CSCF VNF Network Connectivity Overview
Call Session Control Function

Contents

1Introduction

2

CSCF VNF Logical Network Reference Setup
2.1Logical Network Reference Setup
2.2IP Routing
2.3CSCF ALB Configuration
2.4Logical Network Operation and Maintenance
2.5Logical Network Signaling
2.6Logical Network Charging
2.7Logical Network Internal
2.8Logical Network Setup in Multiple CSCF VNF Instance Deployment

3

Example Configurations
3.1Static Routing with BFD Configuration
3.2Static Routing without BFD Configuration
3.3OpenStack Deployment
3.4Equal-Cost Multipath Considerations

1   Introduction

This document gives Solution Architects guidance on how to deploy the Call Session Control Function (CSCF) Virtual Network Function (VNF) in a cloud environment. The document provides a logical description of the CSCF VNF networking requirements. The final section gives examples of cloud networking infrastructure configurations required to fulfill the networking requirements of the CSCF VNF.

The document describes how to configure the cloud network infrastructure from a CSCF VNF perspective. This document does not specify the exact commands to execute, or Application Programming Interface (API) calls to make, but rather describes the configuration on a logical level.

It is assumed that the cloud framework, including hardware and relevant software components, is already installed. It is also assumed that the user of this document has a deep understanding of the cloud infrastructure on which the CSCF VNF is to be deployed.

It is assumed that the reader of this document has a deep understanding of the CSCF, and the document CSCF Technical Description has been read and fully understood. For detailed information of each CSCF interface/integration-point, refer to the relevant Interwork Description.

It is outside the scope of this document to describe how to configure external router and other routers on the customer site. However, there is a general recommendation on how external router can be configured in the document, without specifying any details. It is also outside the scope of this document to describe any firewall configuration.

This document does not cover dimensioning or scaling aspects of a CSCF VNF deployment.

For more information on scaling, refer to CSCF Scaling Management.

2   CSCF VNF Logical Network Reference Setup

The CSCF VNF is realized by using several logical networks, where each logical network has its own purpose. This document proposes a reference logical network setup, which is realized by the virtual networks that are listed later in this document. The reason for using different logical networks is to enable logic separation between different functions owing to, for example, security reasons.

It is not required that the CSCF VNF is deployed using the reference logical network setup that is described in this document. The logical network setup can be altered depending on deployment-specific requirements. Any logical network setup other than the CSCF reference logical network setup is not elaborated further in this document.

How to set up the CSCF VNF, and how to allocate software components to Virtual Machine (VM) instances is described in CSCF Software and Pool Allocation Guidelines, and is therefore not in the scope of this document.

For more information regarding basic requirements of what is required from a cloud infrastructure, refer to Virtual CSCF Infrastructure Requirements.

2.1   Logical Network Reference Setup

The CSCF VNF exposes several network interfaces. These interfaces expose the CSCF functionality, or are used by the CSCF to access network functions, for example Domain Name System (DNS) and Network Time Protocol (NTP). In the reference network setup of the CSCF VNF, one or more of these network interfaces is allocated to a virtual network.

The following logical networks are part of the CSCF reference network setup. This document assumes that the same logical networks exist in an operator network, and that the operator requires that the CSCF VNF is being connected to these existing logical networks:

Which CSCF VNF interfaces are exposed in each network is described later in the document. It is outside the scope of this document to show how other network entities are connected to the listed logical networks.

Note:  
There are no External Network entities connected to the Internal Network. The Internal Network only connects the CSCF VNF instances.

Figure 1 shows an overview of the CSCF VNF, the associated pool allocations (profiles), and the logical network included in the reference logical network setup.

Figure 1   CSCF VNF and Its Logical Network Setup

Each logical network is realized using one or more virtual networks and optionally a Virtual Routing Function as described later in this document. This document does not describe how virtual networks and Virtual Routing Functions are realized by the cloud infrastructure.

As defined in Virtual CSCF Infrastructure Requirements, the minimum cloud configuration (2+2) is used to illustrate the CSCF network connectivity. Scaling-out can be performed to increase the number of Payload Profile VM instances as described in CSCF Scaling Management.

2.2   IP Routing

Routing towards the CSCF VNF from the external router to the respective Virtual Routing Function is assumed to use Policy Based Routing (PBR). PBR is a technique used to make routing decisions based on polices (source, destination, port, and so on) set by the network administrator. Usually, it can also be read as static routes in a router.

The IP routing logic in the respective Virtual Routing Function (realized by Virtual Routers, see for example, Figure 3) then forwards the IP packet to the correct CSCF VNF VM instance. The following deployment strategy is used to realize the IP routing logic in the Virtual Routing Function:

In the following sections, routing is described assuming that static routing is used.

2.3   CSCF ALB Configuration

The CSCF software is distributed across the VMs within a VNF using two software profiles – Controller Profile (OAM functionality) and Payload Profile (Charging, Signaling and Traffic functionality). Across the VMs, network connectivity is configured through several defined Abstract Load Balancers (ALB), with each ALB having a defined eVIP Front End (FE), Load Balancer Element (LBE), and Security Element (SE), see Figure 2.

Note:  
OAM is not defined in an ALB but in an MIP.

Figure 2   CSCF ALB Configuration

Note:  
Specific eVIP FEs are not configured for internal CSCF application traffic across CSCF VMs. Internal application traffic is distributed as defined by eVIP target pools. Refer to eVIP Management Guide for more information.

2.4   Logical Network Operation and Maintenance

2.4.1   Purpose

The purpose of this logical network is to enable Simple Network Management Protocol (SNMP) communication between the Business Support System (BSS) or Operations Support System (OSS) and the Controller Profile VM instances. This includes the sending of SNMP traps to the OSS and fetching counter-information from the Controller Profile VM instances. The logical network is also used to configure the CSCF VNF and to connect to the Network License Server (NeLS).

The CSCF VNF exposes the following MIP interface on the logical network Operation and Maintenance (OAM):

The CSCF VNF exposes the following direct IP interface to all Controller Profile VM instances. Direct IP interface in this context means public addressable IP address:

2.4.2   Description

It is assumed that the external router is configured with a set of PBR rules. These rules send IP packets targeted to the MIP address (enumerated in Section 2.4.1 Purpose) to OAM Virtual Routing Function (OAM-VR). It is also assumed that the public routable IP addresses are part of the Virtual Network OAM-Ext, hence it is not required to configure any explicit PBR rules in the external router for these public IP addresses.

The OAM-VR is required to enable Layer 3 routing to and from the CSCF VNF. The CSCF VNF VM instances of type Controller Profile use static routing so that the OAM-VR routes incoming IP packets towards the CSCF OAM MIP. These IP packets are sent to the Controller Profile VM instances.

As it is required to have a Virtual Routing Function to enable Layer 3 routing, it is also required to have two virtual networks to realize Logical Network Operation and Maintenance:

Figure 3 shows the realization of the logical network setup for operation and maintenance of a 2+2 node system.

Figure 3   Realization of Logical Network Setup Operation and Maintenance

2.4.3   Configuration Requirements for Virtual Network OAM-Ext

The following configuration requirements apply to this network:

2.4.4   Configuration Requirements for Virtual Network OAM-IntMgmt

The following configuration requirements apply to this network:

2.4.5   Configuration Requirements for Virtual Routing Function OAM-VR

The following configuration requirement exists for this virtual routing function:

2.5   Logical Network Signaling

2.5.1   Purpose

The purpose of the Logical Network is to enable Session Initiation Protocol (SIP) communication between the CSCF and other Internet Protocol Multimedia Subsystem (IMS) network entities. This network also enables Diameter-based communication between the CSCF, PCRF, and Subscriber Location Function (SLF), or Home Subscriber Server (HSS).

The CSCF VNF exposes the following VIP interface on Logical Network Signaling:

2.5.2   Description

It is assumed that the external router is configured with a set of PBR rules. These rules send IP packets addressed to the VIP addresses enumerated in Section 2.5.1 Purpose to the Virtual Routing Function Signaling (Sig-VR).

SIG-VR is required to enable Layer 3 routing to and from the CSCF VNF. The VM instances of type Payload Profile use static routing such that the SIG-VR routes incoming IP packets towards the CSCF VIP interfaces, and that these IP packets are sent to the Payload Profile VM instances.

It is required to have a Virtual Routing Function to enable Layer 3 routing, it also implies that Logical Network Signaling is realized by two Virtual Networks:

Figure 4 shows the realization of the logical network setup for signaling of a 2+2 node system.

Figure 4   Realization of Logical Network Setup Signaling

2.5.3   Configuration Requirements for Virtual Network Sig-Ext

The following configuration requirements apply to this network:

2.5.4   Configuration Requirements for Virtual Network Sig-IntVIP

The following configuration requirements apply to this network:

2.5.5   Configuration Requirements for Virtual Routing Function Sig-VR

The following configuration requirement exists for this Virtual Routing function:

2.6   Logical Network Charging

2.6.1   Purpose

The purpose of this network is to enable Diameter-based communication between the CSCF and Charging Collection Function.

The CSCF VNF exposes the following VIP interface on Logical Network Charging:

2.6.2   Description

It is assumed that the external router is configured with a set of PBR rules. These rules send IP packets targeted to the VIP addresses enumerated in Section 2.6.1 Purpose) to Virtual Routing Function Charging (CHA-VR).

CHA-VR is required to enable Layer 3 routing to and from the CSCF VNF. The CSCF VNF VM instances of type Payload Profile are configured using static routing to communicate with CHA-VR so that incoming IP packets are sent to the VM instances of type Payload Profile.

As it is required to have a Virtual Routing Function to enable Layer 3 routing, it also implies that Logical Network Charging is realized by two Virtual Networks:

Figure 5 shows the realization of the logical network setup for charging.

Figure 5   Realization of Logical Network Setup Charging

2.6.3   Configuration Requirements for Virtual Network Cha-Ext

The following configuration requirements apply to this network:

2.6.4   Configuration Requirements for Virtual Network Cha-IntVIP

The following configuration requirements apply to this network:

2.6.5   Configuration Requirements for Virtual Routing Function Cha-VR

The following configuration requirement exists for this Virtual Routing function:

2.7   Logical Network Internal

2.7.1   Purpose

The purpose of this network is to enable communication between the VM instances that form CSCF VNF. Internal communication, among others, includes communication based on the protocols Transparent Inter-Process Communication (TIPC), Dynamic Host Configuration Protocol (DHCP), Bootstrap Protocol (BOOTP), Trivial File Transfer Protocol (TFTP), and Network File System (NFS).

2.7.2   Description

As the purpose of this Logical Network is to enable intra-CSCF VNF communication, Logical Network Internal does not have any external IP connectivity.

Note:  
The Logical Network Internal is unique per CSCF VNF instance. That is, if it is required to deploy two CSCF VNF instances then it is required to create two Logical Network Internal instances.

The communication between VM instances is done by using Layer 2 routing. The result: no Virtual Routing function required and Logical Network Internal can be realized by one Virtual Network (Virtual Network Internal).

Figure 6 shows the realization of the Logical Network Internal setup.

Figure 6   Realization of Logical Network Internal Setup

2.7.3   Configuration Requirements for Virtual Network Internal

The following configuration requirements apply to this network:

2.8   Logical Network Setup in Multiple CSCF VNF Instance Deployment

It is possible to deploy the CSCF VNF multiple times in the same cloud infrastructure, resulting in multiple CSCF VNF instances. Having multiple CSCF VNF instances deployed in the same cloud infrastructure has some networking implications that must be noted.

It is required that Logical Network Internal and its underlying Virtual Network Internal are unique per CSCF VNF instance. If each CSCF VNF instance is not paired with a unique internal network instance, CSCF VNF instances will malfunction.

For the other Logical Networks, it is more on-site specific networking requirements from the operator and security requirements that apply. It is possible to create dedicated network instances (Virtual Networks and Virtual Routing Functions) per CSCF VNF instance. It is also possible to reuse Virtual Network instances – except for Virtual Network Internal. Another variant is to reuse Virtual Routing Functions and create CSCF VNF instance-specific Virtual Networks.

Create CSCF VNF instance-specific Virtual Networks and Virtual Routing Function. The reason for doing this is to separate the CSCF VNF instances, networking-wise, for security reasons. In this way, there is no logical IP connectivity between the CSCF VNF instances. However, depending on how CSCF VNF instances are deployed, it is possibly not a physical separation between the two instances.

Figure 7 shows CSCF VNF and its logical network setup in multiple CSCF VNF- instance deployment and when full separation is required.

Figure 7   CSCF VNF and Logical Network Setup for Multiple CSCF VNF Instance Deployment When Full Separation Is Required

Figure 8 shows logical network setup signaling combined with deployment of multiple CSCF VNF instances when full separation is required.

Figure 8   Logical Network Setup Signaling Combined with Deployment of Multiple CSCF VNF Instances When Full Separation Is Required

For the other Logical Networks Operation and Maintenance plus Charging, the same pattern as for Signaling applies.

The drawback of these recommendations is that CSCF VNF instances require more Virtual Networks instances. If it is not required to separate the CSCF VNF instances from each other, reuse the network entities between the CSCF VNF instances. However, it is required to have CSCF VNF instance unique Virtual Networks for internal communication. The other networking entities are reused between CSCF VNF entities.

Figure 9 shows CSCF VNF and its logical network setup for multiple CSCF VNF instance deployment and when full separation is not required.

Figure 9   CSCF VNF and Its Logical Network Setup in Case of Multiple CSCF VNF Instance Deployment and When Full Separation Is Not Required

Figure 10 shows logical network setup signaling combined with deployment of multiple CSCF VNF instances when full separation is not required.

Figure 10   Logical Network Setup Signaling Combined with Deployment of Multiple CSCF VNF Instances When Full Separation Is Not Required

For the other Logical Networks Operation and Maintenance plus Charging, the same pattern as for Signaling applies.

3   Example Configurations

This section describes example Cloud Networking Infrastructure configurations and deployments.

3.1   Static Routing with BFD Configuration

This section gives an example static routing with BFD configuration setup for CSCF VNF, that is when static routing with BFD is enabled in Virtual Routing Function. The actual values used for these parameters can vary depending on the deployment.

In this document, it is assumed that there are two VM instances per VIP address serving as VIP endpoints. Each of these VM instances internally has a VIP FE per VIP address and each VIP FE holds its own static routing with BFD configuration. If there are more than two VM instances per VIP address, the configuration must be adjusted accordingly.

3.1.1   Sig-IntVIP Static Routing with BFD Configuration

This section gives an example Static Routing with BFD configuration for Sig-IntVIP network.

Table 1    Static Routing with BFD Parameters for CSCF VNF Sig FE 3

Static Routing with BFD Parameter

Value

Local Address

192.168.216.3/24

Remote Gateway

192.168.216.1

bfd.RequiredMinEchoRXInterval

0

bfd.DesiredMinTxInterval

300

bfd.RequiredMinRxInterval

300

bfd.DetectMult

3

Table 2    Static Routing with BFD Parameters for CSCF VNF Sig FE 4

Static Routing with BFD Parameter

Value

Local Address

192.168.216.4/24

Remote Gateway

192.168.216.1

bfd.RequiredMinEchoRXInterval

0

bfd.DesiredMinTxInterval

300

bfd.RequiredMinRxInterval

300

bfd.DetectMult

3

3.1.2   Cha-IntVIP Static Routing with BFD Configuration

This section gives an example Static Routing with BFD configuration for Cha-IntVIP network.

Table 3    Static Routing with BFD Parameters for CSCF VNF Cha FE 3

Static Routing with BFD Parameter

Value

Local Address

192.168.217.3/24

Remote Gateway

192.168.217.1

bfd.RequiredMinEchoRXInterval

0

bfd.DesiredMinTxInterval

300

bfd.RequiredMinRxInterval

300

bfd.DetectMult

3

Table 4    Static Routing with BFD Parameters for CSCF VNF Cha FE 4

Static Routing with BFD Parameter

Value

Local Address

192.168.217.4/24

Remote Gateway

192.168.217.1

bfd.RequiredMinEchoRXInterval

0

bfd.DesiredMinTxInterval

300

bfd.RequiredMinRxInterval

300

bfd.DetectMult

3

3.2   Static Routing without BFD Configuration

This section gives an example static routing without BFD configuration setup for CSCF VNF, that is when static routing without BFD is enabled in Virtual Routing Function. The actual values used for these parameters can vary depending on the deployment.

In this document, it is assumed that there are two VM instances per VIP address serving as VIP endpoints. Each of these VM instances internally has a VIP FE per VIP address and each VIP FE holds its own static routing without BFD configuration. If there are more than two VM instances per VIP address, the configuration must be adjusted accordingly.

3.2.1   Sig-IntVIP Static Routing without BFD Configuration

This section gives an example Static Routing without BFD configuration for Sig-IntVIP network.

Table 5    Static Routing without BFD Parameters for CSCF VNF Sig FE 3

Static Routing without BFD Parameter

Value

Local Address

192.168.216.3/24

Remote Gateway

192.168.216.252

Table 6    Static Routing without BFD Parameters for CSCF VNF Sig FE 4

Static Routing without BFD Parameter

Value

Local Address

192.168.216.4/24

Remote Gateway

192.168.216.252

3.2.2   Cha-IntVIP Static Routing without BFD Configuration

This section gives an example Static Routing without BFD configuration for Cha-IntVIP network.

Table 7    Static Routing without BFD Parameters for CSCF VNF Cha FE 3

Static Routing without BFD Parameter

Value

Local Address

192.168.217.3/24

Remote Gateway

192.168.217.252

Table 8    Static Routing without BFD Parameters for CSCF VNF Cha FE 4

Static Routing without BFD Parameter

Value

Local Address

192.168.217.4/24

Remote Gateway

192.168.217.252

3.3   OpenStack Deployment

This section describes how to configure the different networks in OpenStack context. That is, when CSCF VNF is deployed in an OpenStack cloud, it can be deployed in the Ericsson Cloud System cloud or some other OpenStack based cloud.

Note:  
In the following sections, it is assumed that only one CSCF VNF instance is deployed in the cloud. That is, the names/identifiers are not denoted with instance identifiers in this document. If multiple CSCF VNF instances are to be deployed into the same cloud, it is recommended to prefix all names/identifiers with the CSCF VNF instance name, for example, Karlstad-City-OAM-Ext.

3.3.1   Example Data Used

In the following sections, the provided example configuration data is based on the following CSCF VNF configuration.

Table 9    Configuration Values Used in the Example

CSCF VNF Parameter

Value

System Management net

10.50.41.48/29

CSCF OAM MIP

10.50.41.50

System Management SC-1

10.50.41.51

System Management SC-2

10.50.41.52

I-CSCF SIP VIP

10.50.41.202

S-CSCF SIP VIP

10.50.41.203

S-CSCF HSS VIP

10.50.41.204

S-CSCF Offline Charging VIP

10.50.41.205

S-CSCF Online Charging VIP

10.50.41.206

E-CSCF SIP VIP

10.50.41.208

OAM-VR IP (Ext)

172.16.5.6

External router OAM GW

172.16.5.5

Signaling eVIP FEE-3 IP

192.168.216.3

Signaling eVIP FEE-4 IP

192.168.216.4

Sig-VR IP (Int)

192.168.216.1

Sig-VR IP (Ext)

172.16.5.2

External router Sig GW

172.16.5.1

Charging eVIP FEE-3 IP

192.168.217.3

Charging eVIP FEE-4 IP

192.168.217.4

Cha-VR IP (Int)

192.168.246.1

Cha-VR IP (Ext)

172.16.5.26

Site Router Cha GW

172.16.5.25

Internal Net (cluster.conf)

169.254.100.0/24

3.3.2   Configuration of Logical Network Operation and Maintenance

Figure 11 shows an overview of the OpenStack/Neutron building blocks that are used to build Logical Network O&M.

Figure 11   Logical Network Setup Operational and Maintenance Built by Neutron Components

3.3.2.1   Configuration of Virtual Network OAM-Ext

The following configuration settings are recommended for OAM-Ext network in OpenStack context.

Table 10    Recommended Values for Neutron Net-Create Command

OpenStack Parameter

Recommended Value

Name

OAM-Ext

prefix

As required

shared

FALSE

tenant_id

As required

provider:network_type

Vlan

provider:physical_network

As required

provider:segmentation_id

As required

router:external

TRUE

Table 11    Recommended Values for Neutron Subnet-Create Command

OpenStack Parameter

Recommended Value

Name

OAM-Ext-Sub

Network

OAM-Ext

CIDR

As required – for example 172.16.5.4/30

prefix

As required

tenant_id

As required

gateway

As required – for example 172.16.5.5/32

allocation-pool

As required – for example start=172.16.5.6 end=172.16.5.7

host-route

Not used

dns-nameserver

Not used

disable-dhcp

Used (no parameter value)

ip-version

As required

3.3.2.2   Configuration of Virtual Network OAM-IntMgmt

The following configuration settings are recommended for OAM-IntMgmt network in OpenStack context.

Table 12    Recommended Values for Neutron Net-Create Command

OpenStack Parameter

Recommended Value

Name

OAM-IntMgmt

prefix

As required

shared

FALSE

tenant_id

As required

provider:network_type

Not used

provider:physical_network

Not used

provider:segmentation_id

Not used

router:external

TRUE

Table 13    Recommended Values for Neutron Subnet-Create Command

OpenStack Parameter

Recommended Value

Name

OAM-IntMgmt-Sub

Network

OAM-IntMgmt

CIDR

As required – for example 192.168.0.0/29

prefix

As required

tenant_id

As required

allocation-pool

As required – for example start=192.168.0.1 end=192.168.0.3

host-route

Not used

dns-nameserver

Not used

disable-dhcp

Used (no parameter value)

ip-version

As required

3.3.2.3   Configuration of Virtual Router OAM-VR

The following configuration settings are recommended for OAM-IntMgmt network in OpenStack context.

Table 14    Recommended Values for Neutron Router-Create Command

OpenStack Parameter

Recommended Value

Name

OAM-VR

Table 15    Recommended Values for Neutron Router-Interface-Add Command

OpenStack Parameter

Recommended Value

router-id

OAM-VR

interface

OAM-Ext

Table 16    Recommended Values for Neutron Router-Interface-Add Command

OpenStack Parameter

Recommended Value

router-id

OAM-VR

interface

OAM-IntMgmt

Table 17    Recommended Values for Neutron Router-Gateway-Set Command

OpenStack Parameter

Recommended Value

router-id

OAM-VR

external-network-id

OAM-Ext

3.3.3   Configuration of Logical Network Signaling

Figure 12 shows an overview of the OpenStack building blocks that are used to build Logical Network Signaling.

Figure 12   Logical Network Setup Signaling Built by Neutron Components

3.3.3.1   Configuration of Virtual Network Sig-Ext

The following configuration settings are recommended for Sig-Ext network in OpenStack context.

Table 18    Recommended Values for Neutron Net-Create Command

OpenStack Parameter

Recommended Value

Name

Sig-Ext

prefix

As required

shared

FALSE

tenant_id

As required

provider:network_type

Vlan

provider:physical_network

As required

provider:segmentation_id

As required

router:external

TRUE

Table 19    Recommended Values for Neutron Subnet-Create Command

OpenStack Parameter

Recommended Value

Name

Sig-Ext-Sub

Network

Sig-Ext

CIDR

As required – for example 172.16.5.2/30

prefix

As required

tenant_id

As required

gateway

As required – for example 172.16.5.1/32

allocation-pool

As required – for example start=172.16.5.1 end=172.16.5.2

host-route

Not used

dns-nameserver

Not used

disable-dhcp

Used (no parameter value)

ip-version

As required

3.3.3.2   Configuration of Virtual Network Sig-IntVIP

The following configuration settings are recommended for Sig-IntVIP network in OpenStack context.

Table 20    Recommended Values for Neutron Net-Create Command

OpenStack Parameter

Recommended Value

Name

Sig-IntVIP

prefix

As required

shared

FALSE

tenant_id

As required

provider:network_type

Not used

provider:physical_network

Not used

provider:segmentation_id

Not used

router:external

TRUE

Table 21    Recommended Values for Neutron Subnet-Create Command

OpenStack Parameter

Recommended Value

Name

Sig-IntVIP-Sub

Network

Sig-IntVIP

CIDR

As required – for example 192.168.216.0/29

prefix

As required

tenant_id

As required

allocation-pool

As required – for example start=192.168.216.3 end=192.168.216.11

host-route

Not used

dns-nameserver

Not used

disable-dhcp

Used (no parameter value)

ip-version

As required

3.3.3.3   Configuration of Virtual Router Sig-VR

The following configuration settings are recommended for Sig-VR in OpenStack context.

Table 22    Recommended Values for Neutron Router-Create Command

OpenStack Parameter

Recommended Value

Name

Sig-VR

Table 23    Recommended Values for Neutron Router-Interface-Add Command

OpenStack Parameter

Recommended Value

router-id

Sig-VR

interface

Sig-Ext

Table 24    Recommended Values for Neutron Router-Interface-Add Command

OpenStack Parameter

Recommended Value

router-id

Sig-VR

interface

Sig-IntVIP

Table 25    Recommended Values for Neutron Router-Gateway-Set Command

OpenStack Parameter

Recommended Value

router-id

Sig-VR

external-network-id

Sig-Ext

Table 26    Recommended Values for Neutron Staticroute-Create Command

OpenStack Parameter

Recommended Value

ID

Sig-VR

destination(1)

10.50.41.201/32

nexthop

192.168.216.3

destination

10.50.41.201/32

nexthop

192.168.216.11

Destination

10.50.41.202/32

nexthop

192.168.216.3

destination

10.50.41.202/32

nexthop

192.168.216.11

destination

10.50.41.203/32

nexthop

192.168.216.3

destination

10.50.41.203/32

nexthop

192.168.216.11

destination

10.50.41.208/32

nexthop

192.168.216.3

destination

10.50.41.208/32

nexthop

192.168.216.11

(1)  Nexthop and destination are configured in pairs.


3.3.4   Configuration of Logical Network Charging

Figure 13 shows an overview of the OpenStack building blocks that are used to build Logical Network Charging.

Figure 13   Logical Network Setup Charging Built by Neutron Components

3.3.4.1   Configuration of Virtual Network Cha-Ext

The following configuration settings are recommended for Cha-Ext network in OpenStack context.

Table 27    Recommended Values for Neutron Net-Create Command

OpenStack Parameter

Recommended Value

Name

Cha-Ext

prefix

As required

shared

FALSE

tenant_id

As required

provider:network_type

Vlan

provider:physical_network

As required

provider:segmentation_id

As required

router:external

TRUE

Table 28    Recommended Values for Neutron Subnet-Create Command

OpenStack Parameter

Recommended Value

Name

Cha-Ext-Sub

Network

Cha-Ext

CIDR

As required – for example 172.16.5.24/30

prefix

As required

tenant_id

As required

gateway

As required – for example 172.16.5.25/32

allocation-pool

As required – for example start=172.16.5.25 end=172.16.5.26

host-route

Not used

dns-nameserver

Not used

disable-dhcp

Used (no parameter value)

ip-version

As required

3.3.4.2   Configuration of Virtual Network Cha-IntVIP

The following configuration settings are recommended for Cha-IntVIP network in OpenStack context.

Table 29    Recommended Values for Neutron Net-Create Command

OpenStack Parameter

Recommended Value

Name

Cha-IntVIP

prefix

As required

shared

FALSE

tenant_id

As required

provider:network_type

Not used

provider:physical_network

Not used

provider:segmentation_id

Not used

router:external

TRUE

Table 30    Recommended Values for Neutron Subnet-Create Command

OpenStack Parameter

Recommended Value

Name

Cha-IntVIP-Sub

Network

Cha-IntVIP

CIDR

As required – for example 192.168.246.0/29

prefix

As required

tenant_id

As required

allocation-pool

As required – for example start=192.168.246.3 end=192.168.246.11

host-route

Not used

dns-nameserver

Not used

disable-dhcp

Used (no parameter value)

ip-version

As required

3.3.4.3   Configuration of Virtual Router Cha-VR

The following configuration settings are recommended for Sig-VR in OpenStack context.

Table 31    Recommended Values for Neutron Router-Create Command

OpenStack Parameter

Recommended Value

Name

Cha-VR

Table 32    Recommended Values for Neutron Router-Interface-Add Command

OpenStack Parameter

Recommended Value

router-id

Cha-VR

interface

Cha-Ext

Table 33    Recommended Values for Neutron Router-Interface-Add Command

OpenStack Parameter

Recommended Value

router-id

Cha-VR

interface

Cha-IntVIP

Table 34    Recommended Values for Neutron Router-Gateway-Set Command

OpenStack Parameter

Recommended Value

router-id

Cha-VR

external-network-id

Cha-Ext

Table 35    Recommended Values for Neutron Staticroute-Create Command

OpenStack Parameter

Recommended Value

ID

Sig-VR

destination(1)

10.50.41.205/32

nexthop

192.168.246.3

destination

10.50.41.205/32

nexthop

192.168.246.11

Destination

10.50.41.206/32

nexthop

192.168.246.3

destination

10.50.41.206/32

nexthop

192.168.246.11

(1)  Nexthop and destination are configured in pairs.


3.3.5   Configuration of Logical Network Internal

Figure 14 shows an overview of the OpenStack building blocks that are used to build Logical Network Internal.

Figure 14   Logical Network Setup Internal Built by Neutron Components

3.3.5.1   Configuration of Virtual Network Internal

The following configuration settings are recommended for Internal network in OpenStack context.

Table 36    Recommended Values for Neutron Net-Create Command

OpenStack Parameter

Recommended Value

Name

Internal

prefix

As required

shared

FALSE

tenant_id

As required

provider:network_type

Vlan

provider:physical_network

As required

provider:segmentation_id

As required

router:external

TRUE

Table 37    Recommended Values for Neutron Subnet-Create Command

OpenStack Parameter

Recommended Value

Name

Internal-Sub

Network

Internal

CIDR

As required – for example 169.254.100.0/24

prefix

As required

tenant_id

As required

gateway

Not used

allocation-pool

As required – for example start=169.254.100.1 end=169.254.100.254

host-route

Not used

dns-nameserver

Not used

disable-dhcp

Used (no parameter value)

ip-version

As required

3.4   Equal-Cost Multipath Considerations

The CSCF VNF requires that flow-based ECMP is applied for TCP sessions, SCTP streams, and for fragmented UDP packets. This is needed as CSCF VNF requires that all IP packets from a TCP packet flow or SCTP packet flow or fragmented UDP packet flow are received on the same CSCF VNF instance (all packets within the flow are sent to the same CSCF VNF instance).

It is assumed in this document, that all networking routing entities support flow-based Equal-Cost Multipath for TCP, as this is a defacto standard for the TCP. The following subsections give some examples of the network configuration when it is not possible to use flow-based ECMP.

Note:  
This is not required for UDP packets that are not fragmented.

3.4.1   Avoid Fragmented UDP Packets through Using TCP

In the CSCF VNF implementation, the eVIP FE implementation reassembles fragmented UDP packets before passing it on to CSCF application logic. As the eVIP FE runs on multiple VM instances, it is required that all UDP fragments are received by the same VM instance.

If it is not possible to achieve flow-based Equal-Cost Multipath for fragmented UDP packets, it is required to use TCP instead of UDP. This implies that any SIP communication to and from the CSCF VNF that can result in IP fragmentation, must use TCP. The DNS server and other network entities must be configured for TCP. It is also required to change CSCF configuration: set cscfSendRequestUdpOnly to false.

Do not use the DF (Do not Fragment) flag in the IP header to avoid fragmentation. The CSCF VNF is able to receive IP packets of the path MTU size (typically 1500 bytes) and then fragment the IP packets according to an internal MTU size of about 1452 bytes. If the received packet MTU size is larger than internal MTU size of 1452 bytes and the DF bit is set, the CSCF discards the IP packet.

Use TCP if the SIP message size is above 1300 bytes. This is also indicated in RFC3261.

3.4.2   Avoid Fragmented SCTP Packets through Using TCP

The problem for fragmented UDP packets as mentioned in section Section 3.4.1 Avoid Fragmented UDP Packets through Using TCP, also applies to SCTP for the same reason. If it is not possible to use flow-based ECMP for SCTP stream, it is required to use TCP instead of SCTP. This implies that communication between the CSCF VNF and SLF/HSS must use TCP.

Note:  
The SLF or HSS, or both, possibly must be reconfigured for TCP.

3.4.3   Configure Network Routing in a Active/Standby Pattern

An alternative way to solve the fragmentation, is to define one of the CSCF Signaling VMs as primary destination for all IP packets. The other VM instance of the same type is then defined as secondary destination. If there are three instances of this type, define the third instance as tertiary destination. Primary, secondary, and optionally tertiary destinations are in this context defined as PBR in the external router.

The drawback of this type of solution is that, whenever a fault happens (for example an unexpected termination of the VM instance which is the primary destination), it results in the loss of all TCP connections (for example Diameter connections to SLF/HSS). Then the connections must be reestablished and this takes some time. That is why this setup is not the default configuration.



Copyright

© Ericsson AB 2014–2018. All rights reserved. No part of this document may be reproduced in any form without the written permission of the copyright owner.

Disclaimer

The contents of this document are subject to revision without notice due to continued progress in methodology, design and manufacturing. Ericsson shall have no liability for any error or damage of any kind resulting from the use of this document.

Trademark List
All trademarks mentioned herein are the property of their respective owners. These are shown in the document Trademark Information.

    CSCF VNF Network Connectivity Overview         Call Session Control Function