WDM OTN L1 Service Encryption Feature Guide 07
WDM OTN L1 Service Encryption Feature Guide 07
Feature Guide
Issue 7.0
Date 2020-09-20
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees
or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: https://www.huawei.com
Email: [email protected]
On a WDM OTN network, the hard pipe encryption solution based on the AES-256
encryption algorithm is used to encrypt L1 services, achieving low bandwidth
usage, low latency, and high reliability of services.
This document describes the L1 service encryption function of Huawei WDM OTN
equipment, including the function application, technical principles, network
application suggestions, operation guide, and equipment support capability.
Related Versions
The following table lists the product initial versions to which this document can be
applied.
For details about the specifications of this feature supported by each product
version, see 7.1 Availability or 7.3 Feature Updates.
Intended Audience
This document is intended for:
● Network administrators
● Maintenance engineers
● Onsite maintenance engineers
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
GUI Conventions
Convention Description
Update History
Updates between document issues are cumulative. Therefore, the latest document
issue contains all updates made in previous issues.
Contents
1 L1 Service Encryption
Table 1-1 Comparison between the traditional encryption solution and L1 service
encryption solution
Traditional Encryption
Encryption 4 4 3 2 1
layer
For the dynamic service application scenarios, dynamic multicast services can be
created. A dynamic multicast service contains all involved encryption ports,
forming a port group. When the actual service changes, ports in the port group
are selected as the source and sink ends to achieve the dynamic change of multi-
source and multi-sink configurations with the service.
The WDM OTN devices of Huawei support port-level service encryption as well as
various services and rates. The AES-256 algorithm is used to encrypt the OPUk
payload.
Item Specification
Typical service type SDH/SONET, Ethernet, OTN, SAN, and video services
Item Specification
Minimum encryption Board port level. Users can be allocated by port and
unit port-specific encryption can be configured. In this
way, service applications are more flexible.
NOTE
The specifications vary depending on different products. For details, see 7.2 Specifications.
As shown in Figure 4-1, client-side signals are mapped to the payload area in an
OPUk frame, and then OPUk overheads are added to form a lower-order ODUk
frame. Then, multiple ODUk frames are multiplexed into a higher-order ODUj (j =
k + 1 or higher) frame, and then OTU overheads are added to form the final
signal transmitted over an optical fiber.
Figure 4-2 shows the block diagram of an encryption system. Table 4-1 describes
the functions of each system component.
Isolation Capability
Before configuring service encryption, you must complete the following tasks on
the network management system (for example, NCE):
● Create a service. The service to be encrypted must have been created on the
NCE.
● Authorize an encryption administrator account. You must create an encryption
administrator account for each user, allocate encryption port resources, and
inform each user of the account, password, and device IP address.
Users use the SMT to issue encryption management commands. The SMT uses the
SSL/TLSv1.2 protocol to access the SMS on the NE.
Privacy Protection
On the security management tool, a user can set the Encryption Management Key
(EMK) after the NE login using the account and password. Encryption
management key (EMK) is a character string consisting of 8 to 32 bytes. After the
Authentication
Whether the peer end is a legitimate device can be determined based on the
comparison of the calculated values at the source end and sink end.
As shown in Figure 4-5, the source end and sink end use the SHA-256 digest
algorithm to calculate the Message Authentication Code (MAC) value based on
input parameters. If the input parameters are the same and the calculated values
are the same at the two ends, identity authentication is successful. After the
encryption function is enabled, authentication is performed only once. The
authentication is performed again only after services are interrupted.
● Authentication Key (AK): As shown in Figure 4-4, the key exported from
Authentication Info configured by a user is transmitted to the sink end before
key negotiation.
● ID: The ID is computed based on the NE ID, subrack ID, board slot ID, and port
number.
● MAC: The MAC is computed based on random number A, random number B,
ID, and AK using the SHA-256 digest algorithm.
Key Negotiation
Key negotiation between two ends generates a session key.
The source end and sink end generate a public/private key pair by using the Diffie-
Hellman algorithm, and the source-end public key is transmitted to the sink end.
At the sink end, the public key and the sink-end private key are used together to
generate a session key.
During key negotiation, man-in-the-middle attacks may occur. As shown in Figure
4-6, a hacker (C) pretends to be B during communication with A and pretends to
be A during communication with B. Both A and B negotiate a key with C. In this
way, C can communicate with A and B respectively to intercept data.
1. By using the HMAC_SHA256 algorithm, the source end sends the calculated
value repeatedly, and the sink end authenticates the legitimacy of the local
end.
2. The two ends use the PBKDF2 algorithm to calculate a session key based on
the customer key configured by a user.
3. Then, based on the AES-256 algorithm, the SE2900 uses the new session key
for encryption and decryption.
● Before the encryption function is enabled for services for the first time,
because the key is empty, the customer key must be configured for
subsequent encryption operations.
● After the encryption function is enabled, the user can also configure the
customer key. In this case, the key calculation and encryption processes are
repeated.
● Customer key, which is configured by the user and consists of 2048 bits, is
used as the basis of deriving the actual encryption key. The customer key of a
bidirectional service is automatically generated by the two ends, without
requiring manual configuration. The customer key of a unidirectional service
is configured by the user before encryption is enabled or during the
encryption enabling process.
● HMAC-SHA256 is an irreversible encryption algorithm that encrypts
Authentication Info into cipher text and uses an authentication character
string with a length of 1 to 64 bytes to defend against passive attacks.
● Password-Based Key Derivation Function 2 (PBKDF2) is a common algorithm
that uses the pseudo random function to export a key.
● Advanced Encryption Standard (AES) is a symmetric block cipher algorithm.
AES-256 encrypts data in groups of 256 bits in counter mode (CTR). To
decode data encrypted using the AES-256 algorithm, attackers must obtain
much more ciphertext and use much more resources and time, as compared
with decoding data encrypted using traditional encryption algorithms. AES is
widely applied, encrypts data quickly, is easy to hide, and provides high
throughput.
Authentication
The legitimacy of the source end can be authenticated based on the comparison
of the calculated values at the sink end.
As shown in Figure 4-10, the source end and sink end use the HMAC_SHA256
algorithm to calculate hash values, and the sink end compares the hash values to
determine whether the source end is a legitimate device. The subsequent process
can be started only after the authentication succeeds. After the encryption
function is enabled, authentication is performed only once. The authentication is
performed again only after services are interrupted.
During the authentication process of unidirectional service encryption, the source
end needs to repeatedly calculate and send hash values. This is different from the
authentication process of bidirectional service encryption. To defend against replay
attacks, the timestamp difference between the source and sink ends is within 10s.
Key Calculation
The source end and sink end use the PBKDF2 algorithm to calculate a session key
based on the random number generated by the source end and the key identifiers
at the two ends.
100GE service To use the 100GE service encryption function, ensure that all
encryption line boards or regeneration boards on service trails are not
the following boards. Otherwise, encryption services cannot
be normally used. On an ASON network, you must ensure
that all possible rerouting trails comply with the preceding
limitation.
OptiX OSN 1800 boards (V100R007C10 or an earlier version):
● TNF1LSC
● TNF1LSCG
● TNF1LSCM
OptiX OSN 9800/8800 Universal Platform Subrack boards:
● TN54NS4, TN57NS4
● TN14LSC, TN15LSC, TN17LSC
● TN17LSCM
● TN12LTX
OptiX OSN 9800 U64 Standard/U64 Enhanced/U32
Standard/U32 Enhanced/U16 boards:
● TNV1N401, TNV2N401, TNU1N401, TNU2N401
● TNV1N402, TNV2N402, TNU1N402, TNU2N402
● TNU1N501, TNU2N501
● TNU1N601, TNU2N601
● TNU1N401P
● TNU4N404
● TNU1NP400, TNU1NP400E
● TNU4U402
● TNY1L401, TNY2L401, TNX1L401, TNX2L401
● TNY1L402, TNY2L402, TNX1L402, TNX2L402
● TNX1L501, TNX2L501
● TNX1L601, TNX2L601
● TNX1L401P
● TNX4L404
● TNX1NP400, TNX1NP400E
● TNX4U402S
Service Types The service types of the source and sink ports where
encryption is configured must be the same.
Time zone of the The time zone of the computer where the SMT is installed
SMT and NEs must be the same. Otherwise, the time in logs will
be inconsistent.
Configuration Process
Figure 6-1 shows the process for configuring the encryption function using CLI.
Table 6-1 lists the brief descriptions of operations in Figure 6-1.
Prerequisites
● You must be an NM user with NM operator authority or higher.
● The related encryption license file has been installed on the NCE.
Batch Configuration
1. On the main menu, choose Configuration > NE Batch Configuration > NE
license Authorization. The Choose License window is displayed.
2. Choose License > OTN Series > Encryption Function Software Fee(per
board) and click OK.
3. Select multiple NEs under Physical Root, click , and configure the number
of licenses in a batch.
Per-NE Configuration
1. In the Physical Topology tab page, click the NE. In the right-side pane, click
NE Explorer in the Operations area.
2. For the selected NE, choose Configuration > NE License Authorization and
configure the number of licenses.
NOTE
Prerequisites
● You must be an NM user with NM operator authority or higher.
● NE rights: You must have the rights of the System Administrators NE user
group or higher.
Procedure
1. On the main menu, choose Security > NE User Management. The NE User
Management page is displayed.
2. Select an NE and click > Add. The Add NE User dialog box is displayed.
When using the TNU1CTU/TNS1CTU board, the OSN 9800 does not support this
parameter.
● General NE User: NE user available for managing the NE through any system.
● EMS NE User: NE user available for managing the NE through the EMS, that is, the
NCE.
● LCT NE User: NE user available for managing the NE through the NCE LCT.
● CMD NE User: NE user available for managing the NE through the CMD.
6. Set the password for the user to log in to the NE.
NOTE
Prerequisites
● You must be an NM user with NM operator authority or higher.
● NE rights: You must have the rights of the System Administrators NE user
group or higher.
Legend Information
Procedure
1. In the Physical Topology tab page, click the NE. In the right-side pane, click
NE Explorer in the Operations area.
2. Click Advanced Attributes, select a board port, and allocate the port to a
created encryption user.
3. After encryption ports are allocated, you can click Query to query the
allocation situation of encryption ports.
Prerequisites
● You must be an NM user with NM operator authority or higher.
● The related encryption license file has been installed on U2000.
● The NE environment where the port requiring service encryption is located
has been deployed on the U2000.
Batch Configuration
1. On the main menu, choose Configuration > NE Batch Configuration > NE
license Authorization. The Choose License window is displayed.
2. Choose License > OTN Series > Encryption Function Software Fee(per
board) and click OK.
3. Select multiple NEs under Physical Root, click , and configure the number
of licenses in a batch.
Per-NE Configuration
1. On the main menu, right-click the NE, choose NE Explorer from the shortcut
menu to display the NE Explorer.
2. For the selected NE, choose Configuration > NE License Authorization and
configure the number of licenses.
NOTE
Set the license quantity to a value in the format of consumed number/authorized number,
such as 10/122.
Prerequisites
● You must be an NM user with NM operator authority or higher.
● NE rights: You must have the rights of the System Administrators NE user
group or higher.
Procedure
1. On the main menu, choose Administration > NE Security Management >
NE User Management. The NE User Management page is displayed.
2. Select an NE and click > Add. The Add NE User dialog box is displayed.
The NE user must contain letters, or it can be a combination of letters, symbols and
numerals. The NE user name contains at least 4, but not more than 16 characters.
4. Select the value of User Level to System Level.
5. Set NE User Flag based on the mode that the user accesses the NE.
NOTE
When using the TNU1CTU/TNS1CTU board, the OSN 9800 does not support this
parameter.
● General NE User: manages NEs on all NMSs.
● EMS NE User: manages NEs on the element management system (EMS) U2000.
● LCT NE User: manages NEs on local craft terminal (LCT) U2000.
● CMD NE User: manages NEs on CMD terminals.
6. Set the password for the user to log in to the NE.
NOTE
Prerequisites
● You must be an NM user with NM operator authority or higher.
● NE rights: You must have the rights of the System Administrators NE user
group or higher.
Legend Information
Figure 6-3 shows legend information about U2000 operations.
Procedure
1. Right-click the selected NE on the Main Topology tab, select NE Explorer.
2. Click Advanced Attributes, select a board port, and allocate the port to a
created encryption user.
3. After encryption ports are allocated, you can click Query to query the
allocation situation of encryption ports.
Prerequisites
● Operation rights: You have the permission to log in to the SMT.
● The SMT installation package is ready. If you want to obtain the SMT
installation package, please contact the local Huawei engineer.
Context
● The encryption tool SMT can be assigned to multiple users, and each user
manages its own NEs and service data.
● Only one user can log in to the SMT at a time. Multiple users cannot log in to
the SMT at the same time.
Procedure
Step 1 Decompress the SMT installation package to a local path.
NOTE
The local path cannot be the root directory of a disk and cannot contain any Chinese,
spaces, or special characters.
Step 2 Double-click OptiX SMT_en.bat to start the English UI. When the following page
is displayed, the server process has been started.
NOTE
If the server process has not been started, check whether the port used by the server has
been occupied.
Step 3 After the server process is successfully started, the login window shown in the
following figure is displayed. Enter the User Name and Password and click OK.
NOTE
● The default user name and password are Admin and Changeme_123. Change the
password upon the first login. To ensure system security, regularly change the password
and remember it. The new password cannot be the same as any of the last three
passwords. The validity period of the new password is 90 days.
● The password must be the combination of at least two of the lowercase letters,
uppercase letters, digits, and special characters.
● If you enter incorrect passwords for three consecutive times when logging in to the SMT,
the system will lock the account. The account will be automatically unlocked after 5
minutes, and then you can enter the login password again.
● After you log in to the SMT, the system locks the account if you do not perform any
operation within 10 minutes. Press Ctrl+Alt+U or click Close to unlock the account.
Then, enter the login password again.
Step 4 After the login is successful, the main window of the SMT shown in the following
figure is displayed.
----End
Prerequisites
● Operation rights: encryption administrator accounts or encryption sub-
accounts. If the operation is performed for the first time, only the encryption
administrator account can be used.
● The encryption user account has the permission to manage the NE to be
created.
Context
● Upon the first login to the SMT, you must add the NEs to be managed.
● You can add the NEs to be managed at any time when using the SMT.
● If it is not the first login to the SMT, the SMT directly queries NEs from the
database and displays the list of NEs managed by the current login user.
Legend Information
Figure 6-4 shows legend information about SMT operations.
Procedure
Step 1 Create an NE. For details about the parameters of Create NE, see Table 6-5 of
6.6.2-Parameter.
NOTE
: The ID, extended ID, and IP address must be set to actual NE information, which is
provided by the NMS user.
A service requires at least two NEs. Therefore, two or more NEs need to be created.
----End
Follow-up Procedure
● 6.5.1 How Can I Handle a Failure of Logging In to an NE from the SMT?
● You can delete an NE as required. Before deleting an NE, you should log out
of the NE.
Prerequisites
● Operation rights: encryption administrator accounts or encryption sub-
accounts.
● Logging in to the NE whose services need to be encrypted is successful.
Context
● If it is your first time to log in to an NE, or the EMK has been initialized, the
EMK is empty, and you must set the EMK value before using the encryption
function.
● If you need to change the EMK value, begin with Setting the EMK value.
● If it is not the first time for you to log in to an NE and the EMK value has
been set, begin with Starting EMK authentication.
Legend Information
Figure 6-5 shows legend information about SMT operations.
Procedure
Step 1 Select the NE that you have logged in to and right-click it. A dialog box is
displayed.
Step 2 Set EMK. The EMK of an NE is set by using an encryption user account. Different
EMKs can be set for different user accounts or different NEs of the same user
account.
NOTE
● When the EMK is empty, the Old EMK value is empty by default and you do not need to
enter any character after you click Old EMK.
● If the New EMK value has been set before and needs to be changed, you must enter
the New EMK value that is set last time as the Old EMK value.
● On the Input EMK tab page, set EMK and Confirm EMK that the values must be the
same and meet the following requirements:
– The EMK value must contain 8 to 32 characters.
– The EMK value must be different from the user name.
– The value must contain two or more of the following types of characters: digits,
uppercase letters, lowercase letters, and special characters.
● Select Display EMK to display the old and new EMK values.
NOTE
● You can select multiple NEs and right-click them to perform batch authentication.
the NE icon will change from to . You need to repeat Step 3 to authenticate the
EMK again.
● EMK will be locked if the EMK value is incorrectly entered for four consecutive times.
Table 6-2 lists the relationship between the numbers of consecutive incorrect input
times and the lockout duration.
Table 6-2 Relationship between the numbers of consecutive incorrect input times
and the lockout duration
Number of 1 to 3 4 5 6 7 8 ≥9
Consecutive Incorrect
Input Times
----End
Follow-up Procedure
6.5.2 How Can I Handle EMK Lockout?
Prerequisites
● Operation rights: encryption administrator accounts.
● The bidirectional P2P service to be created exists on the physical NE, and the
EMK of the encryption administrator account has been successfully
authenticated.
Context
Bidirectional P2P, Unidirectional Static P2P/P2MP, and Dynamic Group cannot
be configured on the same port.
Legend Information
Figure 6-6 shows legend information about SMT operations.
Procedure
Step 1 Query the current port service resources and all idle port resources. The query
results are displayed on the Management View page.
Step 2 Create a service. On the main menu, you can choose P2P Management > Manual
Create P2P, select information about the source end and sink end, and click Add >
Apply.
NOTE
● An encryption service must be created by port. The source and sink NEs must be
different NEs, and the source and sink ports must be disabled.
----End
Prerequisites
● Operation rights: encryption administrator accounts or encryption sub-
accounts (on the operation or maintenance level).
● The encryption administrator has created bidirectional P2P service.
Legend Information
Figure 6-7 shows legend information about SMT operations.
Procedure
Step 1 Select the created bidirectional P2P service and right-click Modify Authentication
Information.
Before key negotiation, the source and sink encryption devices automatically check
whether the peer device is a legitimate device based on the authentication
information set by the user. To ensure high system security, you need to modify
initial authentication information and update it regularly for the newly created
bidirectional P2P service.
NOTE
Step 2 Select the created bidirectional P2P service and right-click Enable.
NOTE
Step 3 Verify services. That is, check whether the service encryption link is available.
NOTE
● When performing this operation, ensure that the encryption enable status of the service or
port is Enable.
● You can select multiple services to perform batch operations.
Step 4 Select the bidirectional P2P service and query the port status to view the
encryption and decryption status of the source and sink ends of the service. For
details, see 6.4.4 Querying Port Encryption Status and Information.
----End
Prerequisites
● Operation rights: encryption administrator accounts.
● The unidirectional static broadcast group service to be created exists on the
physical NE. And the EMK of the encryption administrator account has been
successfully authenticated.
Context
Bidirectional P2P, Unidirectional Static P2P/P2MP, and Dynamic Group cannot
be configured on the same port.
Procedure
Step 1 Query service resources on the current port. On the main menu, you can choose
Unidirectional Static P2P/P2MP > NE > . The query results are displayed
on the Management View page.
Step 2 Create a Unidirectional Static P2P/P2MP service. On the main menu, you can
choose Unidirectional Static P2P/P2MP Management > Manual Create P2P/
P2MP, enter the P2P/P2MP ID and source end information, click Add, select sink
end information, and click Apply > Create.
NOTE
● During the adding of service ports, if a drop-down button is displayed in the Port ID
area of the NE, there are idle ports that can be added on the NE. In this case, you can
double-click Port ID to select the specific port number to be added.
● The P2P/P2MP ID can be set to an integer ranging from 1 to 60000.
Step 3 Verify whether the source and sink ports are configured correctly. Choose the
service and click Operation > Test Trail Detection. In Trail Detection Result, you
can view the detection result.
NOTE
----End
Prerequisites
● Operation rights: encryption administrator accounts or encryption sub-
accounts (on the operation or maintenance level).
● The encryption administrator has created unidirectional static P2P/P2MP
service.
Context
● By default, the customer key is configured for all broadcast group services. It
can also be configured for ports. For unidirectional static P2P/P2MP services,
the customer keys of the sink ends with the same source end must be the
same.
● The content of the customer key cannot be queried.
Legend Information
Figure 6-8 shows legend information about SMT operations.
Procedure
Step 1 For the created unidirectional static P2P/P2MP service, before enabling the
encryption function, set the customer key first.
NOTE
: When setting the customer key for the first time, you are not advised to select Set
Port. In this case, the customer key takes effect on all source and sink ends by default.
Key configuration: The customer key can be set to a character string (by default) or a
binary code stream.
● The customer key can be a character string of 32 to 256 bytes, consisting of letters,
digits, and special characters (except spaces).
● The user secret key can also be set to a binary code stream of 256 to 2048 bits.
You can select multiple services to perform batch operations.
Step 2 Check whether the keys used at the source and sink ends in the broadcast group
are the same. Choose the service, click Operation > Test Encryption and
Decryption. In Encryption and Decryption Result, you can view the result.
NOTE
----End
Prerequisites
● Operation rights: encryption administrator accounts or encryption sub-
accounts (on the operation or maintenance level).
● The encryption administrator has created unidirectional static P2P/P2MP
services and performed the operation of setting the customer key for the
services.
Procedure
Step 1 Select the created unidirectional static P2P/P2MP service and right-click modify
authentication information.
Before key negotiation, the source or sink encryption device automatically checks
whether the peer device is a legitimate device based on the authentication
information set by the user. To ensure high system security, you need to modify
initial authentication information and update it regularly for the newly created
unidirectional static P2P/P2MP service.
NOTE
Step 2 Enable service encryption. Select the created unidirectional static P2P/P2MP
service and right-click Enable.
NOTE
Step 3 Select the unidirectional static P2P/P2MP service and query the port status to view
the encryption and decryption status of the source and sink ends of the service.
For details, see 6.4.4 Querying Port Encryption Status and Information.
----End
Prerequisites
● Operation rights: encryption administrator account.
● Before creating a dynamic multicast group, you need to specify the allocation
of all ports involved in the services in the port group.
● The EMK of the encryption administrator account has been successfully
authenticated.
Context
Bidirectional P2P, Unidirectional Static P2P/P2MP, and Dynamic Group cannot
be configured on the same port.
Procedure
Step 1 Query service resources on the current port. On the main menu, you can choose
Dynamic Group > NE > . The query results are displayed on the
Management View page.
Step 2 Create a dynamic group service. On the main menu, you can choose Group
Management > Manual Create Group, enter the multicast ID, click Add, select
multiple ports, and click Apply > Create.
NOTE
● When a dynamic group is created, a drop-down button displayed in the Port ID column
indicates that there are idle ports to be added. Double-click Port ID to choose a desired
port number or choose All to add all idle ports of the NE.
● Group ID is mandatory and is an integer ranging from 60001 to 65534.
● At least two ports need to be added to configure a dynamic group.
● When the status displayed in the Creation Status column changes from
Step 3 Check whether the configurations of source and sink ports are correct. You can
select services in a port group, click Operation > Test Trail Detection, and view
results in the Trail Detection Result column.
NOTE
----End
Prerequisites
Operation rights: encryption administrator accounts or encryption sub-accounts
(on the operation or maintenance level).
Context
● A customer key can be set by port group but cannot be set by port. Users in
each port group use the same customer key (in the receive and transmit
directions).
● The content of the customer key cannot be queried.
Procedure
Step 1 For the created dynamic multicast service, before enabling the encryption
function, set the customer key first. You can select a port group service, right-click
it, choose Set a Customer Key from the shortcut menu, configure a customer key,
and click OK.
NOTE
Key configuration: The customer key can be set to a character string (by default) or a
binary code stream.
● The customer key can be a character string of 32 to 256 bytes, consisting of letters,
digits, and special characters (except spaces).
● The user secret key can also be set to a binary code stream of 256 to 2048 bits.
You can select multiple port groups to set customer keys in batches.
Step 2 Check whether the source and sink ends in the port group use the same customer
key. You can select a port group service, click Operation > Test Encryption and
Decryption, and view results in the Encryption and Decryption Result column.
NOTE
You can select multiple port groups to set customer keys in batches.
----End
Prerequisites
Operation rights: encryption administrator accounts or encryption sub-accounts
(on the operation or maintenance level).
The encryption administrator has created dynamic group services and performed
the operation of setting the customer key for the services.
Procedure
Step 1 Select the created dynamic multicast service and right-click Modify
Authentication Information.
NOTE
Step 2 Select the created dynamic group service and right-click Enable.
NOTE
● This operation can be used to issue enabling and disabling messages to all ports in a
dynamic group.
– Enable: indicates that all ports in a port group are encrypted and data transmitted
through this port group will be encrypted.
– Disable (by default): indicates that encryption is enabled on all ports in a port
group and data transmitted through this port group will not be encrypted.
– Enabling and disabling service encryption should be performed at an interval of
more than 10s.
– You can select multiple port groups to perform batch operations.
Step 3 Select the dynamic multicast service. In the Port Encryption State window, query
Authentication Status to determine whether the source end of the service is
successfully authenticated by the sink end. For details, see 6.4.4 Querying Port
Encryption Status and Information.
----End
Prerequisites
● Operation rights: encryption administrator accounts.
● The encryption administrator account has logged in to the SMT.
Context
The encryption administrator account can be used to assign an encryption sub-
account as required. The encryption sub-account can be used to query, set, or
maintain encryption information.
Legend Information
Figure 6-9 shows legend information about SMT operations.
Procedure
Step 1 Create an encryption sub-account. That is, set the sub-account name, user level,
and password on the NE.
1. Set NE User.
Account Description
Level
Monitor Indicates that the account can be used only to query the
Level encryption information.
You can query service information, Port Encryption Status,
Port Encryption Information, and log information.
Operation Indicates that the account can be used only to query or set the
Level encryption information.
– You can query service information, Port Encryption Status,
Port Encryption Information, and log information.
– You can set a customer key, Port Encryption Status, Port
Encryption Information, Initialize Failure Times, and
Forced Start Key Swap.
3. Set Password.
NOTE
The password cannot be the same as the user name (for example, sub1) or the reverse
order of the user name (for example, 1bus) and must be the combination of at least
two of the lowercase letters, uppercase letters, digits, and special characters.
----End
Prerequisites
● Operation rights: encryption administrator accounts.
● The EMK has been authenticated on the NE to which a port is to be assigned.
Procedure
Step 1 On the main menu, choose NE Management > Port Account Management >
NEs > . The Port Account Management page is displayed.
Step 2 Allocate encryption ports of the NE for encryption sub-accounts. On the Port
Account Management page, click Add, select the account to which ports can be
allocated, select ports, and click Apply.
NOTE
● Only the encrypted administrator account can allocate ports to encrypted sub-accounts
on the selected NE. Each port can be allocated to multiple encryption sub-accounts.
● During encrypted sub-account port allocation, you can set a port alias containing at
most 32 characters in the Port Alias column.
● Parameter descriptions are as follows:
1. Assigned Account Port: lists information about all assigned ports.
2. All Ports to Manage: lists information about all manageable ports.
3. Unassigned Account: lists information about all unassigned ports.
----End
Procedure
Step 1 Select a service and right-click Set Port Maintenance Status.
NOTE
● Enable: indicates that a port is in the maintenance state. The port maintenance status can
be setting only in the enable status.
● Disable (by default): indicates that a port is not in the maintenance state.
● You can select multiple services to perform batch operations.
----End
Procedure
Step 1 Select a service to be modified and right-click Modify Unidirectional Static P2P/
P2MP. The Modify Unidirectional Static P2P/P2MP dialog box is displayed.
NOTE
There is no specified sequence for the addition, deletion, and moving operations. You can select
the operations as required.
Step 2 Add a source end and a sink end. In the Modify Unidirectional Static P2P/P2MP
window, you can select information about the source end, click Add, select
information about the sink end, and click Apply.
NOTE
If a unidirectional static P2P/P2MP service does not have a source end, click Add to add a
source end. If a unidirectional static P2P/P2MP service has a source end, click Add to add a
sink end.
When a source NE related to a service is not logged in, the source end of the service will be
missing, and the P2P/P2MP alias will be displayed as . In this case, you can
perform only Delete P2P/P2MP and Modify P2P/P2MP operations.
Step 3 Delete a source end and a sink end. In the Modify Unidirectional Static P2P/
P2MP window, you can select information about the source end, click Delete,
select information about the sink end, and click Delete > Apply.
NOTE
Step 4 Click Move to move a port to a new broadcast group. The port can function as the
source or sink end. In the Modify Unidirectional Static P2P/P2MP window, you
can click Move, modify the move information, and click OK > Move > Apply.
NOTE
The following are principles of moving a source end to another broadcast group:
● If a broadcast group has no source end, a source end can be moved to this broadcast group.
● If a source end functions as a sink end in a broadcast group, it cannot be moved to another
broadcast group to function as a sink end.
The following are principles of moving a sink end to another broadcast group:
● If a broadcast group has no source end, a sink end can be moved to this broadcast group
and functions as a source end.
● The sink end can be moved to other broadcast groups and functions as a sink end.
You can perform this operation only when the value of Source Encryption and Port Enable
State is Disable.
----End
Procedure
Step 1 Select a service to be modified and right-click Modify Group. The Modify
Dynamic Group dialog box is displayed.
Step 2 Click Add to add ports for the dynamic group. In the Modify Dynamic Group
window, you can select an idle port and click Add > Apply.
NOTE
To add all the idle ports of an NE, you can double-click Port ID and select All.
Step 3 Delete a port. In the Modify Dynamic Group window, you can select a port and
click Delete > Apply.
NOTE
● This operation can be performed only when Encryption Port Enable State is in Disable
state.
● The Delete operation can be performed only when the number of ports in a dynamic group
is greater than or equal to 3.
Step 4 Move a port. In the Modify Dynamic Group window, you can select a port, click
Move, modify the move information, and click OK > Apply.
NOTE
● This operation can be performed only when Encryption Port Enable State is in Disable
state.
● The Move operation can be performed only when the number of ports in a dynamic group is
greater than or equal to 3.
----End
Prerequisites
Operation rights: encryption administrator accounts or encryption sub-accounts.
The EMK has been authenticated on the NE where the encryption service resides.
Legend Information
Figure 6-10 shows legend information about SMT operations.
Procedure
Step 1 Query the service resources of the current ports. The query result is displayed in
Management View. The parameters in the Management View window are
described as Table 6-6.
Step 2 Query the encryption status and maintenance status of the service or port. In
Management View, you can select a specific service and click Query.
NOTE
To query the encryption enable status of port services in Dynamic Group, select the port group
and Query Enable Status.
Step 3 Select a specific service and click Port Encryption State > Query. The main
parameters on the Port Encryption State tab page are described as Table 6-9.
NOTE
● Before querying the encryption status of the current service port, you can perform the
Forced Start Key Swap operation first. Then, you can select a specific service and click
Operation > Forced Start Key Swap.
● Forced Start Key Swap: If a security risk is detected from a user secret key, you can
click Forced Start Key Swap to change the key promptly for security purposes instead
of waiting until the key change period ends. When performing this operation, ensure
that the encryption enable status of the service or port is Enable.
● EMK Initialization Interrupt Service State cannot be set for the encryption sub-
account. On the GUI, EMK Initialization Interrupt Service State is displayed as -.
● For an EMK that has been configured with an encryption administrator account,
initializing the EMK does not interrupt the services on the encryption port allocated to
the encryption administrator account by default. When the encryption administrator
account sets EMK Initialization Interrupt Service State to Enable on the SMT,
initializing the EMK for the encryption administrator account on the NMS will interrupt
the managed services.
● In Dynamic Group, you need to select specific services in the port group before
performing operations.
Step 4 Select a specific service and click Port Encryption Information > Query. The main
parameters on the Port Encryption Information tab page are described as Table
6-10.
NOTE
In Dynamic Group, you need to select specific services in the port group before performing
operations.
----End
Prerequisites
Operation rights: encryption administrator accounts.
The EMK has been authenticated on the NE where the encryption service resides.
Procedure
Step 1 Set EMK Initialization Interrupt Service State. On the main menu, you can
choose NE Management > NE Account Management. The NE Account
Management page is displayed. Then, you can select a specific NE and choose
Operation > Set EMK Initialization Interrupt Service State > Disable.
NOTICE
NOTE
Step 2 For the selected service port, set the encryption enable status. In Management
View, you can select a specific service, click Port Encryption State > Query, set
the encryption enable status, and click Apply.
NOTE
● When the encryption status is Disable, only EMK Initialization Interrupt Service State
and Encryption Enable State can be queried, and all the subsequent fields are
displayed as /, indicating that the query fails.
● When the encryption status is Enable, all fields can be queried.
● Here, you can enable only ports but cannot enable services. In the Management View
window, you can enable both ports and services.
● If a field is displayed as -, the field cannot be queried.
● In Dynamic Group, you need to select specific services in the port group before
performing operations.
Step 3 For the selected service decryption port, set the decryption pattern. In
Management View, you can select a specific service, click Port Encryption State
> Query, set the decryption pattern, and click Apply.
NOTE
Step 4 For the selected service encryption port, set the key update interval. In
Management View, you can select a specific service, click Port Encryption
Information > Query, set the key update interval for the selected port, and click
Apply.
NOTE
● The encryption keys of an encryption service can be replaced regularly. This parameter
can be user-defined and be set to 10Min, 30Min, 1H, 3H, 6H, 1D, 7D, or 30D, and the
default value is 30Min (30 minutes).
● Key Replacement Interval can be set only on encryption ports and the setting will be
automatically synchronized to the decryption ports. Therefore, there are different
replacement intervals for both directions of a bidirectional service and the intervals are
not affected by each other.
● In Dynamic Group, you need to select specific services in the port group before
performing operations.
----End
Procedure
Step 1 Query SMT operation logs. On the main menu, you can choose System
Management > Log Management. The Operation Log Filter Dialog page is
displayed. Then, you can select the start time and end time of logs and click Filter.
The queried results are displayed in Log Management.
NOTE
● If the start and end time are not set, all logs will be queried by default.
● To query operation logs again, click Filter and select the query date again.
Step 2 Save the SMT operation logs to a local directory. On the main menu of Log
Management, you can click the Save As button in the lower-right corner, filter
the logs to be saved, click OK, and set the saving information.
Step 3 View other log information. In Management View, you can select the type of logs
to be view and click the Filter button in the lower-right corner. In the dialog box
that is displayed, you can set the start time and end time of logs and click Filter.
The queried results are displayed in the log status column.
NOTE
● On the EMK Log tab, you can query EMK operation log information such as EMK
authentication, and initialization.
● On the Operation Log tab, you can query encryption operation log information such as
the encryption service enable status.
● On the Running Log tab, you can query the encryption running log information.
● If the start and end time are not set, 24-hour log information is queried by default. The
log display depends on the device space.
● The procedure for saving other log information is the same as that for saving the SMT
operation logs. For details, see Step 2.
----End
6.5 FAQ
This topic provides answers to some frequently asked questions and common
handling methods.
Procedure
Step 1 If the account for logging in to the NE needs to be switched or the NE login fails
due to incorrect user name or password, set the login account first. On the main
menu, you can select an NE, right-click Set Login Account, and set the user name
and password.
NOTE
Step 2 If the NE login fails due to the change of NE information, change the NE login IP
address. On the main menu, you can select an NE, right-click Set Login IP, and set
parameters Login Type, IP Address, and Port.
NOTE
You cannot select multiple NEs and modify them in batches.
----End
Procedure
Step 1 If the EMK of the encryption sub-account is locked, the encryption administrator
can perform the Unlock Sub User EMK Locked operation.
On the main menu, choose NE Management > NE Account Management, select
an NE, and click . The NE Account Management page is displayed.
Click Operation > Unlock Sub User EMK Locked > OK in the lower right corner.
----End
Prerequisites
● NE rights: To initialize the EMK of an encryption administrator account, you
must have the rights of the System Administrators Ne user group or higher.
To initialize the EMK of an encryption sub-account, you must have the rights
of encryption administrator accounts.
If a user EMK is locked after multiple incorrect EMK are entered, click Unlock Encryption
User to unlock the EMK of the encryption user.
If the account is in use, the EMK initialization will fail.
If a user EMK is locked after multiple incorrect EMK are entered, click Unlock Encryption
User to unlock the EMK of the encryption user.
If the account is in use, the EMK initialization will fail.
Trail Name Indicates the trail name and has four display modes.
● When the service name is displayed as -, the current
port does not carry any service or has any alias.
● When the service name is displayed as a port name, the
current port does not carry any services.
● When the service name is displayed as source port name
1 <-> sink port name 2, the current port carries
bidirectional services.
● When the service name is displayed as source port name
1 -> sink port name 2, the current port carries
unidirectional services.
Parameter Description
Verification Result Indicates that the verification result of the current service
and has seven possible values.
● Invalid Trail: indicates that the current trail is invalid.
● Unidirectional Trail: indicates that the current trail is a
unidirectional trail.
● Verification Succeeded: indicates that the current trail
has been successfully verified.
● Verification Failed: indicates that the current trail has
been verified but failed.
● Please enable port: indicates that the encryption enable
status of some ports is Disable. You are advised to
enable the ports, and then verify the services and query
the verification result.
● Unverified: indicates that the current service is not
verified.
● -: indicates that the port does not support the query of
the verification result.
Encryption and Indicates whether user secret keys used by the source and
Decryption Result sink ends inside the broadcast group are consistent.
● Succeeded: indicates that user secret keys used by the
source and sink ends inside the broadcast group are
consistent.
● Failed: indicates that user secret keys used by the source
and sink ends inside the broadcast group are
inconsistent.
Trail Detection Indicates whether the source and sink ports are correctly
Result configured.
● Succeeded: indicates that the source and sink ports are
correctly configured.
● Failed: indicates that the source and sink ports are
incorrectly configured.
Encryption and Indicates whether the keys used by the source and sink
Decryption Result ends of a specific service in a port group are consistent.
● Succeeded: The keys used by the source and sink ends
of the service in the port group are consistent.
● Failed: The keys used by the source and sink ends of the
service in the port group are inconsistent.
Trail Detection Indicates whether the source and sink ports of a specific
Result service in a port group are configured correctly.
● Succeeded: indicates that the source and sink ports are
correctly configured.
● Failed: indicates that the source and sink ports are
incorrectly configured.
EMK Initialization Indicates whether the service will be interrupted when the
Interrupt Service EMK value is initialized on the current port.
State ● Disable (by default): indicates that the service will not
be interrupted.
● Enable: indicates that the service will be interrupted.
Encryption Enable Indicates the encryption enable status of the current port.
State ● Disable (by default): indicates that the data transmitted
through this port will not be encrypted.
● Enable: indicates that the data transmitted through this
port will be encrypted.
Decryption Enable Indicates the decryption enable status of the current port.
State ● Disable (by default): indicates that the data transmitted
through this port will not be decrypted.
● Enable: indicates that the encryption data transmitted
through this port will be decrypted.
Parameter Description
Encryption Keys The current key swap status can be queried only when the
Swap Status encryption function is enabled on the port. The key swap
(Bidirectional statuses are classified into the following types:
P2P) ● IDLE: indicates that the key swap function of the current
port is not enable.
● SUCCESS: indicates that the keys of the current port are
successfully swapped.
● EXCHANGE: indicates that the current port is swapping
the keys.
● FAILURE: indicates that the key swap of the current port
fails.
● SUSPEND: indicates that the key swap of the current
port pauses.
Decryption The decryption modes are valid only for sink ends.
Pattern ● Auto Adaption: indicates that whether broadcast group
(Unidirectional services are decrypted at the sink end depends on the
Static P2P/P2MP configuration of the source end. If the encryption
and Dynamic function is enabled at the source end, the services will
Group) be decrypted at the sink end.
● Disable: indicates that broadcast services are not
decrypted at the sink end and the services will be
interrupted.
Key Residual Indicates the key residual effective time of the current port.
Effective Time The default unit is minute.
Last Time Key Indicates the last time for successful key replacement.
Swap Success
Time
Parameter Description
Last Time Key Indicates the last time for failed key replacement.
Swap Failure Time
7.1 Availability
To use the encryption function normally, you must obtain the corresponding
license, hardware version, SMT tool, and NMS tool.
7.2 Specifications
This topic describes the L1 service encryption specifications that the product
supports.
7.3 Feature Updates
This topic describes the feature updates in each version and the corresponding
documentation updates. The versions that are not listed in the document are
those without feature updates.
7.4 Reference Standards and Protocols
This section lists the standards and protocols associated with L1 service
encryption.
7.1 Availability
To use the encryption function normally, you must obtain the corresponding
license, hardware version, SMT tool, and NMS tool.
Table 7-2 Mapping between bidirectional service encryption boards and products
Board Type Product Applicable-Initial Board
Version
TN11LDC UPS-V100R006C00
Table 7-4 Mapping between product versions and NMS versions and between
product versions and SMT versions
Start Device Start NMS Version Start SMT Version
Version
Table 7-5 Mapping between bidirectional service encryption boards and products
Board Type Initial Version
TNG1M504DM V100R019C10SPC300
Table 7-6 Mapping between product versions and NMS versions and between
product versions and SMT versions
Start Device Version Start NMS Version Start SMT Version
Table 7-7 Mapping between the OSN 8800 boards and devices that support
bidirectional service encryption, NMS versions, and SMT versions
Board Type Product Applicable-Initial Board
Version
TN11LDC T64/T32/T16/UPS-V100R012C10
Table 7-8 Mapping between the OSN 6800 boards and devices that support
bidirectional service encryption, NMS versions, and SMT versions
Board Type Product Applicable-Initial Board
Version
Table 7-9 Mapping between product versions and NMS versions and between
product versions and SMT versions
Start Device Version Start NMS Version Start SMT Version
Table 7-10 Mapping between bidirectional service encryption boards and products
Board Type Product Applicable-Initial Board
Version
NOTE
● In an OSN 1800 V subrack, the TNF6TOA board supports the encryption function only
when the system control board is TNZ5UXCMS.
● In an OSN 1800 V subrack of V100R008C10 or an earlier version, the TNF6TTA board
supports the encryption function only when the system control board is TNZ5UXCMS.
Table 7-11 Mapping between product versions and NMS versions and between
product versions and SMT versions
7.2 Specifications
This topic describes the L1 service encryption specifications that the product
supports.
7.2.1 Overview
This topic lists the overall specifications that products support.
Item Specification
Typical service type SDH/SONET, Ethernet, OTN, SAN, and video services
Minimum encryption Board port level. Users can be allocated by port and
unit port-specific encryption can be configured. In this
way, service applications are more flexible.
Item Specification
Table 7-13 Service types that support the encryption function and number of
supported encryption ports
Item Specifications
Item Specifications
Table 7-14 Service types that support the encryption function and number of
supported encryption ports
Item Specifications
Item Specifications
Table 7-15 Service types that support the encryption function and number of
supported encryption ports
Item Specifications
Item Specifications
Table 7-16 Service types that support the encryption function and number of
supported encryption ports
Item Specifications
Item Specifications
Updates in V100R005C00
Feature Updates Update Description
Type
Updates in V100R019C10SPC600
Feature Update Update Description
Type
Updates in V100R007C00SPC700
Feature Update Update Description
Type
Updates in V100R012C10
Feature Updates Update Description
Type