TriplePlay WiFi Offload
TriplePlay WiFi Offload
TriplePlay WiFi Offload
In This Section
This section describes features and functionality for 7750 SR to act as a WLAN-GW providing
subscriber management (ESM), mobility and 3G/4G interworking functions for WIFI subscribers
gaining access from WLANs in hot-spots and home-spots.
Topics in this section include:
Page 1569
AAA
Portal
Access
AP
CMTS/DSLAM/OLT
WLAN GW
WiFi
7750 SR
OSSG700
AAA
Portal
Access
AP
DSL/PON
eBNG/
WLAN GW
WiFi
7750 SR
OSSG701
Page 1570
Page 1571
Resources are only consumed on the WLAN-GW if there is one or more active subscriber
on the AP. Merely broadcasting an SSID from an AP does not result in any state on the
WLAN-GW.
Encapsulation
The GRE encapsulation is based on RFC 1701/2784, Generic Routing Encapsulation (GRE),
WLAN-GW will encapsulate according to RFC 1701 with all the flag fields set to 0, and no
optional fields present. WLAN-GW is able to receive both encapsulation specified in RFC 1701
and RFC 2784, with all flag fields set to 0, and no optional fields present in the header.
Page 1572
Ethernet Over
Soft-GRE
ETH
VLAN (optional)
SRCIP = WAN IP
DSTIP = Soft-GRE Server
Outer IP
Flags = 0x0000
Ether-Type = 0x8847
GRE
MPLS PW
Control Word
(optional)
ETH
VLAN (optional)
UEIP
ETH
VLAN (optional)
Outer IP
GRE
ETH
Controlword
VLAN (optional)
SRCMAC = UE MAC
DSTMAC = WLAN GW
UEIP
SRCMAC = WIFIAPMAC
DSTMAC = IP NextHop
VLAN Used in the
Access/Aggregation Network
SRCIP = WAN IP
DSTIP = Soft-GRE Server
Flags = 0x0000
Ether-Type = 0x6558
SRCMAC = UE MAC
DSTMAC = WLAN GW
Represents SSID
or Retailer
SRCIP = UE IP
DSTIP = DNS/Internet
Represents SSID
or Retailer
SRCIP = UE IP
DSTIP = DNS/Internet
OSSG702
Outer VLAN: (4 bytes): optional, typically used for service delineation in the access or
aggregation network.
Page 1573
GRE: (4 bytes)
All flags are set to 0, such as checksum, sequence number and keys are not present.
The Ether-Type is set to 0x6558 for native Ethernet is used, and 0x8847 when MPLS
encapsulation is used.
Inner VLAN: (4 bytes): optional, inserted by AP/RG per unique SSID (typically, when the
AP is providing SSID per retailer). WLAN-GW allows mapping the VLAN to a service
context per retailer, in the data plane.
Page 1574
An ESM and soft-GRE configuration is required for WLAN-GW functions. Subscriber and group
interfaces are configured as part of normal ESM configuration. The group interface is enabled for
soft-GRE by configuration. The soft-GRE related configuration includes the following:
TCP MSS segment size. This is set in TCP SYN and SYN-ACKs by WLAN-GW to
adjust to the MTU on access/aggregation network in order to prevent fragmentation of
upstream and downstream TCP packets.
Mobility related configuration, including mobility trigger packet types (normal data or
special Ethernet IAPP fame), and hold-down time between successive mobility triggers.
VLAN to retailer mapping. The AP typically inserts a unique dot1Q tag per retail service
provider in the Ethernet payload. The mapping of dot1Q tag to retail service context is
configured under soft-GRE tunnel. The subscriber is then created in the configured retail
service context. The retail service context can also be provided by AAA server in
authentication-accept message based on subscriber credentials or SSID information
contained in DHCP Option82.
Egress QoS configuration for downstream traffic entering the WLAN-GW module for
tunnel encapsulation. This includes type of aggregate bandwidth shaping (per-tunnel or
per-retailer), aggregate-rate-limit, egress QoS policy and scheduler policy. The tunnel
shaping can be configured to be applied only when there is more than one subscriber on
the tunnel. By default the shaping if configured is applied when first subscriber on the
tunnel logs in.
Page 1575
no primary-nbns
no secondary-dns
no secondary-nbns
exit
egress
no agg-rate-limit
no hold-time
qos 1
no scheduler-policy
no shape-multi-client-only
no shaping
exit
gw-address 1.1.1.57
no gw-ipv6-address
no http-redirect-policy
no nat-policy
mobility
hold-time 5
no trigger
exit
router 70
no tcp-mss-adjust
track-mobility
mac-format "aa:"
no radius-proxy-cache
exit
wlan-gw-group 3
vlan-tag-ranges
no default-retail-svc-id
range start 0 end 100
authentication
no authentication-policy
hold-time sec 5
exit
no data-triggered-ue-creation
dhcp
shutdown
active-lease-time min 10
initial-lease-time min 10
no l2-aware-ip-address
no primary-dns
no primary-nbns
no secondary-dns
no secondary-nbns
exit
no http-redirect-policy
no nat-policy
retail-svc-id 35
track-mobility
mac-format "aa:"
no radius-proxy-cache
exit
exit
exit
no shutdown
Page 1576
Data Path
In the upstream direction, the ingress IOM receiving the GRE tunneled packets from the WIFI AP
or AC, load-balances tunnel processing amongst the set of MS-ISAs on the active WLAN-GW
IOMs in the WLAN-GW group. The load-balancing is based on a hash of source IP address in the
outer IP header. The MS-ISA receiving the GRE encapsulated packets removes the tunnel
encapsulation, and internally tunnels (MAC-in-MAC, using BVPLS) the packet to an anchor MSISA on the WLAN-GW IOM. All traffic from a given UE is always forwarded to the same anchor
MS-ISA based on hashing on UEs MAC address. The MS-ISA provides a mobility anchor point
for the UE. The UE MACs association to the GRE tunnel identifier is created or updated. The
corresponding IOM provides ESM functions including ESM lookup, ingress ACLs and QoS.
DHCP packets are forwarded to the CPM from the anchor IOM.
In the downstream direction, the IP packets are forwarded as normal from the network IOM
(based on route lookup yielding subscriber subnet) to the IOM where the ESM host is anchored.
ESM processing including per UE hierarchical policing and LI is performed on the anchor IOM.
Configured MTU on the group-interface is enforced on the IOM, and if required packets are
fragmented. The packets are then forwarded to the appropriate anchor MS-ISA housed by this
IOM. Lookup based on UEs MAC address is performed to get the tunnel identification, and the
packets are MAC-in-MAC tunneled to the MS-ISA terminating the GRE tunnel. Aggregate
shaping on the tunneled traffic (per tunnel or per retailer) is performed on the carrier IOM housing
the tunnel termination MS-ISA. The tunnel termination MS-ISA removes MAC-in-MAC
encapsulation, and GRE encapsulates the Layer 2 packet, which exits on the Layer 3 SAP to the
carrier IOM. The GRE tunneled packet is forwarded to the right access IOM towards the WIFI AP
based on a routing lookup on IP DA in the outer header.
Page 1577
Page 1578
The following output depicts per tunnel or per tunnel/SSID egress QoS (with aggregate-rate and
port-scheduler).
// Port-scheduler
config>qos#
port-scheduler-policy lo-gre-port-sched
max-rate 5000
level 1 rate 1000 cir-rate 1000
level 8 rate 500 cir-rate 500
exit
exit
// Egress queues (per ISID) parented by port-scheduler specified under associated soft-GRE
interface
config>qos>
sap-egress 3 create
queue 1 create
rate 300
port-parent level 1 weight 10 cir-level 1 weight 10
exit
queue 2 create
rate 100
port-parent level 8 weight 10 cir-level 8 weight 10
fc af create
dot1p 2
de-markweight
exit
fc be create
queue 1
dot1p 0
de-mark
exit
fc ef create
queue 2
dot1p 5
de-mark
exit
exit
exit
// soft-GRE interface refers to SAP egress QoS policy and aggregate rate-limit for associated
ISIDs
config>service>ies>sub-if>grp-if>soft-gre>egress
agg-rate-limit 2000
hold-time 300
qos 3
shaping per-tunnel
shape-multi-client
exit
Page 1579
config>isa>wlan-gw-group#
active-iom-limit 1
tunnel-port-policy " lo-gre-port-sched "
iom 2
iom 3
no shutdown
exit
Figure 144: Per Tunnel or Per Tunnel/SSID Egress QoS (with aggregate-rate and port-scheduler)
The following output depicts per tunnel or per tunnel/SSID egress QoS (with virtual-scheduler).
// hierarchical virtual scheduler
config>qos#
scheduler-policy virtual-sched-policy
tier1
scheduler all-traffic create
rate 10000
exit
exit
tier2
scheduler non-voice create
parent all-traffic cir-level 1
rate 9000
exit
scheduler voice create
parent all-traffic level 2 cir-level 2
rate 3000
exit
exit
exit
Page 1580
de-mark
exit
exit
exit
// soft-GRE interface refers to SAP egress QoS policy and hierarchical scheduler for associated
ISIDs
config>service>ies>sub-if>grp-if>soft-gre>egress
hold-time 300
qos 3
scheduler-policy virt-sched-policy
shaping per-tunnel
shape-multi-client
exit
Figure 145: Per Tunnel or Per Tunnel/SSID Egress QoS (with virtual-scheduler)
Operational Commands
Egress per tunnel (or per tunnel, per SSID) QoS with aggregate rate-limit and port-scheduler.
show router 50 wlan-gw soft-gre-tunnels detail
===============================================================================
Soft GRE tunnels
===============================================================================
Remote IP address
: 201.1.1.2
Local IP address
: 50.1.1.1
ISA group ID
: 1
ISA group member ID
: 1
Time established
: 2012/06/19 20:31:36
Number of UE
: 1
Tunnel QoS
---------Operational state
: active
Number of UE
: 1
Remaining hold time (s)
: N/A
Service Access Points(SAP)
===============================================================================
Service Id
: 2147483650
SAP
: 2/1/lo-gre:1
Encap
: q-tag
Description
: Internal SAP
Admin State
: Up
Oper State
: Up
Flags
: None
Multi Svc Site
: None
Last Status Change : 06/19/2012 07:13:31
Last Mgmt Change
: 06/19/2012 20:30:24
------------------------------------------------------------------------------Encap Group Specifics
-------------------------------------------------------------------------------
Page 1581
InProf
OutProf
InProf
OutProf
:
:
:
:
Packets
0
0
0
0
Octets
0
0
0
0
Page 1582
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Assigned:0(w)
Consumed:0(w)
Offered:0(w)
OperCIR:0
PktByteOffset:add 0*
OnTheWireRates:false
ATMOnTheWireRates:false
LastMileOnTheWireRates:false
Egress per tunnel (or per tunnel, per SSID) QoS with hierarchical virtual scheduler.
show router 50 wlan-gw soft-gre-tunnels detail
===============================================================================
Soft GRE tunnels
===============================================================================
Remote IP address
: 201.1.1.2
Local IP address
: 50.1.1.1
ISA group ID
: 1
ISA group member ID
: 1
Time established
: 2012/06/19 20:43:03
Number of UE
: 1
Tunnel QoS
---------Operational state
: active
Number of UE
: 1
Remaining hold time (s)
: N/A
Service Access Points(SAP)
===============================================================================
Service Id
: 2147483650
SAP
: 2/1/lo-gre:1
Encap
: q-tag
Description
: Internal SAP
Admin State
: Up
Oper State
: Up
Flags
: None
Multi Svc Site
: None
Last Status Change : 06/19/2012 07:13:31
Last Mgmt Change
: 06/19/2012 20:30:24
------------------------------------------------------------------------------Encap Group Specifics
------------------------------------------------------------------------------Encap Group Name
: _tmnx_SHAPER_GR000
Group Type
: ISID
Qos-per-member
: TRUE
Members
:
1
------------------------------------------------------------------------------QOS
------------------------------------------------------------------------------E. qos-policy
: 3
Q Frame-Based Acct: Disabled
E. Sched Policy
: virtual_scheduler_policy E. Agg-limit
: -1
------------------------------------------------------------------------------Encap Group Member 1 Base Statistics
Page 1583
For.
For.
Dro.
Dro.
InProf
OutProf
InProf
OutProf
:
:
:
:
Packets
Octets
2
0
0
0
752
0
0
0
Page 1584
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
[As Parent]
|
Rate:3999
|
ConsumedByChildren:0
|
|
|--(Q) : -2147483646->2/1/lo-gre:1->EG(_tmnx_SHAPER_GR000):1->1
|
|
AdminPIR:10000000
AdminCIR:0
|
|
AvgFrmOv:105.31(*)
|
|
CBS:0 B
MBS:12582912 B
|
|
Depth:0 B
HiPrio:1376256 B
|
|
|
|
[Within CIR Level 0 Weight 1]
|
|
Assigned:0
Offered:0
|
|
Consumed:0
|
|
|
|
[Above CIR Level 1 Weight 1]
|
|
Assigned:3999
Offered:0
|
|
Consumed:0
|
|
|
|
TotalConsumed:0
|
|
OperPIR:4000
OperCIR:0
|
|
|
|
PktByteOffset:add 0*
|
|
OnTheWireRates:false
|
|
ATMOnTheWireRates:false
|
|
LastMileOnTheWireRates:false
Page 1585
Authentication
Authentication
The solution supports multiple authentication mechanisms. Type of authentication support
depends on the WIFI AP, UE capabilities and customer preference. In case of 802.1x/EAP capable
WIFI APs, supporting secure SSIDs via 802.11i/WPA2, various EAP based authentication such as
SIM/uSIM based (SIM/AKA/AKA), TTLS, PEAP, certs, etc., are supported. The solution also
supports web-portal based authentication with or without WISPr client on the UE. EAP and portal
authentication works independent of the type of connectivity from the AP (tunneled or native IP).
EAP-Based Authentication
In this model the WIFI AP supports a RADIUS client, and originates RADIUS messages based on
802.1x/EAP exchange with the UE. It sends EAP payload in RADIUS messages towards the
RADIUS server or RADIUS proxy. 7750 WLAN-GW can be configured as a RADIUS proxy for
the WIFI APs. The WIFI AP should be configured with the IP address of the RADIUS proxy, and
should send authentication and accounting messages non-tunneled, natively routed to the
RADIUS proxy. See Figure 146.
The RADIUS proxy function allows 7750 SR to look at the RADIUS authentication and
accounting messages and create or update corresponding subscriber state. RADIUS proxy
transparently forwards RADIUS messages between AP (authenticator) and the AAA server. The
access-request message contains standard RADIUS attributes (including user-name), and the EAP
payload. Standard authentication algorithms negotiated with EAP involve multiple round-trips
(challenge/response) between AP (and UE) and the AAA server.
Once authentication is complete, AAA server passes back subscriber related configuration
parameters as well as the computed session keys (aka pair-wise master key) for 802.11i to the AP.
These keys are encrypted using shared secret between AP (authenticator) and the AAA server.
7750 WLAN-GW can optionally cache authentication information of the subscriber from accessrequest and access-accept messages. The cached information allows local authorization of
subsequent DHCP messages from the UEs behind the AP against the cached state on the 7750
RADIUS proxy, and avoids another trip to the RADIUS server.
Page 1586
UE
WLAN GW
WAP
AAA
HLR
802.1X
Unauthorized State
EAP: Request (ID)
802.1X
Authorized State
Cache Authorized
MAC + NAS-Port
RADIUS: Accounting-Start
(EAP ID, Calling-Station-ID=UE-MAC)
DHCP Discover
RADIUS: Accounting-Start
(Calling-Station-ID=UE-MAC)
Data Packet Upstream (src MAC=UE, dst MAC = WLAN GW, src IP = UE, dst IP = Internet
OSSG703
Figure 146: EAP Authentication Call Flow with WLAN-GW RADIUS Proxy
Page 1587
Authentication
RADIUS Proxy
RADIUS proxy can be configured per service router (base or VPRN). The proxy acts as a server
towards the WIFI AP RADIUS clients, and as a client towards RADIUS server(s). Therefore, both
client and server parts of the RADIUS proxy need to be configured. The attribute from accessrequest or response message that serves as the key for the cache is configurable. The key
configuration is mandatory for enabling the cache. Commonly the key is the MAC address of the
UE, which is available in subsequent DHCP request, and used to locate the cache entry. The UEs
MAC address is typically available in the Calling-station-Id attribute (31) in the RADIUS accessrequest message from the AP. The proxy can be configured for both authentication and
accounting. The radius server policies referred by RADIUS proxy are configured under aaa
context. If caching is enabled in the RADIUS proxy, the subscriber attributes returned in accessaccept are cached. These can include 802.1x credentials/keys, IP address or pool, DNS
information, default gateway information, retail-service-id, SLA-profile, filter parameters,
charging information, session keys (MS-MPPE-RECV-KEY, MS-MPPE-SEND-KEY) etc. If
subsequent DHCP DISCOVER is not received within the configured timeout, the cache entry is
removed.
The following output displays a RADIUS proxy configuration.
config>service>ies>
config>service>vprn>
description "Default Description For VPRN ID 50"
interface "listening_radius_server" create
address 9.9.9.9/32
loopback
exit
radius-proxy
server "radius_proxy" purpose accounting authentication create
cache
key packet-type request attribute-type 31
timeout min 5
track-accounting stop interim-update accounting-on accounting-off
no shutdown
exit
default-accounting-server-policy "radius_acct_server_policy"
default-authentication-server-policy "radius_Auth_server_policy"
interface "listening_radius_server"
load-balance-key attribute-type 102 vendor 5
secret "AQepKzndDzjRI5g38L3LbbN3E8qualtn" hash2
send-accounting-response
no shutdown
exit
Page 1588
Page 1589
Authentication
If caching is enabled in the RADIUS proxy, then the actions on receiving DHCP message for the
authenticated client includes the following:
Page 1590
A host lookup is done in the local-user-database to find the RADIUS proxy cache for the
subscriber.
The field used to lookup the cache is configurable. It can include circuit-id or remote-id
(present in sub-option in DHCP option-82), MAC@ or one of the other options in the
DHCP packet. If a match is not found, the configured fail-action is executed. The default
match field is MAC@. If the configured fail-action is drop, the DHCP DISCOVER is
dropped. If the configured fail-action is continue, then the ESM host creation proceeds
based on the authentication policy configured under the group-interface on which the
DHCP packet is received.
If a match is found, the parameters from original authentication accept in the cache are
used to create the ESM host. If the group-interface is soft-GRE, then the ESM host is
associated with the soft-GRE tunnel the (APs WAN IP@) and corresponding AP
(MAC@ from the called-station-id in the authentication state).
The ESM host is deleted, an ESM accounting-sop message is sent, and the accountingstop message from the AP is forwarded to the accounting-server.
Interim Accounting Updates If the client moves and re-associates with a new AP, the
RADIUS client in the new AP generates interim-update. The RADIUS-proxy will locate
the impacted ESM host, and update its state to point to the new APs MAC@ (as available
in called-station-id in the accounting message). The ESM interim-updates to accounting
servers are sent on scheduled interval configured in accounting-policy, but with the
updated information from the interim updates received from the AP.
Page 1591
Authentication
Portal Authentication
For SSIDs without 802.11i/WPA2-based key exchange and encryption, it is common to
authenticate the user by directing users HTTP traffic to a portal, where the user is prompted for its
credentials, which are verified against a subscriber database. The backend can optionally
remember the MAC@ and subscriber credentials for a set period of time such that subsequent
logins of the user do not require portal redirection. Some UEs support a client application (aka
WISPr client), which automatically posts subscriber credentials on redirect, and parse HTTP
success or failure response from the portal sever.
7750 WLAN-GW uses existing http-redirect action in IP filter to trigger redirect port-80 traffic. In
case of open SSID, on receiving DHCP DISCOVER, MAC based authentication is performed
with the RADIUS server as per configured authentication policy. The SLA-profile returned from
RADIUS server in authentication-accept (or the default SLA-profile) contains the filter with httpredirect. Redirect via HTTP 302 message to the UE is triggered from the CPM. Once the user
posts its credentials, RADIUS server generates a CoA-request message removing the http-redirect
by specifying an SLA-profile without redirect action. If the portal authentication fails, the
RADIUS server generates a disconnect-request message to remove the ESM host. In case of softGRE tunnel from the AP, the DHCP messages and data are both tunneled to the WLAN-GW. See
Figure 147.
Page 1592
UE
WLAN GW
WAP
AAA
Portal
RADIUS: Access-Request
(Uname=UE-MAC)
DHCP Discover
RADIUS: Access-Accept
(ID, Redirect-Policy)
DHCP Request
ESM Host Created
DHCP Ack
RADIUS: Accounting-Start
(Client-IP)
OSSG704
The following output displays a portal authentication for open SSIDs configuration example.
config>subscriber-mgmt
sla-profile "portal-redirect" create
ingress
ip-filter 10
exit
exit
exit
system>config>filter
ip-filter 10 create
entry 1 create
Page 1593
Authentication
Page 1594
Address Assignment
The address to the UEs can be assigned via local DHCP server from locally defined pools, or from
RADIUS server via local DHCP proxy, or from an external DHCP server. Subscriber-interface
and group-interface are configured as part of normal ESM configuration. In case of soft-GRE, the
group-interface is soft-GRE enabled. Subnets on the subscriber interface are used for the pools
from which the DHCP local server assigns addresses to UEs.
The following output displays an address assignment configuration example.
config>service>vprn
dhcp
local-dhcp-server "dhcp" create
#### create local DHCP server
pool 1 create
#### define Pool
options
dns-server 8.8.8.8 8.8.4.4
lease-time min 5
exit
subnet 128.203.254.180/30 create
options
subnet-mask 255.255.0.0
default-router 128.203.254.181
exit
address-range 128.203.254.182 128.203.254.183
exit
exit
exit
exit
interface "DHCP-lb" create
address 10.1.1.1/32
local-dhcp-server "dhcp"
loopback
exit
Page 1595
Address Assignment
trusted
lease-populate 32000
gi-address 128.203.254.181
user-db "radius_ludb"
#### LUDB for proxy cache co-relation
no shutdown
exit
exit
Page 1596
Page 1597
Wholesale
Wholesale
With EAP the AAA server can look at the realm from the user credential (IMSI) in authentication
request and appropriately provide the service context in retail-service-id, for the ESM host
corresponding to the UE.
For open SSID, the decision can be made by the AAA server based on the SSID. The SSID is
encapsulated in circuit-id sub-option of option-82. The recommended format for the circuit-id is a
string composed of multiple parts (separated by a delimiter) as shown below.
AP-MAC;SSID-STRING;SSID-TYPE
Delimiter is the character ;, and MUST not be allowed in configured SSIDs. AP-MAC sub-string
MUST contain the MAC address of the AP in the format xx:xx:xx:xx:xx:xx
SSID-TYPE is o for open, and s for secure.
For example, if AP-MAC is 00:10:A4:23:19:C0, SSID is SP1-wifi, and SSID-type is secure,
then the value of circuit-id would be the string 00:10:A4:23:19:C0;SP1-wifi;s.
The circuit-id is passed to the AAA server in initial MAC based authentication on DHCP
DISCOVER. The retail-service-id can be returned in access-accept. This assumes the AP
broadcasts unique SSID per retail provider, and inserts it in Option82 as a DHCP relay-agent. As
an alternative to SSID in option-82, the AP can insert a unique dot1Q tag per retail provider,
before tunneling the Ethernet frame, using single GRE tunnel per AP to the WLAN-GW. 7750
supports configuring a map of .dot1Q tags to retail-service-id. Therefore, the determination of the
retail provider for the subscriber can be made in the data plane when DHCP is received, and the
subscriber state can be created and processed in the right service context.
The following output displays a wholesale configuration example.
config>service>ies>
config>service>vprn>
subscriber-interface <if-name>
group-interface <if-name> softgre
soft-gre
[no] router (base | <vprn-id>) # tunnel service context
[no] wlan-gw-group <group-id>
....snip
vlan-tag-ranges # Precedence for retail-service-id:
# RADIUS, vlan-retail-service-map, default-retail-svc
[no] vlan start <start-tag> end <end-tag> retail-svc-id <svc-id>
[no] default-retail-svc-id
exit
exit
exit
Page 1598
CGN on WLAN-GW
Both LSN and L2-aware NAT for WIFI subscribers over soft-GRE tunnels is supported. NAT on
WLAN-GW is only supported for locally terminated subscribers and not for GTP tunneled
subscribers. NAT can be performed on the same set of ISAs that are used for WLAN-GW
functions, by referring to the WLAN-GW ISA group from NAT configuration. Alternatively,
dedicated set of ISAs can be used for NAT function by creating and referencing a separate NATgroup. Configuration related to LSN and L2-aware NAT is provided in SROS MS-ISA guide.
Page 1599
Page 1600
Page 1601
existing IP address in session create response. The old session and bearer is deleted by the PGW.
The signaling of handover bit is supported with S2a and S2b (release 10 and beyond). The IP
address cannot be preserved over the Gn interface. The call flow in Figure 152 shows basic GTP
setup (with S2a), the output provided on page 1614 show IP address preservation across interaccess (WIFI <-> 4G) moves.
DHCP release or lease timeout on WLAN-GW will result in deletion of the GTP tunnel
corresponding to the UE. The session or PDP context deactivation from PGW/GGSN will also
result in removal of the GTP state for the UE and the corresponding ESM host on WLAN-GW. In
this SR-OS release, only default bearer (or primary PDP context) for single default APN is
handled over WIFI. GTP path-management messages (echo request and reply) are supported.
Mandatory IEs are supported in GTP signaling. Hard coded default values are signaled for QoS
and charging related IEs. For GTPv2, the bearer is signaled as non-GBR bearer with QCI value of
8, and MBR/GBR values of 0. APN-AMBR default values signaled are 20Mbps/10Mbps
downstream/upstream. For GTPv1, reliability and priority classes default to best-effort,
allocation/retention priority defaults to 1, and the default peak-rate corresponds to class 9 (bit-wise
1001) which is slightly over 2Mbps. Charging characteristics IE which contains a 16 bit flag
defaults to 0. In the future, RADIUS returned values or locally configurable values will be
signaled in QoS and charging IEs.
The IP address is returned in the create PDP context response or Create session response. The
DNS server addresses for the UE are retuned in IP control protocol (IPCP) option in a PCO IE in
the response. The default gateway address provided to the UE in DHCP is auto-generated
algorithmically on the WLAN-GW from the IP address returned by the PGW/GGSN for the UE.
The WIFI AP is required to provide a split-horizon function, where there is no local switching on
the AP, and all communication to/from any AP is via WLAN-GW. The WLAN-GW implements
proxy-ARP and forwards all received traffic from the UE into the GTP tunnel. In the future, the
default-GW address to be returned to the UE could be obtained in a PCO from the PGW/GGSN.
The GTP-U processing of data packets is done in the IOM.
APN Resolution
The default WLAN APN is either configured via CLI or obtained from RADIUS in authentication
response. The APN FQDN is constructed and resolved in DNS to obtain a set of GGSN/PGW IP
addresses. The GTP sessions for UEs are load-balanced across the set of these gateways in a
round-robin fashion. The APN FQDN generated for DNS resolution is composed of the NetworkID (NI) portion and the Operator-ID (OI) portion (MCC and MNC) as per 3GPP TS 29.303 and is
formatted as APN-NI.apn.epc.mnc<MNC>.mcc<MCC>.3gppnetwork.org. Only basic DNS
procedure and A-records from DNS server are supported in this release. S-NAPTR procedure is
not yet supported and will be added in a follow-on release. The NI portion or both NI and OI
portions of the APN can be locally configured or supplied via RADIUS in a VSA (Alc-WlanAPN-Name). By default the Operator-ID (OI) portion of the APN is learnt from the IMSI. If the
RADIUS returns both the NI and OI portions in the APN attribute, then it is used as is for the
FQDN construction. A DNS resolution is limited to a maximum of 20 IP addresses in this
Page 1602
Configuration Objects
The Mobile gateway (PGW or GGSN) IP address can be obtained via DNS resolution of the AP or
provided by AAA server in authentication response. Profiles with signaling related configuration
per mobile gateway can be created locally on the WLAN-GW. A map of these profiles (mgwprofiles) keyed on the IP@ of the mobile gateway is configurable per router. The serving network
(<MCC> & <MNC>) that the WLAN-GW belongs to is configurable per system. The
configurable signaling information per mobile gateway includes the type of interface between
WLAN-GW and the mobile gateway (Gn, S2a, or S2b), path management parameters, and
retransmission parameters for signaling messages. The type of signaling interface can also be
explicitly overridden via RADIUS in authentication response. DNS servers and source IP address
to be used for DNS resolutions can be configured in the service the APN corresponds to.
GTP related configuration on WLAN-GW
config>subscriber-mgmt>wlan-gw
serving-network mcc 123 mnc 45
mgw-profile pgw-west-mno1 [create]
description mgw profile for MNO north-east PGW
interface-type s2b
ip-ttl 255
keep-alive interval 60 retry-count 3 timeout 10
message-retransmit timeout 30 retry-count 3
exit
config>router
config>service>vprn
apn internet.mno1.apn
mgw-map
address 33.1.1.1/32 pgw-west-mno1
address 34.1.1.1/32 ggsn-east-mno1
exit
config>service>vprn>dns
primary-dns 130.1.1.1
secondary-dns 131.1.1.1
tertiary-dns 132.1.1.1
ipv4-source-address 170.1.1.1
exit
Page 1603
UE
AAA
WLAN GW
WAP
HLR
PGW/
GGSN
802.1X
Unauthorized State
EAP: Request (ID)
EAP: Response (ID)
RADIUS: Access-Request
(EAP ID, Response, Calling-Station-ID=UE-MAC)
802.1X
Authorized State
Cache Authorized
MAC + NAS-Port
DNS Query to
Find PGW/GGSN
OR Returned by AAA
DHCP Discover
GTPv2 Creates EPS Session Request/GTPv1 Create PDP Context Request (IMSI, APN,...)
Create EPS Session /PDP Context Response (IP Address, DNS, QoS Profile, etc.)
DHCP Offer (IP Address)
DHCP Request/Ack
al_0071
Page 1604
PDG
WLAN-GW
WAP
UE
AAA
PGW/
GGSN
HSS
PGW/
GGSN
802.1X
Unauthorized State
Authentication
EAP: Response
(ID, Challenge)
RADIUS: Access-Request
(EAP ID, Response, Calling-Station-ID=UE-MAC)
RADIUS: Access-Accept
(EAP ID, Success, GGSN/PGW Address)
802.1X
Authorized State
DHCP
Authenticate Request
Authentication Vectors,
UE Profile
SWx
Cache Authorized
MAC + NAS-Port
PCEF Initiated
IP CAN Session
Modification
Procedure
GTP Tunnel
3GPP Old EPS Bearer Release
al_0072
Page 1605
UE
PDG
WLAN-GW
WAP
SGW
MME
AAA
HSS
PGW
PCRF
Attach
Access
Authentication
Access
Authentication Response
Create Session
Req. (IMSI, APN, TEID,
RAT Type, Handover-bit)
Create Session
Resp. (IP@)
Authentication Vectors,
UE Profile
SWx
RADIUS Support
Table 20describes 3GPP attributes and ALU specific attributes related to GTP signaling are
supported.
Table 20: 3GPP Attributes and ALU Specific Attributes
Attribute
Number Type
Value
Alc-Wlan-APN-Name
<146> , String
APN-Name
3GPP-GGSN-Address
IPv4addr
Alc-Mgw-Interface-Type
Gn = 1, S2a = 2, S2b = 3
3GPP-IMSI
Page 1606
Number Type
Value
3GPP-IMEISV
Alc-MsIsdn
<147>, String
MSISDN of the UE
Operational Commands
These commands show state related to mobile gateways and GTP sessions.
show router wlan-gw
mobile-gateway Display mobile gateway information
mgw-map Display the mobile gateway map
mgw-address-cache Display the mobile gateways DNS lookup address cache.
show router wlan-gw mgw-address-cache [apn <apn-string>]
<apn-string>
: [80 chars max]
show router wlan-gw mobile-gateway
[mgw-profile <profile-name>] [local-address <ip-address>] [control <protocol>]
remote-address <ip-address> [udp-port <port>]
remote-address <ip-address> [udp-port <port>] statistics
<profile-name>
: [32 chars max]
<ip-address>
: ipv4-address
- a.b.c.d
<ipv6-address
- x:x:x:x:x:x:x:x
(eight 16-bit pieces)
x:x:x:x:x:x:d.d.d.d
x - [0..FFFF]H
d - [0..255]D
<protocol>
: gtpv1-c|gtpv2-c
Page 1607
<port>
: [1..65535]
Page 1608
<teid>
: [1..4294967295]
Page 1609
Page 1610
Page 1611
Page 1612
(triggered by the portal). The COA message triggers creation of an ESM host with the subscriber
configuration contained in the COA such as subscriber-profile, SLA-profile, NAT-profile and
application-profile. From this point normal ESM based forwarding occurs for the subscriber.
The configuration related to migrant users is shown on page 1615.
Page 1613
an IP address via DHCP with L2-aware NAT on the primary WLAN-GW, it can retain it with L2
aware NAT on the backup WLAN-GW. The NAT outside pool for the subscriber changes on the
backup WLAN-GW based on local configuration. For a subscriber that needs to be anchored on
GGSN/PGW (as indicated via RADIUS access-accept), RADIUS server will return the IP address
of PGW/GGSN where the UE was anchored before the switch-over. GTP tunnel is then signaled
with handover indication set. The PGW/GGSN must return the requested IP address of the UE,
which is the address with which the UE originated data packet that triggered authentication.
The same data-triggered authentication and subscriber creation is also used to support inter
WLAN-GW mobility, such as when a UE moves form one AP to another AP such that the new AP
is anchored on a different WLAN-GW. This is shown in Figure 152.
WLAN-GW 1
Access-Request (<UE-MAC, UE-IP)
AP
L2VPNoGRE
RADIUS
WLAN-GW 2
al_0177
Figure 151: N:1 WLAN-GW Redundancy Based on Data-Triggered Authentication and Subscriber
Creation
WLAN-GW 1
Access-Request (<UE-MAC, UE-IP)
AP
L2oGRE
AP
RADIUS
WLAN-GW 2
al_0178
Figure 152: Inter WLAN-GW Mobility Based on Data-Triggered Authentication and Subscriber Creation
Page 1614
output
The following output displays the configuration for migrant user support and data-triggered
subscriber creation.
#-----------------------------------------------------NAT configuration for migrant and authenticated users
#-----------------------------------------------------service
vprn 300 customer 1 create
nat
inside
l2-aware
address 21.1.1.1/16
exit
exit
outside
pool "migrant_outside_pool" nat-group 1 type wlan-gw-anchor create
address-range 22.22.0.0 22.22.0.255 create
exit
no shutdown
exit
pool "wifi_outside_pool" nat-group 1 type l2-aware create
address-range 22.0.0.0 22.0.0.255 create
exit
no shutdown
exit
exit
exit
exit
nat
nat-policy "migrant_nat_300" create
pool "migrant_outside_pool" router 300
timeouts
tcp-established min 1
exit
exit
nat-policy "wifi_nat_300" create
pool "wifi_outside_pool" router 300
exit
exit
Page 1615
authentication
coa
ip-address 100.100.100.2
secret "ABIQRobhHXzq13ycwqS74FSrj.OdTwh5IdjhRB.yAF." hash2
no shutdown
exit
exit
exit
radius-server-policy "radius_server_policy" create
servers
router "Base"
server 1 name "radius_server"
exit
exit
exit
#-------------------------------------------------echo "Subscriber-mgmt Configuration" - Redirect Policy
#-------------------------------------------------subscriber-mgmt
http-redirect-policy "migrant_redirect" create
url "portal.ipdtest.alcatel-lucent.com:8081/start/?mac=$MAC&url=$URL&ip=$IP"
portal-hold-time 10
forward-entries
dst-ip 8.8.8.1 protocol tcp dst-port 8081
dst-ip 8.8.8.7 protocol tcp dst-port 8007
dst-ip 8.8.8.8 protocol udp dst-port 53
exit
exit
exit
service
#---------------------------------------------------------------echo "migrant user configuration under soft-GRE group interface
#--------------------------------------------------------------vprn 300 customer 1 create
subscriber-interface "ies-4-20.1.1.1" create
address 20.1.1.1/16
group-interface "grp-vprn_ue-2/1/2:51" softgre create
sap-parameters
sub-sla-mgmt
def-sla-profile "slaprof_1"
def-sub-profile "subprof_1"
sub-ident-policy "identprof"
exit
exit
dhcp
proxy-server
emulated-server 20.1.1.1
no shutdown
exit
trusted
lease-populate 32767
user-db "radius_ludb"
no shutdown
exit
Page 1616
Page 1617
IPv6-only Access
IPv6-only Access
In order to accommodate IPv6 only AP/CPEs, IPv6 soft GRE tunnel transport, and IPv6 clientside support for RADIUS-proxy have been added.
+-----------------------------------+
|
|
|
IPv6 Header
|
|
|
+-----------------------------------+
|
|
|
GRE Header
|
|
|
+-----------------------------------+
|
|
|
UE Ethernet Packet
|
|
|
+-----------------------------------+
A single soft-gre endpoint instance on the group-interface can have both IPv4 and IPv6 address
configured as shown in Figure 154, and inter-AP mobility between IPv4 and IPv6 only APs is
supported in this scenario.
Page 1618
service
vprn 300 customer 1 create
group-interface "grp-intf-1" softgre create
soft-gre
gw-address 50.1.1.4
gw-ipv6-address 2032::1:1:7
mobility
hold-time 0
trigger data iapp
exit
egress
shaping per-tunnel
exit
tcp-mss-adjust 1000
vlan-tag-ranges
range start 100 end 100
data-triggered-ue-creation
retail-svc-id 402
exit
exit
router 30
wlan-gw-group 1
no shutdown
exit
exit
exit
exit
The data-path for IPv6 GRE tunneled packets, including load-balancing of tunneled packets
amongst set of ISAs in the WLAN-GW group, and anchoring after tunnel de-capsulation remains
unchanged. Per tunnel traffic shaping is supported similar to IPv4 tunnels. All existing per tunnel
configuration on the group-interface described in previous sections (including mobility, egress
shaping, VLAN ranges, etc.) is supported identically for IPv6 tunnels. Tunnel reassembly for
upstream tunneled traffic is not supported for IPv6 tunnels in this release. TCP mss-adjust is
supported for IPv6 tunnels, and is configurable under soft-gre mode on group-interface. APs must
use globally routable addresses for GRE IPv6 transport. Packets with extension headers are
dropped.
Page 1619
IPv6-only Access
Page 1620