![]() |
SYSTEM ADMINISTRATOR GUIDE 1/1543-CRA 119 1170/1 Uen B | ![]() |
Copyright
© Ericsson AB 2009–2010. All rights reserved. No part of this document may be reproduced in any form without the written permission of the copyright owner.
Disclaimer
The contents of this document are subject to revision without notice due to continued progress in methodology, design and manufacturing. Ericsson shall have no liability for any error or damage of any kind resulting from the use of this document.
Trademark List
SmartEdge | is a registered trademark of Telefonaktiebolaget LM Ericsson. | |
NetOp | is a trademark of Telefonaktiebolaget LM Ericsson. |
The Advanced Services Engine (ASE) card contains two Advanced Service Processors (ASPs) that provide additional processing power on a SmartEdge® router. ASE-based services (currently only Security Service) run on these ASPs. In the current release, the SmartEdge OS, the ASE-based Security Service supports two applications: Internet Protocol Security (IPsec) Virtual Private Network (VPN), which provides support for secure tunnels, and Application Traffic Management, which provides support for managing application traffic using Deep Packet Inspection (DPI) and heuristic mechanisms. You can use the Command Line Interface (CLI) of the SmartEdge OS to configure these applications.
This document describes how to use the CLI to add an Advanced Services Engine (ASE) card to the configuration of a SmartEdge router and configure the ASP pools and ASP groups. ASP pools and groups distribute the processing capabilities of the ASPs on the ASE cards installed in the router, provide load balancing when multiple ASPs are installed, and support resiliency when excess ASPs are available. The document also describes how to view information about ASP pools and groups and configure ASP logging.
This document is intended for network planners responsible for the design of advanced network services that use the SmartEdge router and for operators of the SmartEdge OS responsible for entering the configuration on individual SmartEdge routers.
The contexts that carry traffic that you want directed to ASPs on an ASE card for processing by the security applications must be configured on the SmartEdge router. Until a context is associated with an ASP group, ASE-based services cannot be accessed.
Before you configure ASP logging, a loopback interface must be configured in the local context for use as the ASP log source IP address. Its IP address is required to configure ASP logging. The IP address and port on the log server to which the ASP log messages are forwarded must also be known. The only supported transport protocol in this release is User Datagram Protocol (UDP).
ASE card configuration prepares the ASPs on the card to provide ASE-based services.
You can add an ASE card to the configuration of a SmartEdge router before it is physically installed in the chassis. The card is detected when it is physically installed and the ASE configuration is processed. It takes longer for an ASE card to become active and start processing traffic than a traffic card due to the additional complexity of the ASE-based services provided by the ASPs on the card.
To configure an ASE card, enter the following command in global configuration mode:
card ase slot
Commit the transaction.
The following example shows how to configure an ASE card in slot 4:
[local]Redback(config)#card ase 4 [local]Redback(config-card)#
Security Service configuration consists of configuring ASP pools, configuring ASP groups, and associating a context with an ASP group. You can define ASP pools and groups at any time; however, and you can add an ASP to an ASP pool without an ASE card installed in the chassis. For information on ASP pools and ASP groups, see Reference [1].
An ASP pool contains the following information:
To configure an ASP pool, enter the following commands:
(config)#asp pool pool-name service service-name
(cfg-asp-pool-mode)#asp slot-id/asp-id
The following example shows how to configure the p1 ASP pool and specify six ASPs on four ASE cards to associate with the ASP pool:
[local]Redback(config)#asp pool p1 service security [local]Redback(cfg-asp-pool-mode)#asp 1/1 [local]Redback(cfg-asp-pool-mode)#asp 1/2 [local]Redback(cfg-asp-pool-mode)#asp 3/1 [local]Redback(cfg-asp-pool-mode)#asp 3/2 [local]Redback(cfg-asp-pool-mode)#asp 4/1 [local]Redback(cfg-asp-pool-mode)#asp 5/1
An ASP group contains the following information:
To configure an ASP group, enter the following commands:
(config)#asp group group-name
(cfg-asp-group-mode)#pool pool-name
(cfg-asp-group-mode)#asp-count number
(cfg-asp-group-mode)#priority number
The following example shows how to configure the g1 ASP group, associate the group with the p1 ASP pool, specify that two ASPs must be associated with the ASP group, and set the priority to 100 for the ASP group:
[local]Redback(config)#asp group g1 [local]Redback(cfg-asp-group-mode)#pool p1 [local]Redback(cfg-asp-group-mode)#asp-count 2 [local]Redback(cfg-asp-group-mode)#priority 100
For subscribers to receive ASE-based services, the subscriber's context must be enabled for subscriber-based Security Services and associated with an ASP group. Associating the context with an ASP group directs traffic belonging to the context to the ASPs in the ASP group for processing.
In the current release, the only available ASE-based service is security.
To configure a context to provide ASE-based service on traffic, enter the following commands:
(config)#context ctx-name
(config-ctx)#asp-group group-name service service-name
The following example shows how to associate the g1 ASP group with the security advanced service within the c3 context:
[local]Redback(config)#context c3 [local]Redback(config-ctx)#asp-group g1 service security
Show commands display a variety of information for ASP pools and groups and for security-enabled contexts, as shown in Table 1.
To display the following information… |
Enter this command… |
---|---|
Summary information for all ASPs on all ASE cards installed in the SmartEdge router |
show asp |
Detailed information for a specific ASP. |
show asp slot-id/asp-id |
Summary ASP pool for all ASP pools. |
show asp pool |
Detailed information for all ASP pools. |
show asp pool detail |
Detailed information for a specific ASP pool. |
show asp pool pool-name |
Summary information for all ASP groups. |
show asp group |
Detailed information for all ASP groups. |
show asp group detail |
Detailed information for a specific ASP groups. |
show asp group group-name |
For more information about show commands see Reference [2].
Reporting for advanced services is based on log messages. Log messages can be sent to the console or a log forwarding server and integrated with third-party reporting solutions or used by proprietary reporting solutions to generate deployment-specific reports. Log messages from all ASPs in all ASE cards installed in the SmartEdge router are sent using the specified ASP source to the specified log server. Each log message contains the system host name which must be set to a valid value; see the system command in Reference [4].
You must configure the source IP on the SmartEdge router for log
messages that are forwarded to an external log server, such as the
NetOp EMS Log Mediation server, and the IP address of the external
log server. These settings are configurable default settings for the
Security Service. No configuration is needed to control the generation
of IKE or IPsec log messages from the IPsec VPN application. Additional
configuration is required for the generation of P2P statistics; see Reference [3].
To send log messages to a log forwarding server, perform the following steps:
(config)#asp security default
(config-asp-security-default)#log server server-ip transport transport-protocol port port
The log server should be reachable through local context.
(config-asp-security-default)#log source source-ip context context
The source-ip must be the IP address of a loopback interface in context local.
The following example configures logging to an external server:
[local]Redback(config)#asp security default (config-asp-security-default)#log server 10.172.55.55 transport udp port 514 (config-asp-security-default)#log source 10.192.22.24 context c3
ASE |
Advanced Services Engine |
ASPs |
Advanced Service Processors |
CLI |
Command Line Interface |
DPI |
Deep Packet Inspection |
IPsec |
Internet Protocol Security |
UDP |
User Datagram Protocol |
VPN |
Virtual Private Network |
[1] Advanced Services Infrastructure Overview, 1/221 02-CRA 119 1170/1. |
[2] Security Service Command Reference, 1/190 80-CRA 119 1170/1. |
[3] Application Traffic Management Configuration and Operation, 2/1543-CRA 119 1170/1. |
[4] Command List, 1/190 77-CRA 119 1170/1. |