1 BSP 8100 Network Configuration Guide Introduction
This document provides information to define the hardware, software and network components, and the network configuration needed to run the SAPC in a blades BSP system.
2 BSP 8100 Network Configuration Guide Overview
This section provides an overview of the hardware and software components used to configure the SAPC internal and external networks, as well as a general network description.
The configuration described here applies to BSP 8100 Ericsson Blade System. For other vendor blade systems similar hardware functional elements must be considered:
A blade system is a hardware system with one complete SAPC running. Each blade has one different role with the following distribution:
Refer to SAPC Network Description.
2.1 BSP 8100 Minimal Configuration. Four Physical Blades
In this first scenario, the two first blades are system controllers and the two next blades are traffic payloads.
2.1.1 BSP 8100 System Controller Blades Minimal Configuration
System controllers are virtualized, so virtual bridges are defined.
System controllers are connected to the external network through VIP FEE. These connections are used for load balancing purposes through a virtual IP. For this purpose OAM VLANs are used. System controllers also provide an external OAM IP address independent of the VIP-OAM.
Internal connectivity is done through the 10 GB interfaces connected to both CMX routers (which also provide switching capabilities). Both CMXs are interconnected to achieve High Availability.
2.1.2 BSP 8100 Payload Blades Minimal Configuration
Payloads are not virtualized, so no virtual bridges are defined. A bond is created between eth0 and eth1 to provide High Availability for the 10-GB backplane. Besides, another bond is created between eth2 and eth3 to provide High Availability for the 1-GB backplane.
Payloads are connected to the external network through VIP FEEs. Four VIPs are defined for Traffic, External Database, GeoRed (Replication), and Traffic Separation in case that traffic exists, and additional FEEs can be defined. These connections are used for load balancing purposes through a virtual IP.
Internal connectivity is done through the 10 GB interfaces connected to both CMX routers (which also provide switching capabilities). Both CMXs are interconnected to achieve High Availability.
2.2 BSP 8100 Single Subrack Configuration. 12 Physical Blades
The two first blades are system controllers and the rest blades are traffic payloads. Each blade has a different role depending on the needs.
2.2.1 BSP 8100 System Controller Blades Subrack Configuration
Configuration applies the same as in BSP 8100 System Controller Blades Minimal Configuration.
2.2.2 BSP 8100 Traffic Blades Subrack Configuration
Traffic payload blades follow different network configuration depending on the customer needs. This chapter describes a scenario with all functionality. Depending on the customer needs, PLs are configured accordingly.
2.2.2.1 Traffic Payload Blades
Traffic payloads are not virtualized, so no virtual bridges are defined. A bond is created between eth0 and eth1 to provide High Availability for the 10-GB backplane. Besides, another bond is created between eth2 and eth3 to provide High Availability for the 1-GB backplane.
Traffic payloads are connected to the external network through VIP Traffic FEEs. These connections are used for load balancing purposes through a virtual IP.
Internal connectivity is done through the 10 GB interfaces connected to both CMX routers (which also provide switching capabilities). Both CMXs are interconnected to achieve High Availability.
2.2.2.2 External Database Payload Blades
External database payloads are not virtualized, so no virtual bridges are defined. A bond is created between eth0 and eth1 to provide High Availability for the 10-GB backplane. Besides, another bond is created between eth2 and eth3 to provide High Availability for the 1-GB backplane.
External database payloads are connected to the external network through VIP ExtDB FEEs. These connections are used for load balancing purposes through a virtual IP.
Internal connectivity is done through the 10 GB interfaces connected to both CMX routers (which also provide switching capabilities). Both CMXs are interconnected to achieve High Availability.
2.2.2.3 GeoRed Payload Blades
GeoRed payloads are not virtualized, so no virtual bridges are defined. A bond is created between eth0 and eth1 to provide High Availability for the 10-GB backplane. Besides, another bond is created between eth2 and eth3 to provide High Availability for the 1-GB backplane.
GeoRed payloads are connected to the external network through VIP Replication FEEs. These connections are used for load balancing purposes through a virtual IP.
Internal connectivity is done through the 10 GB interfaces connected to both CMX routers (which also provide switching capabilities). Both CMXs are interconnected to achieve High Availability.
2.2.2.4 Traffic Separation Payload Blades
Traffic separation payloads are not virtualized, so no virtual bridges are defined. A bond is created between eth0 and eth1 to provide High Availability for the 10-GB backplane. Besides, another bond is created between eth2 and eth3 to provide High Availability for the 1-GB backplane.
Traffic separation payloads are connected to the external network through VIP Replication FEEs. These connections are used for load balancing purposes through a virtual IP.
Internal connectivity is done through the 10 GB interfaces connected to both CMX routers (which also provide switching capabilities). Both CMXs are interconnected to achieve High Availability.
2.2.2.5 Remaining Payload Blades
Remaining payloads are not virtualized, so no virtual bridges are defined. A bond is created between eth0 and eth1 to provide High Availability for the 10-GB backplane. Besides, another bond is created between eth2 and eth3 to provide High Availability for the 1-GB backplane.
Internal connectivity is done through the 10 GB interfaces connected to both CMX routers (which also provide switching capabilities). Both CMXs are interconnected to achieve High Availability.
2.3 BSP 8100 Whole Rack Configuration. 36 Physical Blades
The two first blades are system controllers and the rest blades are traffic payloads. The installation described in BSP 8100 Single Subrack Configuration. 12 Physical Blades has to be done for the first subrack. In this chapter, additional networking is included for the additional second and third subracks.
2.3.1 BSP 8100 Traffic Blades Whole Rack Configuration
Apart from the traditional networking we do as the other subrack, an extra networking to intercommunicate the second, and third subracks with the first one is needed.
2.3.1.1 Non-Front End Blades
2.3.1.2 Front End Payload Blades
3 BSP 8100 Networks Allocation
This section specifies how the SAPC is connected to the network, detailing all the VLANs and networks. The examples are based on IPv4, but IPv6 is also supported, except for the Blade Server Platform (BSP) northbound interface and cluster internal traffic networks, where only IPv4 is supported, according to BSP RDA (Reference Deployment Architecture). Before starting to configure the SAPC network, agree with the customer on all the details (IP addresses, Network, VLAN Tags, and so on) referenced in this section. Although most of the references in this document mention only one additional traffic separation network, there are no logical restrictions on the number of traffic networks and the corresponding ALBs to be defined.
All VLANs are tagged unless explicitly stated.
3.1 BSP 8100 VLANs
|
VLAN Name |
VLAN ID |
Interface |
Ports |
Comments |
Attributes |
|---|---|---|---|---|---|
|
sapc_om2_sp |
137 |
Blade: mgmt0 |
SCX 0-X: BP1, BP3, E3 CMX 0-Y: E3, E4, E5, GE4 |
SCs only. Hypervisor Management |
vlanType = PRIVATE lanTopology = BASE_AND_DATA switchSide = COLLAPSED portAssignment = MANUAL AdditionalPort=0-X:BP1 AdditionalPort=0-X:BP3 |
|
sapc_mgmt_sp |
138 |
Blade: mgmt1 VM: eth2 |
SCX 0-X: BP1, BP3, E3 CMX 0-Y: E3, E4, E5 |
SCs only. System Management |
vlanType = PRIVATE lanTopology = BASE_AND_DATA switchSide = COLLAPSED portAssignment = MANUAL AdditionalPort=0-X:BP1 AdditionalPort=0-X:BP3 |
|
sapc_boot_sp |
4001 |
VM: eth2 PL: bond1 |
SCX 0-X: BPn* (untagged) |
LDE Boot and Scaling |
vlanType = DEFAULT lanTopology = BASE switchSide = COLLAPSED |
|
sapc_int_sp |
4003 |
bond0 |
CMX 0-Y: BPn* (untagged), E3, E4 |
Cluster Internal |
vlanType = DEFAULT lanTopology = DATA switchSide = COLLAPSED |
|
sapc_tipc_pdl |
100 |
eth0 |
CMX 0-26: BPn |
Left TIPC |
vlanType = PRIVATE lanTopology = DATA switchSide = LEFT |
|
sapc_tipc_pdr |
101 |
eth1 |
CMX 0-28: BPn |
Right TIPC |
vlanType = PRIVATE lanTopology = DATA switchSide = RIGHT |
|
sapc_om1_sp1 |
130 |
bond0 |
CMX 0-Y: BP1, E3, E4 |
eVIP Router Link O&M Traffic |
vlanType = PRIVATE lanTopology = DATA switchSide = COLLAPSED portAssignment = MANUAL AdditionalBlade=0-1 |
|
sapc_om1_sp2 |
131 |
bond0 |
CMX 0-Y: BP3, E3, E4 |
eVIP Router Link O&M Traffic |
vlanType = PRIVATE lanTopology = DATA switchSide = COLLAPSED portAssignment = MANUAL AdditionalBlade=0-3 |
|
sapc_sig1_sp1 |
120 |
bond0 |
CMX 0-Y: BPn (n not 1 nor 3), E3, E4 |
eVIP Router Link Signaling Traffic |
vlanType = PRIVATE lanTopology = DATA switchSide = COLLAPSED ExcludedBlade=0-1 ExcludedBlade=0-3 |
|
sapc_sig1_sp2 |
121 |
bond0 |
CMX 0-Y: BPn (n not 1 nor 3), E3, E4 |
eVIP Router Link Signaling Traffic |
vlanType = PRIVATE lanTopology = DATA switchSide = COLLAPSED ExcludedBlade=0-1 ExcludedBlade=0-3 |
|
sapc_sig2_sp1 |
140 |
bond0 |
CMX 0-Y: BPn (n not 1 nor 3), E3, E4 |
vlanType = PRIVATE lanTopology = DATA switchSide = COLLAPSED ExcludedBlade=0-1 ExcludedBlade=0-3 |
|
|
sapc_sig2_sp2 |
141 |
bond0 |
CMX 0-Y: BPn (n not 1 nor 3), E3, E4 |
vlanType = PRIVATE lanTopology = DATA switchSide = COLLAPSED ExcludedBlade=0-1 ExcludedBlade=0-3 |
|
|
sapc_sig3_sp1 |
150 |
bond0 |
CMX 0-Y: BPn (n not 1 nor 3), E3, E4 |
eVIP Router Link Replication Traffic |
vlanType = PRIVATE lanTopology = DATA switchSide = COLLAPSED ExcludedBlade=0-1 ExcludedBlade=0-3 |
|
sapc_sig3_sp2 |
151 |
bond0 |
CMX 0-Y: BPn (n not 1 nor 3), E3, E4 |
eVIP Router Link Replication Traffic |
vlanType = PRIVATE lanTopology = DATA switchSide = COLLAPSED ExcludedBlade=0-1 ExcludedBlade=0-3 |
|
sapc_sig4_sp1 |
122 |
bond0 |
CMX 0-Y: BPn (n not 1 nor 3), E3, E4 |
eVIP Router Link Signaling Traffic Rx |
vlanType = PRIVATE lanTopology = DATA switchSide = COLLAPSED ExcludedBlade=0-1 ExcludedBlade=0-3 |
|
sapc_sig4_sp2 |
123 |
bond0 |
CMX 0-Y: BPn (n not 1 nor 3), E3, E4 |
eVIP Router Link Signaling Traffic Rx |
vlanType = PRIVATE lanTopology = DATA switchSide = COLLAPSED ExcludedBlade=0-1 ExcludedBlade=0-3 |
|
sapc_om2_sp1 |
132 |
bond0 |
CMX 0-Y: BP1, E3, E4 |
eVIP Router Link O&M Traffic |
vlanType = PRIVATE lanTopology = DATA switchSide = COLLAPSED portAssignment = MANUAL AdditionalBlade=0-1 |
|
sapc_om2_sp2 |
133 |
bond0 |
CMX 0-Y: BP3, E3, E4 |
eVIP Router Link O&M Traffic |
vlanType = PRIVATE lanTopology = DATA switchSide = COLLAPSED portAssignment = MANUAL AdditionalBlade=0-3 |
For multiple subracks, additional ports are added for the previous VLANs.
|
VLAN Name |
VLAN ID |
Interface |
Ports |
Comments |
|---|---|---|---|---|
|
sapc_boot_sp |
4001 |
SCs: eth2 PLs: bond1 |
SCX 0-X: E1, E2 SCX m-X: BPn* (untagged), E1 |
LDE Boot and Scaling |
|
sapc_int_sp |
4003 |
bond0 |
CMX 0-Y: E1, E2 CMX m-Y: BPn* (untagged), E1 |
Cluster Internal |
|
sapc_tipc_pdl |
100 |
eth0 |
CMX 0-26: E1, E2 |
Left TIPC |
|
sapc_tipc_pdr |
101 |
eth1 |
CMX 0-28: E1, E2 |
Right TIPC |
|
sapc_sig1_sp1 |
120 |
bond0 |
CMX 0-Y: E1, E2 CMX m-Y: BPn, E1 |
eVIP Router Link Signaling Traffic |
|
sapc_sig1_sp2 |
121 |
bond0 |
CMX 0-Y: E1, E2 CMX m-Y: BPn, E1 |
eVIP Router Link Signaling Traffic |
|
sapc_sig2_sp1 |
140 |
bond0 |
CMX 0-Y: E1, E2 CMX m-Y: BPn, E1 |
|
|
sapc_sig2_sp2 |
141 |
bond0 |
CMX 0-Y: E1, E2 CMX m-Y: BPn, E1 |
|
|
sapc_sig3_sp1 |
150 |
bond0 |
CMX 0-Y: E1, E2 CMX m-Y: BPn, E1 |
eVIP Router Link Replication Traffic |
|
sapc_sig3_sp2 |
151 |
bond0 |
CMX 0-Y: E1, E2 CMX m-Y: BPn, E1 |
eVIP Router Link Replication Traffic |
|
sapc_sig4_sp1 |
122 |
bond0 |
CMX 0-Y: E1, E2 CMX m-Y: BPn, E1 |
eVIP Router Link Signaling Traffic Rx |
|
sapc_sig4_sp2 |
123 |
bond0 |
CMX 0-Y: E1, E2 CMX m-Y: BPn, E1 |
eVIP Router Link Signaling Traffic Rx |
3.2 BSP 8100 IP Addressing
Each SAPC requires a set of IP addresses agreed with the customer before configuring the SAPC.
|
Network Address |
Mask |
Type |
Usage |
VLAN ID |
Virtual Router |
VLAN Name/Tag |
|---|---|---|---|---|---|---|
|
bsp_om_net |
/29 |
Public |
BSP Northbound OAM network |
4054 |
dmx_om_vr |
%{bsp_om_net} |
|
%{bsp_om_addr} |
||||||
|
%{bsp_om_gw} |
||||||
|
%{bsp_om_cmx26_addr} |
||||||
|
%{bsp_om_cmx28_addr} |
||||||
|
N/A |
N/A |
N/A |
%{bsp_om_vrid} |
|||
|
om_sibb_sp_net |
N/A |
Private |
Uplink VLAN connected to external network for BSP Northbound traffic |
om_sibb_sp_id |
dmx_om_vr |
%{om_sibb_sp_id} |
|
/29 |
Uplink VRRP IP connected to external network for BSP Northbound traffic |
%{om_sibb_sp_addr} |
||||
|
Uplink CMX26 IP connected to external network for BSP Northbound traffic |
%{om_sibb_sp_addr1} with net suffix (CIDR) |
|||||
|
Uplink CMX28 IP connected to external network for BSP Northbound traffic |
%{om_sibb_sp_addr2} with net suffix (CIDR) |
|||||
|
Uplink CMX26 gateway for BSP Northbound traffic |
%{om_sibb_sp_gw1} |
|||||
|
Uplink CMX28 gateway for BSP Northbound traffic |
%{om_sibb_sp_gw2} |
|||||
|
N/A |
N/A |
Uplink VR ID for BSP Northbound traffic |
N/A |
%{om_sibb_sp_vrid} |
|
Network Address |
Mask |
Type |
Usage |
VLAN ID |
Virtual Router |
VLAN Name/Tag |
|---|---|---|---|---|---|---|
|
169.254.69.0 |
/24 |
Link-Local |
Backplane booting & scaling network |
4001 |
om_cn_sp |
sapc_boot_sp |
|
172.16.100.0 |
/24 |
Link-Local |
Backplane cluster internal communication network |
4003 |
om_cn_sp |
sapc_int_sp |
|
192.168.206.4 |
/30 |
Private |
Cross shelf link internal AS network for signaling traffic |
25 |
sig_cn_1_sp |
sig_cn_1_sp_inlcl |
|
sig_cn_1_sp_nlcl_net |
/30 |
Private |
Cross shelf link external AS network for signaling traffic |
26 |
sig_cn_1_sp |
sig_cn_1_sp_nlcl |
|
Cross shelf link external AS CMX26 IP for signaling traffic |
%{sig_cn_1_sp_nlcl_addr1} without net suffix |
|||||
|
Cross shelf link external AS CMX26 IP for signaling traffic with network suffix |
%{sig_cn_1_sp_nlcl_addr1_cidr} with net suffix (CIDR) |
|||||
|
Cross shelf link external AS CMX28 IP for signaling traffic |
%{sig_cn_1_sp_nlcl_addr2} without net suffix |
|||||
|
Cross shelf link external AS CMX28 IP for signaling traffic with network suffix |
%{sig_cn_1_sp_nlcl_addr2_cidr} with net suffix (CIDR) |
|||||
|
192.168.205.4 |
/30 |
Private |
Cross shelf link internal AS network for signaling 2 traffic |
15 |
sig_cn_2_sp |
sig_cn_2_sp_inlcl |
|
sig_cn_2_sp_nlcl_net |
/30 |
Private |
Cross shelf link external AS network for signaling 2 traffic |
16 |
sig_cn_2_sp |
sig_cn_2_sp_nlcl |
|
Cross shelf link external AS CMX26 IP for signaling 2 traffic |
%{sig_cn_2_sp_nlcl_addr1} without net suffix |
|||||
|
Cross shelf link external AS CMX26 IP for signaling 2 traffic with network suffix |
%{sig_cn_2_sp_nlcl_addr1_cidr} with net suffix (CIDR) |
|||||
|
Cross shelf link external AS CMX28 IP for signaling 2 traffic |
%{sig_cn_2_sp_nlcl_addr2} without net suffix |
|||||
|
Cross shelf link external AS CMX28 IP for signaling 2 traffic with network suffix |
%{sig_cn_2_sp_nlcl_addr2_cidr} with net suffix (CIDR) |
|||||
|
192.168.208.4 |
/30 |
Private |
Cross shelf link internal AS network for OAM traffic |
35 |
om_cn_sp |
om_cn_sp_inlcl |
|
om_cn_sp_nlcl_net |
/30 |
Private |
Cross shelf link external AS network |
36 |
om_cn_sp |
om_cn_sp_nlcl |
|
%{om_cn_sp_nlcl_addr1} without net suffix |
||||||
|
Cross shelf link external AS CMX26 IP for OAM traffic with network suffix |
%{om_cn_sp_nlcl_addr1_cidr} with net suffix (CIDR) |
|||||
|
%{om_cn_sp_nlcl_addr2} without net suffix |
||||||
|
Cross shelf link external AS CMX28 IP for OAM traffic with network suffix |
%{om_cn_sp_nlcl_addr2_cidr} with net suffix (CIDR) |
|||||
|
192.168.207.4 |
/30 |
Private |
Cross shelf link internal AS network for LDAP traffic |
45 |
sig_data_1_sp |
sig_data_1_sp_inlcl |
|
sig_data_1_sp_nlcl_net |
/30 |
Private |
Cross shelf link external AS network for LDAP traffic |
46 |
sig_data_1_sp |
sig_data_1_sp_nlcl |
|
%{sig_data_1_sp_nlcl_addr1} without net suffix |
||||||
|
Cross shelf link external AS CMX26 IP for LDAP traffic with network suffix |
%{sig_data_1_sp_nlcl_addr1_cidr} with net suffix (CIDR) |
|||||
|
%{sig_data_1_sp_nlcl_addr2} without net suffix |
||||||
|
Cross shelf link external AS CMX28 IP for LDAP traffic with network suffix |
%{sig_data_1_sp_nlcl_addr2_cidr} with net suffix (CIDR) |
|||||
|
192.168.209.4 |
/30 |
Private |
Cross shelf link internal AS network for replication traffic |
55 |
sig_data_2_sp |
sig_data_2_sp_inlcl |
|
192.168.204.4 |
/30 |
Private |
Cross shelf link internal AS network for provisioning traffic |
65 |
om_cn_2_sp |
om_cn_2_sp_inlcl |
|
om_cn_2_sp_nlcl_net |
/30 |
Private |
Cross shelf link external AS network |
66 |
om_cn_2_sp |
om_cn_2_sp_nlcl |
|
Cross shelf link external AS CMX26 IP for provisioning traffic |
%{om_cn_2_sp_nlcl_addr1} without net suffix |
|||||
|
Cross shelf link external AS CMX26 IP for provisioning traffic with network suffix |
%{om_cn_2_sp_nlcl_addr1_cidr} with net suffix (CIDR) |
|||||
|
Cross shelf link external AS CMX28 IP for provisioning traffic |
%{om_cn_2_sp_nlcl_addr2} without net suffix |
|||||
|
Cross shelf link external AS CMX28 IP for provisioning traffic with network suffix |
%{om_cn_2_sp_nlcl_addr2_cidr} with net suffix (CIDR) |
|||||
|
192.168.206.1 |
/32 |
Private |
CMX26 internal AS local address |
N/A |
sig_cn_1_sp |
N/A |
|
192.168.206.2 |
/32 |
Private |
CMX28 internal AS local address |
N/A |
sig_cn_1_sp |
N/A |
|
192.168.205.1 |
/32 |
Private |
CMX26 internal AS local address |
N/A |
sig_cn_2_sp |
N/A |
|
192.168.205.2 |
/32 |
Private |
CMX28 internal AS local address |
N/A |
sig_cn_2_sp |
N/A |
|
192.168.208.1 |
/32 |
Private |
CMX26 internal AS local address |
N/A |
om_cn_sp |
N/A |
|
192.168.208.2 |
/32 |
Private |
CMX28 internal AS local address |
N/A |
om_cn_sp |
N/A |
|
192.168.207.1 |
/32 |
Private |
CMX26 internal AS local address |
N/A |
sig_data_1_sp |
N/A |
|
192.168.207.2 |
/32 |
Private |
CMX28 internal AS local address |
N/A |
sig_data_1_sp |
N/A |
|
192.168.204.1 |
/32 |
Private |
CMX26 internal AS local address |
N/A |
om_cn_2_sp |
N/A |
|
192.168.204.2 |
/32 |
Private |
CMX28 internal AS local address |
N/A |
om_cn_2_sp |
N/A |
|
192.168.209.1 |
/32 |
Private |
CMX26 internal AS local address |
N/A |
sig_data_2_sp |
N/A |
|
192.168.209.2 |
/32 |
Private |
CMX28 internal AS local address |
N/A |
sig_data_2_sp |
N/A |
|
N/A |
N/A |
N/A |
100 |
N/A |
sapc_tipc_pdl |
|
|
N/A |
N/A |
N/A |
101 |
N/A |
sapc_tipc_pdr |
|
|
192.168.216.0 |
/27 |
Private |
eVIP router link for signaling traffic |
120 |
sig_cn_1_sp |
sapc_sig1_sp1 |
|
192.168.216.32 |
/27 |
Private |
eVIP router link for signaling traffic |
121 |
sig_cn_1_sp |
sapc_sig1_sp2 |
|
192.168.218.0 |
/29 |
Private |
130 |
om_cn_sp |
sapc_om1_sp1 |
|
|
192.168.218.8 |
/29 |
Private |
131 |
om_cn_sp |
sapc_om1_sp2 |
|
|
192.168.217.0 |
/27 |
Private |
140 |
sig_data_1_sp |
sapc_sig2_sp1 |
|
|
192.168.217.32 |
/27 |
Private |
141 |
sig_data_1_sp |
sapc_sig2_sp2 |
|
|
192.168.219.0 |
/27 |
Private |
eVIP router link for replication traffic |
150 |
sig_data_2_sp |
sapc_sig3_sp1 |
|
192.168.219.32 |
/27 |
Private |
eVIP router link for replication traffic |
151 |
sig_data_2_sp |
sapc_sig3_sp2 |
|
192.168.220.0 |
/27 |
Private |
eVIP router link for signaling traffic 2 (Rx) |
122 |
sig_cn_2_sp |
sapc_sig4_sp1 |
|
192.168.220.32 |
/27 |
Private |
eVIP router link for signaling traffic 2 (Rx) |
123 |
sig_cn_2_sp |
sapc_sig4_sp2 |
|
192.168.221.0 |
/29 |
Private |
eVIP router link for provisioning traffic |
132 |
om_cn_2_sp |
sapc_om2_sp1 |
|
192.168.221.8 |
/29 |
Private |
eVIP router link for provisioning traffic |
133 |
om_cn_2_sp |
sapc_om2_sp2 |
|
192.168.100.0 |
/24 |
Private |
System Management Network |
138 |
N/A |
sapc_mgmt_sp |
|
sapc_om2_sp_net |
/29 |
Public |
Hypervisor management network |
137 |
om_cn_sp |
sapc_om2_sp |
|
%{sapc_om2_sp_gw} |
||||||
|
CMX26 IP for hypervisor management |
%{sapc_om2_sp_cmx26_addr} with net suffix (CIDR) |
|||||
|
CMX28 IP for hypervisor management |
%{sapc_om2_sp_cmx28_addr} with net suffix (CIDR) |
|||||
|
N/A |
N/A |
VR ID for hypervisor management |
N/A |
%{sapc_om2_sp_vrid} |
||
|
sapc_sig_cn_1_vip |
/32 |
Public |
VIP signaling address |
N/A |
sig_cn_1_sp |
%{sapc_sig_cn_1_vip} with net suffix (CIDR) |
|
sapc_sig_cn_2_vip |
/32 |
Public |
VIP signaling 2 (Rx) address |
N/A |
sig_cn_2_sp |
%{sapc_sig_cn_2_vip} with net suffix (CIDR) |
|
sapc_om_cn_vip1 |
/32 |
Public |
N/A |
om_cn_sp |
%{sapc_om_cn_vip1} with net suffix (CIDR) |
|
|
sapc_om_cn_vip2 |
/32 |
Public |
VIP provisioning address |
N/A |
om_cn_sp |
%{sapc_om_cn_vip2} with net suffix (CIDR) |
|
sapc_sig_data_1_vip |
/32 |
Public |
N/A |
sig_data_1_sp |
%{sapc_sig_data_1_vip} with net suffix (CIDR) |
|
|
sapc_sig_data_2_vip |
/32 |
Public |
VIP replication address |
N/A |
sig_data_2_sp |
%{sapc_sig_data_2_vip} with net suffix (CIDR) |
|
sig_cn_1_pr_net |
N/A |
Private |
Uplink VLAN connected to external network for signaling traffic |
sig_cn_1_pr_id |
sig_cn_1_sp |
%{sig_cn_1_pr_id} |
|
N/A |
%{sig_cn_1_pr_ospf} |
|||||
|
/29 |
Uplink CMX26 IP for signaling traffic |
%{sig_cn_1_pr_addr1} with net suffix (CIDR) |
||||
|
Uplink CMX28 IP for signaling traffic |
%{sig_cn_1_pr_addr2} with net suffix (CIDR) |
|||||
|
Uplink gateway 1 for signaling traffic (2) |
%{sig_cn_1_pr_gw1} |
|||||
|
Uplink gateway 2 for signaling traffic (2) |
%{sig_cn_1_pr_gw2} |
|||||
|
sig_cn_2_pr_net |
N/A |
Private |
Uplink VLAN connected to external network for signaling 2 traffic |
sig_cn_2_pr_id |
sig_cn_2_sp |
%{sig_cn_2_pr_id} |
|
N/A |
%{sig_cn_2_pr_ospf} |
|||||
|
/29 |
Uplink CMX26 IP for signaling 2 traffic |
%{sig_cn_2_pr_addr1} with net suffix (CIDR) |
||||
|
Uplink CMX28 IP for signaling 2 traffic |
%{sig_cn_2_pr_addr2} with net suffix (CIDR) |
|||||
|
Uplink gateway 1 for signaling 2 traffic (2) |
%{sig_cn_2_pr_gw1} |
|||||
|
Uplink gateway 2 for signaling 2 traffic (2) |
%{sig_cn_2_pr_gw2} |
|||||
|
om_cn_pr_net |
N/A |
Private |
om_cn_pr_id |
om_cn_sp |
%{om_cn_pr_id} |
|
|
N/A |
%{om_cn_pr_ospf} |
|||||
|
/29 |
%{om_cn_pr_addr1} with net suffix (CIDR) |
|||||
|
%{om_cn_pr_addr2} with net suffix (CIDR) |
||||||
|
%{om_cn_pr_gw1} |
||||||
|
%{om_cn_pr_gw2} |
||||||
|
om_cn_2_pr_net |
N/A |
Private |
Uplink VLAN connected to external network for provisioning traffic |
om_cn_2_pr_id |
om_cn_2_sp |
%{om_cn_2_pr_id} |
|
N/A |
%{om_cn_2_pr_ospf} |
|||||
|
/29 |
Uplink CMX26 IP for provisioning traffic |
%{om_cn_2_pr_addr1} with net suffix (CIDR) |
||||
|
Uplink CMX28 IP for provisioning traffic |
%{om_cn_2_pr_addr2} with net suffix (CIDR) |
|||||
|
Uplink gateway 1 for provisioning traffic (2) |
%{om_cn_2_pr_gw1} |
|||||
|
Uplink gateway 2 for provisioning traffic (2) |
%{om_cn_2_pr_gw2} |
|||||
|
sig_data_1_pr_net |
N/A |
Private |
sig_data_1_pr_id |
sig_data_1_sp |
%{sig_data_1_pr_id} |
|
|
N/A |
%{sig_data_1_pr_ospf} |
|||||
|
/29 |
%{sig_data_1_pr_addr1} with net suffix (CIDR) |
|||||
|
%{sig_data_1_pr_addr2} with net suffix (CIDR) |
||||||
|
%{sig_data_1_pr_gw1} |
||||||
|
%{sig_data_1_pr_gw2} |
||||||
|
sig_data_2_pr_net |
N/A |
Private |
Uplink VLAN connected to external network for replication traffic |
sig_data_2_pr_id |
sig_data_2_sp |
%{sig_data_2_pr_id} |
|
/29 |
Uplink CMX26 IP for replication traffic |
%{sig_data_2_pr_addr1} with net suffix (CIDR) |
||||
|
Uplink CMX28 IP for replication traffic |
%{sig_data_2_pr_addr2} with net suffix (CIDR) |
|||||
|
Uplink gateway 1 for replication traffic |
%{sig_data_2_pr_gw1} |
|||||
|
Uplink gateway 2 for replication traffic |
%{sig_data_2_pr_gw2} |
|
Network Address |
Mask |
Type |
Usage |
VLAN ID |
Virtual Router |
VLAN Name/Tag |
|---|---|---|---|---|---|---|
|
fd00:0:0:206:: |
/64 |
ULA |
Cross shelf link internal AS network for signaling traffic |
25 |
sig_cn_1_sp |
sig_cn_1_sp_inlcl |
|
sig_cn_1_sp_nlcl_net |
/64 |
ULA |
Cross shelf link external AS network for signaling traffic |
26 |
sig_cn_1_sp |
sig_cn_1_sp_nlcl |
|
Cross shelf link external AS CMX26 IP for signaling traffic |
%{sig_cn_1_sp_nlcl_addr1_ipv6} without net suffix |
|||||
|
Cross shelf link external AS CMX26 IP for signaling traffic with network suffix |
%{sig_cn_1_sp_nlcl_addr1_ipv6_cidr} with net suffix (CIDR) |
|||||
|
Cross shelf link external AS CMX28 IP for signaling traffic |
%{sig_cn_1_sp_nlcl_addr2_ipv6} without net suffix |
|||||
|
Cross shelf link external AS CMX28 IP for signaling traffic with network suffix |
%{sig_cn_1_sp_nlcl_addr2_ipv6_cidr} with net suffix (CIDR) |
|||||
|
fd00:0:0:205:: |
/64 |
ULA |
Cross shelf link internal AS network for signaling 2 traffic |
15 |
sig_cn_2_sp |
sig_cn_2_sp_inlcl |
|
sig_cn_2_sp_nlcl_net |
/64 |
ULA |
Cross shelf link external AS network for signaling 2 traffic |
16 |
sig_cn_2_sp |
sig_cn_2_sp_nlcl |
|
Cross shelf link external AS CMX26 IP for signaling 2 traffic |
%{sig_cn_2_sp_nlcl_addr1_ipv6} without net suffix |
|||||
|
Cross shelf link external AS CMX26 IP for signaling 2 traffic with network suffix |
%{sig_cn_2_sp_nlcl_addr1_ipv6_cidr} with net suffix (CIDR) |
|||||
|
Cross shelf link external AS CMX28 IP for signaling 2 traffic |
%{sig_cn_2_sp_nlcl_addr2_ipv6} without net suffix |
|||||
|
Cross shelf link external AS CMX28 IP for signaling 2 traffic with network suffix |
%{sig_cn_2_sp_nlcl_addr2_ipv6_cidr} with net suffix (CIDR) |
|||||
|
fd00:0:0:208:: |
/64 |
ULA |
Cross shelf link internal AS network for OAM traffic |
35 |
om_cn_sp |
om_cn_sp_inlcl |
|
om_cn_sp_nlcl_net |
/64 |
ULA |
Cross shelf link external AS network |
36 |
om_cn_sp |
om_cn_sp_nlcl |
|
%{om_cn_sp_nlcl_addr1_ipv6} without net suffix |
||||||
|
Cross shelf link external AS CMX26 IP for OAM traffic with network suffix |
%{om_cn_sp_nlcl_addr1_ipv6_cidr} with net suffix (CIDR) |
|||||
|
%{om_cn_sp_nlcl_addr2_ipv6} without net suffix |
||||||
|
Cross shelf link external AS CMX28 IP for OAM traffic with network suffix |
%{om_cn_sp_nlcl_addr2_ipv6_cidr} with net suffix (CIDR) |
|||||
|
fd00:0:0:207:: |
/64 |
ULA |
Cross shelf link internal AS network for LDAP traffic |
45 |
sig_data_1_sp |
sig_data_1_sp_inlcl |
|
sig_data_1_sp_nlcl_net |
/64 |
ULA |
Cross shelf link external AS network for LDAP traffic |
46 |
sig_data_1_sp |
sig_data_1_sp_nlcl |
|
%{sig_data_1_sp_nlcl_addr1_ipv6} without net suffix |
||||||
|
Cross shelf link external AS CMX26 IP for LDAP traffic with network suffix |
%{sig_data_1_sp_nlcl_addr1_ipv6_cidr} with net suffix (CIDR) |
|||||
|
%{sig_data_1_sp_nlcl_addr2_ipv6} without net suffix |
||||||
|
Cross shelf link external AS CMX28 IP for LDAP traffic with network suffix |
%{sig_data_1_sp_nlcl_addr2_ipv6_cidr} with net suffix (CIDR) |
|||||
|
fd00:0:0:209:: |
/64 |
ULA |
Cross shelf link internal AS network for replication traffic |
55 |
sig_data_2_sp |
sig_data_2_sp_inlcl |
|
fd00:0:0:204:: |
/64 |
ULA |
Cross shelf link internal AS network for provisioning traffic |
65 |
om_cn_2_sp |
om_cn_2_sp_inlcl |
|
om_cn_2_sp_nlcl_net |
/64 |
ULA |
Cross shelf link external AS network |
66 |
om_cn_2_sp |
om_cn_2_sp_nlcl |
|
Cross shelf link external AS CMX26 IP for provisioning traffic |
%{om_cn_2_sp_nlcl_addr1_ipv6} without net suffix |
|||||
|
Cross shelf link external AS CMX26 IP for provisioning traffic with network suffix |
%{om_cn_2_sp_nlcl_addr1_ipv6_cidr} with net suffix (CIDR) |
|||||
|
Cross shelf link external AS CMX28 IP for provisioning traffic |
%{om_cn_2_sp_nlcl_addr2_ipv6} without net suffix |
|||||
|
Cross shelf link external AS CMX28 IP for provisioning traffic with network suffix |
%{om_cn_2_sp_nlcl_addr2_ipv6_cidr} with net suffix (CIDR) |
|||||
|
fd00::192:168:206:1 |
/128 |
ULA |
CMX26 internal AS local address |
N/A |
sig_cn_1_sp |
N/A |
|
fd00::192:168:206:2 |
/128 |
ULA |
CMX28 internal AS local address |
N/A |
sig_cn_1_sp |
N/A |
|
fd00::192:168:205:1 |
/128 |
ULA |
CMX26 internal AS local address |
N/A |
sig_cn_2_sp |
N/A |
|
fd00::192:168:205:2 |
/128 |
ULA |
CMX28 internal AS local address |
N/A |
sig_cn_2_sp |
N/A |
|
fd00::192:168:208:1 |
/128 |
ULA |
CMX26 internal AS local address |
N/A |
om_cn_sp |
N/A |
|
fd00::192:168:208:2 |
/128 |
ULA |
CMX28 internal AS local address |
N/A |
om_cn_sp |
N/A |
|
fd00::192:168:207:1 |
/128 |
ULA |
CMX26 internal AS local address |
N/A |
sig_data_1_sp |
N/A |
|
fd00::192:168:207:2 |
/128 |
ULA |
CMX28 internal AS local address |
N/A |
sig_data_1_sp |
N/A |
|
fd00::192:168:204:1 |
/128 |
ULA |
CMX26 internal AS local address |
N/A |
om_cn_2_sp |
N/A |
|
fd00::192:168:204:2 |
/128 |
ULA |
CMX28 internal AS local address |
N/A |
om_cn_2_sp |
N/A |
|
fd00::192:168:209:1 |
/128 |
ULA |
CMX26 internal AS local address |
N/A |
sig_data_2_sp |
N/A |
|
fd00::192:168:209:2 |
/128 |
ULA |
CMX28 internal AS local address |
N/A |
sig_data_2_sp |
N/A |
|
fd00:0:0:11:: |
/64 |
ULA |
eVIP router link for signaling traffic |
120 |
sig_cn_1_sp |
sapc_sig1_sp1 |
|
fd00:0:0:12:: |
/64 |
ULA |
eVIP router link for signaling traffic |
121 |
sig_cn_1_sp |
sapc_sig1_sp2 |
|
fd00:0:0:31:: |
/64 |
ULA |
130 |
om_cn_sp |
sapc_om1_sp1 |
|
|
fd00:0:0:32:: |
/64 |
ULA |
131 |
om_cn_sp |
sapc_om1_sp2 |
|
|
fd00:0:0:15:: |
/64 |
ULA |
140 |
sig_data_1_sp |
sapc_sig2_sp1 |
|
|
fd00:0:0:16:: |
/64 |
ULA |
141 |
sig_data_1_sp |
sapc_sig2_sp2 |
|
|
fd00:0:0:17:: |
/64 |
ULA |
eVIP router link for replication traffic |
150 |
sig_data_2_sp |
sapc_sig3_sp1 |
|
fd00:0:0:18:: |
/64 |
ULA |
eVIP router link for replication traffic |
151 |
sig_data_2_sp |
sapc_sig3_sp2 |
|
fd00:0:0:13:: |
/64 |
ULA |
eVIP router link for signaling traffic 2 (Rx) |
122 |
sig_cn_2_sp |
sapc_sig4_sp1 |
|
fd00:0:0:14:: |
/64 |
ULA |
eVIP router link for signaling traffic 2 (Rx) |
123 |
sig_cn_2_sp |
sapc_sig4_sp2 |
|
fd00:0:0:33:: |
/64 |
ULA |
eVIP router link for provisioning traffic |
132 |
om_cn_2_sp |
sapc_om2_sp1 |
|
fd00:0:0:34:: |
/64 |
ULA |
eVIP router link for provisioning traffic |
133 |
om_cn_2_sp |
sapc_om2_sp2 |
|
sapc_sig_cn_1_vip |
/128 |
Public |
VIP signaling address |
N/A |
sig_cn_1_sp |
%{sapc_sig_cn_1_vip_ipv6} with net suffix (CIDR) |
|
sapc_sig_cn_2_vip |
/128 |
Public |
VIP signaling 2 (Rx) address |
N/A |
sig_cn_2_sp |
%{sapc_sig_cn_2_vip_ipv6} with net suffix (CIDR) |
|
sapc_om_cn_vip1 |
/128 |
Public |
N/A |
om_cn_sp |
%{sapc_om_cn_vip1_ipv6} with net suffix (CIDR) |
|
|
sapc_om_cn_vip2 |
/128 |
Public |
VIP provisioning address |
N/A |
om_cn_sp |
%{sapc_om_cn_vip2_ipv6} with net suffix (CIDR) |
|
sapc_sig_data_1_vip |
/128 |
Public |
N/A |
sig_data_1_sp |
%{sapc_sig_data_1_vip_ipv6} with net suffix (CIDR) |
|
|
sapc_sig_data_2_vip |
/128 |
Public |
VIP replication address |
N/A |
sig_data_2_sp |
%{sapc_sig_data_2_vip_ipv6} with net suffix (CIDR) |
|
sig_cn_1_pr_net |
N/A |
ULA |
Uplink VLAN connected to external network for signaling traffic |
sig_cn_1_pr_id |
sig_cn_1_sp |
%{sig_cn_1_pr_id} |
|
N/A |
%{sig_cn_1_pr_ospf} |
|||||
|
/64 |
Uplink CMX26 IP for signaling traffic |
%{sig_cn_1_pr_addr1_ipv6} with net suffix (CIDR) |
||||
|
Uplink CMX28 IP for signaling traffic |
%{sig_cn_1_pr_addr2_ipv6} with net suffix (CIDR) |
|||||
|
Uplink gateway 1 for signaling traffic (4) |
%{sig_cn_1_pr_gw1_ipv6} |
|||||
|
Uplink gateway 2 for signaling traffic (4) |
%{sig_cn_1_pr_gw2_ipv6} |
|||||
|
sig_cn_2_pr_net |
N/A |
ULA |
Uplink VLAN connected to external network for signaling 2 traffic |
sig_cn_2_pr_id |
sig_cn_2_sp |
%{sig_cn_2_pr_id} |
|
N/A |
%{sig_cn_2_pr_ospf} |
|||||
|
/64 |
Uplink CMX26 IP for signaling 2 traffic |
%{sig_cn_2_pr_addr1_ipv6} with net suffix (CIDR) |
||||
|
Uplink CMX28 IP for signaling 2 traffic |
%{sig_cn_2_pr_addr2_ipv6} with net suffix (CIDR) |
|||||
|
Uplink gateway 1 for signaling 2 traffic (4) |
%{sig_cn_2_pr_gw1_ipv6} |
|||||
|
Uplink gateway 2 for signaling 2 traffic (4) |
%{sig_cn_2_pr_gw2_ipv6} |
|||||
|
om_cn_pr_net |
N/A |
ULA |
om_cn_pr_id |
om_cn_sp |
%{om_cn_pr_id} |
|
|
N/A |
%{om_cn_pr_ospf} |
|||||
|
/64 |
%{om_cn_pr_addr1_ipv6} with net suffix (CIDR) |
|||||
|
%{om_cn_pr_addr2_ipv6} with net suffix (CIDR) |
||||||
|
%{om_cn_pr_gw1_ipv6} |
||||||
|
%{om_cn_pr_gw2_ipv6} |
||||||
|
om_cn_2_pr_net |
N/A |
ULA |
Uplink VLAN connected to external network for provisioning traffic |
om_cn_2_pr_id |
om_cn_2_sp |
%{om_cn_2_pr_id} |
|
N/A |
%{om_cn_2_pr_ospf} |
|||||
|
/64 |
Uplink CMX26 IP for provisioning traffic |
%{om_cn_2_pr_addr1_ipv6} with net suffix (CIDR) |
||||
|
Uplink CMX28 IP for provisioning traffic |
%{om_cn_2_pr_addr2_ipv6} with net suffix (CIDR) |
|||||
|
Uplink gateway 1 for provisioning traffic (4) |
%{om_cn_2_pr_gw1_ipv6} |
|||||
|
Uplink gateway 2 for provisioning traffic (4) |
%{om_cn_2_pr_gw2_ipv6} |
|||||
|
sig_data_1_pr_net |
N/A |
ULA |
sig_data_1_pr_id |
sig_data_1_sp |
%{sig_data_1_pr_id} |
|
|
N/A |
%{sig_data_1_pr_ospf} |
|||||
|
/64 |
%{sig_data_1_pr_addr1_ipv6} with net suffix (CIDR) |
|||||
|
%{sig_data_1_pr_addr2_ipv6} with net suffix (CIDR) |
||||||
|
%{sig_data_1_pr_gw1_ipv6} |
||||||
|
%{sig_data_1_pr_gw2_ipv6} |
||||||
|
sig_data_2_pr_net |
N/A |
ULA |
Uplink VLAN connected to external network for replication traffic |
sig_data_2_pr_id |
sig_data_2_sp |
%{sig_data_2_pr_id} |
|
/64 |
Uplink CMX26 IP for replication traffic |
%{sig_data_2_pr_addr1_ipv6} with net suffix (CIDR) |
||||
|
Uplink CMX28 IP for replication traffic |
%{sig_data_2_pr_addr2_ipv6} with net suffix (CIDR) |
|||||
|
Uplink gateway 1 for replication traffic |
%{sig_data_2_pr_gw1_ipv6} |
|||||
|
Uplink gateway 2 for replication traffic |
%{sig_data_2_pr_gw2_ipv6} |
|
IP Address |
Node |
Interface |
Comment |
|---|---|---|---|
|
169.254.69.0/24 |
Network |
N/A |
VLAN sapc_boot_sp Booting & Scaling network |
|
.1 |
SC-1 |
eth2 |
|
|
.2 |
SC-2 |
eth2 |
|
|
.n |
PL-n |
bond1 |
|
|
.242 |
SC-1 SC-2 |
eth2:2 |
Boot MIP address |
|
.200 - .232 |
Temporary IP address pool for scaled blades |
||
|
.253 |
CMX 0-26 |
vlan1.4001 |
|
|
.254 |
CMX 0-28 |
vlan1.4001 |
|
|
172.16.100.0/24 |
Network |
VLAN sapc_int_sp Cluster Internal network |
|
|
.1 |
SC-1 |
bond0 |
|
|
.2 |
SC-2 |
bond0 |
|
|
.n |
PL-n |
bond0 |
|
|
.105 |
SC-1 SC-2 |
bond0:2 |
la-ldap MIP address |
|
.241 |
SC-1 SC-2 |
bond0:3 |
uetrace MIP address |
|
.243 |
SC-1 SC-2 |
bond0:1 |
NFS MIP address |
|
.244 |
One of the PL nodes |
bond0:1 |
SS7 CPM MIP address |
|
.253 |
CMX 0-26 |
vlan1.4003 |
|
|
.254 |
CMX 0-28 |
vlan1.4003 |
|
Network |
Gateways |
VLAN |
OSPF Area |
Comments |
|---|---|---|---|---|
|
192.168.218.0/29 |
CMX 0-26: 192.168.218.1 |
130 |
0.1.1.1 |
O&M Traffic |
|
CMX 0-28: 192.168.218.2 |
||||
|
192.168.218.8/29 |
CMX 0-26: 192.168.218.9 |
131 |
0.1.1.1 |
O&M Traffic |
|
CMX 0-28: 192.168.218.10 |
||||
|
192.168.218.0/29 |
CMX 0-26: 192.168.221.1 |
132 |
0.1.1.2 |
Provisioning Traffic |
|
CMX 0-28: 192.168.221.2 |
||||
|
192.168.218.8/29 |
CMX 0-26: 192.168.221.9 |
133 |
0.1.1.2 |
Provisioning Traffic |
|
CMX 0-26: 192.168.221.10 |
||||
|
192.168.216.0/27 |
CMX 0-26: 192.168.216.1 |
120 |
0.0.1.1 |
Signaling Traffic |
|
CMX 0-28: 192.168.216.2 |
||||
|
192.168.216.32/27 |
CMX 0-26: 192.168.216.33 |
121 |
0.0.1.1 |
Signaling Traffic |
|
CMX 0-28: 192.168.216.34 |
||||
|
192.168.217.0/27 |
CMX 0-26: 192.168.217.1 |
140 |
0.0.1.2 |
LDAP Traffic |
|
CMX 0-28: 192.168.217.2 |
||||
|
192.168.217.32/27 |
CMX 0-26: 192.168.217.33 |
141 |
0.0.1.2 |
LDAP Traffic |
|
CMX 0-28: 192.168.217.34 |
||||
|
192.168.219.0/27 |
CMX 0-26: 192.168.219.1 |
150 |
0.0.1.3 |
Replication Traffic |
|
CMX 0-28: 192.168.219.2 |
||||
|
192.168.219.32/27 |
CMX 0-26: 192.168.219.33 |
151 |
0.0.1.3 |
Replication Traffic |
|
CMX 0-28: 192.168.219.34 |
||||
|
192.168.220.0/27 |
CMX 0-26: 192.168.220.1 |
122 |
0.0.1.4 |
Signaling Rx Traffic |
|
CMX 0-28: 192.168.220.2 |
||||
|
192.168.220.32/27 |
CMX 0-26: 192.168.220.33 |
123 |
0.0.1.4 |
Signaling Rx Traffic |
|
CMX 0-28: 192.168.220.34 |
|
Network |
Gateways |
VLAN |
OSPF Area |
Comments |
|---|---|---|---|---|
|
fd00:0:0:31::/64 |
CMX 0-26: fd00:0:0:31::1 |
130 |
0.1.1.1 |
O&M Traffic |
|
CMX 0-28: fd00:0:0:31::2 |
||||
|
fd00:0:0:32::/64 |
CMX 0-26: fd00:0:0:32::1 |
131 |
0.1.1.1 |
O&M Traffic |
|
CMX 0-28: fd00:0:0:32::2 |
||||
|
fd00:0:0:33::/64 |
CMX 0-26: fd00:0:0:33::1 |
132 |
0.1.1.2 |
Provisioning Traffic |
|
CMX 0-28: fd00:0:0:33::2 |
||||
|
fd00:0:0:34::/64 |
CMX 0-26: fd00:0:0:34::1 |
133 |
0.1.1.2 |
Provisioning Traffic |
|
CMX 0-26: fd00:0:0:34::2 |
||||
|
fd00:0:0:11::/64 |
CMX 0-26: fd00:0:0:11::1 |
120 |
0.0.1.1 |
Signaling Traffic |
|
CMX 0-28: fd00:0:0:11::2 |
||||
|
fd00:0:0:12::/64 |
CMX 0-26: fd00:0:0:12::1 |
121 |
0.0.1.1 |
Signaling Traffic |
|
CMX 0-28: fd00:0:0:12::2 |
||||
|
fd00:0:0:15::/64 |
CMX 0-26: fd00:0:0:15::1 |
140 |
0.0.1.2 |
LDAP Traffic |
|
CMX 0-28: fd00:0:0:15::2 |
||||
|
fd00:0:0:16::/64 |
CMX 0-26: fd00:0:0:16::1 |
141 |
0.0.1.2 |
LDAP Traffic |
|
CMX 0-28: fd00:0:0:16::2 |
||||
|
fd00:0:0:17::/64 |
CMX 0-26: fd00:0:0:17::1 |
150 |
0.0.1.3 |
Replication Traffic |
|
CMX 0-28: fd00:0:0:17::2 |
||||
|
fd00:0:0:18::/64 |
CMX 0-26: fd00:0:0:18::1 |
151 |
0.0.1.3 |
Replication Traffic |
|
CMX 0-28: fd00:0:0:18::2 |
||||
|
fd00:0:0:13::/64 |
CMX 0-26: fd00:0:0:13::1 |
122 |
0.0.1.4 |
Signaling Rx Traffic |
|
CMX 0-28: fd00:0:0:13::2 |
||||
|
fd00:0:0:14::/64 |
CMX 0-26: fd00:0:0:14::1 |
123 |
0.0.1.4 |
Signaling Rx Traffic |
|
CMX 0-28: fd00:0:0:14::2 |
3.2.1 BSP 8100 IP Addresses of External Elements
This section covers all the IP addresses in the customer network that do not belong to the SAPC but needed when configuring it.
|
IP Address |
Network |
Use |
|---|---|---|
|
<NTP1-SERVER> |
<NTP1-NETWORK>/<NTP-NETMASK> |
NTP Server |
|
<SNMP1-SERVER> |
<SNMP1-NETWORK>/<SNMP-NETMASK> |
SNMP Server |
|
<DNS1-SERVER> |
<DNS1-NETWORK>/<DNS-NETMASK> |
DNS Server |
There can be several NTP servers.

Contents