No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

NE40E V800R010C10SPC500 Feature Description - Virtual Access 01

This is NE40E V800R010C10SPC500 Feature Description - Virtual Access
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Virtual Access Features Supported

Virtual Access Features Supported

Feature

Description

AP PnP

A master automatically detects and manages APs when APs go online, go offline, migrates, or restarts or when the master restarts. The virtual access solution supports AP PnP, which simplifies network O&M and management.

Unequal-cost load balancing for multiple links in a virtual access system

If multiple links exist between a master and AP and between APs, the links may be equal-cost or unequal-cost. A virtual access system uses the hash mode to balance loads among the links.

BFD

  • BFD for vaLSP session: used to quickly detect vaLSP faults. If the primary vaLSP fails, BFD triggers traffic to be switched to the backup vaLSP.

  • BFD for vaTunnel session: used to quickly detect vaTunnel faults. A vaTunnel is a TE tunnel that consists of a group of primary and backup vaLSPs. If both the primary and backup vaLSPs fail, BFD triggers traffic to be switched between the primary and secondary vaPWs.

  • BFD for Diameter session: used to quickly detect Diameter channel status changes. If the primary master fails, the secondary master uses BFD for Diameter to quickly detect the fault, enables the virtual access interface for the secondary vaPW, and triggers the secondary vaPW to become the primary vaPW.

  • Dynamic multicast BFD: A dynamic multicast BFD session is used to monitor the status of an internal communication interface. When the BFD module detects a fault, it triggers the internal communication interface to enter the BFD Down state. The interface then quickly detects the fault.

  • BFD for vaP2MP: used to quickly detect faults on the vaP2MP tunnel paths. In virtual access dual-homing networking scenarios, multicast AP replication and IGMP multicast dual-device hot backup are deployed. The AP chooses to receive the multicast traffic from the primary master in normal cases. If a BFD for vaP2MP session detects that the primary vaP2MP tunnel fails, the AP immediately chooses to receive multicast traffic from the backup vaP2MP tunnel, implementing rapid multicast service protection.

Planning an Explicit Path for a vaTunnel

You can flexibly specify the vaTunnel's paths used by vaPWs to evenly balance traffic in the virtual access system and improve service quality.

Virtual access Eth-Trunk

You can create a virtual access Eth-Trunk interface on a master and create a common Eth-Trunk interface on a CE, so that the CE can access an AP through the Eth-Trunk interface. The virtual access Eth-Trunk interface supports static LACP and manual load balancing modes.

Virtual Access EFM OAM

In virtual access scenarios, EFM OAM can be applied between a CE and AP that are directly connected to ensure the reliability and stability of connections between user and carrier networks.

VPWS

When deploying VPWS in a virtual access scenario, you must use virtual access interfaces (or sub-interfaces) as AC interfaces. Other configurations in a virtual access scenario are similar to those in a common scenario.

VPLS in BD access mode

Only VPLS in BD access mode is supported in a virtual access scenario. The deployment method is as follows: Configure a virtual access sub-interface to access a BD on a master, and then configure the BD to access VPLS.

L3VPN

You can deploy L3VPN in a virtual access scenario in the following two modes:

  • Bind a virtual access interface (or sub-interface) to a VPN instance on a master. The configuration method in this mode is the same as that for configuring a BGP/MPLS IP VPN in a common scenario.

  • Configure a virtual access sub-interface to access a BD on a master, and then bind a VBDIF interface to a VPN instance. When an AP is dual-homed to a primary and secondary master, deploy VRRP on the VBDIF interfaces of the primary and secondary masters. Create a VSI on the primary and secondary masters, bind the BD to the VSI, and create a PW for connecting the VSI on the primary and secondary masters. This mode achieves sub-second protection switching.

Multicast

When deploying Layer 2 or Layer 3 multicast services in a virtual access scenario, you must use virtual access interfaces (or sub-interfaces) as client-side service interfaces. Other configurations in a virtual access scenario are similar to those in a common scenario.

BD-based Fast Switching for Layer 2 Multicast Traffic

In a scenario where multiple vaLSPs or TE tunnel hot-standby protection is deployed between a master and an AP in a virtual access system, the master's EVC virtual access sub-interface is added to a BD and BD-based fast switching is enabled for Layer 2 multicast traffic. If the primary link fails when the master forwards Layer 2 multicast traffic to the AP, this master fast switches the Layer 2 multicast traffic to the secondary link.

Multicast AP Replication

In a virtual access scenario, you can enable multicast AP replication for Layer 3 multicast traffic. After multicast AP replication is enabled, virtual access P2MP (vaP2MP) tunnels are established between the master and APs. Multicast traffic is imported into the vaP2MP tunnels on the master, exported from the vaP2MP tunnels on the APs, and replicated based only on tunnel paths in the vaP2MP tunnels. After reaching the APs, multicast traffic is locally replicated for receivers. In this situation, the master does not need to replicate multiple copies of multicast traffic for each receiver, and therefore the load on the links between the master and APs is decreased.

Virtual Access Dual-Device Hot Backup

After virtual access dual-device hot backup is enabled, service control data on the primary master is backed up to the secondary master, implementing service continuity during a primary/secondary master switchover.

QoS

In a virtual access scenario, a master functioning as a centralized service control point completes all QoS service processing actions, including CAR, HQoS, and shaping. Behavior aggregate classification is enabled on the internal communication interfaces of an AP and master by default, and the EXP is used for traffic classification.

BRAS

A virtual access system supports Layer 2 IPoEv4/PPPoEv4, Layer 2 PPPoEv6/IPoEv6, static, and L2TP LAC users.

Frequency synchronization (synchronous Ethernet)

Virtual access supports the following frequency synchronization functions:

  • Configure an external clock source on a master so that the master keeps frequency synchronization with the external clock source.

  • Enable virtual access frequency synchronization on a master so that an AP keeps frequency synchronization with the master.

  • Configure frequency synchronization for an AP's external communication interface through a virtual access interface on a master so that the AP provides frequency synchronization for the access-side network.

You can deploy these functions to implement frequency synchronization on the entire network.

Time synchronization (1588v2)

Virtual access supports the following time synchronization functions:

  • Configure an external time source on a master so that the master keeps time synchronization with the external time source.

  • Enable virtual access time synchronization on a master so that an AP keeps time synchronization with the master.

  • Configure time synchronization for an AP's external communication interface through a virtual access interface on a master so that the AP provides time synchronization for the access-side network.

You can deploy these functions to implement time synchronization on the entire network.

Alarm and log management in a virtual access system

A master and AP record their own alarm information and independently send the alarm information to a network management system (NMS).

A syslog server can be specified on a master. A master and AP record their own log information and independently send the log information to the specified syslog server.

Translation
Download
Updated: 2019-01-03

Document ID: EDOC1100055053

Views: 1593

Downloads: 28

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next