Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
SRAN8.0
Issue 01
Date 2013-04-28
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: support@huawei.com
Contents
2 Overview.........................................................................................................................................3
3 Technical Description...................................................................................................................4
3.1 Operating Principle.........................................................................................................................................................4
3.2 Protocol Stacks...............................................................................................................................................................5
5 Related Features...........................................................................................................................13
5.1 Prerequisite Features.....................................................................................................................................................13
5.2 Mutually Exclusive Features........................................................................................................................................13
5.3 Impacted Features.........................................................................................................................................................13
6 Network Impact...........................................................................................................................14
6.1 System Capacity...........................................................................................................................................................14
6.2 Network Performance...................................................................................................................................................14
7 Engineering Guidelines.............................................................................................................15
7.1 When to Use Access Control based on 802.1x.............................................................................................................16
7.2 Required Information...................................................................................................................................................16
7.3 Planning........................................................................................................................................................................16
7.4 Deployment on the NodeB/eNodeB/eGBTS Side........................................................................................................17
7.4.1 Requirements.............................................................................................................................................................17
7.4.2 Data Preparation........................................................................................................................................................18
7.4.3 Precautions.................................................................................................................................................................19
7.4.4 Activation..................................................................................................................................................................19
7.4.5 Activation Observation..............................................................................................................................................21
7.4.6 Deactivation...............................................................................................................................................................21
8 Parameters.....................................................................................................................................23
9 Counters........................................................................................................................................26
10 Glossary.......................................................................................................................................27
11 Reference Documents...............................................................................................................28
1.1 Scope
This document describes the Access Control based on 802.1x feature, including its basic
principles, engineering guidelines, and parameters.
The corresponding eRAN feature is eNodeB:LOFD-003015 Access Control based on 802.1x.
Access Control based on 802.1x only applies to Huawei's macro and micro base stations in IP
networking:
l Macro base stations: 3900 series base stations
l Micro base stations: BTS3902E and BTS3803E for UMTS, and BTS3202E and BTS3203E
for LTE.
Unless otherwise specified, the implementation principles of Access Control based on 802.1x
are the same for macro and micro base stations.
NOTE
Document Versions
The document versions are as follows:
l 01 (2013-04-28)
l Draft B (2013-04-10)
l Draft A (2012-12-30)
01 (2013-04-28)
This is the first release of SRAN8.0.
Compared with issue Draft B (2013-04-10) of SRAN8.0, issue 01 (2013-04-28) of SRAN8.0
has no change.
Draft B (2013-04-10)
This is a draft B for SRAN8.0.
Compared with Draft A (2012-12-30), Draft B (2013-03-30) includes the following changes.
Draft A (2012-12-30)
This is a draft A for SRAN8.0.
2 Overview
IEEE 802.1x is an IEEE standard for port-based network access control. It is part of the IEEE
802 group of networking protocols. With port-based network access control, the authentication
access equipment in the local area network (LAN) performs identity authentication and access
control on users or devices connected to its ports. Only the users or devices that can be
authenticated are allowed to access the LAN through the ports. Access Control based on 802.1x
prevents unauthorized users or devices from accessing the network, which ensures transport
network security.
Huawei base stations support Access Control based on 802.1x. The authentication is
unidirectional and is based on Extensible Authentication Protocol-Transport Layer Security
(EAP-TLS). That is, the authentication server performs unidirectional authentication on the
digital certificates of base stations. Figure 2-1shows the network topology for Access Control
based on 802.1x.
3 Technical Description
The functions of RADIUS and AAA servers are similar. This document uses the RADIUS server as an
example to describe Access Control based on 802.1x.
Figure 3-1 shows the operating principle of Access Control based on 802.1x.
NOTE
Port access entity (PAE) is a port-related protocol entity that processes protocol packets during an
authentication procedure.
A physical Ethernet port of the authentication access equipment consists of two logical ports:
one controlled port and one uncontrolled port:
l Controlled port: A controlled port can be in the unauthorized or authorized state, depending
on the authentication result at the authentication server.
A controlled port in the authorized state is in the bidirectional connectivity state and
data flow can pass through the port.
A controlled port in the unauthorized state does not allow any data to pass through.
l Uncontrolled port: An uncontrolled port is always in the bidirectional connectivity state.
Only EAPoL packets can pass through an uncontrolled port. This ensures that the
authentication client can always transmit and receive authentication packets.
During initial access, the base station is not authenticated, and therefore the controlled port is in
the unauthorized state. At this point, only EAPoL packets can pass through the uncontrolled port
and be sent to the authentication server. After the authentication server authenticates the base
station and the authentication access equipment authorizes the controlled port, the controlled
port becomes authorized and data from the base station can pass through the controlled port in
the authorized state. This process ensures that only authorized users and devices can access the
network.
Port-based access control can be based on a physical port (such as the MAC address) or a logical
port (such as the VLAN). Huawei base stations support only port-based access control based on
the MAC address. That is, the authentication message sent by a base station contains the MAC
address of the Ethernet port that connects the base station to the transport network. If
authentication succeeds, the authentication access equipment performs access control on data
flow based on this MAC address.
For details about IEEE 802.1x-based access control, see IEEE 802[1].1x-2004.
and the authentication access equipment, EAP data is encapsulated in EAPoL frames so that the
data can be transmitted in the LAN. Between the authentication access equipment and the
authentication server, EAPoL frames are re-encapsulated in EAP over RADIUS (EAPoR)
frames so that the data can be transmitted using the RADIUS protocol.
Figure 3-2 shows the protocol stacks for Access Control based on 802.1x.
Access Control based on 802.1x uses the EAP protocol for authentication. The EAP protocol
supports multiple authentication methods. Huawei base stations adopt unidirectional EAP-TLS
authentication, that is, the authentication server authenticates base stations using digital
certificates. The AM parameter specifies the authentication method used by IEEE 802.1x-based
access control.
In an IEEE 802.1x-based access control procedure, the base station sends its digital certificate
to the RADIUS server in an EAPoL frame. The RADIUS server authenticates the base station
by using the Huawei root certificate or the operator's root certificate.
For details about the EAP protocol, see RFC 3748.
For details about the EAP-TLS protocol, see RFC 2716.
This chapter describes the application of IEEE 802.1x-based access control on a base station.
Figure 4-1 Typical network topology for IEEE 802.1x-based access control
IEEE 802.1x-based access control of Ethernet ports can be activated by using the ACT
DOT1X command and deactivated by using the DEA DOT1X command. By default, IEEE
802.1x-based access control is activated on Ethernet ports of base stations before delivery.
IEEE 802.1x-based access control is activated on the Ethernet port that connects the base
station to the transport network. If IEEE 802.1x-based access control is deactivated and
authentication is not performed, the base station triggers an IEEE 802.1x-based access
control procedure. Because the network uses IEEE 802.1x-based access control, the DHCP
Discover packet cannot pass through the authentication access equipment, and therefore
the DHCP procedure fails. The base station waits for the authentication result. After the
IEEE 802.1x-based access control succeeds, the base station resends a DHCP Discover
packet. After the DHCP procedure is complete, the automatic base station deployment
procedure starts.
For example, the main control board of the base station has an incorrect configuration file,in
which IEEE 802.1x-based access control is deactivated on the Ethernet port that connects
the base station to the transport network. In this case, the DHCP procedure triggers the
IEEE 802.1x-based access control procedure during automatic base station deployment.
l If the network does not support IEEE 802.1x-based access control, and IEEE 802.1x-based
access control is activated on the Ethernet port that connects the base station to the transport
network:
The base station initiates the IEEE 802.1x-based access control procedure for three times
at an interval of 25 seconds. If the base station does not receive any response from the
network, the base station determines that the network does not support IEEE 802.1x-based
access control. The base station then sends a DHCP Discover packet. The DHCP Discover
packet can pass through the authentication access equipment. After the DHCP procedure
is complete, the automatic base station deployment procedure starts.
The rest of this section describes automatic base station deployment by PnP in the preceding
three scenarios.
NOTE
During automatic base station deployment by PnP, the IEEE 802.1x-based access control procedure uses
the preconfigured Huawei-issued device certificate of the base station for authentication.
Scenario 1
Figure 4-2 shows automatic base station deployment when the network supports IEEE 802.1x-
based access control and IEEE 802.1x-based access control is activated on the Ethernet port that
connects the base station to the transport network.
In the IEEE 802.1x-based access control procedure, the EAPoL-Start packet is a multicast packet and its
destination MAC address is 01-80-C2-00-00-03; other packets are unicast packets.
Scenario 2
Figure 4-3 shows automatic base station deployment when the network supports IEEE 802.1x-
based access control but IEEE 802.1x-based access control is deactivated on the Ethernet port
that connects the base station to the transport network.
Scenario 3
Figure 4-4 shows automatic base station deployment when the network does not support IEEE
802.1x-based access control and IEEE 802.1x-based access control is activated on the Ethernet
port that connects the base station to the transport network.
During base station deployment using a USB flash drive, the certificate used in the IEEE 802.1x-based
access control procedure is specified in the configuration file. Because the base station is preconfigured
with the Huawei-issued device certificate, the certificate for SSL authentication can be set only to Huawei-
issued device certificate in the configuration file. If the certificate for SSL authentication is set to the
operator-issued device certificate, the IEEE 802.1x-based access control procedure fails.
5 Related Features
6 Network Impact
7 Engineering Guidelines
This chapter describes how to deploy the Access Control based on 802.1x feature in a newly
deployed network.
The Access Control based on 802.1x feature uses the Huawei-issued device certificate to
authenticate the base station. Therefore, the PKI feature also needs to be activated.
l If the customer requires that Access Control based on 802.1x use the Huawei-issued device
certificate to authenticate the base station, the PKI feature does not need to be deployed in
the network.
l If the customer requires that Access Control based on 802.1x use the operator-issued device
certificate to authenticate the base station, the PKI feature needs to be deployed in the
network. For details about how to deploy the PKI feature, see PKI Feature Parameter
Description.
7.3 Planning
Hardware Planning
NE Board Board That Provides a Port for Port Type
Configuration Connecting to the Transport
Network
Micro base BTS3902E UMTS and BTS3902E UMTS and BTS3803E Ethernet
station BTS3803E UMTS UMTS port
7.4.1 Requirements
l Requirements for NEs:
An authentication server has been deployed in the network.
The authentication server supports the EAP protocol defined in RFC 3748 and supports
EAP-TLS authentication.
The authentication server is preconfigured with the Huawei root certificate. If the
customer requires that the operator-issued device certificate be used for authentication,
the operator' root certificate must be preconfigured on the authentication server.
The authentication access equipment supports IEEE 802.1x-based access control and
EAP packet processing.
The authentication access equipment supports port-based access control based on the
MAC address.
l Requirements for licenses:
The license for the PKI feature has been activated.
The license for the Access Control based on 802.1x feature has been activated.
NOTE
"-" in Table 7-1 indicates that there is no special requirement for setting the parameter. Set the parameter
based on site requirements.
Table 7-1 Data to prepare before activating the Access Control based on 802.1x feature
MO Paramete Paramete Setting Notes Data
r Name r ID Sourc
e
Subrack SRN -
No.
Slot No. SN -
Subboard SBT -
Type
Port No. PN -
NOTE
l When you deploy this feature on a multimode base station, activate the feature only on the Ethernet
port that connects the base station to the transport network. The data preparation and initial
configuration of the multimode base station are the same as those of a single-mode base station.
l When a base station is working normally, the certificate used by IEEE 802.1x-based access control is
the same as that used by SSL authentication. For details about how to configure the certificate for SSL
authentication, see the "Engineering Guidelines" section in SSL Feature Parameter Description. If no
certificate is configured for SSL authentication, IEEE 802.1x-based access control uses the Huawei-
issued device certificate by default.
7.4.3 Precautions
None
7.4.4 Activation
This section uses the eNodeB as an example to describe how to activate Access Control based
on 802.1x by using MML commands or the CME.
NOTE
The preceding configuration examples are specific to macro base stations. The only difference in parameter
settings between micro and macro base stations lies in that the CN, SRN, and SN parameters in the
DOT1X MO are all set to 0.
Using the CEM to Perform Batch Configuration for Newly Deployed Base Stations
Enter the values of the parameters listed in Table 7-2 into a summary data file, which also
contains other data for the new base stations to be deployed. Then, import the summary data file
into the CME for batch configuration.
The summary data file may be a scenario-specific file provided by the CME or a customized
file, depending on the following conditions:
l The MOs in Table 7-2 are contained in a scenario-specific summary data file. In this
situation, set the parameters in the MOs, and then verify and save the file.
l Some MOs in Table 7-2 are not contained in a scenario-specific summary data file. In this
situation, customize a summary data file to include the MOs before you can set the
parameters.
DOT1X Common Data Port No., Active Sign, l For an Ethernet port on
Authentic Method which Access Control based
on 802.1X is activated, set
the Active Sign parameter to
ACTIVE.
l For an Ethernet port on
which Access Control based
on 802.1X is deactivated, set
the Active Sign parameter to
DEACTIVE and leave the
Authentic Method
parameter unspecified.
For instructions about performing batch configuration for each base station, see the following
sections in 3900 Series Base Station Initial Configuration Guide.
Using the CME to Perform Batch Configuration for Existing Base Stations
Batch reconfiguration using the CME is the recommended method to activate a feature on
existing base stations. This method reconfigures all data, except neighbor relationships, for
multiple base stations in a single procedure. The procedure is as follows:
Step 1 Choose CME > Customize Summary Data File from the main menu of an M2000 client, or
choose Advanced > Customize Summary Data File from the main menu of a CME client, to
customize a summary data file for batch reconfiguration.
NOTE
Step 2 Choose CME >Base Station Bulk Configuration > Export Data from the main menu of the
M2000 client, or choose Advanced > Base Station Bulk Configuration > Export Data from
the main menu of the CME client, to export the base station data stored on the CME into the
customized summary data file.
Step 3 In the summary data file, set the parameters in the MOs listed in Table 7-2 and close the file.
Step 4 Choose CME > Base Station Bulk Configuration > Import Data from the main menu of the
M2000 client, or choose Advanced >Base Station Bulk Configuration > Import Data from
the main menu of the CME client, to import the summary data file into the CME.
----End
Check the value of the Authentic State parameter in the command output. If the value of this
parameter is Authenticate Succeed, the port has passed IEEE 802.1x-based authentication.
NOTE
The preceding configuration examples are specific to macro base stations. The only difference in parameter
settings between micro and macro base stations lies in that the CN, SRN, and SN parameters in the
DOT1X MO are all set to 0.
7.4.6 Deactivation
NOTE
The preceding configuration examples are specific to macro base stations. The only difference in parameter
settings between micro and macro base stations lies in that the CN, SRN, and SN parameters in the
DOT1X MO are all set to 0.
7.6 Troubleshooting
After Access Control based on 802.1x is activated, the base station may report ALM-26831
802.1x Authentication Failure.
For details about how to clear these alarms for each type of base station, see the following sections
in 3900 Series Base Station Alarm Reference:
l "eGBTS Alarm Reference"
l "NodeB Alarm Reference"
l "eNodeB Alarm Reference"
8 Parameters
9 Counters
10 Glossary
11 Reference Documents