![]() |
SYSTEM ADMINISTRATOR GUIDE 42/1543-CRA 119 1170/1-V1 Uen B | ![]() |
Copyright
© Ericsson AB 2009–2010. All rights reserved. No part of this document may be reproduced in any form without the written permission of the copyright owner.
Disclaimer
The contents of this document are subject to revision without notice due to continued progress in methodology, design and manufacturing. Ericsson shall have no liability for any error or damage of any kind resulting from the use of this document.
Trademark List
SmartEdge | is a registered trademark of Telefonaktiebolaget LM Ericsson. | |
NetOp | is a trademark of Telefonaktiebolaget LM Ericsson. |
This document describes the tasks used to configure Mobile IP wireless
services for home-agent (HA) instances on the SmartEdge router
and their foreign-agent (FA) peers. This document also provides a
configuration example to support Mobile IP wireless services for an
HA instance on the router and its FA peer. Operations tasks for monitoring,
administering, and troubleshooting Mobile IP features are also described
in this document.
The terms FA peer and HA peer refer to FAs and HAs that exist on other equipment in the network.
The term Mobile IP binding refers to the association between a mobile node (MN) and its HA instance on the SmartEdge router. The term visitor or visiting MN refers to the association between an MN and an FA instance when that MN is communicating with its HA through the FA instance on the SmartEdge router.
HA tunnels can be used with Mobile IP services and non-Mobile IP services traffic.
You configure IP-in-IP and, optionally, Generic Routing Encapsulation (GRE) tunnels on the SmartEdge router to support the connections from FA instances to their HA peers and from HA instances to their FA peers. For information about configuring the IP-in-IP and GRE tunnels, see Configuring Single Circuit Tunnels.
For information about configuring Ethernet, Fast Ethernet-Gigabit Ethernet, and Gigabit Ethernet ports and circuits to support mobile subscribers, see Configuring ATM, Ethernet, and POS Ports and Configuring Circuits.
Mobile IP services allows MNs to retain their IP addresses, and therefore maintain their existing IP sessions, when they roam across multiple networks.
Mobile IP consists of the following components:
The HA instance, a router on the MN home network, is the anchor component in Mobile IP network that provides seamless mobility to the MN. When an MN is attached to its home network, it does not use Mobile IP services because it communicates directly using normal IP routing. When a MN is roaming and is not connected to its home network, its HA instance:
Mobile IP services enable the SmartEdge router to act as one or more HA instances. Each instance communicates with its mobile subscribers (MNs). When an MN moves outside the network for the HA instance, it connects to the HA instance through an FA peer, which then communicates with the HA instance. Each HA instance has a local address that the system uses as the termination address for its MNs and FA peers.
Mobile IP subscribers are assigned a home slot where their corresponding subscriber circuit is anchored for the purposes of accounting and other circuit-based features. When selecting a home slot, preference is given to the line card with the current HA-FA tunnel egress circuit. When a subscriber reregisters and the subscriber's home slot is not on the same line card as the tunnel egress, an attempt will be made to reoptimize the subscriber's home slot.
In a typical deployment, MNs connect wirelessly to Base Transceiver Stations (BTSs), which connect to the SmartEdge router FA peer through Ethernet. In this topology, each MN is represented by a separate Ethernet circuit and MNs can move between BTSs. The FA instance communicates with a SmartEdge HA instance through a tunnel endpoint (a local address of an HA instance). The SmartEdge router routes the MN traffic to the FA peer using an IP-in-IP tunnel or GRE tunnel. Each FA peer uses a different tunnel. Traffic for the MNs is routed from the HA instance to the FA peer using the same tunnel.
Figure 1 illustrates the physical network of MNs, BTS, FA peers, and an HA instance.
The Mobile IP services implementation can use the SmartEdge OS multiple context support. For the HA, all home addresses (HoAs) are allocated from the HA context address space. The HA local address interfaces can be in the same context or in different contexts. This allows IP-in-IP or GRE tunnels to FA peers to terminate in other contexts. For example, an FA peer tunnel could terminate in the local context that is providing connectivity to the Internet backbone.
Mobile IP services is currently supported only for unicast traffic; broadcast and multicast traffic are not supported.
Mobile IP services is supported only on PPA2 line cards. Do not install any PPA1-based line cards on the chassis when enabling Mobile IP Services.
Mobile IP services comply with the standards in the following documents:
To configure HA Mobile IP features, perform the tasks described in the following sections:
The following HA configuration guidelines apply when configuring Mobile IP services for an HA instance:
To create the contexts and interfaces for Mobile IP services, perform the tasks described in Table 1. These contexts and interfaces are used in subsequent configuration tasks for the HA instances and FA peers.
# |
Task |
Root Command |
Notes |
---|---|---|---|
1. |
Optional. Create the context for the HA instance and access context configuration mode. |
Enter this command in global configuration mode. You can use the local context instead of performing this step. | |
2. |
Create an interface for the FA peers to connect to the HA instance (using tunnels) using the HA local address and access interface configuration mode. |
Enter this command in context configuration mode. | |
3. |
Optional. Create an FA context for an FA peer and access context configuration mode. |
Enter this command in global configuration mode. You can use the HA instance context for all FA peers instead of performing this step. |
To configure a key chain authentication for the FA and HA, perform the tasks described in Table 2. For more information about configuring key chains, see Configuring Bridging.
# |
Task |
Root Command |
Notes |
---|---|---|---|
1. |
Select the context for the HA instance and access context configuration mode. |
Enter this command in global configuration mode. | |
2. |
Create the key chain and access key chain configuration mode. |
Enter this command in context configuration mode. | |
3. |
Configure a key string. |
Enter this command in key chain configuration mode. | |
4. |
Specify the security parameter index (SPI) for this key chain. |
Enter this command in key chain configuration mode. |
To configure an HA instance, perform the tasks described in Table 3; enter all commands in HA configuration mode, unless otherwise noted.
# |
Task |
Root Command |
Notes |
---|---|---|---|
1. |
Select the context for the HA instance and access context configuration mode. |
Enter this command in global configuration mode. | |
2. |
Enable Mobile IP services in this context and access Mobile IP configuration mode. |
Enter this command in context configuration mode. | |
3. |
Create or select the HA instance and access HA configuration mode. |
Enter this command in Mobile IP configuration mode. | |
4. |
Apply a dynamic tunnel profile to an HA instance. |
Enter this command in HA configuration mode. | |
5. |
Specify the interface for the HA local address. |
This is the interface that you created for the tunnels for this HA instance. | |
6. |
Optional. Enable the optional tunnel type. |
The default is not to enable optional tunnel types. | |
7. |
Optional. Configure the default authentication for this HA instance. |
This is the default authentication for all FA peers for this HA instance. | |
8. |
Optional. Configure the registration maximum lifetime for MN registrations using this HA instance. |
The default is 1800 seconds. | |
9. |
Optional. Configure the tolerance for timestamp-based replay protection between an MN and its HA instance. |
The default is 7 seconds. | |
10. |
Optional. Configure registration revocation support for this HA instance. |
The default is that registration revocation is not enabled. |
To configure an FA peer, perform the tasks described in Table 4.
# |
Task |
Root Command |
Notes |
---|---|---|---|
1. |
Select the context for the HA instance for this FA peer and access context configuration mode. |
Enter this command in global configuration mode. | |
2. |
Enable Mobile IP services in this context and access Mobile IP configuration mode. |
Enter this command in context configuration mode. | |
3. |
Select the HA instance for the FA peer and access HA configuration mode. |
Enter this command in Mobile IP configuration mode. | |
4. |
Create or select the FA peer and access FA peer configuration mode. |
Enter this command in HA configuration mode. | |
5. |
Optional. Apply a dynamic tunnel profile to an FA peer. |
Enter this command in FA peer configuration mode. The dynamic tunnel profile is created in Mobile IP configuration and Dynamic Tunnel Profile configuration mode. | |
6. |
Optional. Configure the authentication for the FA peer. |
Enter this command in FA peer configuration mode. This authentication overrides the default authentication for all FA peers for this HA instance. |
To configure an MN subscriber record, profile, or default profile, perform the task described in Table 5.
# |
Task |
Root Command |
Notes |
---|---|---|---|
1. |
Configure the subscriber record, profile, or default profile. |
For information about configuring subscribers and their attributes, see Configuring Subscribers. |
You can configure authentication, authorization, and accounting (AAA) features and Remote Authentication Dial-In User Service (RADIUS) servers for MN subscribers. For information about configuring AAA features, see Configuring Bridging and Configuring RADIUS.
You must configure an IP-in-IP tunnel to each FA peer. You can also configure a GRE tunnel to each FA peer. To configure the Mobile IP tunnels, perform the tasks described in Table 6.
# |
Task |
Root Command |
Notes |
---|---|---|---|
1. |
Configure the IP-in-IP tunnels to the FA peers. |
For information about creating IP-in-IP tunnels and GRE tunnels, see Configuring GRE Tunnels. | |
2. |
Optional. Configure the GRE tunnels to the FA peers. |
For information about creating IP-in-IP tunnels and GRE tunnels, see Configuring Single Circuit Tunnels. |
To enable or disable an HA instance or an FA peer, perform the task described in Table 7.
Task |
Root Command |
Notes |
---|---|---|
Optional. Disable or enable an HA instance or an FA peer. |
Enter this command in HA instance or FA peer interface configuration mode. Use the no form of this command to enable an HA instance or an FA peer. |
To monitor, administer, and troubleshoot Mobile IP features, perform the appropriate task listed in Table 8. Enter the clear and debug commands in exec mode; enter all show commands in any mode.
Task |
Root Command |
---|---|
Clear the mobile node (MN) binding. |
|
Clear Mobile IP counters for an FA instance and HA instance. |
|
Clear Mobile IP dynamic FA-HA authentication keys corresponding to the specified HA peer, FA peer, or HA local-address. |
|
Clear FA peer information or only FA peer counters on an HA instance. |
|
Clear HA peer information or only HA peer counters on an FA instance. |
|
Clear the FA instance access interface, including all Mobile-IP visitors associated with the access interface or FA access interface counters. |
|
Clear one or more visitors to an FA instance. |
|
Clear all Mobile IP subscribers in the current context or all contexts. |
|
Enable the generation of debug messages for Mobile IP services on a circuit. |
|
Enable the generation of debug messages for the specified type of Mobile IP events. |
|
Enable the generation of debug messages for an HA instance and FA instance. |
|
Enable the generation of debug messages for Mobile IP authentication. |
|
Enable the generation of debug messages for an FA instance. |
|
Enable the generation of debug messages for an HA instance. |
|
Enable the generation of debug messages for Mobile IP module interaction events, such as Router Configuration Manager (RCM) events and Interface and Circuit State Manager (ISM). |
|
Enable the generation of debug messages for the specified type of Mobile IP packets. This is a filtered debugging feature for specific source, destination, circuit, or packet types. |
|
Enable the generation of debug messages for Mobile IP I/O packet events on a kernel socket interface. |
|
Enable the generation of subscriber debug messages on Mobile IP service user name events on an HA instance. |
|
Display the Mobile IP configuration. |
|
Display IP routes for MNs. |
|
Display Mobile IP information for one or more contexts. |
|
Display Mobile IP binding information for one or all FA peers for an HA instance. |
|
Display Mobile IP pending visitor registration information for FA peers or for an HA instance. |
|
Display Mobile IP information for care-of address (CoA) information for an FA instance. |
|
Display Mobile IP debug settings. |
|
Display WiMAX dynamic authentication keys used by an HA or FA instance. |
|
Display information about dynamic tunnel profiles. |
|
Display Mobile IP information for one or all FA peers for an HA instance. |
|
Display Mobile IP information for one or all HA peers for an FA instance. |
|
Display information for one or more Mobile IP interfaces. |
|
Display HA local address information for the specified interface or all local address interfaces for the HA instance. |
|
Display log information for authentication, authorization, and accounting (AAA), ISM events, and malformed packets. |
|
Display Mobile IP tunnel statistics. |
|
Display information about static and dynamic tunnels registered with Mobile IP services. |
|
Display a list of Mobile IP visitors to an FA instance. |
|
Display a list of pending Mobile IP visitors to an FA instance. |
The following example creates an IP-in-IP tunnel and the interfaces to support an HA instance and an FA peer, all in the local context. Traffic is carried on two Ethernet ports:
[local]Redback(config)#context [local]Redback(config)#context local !Create the interfaces for the IP-in-IP tunnels to the FA peers and for the MNs [local]Redback(config)#context local [local]Redback(config-ctx)#interface tun1 [local]Redback(config-if)#ip address 20.2.1.1/16 [local]Redback(config-if)#exit [local]Redback(config-ctx)#interface loc-addr [local]Redback(config-if)#ip address 20.1.1.1/16 [local]Redback(config-if)#exit !Enable the local context for Mobile IP services [local]Redback(config-ctx)#router mobile-ip !Create the home agent instance, specify the local address interface and create a foreign agent peer local]Redback(config-mip)#home-agent [local]Redback(config-mip-fa)#local-address loc-addr [local]Redback(config-mip-fa)#foreign-agent-peer 20.1.1.2 [local]Redback(config-mip-hapeer)#end !Configure the Ethernet circuits (bind them to the MN access and local address interfaces) [local]Redback#config [local]Redback(config)#port ethernet 2/10 [local]Redback(config-port)#no shutdown [local]Redback(config-port)#port ethernet 2/1 [local]Redback(config-port)#no shutdown [local]Redback(config-port)#bind interface loc-addr local [local]Redback(config-port)#exit !Configure the IP-in-IP tunnel (bind it to the tunnel interface in the local context) [local]Redback(config)#tunnel ipip tun1 [local]Redback(config-tunnel)#peer-end-point local 20.1.1.1 remote 20.1.1.2 [local]Redback(config-tunnel)#bind interface tun1 local [local]Redback(config-tunnel)#end