WO2014029367A1 - 一种动态配置方法及装置、系统 - Google Patents

一种动态配置方法及装置、系统 Download PDF

Info

Publication number
WO2014029367A1
WO2014029367A1 PCT/CN2013/082234 CN2013082234W WO2014029367A1 WO 2014029367 A1 WO2014029367 A1 WO 2014029367A1 CN 2013082234 W CN2013082234 W CN 2013082234W WO 2014029367 A1 WO2014029367 A1 WO 2014029367A1
Authority
WO
WIPO (PCT)
Prior art keywords
dynamic configuration
configuration
authentication
server
information
Prior art date
Application number
PCT/CN2013/082234
Other languages
English (en)
French (fr)
Inventor
范亮
袁博
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2014029367A1 publication Critical patent/WO2014029367A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements

Definitions

  • Embodiments of the present invention relate to a cloud computing technology of a data communication network, and in particular, to a dynamic configuration method, apparatus, and system. Background technique
  • cloud computing refers to the delivery and usage model of IT infrastructure. It refers to obtaining the required resources through the network in an on-demand and extensible manner.
  • cloud computing refers to the delivery and use of services. Mode refers to obtaining the required services through the network in an on-demand and extensible manner.
  • services can be IT and software, Internet-related, or any other service.
  • VPN Virtual Private Network
  • Internet Internet
  • ATM Asynchronous Transfer Mode
  • Frame Relay a platform in which user data is transmitted.
  • the Operation Support System initiates a configuration request to the Network Management System (IMS) Element Management System (EMS) and further
  • IMS Network Management System
  • EMS Element Management System
  • PE data center egress
  • PE Provider Edge
  • the main purpose of the embodiments of the present invention is to provide a dynamic configuration method, device, and system, to solve the problem that a network device cannot be triggered by a service request, and the user service is opened slowly.
  • the embodiment of the invention provides a dynamic configuration method, and the method includes: The network device sends an authentication request to the dynamic configuration server, and carries the configurable service type; the dynamic configuration server receives the authentication request, performs authentication on the network device, and sends an authentication success message to the network device when the authentication succeeds;
  • the dynamic configuration server sends a configuration request to the network device by using an authorization message, where the configuration request carries dynamic configuration information;
  • the network device receives the authorization message returned by the dynamic configuration server, performs corresponding service configuration according to the dynamic configuration information in the authorization message, and sends a configuration response message to the dynamic configuration server.
  • the dynamic configuration server carries the basic configuration information in the authentication success message sent to the network device.
  • the method further includes: the network device receiving the authentication success message, acquiring the basic Configuring information, and configuring the basic configuration information to the local;
  • the method further includes: the dynamic configuration server pre-configuring the basic configuration information on the network device.
  • the authentication success message carrying the basic configuration information is an Access-Accept message of the Remote Authentication Dial In User Service (Ratis) protocol;
  • the authorization message carrying the dynamic configuration information is an authorization message of the terminal access controller access control system (Tacacs, Terminal Access Controller Access-Control System), or an authorization message of the next generation authentication and authorization protocol (Dimeter) protocol.
  • Tacacs Terminal Access Controller Access-Control System
  • DImeter Next Generation authentication and authorization protocol
  • the authorization message carrying the dynamic configuration information is a CoA (Change of Attribute) message of the Radius protocol or an authorization message of the Tacacs protocol or an authorization message of the Diameter protocol.
  • CoA Change of Attribute
  • the configurable service type is a VPN service
  • the dynamic configuration information includes: the network device and a user edge CE device or a data center
  • VRF virtual routing and forwarding instance
  • VSI virtual switch instance
  • the basic configuration information is the basic configuration information of the VPN service of the PE device, including: establishing a Border Gateway Protocol (BGP) protocol configuration information or a label distribution protocol (LDP, Label Distribution) The protocol configuration information, and the basic configuration information of the Layer 2 VPN or the basic configuration information of the Layer 3 VPN.
  • BGP Border Gateway Protocol
  • LDP Label Distribution
  • the protocol configuration information and the basic configuration information of the Layer 2 VPN or the basic configuration information of the Layer 3 VPN.
  • the configurable service type is a mobile network user access service
  • the dynamic configuration information is a mobile network user.
  • the dynamic configuration information includes: identification information of the mobile network user, mobile network gateway information, access point (APN) information, and medium access control layer (MAC) address.
  • the basic configuration information is public network user common configuration information, including: General Packet Radio Service Tunneling Protocol (GTP) basic configuration information, and mobile network gateway information.
  • GTP General Packet Radio Service Tunneling Protocol
  • the dynamic configuration server is an authentication authorization server or an authentication and authorization accounting server (AAA) or an element management system (EMS) or a network management system (NMS).
  • AAA authentication and authorization accounting server
  • EMS element management system
  • NMS network management system
  • the embodiment of the present invention further provides a network device configured to be dynamically configured, where the network device includes: an authentication unit and a configuration unit, where
  • An authentication unit configured to initiate an authentication request to the dynamic configuration server, carrying a configurable service type, and receiving an authentication success message returned by the dynamic configuration server;
  • the configuration unit is configured to receive an authorization message that is sent by the dynamic configuration server and that carries the dynamic configuration information, perform corresponding service configuration according to the dynamic configuration information in the authorization message, and send a configuration response message to the dynamic configuration server.
  • the authentication unit is further configured to receive an authentication success message that is returned by the dynamic configuration server and that carries basic configuration information.
  • the configuration unit is further configured to acquire The authentication unit receives the basic configuration information carried in the authentication success message, and configures the basic configuration information to be local; or the configuration unit is further configured to pre-configure the device under the control of the dynamic configuration server.
  • Basic configuration information is further configured to acquire The authentication unit receives the basic configuration information carried in the authentication success message, and configures the basic configuration information to be local; or the configuration unit is further configured to pre-configure the device under the control of the dynamic configuration server.
  • the authorization message is a remote user dialing authentication (CoA, Change of Attribute) message or an authorization message of the Tacacs protocol or an authorization message of the next generation authentication and authorization accounting protocol Diameter protocol.
  • CoA Change of Attribute
  • the network device is a PE device, or a trusted wireless local area network access gateway (TWAG, Trusted Wireless Access Gateway), or a broadband network gateway (BNG, Broadband Network Gateway), or an enhanced broadband network gateway (eBNG).
  • TWAG trusted wireless local area network access gateway
  • BNG Broadband Network Gateway
  • eBNG enhanced broadband network gateway
  • enhanced broadband network Gateway or a broadband remote access server (BRAS, broadband remote access server)
  • BRAS broadband remote access server
  • SR service router
  • monthly network access service is good
  • NAS network access server
  • the embodiment of the present invention further provides a dynamic configuration system, where the system includes: a network device and a dynamic configuration server;
  • the network device includes: an authentication unit and a configuration unit, where the authentication unit is configured to initiate an authentication request to the dynamic configuration server, and carry the configurable service type; and receive an authentication success message returned by the dynamic configuration server; Receiving an authorization message that is sent by the dynamic configuration server and carrying the dynamic configuration information, performing corresponding service configuration according to the dynamic configuration information in the authorization message, and sending a configuration response message to the dynamic configuration server; dynamically configuring the server, configured to receive An authentication request initiated by the network device, the network device is authenticated, and an authentication success message is sent to the network device when the authentication is successful; and configured to send a configuration request to the network device by using an authorization message, where The configuration request carries dynamic configuration information.
  • the network device is a PE device, or TWAG, or BNG, or eBNG, or BRAS, or SR, or NAS.
  • the dynamic configuration server is an AAA or EMS or an NMS or an Operation Support System (OSS).
  • the network device receives the dynamic configuration information from the dynamic configuration server to perform dynamic service configuration, and solves the problem that the network device cannot be triggered by the service request, and the user service is opened slowly.
  • the speed and efficiency of user service opening is provided.
  • the dynamic configuration method of the embodiment of the present invention when applied to the process of using the cloud computing resource in the VPN, the function of quickly adding the cloud computing resource to the user VPN can be realized, thereby improving the efficiency and service experience of the user cloud computing service;
  • FIG. 1 is a flowchart of implementing a dynamic configuration method according to an embodiment of the present invention
  • FIG. 2 is a schematic structural diagram of a dynamic configuration system according to an embodiment of the present invention.
  • FIG. 3 is a schematic diagram of a scenario in which a VPN uses a cloud computing resource according to an embodiment of the present invention
  • FIG. 4 is a schematic flowchart of a dynamic configuration process according to an embodiment of the present invention.
  • FIG. 5 is a schematic diagram of a scenario in which a 3GPP user accesses a 3GPP core network by using a WLAN;
  • FIG. 6 is a schematic flowchart of a dynamic configuration process according to Embodiment 2 of the present invention. detailed description
  • the dynamic configuration method of the embodiment of the present invention may include the following steps: Step 101: The network device initiates an authentication request to the dynamic configuration server, and carries a configurable service type.
  • Step 102 The dynamic configuration server receives the authentication request, performs authentication on the network device, and sends an authentication success message to the network device when the authentication succeeds.
  • Step 103 The dynamic configuration server sends a configuration request to the network device by using an authorization message, where the configuration request carries dynamic configuration information.
  • Step 104 The network device receives the authorization message returned by the dynamic configuration server, performs corresponding service configuration according to the dynamic configuration information in the authorization message, and sends a configuration response message to the dynamic configuration server.
  • the response message returned by the network device to the dynamic configuration server may include a configuration result, where the configuration result is configuration success information indicating that the configuration is successful or configuration failure information indicating that the configuration is failed.
  • the dynamic configuration server carries the basic configuration information in the authentication success message sent to the network device.
  • the method further includes: the network device receiving the authentication success message, acquiring the basic configuration information, And configuring the basic configuration information to be local; or the method further includes: the dynamic configuration server pre-configuring the basic configuration information on the network device.
  • the authentication success message carrying the basic configuration information is an Access-Accept message of the Radius protocol
  • the authorization message carrying the dynamic configuration information is an authorization message of the Tacacs protocol or an authorization message of the Diameter protocol.
  • the authorization message carrying the dynamic configuration information is a CoA message of the Radius protocol or an authorization message of the Tacacs protocol or a Diameter protocol (an upgraded version of the Radius protocol). Authorization message.
  • the configurable service type is a virtual private network VPN service;
  • the dynamic configuration information includes: physical port or logical interface information, virtual route forwarding instance of the network device connected to the user edge CE device or the data center edge CE device VRF information, virtual exchange instance VSI information.
  • the basic configuration information is the basic configuration information of the VPN service of the PE device, including: establishing BGP protocol configuration information or LDP protocol configuration information of the PE device, and basic configuration information of the Layer 2 VPN (including the VSI, etc.) or three. Basic configuration information of the layer VPN.
  • the configurable service type is a mobile network user access service
  • the dynamic configuration information is a mobile network user dynamic configuration information, including: mobile network user identification information, mobile network gateway information, APN information, and MAC address.
  • the basic configuration information is public configuration information of the mobile network user, including: GTP basic configuration information and mobile network gateway information.
  • the authorization message is completed by the cloud computing management system or by the cloud computing virtual machine management system or other systems to complete the allocation of the cloud computing resource requested by the user. Then, it is sent by the dynamic configuration server to a network device (such as a PE device) that has a connection relationship with the allocated cloud computing resource.
  • the cloud computing resource is distributed in one or more data centers, and the network device is an egress PE device of a data center where all cloud computing resources in the corresponding VPN are located or a PE device under all the sites.
  • the VPN includes a virtual Layer 3 private network (MPLS L2VPN, Multi-Protocol Label Switching Layer 2 Virtual Private Network) built by multi-protocol label switching technology, and a multi-protocol label switching technology (MPLS L3 VPN, Multi). -Protocol Label Switching Layer 3 Virtual Private Network ), Generic Routing Encapsulation (GRE) VPN, Internet IPSec (Internet Protocol Security) VPN, etc.
  • the public configuration information is public VPN public configuration information;
  • the dynamic configuration information is VPN dynamic configuration information, and includes: physical port or logical interface information (including a physical port or a logical interface) where the network device is connected to the network where the cloud computing resource is located. name, Number, IP address, etc., VPN instance (including virtual routing and VRF information and VSI information), GRE tunnel configuration information, IPSec tunnel configuration information, and so on.
  • the network device performs local configuration delivery according to the configuration parameter therein; for the configuration update message, the network device performs local configuration update according to the configuration parameter information therein; The network device deletes the locally corresponding configuration.
  • the network device may be any one of a PE device, a TWAG, a BNG, an eBNG, a BRAS, an SR, a NAS, and the like.
  • the dynamic configuration server may be an AAA or an EMS or an NMS.
  • the embodiment of the present invention further provides a network device 22 configured to be dynamically configured, where the network device includes: an authentication unit 221 and a configuration unit 222, where the authentication unit 221 is configured to
  • the dynamic configuration server initiates an authentication request, carries a configurable service type, and receives an authentication success message returned by the dynamic configuration server.
  • the configuration unit 222 is configured to receive an authorization message that is sent by the dynamic configuration server and carries the dynamic configuration information, according to the authorization.
  • the dynamic configuration information in the message performs corresponding service configuration, and sends a configuration response message to the dynamic configuration server.
  • the authentication unit 221 is further configured to receive an authentication success message that is returned by the dynamic configuration server and that carries the basic configuration information.
  • the configuration unit is further configured to acquire the information carried in the authentication success message received by the authentication unit. Basic configuration information, and configure the basic configuration information to the local;
  • the configuration unit 222 is further configured to pre-configure the basic configuration information under the control of the dynamic configuration server.
  • the authentication unit 221 may be implemented by a central processing unit (CPU) in a network device, or a router, and the configuration unit may be implemented by a CPU or a memory in the network device.
  • the embodiment of the present invention further provides a dynamic configuration system, where the system includes: the foregoing network device 22 and a dynamic configuration server 21; wherein the dynamic configuration server 21 is configured to receive the An authentication request initiated by the network device 22, the network device 22 is authenticated, and an authentication success message is sent to the network device 22 when the authentication is successful; and configured to send a configuration request to the network device 22 by using an authorization message, The dynamic configuration information is carried in the configuration request.
  • Embodiment 1 Embodiment 1
  • the network topology of the VPN user using the cloud computing resource is as shown in FIG. 3, where five PE devices are included, and the other ones are PE_1, PE_2, PE_3, PE_x, and PE_y, where PE_1, PE-2 belongs to the first VPN where VPN UE-1 is located, and PE_3, PE_x, and PE_y belong to the second VPN where VPN UE_2 is located.
  • Each VPN user terminal initiates a cloud computing resource application, and the cloud computing management system (Cloud Manager) interacts with the virtual machine management system (VM Manager) to complete resource allocation and separately to the data center management system (DC Manager) and the dynamic configuration server (AAA or The NMS or EMS initiates a network configuration request, and the dynamic configuration server initiates a configuration request to each PE device to complete the dynamic configuration process of the cloud computing.
  • Cloud Manager the cloud computing management system
  • VM Manager virtual machine management system
  • DC Manager data center management system
  • AAA or The NMS or EMS initiates a network configuration request
  • the dynamic configuration server initiates a configuration request to each PE device to complete the dynamic configuration process of the cloud computing.
  • the specific process of dynamic configuration before using the cloud computing resource in the network scenario shown in FIG. 3 may include the following steps:
  • Step 401 Each PE device initiates an authentication request to the dynamic configuration server, and carries a configurable service type.
  • the configurable service type is specifically a VPN service
  • the user name identifier is used to indicate that the PE device is a parameter configurable PE device.
  • the dynamic configuration server receives each The PE device initiates the authentication request and performs the authentication.
  • the PE device that passes the authentication has the right to receive the configuration message from the dynamic configuration server.
  • the dynamic configuration server sends the basic VPN configuration information to the PE device that passes the authentication, and completes the basic VPN of each PE device.
  • the basic VPN configuration information specifically refers to some VPN configurations common to each PE device.
  • the information may include: physical port information on the DC side, logical interface information, and VPN instance configuration information.
  • Step 403 After all the PEs complete the basic VPN configuration, the UE_1 in the first VPN initiates a resource application request to the cloud computing management system.
  • Step 404 The cloud computing management system receives the resource application request and sends the resource request request to the virtual machine management system.
  • Step 405 The virtual machine management system receives the resource application request, performs resource allocation processing according to the current resource usage status, and if the resource allocation is successful, returns an application success message to the cloud computing management system, and notifies the allocated cloud computing resource.
  • the data center (DC) information is located; here, the DC information may include an address and/or an identifier of the DC, and the like.
  • Step 406 The cloud computing management system receives the application success message returned by the virtual machine system, accesses the cloud computing resource allocated by the virtual machine management system to the cloud computing resource of the first VPN, and adds the corresponding DC information to the first In the DC list of all the cloud computing resources in the VPN;
  • Step 407 The cloud computing management system initiates a query request to the OSS, where the query request is used to query related information of each PE device in the first VPN, and notify the newly applied cloud computing DC information for the resource.
  • each PE device in the first VPN includes the PE device information of all the sites in the first VPN and the egress PE device information in the DC list of all the cloud computing resources in the first VPN.
  • the information about the PE device may include: information about the management address of the PE device.
  • Step 408 The OSS receives the query request initiated by the cloud computing management system, and queries the first
  • the information about the PEs in the VPN and the dynamic configuration parameters of the VPN, and the query result is returned to the cloud computing management system, where the query result includes the related information of the PEs and the dynamic configuration parameters of the VPNs in the first VPN. ;
  • Step 409 The cloud computing management system receives the query result returned by the OSS, and obtains related information and VPN dynamic configuration parameters of each PE device in the first VPN.
  • Step 410 The cloud computing management system initiates a configuration request to the dynamic configuration server, where the configuration request includes the identifier of the PE device to be dynamically configured and the VPN dynamic configuration parameter.
  • the PE device that needs to be dynamically configured is the PE device in the current first VPN, that is, the PE device including all the sites in the current first VPN and the egress PE device in the DC list where all the cloud computing resources in the first VPN are located. .
  • Step 411 The dynamic configuration server receives the configuration request, obtains the identifier of the PE device to be dynamically configured, and sends a Radius CoA message to the PE device that needs to be dynamically configured, and carries the VPN dynamic configuration parameter in the configuration request.
  • Step 412 Each PE device that needs to be dynamically configured receives the Radius CoA message, obtains the VPN dynamic configuration parameter, and performs VPN service configuration. After the configuration succeeds, the configuration success message is returned to the dynamic configuration server.
  • Step 413 The dynamic configuration server receives the configuration success message returned by each PE device, and returns a configuration success message to the cloud computing management system. At this point, the dynamic configuration of the PE device is completed when the VPN uses cloud computing resources.
  • Step 414 The VPN UE_1 user leaves the first VPN, and the VPN UE_1 initiates a resource release request to the cloud computing management system.
  • Step 415 The cloud computing management system receives the resource release request and sends the resource release request to the virtual machine management system.
  • Step 416 The virtual machine management system receives the resource release request, performs resource release processing, and returns an application success message to the cloud computing management system, and notifies the DC information of the released cloud computing resource.
  • the DC information may include an address and/or an identifier of the DC or the like.
  • Step 417 The cloud computing management system receives the application success message returned by the virtual machine system, and deletes the cloud computing resource released by the virtual machine management system from the cloud computing resource of the first VPN, if the first DC does not exist first VPN cloud computing resources, then all cloud meters in the first VPN Delete the DC information in the DC list where the resource is located;
  • Step 418 The cloud computing management system sends a query request to the OSS, where the query request is used to query related information of each PE device in the first VPN, and notify DC information of the newly released cloud computing resource.
  • each PE device in the first VPN includes a PE device at all sites in the first VPN and an egress PE device in a DC list in which all cloud computing resources in the first VPN are located.
  • Step 419 The OSS receives the query request initiated by the cloud computing management system, queries related information of the PE devices in the first VPN, and dynamically configures the VPN parameters, and returns a query result to the cloud computing management system, where the query result includes Relevant information and VPN dynamic configuration parameters of each PE device in the first VPN that are queried;
  • Step 420 The cloud computing management system receives the query result returned by the OSS, and receives related information and VPN dynamic configuration parameters of each PE device in the first VPN.
  • the VPN dynamic configuration parameter may include physical port or logical interface information (including physical port or logical interface name, number, IP address, etc.) of the PE device and the network where the cloud computing resource is located, and a VPN instance (including VRF information and VSI information), GRE tunnel configuration information, IPSec tunnel configuration information, and so on.
  • physical port or logical interface information including physical port or logical interface name, number, IP address, etc.
  • VPN instance including VRF information and VSI information
  • GRE tunnel configuration information including GRE tunnel configuration information, IPSec tunnel configuration information, and so on.
  • Step 421 The cloud computing management system initiates a configuration request to the dynamic configuration server, where the configuration request includes the identifier of the PE device to be dynamically deleted and the dynamic configuration parameter of the VPN.
  • the configuration request includes the identifier of the PE device to be dynamically deleted and the dynamic configuration parameter of the VPN.
  • Each of the PEs in the first VPN includes the PEs of all the sites in the current VPN and the egress PEs of the DCs where all the cloud computing resources in the first VPN are located.
  • Step 422 The dynamic configuration server receives the configuration request, obtains the identifier of the PE device that needs to be dynamically deleted, and sends a Radius CoA message to the PE device that needs to be dynamically deleted, and carries the VPN dynamic configuration parameter in the configuration request.
  • Step 423 Each PE device that needs to perform dynamic configuration deletion receives the Radius CoA separately. The message deletes the corresponding VPN dynamic configuration parameter, and returns the configuration deletion success message to the dynamic configuration server after the configuration is successfully deleted.
  • Step 424 The dynamic configuration server receives the configuration deletion success message returned by each PE device, and returns a configuration deletion success message to the cloud computing management system. At this point, the process of deleting the dynamic configuration of the PE device is completed when the VPN uses the cloud computing resource.
  • a 3GPP user uses a cloud computing resource, and a scenario of accessing through a wireless local area network (WLAN) network is as shown in FIG. 5, wherein the UE as a 3GPP user passes the broadband.
  • the BBF Defined Access Network and the Broadband Home Network access the 3GPP core network, and the broadband service gateway (which may be TWAG or BNG or eBNG or the access network defined in the broadband forum)
  • the BRAS or SR or NAS establishes an interactive tunnel with the 3GPP gateway of the 3GPP core network for accessing the data transmission of the UE to the 3GPP core network through the access network defined by the broadband forum and the broadband home network.
  • the process of establishing the interactive tunnel includes the process of dynamically configuring 3GPP user configuration information to the broadband service gateway.
  • the process of establishing an interaction tunnel between the broadband service gateway and the 3GPP gateway may specifically include the following steps:
  • Step 601 The broadband service gateway device initiates an authentication request to the BBF AAA, and carries a configurable service type.
  • the configurable service type is specifically a mobile network user access service
  • the authentication request further identifies, by the user name, the broadband service gateway device as a parameter configurable broadband service gateway device;
  • Step 602 The BBF AAA authenticates the authentication request initiated by the broadband service gateway device, and the authentication is passed, and the BBF AAA sends the 3GPP user public configuration information to the broadband service gateway device.
  • the public configuration information may be pre-configured on the BBF AAA or may be acquired by the BBF AAA to the 3GPP AAA.
  • the public configuration information may include GTP protocol basic configuration information, mobile network gateway information, and the like.
  • the broadband service gateway device that passes the authentication has the right to receive the configuration message from the BBF AAA. Therefore, only when the authentication is passed, the BBF AAA will send the 3GPP user public configuration information to the broadband service gateway device, and the broadband service gateway device will The 3GPP user public configuration information is configured to itself.
  • Step 603 After searching for the local WLAN network, the 3GPP user UE initiates an access authentication request by using the EAP protocol.
  • Step 604 the RG/AP sends the access authentication request of the UE to the BNG.
  • Step 605 The BNG sends the access authentication request to the BBF AAA.
  • Step 606 The BBF AAA identifies that the UE is a 3GPP user, and sends a message to the 3GPP AAA.
  • Step 607 After receiving the authentication success message returned by the 3GPP AAA, the BBF AAA returns an authentication success message to the BNG, and sends a configuration request to the broadband service gateway by using an authorization message of the Diameter protocol, where the configuration request includes 3GPP user dynamic configuration information.
  • the 3GPP user dynamic configuration information includes identity information of the 3GPP user, mobile network gateway information, APN information, MAC address, and the like.
  • Step 608 The broadband service gateway receives the authorization message of the Diameter protocol, receives the configuration request from the configuration request, and performs dynamic configuration according to the 3GPP user dynamic configuration information included in the configuration request. After the dynamic configuration succeeds, the device sends a message to the 3GPP gateway. Tunnel establishment request;
  • Step 609 The 3GPP gateway receives the tunnel establishment request, establishes a GTP tunnel with the broadband service gateway, and returns a tunnel establishment success message to the broadband service gateway after the tunnel is successfully established.
  • the tunnel parameter is a tunnel configuration parameter of the GTP protocol.
  • Step 611 When the subscription information of the UE (such as the bandwidth, the priority, and the like) changes dynamically, the BBF AAA sends a configuration request to the broadband service gateway, where the configuration request includes the changed 3GPP user dynamic configuration information, and the changed 3GPP
  • the user dynamic configuration information includes the updated GTP tunnel parameters to update the GTP tunnel parameters (such as bandwidth, priority, etc.) of the UE;
  • Step 612 The broadband service gateway receives the configuration request, and performs dynamic configuration according to the 3GPP user dynamic configuration information (GTP tunnel parameter) included in the configuration request. After the dynamic configuration succeeds, the tunnel parameter update request is initiated to the 3GPP gateway.
  • GTP tunnel parameter 3GPP user dynamic configuration information
  • Step 613 The 3GPP gateway receives the tunnel parameter update request, updates the GTP tunnel parameter of the GTP tunnel with the broadband service gateway, and returns a tunnel parameter update success message to the broadband service gateway after the update succeeds;
  • Step 614 The broadband service gateway receives the tunnel parameter update success message returned by the 3GPP gateway, returns a configuration success message to the BBF AAA, and carries the tunnel parameter of the GTP tunnel between itself and the 3GPP gateway in the configuration success message.
  • Step 615 The UE leaves the WLAN, and the BBF AAA initiates a configuration request to the broadband service gateway, and carries the 3GPP user configuration information to be deleted.
  • Step 616 The broadband service gateway receives the configuration request, deletes the 3GPP user configuration information to be deleted from the local, and initiates a tunnel teardown request to the 3GPP gateway to remove the interaction tunnel between the 3GPP gateway and the 3GPP gateway. After that, a configuration success message is returned to the BBF AAA.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明实施例公开了一种动态配置方法,所述方法包括:网络设备向动态配置服务器发起认证请求,携带可配置业务类型;所述动态配置服务器接收所述认证请求,对所述网络设备进行认证,并在认证成功时向所述网络设备发送认证成功消息;所述动态配置服务器通过授权消息向所述网络设备发送配置请求,在所述配置请求中携带动态配置信息;所述网络设备接收所述动态配置服务器返回的授权消息,根据所述授权消息中的动态配置信息进行相应的业务配置,并向所述动态配置服务器发送配置响应消息。本发明实施例还公开了一种配置为动态配置的网络设备及动态配置系统,解决了网络设备无法由业务请求触发动态配置而导致用户业务开通缓慢的问题,提高了用户业务开通的速度和效率。

Description

一种动态配置方法及装置、 系统 技术领域
本发明实施例涉及数据通信网络的云计算技术, 尤其涉及一种动态配 置方法及装置、 系统。 背景技术
随着互联网用户和业务规模的飞速发展, 提升网络和终端 /服务器的资 源利用率技能减排越发显得重要起来。 云计算概念是由 Google提出的, 狭 义云计算是指 IT基础设施的交付和使用模式, 指通过网络以按需、 易扩展 的方式获得所需的资源, 广义云计算是指服务的交付和使用模式, 指通过 网络以按需、 易扩展的方式获得所需的服务, 这种服务可以是 IT和软件、 互联网相关的, 也可以是任意其他的服务。 通过部署云计算网络可以实现 网络资源和终端 /月良务器资源的有效整合、 大幅度提升资源利用率同时实现 节能减排的目标。
现阶段使用云计算业务的客户很大一部分是运营商原有的企业 /集团用 户, 此类客户在使用云计算业务之后, 可以通过动态申请运营商的云计算 资源来大幅降低自身闲时的基础设置和能源投入, 实现企业效益的提升并 节约能源使用量。
而大多数当前的企业用户在运营商网络中使用的是虚拟专用网 (VPN, Virtual Private Network )业务。 VPN指的是在公用网络上建立的专用网络, VPN 的任意两个节点之间的连接并没有传统专网所需的端到端的物理链 路, 而是架构在公用网络服务商所提供的网络平台 (如互联网 (Internet ), 异步传输模式( ATM )、 帧中继( Frame Relay )等 )之上的逻辑链路, 用户 数据在该逻辑链路中传输。 现阶段, VPN用户在使用云计算资源时,运营支撑系统( OSS , Operation Support System ) 向网络管理系统(NMS , Network Management System ) I 网元管理系统(EMS , Element Management System )发起配置请求并进一 步配置到对应的数据中心出口即运营商边缘 ( PE, Provider Edge )设备时, 由于实际网络中存在多个厂商 PE 设备并存且各个厂商有各自的 NMS/EMS、 以及可能通过网络配置人员手工操作 NMS/EMS甚至直接登陆 到对应的 PE设备上通过命令行的方式进行配置, 因此, 动态配置的过程相 对复杂很多, 导致 VPN用户云计算业务开通緩慢。
与此同时, 随着移动互联网业务的爆炸式发展, 移动网用户的数据流 量也随之呈几何级数增长, 移动网络的扩容和建设速度远远无法满足广大 用户的需求, 因此产生了移动网用户数据业务利用非移动网络承载的需求。 移动网用户通过非移动网络认证鉴权之后, 部分业务仍旧需要返回到移动 核心网络处理, 那么就需要在非移动网网关和移动网网关之间为每个移动 网用户建立隧道, 同时每个移动网用户可能还会有多个移动网连接同时存 在, 这就需要按需、 实时的建立起非移动网络和移动网络之间的数据通道, 也就是说, 移动网用户需要通过使用非移动网络的云计算资源来实现移动 网用户数据业务, 因此, 也就需要简化移动网用户使用云计算资源时的动 态配置过程, 使得移动网用户云计算业务能够及时开通, 以触发非移动网 网关和移动网网关之间隧道的建立。 发明内容
有鉴于此, 本发明实施例的主要目的在于提供一种动态配置方法及装 置、 系统, 以解决网络设备无法由业务请求触发动态配置而导致用户业务 开通緩慢的问题。
为达到上述目的, 本发明实施例的技术方案是这样实现的:
本发明实施例提供了一种动态配置方法, 所述方法包括: 网络设备向动态配置服务器发起认证请求, 携带可配置业务类型; 所述动态配置服务器接收所述认证请求, 对所述网络设备进行认证, 并在认证成功时向所述网络设备发送认证成功消息;
所述动态配置服务器通过授权消息向所述网络设备发送配置请求, 在 所述配置请求中携带动态配置信息;
所述网络设备接收所述动态配置服务器返回的授权消息, 根据所述授 权消息中的动态配置信息进行相应的业务配置, 并向所述动态配置服务器 发送配置响应消息。
在上述方案中, 所述动态配置服务器在向所述网络设备发送的认证成 功消息中携带基本配置信息; 之后, 所述方法还包括: 所述网络设备接收 所述认证成功消息, 获取所述基本配置信息, 并将所述基本配置信息配置 到本地;
或者, 所述方法还包括: 所述动态配置服务器在所述网络设备上预先 配置所述基本配置信息。
在上述方案中, 所述携带基本配置信息的认证成功消息为远程用户拨 号认证 ( Radius , Remote Authentication Dial In User Service )协议的接入成 功 ( Access-Accept ) 消息;
所述携带动态配置信息的授权消息为终端访问控制器访问控制系统 ( Tacacs, Terminal Access Controller Access-Control System )十办议的授权消 息或者下一代认证授权计费协议 ( Diameter )协议的授权消息。
在上述方案中, 所述携带动态配置信息的授权消息为 Radius协议的属 性变更(CoA, Change of Attribute ) 消息或 Tacacs 协议的授权消息或者 Diameter协议的授权消息。
在上述方案中, 所述可配置业务类型为 VPN业务;
所述动态配置信息包括:所述网络设备与用户边缘 CE设备或数据中心 边缘 CE设备相连的物理端口或逻辑接口信息、 虚拟路由转发实例 (VRF, Virtual Routing & Forwarding Instance )信息、 虚拟交换实例 ( VSI, Virtual Switch Instance )信息。
在上述方案中, 所述基本配置信息为 PE设备的 VPN业务基本配置信 息, 包括: 建立 PE设备间互联的边界网关协议(BGP, Border Gateway Protocol )协议配置信息或标签分发协议 ( LDP, Label Distribution Protocol ) 协议配置信息、 以及二层 VPN的基本配置信息或三层 VPN的基本配置信 在上述方案中, 所述可配置业务类型为移动网用户接入业务, 所述动 态配置信息为移动网用户动态配置信息, 包括: 移动网用户的标识信息、 移动网网关信息、 接入点 (APN )信息、 介质访问控制层(MAC )地址。
在上述方案中, 所述基本配置信息为移动网用户公用配置信息, 包括: 通用分组无线服务技术隧道协议 (GTP , General Packet Radio Service Tunneling Protocol )协议基本配置信息、 移动网网关信息。
在上述方案中, 所述动态配置服务器为认证授权服务器或认证授权计 费服务器(AAA )或网元管理系统(EMS )或网络管理系统(NMS )。
本发明实施例还提供了一种配置为动态配置的网络设备, 所述网络设 备包括: 认证单元和配置单元, 其中,
认证单元, 配置为向动态配置服务器发起认证请求, 携带可配置业务 类型; 以及, 接收动态配置服务器返回的认证成功消息;
配置单元, 配置为接收动态配置服务器发送的携带有动态配置信息的 授权消息, 根据所述授权消息中的动态配置信息进行相应的业务配置, 并 向所述动态配置服务器发送配置响应消息。
在上述方案中, 所述认证单元, 还配置为接收所述动态配置服务器返 回的携带有基本配置信息的认证成功消息; 所述配置单元, 还配置为获取 所述认证单元所接收认证成功消息中携带的基本配置信息, 并将所述基本 配置信息配置到本地; 或者, 所述配置单元, 还配置为在所述动态配置服 务器的控制下, 预先配置所述基本配置信息。
在上述方案中, 所述授权消息为远程用户拨号认证 Radius协议的属性 变更( CoA, Change of Attribute ) 消息或 Tacacs协议的授权消息或者下一 代认证授权计费协议 Diameter协议的授权消息。
在上述方案中, 所述网络设备为 PE设备、 或授信的无线局域网接入网 关( TWAG, Trusted Wireless Access Gateway )、 或宽带网络网关( BNG, Broadband Network Gateway ), 或增强的宽带网络网关 (eBNG, enhanced Broadband Network Gateway ), 或宽带远程接入服务器(BRAS , Broadband Remote Access Server )、 或业务路由器( SR, Service Router )、 或网络接入 月良务器(NAS, Network Access Server )0
本发明实施例还提供了一种动态配置系统, 所述系统包括: 网络设备 和动态配置服务器; 其中,
所述网络设备包括: 认证单元和配置单元, 其中, 认证单元, 配置为 向动态配置服务器发起认证请求, 携带可配置业务类型; 以及, 接收动态 配置服务器返回的认证成功消息; 配置单元, 配置为接收动态配置服务器 发送的携带有动态配置信息的授权消息, 根据所述授权消息中的动态配置 信息进行相应的业务配置, 并向所述动态配置服务器发送配置响应消息; 动态配置服务器, 配置为接收所述网络设备发起的认证请求, 对所述 网络设备进行认证, 并在认证成功时向所述网络设备发送认证成功消息; 以及, 配置为通过授权消息向所述网络设备发送配置请求, 在所述配置请 求中携带动态配置信息。
在上述方案中,所述网络设备为 PE设备、或 TWAG、或 BNG、或 eBNG、 或 BRAS、 或 SR、 或 NAS。 在上述方案中 ,所述动态配置服务器为 AAA或 EMS或 NMS或运营支 撑系统(OSS )。
本发明实施例的动态配置方法及装置、 系统, 网络设备通过从动态配 置服务器接收动态配置信息进行动态业务配置, 解决了网络设备无法由业 务请求触发动态配置而导致用户业务开通緩慢的问题, 提高了用户业务开 通的速度和效率。
此外, 本发明实施例的动态配置方法应用于 VPN使用云计算资源过程 中时, 能够实现快速将云计算资源加入用户 VPN的功能, 提升了用户云计 算业务的效率和服务体验;
此外, 本发明实施例的动态配置方法应用于移动网用户通过非移动网 接入移动核心网的过程时, 可以实现非移动网网关和移动网关间交互隧道 的动态建立, 提升了移动网用户通过非移动网接入的效率和服务体验。 附图说明
实施例或现有技术描述中所需要使用的附图作一简单地介绍, 显而易见地, 下面描述中的附图仅仅是本发明的一些实施例, 对于本领域普通技术人员 来讲, 在不付出创造性劳动的前提下, 还可以根据这些附图获得其他的附 图。
图 1为本发明实施例动态配置方法的实现流程图;
图 2为本发明实施例动态配置系统的组成结构示意图;
图 3为本发明实施例一 VPN使用云计算资源的场景示意图;
图 4为本发明实施例一动态配置过程的流程示意图;
图 5为实施例二 3GPP用户使用 WLAN接入 3GPP核心网的场景示意 图;
图 6为本发明实施例二动态配置过程的流程示意图。 具体实施方式
本发明实施例的动态配置方法, 如图 1所示, 主要可以包括如下步驟: 步驟 101 : 网络设备向动态配置服务器发起认证请求,携带可配置业务 类型;
步驟 102: 所述动态配置服务器接收所述认证请求,对所述网络设备进 行认证, 并在认证成功时向所述网络设备发送认证成功消息;
步驟 103:所述动态配置服务器通过授权消息向所述网络设备发送配置 请求, 在所述配置请求中携带动态配置信息;
步驟 104: 所述网络设备接收所述动态配置服务器返回的授权消息,根 据所述授权消息中的动态配置信息进行相应的业务配置, 并向所述动态配 置服务器发送配置响应消息。
在进行动态配置之后, 网络设备向所述动态配置服务器返回的响应消 息可以包含有配置结果, 所述配置结果为表示配置成功的配置成功信息或 表示配置失败的配置失败信息。
这里, 所述动态配置服务器在向所述网络设备发送的认证成功消息中 携带基本配置信息; 之后, 所述方法还包括: 所述网络设备接收所述认证 成功消息, 获取所述基本配置信息, 并将所述基本配置信息配置到本地; 或者, 所述方法还包括: 所述动态配置服务器在所述网络设备上预先 配置所述基本配置信息。
具体地, 所述携带基本配置信息的认证成功消息为 Radius 协议的 Access-Accept消息; 所述携带动态配置信息的授权消息为 Tacacs协议的授 权消息或者 Diameter协议的授权消息。
这里,所述携带动态配置信息的授权消息为 Radius协议的 CoA消息或 Tacacs协议的授权消息或者 Diameter协议 (是 Radius协议的升级版本)的 授权消息。
这里, 所述可配置业务类型为虚拟专用网 VPN业务; 所述动态配置信 息包括: 所述网络设备与用户边缘 CE设备或数据中心边缘 CE设备相连的 物理端口或逻辑接口信息、 虚拟路由转发实例 VRF信息、 虚拟交换实例 VSI信息。 其中, 所述基本配置信息为 PE设备的 VPN业务基本配置信息, 包括: 建立 PE设备间互联的 BGP协议配置信息或 LDP协议配置信息、 以 及二层 VPN的基本配置信息(包括 VSI等 )或三层 VPN的基本配置信息。
这里, 所述可配置业务类型为移动网用户接入业务, 所述动态配置信 息为移动网用户动态配置信息, 包括: 移动网用户的标识信息、 移动网网 关信息、 APN信息、 MAC地址。 所述基本配置信息为移动网用户公用配置 信息, 包括: GTP基本配置信息、 移动网网关信息。
这里, VPN使用云计算资源时, 动态配置 VPN参数的过程中, 所述授 权消息是在云计算管理系统独立或通过云计算虚拟机管理系统或其它系统 的协助完成用户申请的云计算资源的分配之后, 由动态配置服务器向与所 分配的云计算资源有连接关系的网络设备 (如 PE设备 )发送。 所述云计算 资源分布在一个或多个数据中心, 所述网络设备是相应 VPN中所有云计算 资源所在数据中心的出口 PE设备或与其所有站点下的 PE设备。 所述 VPN 包括多协议标签交换技术构建的虚拟二层专用网 ( MPLS L2VPN , Multi-Protocol Label Switching Layer 2 Virtual Private Network )、 多协议标签 交换技术构建的虚拟三层专用网 (MPLS L3 VPN , Multi-Protocol Label Switching Layer 3 Virtual Private Network ), 通用路由去†装 ( GRE, Generic Routing Encapsulation ) VPN, 因特网十办议安全 ( IPSec , Internet Protocol Security ) VPN等等。 所述公用配置信息为公用的 VPN公用配置信息; 所 述动态配置信息为 VPN动态配置信息, 包括: 网络设备与云计算资源所在 网络相连接的物理端口或逻辑接口信息 (包括物理端口或逻辑接口名称、 编号、 IP地址等)、 VPN实例 (包括虚拟路由和 VRF信息和 VSI信息)、 GRE隧道配置信息、 IPSec隧道配置信息等。
较佳的, 对于新增配置消息, 所述网络设备根据其中的配置参数进行 本地配置下发; 对于配置更新消息, 所述网络设备根据其中的配置参数信 息进行本地配置更新; 对于配置删除消息, 所述网络设备将本地对应的配 置进行删除。
其中、 所述网络设备可以是 PE设备、 TWAG、 BNG、 eBNG、 BRAS, SR、 NAS等设备中的任意一个, 所述动态配置服务器可以为 AAA或 EMS 或 NMS等。
相应的, 如图 2所示, 本发明实施例还提供了一种配置为动态配置的 网络设备 22, 所述网络设备包括: 认证单元 221和配置单元 222, 其中, 认证单元 221 , 配置为向动态配置服务器发起认证请求,携带可配置业务类 型; 以及, 接收动态配置服务器返回的认证成功消息; 配置单元 222, 配置 为接收动态配置服务器发送的携带有动态配置信息的授权消息, 根据所述 授权消息中的动态配置信息进行相应的业务配置, 并向所述动态配置服务 器发送配置响应消息。
这里, 所述认证单元 221 ,还配置为接收所述动态配置服务器返回的携 带有基本配置信息的认证成功消息; 所述配置单元, 还配置为获取所述认 证单元所接收认证成功消息中携带的基本配置信息, 并将所述基本配置信 息配置到本地;
或者, 所述配置单元 222, 还配置为在所述动态配置服务器的控制下, 预先配置所述基本配置信息。
实际应用 中 , 所述认证单元 221 可以 由 网络设备中 的 中央处理器(CPU, Central Processing Unit ), 或路由器来实现, 所述配置 单元可以由网络设备中的 CPU或存储器实现。 相应的, 如图 2所示, 本发明实施例还提供了一种动态配置系统, 所 述系统包括: 上述的网络设备 22和动态配置服务器 21; 其中, 动态配置服 务器 21 , 配置为接收所述网络设备 22发起的认证请求, 对所述网络设备 22进行认证,并在认证成功时向所述网络设备 22发送认证成功消息;以及, 配置为通过授权消息向所述网络设备 22发送配置请求, 在所述配置请求中 携带动态配置信息。 实施例一
本实施例中, VPN用户使用云计算资源的网络拓朴结构如图 3所示, 其中, 包含有五个 PE设备, 分另' J是 PE_1、 PE_2、 PE_3、 PE_x、 PE_y, 其 中, PE_1、 PE—2归属于 VPN UE—l所在的第一 VPN, PE_3、 PE_x、 PE_y 归属于 VPN UE_2所在的第二 VPN。各 VPN用户终端发起云计算资源申请, 云计算管理系统( Cloud Manager )与虚拟机管理系统(VM Manager )交互 完成资源分配、 并分别向数据中心管理系统(DC Manager )和动态配置服 务器( AAA或 NMS或 EMS )发起网络配置请求, 动态配置服务器再向各 PE设备发起配置请求, 完成云计算的动态配置过程。
具体地, 如图 4所示, 图 3所示的网络场景下完成使用云计算资源之 前的动态配置的具体流程可以包括如下步驟:
步驟 401 , 各 PE设备向动态配置服务器发起认证请求, 携带可配置业 务类型;
本实施例中, 所述可配置业务类型具体是 VPN业务, 此外, 所述认证 请求中还通过用户名标识来表示所述 PE设备为参数可配置的 PE设备; 步驟 402,动态配置服务器接收各 PE设备发起的认证请求并进行认证, 认证通过的 PE设备具有接收来自动态配置服务器的配置消息的权限,动态 配置服务器将基本 VPN配置信息发送给认证通过的 PE设备, 完成各 PE 设备的基本 VPN配置;
这里,所述基本 VPN配置信息具体是指各 PE设备公用的一些 VPN配 置信息, 具体可以包括: DC侧物理端口信息及逻辑接口信息、 VPN实例配 置信息等。
步驟 403, 在所有 PE设备均完成基本 VPN配置之后, 第一 VPN内的 UE_1向云计算管理系统发起资源申请请求;
步驟 404, 云计算管理系统接收所述资源申请请求,发送给虚拟机管理 系统;
步驟 405: 虚拟机管理系统接收所述资源申请请求,根据当前的资源使 用状况进行资源分配处理, 如果资源分配成功, 则返回申请成功消息给所 述云计算管理系统, 并告知所分配云计算资源所在的数据中心(DC )信息; 这里, 所述 DC信息可以包括 DC的地址和 /或标识等。
步驟 406 , 云计算管理系统接收所述虚拟机系统返回的申请成功消息, 将虚拟机管理系统所分配的云计算资源接入到第一 VPN的云计算资源中, 并将相应 DC信息加入到第一 VPN中所有云计算资源所在的 DC列表中; 步驟 407: 云计算管理系统向 OSS发起查询请求, 该查询请求用于查 询第一 VPN中各 PE设备的相关信息, 并通告新申请的云计算资源的 DC 信息。
这里, 所述第一 VPN中各 PE设备包括第一 VPN下所有站点的 PE设 备和第一 VPN下所有云计算资源所在 DC列表的出口 PE设备信息。
其中, PE设备的相关信息可以包括: PE设备管理地址等信息。
步驟 408: OSS接收所述云计算管理系统发起的查询请求, 查询第一
VPN下各 PE设备的相关信息及 VPN动态配置参数, 并向所述云计算管理 系统返回查询结果, 所述查询结果包含有查询到的第一 VPN下各 PE设备 的相关信息和 VPN动态配置参数;
步驟 409,云计算管理系统接收 OSS返回的查询结果,获取到第一 VPN 下各 PE设备的相关信息及 VPN动态配置参数。 步驟 410: 云计算管理系统向动态配置服务器发起配置请求, 所述配置 请求中包含需进行动态配置的 PE设备的标识及 VPN动态配置参数;
这里,所述需进行动态配置的 PE设备为当前第一 VPN中的各 PE设备, 即包括当前第一 VPN中所有站点的 PE设备和第一 VPN下所有云计算资源 所在 DC列表的出口 PE设备。
步驟 411 , 动态配置服务器接收所述配置请求, 获取需进行动态配置的 PE设备的标识, 向需进行动态配置的 PE设备发送 Radius CoA消息, 携带 所述配置请求中的 VPN动态配置参数;
步驟 412,需进行动态配置的各 PE设备分别接收所述 Radius CoA消息, 获取所述 VPN动态配置参数并进行 VPN业务配置, 配置成功后向动态配 置服务器返回配置成功消息;
步驟 413 , 动态配置服务器接收各 PE设备返回的配置成功消息, 并向 云计算管理系统返回配置成功消息。 至此, VPN使用云计算资源时 PE设 备的动态配置完成。
步驟 414 , VPN UE_1用户离开第一 VPN, VPN UE_1向云计算管理系 统发起资源释放请求;
步驟 415 : 云计算管理系统接收所述资源释放请求,发送给虚拟机管理 系统;
步驟 416:虚拟机管理系统接收所述资源释放请求,进行资源释放处理, 并返回申请成功消息给所述云计算管理系统, 并告知所释放云计算资源所 在的 DC信息;
这里, 所述 DC信息可以包括 DC的地址和 /或标识等。
步驟 417 , 云计算管理系统接收所述虚拟机系统返回的申请成功消息, 将虚拟机管理系统所释放的云计算资源从第一 VPN的云计算资源中删除, 若同一 DC下已不存在第一 VPN的云计算资源,则在第一 VPN中所有云计 算资源所在的 DC列表中删除该 DC信息;
步驟 418: 云计算管理系统向 OSS发起查询请求, 该查询请求用于查 询第一 VPN中各 PE设备的相关信息, 并通告新释放的云计算资源的 DC 信息。
这里, 所述第一 VPN中各 PE设备包括第一 VPN下所有站点的 PE设 备和第一 VPN下所有云计算资源所在 DC列表的出口 PE设备。
步驟 419: OSS接收所述云计算管理系统发起的查询请求, 查询第一 VPN下各 PE设备的相关信息及 VPN动态配置参数, 并向所述云计算管理 系统返回查询结果, 所述查询结果包含有查询到的第一 VPN下各 PE设备 的相关信息和 VPN动态配置参数;
步驟 420,云计算管理系统接收 OSS返回的查询结果,接收到第一 VPN 下各 PE设备的相关信息及 VPN动态配置参数。
这里, 所述 VPN动态配置参数可以包括 PE设备与云计算资源所在网 络相连接的物理端口或逻辑接口信息 (包括物理端口或逻辑接口名称、 编 号、 IP地址等)、 VPN实例 (包括 VRF信息和 VSI信息)、 GRE隧道配置 信息、 IPSec隧道配置信息等。
步驟 421: 云计算管理系统向动态配置服务器发起配置请求, 所述配置 请求中包含需进行动态配置删除的 PE设备的标识及 VPN动态配置参数; 这里, 所述需进行动态配置删除的 PE设备为当前第一 VPN中的各 PE 设备,即包括当前第一 VPN中所有站点的 PE设备和第一 VPN下所有云计 算资源所在 DC的出口 PE设备。
步驟 422, 动态配置服务器接收所述配置请求, 获取需进行动态配置删 除的 PE设备的标识,向需进行动态配置删除的 PE设备发送 Radius CoA消 息, 携带所述配置请求中的 VPN动态配置参数;
步驟 423 , 需进行动态配置删除的各 PE设备分别接收所述 Radius CoA 消息, 删除相应的 VPN动态配置参数, 配置删除成功后向动态配置服务器 返回配置删除成功消息;
步驟 424, 动态配置服务器接收各 PE设备返回的配置删除成功消息, 并向云计算管理系统返回配置删除成功消息。 至此, VPN使用云计算资源 时 PE设备的动态配置删除的过程完成。
实施例二
本实施例中, 3GPP用户 (图 5中的 UE )使用云计算资源, 通过无线 局域网 ( WLAN, Wireless Local Area Networks ) 网络接入的场景如图 5所 示,其中,作为 3GPP用户的 UE通过宽带论坛定义的接入网络( BBF Defined Access Network )和宽带家庭网络( Broadband Home Network )接入到 3GPP 核心网, 需要在宽带论坛定义的接入网络的宽带业务网关(可以是 TWAG 或 BNG或 eBNG或 BRAS或 SR或 NAS )与 3GPP核心网的 3GPP网关之 间建立一个交互隧道,用于 UE通过宽带论坛定义的接入网络和宽带家庭网 络接入到 3GPP核心网的数据传输。其中,建立所述交互隧道的过程中包含 了将 3GPP用户配置信息动态配置到宽带业务网关上的过程。
如图 6所示, 在宽带业务网关与 3GPP 网关 (如图 5中的 PDN网关) 之间建立交互隧道的流程具体可以包括如下步驟:
步驟 601 : 宽带业务网关设备向 BBF AAA发起认证请求, 携带可配置 业务类型;
这里, 所述可配置业务类型具体是移动网用户接入业务, 此外, 所述 认证请求中还通过用户名标识所述宽带业务网关设备为参数可配置的宽带 业务网关设备;
步驟 602: BBF AAA对所述宽带业务网关设备发起的认证请求进行认 证, 认证通过, BBF AAA将 3GPP用户公用配置信息发送给宽带业务网关 设备; 所述公用配置信息可以预配置在 BBF AAA上, 也可以由 BBF AAA向 3GPP AAA获取。 所述公共配置信息可以包括 GTP协议基本配置信息、 移 动网网关信息等。
这里,只有认证通过的宽带业务网关设备具有接收来自 BBF AAA的配 置消息的权限, 因此, 只有在认证通过时, BBF AAA会将 3GPP用户公用 配置信息发送给宽带业务网关设备,宽带业务网关设备将所述 3GPP用户公 用配置信息配置到自身。
步驟 603, 3GPP用户 UE搜索到本地的 WLAN网络之后, 通过 EAP 协议发起接入认证请求;
步驟 604, RG/AP将 UE的接入认证请求发送给 BNG;
步驟 605 , BNG将所述接入认证请求发送给 BBF AAA;
步驟 606, BBF AAA识别出所述 UE是 3GPP用户, 向 3GPP AAA发 功消息;
步驟 607 , BBF AAA接收 3GPP AAA返回的认证成功消息后, 向 BNG 返回认证成功消息, 同时通过 Diameter协议的授权消息向宽带业务网关发 起配置请求, 所述配置请求中包含有 3GPP用户动态配置信息。
所述 3GPP用户动态配置信息包括 3GPP用户的标识信息、移动网网关 信息、 APN信息、 MAC地址等。
步驟 608, 宽带业务网关接收所述 Diameter协议的授权消息, 从中接 收到所述配置请求,并根据所述配置请求中包含的 3GPP用户动态配置信息 进行动态配置, 动态配置成功后, 向 3GPP网关发起隧道建立请求;
步驟 609, 3GPP网关接收所述隧道建立请求, 建立与所述宽带业务网 关之间的 GTP隧道, 并在隧道建立成功后, 返回隧道建立成功的消息给宽 带业务网关; 步驟 610:宽带业务网关接收所述 3GPP网关返回的隧道建立成功消息, 向 BBF AAA返回配置成功消息, 并在所述配置成功消息中携带自身与 3GPP网关之间 GTP隧道的隧道参数;
这里, 所述隧道参数为 GTP协议的隧道配置参数。
步驟 611 , 当 UE的签约信息(如带宽、 优先级等)发生动态变化时, BBF AAA 向宽带业务网关发送配置请求, 所述配置请求中包含变化后的 3GPP用户动态配置信息, 变化后的 3GPP用户动态配置信息包含更新后的 GTP隧道参数, 以更新该 UE的 GTP隧道参数(如带宽、 优先级等 );
步驟 612, 宽带业务网关接收到所述配置请求, 并根据所述配置请求中 包含的 3GPP用户动态配置信息(GTP隧道参数)进行动态配置, 动态配 置成功后, 向 3GPP网关发起隧道参数更新请求;
步驟 613, 3GPP网关接收所述隧道参数更新请求, 更新与所述宽带业 务网关之间 GTP隧道的 GTP隧道参数, 并在更新成功后,返回隧道参数更 新成功的消息给宽带业务网关;
步驟 614: 宽带业务网关接收所述 3GPP网关返回的隧道参数更新成功 消息, 向 BBF AAA返回配置成功消息, 并在所述配置成功消息中携带自身 与 3GPP网关之间 GTP隧道的隧道参数;
步驟 615 , UE离开 WLAN , BBF AAA向宽带业务网关发起配置请求, 携带需删除的 3GPP用户配置信息;
步驟 616, 宽带业务网关接收所述配置请求, 将所述需删除的 3GPP用 户配置信息从本地删除, 并向 3GPP 网关发起隧道拆除请求, 拆除自身与 3GPP网关之间的交互隧道, 在隧道拆除成功后, 向 BBF AAA返回配置成 功消息。
以上所述, 仅为本发明的较佳实施例而已, 并非用于限定本发明的保 护范围。

Claims

权利要求书
1、 一种动态配置方法, 所述方法包括:
网络设备向动态配置服务器发起认证请求, 携带可配置业务类型; 所述动态配置服务器接收所述认证请求, 对所述网络设备进行认证, 所述动态配置服务器通过授权消息向所述网络设备发送配置请求, 在 所述配置请求中携带动态配置信息;
所述网络设备接收所述动态配置服务器返回的授权消息, 根据所述授 权消息中的动态配置信息进行相应的业务配置, 并向所述动态配置服务器 发送配置响应消息。
2、 根据权利要求 1所述的动态配置方法, 其中,
所述动态配置服务器在向所述网络设备发送的认证成功消息中携带基 本配置信息; 之后, 所述方法还包括: 所述网络设备接收所述认证成功消 息, 获取所述基本配置信息, 并将所述基本配置信息配置到本地;
或者, 所述方法还包括: 所述动态配置服务器在所述网络设备上预先 配置所述基本配置信息。
3、 根据权利要求 2所述的动态配置方法, 其中,
所述携带基本配置信息的认证成功消息为远程用户拨号认证 Radius协 议的接入成功 Access-Accept消息;
所述携带动态配置信息的授权消息为终端访问控制器访问控制系统 Tacacs协议的授权消息或者下一代认证授权计费协议 Diameter协议的授权 消息。
4、 根据权利要求 1所述的动态配置方法, 其中,
所述携带动态配置信息的授权消息为远程用户拨号认证 Radius协议的 属性变更 CoA消息或 Tacacs协议的授权消息或者下一代认证授权计费协议 Diameter协议的授权消息。
5、 根据权利要求 1所述的动态配置方法, 其中,
所述可配置业务类型为虚拟专用网 VPN业务;
所述动态配置信息包括:所述网络设备与用户边缘 CE设备或数据中心 边缘 CE设备相连的物理端口或逻辑接口信息、 虚拟路由转发实例 VRF信 息、 虚拟交换实例 VSI信息。
6、 根据权利要求 2或 5所述的动态配置方法, 其中,
所述基本配置信息为 PE设备的虚拟专用网 VPN业务基本配置信息, 包括: 建立 PE设备间互联的边界网关协议 BGP协议配置信息或边界网关 协议 LDP协议配置信息、 以及二层 VPN的基本配置信息或三层 VPN的基 本配置信息。
7、 根据权利要求 1所述的动态配置方法, 其中,
所述可配置业务类型为移动网用户接入业务, 所述动态配置信息为移 动网用户动态配置信息, 包括: 移动网用户的标识信息、 移动网网关信息、 接入点 APN信息、 介质访问控制层 MAC地址。
8、 根据权利要求 2或 7所述的动态配置方法, 其中,
所述基本配置信息为移动网用户公用配置信息, 包括: 通用分组无线 服务技术隧道协议 GTP协议基本配置信息、 移动网网关信息。
9、 根据权利要求 1至 8任一项所述的动态配置方法, 其中, 所述动态 配置服务器为认证授权服务器或认证授权计费服务器 AAA 或网元管理系 统 EMS或网络管理系统 NMS。
10、 一种配置为动态配置的网络设备, 所述网络设备包括: 认证单元 和配置单元, 其中,
认证单元, 配置为向动态配置服务器发起认证请求, 携带可配置业务 类型; 以及, 接收动态配置服务器返回的认证成功消息; 配置单元, 配置为接收动态配置服务器发送的携带有动态配置信息的 授权消息, 根据所述授权消息中的动态配置信息进行相应的业务配置, 并 向所述动态配置服务器发送配置响应消息。
11、 根据权利要求 10所述配置为动态配置的网络设备, 其中, 所述认证单元, 还配置为接收所述动态配置服务器返回的携带有基本 配置信息的认证成功消息; 所述配置单元, 还配置为获取所述认证单元所 接收认证成功消息中携带的基本配置信息, 并将所述基本配置信息配置到 本地;
或者, 所述配置单元, 还配置为在所述动态配置服务器的控制下, 预 先配置所述基本配置信息。
12、 根据权利要求 11所述配置为动态配置的网络设备, 其中, 所述授 权消息为远程用户拨号认证 Radius协议的属性变更 CoA消息或终端访问控 制器访问控制系统 Tacacs 协议的授权消息或者下一代认证授权计费协议 Diameter协议的授权消息。
13、 根据权利要求 10至 12任一项所述配置为动态配置的网络设备, 其中, 所述网络设备为运营商边缘 PE设备、 或授信的无线局域网接入网关 TWAG、 或宽带网络网关 BNG、 或增强的宽带网络网关 eBNG、 或宽带远 程接入服务器 BRAS、 或业务路由器 SR、 或网络接入服务器 NAS。
14、 一种动态配置系统, 所述系统包括: 网络设备和动态配置服务器; 其中,
所述网络设备包括: 认证单元和配置单元, 其中, 认证单元, 配置为 向动态配置服务器发起认证请求, 携带可配置业务类型; 以及, 接收动态 配置服务器返回的认证成功消息; 配置单元, 配置为接收动态配置服务器 发送的携带有动态配置信息的授权消息, 根据所述授权消息中的动态配置 信息进行相应的业务配置, 并向所述动态配置服务器发送配置响应消息; 动态配置服务器, 配置为接收所述网络设备发起的认证请求, 对所述 网络设备进行认证, 并在认证成功时向所述网络设备发送认证成功消息; 以及, 配置为通过授权消息向所述网络设备发送配置请求, 在所述配置请 求中携带动态配置信息。
15、 根据权利要求 14所述的动态配置系统, 其中, 所述网络设备为运 营商边缘 PE设备、或授信的无线局域网接入网关 TWAG、或宽带网络网关 BNG、 或增强的宽带网络网关 eBNG、 或宽带远程接入服务器 BRAS、 或业 务路由器 SR、 或网络接入服务器 NAS。
16、 根据权利要求 14所述的动态配置系统, 其中, 所述动态配置服务 器为认证授权服务器或认证授权计费服务器 AAA或网元管理系统 EMS或 网络管理系统 NMS或运营支撑系统 OSS。
PCT/CN2013/082234 2012-08-24 2013-08-23 一种动态配置方法及装置、系统 WO2014029367A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210305577.4A CN103634171A (zh) 2012-08-24 2012-08-24 一种动态配置方法及装置、系统
CN201210305577.4 2012-08-24

Publications (1)

Publication Number Publication Date
WO2014029367A1 true WO2014029367A1 (zh) 2014-02-27

Family

ID=50149472

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/082234 WO2014029367A1 (zh) 2012-08-24 2013-08-23 一种动态配置方法及装置、系统

Country Status (2)

Country Link
CN (1) CN103634171A (zh)
WO (1) WO2014029367A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110958150A (zh) * 2019-12-10 2020-04-03 深圳前海环融联易信息科技服务有限公司 一种服务动态配置的管理方法及装置

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106331197A (zh) * 2015-06-29 2017-01-11 中兴通讯股份有限公司 管理专线用户的方法、宽带接入服务器及管理服务器
CN107273378B (zh) * 2016-04-07 2021-01-01 创新先进技术有限公司 一种文件存储方法及装置
CN107689902B (zh) * 2016-08-04 2021-04-27 新华三技术有限公司 一种bras接入用户二层互通的方法和装置
CN107465550B (zh) * 2017-08-18 2020-09-18 深圳市泰信通信息技术有限公司 一种对接多厂商设备的控制项编排方法及装置
CN107347040B (zh) * 2017-08-18 2019-11-08 中国联合网络通信集团有限公司 一种带宽管理方法、设备及网络系统
CN108306807B (zh) * 2018-02-28 2021-04-27 新华三技术有限公司 开户管理方法及装置
CN112087477B (zh) * 2019-06-14 2021-12-03 华为技术有限公司 建立非以太网业务的方法和网络设备
CN112737951B (zh) * 2020-12-28 2022-08-30 网络通信与安全紫金山实验室 一种公私网混合场景下端到端sr控制方法、系统和可读存储介质
US11647002B2 (en) * 2021-08-09 2023-05-09 Oversec, Uab Providing a notification system in a virtual private network

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1848799A (zh) * 2005-04-12 2006-10-18 华为技术有限公司 实现虚拟专用网的方法
CN1933650A (zh) * 2005-09-12 2007-03-21 北京三星通信技术研究有限公司 Cdma2000统一鉴权平台业务接入方法和系统
CN101378584A (zh) * 2007-08-28 2009-03-04 中兴通讯股份有限公司 一种基于业务动态配置信道质量指示量化等级的方法

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100409630C (zh) * 2005-06-15 2008-08-06 杭州华三通信技术有限公司 提高虚拟专用网用户安全性的方法及系统
CN101141418B (zh) * 2006-09-08 2010-04-21 中国电信股份有限公司 基于策略的家庭网络业务识别的系统和方法
JP5029994B2 (ja) * 2008-03-24 2012-09-19 Necアクセステクニカ株式会社 通信システム、通信装置、アドレス割当装置、通信制御方法、及び通信制御プログラム
CN101610177A (zh) * 2009-07-17 2009-12-23 中兴通讯股份有限公司南京分公司 基于DHCP Server机制的业务配置的系统和方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1848799A (zh) * 2005-04-12 2006-10-18 华为技术有限公司 实现虚拟专用网的方法
CN1933650A (zh) * 2005-09-12 2007-03-21 北京三星通信技术研究有限公司 Cdma2000统一鉴权平台业务接入方法和系统
CN101378584A (zh) * 2007-08-28 2009-03-04 中兴通讯股份有限公司 一种基于业务动态配置信道质量指示量化等级的方法

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110958150A (zh) * 2019-12-10 2020-04-03 深圳前海环融联易信息科技服务有限公司 一种服务动态配置的管理方法及装置

Also Published As

Publication number Publication date
CN103634171A (zh) 2014-03-12

Similar Documents

Publication Publication Date Title
WO2014029367A1 (zh) 一种动态配置方法及装置、系统
JP6045648B2 (ja) ユーザエンティティにネットワークアクセスを提供する方法及び装置
CN108092893B (zh) 一种专线开通方法及装置
WO2013155943A1 (zh) 一种虚拟网络实现方法及系统
CN106789527B (zh) 一种专线网络接入的方法及系统
WO2013107136A1 (zh) 终端接入认证的方法及用户端设备
WO2013056585A1 (zh) 一种虚拟私云接入认证方法及相关装置
WO2013170790A1 (zh) 一种虚拟网络的接入方法和系统
WO2012088982A1 (zh) 路由信息发布方法、设备及虚拟专用网系统
WO2008006317A1 (fr) Système et procédé pour accès multiservice
WO2014075312A1 (zh) 一种网络穿越服务的提供方法、装置及系统
JP2003060653A (ja) 無線ネットワークおよび無線ネットワークにおける認証方法
WO2009074080A1 (fr) Méthode, appareil et système de configuration d'un réseau virtuel et commutateur de partitions
EP2628287A1 (en) Multipath transmission control protocol proxy
WO2014166247A1 (zh) 一种虚拟网络管理的实现方法和系统
WO2011150610A1 (zh) 一种动态调整带宽业务的方法及系统、宽带策略系统
WO2014071685A1 (zh) 基于移动网络的租户网络业务实现方法、系统及网元
US20160065575A1 (en) Communication Managing Method and Communication System
WO2008138274A1 (fr) Procédé et dispositif correspondant et système servant à accéder à un service distant
CN103166909B (zh) 一种虚拟网络系统的接入方法、装置和系统
WO2020048348A1 (zh) 数据传输方法和系统
WO2014000520A1 (zh) 一种策略控制的方法、装置和系统
WO2009082910A1 (fr) Procédé et dispositif de configuration de réseau pour un terminal d'utilisateur
WO2009094910A1 (fr) Procédé, système et appareil pour convergence fixe-mobile
WO2016065920A1 (zh) 虚拟网络业务的提供方法及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13831385

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13831385

Country of ref document: EP

Kind code of ref document: A1