Access Control Based On 802.1x (SRAN9.0 - 01)
Access Control Based On 802.1x (SRAN9.0 - 01)
Access Control Based On 802.1x (SRAN9.0 - 01)
Issue 01
Date 2014-04-30
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or
representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: support@huawei.com
Contents
2 Overview......................................................................................................................................... 4
3 Technical Description...................................................................................................................5
3.1 Operating Principle.........................................................................................................................................................5
3.2 Protocol Stacks............................................................................................................................................................... 6
5 Related Features...........................................................................................................................14
5.1 Features Related to Access Control based on 802.1x on the GSM Side...................................................................... 15
5.2 Features Related to Access Control based on 802.1x on the UMTS Side....................................................................15
5.3 LOFD-003015 Access Control based on 802.1x..........................................................................................................16
5.4 TDLOFD-003015 Access Control based on 802.1x.................................................................................................... 16
6 Network Impact........................................................................................................................... 17
7 Engineering Guidelines............................................................................................................. 18
7.1 When to Use Access Control based on 802.1x.............................................................................................................19
7.2 Required Information................................................................................................................................................... 19
7.3 Deployment.................................................................................................................................................................. 19
7.3.1 Requirements............................................................................................................................................................. 19
7.3.2 Precautions.................................................................................................................................................................21
7.3.3 Data Preparation and Feature Activation...................................................................................................................21
7.3.4 Activation Observation..............................................................................................................................................24
7.3.5 Deactivation...............................................................................................................................................................25
7.4 Performance Monitoring...............................................................................................................................................25
7.5 Parameter Optimization................................................................................................................................................ 25
7.6 Troubleshooting............................................................................................................................................................ 25
8 Parameters..................................................................................................................................... 26
9 Counters........................................................................................................................................ 28
10 Glossary....................................................................................................................................... 29
11 Reference Documents............................................................................................................... 30
1.1 Scope
This document describes Access Control based on 802.1x, including its technical principles,
related features, network impact, and engineering guidelines.
This document covers the following features:
l LOFD-003015 Access Control based on 802.1x
l TDLOFD-003015 Access Control based on 802.1x
Table 1-1 provides the definitions of base stations.
Separate-MPT A base station on which each mode uses its separate main control board.
multimode base For example, a base station configured with a GTMU and WMPT is
station called a separate-MPT GSM/UMTS dual-mode base station.
l Feature change
Changes in features of a specific product version
l Editorial change
Changes in wording or addition of information that was not described in the earlier
version
SRAN9.0 01 (2014-04-30)
This issue does not include any changes.
Editorial Added the descriptions about the feature and function None
change differences between different site types. For details,
see section 1.4 Differences Between Base Station
Types.
Feature Added the LTE TDD mode support the Access Control None
change based on 802.1x feature.
The LampSite base stations described in this document refer to distributed base stations that
provide indoor coverage. These base stations work in UMTS or LTE mode but not in GSM
mode.
The micro base stations described in this document refer to all integrated entities that work in
UMTS or LTE mode but not in GSM mode. Descriptions of boards, cabinets, subracks, slots,
and RRUs do not apply to micro base stations.
BTS3803E UMTS
BTS3902E UMTS
NOTE
The co-MPT and separate-MPT applications are irrelevant to single-mode micro base stations.
2 Overview
IEEE 802.1x is an IEEE standard for port-based network access control. It is part of the IEEE
802 group of networking protocols. With port-based network access control, the
authentication access equipment in the local area network (LAN) performs identity
authentication and access control on users or devices connected to its ports. Only the users or
devices that can be authenticated are allowed to access the LAN through the ports. Access
Control based on 802.1x prevents unauthorized users or devices from accessing the network,
which ensures transport network security.
Huawei base stations support Access Control based on 802.1x. The authentication is
unidirectional and is based on Extensible Authentication Protocol-Transport Layer Security
(EAP-TLS). That is, the authentication server performs unidirectional authentication on the
digital certificates of base stations. Figure 2-1shows the network topology for Access Control
based on 802.1x.
3 Technical Description
The functions of RADIUS and AAA servers are similar. This document uses the RADIUS server as an
example to describe Access Control based on 802.1x.
Figure 3-1 shows the operating principle of Access Control based on 802.1x.
NOTE
Port access entity (PAE) is a port-related protocol entity that processes protocol packets during an
authentication procedure.
A physical Ethernet port of the authentication access equipment consists of two logical ports:
one controlled port and one uncontrolled port:
During initial access, the base station is not authenticated, and therefore the controlled port is
in the unauthorized state. At this point, only EAPoL packets can pass through the
uncontrolled port and be sent to the authentication server. After the authentication server
authenticates the base station and the authentication access equipment authorizes the
controlled port, the controlled port becomes authorized and data from the base station can
pass through the controlled port in the authorized state. This process ensures that only
authorized users and devices can access the network.
Port-based access control can be based on a physical port (such as the MAC address) or a
logical port (such as the VLAN). Huawei base stations support only port-based access control
based on the MAC address. That is, the authentication message sent by a base station contains
the MAC address of the Ethernet port that connects the base station to the transport network.
If authentication succeeds, the authentication access equipment performs access control on
data flow based on this MAC address.
For details about IEEE 802.1x-based access control, see IEEE 802[1].1x-2004.
and the authentication access equipment, EAP data is encapsulated in EAPoL frames so that
the data can be transmitted in the LAN. Between the authentication access equipment and the
authentication server, EAPoL frames are re-encapsulated in EAP over RADIUS (EAPoR)
frames so that the data can be transmitted using the RADIUS protocol.
Figure 3-2 shows the protocol stacks for Access Control based on 802.1x.
Access Control based on 802.1x uses the EAP protocol for authentication. The EAP protocol
supports multiple authentication methods. Huawei base stations adopt unidirectional EAP-
TLS authentication, that is, the authentication server authenticates base stations using digital
certificates. The AM parameter specifies the authentication method used by IEEE 802.1x-
based access control.
In an IEEE 802.1x-based access control procedure, the base station sends its digital certificate
to the RADIUS server in an EAPoL frame. The RADIUS server authenticates the base station
by using the Huawei root certificate or the operator's root certificate.
For details about the EAP protocol, see RFC 3748.
For details about the EAP-TLS protocol, see RFC 2716.
This chapter describes the application of IEEE 802.1x-based access control on a base station.
Figure 4-1 Typical network topology for IEEE 802.1x-based access control
IEEE 802.1x-based access control of Ethernet ports can be activated by using the ACT
DOT1X command and deactivated by using the DEA DOT1X command. By default, IEEE
802.1x-based access control is activated on Ethernet ports of base stations before delivery.
queries whether IEEE 802.1x-based access control is activated on the Ethernet port that
connects the base station to the transport network. If IEEE 802.1x-based access control is
deactivated and authentication is not performed, the base station triggers an IEEE
802.1x-based access control procedure. Because the network uses IEEE 802.1x-based
access control, the DHCP Discover packet cannot pass through the authentication access
equipment, and therefore the DHCP procedure fails. The base station waits for the
authentication result. After the IEEE 802.1x-based access control succeeds, the base
station resends a DHCP Discover packet. After the DHCP procedure is complete, the
automatic base station deployment procedure starts.
For example, the main control board of the base station has an incorrect configuration
file, in which IEEE 802.1x-based access control is deactivated on the Ethernet port that
connects the base station to the transport network. In this case, the DHCP procedure
triggers the IEEE 802.1x-based access control procedure during automatic base station
deployment.
l If the network does not support IEEE 802.1x-based access control, and IEEE 802.1x-
based access control is activated on the Ethernet port that connects the base station to the
transport network:
The base station initiates the IEEE 802.1x-based access control procedure for three times
at an interval of 25 seconds. If the base station does not receive any response from the
network, the base station determines that the network does not support IEEE 802.1x-
based access control. The base station then sends a DHCP Discover packet. The DHCP
Discover packet can pass through the authentication access equipment. After the DHCP
procedure is complete, the automatic base station deployment procedure starts.
NOTE
During automatic base station deployment by PnP, the IEEE 802.1x-based access control procedure uses
the preconfigured Huawei-issued device certificate of the base station for authentication.
The rest of this section describes automatic base station deployment by PnP in the preceding
three scenarios.
Scenario 1
Figure 4-2 shows automatic base station deployment when the network supports IEEE
802.1x-based access control and IEEE 802.1x-based access control is activated on the
Ethernet port that connects the base station to the transport network.
In the IEEE 802.1x-based access control procedure, the EAPoL-Start packet is a multicast packet and its
destination MAC address is 01-80-C2-00-00-03; other packets are unicast packets.
Scenario 2
Figure 4-3 shows automatic base station deployment when the network supports IEEE
802.1x-based access control but IEEE 802.1x-based access control is deactivated on the
Ethernet port that connects the base station to the transport network.
1. After the base station is powered on, it initiates an IEEE 802.1x-based access control
procedure. The base station resends the EAPoL-Start packet three times at an interval of
25 seconds but does not receive any response. Therefore, the base station determines that
the network does not support IEEE 802.1x-based access control.
2. The base station sends a DHCP Discover packet to the authentication access equipment.
3. After the DHCP procedure is complete, the automatic base station deployment procedure
starts.
l If the certificate used for SSL authentication in the configuration file is set to the
operator-issued device certificate, the IEEE 802.1x-based access control procedure uses
the operator-issued device certificate to authenticate the base station.
l If the certificate used for SSL authentication in the configuration file is set to the
Huawei-issued device certificate, the IEEE 802.1x-based access control procedure uses
the Huawei-issued device certificate to authenticate the base station.
l If the SSL authentication method is cryptonym authentication, by default the IEEE
802.1x-based access control procedure uses the Huawei-issued device certificate to
authenticate the base station.
NOTE
During base station deployment using a USB flash drive, the certificate used in the IEEE 802.1x-based
access control procedure is specified in the configuration file. Because the base station is preconfigured
with the Huawei-issued device certificate, the certificate for SSL authentication can be set only to
Huawei-issued device certificate in the configuration file. If the certificate for SSL authentication is set
to the operator-issued device certificate, the IEEE 802.1x-based access control procedure fails.
5 Related Features
Prerequisite Features
l GBFD-113526 BTS Supporting PKI
l WRFD-140210 NodeB PKI Support
l LOFD-003010 Public Key Infrastructure(PKI)
l TDLOFD-003010 Public Key Infrastructure(PKI)
l GBFD-118601 Abis over IP
l WRFD-050402 IP Transmission Introduction on Iub Interface
Impacted Features
None
Impacted Features
None
Impacted Features
None
Impacted Features
None
Impacted Features
None
6 Network Impact
System Capacity
No impact.
Network Performance
When the Access Control based on 802.1x feature is enabled, the time for base station
deployment by PnP is prolonged by about 75 seconds.
7 Engineering Guidelines
This chapter describes how to deploy the Access Control based on 802.1x feature in a newly
deployed network.
The Access Control based on 802.1x feature uses the Huawei-issued device certificate to
authenticate the base station. Therefore, the PKI feature also needs to be activated.
l If the customer requires that Access Control based on 802.1x use the Huawei-issued
device certificate to authenticate the base station, the PKI feature does not need to be
deployed in the network.
l If the customer requires that Access Control based on 802.1x use the operator-issued
device certificate to authenticate the base station, the PKI feature needs to be deployed in
the network. For details about how to deploy the PKI feature, see PKI Feature
Parameter Description.
7.3 Deployment
Before you activate the Access Control based on 802.1x feature, configure the PKI feature as
well as the related managed objects (MOs). For details about how to configure the PKI
feature, see the "Engineering Guidelines" section in PKI Feature Parameter Description.
7.3.1 Requirements
Other Features
For details, see 5 Related Features.
Hardware
NE Type Board Configuration Type of Port
Connecting to the
Transport Network
License
Feature ID Feature License License NE Sales
Name Control Control Item Unit
Item ID Name
Other Requirements
l An authentication server has been deployed in the network.
l The authentication server supports the EAP protocol defined in RFC 3748 and supports
EAP-TLS authentication.
l The authentication server is preconfigured with the Huawei root certificate. If the
customer requires that the operator-issued device certificate be used for authentication,
the operator' root certificate must be preconfigured on the authentication server.
l The authentication access equipment supports IEEE 802.1x-based access control and
EAP packet processing.
l The authentication access equipment supports port-based access control based on the
MAC address.
7.3.2 Precautions
None
Data Preparation
Table 7-1 lists the data that needs to be prepared before you activate the Access Control based
on 802.1x feature.
NOTE
"-" in Table 7-1 indicates that there is no special requirement for setting the parameter. Set the parameter
based on site requirements.
Table 7-1 Data to be prepared before activating the Access Control based on 802.1x feature
Port No. PN -
NOTE
l When deploying this feature on a multimode base station, activate the feature only on the Ethernet
port that connects the base station to the transport network. The data preparation and initial
configuration of the multimode base station are the same as those of a single-mode base station.
l When a base station is working normally, the certificate used by IEEE 802.1x-based access control
is the same as that used by SSL authentication. For details about how to configure the certificate for
SSL authentication, see the "Engineering Guidelines" section in SSL Feature Parameter
Description. If no certificate is configured for SSL authentication, IEEE 802.1x-based access control
uses the Huawei-issued device certificate by default.
Step 1 Run the MML command ACT DOT1X to activate Access Control based on 802.1x on the
Ethernet port that connects the base station to the transport network.
----End
Using the CME to Perform Batch Configuration for Newly Deployed Base
Stations
Enter the values of the parameters listed in Table 7-2 into a summary data file, which also
contains other data for the new base stations to be deployed. Then, import the summary data
file into the CME for batch configuration.
The summary data file may be a scenario-specific file provided by the CME or a customized
file, depending on the following conditions:
l The MOs in Table 7-2 are contained in a scenario-specific summary data file. In this
situation, set the parameters in the MOs, and then verify and save the file.
l Some MOs in Table 7-2 are not contained in a scenario-specific summary data file. In
this situation, customize a summary data file to include the MOs before you can set the
parameters.
For instructions about performing batch configuration for each base station, see the following
sections in 3900 Series Base Station Initial Configuration Guide.
Using the CME to Perform Batch Configuration for Existing Base Stations
Batch reconfiguration using the CME is the recommended method to activate a feature on
existing base stations. This method reconfigures all data, except neighbor relationships, for
multiple base stations in a single procedure.
Step 1 Choose CME > Advanced > Customize Summary Data File from the main menu of an
U2000 client, or choose Advanced > Customize Summary Data File from the main menu of
a CME client, to customize a summary data file for batch reconfiguration.
NOTE
Step 2 Export the NE data stored on the CME into the customized summary data file.
l For co-MPT multimode base stations: Choose CME > SRAN Application > MBTS
Application > Export Data > Export Base Station Bulk Configuration Data from the
main menu of the U2000 client, or choose SRAN Application > MBTS Application >
Export Data > Export Base Station Bulk Configuration Data from the main menu of
the CME client.
l For separate-MPT GSM-involved multimode base stations or GO base stations: Choose
CME > GSM Application > Export Data > eGBTS Bulk Configuration Data from
the main menu of the U2000 client, or choose GSM Application > Export Data >
Export eGBTS Bulk Configuration Data from the main menu of the CME client.
l For separate-MPT UMTS-involved multimode base stations or UO base stations: Choose
CME > UMTS Application > Export Data > Export Base Station Bulk
Configuration Data from the main menu of the U2000 client, or choose UMTS
Application > Export Data > Export Base Station Bulk Configuration Data from the
main menu of the CME client.
l For separate-MPT LTE-involved multimode base stations or LO base stations: Choose
CME > LTE Application > Export Data > Export Base Station Bulk Configuration Data
from the main menu of the U2000 client, or choose LTE Application > Export Data >
Export Base Station Bulk Configuration Data from the main menu of the CME client.
Step 3 In the summary data file, set the parameters in the MOs listed in Table 7-2 and close the file.
----End
7.3.5 Deactivation
Using MML Commands
Run the MML command DEA DOT1X to deactivate Access Control based on 802.1x on the
Ethernet port that connects the base station to the transport network.
7.6 Troubleshooting
After Access Control based on 802.1x is activated, the base station may report the following
alarm to facilitate fault diagnosis:
l ALM-26831 802.1x Authentication Failure
After this alarm is reported, maintenance personnel need to find the cause and clear the
alarm according to the alarm information.
For details about how to clear this alarm for each type of base station, see the following
sections in 3900 Series Base Station Alarm Reference:
– "eGBTS Alarm Reference" for an eGBTS
– "NodeB Alarm Reference" for a NodeB
– "eNodeB Alarm Reference" for an eNodeB
8 Parameters
AM BTS390 ACT None None Meaning: Indicates the IEEE 802.1X authentication
0, DOT1X method. Currently, only Extensible Authentication
BTS390 DSP Protocol Transport Layer Security (EAP-TLS), a
0 DOT1X unidirectional authentication method, is supported.
WCDM GUI Value Range: EAP-TLS(EAP-TLS authentic
A, LST
DOT1X method)
BTS390
0 LTE Unit: None
Actual Value Range: EAP-TLS
Default Value: EAP-TLS(EAP-TLS authentic method)
CN BTS390 ACT None None Meaning: Indicates the number of the cabinet that
0, DOT1X provides the port on which IEEE 802.1X
BTS390 DEA authentication is configured.
0 DOT1X GUI Value Range: 0~7
WCDM
A, DSP Unit: None
BTS390 DOT1X Actual Value Range: 0~7
0 LTE LST Default Value: 0
DOT1X
SRN BTS390 ACT None None Meaning: Indicates the number of the subrack that
0, DOT1X provides the port on which IEEE 802.1X
BTS390 DEA authentication is configured.
0 DOT1X GUI Value Range: 0~1
WCDM
A, DSP Unit: None
BTS390 DOT1X Actual Value Range: 0~1
0 LTE LST Default Value: 0
DOT1X
SN BTS390 ACT None None Meaning: Indicates the number of the slot that
0, DOT1X provides the port on which IEEE 802.1X
BTS390 DEA authentication is configured.
0 DOT1X GUI Value Range: 0~7
WCDM
A, DSP Unit: None
BTS390 DOT1X Actual Value Range: 0~7
0 LTE LST Default Value: None
DOT1X
SBT BTS390 ACT None None Meaning: Indicates the type of sub-board that provides
0, DOT1X the port on which IEEE 802.1X authentication is
BTS390 DEA configured.
0 DOT1X GUI Value Range: BASE_BOARD(Base Board),
WCDM ETH_COVERBOARD(Ethernet Cover Board)
A, DSP
BTS390 DOT1X Unit: None
0 LTE LST Actual Value Range: BASE_BOARD,
DOT1X ETH_COVERBOARD
Default Value: None
PN BTS390 ACT None None Meaning: Indicates the number of the port on which
0, DOT1X IEEE 802.1X authentication is configured.
BTS390 DEA GUI Value Range: 0~5
0 DOT1X
WCDM Unit: None
A, DSP Actual Value Range: 0~5
BTS390 DOT1X
Default Value: None
0 LTE LST
DOT1X
9 Counters
10 Glossary
11 Reference Documents