameters. When an active CPM goes offline (due to reboot,
Removal , or failure), the standby CPM takes control without rebooting or initializing itself. In order
to effectively achieve this, it is clearly a requirement that the file systems on the active and
standby
CPMs are synchronized.
Synchronization between CPMs can be manual or automatic. Manual synchronization requires that
the “admin redundancy synchronization” command is entered and is the default mode of
synchronization.
With automatic synchronization, any save or delete file operations implemented on the active CPM
are mirrored onto the standby CPM. The level to which these file systems are synchronized is a
configurable option. When the ‘boot-env’ parameter is specified, the BOF (bof.cfg), boot loader
(boot.ldr), configuration file (.cfg), index persistency file (.ndx), and the image files (cpm.tim,
iom.tim, isa-aa.tim) are synchronized. When the ‘config’ parameter is specified, only the BOF
(bof.cfg), configuration files (.cfg), and index persistency file (.ndx) are synchronized. The ‘boot-
env’
option is recommended during initial installation and during upgrade, however, during normal
operation the ‘boot-env’ option is potentially sub-optimal because it will synchronize all files
(including images) after any save operation. Therefore, post install/upgrade, the ‘config’ option is
recommended.
System name is the node’s fully-qualified domain name. The system name can be any ASCII
printable text string of up to 32 characters that represents SNMPv2 sysName object.
The location of a 7750SR, a contact and coordinates can be specified using the system
“location/contact/coordinates” configuration commands. All three entries can be up to 80
printable
seven-bit ASCII characters. If the location/contact/coordinates text string contains spaces,
doublequotes will be used to delimit the start and end of the string.
configure system
location <location>
contact <contact-name>
coordinates <coordinates>
exit
10.1.4 SNMP
The Simple Network Management Protocol (SNMP) is a requirement in order to effectively operate
and manage the IP/MPLS network infrastructure. For any SNMP requirements SNMPv3 should be
adopted for use given its inherent ability to support confidentiality and integrity. The use of
SNMPv3 serves to make the use of SNMP set packets less of a concern as
encryption/authentication can be used to verify that a valid use has sent the packet and that it has
not been tampered with in transit. Finally, the group-based administrative model allows different
users to access the same SNMP agent with varying access privileges.
The 7750 SR, 7210 SAS and 7705 SAR supports SNMPv1, SNMPv2c, and SNMPv3. Default
implementation of SNMP uses SNMPv3, which incorporates security model and security level
features. A security model is the authentication type for the group and the security level is the
permitted level of security within a security model. The combination of the security level and
security model determines which security mechanism handles an SNMP packet.
bof persist on
bof save
2 Enable SNMP
Please note that, the SAM is likely to be used to create new SNMPv3 NE users. When the
SAM performs this operation it uses the group named “nmsPriv”. Therefore, this group
name should be configured.
access group "nmsPriv" security-model usm security-level privacy read "iso"
write "iso" notify "iso"
iii. MD5 key value is created on the 5620 SAM server by using the node “engine-id”
value as the parameter. The command to run on 5620 SAM CLI to produce MD5
key is not in the scope.
The utility file which generates the key is located in the ‘~/bin’ directory on the SAM Server and the
SAM Client:
Solaris Server: /opt/5620sam/server/nms/bin/password2key.bash
Windows Client: C:\5620sam\server\nms\bin\nmsclient.bat password2key
Generate the key (UNIX example) using the syntax shown below:
./password2key.bash method password engineID
C:\5620sam\server\nms\bin\nmsclient.bat password2key <method> <password> enginID
Method – MD5 (or SHA)
Password – Password string
EngineID – SNMP Engine ID of the NE in hexadecimal form
Example
bash# password2key.bash md5 alcatel 0000197f00000003fa14bfa7
33cf8fc846cef41713568ec4db163e74
C:\5620sam\server\nms\bin\nmsclient.bat password2key md5 admin
0000197f00000003fa14bfa7
33cf8fc846cef41713568ec4db163e74
On the NE, these MD5 values can be used on the SNMP configuration as explained above.
10.1.5.1 NTP
NTP allows for the participating network nodes to keep time more accurately and more importantly
they can maintain time in a more synchronized fashion between all participating network nodes.
Within ZAIN design, accounting is performed towards RADIUS servers. On top, we need to have
both BNG nodes synchronized for the proper Multi-Chassis Synchronization for synchronizing
DHCP leases,SRRP and PPPoE subscriber management states.
For this purpose, a correct time synchronization mechanism must be present between all the
nodes in the network. Network Time Protocol (NTP) can be used for this purpose. NTP is a protocol
Configuration template:
Setting a time zone in 7750 SR OS allows for times to be displayed in the local time rather than in
UTC. The 7750 SR OS has both user-defined and system defined time zones.
A user-defined time zone has a user assigned name of up to four printable ASCII characters in
length and unique from the system-defined time zones. For user-defined time zones, the offset
from UTC (GMT) is configured as well as any summer time adjustment for the time zone.
Where:
non-std-zone-name is 5 chars max (e.g. PKT), and <hh [:mm]> is the offsite from UTC (e.g. +5)
Local authentication is enabled by default and uses user names and passwords to authenticate
login attempts. The user names and passwords are local to each router. Local authorization uses
user profiles and user access information after a user is authenticated.
The profiles and user access information specifies the actions the user can and cannot perform.
Local authorization is enabled by default and uses user profiles and user access information after
a user is authenticated. The profiles and user access information specifies the actions the user can
and cannot perform.
a. User Profiles
Profiles are used to deny or permit access to a hierarchical branch or specific commands. Profiles
are referenced in a user configuration. A maximum of sixteen user profiles can be defined. A user
can participate in up to eight profiles. Depending on the authorization requirements, passwords
are configured locally or on a RADIUS server.
Two user profiles are created by default. The “administrative” profile permits full administrative
access to the whole configuration and management command tree, including security. The
“default”
profile permits access to show commands (except showing configuration and security parameters)
and denies access to all configuration commands.
If required, multiple user profiles can be created with different privileges and assigned to users
based on their roles and tasks. Below are few examples of user profiles that may be required:
• Power Users Profile
A profile that permits access to the whole configuration and management command tree except
security management, BOF/file-system management, and specific admin commands (like admin
reboot or admin redundancy force-switchover) but still permits access to safe admin commands
(like admin save or admin display-config).
• Service Provisioning Profile
A profile that provides full access to service configuration and verification commands but does not
provide access to card configuration, base routing protocols configuration, security configuration,
or
system administration commands.
• First-level Operations Profile
A profile that requires only access to show and simple troubleshooting commands (like ping,
traceroute, etc) but does not require access to any configuration commands.
The definitions of the profiles and their privileges depend on ZAIN requirements and organizational
divisions that require access to the 7750SRs. The profile mentioned above are just examples that
demonstrate the capability of using user profiles for access control.
/configure
system
security
profile "power-users"
default-action permit-all
entry 10
match "admin reboot"
action deny
exit
entry 20
match "admin redundancy force-switchover"
action deny
exit
entry 30
match "bof"
action deny
exit
entry 40
match "file"
action deny
exit
entry 100
/configure
system
security
profile "service-provisioning"
default-action permit-all
entry 10
match "admin"
action deny
exit
entry 20
match "bof"
action deny
exit
entry 30
match "file"
action deny
exit
entry 40
match "configure card"
action deny
exit
entry 50
match "configure router"
action deny
exit
entry 60
match "configure system"
action deny
exit
entry 100
match "configure li"
action deny
exit
entry 110
match "show li"
action deny
exit
exit
exit all
/configure
system
security
profile "power-users"
default-action permit-all
entry 10
match "admin reboot"
action deny
exit
entry 20
match "admin redundancy force-switchover"
action deny
entry 110
/configure
system
security
profile "first-level-operations"
entry 10
match "exec"
action permit
exit
entry 20
match "exit"
action permit
exit
entry 30
match "help"
action permit
exit
entry 40
match "logout"
action permit
exit
entry 50
match "password"
action permit
exit
entry 60
match "show config"
action deny
exit
entry 65
match "show li"
action deny
exit
entry 70
match "show"
action permit
exit
entry 80
match "enable-admin"
action permit
exit
entry 100
match "configure li"
action deny
Alternatively, the “first-level-operations” profile can be created simply by copying the “default”
profile then adding the entries that permit ping and traceroute commands (entries 110 and 120 in
the example) as follows:
b. Users
User configuration defines access parameters for individual users. It defines the login name for
the user and associates the user to one or more (up to eight) user profiles. It also defines access
control parameters specific for the user.
The following are guidelines for user configuration:
• Each operator should use his/her own user credentials and not share it with other
operators.
• Each user can be granted CLI, FTP and/or SNMP access individually (CLI access methods
Includes console, Telnet and SSH). Users should be granted only the type of access they
require.
• Users should be associated with the profiles that permits them to perform only the task
they
are eligible to do.
• Care must be taken when granting access privileges and associating profiles to users. For
example a user who is associated with a profile that denies CLI access to the file-system
(file command) can gain un-authorized access to the file system via FTP if FTP access is
enabled in his/her user account.
• When configured, a user is assigned a temporary password that he/she must change once
logged-in for the first time.
• When users are granted file-system access (either via CLI or FTP), each user should be
restricted to his/her working home directory.
Below is an example for user “user2” configuration. The user is granted CLI and FTP access and is
permitted and denied commands as defined in the “service-provisioning” profile. “user2” is
restricted to his/her home directory “cf3:\user2” ( in this case when he/she connects to the
7750SR only via FTP since he/she is not permitted to use the file command from CLI)
/configure
system
security
user "user2"
password user2123
access console ftp
home-directory "cf3:\user2"
restricted-to-home
console
Password management parameters include the definition of password aging, the authentication
order and authentication methods, password length and complexity, as well as the number of
attempts a user can enter a wrong password before being locked out.
The following are options and guidelines for password management configuration:
• Password complexity requirements can be set to enforce users to use strong passwords.
Password complexity requirements can enforce the use of one or more of the following:
▪ Mixed case: that at least one upper and one lower case character must be present
in the password.
▪ Numeric: that at least one numeric character must be present in the password.
▪ Special character: that at least one special character must be present in the
password. Special characters include: ~!@#$%^&*()_+|{}:”<>?`-=\[];’,./.
• Minimum password length can be enforced.
• Password aging (expiry) can be set to a specific number of days.
• A threshold for unsuccessful login attempts allowed in a specified time frame can be set. If
the threshold is exceeded, the user is locked out for a configurable duration.
Below is an example for a strict password management policy where the password must include
mixed-case, numeric and special characters. The password must be at least 8 characters long and
will expire after 90 days. The user will be locked out for 15 minutes after 3 un-successful login
attempts within 5 minutes.
/configure
system
security
password
aging 90
minimum-length 8
attempts 3 time 5 lockout 15
complexity numeric mixed-case special-character
exit
exit all
The 7750 SR OS supports both SSH1 and SSH2. The 7750SR OS has a global SSH server process to
Support inbound SSH and SCP sessions initiated by external SSH or SCP client applications.
When SSH server is enabled, an SSH security key is generated. The key is only valid until either the
To enable SSH key preservation and to allow the SSH server to accept connections from clients
supporting either SSH1 or SSH2:
A user that requires CLI access to the 7750SR using SSH must have the keywords “access console”
under his/her local user account).
/configure
system security
user <user-name>
access console
console
member "administrative"
exit
The 7750SR OS runs an FTP server that accepts inbound FTP connections from clients. The FTP
server is disabled by default.
To enable the FTP server on the 7750SR:
A user that requires access to the 7750SR using FTP must have the keywords “access ftp” under
his/her local user account. The default home directory for all users accessing the 7750SR using
FTP is the root directory of CF3 of the active SF/CPM, unless specified under the user account
configuration
Login control includes the ability to control the maximum number of inbound SSH/Telnet sessions,
The 7750SR refers to a login banner as the pre-login message. To apply a pre-login message,
The following command will be used (note that “\n” is the code for a new line).
Below is an example for login control configuration that increases the allowed inbound sessions to
15 and creates a pre-login message:
Event logging controls the generation, dissemination and recording of system events for
monitoring status and troubleshooting faults within the system. The 7750 SR groups events into
four major categories or event sources:
• Security — The security event source is all events that affect attempts to breach system
security such as failed login attempts, attempts to access MIB tables to which the user is
not granted access or attempts to enter a branch of the CLI to which access has not been
granted. Security events are generated by the SECURITY application.
• Change — The change activity event source is all events that directly affect the
configuration or operation of the node. Change events are generated by the USER
application.
• Debug — The debug event source is the debugging configuration that has been enabled
on
The system. Debug events are generated by the DEBUG application.
• Main — The main event source receives events from all other applications within the 7750
SR.
Event control assigns the severity for each application event and whether the event should be
generated or suppressed. Severity levels are:
1. cleared
© Nokia 2016. All rights reserved. BNG HLD/LLD 79 / 82
Confidential
2. indeterminate (info)
3. critical
4. major
5. minor
6. warning
One of the following log destinations can be associated with an event log:
• Console
The log message is sent to the system console
• Session
The log messages are temporarily directed to all active Telnet and SSH sessions for the duration of
the session.
• Memory Logs
An event log can send entries to a memory log destination. A memory log is a circular buffer. When
the log is full, the oldest entry in the log is replaced with the new entry. When a memory log is
created, the specific number of entries it can hold can be specified, otherwise it will assume a
default size.
• Log Files
Log entries can be directed to log files stored on the Compact Flash devices in the SF/CPMs.
• SNMP Trap Group
An event log can be configured to send events to SNMP trap receivers by specifying an SNMP trap
group destination. An SNMP trap group can have multiple trap targets. Each trap target can have
different operational parameters.
A trap destination has the following properties:
▪ The IP address of the trap receiver.
▪ The UDP port used to send the SNMP trap.
▪ SNMP version (v1, v2c, or v3) used to format the SNMP notification.
▪ SNMP community name for SNMPv1 and SNMPv2c receivers.
▪ Security name and level for SNMPv3 trap receivers.
• Syslog
An event log can be configured to send events to a syslog destination. Each Syslog destination has
the following properties:
▪ Syslog server IP address.
▪ The UDP port used to send the syslog message.
▪ The Syslog Facility Code (0 - 23) (default 23 - local 7).
▪ The Syslog Severity Threshold (0 - 7) - events exceeding the configured level will
be sent.
Log 99 is a pre-configured memory-based log which logs events from the main event source
(notsecurity, debug, etc.). Log 99 exists by default. Log 99 is limited to 500 entries only.
configure log
log-id 99
description "Default System Log"
no filter
time-format utc
from main
Use the following CLI command to display the entries of log 99:
Log 100 is a pre-configured memory-based log which logs events from the main event source (not
security, debug, etc.). In log 100, only events with severity level of major an above are logged. Log
100 exists by default. Log 100 is limited to 500 entries only.
configure log
---<snip>---
filter 1001
default-action drop
description "Collect events for Serious Errors Log"
entry 10
action forward
description "Collect only events of major severity or higher"
match
no application
no number
severity gte major
no router
no subject
exit
exit
exit
---<snip>---
log-id 100
description "Default Serious Errors Log"
filter 1001
time-format utc
from main
to memory 500
no shutdown
exit
---<snip>--
Use the following CLI command to display the entries of log 100:
/show log log-id 100
10.2.4.2 SYSLOG
Events from Main, Security, and Change sources can be sent to a syslog server. The Syslog
destination that needs to be defined has the following properties:
Syslog IP address
Syslog 1 <syslog-ip-address>
Table 10: syslog server
/configure
log
syslog 1
description "Syslog 1"
address 172.31.10.19
no facility # default is local7
level info # default
no port # default is 514
exit
---<snip>---
log-id 1
description "Events Sent to Syslog"
no filter # default
time-format utc # default
from main security change
to syslog 1
no shutdown
exit
log-id 2
description "Events Sent to Syslog"
no filter # default
time-format utc # default
from main security change
to syslog 1
no shutdown
exit