SBC Features and Principles
SBC Features and Principles
Contents
Contents
2 Features and Principles ........................................................................................................ 2-1
Issue 02 (2007-06-30)
Figures
Figures
Figure 2-1 Networking of adopting default route...............................................................................................2-7 Figure 2-2 Networking adopting a VRRP virtual router.....................................................................................2-8 Figure 2-3 Typical networking of SE2000 backup .............................................................................................2-9 Figure 2-4 SE2000 backup state.......................................................................................................................2-10 Figure 2-5 Hierarchical protocol relation between VRRP management group and backup groups ................. 2-11 Figure 2-6 Data channel for transferring VGMP packets .................................................................................2-13 Figure 2-7 Relation between VRRP management group and backup group ....................................................2-14 Figure 2-8 Networking diagram of the SE2000 in master/backup mode .........................................................2-15 Figure 2-9 Data path in master/backup mode...................................................................................................2-16 Figure 2-10 Hierarchical protocol relation between VRRP backup group, VRRP management group and HRP ...........................................................................................................................................................................2-17 Figure 2-11 Register flow.................................................................................................................................2-19 Figure 2-12 Call flow .......................................................................................................................................2-20 Figure 2-13 Media processing flow..................................................................................................................2-21 Figure 2-14 Typical networking application of the SE2000 .............................................................................2-22 Figure 2-15 Communication between the SE2000 and Softx3000...................................................................2-23 Figure 2-16 Typical networking in single domain mode ..................................................................................2-24 Figure 2-17 Typical networking in multi-domain mode...................................................................................2-25 Figure 2-18 IP addresses related to the SE2000 ...............................................................................................2-25 Figure 2-19 Ports related to the SE2000...........................................................................................................2-27 Figure 2-20 Typical signaling stream and media stream of the SE2000 media stream bypass process............2-28 Figure 2-21 Networking diagram of address overlapping ................................................................................2-30 Figure 2-22 Networking model of the UDP tunnel ..........................................................................................2-32 Figure 2-23 UDP tunnel header........................................................................................................................2-33 Figure 2-24 UDP tunnel packet structure .........................................................................................................2-33 Figure 2-25 Schematic diagram of signaling and media stream direction when the SBC function is disabled on the SDD.............................................................................................................................................................2-35
Issue 02 (2007-06-30)
iii
Figures
Figure 2-26 Schematic diagram of signaling and media stream direction when the SBC function is enabled on the SDD.............................................................................................................................................................2-36 Figure 2-27 Networking diagram of SDD hot-system hot backup ...................................................................2-37 Figure 2-28 Networking diagram of signaling and media stream in the C-BGF feature..................................2-38
iv
Issue 02 (2007-06-30)
Tables
Tables
Table 2-1 Device state in master/backup mode ................................................................................................2-15
Issue 02 (2007-06-30)
2
About This Chapter
Section 2.1 Attack Defense 2.2 Dual-System Hot Backup Error! Reference source not found.Error! Reference source not found. 2.3 Full Proxy of NAT 2.4 Address Overlapping 2.5 UDP Tunnel 2.6 Large Capacity 2.7 C-BGF
The following table shows the contents of this chapter. Description This section describes attack defense. This section describes the dual-system hot backup. This section describes dual-homing.
This section describes the full proxy of NAT traversal. This section describes the address overlapping. This section describes the UDP tunnel. This section describes the large capacity. This section describes the C-BGF.
Issue 02 (2007-06-30)
2-1
DoS Attack
The Denial of Service (DoS) attack attacks a system by sending a large number of data packets. As a result, the system cannot receive requests from valid users or the host is suspended and cannot work normally. The DoS attacks include: SYN Flood Fraggle ICMP UDP Flood The DoS attack differs from other types of attacks. In the DoS attack, attackers prevent valid users from accessing resources or routers. In other types of attacks, attackers search for ingresses of internal networks.
2-2
Issue 02 (2007-06-30)
Fraggle Attack
The Fraggle attack is similar to the Smurf attack, but the Fraggle attack attacks a network by sending a UDP packet instead of an ICMP packet. After receiving the UDP packets, both the UDP port 7 (ECHO) and 19 (Chargen) respond to the packets. The port 7 responds with the packet which is the same as the received packet, while the port 19 generates a character string. Thus, a large number of response packets are generated and returned to the source host and as a result, the source host crashes. The attacker sends UDP packets to the subnet broadcast address. The source addresses of these UDP packets are the IP addresses of the attacked host or network. Port numbers of hosts in the subnet are 7 or 19. The Fraggle attack causes each system to respond to the attacked host and then a large number of packets are sent; as a result, the network is congested or the attacked host crashes. If the Fraggle attack is disabled in the subnet, the system generates an ICMP unreachable message that continues to occupy the bandwidth. If the source port of the attacked host is "Chargen" and the port of the target host in the subnet is "ECHO", response packets are generated continuously. The Fraggle attack, thus, becomes more harmful to the attacked host.
Land Attack
The Land attack configures both the source address and the destination address of a TCP SYN packet as the IP address of the attack target. Thus, the target sends the SYN-ACK message and sends back the ACK message to the target itself, forming a null connection. All the null connections exist until timeout. Different targets have different responses to the Land attack. For instance, many UNIX hosts will crash while the Windows NT hosts slow down.
Issue 02 (2007-06-30)
2-3
WinNuke Attack
The WinNuke attack causes a NetBIOS fragment overlap by sending an Out-Of-Band (OOB) data packet to the NetBIOS port (139) of the specific target that is installed with the Windows system. The WinNuke attack causes the target host status to be Down. Besides, an IGMP fragment packet can also cause the target host to be Down. This is because the IGMP packet cannot be fragmented and few systems can resist the attack caused by an IGMP fragment packet. If a host receives an IGMP fragment packet, it means that the host is under a WinNuke attack.
IP Spoofing Attack
To get an access authority, an intruder generates a packet with a fake source address. This fake source address allows an unauthorized client to access the system by applying the IP authentication even in the root authority. This may destroy the system even though the response packet does not reach the system. This is known as the IP Spoofing attack.
2-4
Issue 02 (2007-06-30)
Route-Record records the routers through which the packets pass before arriving at the destination. Source-Route shows a route that goes across the Internet specified by the source host. Timestamp records the time and the date when the router processes data. They, however, may be used to probe the architecture of the Intranet viciously.
Teardrop Attack
The More Fragment (MF) bit, Offset field and Length field in an IP packet show which segment of the original packet is contained in this fragment. Some systems running TCP/IP crash when they receive a bogus segment containing an overlap offset. The Teardrop attack makes use of the flaw of some systems that do not find the validity of fragment information to attack the system.
Smurf Attack
The simple Smurf attack attacks a network by sending an ICMP request to the broadcast address of the target network. All the hosts in the network respond to the request and thus the network is congested. The advanced Smurf attack attacks the target host by setting the source address of the ICMP request packet as the address of the target host to crash the host finally. The attack takes effect when so many attack packets are sent out over a long period that the network is congested. Theoretically, the more hosts are in the network, the more obvious the effect is. Another new form of the Smurf attack is Fraggle attack.
Issue 02 (2007-06-30)
2-5
Traffic that passes the SE2000 When the CPU utilization of the SE2000 exceeds the upper limit, an alarm about abnormal CPU utilization is raised. When the CPU utilization restores its normal state, an alarm about normal CPU utilization is raised. When the traffic that passes the SE2000 exceeds the upper limit, an alarm about abnormal traffic is raised. When the traffic reduces to less than the value of "the threshold x the security coefficient", an alarm about normal traffic is raised.
2-6
Issue 02 (2007-06-30)
In default route mode, there is only one router at the egress of the internal network. When the Router A fails, all hosts (whose default next hop is Router A) on the internal network will fail to communicate with external networks. Therefore, communication is unreliable in the default route mode.
Issue 02 (2007-06-30)
2-7
Internet
Routers A, B and C make up of a backup group (act as a virtual router), whose virtual IP address is 10.100.10.1. Router A is the Master with the IP address 10.100.10.2. Routers B and C are Backups with addresses 10.100.10.3 and 10.100.10.4 respectively. In VRRP only Master device can forward the packet that takes virtual IP address as the next hop. All hosts on the internal network just know the virtual IP address 10.100.10.1, instead of the IP address of the Master or Backup. Therefore, each host configures its default route as the virtual IP address. All hosts on the internal network thus can communicate with external networks through this backup group. The VRRP module on the master router monitors the state of communication interface and sends notification packets to the backup routers in multicast mode. When the master router fails (such as interface or link faults), the VRRP notification packets would not be sent as usual. When the backup routers do not receive any VRRP notification packet in a specific interval, the backup router with the highest priority will change its state from the VRRP state to the master state, based on the VRRP protocol. In this way, the services running on the previous master router will continue to run on the new master router. As a result, the VRRP enables communication to be uninterrupted, and ensures reliability.
2-8
Issue 02 (2007-06-30)
One side of the SE2000 is connected with enterprise networks or Customer Premises Network (CPN), and the other side is connected with NGN network. The route redundancy backup is fulfilled by two SE2000s. One acts as the master device, while the other acts as the backup device. Interfaces on the master device and the backup device are connected with networks separately.
Enterprise network 1
SE2000-A Master
SoftX3000
10.100.10.0/24
NGN network
Backup group 3 Virtual IP Address 202.38.10.1
Enterprise network 2
Backup
Backup group 2 SE2000-B Virtual IP Address 10.110.20.1
10.100.20.0/24
SE2000 A is the master device and SE2000 B is the backup device. Interfaces connected with enterprise network 1 on the master and backup devices compose backup group 1. Its virtual IP address is 10.100.10.1. Interfaces connected with enterprise network 2 on the master and the backup device compose backup group 2. Its virtual IP address is 10.100.20.1. Interfaces connected with the NGN on the master and backup devices compose backup group 3. Its virtual IP address is 202.38.10.1.
Issue 02 (2007-06-30)
2-9
(2)
SoftX3000
(3)
NGN network
(5)
(4)
Other terminal
If an audio or video terminal in enterprise network 1 accesses one terminal in another enterprise network or CPN, a packet is sent along the path (1)-(2)-(3)-(4) as shown in Figure 2-4. When the signaling flow or media stream passes SE2000 A, a dynamic session entry is generated. When the signaling flow or media stream returns from terminals in other enterprise networks along the path (5)-(6)-(7)-(8), it can match with the session entry and successfully reach the host. In this case, VRRP state of both the SE2000 is consistent. If the session entries on SE2000 A differ from those on SE2000 B, the returned signaling flow or media stream might be sent along the path (5)-(9). In this case, it may not match session entries on SE2000 B and hence is discarded. As a result, the communication is interrupted. In other words, if the VRRP state is consistent, the state of interfaces connected with various networks on the SE2000 is identical, that is, all the interfaces are either in master state or in backup state. In addition, one side of the SE2000 is connected with enterprise networks and the other side is connected with the NGN network. Interfaces on the SE2000 connected with each network make up of a backup group. Based on the traditional VRRP mechanism, VRRP in each backup group works in an independent state. Therefore, the state of VRRP on each interface on the same SE2000 cannot keep consistent. That is, the traditional VRRP cannot achieve a state that is consistent with the SE2000.
2-10
Issue 02 (2007-06-30)
Hierarchical Protocol Relation Between VRRP Management Groups and Backup Groups
The hierarchical protocol relation between VRRP management groups and backup groups is shown in Figure 2-5. Figure 2-5 Hierarchical protocol relation between VRRP management group and backup groups
VRRP management group VGMP packet VRRP backup group Traditional VRRP packet Interface
A VRRP management group functions as a logical layer over VRRP backup groups. The VRRP management group exchanges information between each other through VGMP packets. VRRP backup groups interact with interfaces through traditional VRRP packets. VRRP backup groups report their own states to the VRRP management group. The VRRP backup groups are managed by the VRRP management group. When there is an error on a certain interface or link in a certain backup group, the backup group state changes. As a result, the state of VRRP management group changes. In addition, some VRRP backup groups can run without need of being added into VRRP management group. The master state of these backup groups that are not joined might be inconsistent with that in the management group. To prevent this, you must configure higher priorities for backup groups in VRRP management group.
Issue 02 (2007-06-30)
2-11
After VRRP group management is enabled, each backup group needs to notify the change of state to its VRRP management group. If the VRRP management group rejects to switch between the master or backup VRRP state, states of the SE2000s in this backup group cannot change. In the traditional VRRP, the VRRP cannot remain independent. In the VRRP management group, state consistency management makes it possible. The VRRP management group determines whether to switch master or backup state of each device in it so that the state of each VRRP backup group can be consistent. Besides sending notification packets to the Backup based on the traditional VRRP mechanism, the Master can also send Hello messages to the Backup. Then the Backup sends back the notification packets after receiving Hello messages. In this way, the Master and Backup can perform state communication between each other. Preemption management When a backup group is added into a VRRP management group and the VRRP management group has been enabled, preempt behavior is determined by the VRRP management group instead of the preemption configured on SE2000. In other words, whether a SE2000 performs preemption depends on the VRRP management group even though its priority is higher than that of the current Master. When communication between VRRP backup groups is interrupted, but the VGMP can still normally communicate, the state consistency can still be assured. In this case, no state switch occurs. When the Master and the Backup fail to communicate between each other, no VGMP packet can be transmitted. That is, all data channels are interrupted. In this case, the Backup will automatically switch to the master state. Therefore, two master devices are available on the network when the network communication recovers and they send notification packets to each other. In this case, the VRRP management group determines the master based on the priority. For instance, if the priority of the original Master is lower, the VRRP management group designates the original Backup the new Master. Channel management Channel management can provide reliable channels to transfer:
A VRRP management group includes many data channels. You can configure them along with traffic flow channels on a physical link or configure a single traffic flow on a physical link. Moreover, you can configure whether the data channel state will affect the state of each VRRP in the VRRP management group. Figure 2-6 shows the relation between service channels and data channels.
2-12
Issue 02 (2007-06-30)
A2
A4 A4-H-B4
-B
SoftX3000
3
NGN network
Hub
Enterprise network 2
B1
A 2S-B 2
B4
B2
Interfaces connected with each network on the Master can act as starting points of the data channels and ending points are on the Backup. Data channels thus traverse switches in LAN between start point and end point. In Figure 2-6, A and B stand for interfaces, S refers to LAN Switch, and A1-S-B1, A2-S-B2 and A3-S-B3 are data channels. As far as the link bandwidth is concerned, you can directly connect the Master with the Backup (multiple lines are allowed) in certain cases, to prevent VRRP state information from disturbing the traffic flow transmission. As a result, you can set up a data channel named A4-H-B4 between the Master and the Backup. H refers to hub.
Issue 02 (2007-06-30)
2-13
Figure 2-7 Relation between VRRP management group and backup group
Backup group 1
SE2000-A Master A1 A3
Management group 1
Enterprise network 1
SoftX3000
A2
NGN network
Enterprise network 2
B1 B2
Backup group 2
Backup group 3
B3 Backup SE2000-B
In the redundancy backup mechanism of the SE2000, the relation between interfaces, backup group and management group is described as below: Relation between interfaces on two SE2000 Connections between interfaces and networks on two SE2000 must be identical, including:
For example, interface A1 on SE2000 A must be identical with interface B1 on SE2000 B. Both should be Ethernet interfaces, both should be numbered as 1/0/0 and both should belong to backup group1, and so on. Relation between VRRP backup groups on two SE2000 Backup group numbers as well as the components on two SE2000 must be completely the same. For instance, interface A1 on SE2000 A should belong to backup group1. Interface A2 on SE2000 A should belong to backup group2. Interface A3 on SE2000 A should belong to backup group3. Similarly, interfaces B1, B2 and B3 on SE2000 B should belong to backup groups 1, 2 and 3 respectively. Relation between VRRP management groups on two SE2000s Management group number as well as components on two SE2000s must be completely the same. For instance, SE2000 A should include management groups 1, 2 and 3. SE2000 B should also include management groups 1, 2 and 3. Relation between interfaces, backup groups and management groups on a SE2000 On an SE2000 (such as SE2000 A), a physical interface can associate with multiple VRRP backup groups. A backup group can associate with multiple physical interfaces
2-14
Issue 02 (2007-06-30)
and multiple virtual IP addresses. A VRRP management group can contain multiple backup groups but the same backup group cannot belong to different VRRP management groups.
Backup group 1
A3 SoftX3000
A2
NGN network
Enterprise network 2
B1 B2
Backup group 2
Backup group 3
B3 Backup SE2000-B
Actual connection Traffic
VRRP management group 1 on SE2000 A contains backup groups 1, 2 and 3 with level 1 priority. VRRP management group 1 on SE2000 B also contains backup groups 1, 2 and 3 but with level 2 priority. Since level 1 priority is higher than level 2 priority, SE2000 A behaves as the Master and SE2000 B behaves as the Backup. Table 2-1 Device state in master/backup mode SE2300 Management group1 Component A B Backup groups 1, 2 and 3 Backup groups 1, 2 and 3 Priority Level 1 Level 2 State Master Backup Session volume Whole 0
Issue 02 (2007-06-30)
2-15
Hosts send service data to interfaces A1, A2 and A3 on SE2000 A (Master). All sessions are transferred through SE2000 A while SE2000 B (Backup) does not transfer any data. When the Master or its links fails, its state will change. The Backup will become the Master and transfer all the session data.
2.2.6 HRP
HRP Application
The SE2000 maintains the state information on a session entry for audio or video session connection, as shown in Figure 2-9. Figure 2-9 Data path in master/backup mode
(1) (8) IAD Enterprise network 1 (7) (6) (3) NGN network SE2000-A Master
(2)
Session entries
SoftX3000
(4)
Other terminal
In master/backup mode, if SE2000 A is the Master, it takes up all the data transmission task and many dynamic session entries are set up on it. SE2000 B is the Backup device and no data passes through it. When errors occur on SE2000 A or on the associated links, SE2000 B becomes the Master and begins to transfer data. If there is no backup session entry, user registration information and configuration command on SE2000 B before the state switch, all the sessions that have passed through SE2000 A are disconnected as a result of mismatch. Services then are interrupted. To enable the Backup to smoothly take over traffic from the Master when the Master breaks down, backup configuration commands and session entries, user registration information between the Master and the Backup are necessary. Huawei Redundancy Protocol (HRP) is developed to address this issue. HRP is transmitted over VGMP packets on data channels in VRRP management group.
Master/Backup
SE2000s are grouped into Masters and Backups. The device that sends configuration backup contents is the Master. The device that receives configuration backup contents is the Backup. Only the SE2000 with the master state in the VRRP management group can become a Master.
2-16
Issue 02 (2007-06-30)
To ensure the stability of the Master, the Master remains fixed unless it fails or quits the VRRP backup group.
2.2.7 Hierarchy Relation Between VRRP Backup Group, VRRP Management Group and HRP
The hierarchical protocol relation between VRRP backup group, VRRP management group and HRP is shown in Figure 2-10. Figure 2-10 Hierarchical protocol relation between VRRP backup group, VRRP management group and HRP
HRP module
HRP packet
When the status of the VRRP management group changes, the system notifies the HRP and the Master or the Backup of the change in states. In this way, configuration commands, user registration information and session state information between two SE2000s can be backed up in time. The HRP state affects the VRRP management group state. In other words, VRRP adjusts its priorities and the change in VRRP state based on the result of HRP state switch. When the state of the VRRP backup group changes, the VRRP management group determines whether to change its own state and then determines the states of HRP and the Master or the Backup.
Issue 02 (2007-06-30)
2-17
Media Proxy
A media proxy device is essentially the proxy of Real-time Transport Protocol (RTP) or RTP Control Protocol (RTCP) multimedia stream. All the voice/video terminals in a private network or a CPN converge on a media proxy. This media proxy is used to forward the media stream to the called voice/video terminal. The media proxy performs policy management and control over the media stream. The media proxy, thus, solves the problem of the NAT traversal and QoS assurance.
2-18
Issue 02 (2007-06-30)
Register Flow
Figure 2-11 shows the deployment of the SE2000 at the convergence layer in MANs. The serial numbers register request and register response flows are shown in opposite directions. Figure 2-11 Register flow
SoftX3000 SoftX3000
NAT/Firewall
NAT/Firewall
Enterprise network 2
Calling side
Called side
1.
A calling user or a called user sends a register request (the source address in the packet header and the address in the payload are the private network address or the port of the terminal). Receiving the register request, the NAT device assigns a public network address or port, translates the source address in the register packet header. The NAT device then forwards the packet to the SE2000. Receiving the register packet, the SE2000 assigns a public network signaling address or port. The SE2000 then translates the addresses both in the packet header and the payload, records the mapping relationship of the addresses. After recording the mapping, the SE2000 initiates a register request to the SoftX3000. The SoftX3000 identifies the user and sends the response packet to the SE2000 if the ID authentication succeeds. After receiving the response packet, the SE2000 modifies the addresses in the packet header and the payload based on the address mapping and then forwards the response packet to the user side. After receiving the response packet, the NAT or firewall device translates the destination address in the packet and forwards the packet to the end user. Thereby, the register flow is complete.
2.
3.
4. 5.
6.
Issue 02 (2007-06-30)
2-19
7.
The SE2000 sends UDP packets to the NAT or firewall device regularly to refresh the NAT entries. In this way, it can maintain the validity of address translation on the NAT or firewall.
Call Flow
Figure 2-12 shows the deployment of the SE2000 at the convergence layer in MANs. The serial numbers call request and call response flows are shown in opposite directions. Figure 2-12 Call flow
SoftX3000 4 3 SE2000 2 IP backbone network 5 SE2000 SoftX3000
1.
A calling user initiates a call. The source address in the packet header, the address in the payload and media receiving address are all private network addresses or ports of the terminal. After receiving the call request from the calling user, the NAT or firewall device on the calling side assigns a public network address or port. The NAT or firewall, then translates the source address in the packet header, and forwards the packet to the SE2000. After receiving the call request packet, the SE2000 on the calling side assigns media receiving address or port and signaling address or port on the extranet for the call. The SE2000 then records the address mapping relationship and forwards the packet to the SoftX3000 after translating the addresses both in the packet header and the payload. After receiving the call request, the SoftX3000 forwards the packet to the SE2000 on the called side. The SE2000 on the called side assigns media receiving address or port and signaling address or port on the intranet for the call and records the address mapping. The SE2000 then forwards the packet after translating the addresses in the packet header and the payload to the NAT device connected with the callee. The NAT or firewall device translates the address in the packet header based on the address mapping and forwards the packet to the called end user. The called terminal sends out the call progress response (it sets its private network address or port as the receiving address for the called media stream). After receiving the response packet through the NAT or firewall, the SE2000 on the called side assigns media receiving address or port on the extranet for the session. It then translates the
2.
3.
4. 5.
6. 7.
2-20
Issue 02 (2007-06-30)
addresses in the packet header and the payload, and forwards the packet to the SoftX3000. 8. The SoftX3000 forwards the packet to the SE2000 on the calling side. After receiving it, the SE2000 assigns media receiving address or port on the intranet for the session. It then translates the addresses in the packet header and the payload, and then forwards the packet to the calling terminal. The called terminal sends out the call success response with similar flow to the call progress response (ACK response from the calling terminal is also omitted here for the same reason).
9.
10. After the call succeeds, media stream begins to interact between the calling and called terminals. Before the interaction begins, the SE2000 media proxy is complete. For details, see Media Processing Flow. 11. After the session is finished, the calling or called side initiates a call termination request. The other side responds to the request through the SE2000. With this, the entire call flow ends.
SE2000
IP backbone network
SE2000
Calling side
Called side
The SE2000 has sensed the related description about media stream through the processing of the call signaling processing and generates the description on control policy for the media stream (such as RTP address or port translation, bandwidth and flow direction) before transmitting the RTP packet. The SE2000 performs the following functions for the received RTP stream based on the media stream control policy: Security check QoS assurance NAT processing
Issue 02 (2007-06-30)
2-21
It learns the source address after NAT, translates media destination address, and then forwards the media stream.
There is no user register flow in the SE2000 networking because it does not directly interact with users. Other flows are similar to the above description.
IP backbone network
SE2000
Connecting with the NAT device and the egress router, the SE2000 is transparently added into the original network without need of modifying the network topology. The SE2000 provides the signaling proxy and the media proxy in this NGN application. When the SE2000 is deployed between a terminal device and the SoftX switch, the proxy of the SE2000 is the same regardless of the kind of signaling, such as SIP, MGCP, iDo, U-Path, H.323 or H.248, is processed. The following section introduces the communication process when the SE2000 provides SIP/MGCP/H.323 signaling proxy, as shown in Figure 2-15.
2-22
Issue 02 (2007-06-30)
OpenEye
SIP/MGCP/ H.323
SIP/MGCP/ H.323
RTP
RTP
RTP
Signaling Proxy
The SE2000 can be regarded as a Softx3000 system for NGN users because all the register and call messages are first sent to the SE2000. The messages are forwarded to the Softx3000 system (such as the SoftX3000 of Huawei) after signaling processing through the SE2000. The SE2000 can also be regarded as a client of the Softx3000 system because the Softx3000 system first sends the response message to the SE2000. The SE2000 then forwards the message to the end user after signaling processing. The SE2000 can obtain information such as session address change and bandwidth requirements by analyzing and processing the signaling. Based on the session status, it determines whether to allow the media stream to pass through. Thus, it can protect the network and prevent bandwidth embezzlement.
Media Proxy
All the media streams between intranets and extranets are processed and forwarded through the SE2000. The SE2000 first checks the validity of a packet, and then defines a media stream forwarding policy (such as the firewall, QoS and NAT policy) based on the result of signaling processing. Regardless of the networking scheme that is applied, the SE2000 can correctly forward the media stream with the QoS assurance and security control by specifying the destination address and port for the RTP stream of intranet or extranet users.
The common data stream, such as the one related to the intranet PC in Figure 2-14, is directly forwarded through the NAT device to the router. This data stream need not pass through the SE2000.
The SE2000 processes and forwards all the call packets and media streams in the specific direction. It translates the addresses between different networks by re-specifying the destination address and port for the RTP stream of intranet or extranet users. In this way, the NAT traversal is carried out.
Issue 02 (2007-06-30)
2-23
Different from NAT Application Level Gateway (ALG), the SE2000 applies full proxy mode to directionally transmit the media stream instead of translating the IP address in the media stream. Thus, it ensures the system performance and transmission speed of the device.
In the single domain mode, you can access the Internet only by connecting the terminal telephones or the IAD devices of video terminals to the SE2000.
Multi-Domain Mode
When the SE2000 on the internal network side is connected with a NAT device or with a NAT device and an IAD simultaneously, it works in the multi-domain mode. The multi-domain mode can be used in the enterprise after translation. Figure 2-17 shows the typical networking in multi-domain mode.
2-24
Issue 02 (2007-06-30)
In the multi-domain mode, the SE2000 should connect with both the NAT device and the egress router. It sends a UDP packet to the NAT device regularly to refresh the NAT entries. Thus, it maintains the address translation relationship.
ClientAddress
The SE2000 connects with the Client (such as NAT or IAD device) through an interface and the address of this interface is called ClientAddress. One or more such interfaces can exist on a SE2000. Signaling and media stream can have different client addresses.
Issue 02 (2007-06-30)
2-25
ServerAddress
The SE2000 connects with the SoftX switch through an interface and the address of this interface is known as ServerAddress. One or more such interfaces can exist. Signaling and media stream can have different server addresses.
SoftXAddress
SoftXAddress is the IP address of the SoftX switch connected with the SE2000. The SE2000 can provide proxy services for multiple Softx3000s.
The Client interface and the Server interface of the SE2000 can be identical or different. If the same physical interface is used, multiple logical sub-interfaces should be configured on this interface. Some of the logical sub-interfaces are used as the Client interfaces while the others are used as the Server interfaces. The ClientAddress and the ServerAddress, therefore, have separate IP addresses even though both use the same physical interface. For the same ClientAddress, it is recommended to set the same ServerAddress for signaling address map and media stream address map.
The SE2000 Client interface receives the register and call messages, which are sent to the SoftX switch through the SE2000 Server interface after signaling processing. The SE2000 Client interface also receives the client RTP media streams, which are sent to the called SE2000 or terminal through the SE2000 Server interface after packet processing. In this way, ClientAddress, ServerAddress and SoftXAddress form the basic interaction path between the user and the NGN system.
2-26
Issue 02 (2007-06-30)
PC
SoftX3000
The SE2000 receives the register and call messages through the Client well-known port. After the signaling processing and selecting a dynamic port of some signaling protocol, it sends the messages to the well-known port of the SoftX switch through the Server dynamic port. Similarly, the SE2000 receives the RTP media stream through the Client well-known port. After the packet processing and selecting a dynamic port of some media stream, the SE2000 sends the media stream to the called SE2000 or terminal through the SE2000 dynamic port.
Issue 02 (2007-06-30)
2-27
port on the SE2000, ServerAddress, dynamic port on the SE2000, SoftXAddress and well-known port on the Softswitch.
Configure the IP address of the call entity on the IAD as the ClientAddress of the SE2000. For the related IAD configuration, refer to "Typical Example for Configuring Signaling Proxy and Media Proxy" in this chapter.
IP network SE2000
IP network Server
2-28
Issue 02 (2007-06-30)
Issue 02 (2007-06-30)
2-29
Management VPN
Service VPN
PE
Lanswitch
VPN 1
192.168.216.2/16 192.168.216.1/16
2-30
Issue 02 (2007-06-30)
it does not know the VPNs to which the Softx3000 or IADMS server belong. In this case, you should know the VLAN IDs allocated by the PE to the Softx3000 or IADMS server, and then configure the VLAN IDs on the SE2000. Thus the SE2000 tags the VLAN IDs on the register packets sent to the Softx3000 and then forwards the packets to the PE. The PE forwards the packets to the corresponding VPN according to the VLAN IDs. When the SE2000 receives the packets from the Softx3000, the processing flow is similar.
Issue 02 (2007-06-30)
2-31
Terminal (SIP)
SE2000-2 UDP Tunnel Server SE2000-1 UDP Tunnel Client UDP tunnel
2-32
Issue 02 (2007-06-30)
The UDP tunnel packet is generated through inserting a UDP tunnel header between the IP header and TCP/UDP header. After passing through the firewall or the NAT device, the UDP tunnel packet header is changed. The structure of the UDP tunnel packet is shown in Figure 2-24. On receiving a packet, the UDP tunnel server checks whether the packet is a UDP tunnel packet. If so, the UDP tunnel server removes the UDP tunnel header and then sends the packet to the Softx3000. Figure 2-24 UDP tunnel packet structure
Eth header IP header UDP tunnel Original TCP/UDP header (12 bytes) header Data
On receiving a packet returned from the Softx3000, the UDP tunnel server checks whether the packet is a UDP tunnel packet. If so, the UDP tunnel server inserts a UDP tunnel header after the IP header. Thus, a UDP tunnel packet is generated. On receiving a packet returned from the NAT device, the UDP tunnel client checks whether the packet is a UDP tunnel packet. If so, the UDP tunnel client removes the UDP tunnel header and then sends the packet to the terminal.
Issue 02 (2007-06-30)
2-33
2-34
Issue 02 (2007-06-30)
Figure 2-25 Schematic diagram of signaling and media stream direction when the SBC function is disabled on the SDD
IADMS
Softx3000 SE2000-1
Lanswitch2
Lanswitch1
Issue 02 (2007-06-30)
2-35
Figure 2-26 Schematic diagram of signaling and media stream direction when the SBC function is enabled on the SDD
IADMS
Lanswitch2
Lanswitch1
NAT SE2000-2
User network UE UE
2-36
Issue 02 (2007-06-30)
IADMS
SE2000-1 SDD-1
Softx3000
Lan switch1
User network UE UE
2.7 C-BGF
2.7.1 Overview of C-BGF
The SE2300 supports the C-BGF feature; the SE2200 does not support this feature.
In IMS network, the SE2300 serves as the Core Border Gateway (C-BGF). The SE2300 forwards the SIP signaling packets after NAT to the Proxy-Call Session Control Function (P-CSCF). In this way, SIP signaling implements NAT through the SE2300. The SE2300 interacts with the P-CSCF through the SBCI interface to apply for, modify or release the media resources. Media proxy is thus implemented. The SE2300 interacts with the Session Policy Decision Function (SPDF) through the Ia interface to apply for, modify or release resource reservation, as well as release resources in exceptional cases. QoS control of fixed network terminal access is thus implemented. The SPDF issues QoS orders to the SE2300 and the SE2300 enforces the task. In IMS network, the SE2300 supports precise detect of no media stream. The SE2300 sets the aging time for the RTP session of each user. After both call parties are disconnected, the SE2300 can precisely detect that no media stream passes through. If no media stream passes through within the aging time of the RTP session defined by the SE2300, the SE2300 actively reports the exceptional information about media streams to the P-CSCF through sending the Common Open Policy Service (COPS) message so that the P-CSCF deletes the session related to signaling in time.
Issue 02 (2007-06-30)
2-37
In IMS network, the SE2300 implements COPS master/backup link switchover, real-time backup and batch backup of media proxy and session through dual-system hot backup of the COPS service. When the master SE2300 fails, the backup SE2300 takes over services. Thus, services are not interrupted, and the demand for reliability of the carrier-level device is met.
P-CSCF
SPDF
SE2300
UE-1
UE-2
2-38
Issue 02 (2007-06-30)
The SE2300 returns the register address of the terminal in the response message to the P-CSCF. After the terminal registers successfully, the P-CSCF delivers the signaling NAT mapping update message to request the SE2300 to update the aging time of the NAT entry as the reregister time of the terminal. When the terminal deregisters, the P-CSCF delivers the signaling NAT mapping deletion message to the SE2300. The SE2300 then deletes the signaling NAT entry and the Hello entry.
Media Proxy
In IMS network, the SE2300 interacts with the P-CSCF through the SBCI interface and the COPS protocol to create, update, query and release the media mapping. Media proxy is thus implemented. When the user initiates the call request, the P-CSCF delivers the message in request for creating the media mapping to the SE2300. The request message contains the media address and port number of the terminal. After allocating the media address and port number on the access device side ( the media client side of the BGF mapping group) and on the network side (the media server side of the BGF mapping group), the SE2300 notifies the P-CSCF and then the P-CSCF changes the SDP information in the SIP message to the port on the SE2300. When the P-CSCF obtains the media address and port number of the peer, it delivers the request message for updating the media stream to the SE2300. The request message contains the media address and port number of the terminal and the media address and port number of the peer. The SE2300 then updates the media mapping information and creates the temporary session table RTP. When the RTP packets are sent from the terminal to the SE2300, the SE2300 learns the entire session after matching the temporary session entry of RTP based on the destination address, port number and protocol type. Then the SE2300 forwards media streams according to the source address, the source port number, the destination address, the destination port number and the protocol number. During the call, the SE2300 checks whether the session entry exists regularly; the P-CSCF delivers the message in request for querying the media mapping regularly. If the session entry of the SE2300 ages, the aged media mapping information is contained in the response message. When the call ends, the P-CSCF delivers the message for deleting the media mapping to the SE2300. The SE2300 then deletes the media mapping information and the session entry.
Issue 02 (2007-06-30)
2-39
Through the Ia interface and running the COPS protocol, the SE2300 sends the policy installation success or failure message. If the QoS policy is installed successfully and the status of the gate control is "open", the SE2300 delivers the bandwidth reservation value and updates the QoS resource status table. If the QoS policy is installed unsuccessfully, the SE2300 does not reserve the bandwidth. At the request of QoS control, the SE2300 modifies the reserved resources: Adds media streams. Modifies the bandwidth of some media streams. Modifies the status of media streams. Modifies IP quintuple, that is, the source address the source port number, the destination address, the destination port number and the protocol number. During an offer and answer process, if the current resources in the access network are inadequate, the SE2300 fails to modify the resources, such as increase the bandwidth of media streams or add new media streams. As a result, the SE2300 is still in resource reservation state instead of releasing the reserved resources. When receiving the gate control message from the SPDF, the SE2300 configures the session status to invalid, if the gate control status is "close". The SE2300 configures the session status to valid, if the gate control status is "open"; in this case, the gate control is enabled and media streams can be forwarded. When receiving the message from the SPDF in request for deleting services, the SE2300 sends the QoS policy installation success or failure message to the SPDF. If the QoS policy is installed successfully, the SE2300 releases QoS resources and updates the QoS resource status table; if not, the SE2300 does not release QoS resources.
Exception Processing
If the SPDF fails, the SE2300 releases media resources and the P-CSCF releases all signaling resources. All CCB and session entries are deleted and the resource status table is updated. If the P-CSCF fails, the SPDF requests the SE2300 to release resources. Meanwhile, CCB and session entries are deleted and the resource status table is updated.
2-40
Issue 02 (2007-06-30)
If the SE2300 fails and thereby all media streams passing through it are interrupted, the SE2300 sends the service deletion message to the SPDF. Thus, the supported services on the SE2300 are the same as those on the SPDF. The SPDF informs the P-CSCF of releasing the calls related to signaling. Meanwhile, CCB and session entries are deleted and the resource status table is updated.
Issue 02 (2007-06-30)
2-41