Showing posts with label Huawei ONU/ONT. Show all posts
Showing posts with label Huawei ONU/ONT. Show all posts

Wednesday, June 7, 2017

missing comopent and instance in U2000 can find the Ethernet trails E-line service

Issue Description
in XXX network there are RTN 900 NE SW version: V100R002C00SPC200 and U2000 version: V1R5C00SPC600
when try to create E-line service by using trails, didnt find it in U2000 although U2000 license support it.



Alarm Information
None
Handling Process
handling the problem as below :
1.  check that component (Nativeeth Service Management) in MSuite , didn't found

2.  add this component
3.  add an instance (NML_VALN)
4.  check the U2000 now it OK

Check the components(Nativeeth Service Management) in MSuite and find it is missing, so we should add it to solve the problem.
Suggestions
If you didn’t find the E-Line trail in U2000 and you have the license of this feature; check the MSuite component (Nativeeth Service Management) if not found add it.
More related:

Non-universal GEM template and Priority parameters

MA5600T Series LACP Configuration


Wednesday, May 24, 2017

Huawei GPON Networking Applications

GPON is a passive optical transmission technology that applies in FTTx solutions, including fiber to the building (FTTB), fiber to the curb (FTTC), fiber to the door (FTTD), fiber to the home (FTTH), fiber to the mobile base station (FTTM), fiber to the office (FTTO), and fiber to the WLAN (FTTW), for voice, data, video, private line access, and base station access services.
Figure 2-7 shows FTTx networking applications.
Huawei FTTx network applications in GPON access have the following in common: The data, voice, and video signals of terminal users are sent to ONUs, where the signals are converted into Ethernet packets and then transmitted over optical fibers to the OLT using the GPON uplink ports on the ONUs. Then, the Ethernet packets are forwarded to the upper-layer IP network using the uplink port on the OLT.

  • FTTB/FTTC: The OLT is connected to ONUs in corridors (FTTB) or by the curb (FTTC) using an optical distribution network (ODN). The ONUs are then connected to user terminals using xDSL. FTTB/FTTC is applicable to densely-populated residential communities or office buildings. In this scenario, FTTB/FTTC provides services of certain bandwidth for common users.
  • FTTD: uses existing access media at user homes to resolve drop fiber issues in FTTH scenarios.
  • FTTH: The OLT such as Huawei MA5600T connects to ONTs at user homes using an ODN network. FTTH is applicable to new apartments or villas in loose distribution. In this scenario, FTTH provides services of higher bandwidth for high-end users.
  • FTTM: The OLT is connected to ONUs using an ODN network. The ONUs are then connected to wireless base stations using E1. The OLT connects wireless base stations to the core IP bearer network using optical access technologies. This implementation mode is not only simpler than traditional SDH/ATM private line technologies, but also drives down the costs of base station backhaul. FTTM is applicable to reconstruction and capacity expansion of mobile bearer networks. In this scenario, FTTM converges the fixed network and the mobile network on the bearer plane.
  • FTTO: The OLT is connected to enterprise ONUs using an ODN network. The ONUs are connected to user terminals using FE, POTS, or Wi-Fi. QinQ VLAN encapsulation is implemented on the ONUs and the OLT. In this way, transparent and secure data channels can be set up between the enterprise private networks located at different places, and therefore the service data and BPDUs between the enterprise private networks can be transparently transmitted over the public network. FTTO is applicable to enterprise networks. In this scenario, FTTO implements TDM PBX, IP PBX, and private line service in the enterprise intranets.
  • FTTW: The OLT connects to ONUs like Huawei HG8546M using an ODN network, the ONUs connect to access points (APs) using GE for WLAN traffic backhaul. FTTW is the trend in Wi-Fi construction.

Tuesday, May 16, 2017

Principle of Security Data Plan on Huawei MA5800

The security plan involves system security plan, user security plan, and service security plan.
Security policy ensures service security from different aspects.

The device provides complete security measures, but not all security measures need to be deployed. Only the security measures that meet the following requirements need to be deployed:

  • The security measures can be used on the live network.
  • The security measures are easy to deploy.
  • The security measures are effective.
  • Different ONUs support different security features. Select the security feature recommended in this topic according to actual Huawei ONU/ONT capabilities.
System Security

Security Vulnerability: DoS attack
Solution: Enable the anti-DoS-attack function Huawei OLT and MDU.
Description and Usage Suggestion:After the anti-DoS-attack function is enabled, control packets are
monitored and those exceeding the number threshold are discarded. Use this solution for new site deployment.

Security Vulnerability: IP attack
Solution: Enable the anti-IP-attack function Huawei OLT and MDU.
After the anti-IP-attack function is enabled, a device discards the IP packets received from the user side whose destination IP address is the IP address of the device, and therefore the system is protected. Use this solution for new site deployment.

User Security
MAC spoofing
Enable the anti-MAC duplicate function for Huawei MA5800 and MDU.
After anti-MAC-duplicate is enabled, the system records the first MAC address learnt from the port
and binds the MAC address to the port and VLAN. If receiving packets sent from the host that has the same MAC address with the port, the system discards the packets directly. In this case, it can prevent users from forging MAC addresses to perform malicious attacks. Use this solution for new site deployment.

MAC attack
Enable the anti-MAC spoofing function Huawei OLT and MDU.
After anti-MAC spoofing is enabled, the system can prevent users from forging IP addresses to perform malicious attacks. Use this solution for new site deployment.

IP spoofing
Enable the anti-IP spoofing function for MDU.
After anti-IP spoofing is enabled, the system can prevent users from forging IP addresses to perform
malicious attacks. Use this solution for new site deployment.