Uploaded by Dilmoh Dilmu

Manual ZTE ZXR10-ZSR-Router

advertisement
ZXR10 ZSR Intelligent
Integrated Multi-Service
Router Technical Specification
ZXR10 ZSR Intelligent Integrated Multi-service RouterTechnical Specification
ZXR10 ZSR Intelligent Integrated MultiService Router Technical Specification
About the Document
Version
Date
Author
Approved By
Remarks
V1.00
20070508
Not open to the Third Party
V1.1
20080307
zhuhaidong
Product update
V1.2
20080313
zhuhaidong
Product update
Copyright © 2007 ZTE Corporation Shenzhen P. R. China
ZTE CONFIDENTIAL: This document contains proprietary information of ZTE Corporation and is
not to be disclosed or used except in accordance with applicable
agreements.
Due to update and improvement of ZTE products and technologies,
information of the document is subjected to change without notice.
ZTE Confidential Proprietary
I
ZXR10 ZSR Intelligent Integrated Multi-service RouterTechnical Specification
Table of Contents
1
Overview............................................................................................................................................ 1
1.1 System Description................................................................................................................... 1
1.2 System Architecture ................................................................................................................. 2
1.2.1 System Outward Appearance......................................................................................... 2
1.2.2 Performance ................................................................................................................... 3
1.2.3 System Features ............................................................................................................. 6
1.2.4 Types of Network Interface ........................................................................................... 7
1.2.5 Operating Envirnoment.................................................................................................. 8
1.3 Technical Advantages .............................................................................................................. 8
1.3.1 Modular System Architecture ........................................................................................ 8
1.3.2 High Level of Integration............................................................................................... 8
1.3.3 Data Encryption Protection Feature ............................................................................... 9
1.3.4 Convergence of Narrowband and Broadband ................................................................ 9
1.3.5 Convergence of IP and Non-IP ...................................................................................... 9
1.3.6 Rich End-to-End QOS Support.................................................................................... 10
1.3.7 Rich Security Features ................................................................................................. 10
1.3.8 Multi-Function and Multi-Service Platform ................................................................ 10
1.3.9 Dual IPv4/IPv6 Stacks ................................................................................................. 10
1.3.10 Routing Protocol Software........................................................................................... 10
1.3.11 MPLS Routing and Switching Technology ................................................................. 11
1.3.12 High-Performance NAT and NAT-PT Support ........................................................... 11
1.3.13 Secure, Easy to Manage and Maintain......................................................................... 11
2
Hardware Architecture .................................................................................................................. 12
2.1 Overview ................................................................................................................................ 12
2.2 General Hardware Architecture.............................................................................................. 12
2.3 Architecture and Technology ................................................................................................. 14
2.3.1 181x/182x series: ......................................................................................................... 14
2.3.2 184x/284x/384x/288x/388x Series............................................................................... 15
3
Key Services and Features Description ........................................................................................ 19
3.1 ZXR10 ZSR Network Address Translation(NAT)................................................................. 19
3.1.1 Translation of Internal Source Address........................................................................ 19
3.1.2 Internal Global Address Overlapping .......................................................................... 20
3.2 ZXR10 ZSR Access Control List ........................................................................................... 20
3.2.1 Features and Basic Format of Access Control List ...................................................... 21
3.2.2 Implementation of Access Control List ....................................................................... 22
3.3 ZXR10 ZSR V-Switch ........................................................................................................... 22
3.3.1 Transparent Transmission of PPPoE Packet ................................................................ 23
3.3.2 Untagging and Tagging a Layer of VLAN .................................................................. 23
3.4 ZXR10 ZSR VPN................................................................................................................... 24
3.4.1 ZXR10 ZSR VPWS ..................................................................................................... 24
ZTE Confidential Proprietary
II
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
3.5
3.4.2 ZXR10 ZSR VPLS Feature.......................................................................................... 25
3.4.3 ZXR10 ZSR L2TP VPN .............................................................................................. 26
3.4.4 ZXR10 IPSEC VPN..................................................................................................... 27
Security Function of ZXR10 ZSR.......................................................................................... 28
3.5.1 TCP monitoring and interception function................................................................... 28
3.5.2 Aggregates-Oriented Multi-Levels Anomaly traffic Control System (A.M.A.T)........ 31
4
Operation, Administration and Maintenance (OAM)................................................................. 33
4.1 Overview ................................................................................................................................ 33
4.2 Simple Network Management Protocol (SNMP)................................................................... 33
4.3 SNMP MIB (Management Information Base) ....................................................................... 34
4.4 Remote Network Monitoring (RMON).................................................................................. 34
4.5 Statistics and Alarm Management Function........................................................................... 35
4.6 Log Management Function..................................................................................................... 36
4.7 Unified NM Function ............................................................................................................. 36
4.7.1 Foreground Software Module ...................................................................................... 36
4.7.2 Background Unified NM Platform (NetNumen) ......................................................... 37
5
Typical Networking Application ................................................................................................... 38
5.1 ISP private line access from large enterprise.......................................................................... 38
5.2 ISP Access from residential broadband areas......................................................................... 38
5.3 Private networks such as big enterprise/government information network and
data communications network (DCN) etc............................................................................ 39
5.4 L2TP function application...................................................................................................... 39
5.4.1 L2TP networking solution deployed by carriers .......................................................... 39
5.4.2 L2TP networking solution deployed by the enterprises............................................... 40
6
Appendix-Abbreviations ................................................................................................................ 41
ZTE Confidential Proprietary
III
ZXR10 ZSR Intelligent Integrated Multi-service RouterTechnical Specification
Figures and Tables
Figures
Figure 1
Front panel of ZXR10 ZSR1800 series ................................................. 2
Figure 2
Rear panel of ZXR10 ZSR1800 series .................................................. 2
Figure 3
Front panel of ZXR10 ZSR series 4-slot chassis................................... 3
Figure 4
Rear panel of ZXR10 ZSR series 4-slot chassis.................................... 3
Figure 5
Front panel of ZXR10 ZSR 28 & 38 series 8-slot chassis..................... 3
Figure 6
Rear panel of ZXR10 ZSR 28 & 38 series 8-slot chassis...................... 3
Figure 7
General architecture of ZXR10 ZSR intelligent integrated multiservice router ...................................................................................................... 9
Figure 8
General architecture of ZXR10 ZSR intelligent integrated multiservice router .................................................................................................... 13
Figure 9
The front view of 181x/182x series products ...................................... 14
Figure 10 Top view of 181x/182x series products............................................... 14
Figure 11 Rear view of 181x/182x series products.............................................. 14
Figure 12 The front display of 184x/284x/384x series entire equipment ............ 16
Figure 13 The side view of 184x/284x/384x series entire equipment ................. 16
Figure 14 The back display of 184x/284x/384x entire equipment....................... 16
Figure 15 The top display of 184x/284x/384x entire equipment (up layer) ........ 17
Figure 16 The top display of 184x/284x/384x entire equipment (down layer)... 17
Figure 17 184x/284x/384x series fan module...................................................... 17
Figure 18 The internal source address is translated into external source
address 20
Figure 19 Internal global address overlapping..................................................... 20
Figure 20 V-Switch implements transparent transmission of PPPoE packet....... 23
Figure 21 V-Switch untags and tags a layer of VLAN ........................................ 24
Figure 22 VPWS networking............................................................................... 25
Figure 23 ZXR10 ZSR series TCP interception module working principles
figure (1)........................................................................................................... 29
Figure 24 ZXR10 ZSR series TCP interception module working principles
figure (2)........................................................................................................... 30
Figure 25 ZXR10 ZSR series TCP interception module working principles
figure (3)........................................................................................................... 30
Figure 26 ZXR10 ZSR series TCP interception module working principles
figure (4)........................................................................................................... 31
Figure 27 A.M.A.T system principles.................................................................. 32
Figure 28 Management Model of the SNMP....................................................... 34
Figure 29 Private line access from large enterprise ............................................. 38
Figure 30 Access from residential broadband areas ............................................ 38
Figure 31 big enterprise/government information network and DCN ................. 39
Figure 32 Topology figure for L2TP deployed by carriers.................................. 39
Figure 33 Topology figure for L2TP deployed by enterprises ............................ 40
ZTE Confidential Proprietary
IV
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
Tables
Table 1
Table 2
Table 3
Table 4
Table 5
ZTE Confidential Proprietary
ZXR10 series routers ............................................................................. 1
Key parameters of ZXR10 1800 series routers...................................... 3
Key Parameters of ZXR10 2800 series routers ..................................... 5
Key Parameters of ZXR10 3800 series routers ..................................... 6
Operating Envirnoment of ZXR10 ZSR router ..................................... 8
V
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
1
OVERVIEW
5
Routing technology integrates modern communications, computer, networking,
microelectronic chip, large-scaled integrated circuit, optoelectronic technology, and
optical communication technologies. It is an important symbol for evaluating the
development of national sciences and technology.
10
ZTE router family, ranging from high-end to entry-level product series, from core
products to access products, plays an important in the industry. With complete
routing protocol support, rich interfaces and reliable carrier-class design, ZXR10
routers has won multiple awards within China and has attained excellent results in
various International events and inter-operability tests.
Table 1
ZXR10 series routers
Model
English Name
ZXR10 T1200
Carrier-class High-end router
ZXR10 T600
Carrier-class High-end router
ZXR10 T128
Carrier-class High-end router
ZXR10 T64E
Carrier-class High-end router
ZXR10 GER
General Excellent Router
ZXR10 ZSR
Intelligent Integrated Multi-Services Router
This document mainly introduces ZXR10 ZSR Intelligent Integrated Multi-Service
Router.
1.1
15
20
25
30
35
System Description
ZXR10 ZSR (Intelligent Integrated Multi-service Router) is another important
innovation from ZTE based on ZXR10 GAR platform and technology. As an
integrated and advanced networking platform, ZXR10 ZSR is more than a router by
providing users with routing, voice, high QoS assurance and service applications
features. It provides multiple secure access methods for users and integrates multiple
service applications. By supporting additional intelligent application modules,
ZXR10 ZSR provides easy configuration and provisioning, flexible service
management and plentiful services.
With the fast development of broadband access technologies, there are more and
more kinds of network edge access and requirements for network access port
bandwidth. To meet the requirements of SME for multiple types of access, ZXR10
ZSR intelligent integrated multi-service router supports all network modules of
GAR series (including synchronized/asynchronous serial port, E1/T1, FE, GE, OC3/ STM-1 POS) plus fixed Gigabit Ethernet Combo interfaces supporting
10/100/1000Mbps Ethernet electrical or GE SFP interface.
ZXR10 ZSR introduces high-density Ethernet Switching module in order to meet
the requirement of interconnection between enterprise internal networks. It provides
seamless integration of router and switch, and reduces bottleneck bandwidth and
security problems caused by external interconnections.
As per specific requirement for network security, ZXR10 ZSR provides complete
security solution, data encryption feature and intelligent security guard system
ZTE Confidential Proprietary
1
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
“AMAT” (Aggregate-oriented Multi-level Anomaly Traffic control system) based
on ZTE self-owned intellectual property. Embedded in routers, AMAT system is a
built-in module in the router for controlling multi-level abnormal traffic based upon
traffic aggregation for filtering anomaly traffic. As an anti-attack functional submodule embedded in router data forwarding module, it is responsible for generating
AMAT rules according to received packets from data forwarding module. It
implements matching and traffic filtering as per the rules to avoid network attacks.
The processing by AMAT module does not affect normal traffic forwarding.
With embedded hardware-based encryption acceleration engine, ZXR10 ZSR
provides users with high-performance IPSec data encryption feature at low cost.
Specifically designed for the data forwarding engine, the embedded hardware
encryption accelerated engine enables ZXR10 ZSR to offer users with efficient
IPSec encryption, including voice encryption etc. In addition, it also supports RSA
and DH public key generation algorithms, as well as MD5, SHA-1, HMAC-MD5,
HMAC-SHA-1 signature algorithms. So it can fully guarantee information security
for government and financial institutions etc.
5
10
15
ZXR10 ZSR intelligent integrated multi-service product provides complete QoS
feature, including CAR, queuing technologies (PQ, CQ, WFQ, CBWFQ//LLQ),
congestion avoidance technologies (RED and WRED), scheduling technologies (SP,
WRR), hierarchical QoS and SLA, etc.
20
ZXR10 ZSR intelligent integrated multi-service router has innovatively applied
multi-core CPU technology in access router, which greatly enhances the processing
capability of access router and the density of high-speed ports. ZXR10 ZSR series
routers supports up to 4 fixed gigabit interfaces and performs wire-speed forwarding
which surpass similar products from other vendors of the industry. Therefore, it
becomes a new standard of processing capability and port density of access router.
25
By integration multiple technologies and products into one platform, together with
ZTE-patented AMAT technology, ZXR10 ZSR intelligent integrated multi-service
routers provide customers with a unified communications platform by integrating
routing, voice, video, security and high QoS assurance for next generation services.
30
1.2
System Architecture
1.2.1
System Outward Appearance
1. ZXR10 ZSR 1800 series Physical Appearance
1) Front panel diagram
35
Figure 1 Front panel of ZXR10 ZSR1800 series
2) Rear panel diagram
Figure 2 Rear panel of ZXR10 ZSR1800 series
40
2. ZXR10 ZER series 4-slot chassis Physical Appearance
1) Front panel diagram
ZTE Confidential Proprietary
2
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
Figure 3 Front panel of ZXR10 ZSR series 4-slot chassis
2) Rear panel diagram
Figure 4 Rear panel of ZXR10 ZSR series 4-slot chassis
5
3. ZXR10 ZSR 28 & 38 series 8-slot chassis Physical Appearance
1) Front panel drawing
Figure 5 Front panel of ZXR10 ZSR 28 & 38 series 8-slot chassis
2) Rear panel drawing
10
Figure 6 Rear panel of ZXR10 ZSR 28 & 38 series 8-slot chassis
1.2.2
15
Performance
As per different processing capability, ZXR10 ZSR series routers mainly consist of
three categories including more than 20 products to meet different requirements, in
order to enterprises with various network scale, performance, and service feature
requirement etc.
Table 2
Key parameters of ZXR10 1800 series routers
Description
Model
Fixed interface
1822
RA-1822-AC
RA-1842-AC
RA-1822-DC
RA-1842-DC
1×Console port
1×Console port
1×AUX port
1×AUX port
2×USB2.0 interface
2×USB2.0 interface
2 × 10/100M
Ethernet port
ZTE Confidential Proprietary
1842
fast
2 × GE
Combo
port
(10/100/1000M electrical interface
3
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
Description
1822
1842
or 1000M SFP module)
Number of interface card slot
2
4
Internal AIM slot number
1
2
Internal extended Switch slot
Non-support
1
CPU type and main frequency
RISC 266Mhz
RISC 400Mhz
BootRom
512k
1M(dual Bootrom)
NVRAM
256k
512k
FLASH
32MB
64MB
SDRAM(default)
256M SDRAM
256M DDR
SDRAM(maximum)
512MB
2GB DDR
Forwarding capability
75kpps
150kpps
Capacity of route forwarding
table
64K/256K
64K/256K
MPLS VPN
64K/256K
64K/256K
Dimensions (W×D×H)
442×44×320mm
442×86.1×420mm
Weight
5kg
10kg
Power supply
AC rated pressure100 ~ 240V, AC maximum pressure 90264V;
Maximum power consumption
150W
DC rated pressure -48V,DC maximum pressure
ZTE Confidential Proprietary
-40~-57V
240W
4
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
Table 3
Key Parameters of ZXR10 2800 series routers
Description
2842
2884
RA-2842-AC
RA-2884-AC
RA-2842-DC
RA-2884-DC
1×Console port
1×Console port
1×AUX port
1×AUX port
2×USB2.0 interface
2×USB2.0 interface
2×GE
Combo
port
(10/100/1000Melectrical interface or
1000M SFP module)
2×10/100M
fast
Ethernet
port
(electrical interface) + 2×GE Combo
port (10/100/1000Melectrical interface
or 1000M SFP module)
Number
of
interface card slot
4
8
AIM slot number
2
2
Internal extended
Switch slot
1
1
CPU type and main
frequency
RISC 533Mhz
RISC 833Mhz
BootRom
1M(dual Bootrom)
1M(dual Bootrom)
NVRAM
512k
512k
FLASH
64MB
64MB
SDRAM(default)
256M DDR
256M DDR
SDRAM(maximum
)
2GB DDR
2GB DDR
Forwarding
capability
220kpps
280kpps
Capacity of route
forwarding table
128k/256K
128k/256K
MPLS VPN
128k/256K
128k/256K
Dimensions
(W×H×D)
442×86.1×420mm
442×130.5×420mm
Weight
10kg
15kg
Model
Fixed interface
Power supply
Maximum power
consumption
ZTE Confidential Proprietary
AC rated pressure100 ~ 240V, AC maximum pressure 90-264V;
DC rated pressure -48V,DC maximum pressure
240W
-40~-57V
260W
5
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
Table 4
Key Parameters of ZXR10 3800 series routers
Description
3844
3884
RA-3844-AC
RA-3884-AC
RA-3844-DC
RA-3884-DC
1×Console port
1×Console port
1×AUX interface
1×AUX interface
2×USB2.0 interface
2×USB2.0 interface
2×10/100M
fast
Ethernet
port
(electrical interface) + 2×GE Combo
port (10/100/1000Melectrical interface
or 1000M SFP module)
2×10/100M fast Ethernet port (electrical
interface) + 2×GE Combo port
(10/100/1000Melectrical interface or
1000M SFP module)
Number
of
interface card slot
4
8
AIM slot number
2
2
Internal extended
Switch slot
1
1
CPU type and
main frequency
RISC 1Ghz
RISC 1 Ghz
BootRom
1M(dual Bootrom)
1M(dual Bootrom)
NVRAM
512k
512k
FLASH
64MB
64MB
SDRAM(default)
256M DDR
512M DDR
SDRAM(maximu
m)
2GB DDR
2GB DDR
Forwarding
capability
400kpps
600kpps
Capacity of route
forwarding table
256K
256K
MPLS VPN
256K
256K
Dimensions
(W×H×D)
442×86.1×420mm
442×130.5×420mm
Weight
10kg
15kg
Maximum power
consumption
240W
260W
Model
Fixed interface
Power supply
1.2.3
5
AC rated pressure100 ~ 240V, AC maximum pressure 90-264V;
DC rated pressure -48V,DC maximum pressure -40~-57V
System Features
•
Link-layer protocols supported: ETHERNET, PPP, MPPP, Frame Relay,
HDLC, IPoA, etc.
•
Network layer protocol supported: IPv4/IPv6 dual stack
•
Transport layer protocol supported: TCP,UDP, etc
ZTE Confidential Proprietary
6
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
•
Routing protocols supported: RIP/RIPng, OSPFv1/v2/v3, IS-ISv4/v6,
BGP4/BGP4+, etc.
•
Application-layer protocols supported: Telnet, FTP, TFTP, etc.
•
Security applications supported: ACL-based firewall, IPSec, anti-DOS attack,
uRPF and policy routing etc.
•
Support 802.1Q
•
Network-layer control applications supported: NAT, NAT-PT, IPv4/IPv6 ACL
etc.
•
Network management protocols supported: SNMPv1/v2/v3
•
QoS support: DiffServ QOS model, IPv4/IPv6 QOS
•
Multicast support: IGMP, DVMRP, PIM-DM, PIM-SM
•
MPLS support: LDP, MP-BGP/MPLS VPN
•
Tunneling protocols supported:GRE, L2TPv1/v2 etc.
•
Supports Radius Client
•
Supports DHCP Relay/DHCP Server
•
MPLS L2 VPN supported: VPWS, VPLS, Multi-VRF
•
AUX supported: remote maintenance
•
Supports LFAP
•
NetNumen unified network management system with GUI interface supported
•
In-band and out-of-band network management supported
5
10
15
20
1.2.4
25
30
35
Types of Network Interface
•
8-port channelized/non-channelized E1 interface card (support balanced and
unbalanced connections)
•
8-port channelized/non-channelized T1 interface card
•
4-port channelized/non-channelized E1 interface card (support balanced and
unbalanced connections)
•
4-port channlized/non-channelized T1 interface card
•
2-port channelized/non-channelized E1 interface card (support balanced and
unbalanced connections)
•
2-port channelized/non-channelized T1 interface card
•
1-port channelized/non-channelized E1 interface (support balanced and
unbalanced connections)
•
1-port channelized/non-channelized T1 interface card
•
1-port non-channelized POS3 interface card
•
1-port 10/100Mbps Ethernet interface card supporting optical interface
•
2-port 10/100Mbps Ethernet interface card
ZTE Confidential Proprietary
7
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
•
1.2.5
1-port gigabit Ethernet interface
Operating Envirnoment
Table 5
Operating Envirnoment of ZXR10 ZSR router
Temperature
Short-term
envirnoment
15~30℃
-5~40℃
working
Long-term
envirnoment
40~65%
working
Short-term
working
envirnoment
10~90%
AC or DC power supply can be provided as per different requirement. For some
series, dual power supplies are supported.
5
1.3
Technical Advantages
1.3.1
Modular System Architecture
ZXR10 ZSR supports the integration fixed interface and modular interface cards in
order to meet users’ requirement for performance and network interfaces. ZXR10
ZSR can provide up to 4 gigabit Ethernet interfaces as fixed interfaces and 8
expansion slots. The fixed interfaces provided by ZXR10 ZSR can meet users’ basic
requirements, while the expansion slots can provide customized services for users.
10
With modular design, each expansion slot of ZXR10 ZSR direct connection to all
switching bus within the system so that various services can be deployed without
any restriction. It helps to avoid many typical problems for products from other
vendors, such as too many types of interface modules and special restriction for each
slot.
ZXR10 ZSR provides 2 AIM slots and 1 Ethernet Switching slot for voice
processing feature enhancement, data encryption and Ethernet Switching. With
modular design for voice data processing module, Ethernet switching module and
data security encryption module, users can purchase corresponding modules as per
different demands. With the development of service application, users can enhance
the capability and performance of the entire system by upgrading the related
module(s), which makes the whole system more scalable.
15
20
25
Long-term working
envirnoment
Humidity
1.3.2
High Level of Integration
Compared with existing products in the industry, ZXR10 ZSR 18/28/38 integrates
more fixed interfaces and service application modules. ZXR10 ZSR 18 series
products integrate two 10/100Mbps fast Ethernet interfaces, and 28/38 series routers
can provide four 10/100/1000Mbps Ethernet Combo (optical / electrical) interfaces.
30
ZTE Confidential Proprietary
8
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
Figure 7 General architecture of ZXR10 ZSR intelligent integrated multi-service
router
The intelligent switching fabric V-BUS system of ZXR10 ZSR integrates multiple
system bus, including fast PCIx bus, CBUS, USB bus, Ethernet Switching bus and
TDM voice switching bus etc. With the support from intelligent switching fabric, all
these buses can help various service modules to implement fast forwarding
seamlessly. ZXR ZSR system integrates RISC-based packet processing engine,
hardware data encryption/acceleration engine, Ethernet switching engine, QoS
engine, application service engine and voice processing engine, etc. These engines
and service units which connect to each other provide users with effective and
secure Triple-Play services of Data, Voice, and Video simultaneously.
5
10
1.3.3
Embedded with a hardware-based encryption acceleration engine, ZXR10 ZSR can
provide users with high-performance IPSec data encryption at a low cost. The
embedded hardware-based encryption engine, designed specifically for the data
forwarding engine of ZXR10 ZSR, offers users with effective IPSec encryption
features, including voice encryption etc. Via ZXROS software and the embedded
hardware-based encryption acceleration engine, it supports encryption/decryption of
data and voice, IPSec IKE negotiation, encryption algorithms including DES-CBC,
3DES-CBC, AES-CBC, public key generation algorithms including RSA, DH, as
well as signature algorithms such as MD5, SHA-1, HMAC-MD5 and HMAC-SHA1, which can guarantee the information security for government and financial
institutes.
15
20
25
1.3.4
Convergence of Narrowband and Broadband
ZXR10 ZSR provides users with rich interface types and interface rates, including
low-speed synchronous/asynchronous serial interface, high-speed synchronous/
asynchronous serial interface, E1/CE1, E3/CE3, T1/CT1, T3/CT3, OC-3/STM-1c
POS, fast Ethernet interface and gigabit Ethernet interface. With the capability of
supporting different interface speed ranging from low-speed V24 (asynchronous)
300bps to gigabit Ethernet 1000Mbps on the same platform, it helps users to
implement the convergence of narrowband and broadband.
30
1.3.5
35
Data Encryption Protection Feature
Convergence of IP and Non-IP
In addition to providing multiple IP-based services, ZXR10 ZSR, an intelligent
integrated multi-service router, allow users to reuse their traditional non-IP network
resources. To save users’ investment in fundamental network implementation and
traditional network operation, ZXR10 ZSR provides circuit emulation service to
ZTE Confidential Proprietary
9
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
realize transparent TDM over IP transmission. Users can deploy circuit emulation
service with ZXR10 ZSR at the edge of traditional network to connect any two
isolated traditional networks via IP network and tunneling service of ZXR10 ZSR.
Traditional services can be operated on IP network via deploying TDM over IP for
2G mobile networks and traditional fixed networks. On one hand, this method saves
transmission resources; on the other hand, it allows carrier-independent and
location-independent network operations.
5
Through circuit emulation service, ZXR10 ZSR implements the convergence of IP
and non-IP, which not only protects users’ investment in existing traditional network,
but also helps users to step forward to all-IP network.
10
1.3.6
ZXR10 ZSR intelligent integrated multi-service router provides complete QoS
features, including CAR, queuing technologies (PQ, CQ, WFQ, CBWFQ/LLQ),
congestion-avoidance technologies (RED, WRED), scheduling technologies (SP
WRR), and hierarchical QoS, etc.
15
ZXR10 ZSR supports DiffServ for differentiated service, providing IP QoS to meet
the requirements of traffic management; streams can be classified based on interface,
VLAN, 802.1p, source/destination IP address, TOS protocol type, and port number.
Traffic engineering based upon MPLS TE is supported for network traffic
engineering, making network operation more stable and offering carriers the most
profitable bandwidth; it supports RSVP protocol to provide sound SLA application.
20
1.3.7
Rich Security Features
ZTE intelligent security protection system --- “AMAT: Aggregates-Oriented MultiLevels Anomaly traffic Control System” --- implements automatic trigger of
anomaly traffic processing within enterprise network, intelligent identification of
network attacks, intelligent generation and activation of attack response policy to
ensure the security of enterprise network in a smart way. Via the integration of
AMAT system, firewall and IDS/IPS technology, ZXR10 ZSR platform can
intelligently realize network defense and protection.
25
30
Rich End-to-End QOS Support
1.3.8
Multi-Function and Multi-Service Platform
ZXR10 ZSR is designed based upon ZXROSTM general routing software platform
with ZTE self-owned intellectual property. This platform provides various router
features and services, supporting IPv4/IPv6 dual stacks, abundant routing protocols
e.g. BGP, PIM, MPLS and MPLS L2/L3 VPN technology, as well as QOS
applications, such as CAR, etc.
35
1.3.9
Dual IPv4/IPv6 Stacks
ZXR10 router series is a new generation router series from ZTE with the first
IPv4/v6 dual stacks certification in China.
It supports various IPv4/v6 protocols and applications, e.g. OSPFv3 routing protocol,
and IPv6 multicasting, IPv6 ACL, IPv6 QOS application, etc.
40
It supports multiple IPv6 transition mechanisms including manual tunnel
configuration, auto tunnel configuration, 6to4 tunnel, hardware-based NAT-PT etc.
1.3.10
Routing Protocol Software
Support RIP/RIPng,OSPFv1/v2/v3,IS-ISv4/v6,BGP4/BGP4+ routing protocols.
ZTE Confidential Proprietary
10
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
Support IGMP, DVMRP, PIM-DM, PIM-SM multicast protocols.
Huge system capacity and various protocol features enable the construction of largescale network.
Carrier-class routing protocol software with industry-leading stability.
Good scalability which enables system expansion to be in line with network
development.
5
1.3.11
MPLS Routing and Switching Technology
Support end-to-end MPLS VPN service via virtual routing technology.
Advanced virtual private wire service (VPWS) enables flexible and customized
services.
10
1.3.12
High-Performance NAT and NAT-PT Support
Support large-capacity NAT and IPv6 NAT-PT address mapping. Support
bidirectional NAT-PT.
1.3.13
15
Secure, Easy to Manage and Maintain
Carrier-class reliability with 1+1 power supply module redundancy.
Support VRRP.
Support 8-link simultaneous load sharing to ensure network reliability
Reliable routing software and security certification mechanisms of routing protocol
ensure secure operation of network.
20
IPSec support which ensures the security of user information and the irreversibility
of the operation.
Comprehensive policy-based packet filtering feature for avoiding DOS attack.
Permission-based command configuration for secure router operation.
25
Complete environmental sensor system, including overheating, etc.
Complete log management.
Convenient operation maintenance interface and multiple operation maintenance
modes.
ZTE Confidential Proprietary
11
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
2
H ARDWARE ARCHITECTURE
2.1
Overview
ZXR10 ZSR hardware architecture integrates voice, security, data compression, L2
switching, USB intelligent service and large-capacity network storage is a new
series of equipment introduced by ZTE with considerations for the market
requirement for service integration.
5
ZXR10 ZSR hardware is designed to realize different working modes as per users’
different configuration requirements via related hardware and software.
Compared to similar products on the market, ZXR10 ZSR not only implements
modular design, but also support wide range of interface speed from low-end
1200bit/s to high-end 1000Mbit/s, which can satisfy users’ requirement for
broadband upgrade.
10
The architecture and technology design is done with considerations for radiation and
EMC (Electromagnetic Compatibility) of modules and the entire equipment.
The three series of ZXR ZSR router are designed to be hardware compatible with
each other. Considering the trend towards network service integration nowadays,
powerful hardware foundation for equipment service expansion has been created via
advanced V-BUS architecture:
15
1.
20
2.
3.
25
4.
5.
6.
30
7.
2.2
35
Advanced V-BUS architecture ensures real-time wire-speed concurrency of
multiple services and solves system performance bottleneck of traditional
router caused by single bus.
Industry-leading high-performance RISC processor provides powerful drive to
network service processing.
Large-capacity and high-performance system memory and flash provides
network service deep processing with stable foundation
Embedded high-performance hardware security module fully meets users’
security requirements.
High-performance USB2.0 interface module is adopted in considering the
future application expansion.
Dual Bootroms and power supply modules are supplied to enhance maximum
equipment reliability.
Modular hardware architecture is completely compatible with the interface
cards of ZXR10 GAR series products, which saves users’ investment.
General Hardware Architecture
The core processing system of ZXR10 ZSR router adopts high-performance RISC
CPU and propriety ASIC architecture based upon V-BUS multi-bus architecture.
With modular design, it meets users’ different demands by corresponding hardware
or software. The relationships between all functional modules are as follows:
ZTE Confidential Proprietary
12
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
Figure 8 General architecture of ZXR10 ZSR intelligent integrated multi-service
router
5
10
15
20
According to system hardware architecture, ZXR10 ZSR series routers can be
divided into the following hardware processing modules:
Central Processing module: It adopts high-performance single-core/multi-core
CPU of up to speed of 1.5GHz. The system uses high-performance DDR2 Memory
module to provide memory throughput of up to 30Gbps to fit the requirements of
network service processing. With embedded hardware-based encryption module and
data compression module in CPU, the implementation of system encryption and data
compression service have been greatly improved. By using fast internal switching
between CPU and hardware modules, the bus bottleneck caused by using external
bus encryption and module compression can be avoided, which improves service
processing efficiency greatly.
Ethernet Switching Unit: The system is embedded with Ethernet switching unit to
offer non-blocking Ethernet switching capability of up to 24Gbps. Ethernet
switching unit enables the fast interconnection between all the slots avoiding interexchange between Ethernet modules that other equipment has. Ethernet switching
unit provides L3 to L7 services with a fast data tunnel via high-speed data bus and
system internal switching modules. It solves the problems in L2 data service
Data Security Processing Unit: The built-in data security processing center module
of the system can implement hardware-based IDS and IPS network security features.
25
Data Service Processing Unit: The system can implement hardware-based largecapacity IPv4/v6 NAT feature trough the embedded data service processing center
module.
Large-capacity Data Memory Unit: Via data interaction realized by high-speed
bus, large-capacity data memory unit module offers sufficient built-in memory space
ZTE Confidential Proprietary
13
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
for network security and service expansion applications, such as equipment log
alarm, anomaly traffic log, real-time memory of anomaly traffic, NAT log,
customized voice memory and FTP server, which solves local data memory
problems existing in traditional equipment.
USB Service Expansion Module: The system provides USB2.0 interface to reserve
adequate space for the service expansion.
5
Fixed Interface Module:
The basic system is designed to provide 2/4
10/100/1000M Ethernet WAN interfaces.
10
2.3
Architecture and Technology
2.3.1
181x/182x series:
1.
Dimensions of 181x/182x series
Overall dimensions:442mm(W)×45mm(H)×320mm(D);
Main board dimensions:260mm(W)×163mm(H)×2mm (D);
Rear board dimension:175(W)×40.3H)×3.5(D);
15
Power supply dimension:82(W)×35(H)×211(D);
Dust filter dimension:15(W)×45(H)×300(D)
2.
The entire equipment consists of cabinet, plug-ins, main board, power supply
module and dust filter, etc. as the figure below shows, as it is put on the table
independently; the bottom plane is designed with blocks.
20
Figure 9 The front view of 181x/182x series products
Figure 10 Top view of 181x/182x series products
25
Figure 11 Rear view of 181x/182x series products
ZTE Confidential Proprietary
14
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
3.
5
4.
10
5.
15
2.3.2
Interfaces for assembly: the overall interfaces include the interfaces linking
power supply and fan to main board, the interfaces for connecting power
supply and external power supply, and the interfaces that interface board and
main board used to link the interface of back plane. The cables consist of the
cables of power supply and fan.
In order to guarantee the reliability of the system, grounding design must be
implemented to the system. On the bottom board of the cabinet, there are earth
spikes designed for system grounding tandem. Out of the cabinet, there are M5
grounding nuts and ESD mounting hole on the left. In this way, the system
will not have electrostatic; also the reference potential of this system is the
same as other systems.
Security design of entire device: Cover and exterior materials have been
conducted good-for-security processing; after chassis fully deployed, only
ventilation slots are exposed, and therefore, preventing the rats etc from
getting into the chassis; for the bottom-board and cover of device, all of which
are provided with effective connections so as to guarantee the ESD function
after device is fully assembled.
184x/284x/384x/288x/388x Series
1.
184x/284x/384x series
Overall dimensions:442(W)×86.1(H)×420(D);
20
Rear board dimension:390(W)×76(H)×30.5(D);
Dimensions of fan plug-in box:40(W)×77.5(H)×392.5(D);
User board dimension:173.15(W)×20(H)×151(D);
Main board dimension: 350(W)×35(H)×242.5(D);
Dimension of the bridging card of the main board: 375.15(W)×20(H)×151(D);
25
Power supply dimension : 201(W)×43.3(H)×278(D);
2.
288x/388x series
Overall dimensions:442(W)×130.5(H)×420(D);
Rear board dimension::390(W)×120(H)×30.5(D);
Dimensions
of
fan
plug-in
40(W)×121.5(H)×392.5(D);
30
box
:
288x/388x
series
:
User board dimension: 173.15(W)×20(H)×151(D);
Main board dimension: 350(W)×35(H)×242.5(D);
Dimension of the bridging card of the main board: 375.15(W)×20(H)×151(D);
Power supply dimension : 201(W)×43.3(H)×278(D);
35
3.
40
184x/284x/384x and 288x/388x series is composed of system chassis, fan
module, network module, power module, system control and bridge module
and dust filters. The height of 184x/284x/384x series is 2U, and 4 interface
boards can be plugged in under maximum configuration. The height of
288x/388x series is 3U, and 8 interface boards can be plugged in under
maximum configuration. The front view of 288x/388x series overall system
structure is shown in Figure12. Its side view is shown in Figure13. The rear
view is shown in Figure14. And the layout from top is shown in Figure15 and
Figure16. It is divided into 2 layers. The upper 1U space is for system control
ZTE Confidential Proprietary
15
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
5
and bridge module. The lower 2U space is for power and interface board. Its
AC power supply is compatible with 100-240 voltage with the same in shape
and size as with DC power supply, where AC power supply can be
interchanged with DC power supply and vice versa. Fan module layout is
shown as Figure13. Considering the router may or may not be mounted in
rack, flanges and blocks are pre-packaged as accessories. 4 blocks need to be
installed at the bottom of the desktop. When put on shelf, they need to be
installed with flanges on the sides. Installation method is decided based on
whether they are desktops or put on shelf.
10
Figure 12 The front display of 184x/284x/384x series entire equipment
Figure 13 The side view of 184x/284x/384x series entire equipment
15
Figure 14 The back display of 184x/284x/384x entire equipment
ZTE Confidential Proprietary
16
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
Figure 15 The top display of 184x/284x/384x entire equipment (up layer)
Figure 16 The top display of 184x/284x/384x entire equipment (down layer)
ZTEÖ Ð Ë
ZXR10 3880
5
Figure 17 184x/284x/384x series fan module
4.
In order to guarantee the reliability of the system, grounding design must be
implemented to the system. On the bottom board of the cabinet, there are earth
ZTE Confidential Proprietary
17
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
5
10
5.
spikes designed for system grounding tandem. Out of the cabinet, there are M5
grounding nuts and ESD mounting hole on the left. In this way, the system
will not have electrostatic problem, also the reference potential of this system
is the same as other systems.
Security design of entire device: Cover and exterior materials have been
conducted good-for-security processing; after chassis fully deployed, only
ventilation slots are exposed, and therefore, preventing the rats etc from
getting into the chassis; for the bottom-board and cover of device, all of which
are provided with effective connections so as to guarantee the ESD function
after device is fully assembled.
ZTE Confidential Proprietary
18
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
3
KEY SERVICES AND FEATURES
DESCRIPTION
3.1
ZXR10 ZSR Network Address Translation(NAT)
Network address translation (NAT) can translate an IP address used in one network
into a different IP address in another network. Usually, NAT is used to map IP
addresses used in private network or local enterprise network into one or multiple
addresses in public network or global internet. The features of NAT are:
5
10
3.1.1
25
Restrict the number of IP address requiring IANA registration used by private
network.
•
Save global IP address space required by intranet (for example, one
organization can use a single IP address for communication on internet)
•
Keep the confidentiality of LAN as the inner IP is not for public.
For using NAT, local network would be assigned as internal network, while the
global internet would be assigned as external network. In addition, ZXR10 routers
also support port address translation (PAT) for dynamic or static binding of port
address.
15
20
•
Translation of Internal Source Address
When communicating to external network, this feature can translate internal IP
address into a global IP address from an IP address pool. The following methods can
be used to configure static or dynamic internal source address translation
1. Static translation creates one-to-one mapping between internal local address
and internal global address. When an internal host should be accessed by a
specified external address, static translation will help the specified external
address to access the internal host.
2. Dynamic translation establishes dynamic mapping between internal local
address and the external address pool.
The following figure illustrates a NAT router translates an internal network source
address into external network source address.
ZTE Confidential Proprietary
19
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
Privat
e
Public
Source
Address
3
SA
2.2.2.
2
5
DA
1.1.1.
1
SA
1.1.1.
1
1
1.1.1.2
Internet
Host B
9.6.7.3
Public
interface
Private
interface
1.1.1.1
Destinatio
n Address
4
DA
2.2.2.
2
2 NAT table
Private local
IP
1.1.1.2
1.1.1.1
Public global
IP
2.2.2.3
2.2.2.2
Figure 18 The internal source address is translated into external source address
3.1.2
Internal Global Address Overlapping
The router can share one global address for multiple local addresses, for which the
mapping will be stored in the interal global address pool. When address overlapping
is configured, the router would keep appropriate information from higher-level
protocols (e.g. TCP or UDP port numbers) and translates the global address into
correct local addresses. When multiple local addresses are mapped to one global
address, the TCP or UDP port number of each host between local addresses is
distinguishable. The following figure shows corresponding NAT operation when an
inside global address is on behalf of multiple inside local addresses. TCP port
number is used for discrimination
5
10
Inside
1.1.1.2
Outside
Destination
IP
5
DA
1.1.1.
1
SA
1.1.1. Sourc
e IP
1
1
Source
IP
3
SA
2.2.2.
2
1.1.1.1
Protocol
TCP
TCP
2 NAT Table
Inside local
Inside
IP
global IP
1.1.1.2:172
2.2.2.2:102
3
4
1.1.1.1:102 2.2.2.2:102
4
5
Destination IP
4
DA
2.2.2.
2
Host B
9.6.7.3
Internet
4
DA
2.2.2.
2
Destination IP
Outside
global IP
6.5.4.7:23
9.6.7.3:23
Host B
6.5.4.7
Figure 19 Internal global address overlapping
15
3.2
ZXR10 ZSR Access Control List
Access control list is used to permit or reject packet based on criteria configured.
The packet filtering criteria determines the type of access control list. Packet
filtering can be defined based on the following conditions:
20
•
Source IP address
•
Destination IP address
ZTE Confidential Proprietary
20
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
•
Source port number
•
Destination port number
•
Type of service (TOS)
Highlights of ZXR10 ZSR ACL feature are:
5
•
For upper-layer protocols, it filters source and destination addresses and
supports multiple filtering conditions;
•
For lower-layer forwarding, it defines the maximum and minimum threshold
for source and destination addresses, so flows within this exclusive range can
be forwarded. By using the same scope for restricting all ports on the same line
card, it allows the lower-layer microcode software to be executed efficiently;
•
Support three types of access control list: standard access control list, extended
access control list and lower-layer IP-forwarding access control list;
•
Currently, name-based access control list is not yet supported, only numberbased access control list is support. Access control lists numbered from 1 to
199 are standard access control lists; Number <100-199> ones are extended
access lists, and number <200-209> ones are lower-layer IP-forwarding access
control lists.
10
15
3.2.1
20
Features and Basic Format of Access Control List
1. Standard access control list
Standard access control list is only allowed to filter source address, and features are
limited.
The basic format of standard access control list is:
(no) access-list list-number {permit|deny} source [source-wildcard]
25
30
The list-number is from 1 to 99, which indicates this access control list is a numberbased standard access list.
The key words “permit” and “deny” are used to show if packets that fits access
control list should be permitted to pass the interface or to be filtered.
The source address is the IP address of the host or a subnet in dotted decimal
notation. In practice, IP address in subnet mode is based using wildcard mask.
Source-wildcard, the wildcard mask of source address, has the opposite working
mechanism to subnet mask, i.e. binary “0” refers to a “matched” condition, and
binary 1 means an “unconcerned” condition.
2.
35
Extended Access Control List
Extended access control list permits the filtering of source address, destination
address and data in application transmission.
The basic format of extended access control list is:
(no) access-list list-number {permit|deny} protocol source source-wildcard
destination destination-wildcard
40
The list-number is from 100 to 199, which shows this access control list is a
number-based extended access list.
The key words “permit” and “deny “are used to show if packets that fits access
control list should be permitted to pass the interface or to be filtered.
ZTE Confidential Proprietary
21
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
Protocol defines the protocol type that requires filtering, for example IP, TCP, UDP,
and ICMP, etc.
The features of source and source-wildcard address are the same as the features
listed in the standard access control list.
The destination address is the IP address of a host or a destination subnet in dotted
decimal notation. In practice, the IP address in subnet mode should be used based
using wildcard mask.
5
Destination-wildcard, the wildcard mask of destination address, has the opposite
working mechanism to subnet mask.
10
3.2.2
Implementation of Access Control List
For router interface, a configured access control list will only take effect when it is
applied on an interface. As data flow passing an interface is bidirectional, the access
control list should be adopted on the interface in one specific direction, which is
egress direction (i.e data flow moves away from router) or ingress direction (i.e. data
flow enters router)
15
There are three procedures for implementing access control list on an interface:
1.
2.
3.
Define access control list
Define the interfaces on which the access control list will be implemented
Define the direction in which the access control list will be implemented on
the interface.
While using ACL, firstly the type of ACL is classified via ACL number, then
packets are compared with the configured ACL to see if the packets are permitted to
pass through the interface. The rule of ACL processing is, beginning items are given
the highest priority, in other words, as per the sequence of access control list. The
processing will stop when there is one item matching to the configured control list.
Therefore, the sequence is very important when configuring access control list, and
items with high priorities should be put in the beginning. If there is an exact match
for the packet, it will be permitted or denied to pass through the interface according
to the specified fields “permit” or “deny”. If there is no exact match for the packet, it
will follow the default filtering principle, i.e. this unmatched packet will be denied
to pass through the interface.
20
25
30
3.3
35
40
45
ZXR10 ZSR V-Switch
In this way of “Router + BAS” networking, routers have two functions: one is to
forward PPPoE data packets to BAS equipment; the other is to perform data
aggregation for providing large customers’ access (VPN), QoS, NAT and multicast
services. Therefore, ZXR10 ZSR implements data packet L2 transmission via static
V-Switch forwarding. The advantages of V-Switch are as follows:
•
As L2 packets can pass routers selectively, networking design can become
more flexible.
•
Compared with Ethernet switch, V-Switch can limit broadcast packets.
•
As VLAN ID is changeable, the planning of MAN VLAN can be more flexible.
The equipment implements L2 packet switching via specified port as per the
forwarding table created based on configuration in a specified format. This specified
format refers to VLAN ID modification, untagging a layer of VLAN ID, and tagging
a layer of VLAN ID, etc. ZXR10 ZSR can encapsulate VLAN packets in
ZTE Confidential Proprietary
22
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
ETHERNET, POS, E1, so it supports VLAN switching over ETHERNET, POS and
E1.
3.3.1
Transparent Transmission of PPPoE Packet
As the following figure shows, fei_1/3 interface of ZXR10 ZSR connects with client
end of BAS, and fei_1/4 interface links to network end of BAS. The fei_1/1
interface of ZXR10 ZSR links to PPPoE user, and fei_1/2 interface links to private
line user. VLAN ID of PPPoE user is ranging from 10 to 19, and the VLAN IDs of
BAS users are from 20 to 29; the VLAN IDs of private line users are from 30 to 31.
5
Internet
ZXR10
ZXR10
Fei_1/4
Fei_1/3Fei_1/1
BAS
Fei_1/2
Switch
PPPoE
Switch
PPPoE
Leased line
Leased line
Figure 20 V-Switch implements transparent transmission of PPPoE packet
10
Via V-Switch feature, PPPoE user’s PPPoE authentication message can be
transferred between BAS and Switch.
3.3.2
15
20
25
Untagging and Tagging a Layer of VLAN
AS the following figure shows, ZSR-1 links to many switches, and each switch has
many VLANs. However, there is only one link between ZSR-1 and ZSR-2, but it
has to guarantee all PPPoE users’ authentication messages can reach BAS. At this
moment, packets from FEI_1/1 and FEI_1/2 can be encapsulated with another layer
of VLAN ID, i.e. QinQ encapsulation, for example, the VLAN ID of packets from
FEI_1/1 is (1-4095), after encapsulation, VLAN ID changes to ((1,1)---(1,4095).
The VLAN ID of packets from FEI_1/2 is (1-4095) which will change to ((2,1)--(2,4095)) after encapsulation. When((1,1)---(1,4095)) received by ZSR-2 goes out
from FEI-1/3, it will untag the outer VLAN and return to (1-4095). The received
((2,1)---(2,4095)) will untag outer VLAN and return to (1-4095) while passing out
from FEI_1/3. in this way, ZSR-1 and ZSR-2 use one link to implement transparent
transmission of L2 packets of the two FE links.
ZTE Confidential Proprietary
23
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
Figure 21 V-Switch untags and tags a layer of VLAN
3.4
ZXR10 ZSR VPN
Virtual Private Network (VPN) refers to private network built on top of public
network. “Virtual” indicates that this is a logical private network. As VPN is used by
a specified enterprise or group, the resource of VPN is isolated from the lower-layer
public network. On the other hand, VPN provide sufficient security to prevent VPN
from external attacks.
ZXR10 ZSR series routers provide complete VPN features which offer reliable
security and service quality to branch offices, remote users, traveling staffs, partners
and headquarters.
5
10
ZXR10 ZSR series routers contain various features, including BGP/MPLS VPN, L2
MPLS VPN (VPLS/VPWS), L2TP VPN, IPSEC VPN, and GRE VPN.
3.4.1
15
20
ZXR10 ZSR VPWS
VPWS (Virtual Private Wire Service) is L2 VPN service based on interface
forwarding. It transfers L2 PDU data in an IP/MPLS backbone network to realize
emulated point-to-point service. The L2 transparent transmission of VPWS over
MPLS create a “one network with multiple services” service mode which changes
the tradition that L2 link can only be created over switching network. It enables
carriers to provide both L2 and L3 services in one MPLS network.
The following advantages can be obtained by providing VPWS feature:
•
A unified network supported by MPLS;
•
Enjoy the advantages of traffic engineering and QoS of MPLS network;
•
Make full use of existing network resource;
ZTE Confidential Proprietary
24
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
Created based upon MPLS network, VPWS provides high-speed transparent
transmission between a pair of ports from two routers. VPWS mainly consists of PE
router, label distribution protocol (LDP) and MPLS tunnel (LSP Tunnel)
As the figure shows:
5
Figure 22 VPWS networking
PE routers between CEs are used to create PW (Pseudo-wire). PE router contains
and maintains the link information of L2 transparent transmission circuit. PE routers
are responsible for tagging and untagging labels for common data packets from VPN
customers, therefore, PE routers must be edge label switching routers
10
The two ports used between two PE routers for implementing L2 transparent
transmission must be of the same type, for example, Ethernet VLAN, HDLC or PPP.
Each pair of this port is identified by an unique virtual channel identifier (VCID)
LSP tunnels over MPLS network should be pre-configured between the two PE
routers. LSP tunnel provides Tunnel Label for transparent transmission of data
between two PE routers. At the same time, direct label distribution protocol should
also be defined between the two PE routers to transfer virtual link information. The
most important part is to distribute VC label by matching VCID.
15
When data packet enters PE router via L2 transparent transmission port, PE routers
can find the corresponding tunnel label and VC label by matching VCID. PE routers
will tag two layers of label to the packet. The outer label is the tunnel label,
indicating the path from this PE router to the destination PE router; the inner label is
VC label, indicating the corresponding router port of VCID on the destination PE
router
Note the PE router should perform L2 status monitoring protocol for each port, for
example LMI of frame relay. When fault occurs, label distribution protocol is used
to remove path information, so that L2 transparent transmission will be disconnected
to avoid useless unidirectional data packets.
20
25
3.4.2
30
35
40
ZXR10 ZSR VPLS Feature
VPLS (Virtual Private LAN Service), a type of VPN, can implement multi-site
connections as a signaled bridge domain from a carrier’s IP/MPLS network.
Independent from the location, all customers within VPLS appears to be in the same
LAN. As VPLS uses Ethernet interface to link end-users, it simplifies the border of
LAN/WAN, which enables fast and flexible services. When using VPLS, customers
fully control routing information by themselves. What is more, because all routers
from a customer belongs to the same LAN in VPLS, a simplified IP addressing plan
can be done. Especially when compared with the networks composed by many
different point-to-point links, this advantage is even more obvious. The carrier can
also benefit form more simplified management of VPLS service.
The advantages of VPLS are:
•
By providing users with a dedicated virtual Ethernet broadcast domain, VPLS
enables the integration of the inner LAN and WAN (wide area network) within
the enterprise, which greatly lowers customer’ cost.
•
As a kind of L2 VPN, it is very flexible in networking.
ZTE Confidential Proprietary
25
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
•
For customers, the maintenance of network becomes very easy.
After setting up meshed LSP, VPLS instance of the specified PE can receive
Ethernet frame from customer station, and it encapsulates these Ethernet frame as
per MAC addresses, then sends them to a LSP. Similar to the MAC address learning
and forwarding mechanisms in a switch, PE creates MAC address table for each
VPLS instance. When customer’s Ethernet frame accesses PE, it will search for
destination MAC address in MAC address table. If the MAC address table contains
this MAC address, this data frame will be sent to LSP which can deliver this data
frame to remote PE. If there is no matched MAC address in this MAC address table,
this Ethernet frame will be replicated and broadcasted to all ports except the ingress
port of the VPLS instance. Once the port of one host containing this MAC address
responds, the MAC address table of this PE will be updated.
When PE encapsulates Ethernet frame in MPLS packet, the header of MPLS packet
contains two layers of labels, which forms a pseudo wire encapsulation format. The
outer label, namely Tunnel Label, is used to bearer MPLS LSP, and the inner label
that is VC Label is on behalf of virtual circuit, i.e. different VPLS traffic. As a result,
when destination PE equipment terminates LSP and pops up outer label, VC label
will be used to determine which VPLS instance traffic it belongs to.
10
15
20
25
3.4.3
35
As VPLS is a link-layer based VPN technology, it is transparent to L3
protocols. It can support all protocols on the network layer in a secure way.
VPLS, virtual private LAN service, its basic mechanism is to divided service
provider’s network into one or multiple LANs for different types of enterprises as
different VPNs, namely, VPLS domain. Each VPLS domain consists of a certain
number of PE. Create full-meshed MPLS LSP between PEs, and encapsulate L2
Ethernet frame via MPLS, then forward user’s Ethernet traffic between PEs through
MPLS, in this way, a point to multi-point Ethernet VPN is created.
5
30
•
ZXR10 ZSR L2TP VPN
L2TP (Layer 2 Tunneling Protocol) is a L2 tunnel protocol based upon point-topoint protocol PPP. L2TP mainly consists of LAC (L2TP Access Concentrator) and
LNS (L2TP Network Server). LAC supporting client-end L2TP is used to initiate
call, receive call and establish tunnel; LNS is the end of all the tunnels to terminate
all PPP flows.
LAC: L2TP Access Concentrator is a PPP-initiator system with L2TP protocol
processing capability. Usually, LAC is a network access server (NAS) for network
service access.
LNS: L2TP Network Server, the logical termination of PPP conversation, is used on
the PPP-end system for processing the software of L2TP protocol server.
The features of ZXR10 ZSR L2TP are:
As LAC equipment:
40
•
Support ID verification mechanisms, e.g. CHAP and PAP
•
Support Radius authentication
•
Support proxy authentication and secondary authentication
•
Support multiple protocols access, such as PPP access and PPPoE access.
As L2TP LNS equipment:
45
•
Support multiple tunnels
ZTE Confidential Proprietary
26
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
5
3.4.4
10
15
20
•
Support LNS redirection
•
Support tunnel hello and time close-up.
•
Support bandwidth control feature to provide bandwidth to each user.
•
Support L2TP + IP Sec
•
Support remote connection from PC using L2TP/IPsec VPN client software to
set up L2TP network.
ZXR10 IPSEC VPN
IPsec, a fundamental technology for IP security, creats a secure IP packet
forwarding tunnel by configuring certain policies between network peer entities. Via
IPsec technology, enterprises can create their Intranets and Extranets via public
networks, which effectively reduce the cost of network construction and operation.
In fact, IPsec has become the security standard of IP layer
IPsec is a complete security architecture consisting of control protocol (IKE), data
encryption authentication protocol (AH/ESP),,as well as other policy configuration
protocols etc. According to different IPsec applications, it can be divided into
transport mode and tunneling mode. Presently, IPsec is the optimal method to
guarantee IP security. IPsec technology is mainly used to create tunnel-based VPN
(Virtual Private Network). However, IPsec technology can do more than creating
VPN (IPsec also allows many applications in transport mode).
Compared with other VPN solutions, VPN of IPsec has the following features:
•
Data privacy protection: IPsec sender encrypts the packets before they are sent
to the public network.
•
Data integrity verification; IPsec receiver verifies the authentication of the
packets sent by the sender to ensure that the data is not tampered during the
transmission.
•
Anti data-replay: IPsec receiver can verify and refuse reproduced packets
•
Data source authentication: IPsec receiver authenticates the source address of
IPsec packets. This service is based on data integrity service.
•
Automatic key management and security association management: This ensures
that virtual network policies of the company can be implemented conveniently
and accurately on the extended network with a little or even no manual
configuration.
•
Network layer-based security protection: IPsec protects all data forwarded
between terminal sites no matter what type of network application is. IPsec can
actually “put” remote users virtually inside the enterprise network to provide
them with the same authority and operating function with those of users of
internal network.
•
Higher security level: IPsec is a end-to-end service which put any specific
requirement on the backbone network for bearing service-related functions.
IPsec requires properly installing and configuring IPsec cleint-side software
and access equipment at the remote access user-end, which will greatly
improve the security level because the access is controlled by specific access
25
30
35
40
ZTE Confidential Proprietary
27
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
equipment, user software, user verification mechanism and pre-defined security
rules.
•
Quick response: It can quickly response to market changes, and can be
deployed over any existing IP network. Users can use it at any location.
ZXR 10 ZSR switch series adopts kernel hardware encryption technology, which
improves the system encryption performance and provides good performance for
IPsec VPN function application.
IPsec VPN is implemented via two security protocols of AH (Authentication Header)
and ESP (Encapsulating Security Payload). ZXR 10 ZSR router series can provide
IPsec with automatic negotiation key exchange; establish and maintain security
association service via manual key configuration or IKE (Internet Key Exchange) to
simplify the usage and management of IPsec.
5
10
AH (Authentication Header) is packet header authentication protocol. The functions
it provides include data source authentication, data integrity check and packet replay
protection. AH protocol by itself does not encrypt data packets.
15
ESP (Encapsulating Security Payload) protocol can provide not only authentication
function but also encryption function. It not only provides authentication function
basically similar to all functions of AH protocol, but also provides IP packet
encryption function, which can improve the privacy of data packets
IKE performs dynamic negotiation with SA on behalf of IPsec and updates the
SADB database. IKE uses two phases of ISAKMP. In the first phase, IKE security
association is established; in the second phase, this fixed security association is
utilized to negotiate specific security association for IPsec. The final result for IKE
exchange is an authenticated key and security service based on mutual agreement,
which is called “IPsec SA (IPsec security association)”.
20
25
The authentication algorithms supported by ZXR10 ZSR router series are:
1.
2.
30
HMAC-MD5: MD5 produces 128 bit information hash from any data input of
any length.
HMAC-SHA-1: SHA-1 produces 160bit information from any data input with
of length less than 264 bit.
The encryption algorithms support by ZXR10 ZSR router series are:
1.
2.
3.
35
40
45
DES (Data Encryption Standard): Encrypt a 64bit clear text block using a
56bit key.
3DES (Triple DES): Encrypt a clear text using three 56bit DES key.
AES (Advanced Encryption Standard): ZXR10 ZSR implements the AES
algorithm for key length of 128bit/192bit/256bit.
3.5
Security Function of ZXR10 ZSR
3.5.1
TCP monitoring and interception function
DoS (Denial of Service) attack is a common attacking method in the network used
by an illegitimate user to consume all or too much network resource via legitimate
service requests, which will make the requests and services of other legitimate users
cannot be satisfied; and creates network congestion or the resource of the attacked
host to be fully consumed.
Based on consequences caused by typical DoS attacks, they can be divided into the
following two types: resource depletion (grab and occupy resource) and resource
ZTE Confidential Proprietary
28
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
5
10
overload (too much network bandwidth is grabbed and occupied). SYN flooding is a
kind of resource depletion attack. It does so by sending out large quantity of halfopened TCP sessions which cannot build up three-way handshake. Since the host
needs to allocate a time to monitor each TCP connection, once it encounter SYN
flooding attacks, it will need to maintain large quantity of half-opened sessions and
allocate resource and monitor in a short time, which will make the host unable to
work normally.
TCP interception is a network security protection mechanism created to defense
SYN Flood attacks. It can provide functions of monitoring, statistics, and alarm etc.
to ensure that the protected resource is working well.
SYN Flood is one of the most effective and popular way of DoS attack. It takes
advantage of the defect of three-way handshake mechanism in TCP and send large
quantity of SYN connecting requests with false source addresses to the targeted host,
in order to consume the resource of target server.
15
TCP interception module of ZXR10 ZSR router series has two working modes:
interception mode and monitoring mode. They can be freely configured by the users.
The principles of these two working modes are as follows:
1.
20
25
Interception mode
In interception mode, when ZXR10 ZSR router series receives TCP connection
requests from external network to the protected internal server, it will save them
without forwarding them to internal server immediately. It will generate a TCP
connection record and ZSR will respond to the TCP connection request on behalf of
the protected internal server. If the request put forward by an external host is a
normal one, an acknowledgement packet will be sent after ZXR10 ZSR router series
ACK packet is received to complete three-way handshake. If the request put forward
by an external host is a SYN attack, acknowledgement packet will not be sent.
Figure 23 ZXR10 ZSR series TCP interception module working principles figure (1)
30
If the access from the external network is a normal one, ZXR10 ZSR router series
will again use the saved TCP connection request and use itself on behalf of the
external server to connect to the protected internal server to build TCP connection
by three-way handshake. When the connection is successful, ZXR10 ZSR router
series still keep the TCP connection records, however the recorded TCP state will
change.
ZTE Confidential Proprietary
29
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
Figure 24 ZXR10 ZSR series TCP interception module working principles figure (2)
5
10
If the access from an external host is a SYN attack, ZXR10 ZSR router series will
delete the TCP connection record if it hasn’t received acknowledgement packet from
external host after waiting for it for a while. In this way internal network server will
not receive the half-open TCP connections caused by SYN attack packets.
The number of TCP interception permitted by the router is limited. If the current
connections are all full load (suppose there are n sessions), when the n+1 TCP
connection packet arrives, in normal circumstance, the router will refuse this
connection request; when under attack, the router will delete the oldest half-open
item.
Figure 25 ZXR10 ZSR series TCP interception module working principles figure (3)
2.
15
20
monitoring mode
In monitoring mode, ZXR10 ZSR router series record TCP connections which meets
conditions configured by the user, which records the state of three-way handshakes.
Once it finds there is no acknowledgement packet for TCP connection from external
network host, ZXR10 ZSR router series will send reset packet for this TCP
connection to internal network server to ensure that internal network server would
not have too many TCP half-open connections waiting to be processed.
ZTE Confidential Proprietary
30
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
Figure 26 ZXR10 ZSR series TCP interception module working principles figure (4)
3.5.2
Aggregates-Oriented Multi-Levels Anomaly traffic Control System
(A.M.A.T)
5
A.M.A.T provides a kind of policy and method to detect and prevent anomaly traffic
from routers against DoS attack in a network. It uses traffic intensity aggregate and
anomaly mode aggregate technologies to perform flow statistics and classification
for anomaly IP streams. It has good detection efficiency and accuracy which enables
it to protect the users’ network.
10
With the continuous development of network, DoS attack which aims to consume
network bandwidth and resource are becoming popular, which brings large
economic loss to users. The flooding of DoS attack in the network has caused lots of
waste on network resource. Legitimate users can’t get access to normal services and
even the whole system will break down. A.M.A.T uses technology different from
traditional network security, it is implemented on the routers by detecting and
filtering the three kinds of attacking packets of TCP, UDP and ICMP in DoS attacks.
It can also flexibly control mutant TCP, UDP and ICMP attacks; effectively protect
users from the maclicious traffic.
15
20
25
30
Aiming to improve the security ability of data network and routers, A.M.A.T
technology analyses the pattern of network traffic, and implements anomaly traffic
capture, analysis and filtering policy on the routers. A.M.A.T uses real-time analysis
strategy. The foreground collects the packets, and directly analyzes the data traffic
intensity aggregate and anomaly mode aggregate. This multi-level aggregate stream
analysis strategy based on target IP address further identifies aggregates with traffic
attack. It directly filters attacking traffic on the routers, effectively reduces
bandwidth wasted from attacking traffic, improves the utilization of the routers and
network bandwidth, and protects the users’ network.
A.M.A.T system can be divided into three sub-systems including: anomaly traffic
identification, automatic generation of anomaly traffic classification rules, and
anomaly traffic matching and rejecting method implementation. The structure is
shown in the following figure:
ZTE Confidential Proprietary
31
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
Figure 27 A.M.A.T system principles
1.
5
10
15
20
25
Anomaly traffic identification
This sub-system performs packets sampling for different environments, and
performs address aggregate via traffic intensity aggregate, enhancement algorithm
and CUSUM algorithm. This sub-system uses advanced identification algorithm,
and history information table to increase the accuracy of attack identification, and at
the same time uses anti-jitter algorithm together with address aggregate algorithm. It
uses accumulated value to judge the anomalies and improve its identification ability
of impulse attack.
2. Anomaly traffic classification
This sub-system mainly includes aggregate mode design, anomaly mode aggregate
algorithm, packets categorizing, and hash-based data management algorithm. Based
on statistic pattern for each protocol, multiple aggregate modes are provided for
anomaly traffic classification. Because it method is based on the statistic patterns.
this method has good resistance to various kinds of attacks. In fact, aggregate of
different protocols helps to create a separation for each protocol. That is to say,
attack against one protocol will not affect the traffic of other protocols. Several
kinds of different classification modes are provided for TCP, U\DP and ICMP
packets.
3. Anomaly traffic matching and rejecting
In “anomaly traffic classification” module, the attacker’s IP address is aggregated
via anomaly mode; the attacker’s IP address packets are counted; A.M.A.T rule is
analyzed, and the traffic is matched or rejected based on these rules. A.M.A.T rule is
a dynamic rule whose implementation results are continuously self-updated by the
system to well filter the anomaly traffic. For those anomaly traffic which cannot
form effective rules, the system will limit the rate of the attacking traffic.
ZTE Confidential Proprietary
32
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
4
OPERATION, ADMINISTRATION AND
M AINTENANCE (OAM)
4.1
Overview
As a telecom-class high-end router, ZXR10 ZSR supports complete OAM features,
which are implemented via the operation and NM module.
The Operation and NM module of the ZXR10 ZSR consist of operation and
maintenance, SNMP, alarm statistics and database subsystems. The database, as a
part of the operation and NM module, provide storage for data from other
subsystems; it also enables data active/standby synchronization and data
management features.
5
10
This chapter will introduce OAM functions implemented on ZXR10 ZSR as a
managed object in the network management system. The OAM functions include
simple network management protocol (SNMP), fault diagnosis, log management,
unified NM, and alarm management.
15
20
4.2
Simple Network Management Protocol (SNMP)
SNMP (Simple Network Management Protocol) is a protocol on application layer; it
is used to exchange management information between network equipments. It is a
part of the TCP/IP protocol suit; it is used to ensure the normal opreation of network
protocols and equipments. It enables the administrator to detect network problems
and make adjustment according to the commands exchanged between the client
terminal and the server. The SNMP runs on top of UDP.
Network management model of the SNMP comprises four key elements:
25
1.
2.
3.
4.
Management workstation
Management agent
Management information base
Network management protocol
The following figure shows the relationship among the four elements.
ZTE Confidential Proprietary
33
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
Figure 28 Management Model of the SNMP
SNMP will not provide any network information or allow modifications in the
configurations of network equipments without any kind of security. In fact, the
SNMP agent on the network equipment requires SNMP management workstation to
send a special community password together with each message. In this way, SNMP
agent can authenticate whether the workstation is authorized to access MIB
information. Such a command is called the SNMP Community.
Some SNMP agents can adopt Community in different security levels. For example,
management agent can define a community name; the workstation can use it to send
Get-Request and Get-Next-Request messages and to access some read-only MIB
information. At the same time, management agent can define a community name;
management workstation can use it to send Get-Request, Get-Next-Request and SetRequest messages and to access some MIB information requiring the reading and
writing authority. This mode of defining SNMP community names can further
improve the security of SNMP operations.
5
10
15
4.3
SNMP MIB (Management Information Base)
MIB is a set of information which adopts a hierarchical structure. Network
management protocols (such as SNMP) can be adopted to access the MIB. MIB is
consisted of managed objects and is identified by object identifiers.
Information described in SNMP MIB is of 8 types, including:
20
1.
2.
25
3.
4.
30
5.
6.
35
7.
8.
40
4.4
45
System: Describes the host or router operation system; it includes information
such as guided time of the server, description of running equipment,
equipment location and contact person.
Interface: Describes each network interface. Included items of MTU size,
transmission rate, number of packets discarded for various reasons, number of
transmitted and received bytes, interface type and interface descriptions.
Address Translation: Contains a table used to transform IP addresses to
specified addresses.
IP: Describes Internet protocol related information. Maintained information
includes default time-to-live value of IP packet, number of discarded data
packets, number of re-assembled data packets, and routing table.
ICMP: Describes information related to ICMP protocol; it contains various
counters that trace the number of control messages sent by ICMP.
TCP: Contains items including time-out value, connection number, current
sent and received connection window pointer, maximum number of parallel
connections, source and destination IP address using TCP, and failed
connection attempts.
UDP: Contains items including number of sent, discarded or received data
packets, and IP addresses using the UDP entity.
EGP: This protocol is adopted to exchange information between two
autonomous networks in Internet. Similar to other types, this MIB maintains
counters that record the number of sent and received EGP messages.
Remote Network Monitoring (RMON)
RMON is Remote Network Monitoring, which can monitor information such as
overall traffic of Ethernet and token ring networks. RMON is an important
enhancement for SNMP. In RFC, RMON is a MIB definition (RFC1757), and the
ZTE Confidential Proprietary
34
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
defined MIB has been further enhanced to MIB-II. In this way, overall traffic
information of each specified sub-network can be obtained.
ZXR10 RMON function module implements all functions of nine groups defined by
RFC1757. By properly configuring related functions, it can help network
administrators to master and analyze running status of the network, and get to know
the network alarm timely to maintain the network better.
5
ZXR10 ZSR RMON includes the following system-class functions:
1.
10
2.
15
3.
20
4.
5.
25
6.
7.
30
8.
35
9.
40
4.5
Statistics configuration: to monitor basic traffic information of a specified subnetwork. The traffic information indicates traffic in the sub-network during the
period from start to the time of query.
History configuration: Record traffic information on an specified sub-network
during a specified period. Generally in one sub-network we can configure a
history function with a short sampling period to see burst traffic changes of a
sub-network. We can configure a history function with a long sampling period
to see the long-term traffic state of the sub-network.
Alarm configuration: with corresponding event function, we can observe the
changes of specific variables. For example, if an alarm item is configured, an
alarm will be generated when more than 500CRC errors (i.e. threshold is 500)
occur in 5 minutes. If a corresponding event action is configured as sending
trap, then a trap will be sent to trap server when the above situation occurs.
Host statistics configuration: can collect the basic traffic information on each
host in specified sub-network.
HostTopN configuration: under the circumstance that corresponding host
statistics function is activated, top n hosts information listed according to the
variable of certain traffic can be observed during a period of time.
Host Matrix statistics configuration: can record the traffic information between
every two hosts in the specified sub-network.
Filter configuration: can observe the selected packets on specified interface or
sub-network. Filtering function includes two parts: filtering logic definition
and filtering channel definition. Filtering includes data filtering and state
filtering; whose logic is the same: implementing packets filtering. While the
channel comprises of a set of filtered definition and the corresponding
handling (such as counting, generating an event, etc.) by the channel when
packets go through the channel.
Capture configuration: can buffer packets which meet the filtering
requirements to be analyzed in details.
Event configuration: can record or/and send trap to deal with the alarm
information to allow network administrator to learn about the system situation
timely.
Statistics and Alarm Management Function
Statistics and alarm management system informs network administrators about
network and equipment operation information. It provides the following information:
45
1. Collect traffic data for network traffic analysis
2. Detailed log files
3. Various configuration and operation information
The system can save real-time statistics and alarms information. In case when the
router is failed, it can quickly find the cause and solve the problem. In warning
ZTE Confidential Proprietary
35
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
alarms, according to the requirement of the administrator and working with
diagnosis and testing program, it can diagnose failed alarm spots, implement testing
and record the testing for the reference of the administrator.
4.6
Log management mainly records configuration commands on the routers
implemented by users that logs on to the routers. It facilitates query of history
configuration commands on the router. This function can help to analyze fault
causes in the router and provide supports for system security.
5
In addition to record configuration command, operation log module of ZXR10 ZSR
also enables management on operation logs; it provides users with log addition
function; it also enables record query and storage according to user name, time, log
terminal number, and log address.
10
The addition function is that the system can guarantee the addition whenever user
wants to add an operation log. A key point in this function is that in case the
memory buffer is full, the system should actively release some spaces to ensure the
addition of current logs.
15
The log query function is used when the administrator is to trace the system
operations and configurations. It enables fuzzy search on operation logs and returns
the results to the administrator.
The storage function is to store the user configuration information and access the
previous configurations into the system after system restarting; in this way, the
continuity of configurations can be enabled.
20
For errors, the operation log module adopts the simple discarding mode. As the
operation log module only stores the operation log information specified by the user
while the user does not concern the storage result, the operation log module does not
return the error processing information to the user but simply discards the current
error.
In terms of testability, as the operation log module exists in the system as a unit,
basic unit testing methods can be adopted in testability design, including the module
interface test and the module boundary condition test. In specific applications, the
program schedules the operation module to implement testing on the operation log
module.
25
30
The operation log module does not guarantee the correctness of contents; it only
ensures the complete saving of configuration information of the users, having no
confirmation on the information contents. This can reduce the operational
association of the system so that the system is in the loose coupling state. The
security and scalability of the system can be guaranteed.
35
4.7
Unified NM Function
The unified NM function is to gather all data products of ZTE to be under the
management of a unified NM platform. This function is implemented via the
foreground software module and the background unified NM platform software
(NetNumen) of the data products.
40
4.7.1
45
Log Management Function
Foreground Software Module
The unified NM foreground software module of the ZXR10 ZSR is a sub-module in
the OAM module. It enables the obtainment of router configuration information via
SNMP. Via this module, the system can get to know network module operation
ZTE Confidential Proprietary
36
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
state, router resource usage, router operation alarm information, and router
environment information. Via private MIB files, the module provides a unified NM
software interface to the background, via which the background unified NM
platform software can manage multiple routers, obtain information or set commands.
The unified NM foreground software module provides two normalized interface:
SNMP operational interface and SNMP-TRAP operational interface.
5
4.7.2
10
15
20
25
30
35
Background Unified NM Platform (NetNumen)
ZTE NetNumen N31 data product NMS is a management platform with high
customization, telecom-class, and platform-crossing infrastructure. It is designed
with the bottom-up idea, providing the carrier with a scalable and high-performance
NMS to satisfy network developments and support the needs of each operation
system and platform. It provides a cross-platform web-based development platform
for NM application programs; and necessary infrastructure and a whole set of Javabased cross-platform development tools, frames, modules and cross-platform APIs
(programming interfaces). The NetNumen system caters to various requirements of
the users: telecom carriers and equipment manufacturers can establish the NE and
NMS; service providers can set up the network management and operation support
system (OSS); enterprises and independent software vendors (ISV) can set up
application programs to manage solutions.
The NetNumen system implements management of the IP equipments on the
backbone layer, convergence layer and access layer; it enables management of the
access servers, multi-service routing switch, routers, soft switching system and IP
telephone system of ZTE. The system covers the four layers in TMN management
hierarchy: the NE layer, NE management layer, NM layer and service management
layer.
The NetNumen system integrates various kinds of advanced technologies such as
Java Beans, JFC, XML, JMX, HTTP, JSP, JDBC, CORBA, SNMP, and TL1; it
establishes Web-based and convenient NM solutions; it also provides safe and
convenient information access mode. The system supports Solaris and Windows
NT/2000 operation systems; Functions enabled in the system include security
management, network view, network resource base, network events, alarm, MIB
browse, performance management, rack diagram, user log, strategy and operation
log.
Note: The NetNumen data product NMS is an independent product. It is
optional for the contract. For detailed introductions about the product, please
refer to the documentation of the “NetNumen Data Product Integrated
Network Management System---Technical Manual”, “NetNumen System
Installation Manual”, and “Netnumen_ZXR10 Operation and Maintenance
Manual”.
ZTE Confidential Proprietary
37
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
5
TYPICAL NETWORKING APPLICATION
5.1
ISP private line access from large enterprise
Figure 29 Private line access from large enterprise
As equipment in access layer, ZXR10 ZSR has various interfaces and supports
various link layer protocols.
5
The channelized/non-channelized E1 interface can implement N*E1 private line
connection and provide a good private line access platform for ISP together with
channelized POS3.
10
5.2
ISP Access from residential broadband areas
Figure 30 Access from residential broadband areas
15
As the aggregation router of broadband residential areas, ZXR10 ZSR provides
high-density FE interfaces and at the same time provides GE interface as up-link
interface. Together with ZTE Ethernet switch series it create a broadband residential
area solution.
ZTE Confidential Proprietary
38
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
5.3
Private networks such as big enterprise/government
information network and data communications
network (DCN) etc.
Figure 31 big enterprise/government information network and DCN
5
With various interfaces, several ZXR10 ZSR can be used to build up private
networks such as big enterprise/government information network, and data
communications network (DCN) etc via DDN private line with dial-up connection.
5.4
ZXR10 ZSR products can support L2TP networking solution not only by carriers,
but also deployed by the enterprises. It also supports the networking solution of
L2TP+IPsec.
10
5.4.1
15
20
L2TP function application
L2TP networking solution deployed by carriers
VPDN private line access network connection deployed by the carriers generally
adopts the two-level hierarchy of “enterprise – metro-level aggregation – provincelevel aggregation”; in which enterprise user access to local network, and is then
connected to provincial backbone network after aggregation as shown in the
following figure:
Figure 32 Topology figure for L2TP deployed by carriers
ZTE Confidential Proprietary
39
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
ZTE data products can provide complete solutions for carriers’ L2TP network
including enterprise VPDN gateway products, VPDN aggregation/access router of
various level, and core router and switch. ZTE data products support various kinds
of authentication and charging services.
5
10
5.4.2
L2TP networking solution deployed by the enterprises
With the improvement of enterprise users’ network security awareness, some large
enterprises adopt the solution of deploying L2TP network by themselves. There are
many kinds of existing L2TP VPN client-end software can be installed in PC. For
example, Microsoft provides L2TP/IPsec VPN Client software for free for its
existing operational system platform. ZTE data products can implement L2TP
network solution cooperating with related L2TP/IPsec VPN Client software.
Figure 33 Topology figure for L2TP deployed by enterprises
ZTE Confidential Proprietary
40
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
6
APPENDIX-ABBREVIATIONS
Abbr.
Full name
ABR
Area Border Router
ARP
Address Resolution Protocol
AS
Autonomous System
ASBR
Autonomous System Border Router
ASN
Abstract Syntax Notation
BIC
Bridge interface & Alarm monitor card
BGP
Border Gateway Protocol
BTSR
Back plane for Terabit Switch Router
BTSRD
Back plane for Terabit Switch Router D
CE1
Channelized E1
CHAP
Challenge Handshake Authentication Protocol
CIDR
Classless Inter-Domain Routing
COS
Class of Service
CRC
Cyclic Redundancy Check
CSN
Cryptographic Sequence Number
DDN
Digit Data Network
DNS
Domain Name System
EBGP
External Border Gateway Protocol
EGP
Exterior Gateway Protocol
FDDI
Fiber Distributed Data Interface
SFEC
Fast Ethernet Electric Card
SFEO
Fast Ethernet Optical Card
FIFO
First In and First Out
FPGA
Field Programmable Gate Array
FTP
File Transfer Protocol
HDLC
High-Level Data Link Control
ICMP
Internet Control Message Protocol
IETF
Internet Engineering Task Force
IGMP
Internet Group Management Protocol
IGP
Interior Gateway Protocol
IP
Internet Protocol
IS-IS
Intermediate System -to- Intermediate System
LAN
Local Area Network
LSA
Link State Advertisement
MAC
Media Access Control
MD5
Message Digest 5
MIB
Management Information Base
MTU
Maximum Transmission Unit
NIC
Network Information Unit
ZTE Confidential Proprietary
41
ZXR10 ZSR Intelligent Integrated Multi-service Router Technical Specification
Abbr.
Full name
NLRI
Network Layer Reachable Information
NMS
Network Management System
NP
Network Processing
OID
Object ID
OSI
Open Systems Interconnection
OSPF
Open Shortest Path First
PAP
Password Authentication Protocol
PCB
Process Control Block
POS
Packet over SDH
PPP
Point-to-Point Protocol
PRT
Process Registry Table
QOS
Quality of Service
RFC
Request For Comments
RARP
Reverse Address Resolution Protocol
RIP
Routing Information Protocol
RLE
Route lookup engine
RMON
Remote Monitoring
SDH
Synchronous Digital Hierarchy
SFC
Switch Fabric Card
SGE
Gbit Ethernet Electric Card
SCE1
Channelized E1 interface Card
SCE3
Channelized E3/T3 interface Card
SP3
OC-3c/STM-1c POS155 Interface Card
SP12
OC-12c POS Interface Card for SFP
SP48
OC-48c/STM-16c POS Interface Card
SMTP
Simple Mail Transfer Protocol
SNMP
Simple Network Management Protocol
TCP
Transmission Control Protocol
TFTP
Trivial File Transfer Protocol
TOS
Type Of Service
TELNET
Telecommunication Network Protocol
TTL
Time-To-Live
UDP
User Datagram Protocol
UPC
Ultra Protocol processor control card
VLSM
Variable Length Subnet Mask
WAN
Wide Area Network
WWW
World Wide Web
ZTE Confidential Proprietary
42
Download