Access Control Based On 802.1x (SRAN18.1 - Draft A)
Access Control Based On 802.1x (SRAN18.1 - Draft A)
Access Control Based On 802.1x (SRAN18.1 - Draft A)
Issue Draft A
Date 2021-12-30
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees
or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: https://www.huawei.com
Email: support@huawei.com
Contents
1 Change History.........................................................................................................................1
1.1 SRAN18.1 Draft A (2021-12-30)........................................................................................................................................ 1
3 Overview....................................................................................................................................4
4 Access Control based on 802.1x........................................................................................... 5
4.1 Principles.................................................................................................................................................................................... 5
4.1.1 Working Principles............................................................................................................................................................... 5
4.1.2 Protocol Stacks......................................................................................................................................................................7
4.1.3 Application of Access Control Based on 802.1x........................................................................................................ 8
4.1.3.1 Typical Network Topology............................................................................................................................................. 8
4.1.3.2 Auto-Discovery with Access Control based on 802.1x......................................................................................... 8
4.1.3.2.1 Automatic Base Station Deployment by PnP...................................................................................................... 8
4.1.3.2.2 Application on Existing Base Stations................................................................................................................. 11
4.2 Network Analysis.................................................................................................................................................................. 12
4.2.1 Benefits................................................................................................................................................................................. 12
4.2.2 Impacts.................................................................................................................................................................................. 12
4.3 Requirements......................................................................................................................................................................... 12
4.3.1 Licenses................................................................................................................................................................................. 12
4.3.2 Software................................................................................................................................................................................13
4.3.2.1 LOFD-003015 Access Control based on 802.1x................................................................................................... 13
4.3.2.2 MLOFD-003015 Access Control based on 802.1x............................................................................................... 13
4.3.2.3 TDLOFD-003015 Access Control based on 802.1x..............................................................................................14
4.3.2.4 FBFD-010023 Security Mechanism (Access Control based on 802.1x)....................................................... 14
4.3.2.5 Access Control based on 802.1x on the GSM Side............................................................................................. 14
4.3.2.6 Access Control based on 802.1x on the UMTS Side...........................................................................................14
4.3.3 Hardware.............................................................................................................................................................................. 15
4.3.4 Networking.......................................................................................................................................................................... 16
4.3.5 Others.................................................................................................................................................................................... 16
4.4 Operation and Maintenance............................................................................................................................................. 16
5 Parameters.............................................................................................................................. 20
6 Counters.................................................................................................................................. 22
7 Glossary................................................................................................................................... 23
8 Reference Documents...........................................................................................................24
1 Change History
Technical Changes
Change Description Parameter Change
Editorial Changes
Revised descriptions in this document.
This document only provides guidance for feature activation. Feature deployment and
feature gains depend on the specifics of the network scenario where the feature is
deployed. To achieve optimal gains, contact Huawei professional service engineers.
Software Interfaces
Any parameters, alarms, counters, or managed objects (MOs) described in Feature
Parameter Description documents apply only to the corresponding software
release. For future software releases, refer to the corresponding updated product
documentation.
For definitions of base stations described in this document, see section "Base
Station Products" in SRAN Networking and Evolution Overview.
3 Overview
IEEE 802.1x, complying with IEEE 802 standards for local area network (LAN)
access control, is an IEEE standard for port-based network access control. Port-
based network access control requires that the authentication access equipment in
the LAN perform identity authentication and access control on users or devices
that visit its ports. Only authenticated users or devices are allowed to access the
LAN through corresponding ports. Access control based on 802.1x prevents
unauthenticated users or devices from accessing the network, which ensures
transport network security.
To support access control based on 802.1x, Huawei base stations adopt
unidirectional authentication based on Extensible Authentication Protocol-
Transport Layer Security (EAP-TLS). The authentication is unidirectional because
only the authentication server authenticates digital certificates of base stations.
Figure 3-1 shows the network topology for access control based on 802.1x.
4.1 Principles
NOTE
Port access entity (PAE) is a port-related protocol entity that processes protocol packets
during an authentication procedure.
When initially visiting the transport network, a base station is not authenticated.
The controlled port is in the unauthorized state, and only EAPoL packets can be
sent to the authentication server through the uncontrolled port of the
authentication access equipment. After the authentication server authenticates
the base station and the authentication access equipment authorizes the
controlled port, the controlled port changes into the authorized state and data
from the base station can pass through the controlled port. This process ensures
that only authenticated users and devices can visit the network.
Port-based access control can involve either a physical port (such as that identified
by its MAC address) or a logical port (such as that of a VLAN). Huawei base
stations support only port-based access control involving MAC addresses. In this
case, an authentication message sent by a base station contains the MAC address
of an Ethernet port that connects the base station to the transport network. After
successful authentication, the authentication access equipment performs access
control on data flows using this MAC address.
For details about access control based on 802.1x, see IEEE 802.1x-2004.
Figure 4-2 shows the protocol stacks for access control based on 802.1x.
Access control based on 802.1x uses the EAP protocol for identity authentication.
The EAP protocol supports multiple authentication methods. Huawei base stations
adopt unidirectional EAP-TLS authentication, indicating that only the
authentication server authenticates base stations using digital certificates.
During access control based on 802.1x, a base station sends an EAPoL packet
containing its digital certificate to the RADIUS server. The RADIUS server
authenticates the base station using Huawei root certificate or the operator's root
certificate. In this procedure, EAP-TLS unidirectional authentication is used, which
is specified by DOT1X.AM (5G gNodeB, LTE eNodeB) (old model)/
DOT1XAUTH.AM (5G gNodeB, LTE eNodeB) (new model).
When the base station serves as the EAP-TLS client in access control based on
802.1x, it supports TLS1.2. Table 4-1 lists the cipher suites supported by the base
station in this scenario.
Table 4-1 Cipher suites supported by the base station when it functions as the
EAP-TLS client in access control based on 802.1x
1 ECDHE_ECDSA_AES_256_GCM_SHA384
2 ECDHE_RSA_AES_256_GCM_SHA384
3 DHE_RSA_AES_256_GCM_SHA384
4 ECDHE_ECDSA_AES_128_GCM_SHA256
5 ECDHE_RSA_AES_128_GCM_SHA256
6 DHE_RSA_AES_128_GCM_SHA256
Figure 4-3 Typical network topology for access control based on 802.1x
Access control based on 802.1x can be activated on Ethernet ports using the ACT
DOT1X (old model)/ACT DOT1XAUTH (new model) command and deactivated
using the DEA DOT1X (old model)/DEA DOT1XAUTH (new model) command.
NOTE
During automatic base station deployment by PnP, base stations are authenticated for
access control based on 802.1x using the preconfigured Huawei-issued device certificates.
Scenario 1
Figure 4-4 shows automatic base station deployment when the network supports
access control based on 802.1x and access control based on 802.1x is activated on
the Ethernet port that connects the base station to the transport network.
NOTE
During access control based on 802.1x, the EAPoL-Start packet is a multicast packet and its
destination MAC address is 01-80-C2-00-00-03; other packets are unicast packets.
Scenario 2
Figure 4-5 shows automatic base station deployment when the network supports
access control based on 802.1x but access control based on 802.1x is deactivated
on the Ethernet port that connects the base station to the transport network.
1. After a base station is powered on, it sends DHCP Discover packets to the
authentication access equipment because access control based on 802.1x is
deactivated on the Ethernet port that connects the base station to the
transport network.
2. The base station queries whether access control based on 802.1x is activated
on the Ethernet port that connects the base station to the transport network.
If access control based on 802.1x is deactivated and authentication is not
performed, the base station triggers access control based on 802.1x on this
Ethernet port.
3. Because the controlled port of the authentication access equipment is in the
unauthorized state, the base station cannot receive any response to the DHCP
Discover packets, leading to a DHCP procedure failure. The base station waits
for the authentication result.
● If the certificate used for SSL authentication in the configuration file is set to
the Huawei-issued device certificate, the 802.1x-based access control
procedure uses the Huawei-issued device certificate to authenticate the base
station.
● If the SSL authentication adopts the anonymous authentication mode, the
802.1x-based access control procedure uses the Huawei-issued device
certificate by default to authenticate the base station.
NOTE
Access control based on 802.1x does not support ED25519 certificates. If a base station
is configured with an ED25519 certificate, identity authentication based on 802.1x will
fail.
4.2.1 Benefits
Access control based on 802.1x prevents unauthenticated users or devices from
accessing the network, which ensures transport network security.
4.2.2 Impacts
Network Impacts
When access control based on 802.1x is enabled, the time for base station
deployment by PnP is extended by about 75s.
Function Impacts
None
4.3 Requirements
4.3.1 Licenses
The license controlling access control based on 802.1x needs to be activated only
for FDD, TDD, and NB-IoT eNodeBs. This function is not under license control on
the GBTS, eGBTS, NodeB, and gNodeB.
4.3.2 Software
Before activating this function, ensure that its prerequisite functions have been
activated and mutually exclusive functions have been deactivated. For detailed
operations, see the relevant feature documents.
Prerequisite Functions
RAT Function Name Function Switch Reference
Prerequisite Functions
RAT Function Name Function Switch Reference
Prerequisite Functions
RAT Function Name Function Switch Reference
Prerequisite Functions
None
Prerequisite Functions
RAT Function Name Function Switch Reference
Prerequisite Functions
RAT Function Name Function Switch Reference
4.3.3 Hardware
Base Station Models
RAT Base Station Model
NR ● 3900 and 5900 series base stations. 3900 series base stations
must be configured with the BBU3910.
● DBS3900 LampSite and DBS5900 LampSite. DBS3900
LampSite must be configured with the BBU3910. Only NR
TDD is supported.
Boards
NE Type Board Configuration Type of Port
Connecting to the
Transport Network
RF Modules
This function does not depend on RF modules.
4.3.4 Networking
● An authentication server has been deployed in the network.
● The authentication server supports the EAP protocol defined in RFC 3748 and
supports EAP-TLS authentication.
● The authentication server is preconfigured with Huawei root certificate. If the
customer requires that the operator-issued device certificate be used for
authentication, the operator's root certificate must be preconfigured on the
authentication server.
● The authentication access equipment supports access control based on 802.1x
and EAP packet processing.
● The authentication access equipment supports port-based access control
based on the MAC address.
4.3.5 Others
None
"-" in this section indicates that there is no special requirement for setting the parameters.
Set the parameters according to network plans.
Table 4-2 lists the data to be prepared in the DOT1X MO before you activate
access control based on 802.1x when the GTRANSPARA.TRANSCFGMODE (5G
gNodeB, LTE eNodeB) parameter is set to OLD.
Table 4-2 Data to be prepared for activating access control based on 802.1x (old
model)
Parameter Parameter ID Setting Notes
Name
Table 4-3 lists the data to be prepared in the DOT1XAUTH MO before you
activate access control based on 802.1x when the
Table 4-3 Data to be prepared for activating access control based on 802.1x (new
model)
802.1x DOT1XAUTH.DOT1XAUT -
Authenticatio HID (5G gNodeB, LTE
n ID eNodeB)
Port Type DOT1XAUTH.PT (5G -
gNodeB, LTE eNodeB)
Port ID DOT1XAUTH.PORTID (5G -
gNodeB, LTE eNodeB)
Authentic DOT1XAUTH.AM (5G This parameter indicates the
Method gNodeB, LTE eNodeB) authentication method used in
access control based on 802.1x.
This parameter can be set to
support EAP-TLS authentication.
NOTE
● When deploying this feature on a multimode base station, activate the feature only on
the Ethernet port that connects the base station to the transport network. The data
preparation and initial configuration of the multimode base station for feature
deployment are the same as those of a single-mode base station.
● When a base station is working normally, the certificate used in access control based on
802.1x is the same as that used by SSL authentication. For details about how to
configure the certificate for SSL authentication, see the "Data Configuration" section in
SSL. If no certificate is configured for SSL authentication, access control based on 802.1x
uses Huawei-issued certificates by default.
//Activating access control based on 802.1x on the Ethernet port that connects the NodeB/eNodeB/gNodeB/
eGBTS to the transport network
ACT DOT1XAUTH: DOT1XAUTHID=0, PT=ETH, PORTID=0, AM=EAP-TLS;
5 Parameters
NOTE
You can find the EXCEL files of parameter reference and used reserved parameter list for
the software version used on the live network from the product documentation delivered
with that version.
Step 2 On the Parameter List sheet, filter the Feature ID column. Click Text Filters and
choose Contains. Enter the feature ID.
Step 3 Click OK. All parameters related to the feature are displayed.
----End
Step 1 Open the EXCEL file of the used reserved parameter list.
Step 2 On the Used Reserved Parameter List sheet, use the MO, Parameter ID, and BIT
columns to locate the reserved parameter, which may be only a bit of a parameter.
View its information, including the meaning, values, impacts, and product version
in which it is activated for use.
----End
6 Counters
The following hyperlinked EXCEL files of performance counter reference match the
software version with which this document is released.
● Node Performance Counter Summary: contains device and transport counters.
● eNodeBFunction Performance Counter Summary: contains all counters related
to radio access functions, including air interface management, access control,
mobility control, and radio resource management.
● gNodeBFunction Performance Counter Summary: contains all counters related
to radio access functions, including air interface management, access control,
mobility control, and radio resource management.
NOTE
You can find the EXCEL files of performance counter reference for the software version used
on the live network from the product documentation delivered with that version.
----End
7 Glossary
8 Reference Documents