Base Station Supporting Multi-Operator PKI (SRAN12.1 - 04) PDF
Base Station Supporting Multi-Operator PKI (SRAN12.1 - 04) PDF
Base Station Supporting Multi-Operator PKI (SRAN12.1 - 04) PDF
Issue 04
Date 2017-09-30
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or
representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: [email protected]
Contents
2 Overview......................................................................................................................................... 5
2.1 Background.....................................................................................................................................................................5
2.2 Introduction.................................................................................................................................................................... 5
2.3 Benefits........................................................................................................................................................................... 6
2.4 Architecture.................................................................................................................................................................... 7
4 Related Features...........................................................................................................................15
4.1 GBFD-171205 BTS Supporting Multi-operator PKI................................................................................................... 15
4.2 WRFD-171220 NodeB Supporting Multi-operator PKI.............................................................................................. 15
4.3 LOFD-081280 eNodeB Supporting Multi-operator PKI..............................................................................................16
4.4 TDLOFD-081206 eNodeB Supporting Multi-operator PKI........................................................................................ 16
4.5 MLOFD-081282 eNodeB Supporting Multi-operator PKI.......................................................................................... 16
5 Network Impact........................................................................................................................... 17
5.1 GBFD-171205 BTS Supporting Multi-operator PKI................................................................................................... 17
5.2 WRFD-171220 NodeB Supporting Multi-operator PKI.............................................................................................. 17
6 Engineering Guidelines............................................................................................................. 19
6.1 When to Use................................................................................................................................................................. 19
6.1.1 Typical Scenarios.......................................................................................................................................................19
6.1.2 Unrecommended Scenarios....................................................................................................................................... 22
6.1.3 Forbidden Scenarios.................................................................................................................................................. 24
6.2 Required Information................................................................................................................................................... 24
6.3 Deployment.................................................................................................................................................................. 25
6.3.1 Deployment Process.................................................................................................................................................. 26
6.3.2 Requirements............................................................................................................................................................. 27
6.3.3 Data Preparation........................................................................................................................................................ 29
6.3.4 Precautions.................................................................................................................................................................31
6.3.5 Activation (from No-PKI to Multi-operator PKI)..................................................................................................... 32
6.3.5.1 Using the CME....................................................................................................................................................... 32
6.3.5.2 Using MML Commands......................................................................................................................................... 32
6.3.5.3 MML Command Examples.................................................................................................................................... 34
6.3.6 Activation (from Single-operator PKI to Multi-operator PKI)..................................................................................37
6.3.6.1 Using the CME....................................................................................................................................................... 37
6.3.6.2 Using MML Commands......................................................................................................................................... 38
6.3.6.3 MML Command Examples.................................................................................................................................... 39
6.3.7 Activation Observation..............................................................................................................................................40
6.3.8 Deactivation (from Multi-operator PKI to No-PKI)..................................................................................................41
6.3.8.1 Using the CME....................................................................................................................................................... 41
6.3.8.2 Using MML Commands......................................................................................................................................... 41
6.3.8.3 MML Command Examples.................................................................................................................................... 41
6.3.9 Deactivation (from Multi-operator PKI to Single-operator PKI).............................................................................. 42
6.3.9.1 Using the CME....................................................................................................................................................... 42
6.3.9.2 Using MML Commands......................................................................................................................................... 42
6.3.9.3 MML Command Examples.................................................................................................................................... 43
6.3.10 Reconfiguration....................................................................................................................................................... 43
6.4 Performance Monitoring...............................................................................................................................................44
6.5 Parameter Optimization................................................................................................................................................ 44
6.6 Possible Issues.............................................................................................................................................................. 44
7 Parameters..................................................................................................................................... 45
8 Counters........................................................................................................................................ 55
9 Glossary......................................................................................................................................... 56
10 Reference Documents............................................................................................................... 57
1.1 Scope
This document describes Base Station Supporting Multi-operator PKI, including its technical
principles, related features, network impact, and engineering guidelines.
This document covers the following features:
l GBFD-171205 BTS Supporting Multi-operator PKI
l WRFD-171220 NodeB Supporting Multi-operator PKI
l LOFD-081280 eNodeB Supporting Multi-operator PKI
l TDLOFD-081206 eNodeB Supporting Multi-operator PKI
l MLOFD-081282 eNodeB Supporting Multi-operator PKI
Unless otherwise specified, in this document, LTE, eNodeB, and eRAN always include FDD,
TDD, and NB-IoT. The "L", "T", and "M" in RAT acronyms refer to LTE FDD, LTE TDD,
and LTE NB-IoT, respectively.
For definitions of base stations described in this document, see section "Base Station
Products" in SRAN Networking and Evolution Overview Feature Parameter Description.
NOTE
Any parameters, alarms, counters, or managed objects (MOs) described herein apply only to the
corresponding software release. For future software releases, refer to the corresponding updated product
documentation.
SRAN12.1 04 (2017-09-30)
This issue includes the following changes.
SRAN12.1 03 (2017-06-29)
This issue includes the following changes.
Feature Added the support for NB-IoT by the BTS3912E. For None
change details, see 1.4 Differences Between Base Station
Types.
SRAN12.1 01 (2017-03-08)
This issue does not include any changes.
Among micro base stations, only BTS3912Es support NB-IoT. LampSite base stations do not
support NB-IoT.
Base Station Supporting The following micro base stations support this feature:
Multi-operator PKI l BTS3202E
l BTS3203E
l BTS3911E
Macro base stations: The eGBTS configured with a
GTMUb/GTMUc and the GBTS do not support this feature.
LampSite: Only the DBS3900 LampSite supports this
feature.
2 Overview
2.1 Background
As network deployment demands increase, operators are confronted with the following
challenges if they independently deploy networks:
l Expensive spectrum licenses
l Significant network deployment costs
l High network coverage requirements
l Difficult site deployment
To cope with these challenges, more and more operators choose the network sharing solution
(RAN Sharing for short), through which they can use one set of base station equipment to
cover the same area. For details on RAN Sharing, see RAN Sharing Feature Parameter
Description.
In RAN Sharing scenarios, however, a base station can only be deployed with the public key
infrastructure (PKI) server of one operator (the primary operator). IPsec tunnels of secondary
operators must be authenticated using the certificate issued by the PKI server of the primary
operator, which reduces the IPsec tunnel reliability of secondary operators.
With the Base Station Supporting Multi-operator PKI feature, a base station can be deployed
with the PKI systems of multiple operators, thereby enhancing base station transmission
reliability.
NOTE
In this document, the scenario where a base station is deployed with the PKI system of only one operator
is called single-operator PKI for short, and the scenario where a base station is deployed with the PKI
systems of multiple operators is called multi-operator PKI for short.
2.2 Introduction
This feature enables each operator to deploy its own PKI server on the base station. With this
feature, certificates from multiple operators can be loaded to and managed on the base station,
and certificate application, update, and revocation of one operator are independent from those
of another operator. The IPsec tunnel of each operator uses the certificates issued by its own
PKI server for authentication, as shown in Figure 2-1.
Limitations
The Base Station Supporting Multi-operator PKI feature can be deployed only in RAN
Sharing scenarios. The eGBTS configured with a GTMUb or GTMUc and the GBTS do not
support this feature.
Specifications
l When PKI redundancy is used, each base station can be configured with a maximum of
six pairs of Certificate Authorities (CAs). When PKI redundancy is not used, each base
station can be configured with a maximum of six CAs.
l Each base station can be configured with six periodic certificate revocation list (CRL)
acquisition tasks, which can be configured using the CRLTSK managed object (MO).
l Each base station can be loaded with a maximum of 20 certificates, including
preconfigured Huawei certificates.
If operators use multi-level certificates and the certificates take up more storage space
than is available, then these certificates can be converted into the .p7b format to save
storage.
2.3 Benefits
In RAN Sharing scenarios, if each operator deploys its own PKI server, this feature provides
an independent IPsec tunnel for each operator so as to achieve the secure isolation of each
operator's services.
2.4 Architecture
Figure 2-2 illustrates the PKI system architecture for the Base Station Supporting Multi-
operator PKI feature.
l The PKI system of operator 1 consists of CA 1, RA 1, and certificate & CRL database 1.
l The PKI system of operator 2 consists of CA 2, RA 2, and certificate & CRL database 2.
RA is short for registration authority. For details about the CA, RA, and certificate & CRL
database, see PKI Feature Parameter Description.
Figure 2-2 PKI system architecture for the Base Station Supporting Multi-operator PKI
feature
Table 3-1 describes the differences in certificate management and application between single-
operator PKI and multi-operator PKI. For the similarities, see PKI Feature Parameter
Description.
Figure 3-1 Networking for deploying Base Station Supporting Multi-operator PKI in RAN
Sharing scenarios
– In plug and play (PnP) base station deployment mode, the base station must first
apply for a certificate from the CA of the primary operator and then from the CA of
the secondary operator.
– In USB-based base station deployment mode, certificates can be applied for without
following the sequence described in Figure 3-1.
Figure 3-2 details base station deployment procedures illustrated in Figure 3-1.
NOTE
Figure 3-3 illustrates the differences in configuration objects used for configuring multi-
operator PKI compared with those used for configuring single-operator PKI.
l If operators use different certificate request templates, these certificate request templates
must be configured before certificate application.
After the base station sends a CMPv2-based certificate request message to the CA, the
certificate application procedure fails if the certificate request times out. The waiting timeout
interval is 60s in single-operator PKI scenarios and is 20s for each PKI in multi-operator
PKI scenarios.
– After a successful certificate application, the obtained operator's certificate will be
automatically loaded to the CERTMK MO, and the CERTMK.CASW parameter
is automatically set to ON for this certificate.
l Before a reconstruction from single-operator PKI to multi-operator PKI, the
CERTMK.CASW parameter must be set to ON.
l After a successful certificate application, run the MOD APPCERT command to set a
certificate under the CERTMK MO as the global certificate, which saves the trouble of
running the MOD APPCERT command to validate certificates for multiple operators.
l After successful certificate loading, bind each operator's certificate to the corresponding
IPsec tunnel.
You can use the IKEPEER.CERTSOURCE and IKEPEER.CERTNAME parameters
to bind operators' certificates to IPsec tunnels.
4 Related Features
Impacted Features
None
Impacted Features
None
Impacted Features
None
Impacted Features
None
Impacted Features
None
5 Network Impact
Network Performance
The duration of base station deployment is prolonged by 10s due to certificate application for
each operator.
Network Performance
The duration of base station deployment is prolonged by 10s due to certificate application for
each operator.
Network Performance
The duration of base station deployment is prolonged by 10s due to certificate application for
each operator.
Network Performance
The duration of base station deployment is prolonged by 10s due to certificate application for
each operator.
Network Performance
The duration of base station deployment is prolonged by 10s due to certificate application for
each operator.
6 Engineering Guidelines
Figure 6-3 Multi-operator PKI enabled with IPsec redundancy among multiple SeGWs
Figure 6-4 Shared base station controller with no IPsec tunnel between the base station
controller and CN
Shared Base Station Controller with IPsec Tunnel Between the Base Station
Controller and CN
Operator A and operator B share the base station controller, which is connected to the CN of
each operator. IPsec tunnels are set up between the base station controller and the CNs of the
two operators. Figure 6-5 shows an example.
In this scenario, although the base station controller has separate IPsec tunnels with the CNs
of the two operators, the base station supports the IPsec tunnel only with an external SeGW. If
separate IPsec tunnels are to be set up for different operators between the base station and
base station controller, different digital certificates must be configured to authenticate these
IPsec tunnels and certificate update should be performed separately for different PKI systems.
Figure 6-5 Shared base station controller with IPsec tunnel between the base station
controller and CN
6.3 Deployment
l New sites
A new site is not enabled with any PKI-related features (including the PKI and PKI
redundancy features) and needs to be deployed with multi-operator PKI.
Figure 6-6 shows an example of multi-operator PKI deployment in RAN sharing
scenarios where operator A and operator B share an eNodeB.
NOTE
The deployment method is the same for the eGBTS, NodeB, eNodeB, and multimode base
stations.
This document describes how to enable the Base Station Supporting Multi-operator PKI feature
using MML commands and the CME. For details about how to enable this feature using the
U2000, see the U2000 help document.
l Existing sites
An existing base station has been deployed with the PKI, PKI redundancy, or IPsec
redundancy among multiple SeGWs feature, and it needs to be deployed with base
station supporting multi-operator PKI.
Figure 6-7 shows an example of single-operator PKI to multi-operator PKI
reconstruction in an eNodeB.
– Before reconstruction: Operator A and operator B share the eNodeB and the
certificate issued by the PKI server of operator A is used for authentication.
– After reconstruction: Operator A and operator B have their own PKI server and use
the certificate issued by their own PKI server for authentication.
Figure 6-8 Process of deploying the Base Station Supporting Multi-operator PKI feature
6.3.2 Requirements
Other Features
For details, see 4 Related Features.
For details about the IPsec redundancy among multi-SeGWs feature, see IPsec Feature
Parameter Description. For other features, see PKI Feature Parameter Description.
Hardware
NE Type Board Configuration Board That Provides a Port Type
Port for Connecting
the Base Station to the
Transport Network
UMPT+UTRPc UTRPc
UMPT/WMPT+UTRPc UTRPc
LMPT/UMPT+UTRPc UTRPc
License
Before deploying this feature, purchase and activate the license for this feature.
NOTE
The license activation rules for a multimode base station are as follows:
l In a separate-MPT multimode base station with co-transmission, the license needs to be deployed
only on the mode that provides the co-transmission port. If another mode needs to share the
certificate, the license also needs to be deployed on this mode.
l If the UTRPc provides a co-transmission port, the license needs to be activated for the mode that
controls the UTRPc.
l In a co-MPT multimode base station, the license can be activated on any of the GSM, UMTS, or
LTE mode.
Others
l The PKI server (CA) of each operator must be deployed. Each base station supports a
maximum of six operators' PKI servers, that is, six independent CAs or twelve active/
standby CAs.
l The device certificate and CRL file issued by each operator's CA server must meet the
RFC 5280 standards.
l The operator's CA server complies with the CMPv2 specified in the RFC 4210
standards. The certificate request message format meets the RFC 4211 standards.
l The operator's CA server meets the following specification in 3GPP TS 33.310: The
certificate request message contains the operator's root certificate or certificate chain.
l The operator's CA server is preconfigured with the Huawei root certificate.
The base station must initiate certificate application requests to the CA server of each
operator. Each operator's CA information must be configured on the base station side. The
involved MOs are CA in MML and CME configurations.
Table 6-1 Data to be prepared on the base station side for the CA server
Locality LOCALITY
Certificate CERTREQSIGNAL
Request G
Signature
Algorithm
Local IP LOCALIP
Table 6-2 lists the data to be prepared for a device certificate (involving the CERTMK MO
in MML and CME configurations).
Table 6-3 lists the data to be prepared for an IKE peer (involving the IKEPEER MO in
MML and CME configurations).
6.3.4 Precautions
During new PKI deployment, the IPsec tunnel needs to be reestablished, which interrupts
services.
Single configuration CME Management > CME Guidelines > Getting Started with
the CME > Introduction to Data Configuration Operations
Batch eGBTS CME Management > CME Guidelines > GSM Application
configuration Management > Base Station Related Operations > Importing
and Exporting eGBTS Data for Batch Reconfiguration
Batch NodeB CME Management > CME Guidelines > UMTS Application
configuration Management > NodeB Related Operations > Importing and
Exporting NodeB Data for Batch Configuration
Batch eNodeB CME Management > CME Guidelines > LTE Application
configuration Management > eNodeB Related Operations > Importing and
Exporting eNodeB Data for Batch Configuration
You need to reset the base station to make the configuration take effect.
If the base station is configured with only one main control board, the certificate is deployed on this
main control board by default. In this case, you can skip this step.
Step 2 Run the MOD CERTREQ command to configure a global certificate request template.
NOTE
Pay attention to the following tips when configuring the global certificate request template.
l If the certificate request file used by the CA is the same as the global certificate request template,
use the template specified in CERTREQ.
l If the certificate request file used by the CA is different from the global certificate request template,
configure a certificate request template for the CA by referring to Step 3.
Step 3 Run the ADD CA command to add CA information for each operator.
l If the certificate request file used by the CA is different from that configured in Step 2,
set Certificate Request Switch to USERDEFINE(USERDEFINE) to customize a
certificate request template for this CA.
l If the PKI redundancy mode is used, configure the standby CA of this CA.
NOTE
You need to purchase the license for the PKI redundancy feature before enabling this feature. For
details, see PKI Feature Parameter Description.
Step 4 (Optional, applicable only to manual certificate application) Run the DLD CERTFILE
command to download each operator's root certificate from the operator's certificate & CRL
database.
Step 5 (Optional, applicable only to manual certificate application) Run the ADD TRUSTCERT
command for each CA trust certificate you want to add.
NOTE
If multi-level CAs are deployed in an operator's PKI system, a complete certificate chain must be added.
If the certificates of different levels of CAs in the certificate chain are stored separately, run the ADD
TRUSTCERT command for each certificate you want to add.
Step 6 (Optional, applicable only to manual certificate application) Run the REQ DEVCERT
command for each CMP session you want to start to apply for a device certificate.
NOTE
The certificate application procedure is triggered when this configuration takes effect.
The obtained certificate will be automatically loaded to CERTMK and the CA Switch is set to on.
If automatic certificate loading fails, run the ADD CERTMK command to load the certificate.
Step 7 Run the MOD APPCERT command to activate the configured global certificate.
NOTE
Pay attention to the following tips when activating the configured global certificate:
l You can configure only one SSL certificate and one IKE certificate, respectively.
l In multi-PKI scenarios, if the certificate used by an operator is different from the configured
certificate, set the certificate name for the operator in the MO IKEPEER in Step 8.
Step 8 Enable the IPsec feature. For details, see Deployment of IPsec > Deployment > Deploying
IPsec on an eGBTS/NodeB/eNodeB > Using MML Commands in IPsec Feature
Parameter Description.
Run the ADD IKEPEER command. In this step, set Certificate Source and Certificate File
Name to bind certificates to each IKE channel.
Step 9 Run the SET CERTCHKTSK command to set a periodic certificate validity check task.
----End
Step 1 Run the DLD CERTFILE command for each CRL file you want to download.
Step 2 Run the ADD CRL command for each CRL file you want to add.
Step 3 Run the SET CRLPOLICY command to configure the CRL policy.
Step 4 Run the ADD CRLTSK command for each periodic CRL download task you want to add.
----End
l Automatic download
Step 1 Run the SET CRLPOLICY command to configure the CRL policy.
Step 2 Run the ADD CRLTSK command for each periodic CRL download task you want to add.
----End
----End
//Setting CA information for operator A and use this information to customize a certificate
request template for the CA
l If the CA is accessible either through the intranet or through an external network and the
OM data is protected by IPsec, it is recommended that the source IP address used for
certificate application be set to an interface IP address, the source IP address used for
certificate update be set to the OM IP address (for example, 10.31.31.188), the CA URL
during site deployment be set to 10.87.87.87, and the certificate request template be
customized. The following is an example:
l //Manually applying for a digital certificate for operator B. Skip this step if you use
automatic triggering of CMPv2-based certificate application.
REQ DEVCERT: CANAME="C=AU, S=Some-State, O=Internet Widgits Pty Ltd,
CN=eca2", APPCERT="OPKIDevCert2.cer";
NOTE
After command execution, if the IKE connection is authenticated using a certificate and the current
status of the IKE SA is normal, the base station automatically triggers an IKE re-negotiation.
l Operator B does not use the global certificate for IKE negotiation and the certificate
name is OpkiDevCert2.cer.
ADD IKEPEER: PEERNAME="peer", PROPID=1, IKEVERSION=IKE_V2, IDTYPE=FQDN,
REMOTEIP="10.91.91.91", DPD=PERIODIC, CERTSOURCE = 1,
CERTNAME="OpkiDevCert2.cer";
//Setting a periodic certificate validity check task universally for all operators
SET CERTCHKTSK: ISENABLE=ENABLE, PERIOD=7, ALMRNG=30, UPDATEMETHOD=CMP;
//(Optional) Downloading the CRL file from the FTP server. If the FTP server is deployed on
the U2000, the IP address of the FTP server is the same as that of the U2000.
DLD
CERTFILE:IP="10.60.60.60",USR="admin",PWD="*****",SRCF="eNodeB.crl",DSTF="eNodeB.c
rl";
NOTE
If the base station is undergoing an IKE or SSL negotiation during the command execution, the
certificate update is performed after the negotiation.
Single configuration CME Management > CME Guidelines > Getting Started with
the CME > Introduction to Data Configuration Operations
Batch eGBTS CME Management > CME Guidelines > GSM Application
configuration Management > Base Station Related Operations > Importing
and Exporting eGBTS Data for Batch Reconfiguration
Batch NodeB CME Management > CME Guidelines > UMTS Application
configuration Management > NodeB Related Operations > Importing and
Exporting NodeB Data for Batch Configuration
Batch eNodeB CME Management > CME Guidelines > LTE Application
configuration Management > eNodeB Related Operations > Importing and
Exporting eNodeB Data for Batch Configuration
If multi-level CAs are deployed in an operator's PKI system, a complete certificate chain must be added.
If the certificates of different levels of CAs in the certificate chain are stored separately, run the ADD
TRUSTCERT command for each certificate you want to add.
Step 5 (Optional, applicable only to manual certificate application) Run the REQ DEVCERT
command to set the information required by the base station to apply for operators' device
certificates.
NOTE
The certificate application procedure is triggered when this configuration takes effect.
The obtained certificate will be automatically loaded to CERTMK and the CA Switch is set to on.
If automatic certificate loading fails, run the ADD CERTMK command to load the certificate.
Step 6 Run the MOD IKEPEER command. In this step, set Certificate Source and Certificate File
Name to bind certificates to each IKE channel.
NOTE
This step is performed based on the assumption that the base station has been configured with IKE peers
(IKEPEER). If IKEPEER is not configured, you need to enable the IPsec feature and the MML
command used in this step is changed to ADD IKEPEER. For details about how to enable the IPsec
feature, see IPsec Feature Parameter Description.
Step 7 Run the SET CERTCHKTSK command to set a periodic certificate validity check task.
----End
l Manual download
Step 1 Run the DLD CERTFILE command for each CRL file you want to download.
Step 2 Run the ADD CRL command for each CRL file you want to add.
Step 3 Run the SET CRLPOLICY command to configure the CRL policy.
----End
l Automatic download
Step 1 Run the ADD CRLTSK command for each periodic CRL download task you want to add.
Step 2 Run the SET CRLPOLICY command to configure the CRL policy.
----End
NOTE
The CA switch must be turned on for all certificates loaded to the base station except for the
preconfigured Huawei certificates.
//Setting CA information for operator B and use this information to customize a certificate
request template for the CA
If operator B' CA is accessible only through the external network, it is recommended that
interface IP addresses be used for certificate application and certificate update, and a
customized certificate request template be used. The following is an example:
ADD CA:CANAME="C = AU, S = Some-State, O = Internet Widgits Pty Ltd, CN =
eca2",URL="http://10.89.89.89:80/
pkix/",SIGNALG=SHA256,MODE=CFG_INIT_UPD_ADDR,UPDSIP="10.20.20.188",INITREQURL="10.
86.86.86:80/
pkix/",INITREQSIP="10.35.35.35",CERTREQSW=USERDEFINE,COMMNAME=ESN,USERADDINFO=".hu
awei.com",COUNTRY="cn",ORG="ITEF",ORGUNIT="hw",STATEPROVINCENAME="sc",LOCALITY="cd
",KEYUSAGE=DATA_ENCIPHERMENT-1&DIGITAL_SIGNATURE-1&KEY_AGREEMENT-1&KEY_ENCIPHERMEN
T-1,CERTREQSIGNALG=SHA256,KEYSIZE=KEYSIZE1024;
//(Manual triggering of CMPv2-based certificate application) Applying for operator B's root
certificate
REQ DEVCERT: CANAME="C=AU, S=Some-State, O=Internet Widgits Pty Ltd, CN=eca2",
APPCERT="OPKIDevCert2.cer";
A customized certificate added using the ADD CERTMK command is used for IKE
negotiation for operator B and the certificate name is OpkiDevCert2.cer.
MOD IKEPEER: PEERNAME="peer", PROPID=1, IKEVERSION=IKE_V2, IDTYPE=FQDN,
REMOTEIP="10.91.91.91",
DPD=PERIODIC,REDUNDANCYFLAG=NONE,CERTSOURCE=CERTMK,CERTNAME="OpkiDevCert2.cer";
//(Optional) Downloading the CRL file from the FTP server. If the FTP server is deployed on
the U2000, the IP address of the FTP server is the same as that of the U2000.
DLD
CERTFILE:IP="10.60.60.60",USR="admin",PWD="*****",SRCF="eNodeB.crl",DSTF="eNodeB.c
rl";
The values of Certificate File Name, Issuer, and Common Name are correct and the value
of Status is Normal. This indicates that the global device certificate has been loaded to the
base station.
Step 2 Run the DSP CERTMK command to query the binding relationships between a certificate
and the CA.
If the value of CA Switch in the returned result is ON, this feature has been enabled. You can
query the value of CA to check the CA server that issues the certificate.
Step 3 Run the DSP IKEPEER command to query the certificate used for IKE negotiation.
Check whether the certificate has taken effect by querying the values of Certificate Source
and Certificate File Name.
Step 4 Run the DSP TRUSTCERT command to query the status of the trust certificate.
If the value of Status is Normal in the query result, the trust certificate has been loaded to the
base station.
Step 5 (Optional) Run the DSP CRL command to query the status of the CRL file.
If the value of Status in the returned result is NORMAL, the CRL has been loaded to the
base station.
----End
The MO CERTMK is referenced by the MO IKEPEER. Before running the RMV CERTMK
command, remove the reference relationships between the two MOs.
Step 2 (Optional, applicable only to binding an operator-issued certificate) Run the MML command
MOD APPCERT to modify the application certificate to a preconfigured Huawei certificate.
Step 3 Run the MML command RMV CERTMK to remove configurations of the CERTMK MO
(except for the preconfigured Huawei certificates).
NOTE
The MO CERTMK is referenced by the MO IKEPEER. Before running the RMV CA command,
remove the reference relationships between the two MOs.
----End
l Removing the IPsec policy for operator B (Policy Group Name = B, IPSec Sequence No.
= 11)
RMV IPSECPOLICY:SPGN="A",SPSN=10;
//Restoring the application certificate to the preconfigured Huawei certificate (Skip this step if
no operator-issued certificate is bound.)
MOD APPCERT:APPTYPE=IKE,APPCERT="appcert.pem";
//Removing the periodic CRL acquisition task started for multiple operators
l Removing the periodic CRL acquisition task started for operator A (Task ID = 0)
RMV CRLTSK: TSKID=0;
l Removing the periodic CRL acquisition task started for operator B (Task ID = 1)
RMV CRLTSK: TSKID=1;
The MO CERTMK is referenced by the MO IKEPEER. Before running the RMV CERTMK
command, remove the reference relationships between the two MOs.
Step 3 Run the RMV CERTMK command to remove secondary operators' certificates loaded to the
base station.
NOTE
The MO CERTMK is referenced by the MO IKEPEER. Before running the RMV CA command,
remove the reference relationships between the two MOs.
Step 4 Run the RMV CA command to remove the PKI information configured for the secondary
operator.
Step 5 Run the MOD CERTMK command to change the value of CA Switch to OFF(Off) for all
operators.
Step 6 Run the MOD CA command to change the value of Certificate Request Switch for the
primary operator's CA to DEFAULT(DEFAULT).
Step 7 (Optional) Run the RMV CRLTSK command to remove the periodic CRL acquisition task
started for secondary operators.
----End
//Modify the binding relationships between operator B's IKE and the certificate (Certificate
Source = APPCERT, which means that operator B shares the certificate with operator A).
Assume that the IKE peer name of operator B is ike2.
MOD IKEPEER:PEERNAME="ike2",CERTSOURCE=APPCERT;
//Remove secondary operators' certificates loaded to the base station. Assume that the
certificate file name is eNodeBCert2.pem.
RMV CERTMK: APPCERT="eNodeBCert2.pem";
//Change the value of CA Switch to OFF for the primary operator's certificate that will be
used.
MOD CERTMK:APPCERT=" eNodeBCert1.pem",CASW=OFF;
//Remove the periodic CRL acquisition task started for secondary operators. Assume that the
task ID is 1.
RMV CRLTSK: TSKID=1;
6.3.10 Reconfiguration
In Certificate Authority Name, the S and ST fields are regarded as the same field. Services
can be properly provided if the S field is used at the local end but the ST field is used at the
peer end.
Step 2 Run the MOD CERTMK command to modify the device certificate.
----End
MML command examples are as follows:
ADD CA:CANAME="C = AU, ST = Some-State, O = Internet Widgits Pty Ltd, CN =
eca1",URL="http://10.89.89.89:80/
pkix/",SIGNALG=SHA256,MODE=CFG_INIT_UPD_ADDR,UPDSIP="10.20.20.188",INITREQURL="10.
86.86.86:80/
pkix/",INITREQSIP="10.35.35.35",CERTREQSW=USERDEFINE,COMMNAME=ESN,USERADDINFO=".hu
awei.com",COUNTRY="cn",ORG="ITEF",ORGUNIT="hw",STATEPROVINCENAME="sc",LOCALITY="cd
",KEYUSAGE=DATA_ENCIPHERMENT-1&DIGITAL_SIGNATURE-1&KEY_AGREEMENT-1&KEY_ENCIPHERMEN
T-1,CERTREQSIGNALG=SHA256,KEYSIZE=KEYSIZE1024;
RMV CA: CANAME=" C = AU, S = Some-State, O = Internet Widgits Pty Ltd, CN = eca1";
7 Parameters
ISENA BTS390 SET LBFD-0 Public Meaning: Indicates whether a task of certificate
BLE 0, CERTC 03010 / Key validity checking is started.
BTS390 HKTSK TDLBF Infrastru GUI Value Range: DISABLE(Disable),
0 LST D-00301 cture(P ENABLE(Enable)
WCDM CERTC 0/ KI)
A, MLBFD Unit: None
HKTSK
BTS390 -120003 Actual Value Range: DISABLE, ENABLE
0 LTE, 12 Default Value: ENABLE(Enable)
BTS590
0,
BTS590
0
WCDM
A,
BTS590
0 LTE
CERTR BTS390 ADD LBFD-0 Public Meaning: Indicates the switch of certificate request
EQSW 0, CA 03010 / Key configuration information. When this parameter is set
BTS390 MOD TDLBF Infrastru to DEFAULT, the CA uses the request information
0 CA D-00301 cture(P configured in the CERTREQ MO. When this
WCDM 0/ KI) parameter is set to USERDEFINE, the CA requires
A, LST CA MLBFD the customized certificate request information.
eNodeB
BTS390 -120003 Supporti GUI Value Range: DEFAULT(DEFAULT),
0 LTE, 12 ng USERDEFINE(USERDEFINE)
BTS590 LOFD-0 Multi-
0, Unit: None
81280 / operator
BTS590 TDLOF PKI Actual Value Range: DEFAULT, USERDEFINE
0 D-08120 Default Value: DEFAULT(DEFAULT)
WCDM 6/
A, MLOFD
BTS590 -081282
0 LTE
CASW BTS390 ADD LOFD-0 Public Meaning: Indicates whether a CA server is specified
0, CERTM 81280 / Key for a device certificate. When this parameter is set to
BTS390 K TDLOF Infrastru OFF, only one CA is configured or no CA is
0 MOD D-08121 cture(P configured (the device certificate can be configured
WCDM CERTM 0/ KI) only in the offline mode). When this parameter is set
A, K MLOFD to ON, a CA needs to be specified.
BTS390 -081282 GUI Value Range: OFF(Off), ON(On)
0 LTE, DSP
BTS590 CERTM Unit: None
0, K Actual Value Range: OFF, ON
BTS590 LST Default Value: OFF(Off)
0 CERTM
WCDM K
A,
BTS590
0 LTE
CERTS BTS390 ADD LOFD-0 Ipsec Meaning: Indicates the source of the certificate used
OURCE 0, IKEPEE 03009 / Multi- for IKE negotiation in the multi-PKI scenario. When
BTS390 R TDLOF mode this parameter is set to APPCERT, the certificate
0 MOD D-00300 BS configured by the APPCERT MO is used. When this
WCDM IKEPEE 9 Commo parameter is set to CERTMK, the certificate
A, R MRFD- n configured by the CERTMK MO is used.
BTS390 121136 IPSec(L GUI Value Range: APPCERT(Appcert),
0 LTE, DSP
IKEPEE MRFD- TE) CERTMK(Certmk)
BTS590
0, R 121146 Multi- Unit: None
BTS590 LST MRFD- mode Actual Value Range: APPCERT, CERTMK
0 IKEPEE 121156 BS
Commo Default Value: APPCERT(Appcert)
WCDM R
A, n
BTS590 IPSec(L
0 LTE TE
TDD)
Multi-
mode
BS
Commo
n
IPSec(N
B-IoT)
CERTN BTS390 ADD LOFD-0 Ipsec Meaning: Indicates the name of the certificate file
AME 0, IKEPEE 03009 / Multi- used in the IKE negotiation in the multi-PKI scenario.
BTS390 R TDLOF mode GUI Value Range: 1~64 characters
0 MOD D-00300 BS
WCDM 9 Unit: None
IKEPEE Commo
A, R MRFD- n Actual Value Range: 1~64 characters
BTS390 121136 IPSec(L Default Value: None
0 LTE, DSP
IKEPEE MRFD- TE)
BTS590
0, R 121146 Multi-
BTS590 LST MRFD- mode
0 IKEPEE 121156 BS
WCDM R Commo
A, n
BTS590 IPSec(L
0 LTE TE
TDD)
Multi-
mode
BS
Commo
n
IPSec(N
B-IoT)
COMM BTS390 ADD LBFD-0 Public Meaning: Indicates the common name of the
NAME 0, CA 03010 / Key certificate request file, which can be the electronic
BTS390 MOD TDLBF Infrastru serial number (ESN), media access control (MAC)
0 CA D-00301 cture(P address, or IP address of a board.
WCDM 0/ KI) GUI Value Range: ESN(ESN), MAC(MAC), IP(IP)
A, LST CA MLBFD eNodeB Unit: None
BTS390 -120003 Supporti
0 LTE, 12 ng Actual Value Range: ESN, MAC, IP
BTS590 LOFD-0 Multi- Default Value: ESN(ESN)
0, 81280 / operator
BTS590 TDLOF PKI
0 D-08120
WCDM 6/
A, MLOFD
BTS590 -081282
0 LTE
USERA BTS390 ADD None None Meaning: Indicates the additional information about a
DDINF 0, CA certificate common name. The information will be
O BTS390 MOD added behind the value of the COMMNAME
0 CA parameter to compose a complete common name for a
WCDM certificate request file. The default value
A, LST CA is .huawei.com. A space is not supported before the
BTS390 value of this parameter, that is, a space is not
0 LTE, supported before the character string. However, to
BTS590 meet requirements of consistency checks performed
0, by some CA servers to the certificate common name
BTS590 in a certificate request packet and that in a Huawei
0 device certificate, the certificate common name in a
WCDM certificate request packet is displayed as "Board
A, ESN"+space+"Common Name Additional Info" only
BTS590 when the certificate common name in a Huawei
0 LTE device certificate is "Board ESN"+space+"Common
Name Additional Info". For example, when the value
of this parameter is "eNodeB" and the certificate
common name in a Huawei device certificate is "ESN
eNodeB", a space is automatically added before
"eNodeB", that is, the certificate common name in a
certificate request packet is displayed as "ESN
eNodeB".
GUI Value Range: 0~32 characters
Unit: None
Actual Value Range: 0~32 characters
Default Value: .huawei.com
COUNT BTS390 ADD LBFD-0 Public Meaning: Indicates the country where a BS is located.
RY 0, CA 03010 / Key GUI Value Range: 0~0,2~2 characters
BTS390 MOD TDLBF Infrastru
0 D-00301 cture(P Unit: None
CA
WCDM 0/ KI) Actual Value Range: 0~0,2~2 characters
A, LST CA MLBFD eNodeB Default Value: NULL(empty string)
BTS390 -120003 Supporti
0 LTE, 12 ng
BTS590 LOFD-0 Multi-
0, 81280 / operator
BTS590 TDLOF PKI
0 D-08120
WCDM 6/
A, MLOFD
BTS590 -081282
0 LTE
ORG BTS390 ADD LBFD-0 Public Meaning: Indicates the organization that owns a BS.
0, CA 03010 / Key GUI Value Range: 0~64 characters
BTS390 MOD TDLBF Infrastru
0 D-00301 cture(P Unit: None
CA
WCDM 0/ KI) Actual Value Range: 0~64 characters
A, LST CA MLBFD eNodeB Default Value: NULL(empty string)
BTS390 -120003 Supporti
0 LTE, 12 ng
BTS590 LOFD-0 Multi-
0, 81280 / operator
BTS590 TDLOF PKI
0 D-08120
WCDM 6/
A, MLOFD
BTS590 -081282
0 LTE
ORGUN BTS390 ADD LBFD-0 Public Meaning: Indicates the organization unit that owns a
IT 0, CA 03010 / Key BS.
BTS390 MOD TDLBF Infrastru GUI Value Range: 0~64 characters
0 CA D-00301 cture(P
WCDM 0/ KI) Unit: None
A, LST CA MLBFD Actual Value Range: 0~64 characters
eNodeB
BTS390 -120003 Supporti Default Value: NULL(empty string)
0 LTE, 12 ng
BTS590 LOFD-0 Multi-
0, 81280 / operator
BTS590 TDLOF PKI
0 D-08120
WCDM 6/
A, MLOFD
BTS590 -081282
0 LTE
STATEP BTS390 ADD LBFD-0 Public Meaning: Indicates the state or province where a BS is
ROVIN 0, CA 03010 / Key located.
CENA BTS390 MOD TDLBF Infrastru GUI Value Range: 0~128 characters
ME 0 CA D-00301 cture(P
WCDM 0/ KI) Unit: None
A, LST CA MLBFD Actual Value Range: 0~128 characters
eNodeB
BTS390 -120003 Supporti Default Value: NULL(empty string)
0 LTE, 12 ng
BTS590 LOFD-0 Multi-
0, 81280 / operator
BTS590 TDLOF PKI
0 D-08120
WCDM 6/
A, MLOFD
BTS590 -081282
0 LTE
LOCAL BTS390 ADD LBFD-0 Public Meaning: Indicates the location of a BS.
ITY 0, CA 03010 / Key GUI Value Range: 0~128 characters
BTS390 MOD TDLBF Infrastru
0 D-00301 cture(P Unit: None
CA
WCDM 0/ KI) Actual Value Range: 0~128 characters
A, LST CA MLBFD eNodeB Default Value: NULL(empty string)
BTS390 -120003 Supporti
0 LTE, 12 ng
BTS590 LOFD-0 Multi-
0, 81280 / operator
BTS590 TDLOF PKI
0 D-08120
WCDM 6/
A, MLOFD
BTS590 -081282
0 LTE
KEYUS BTS390 ADD LBFD-0 Public Meaning: Indicates the usage for a key, including
AGE 0, CA 03010 / Key KEY_AGREEMENT (key negotiation),
BTS390 MOD TDLBF Infrastru DATA_ENCIPHERMENT (data encryption),
0 CA D-00301 cture(P KEY_ENCIPHERMENT (key encryption), and
WCDM 0/ KI) DIGITAL_SIGNATURE (digital signature). This
A, LST CA MLBFD parameter can be set to one or multiple values.
eNodeB
BTS390 -120003 Supporti GUI Value Range:
0 LTE, 12 ng DATA_ENCIPHERMENT(DATA_ENCIPHERMEN
BTS590 LOFD-0 Multi- T),
0, 81280 / operator DIGITAL_SIGNATURE(DIGITAL_SIGNATURE),
BTS590 TDLOF PKI KEY_AGREEMENT(KEY_AGREEMENT),
0 D-08120 KEY_ENCIPHERMENT(KEY_ENCIPHERMENT)
WCDM 6/
A, Unit: None
MLOFD
BTS590 -081282 Actual Value Range: DATA_ENCIPHERMENT,
0 LTE DIGITAL_SIGNATURE, KEY_AGREEMENT,
KEY_ENCIPHERMENT
Default Value: DATA_ENCIPHERMENT:ON,
DIGITAL_SIGNATURE:ON,
KEY_AGREEMENT:ON,
KEY_ENCIPHERMENT:ON
CERTR BTS390 ADD LBFD-0 Public Meaning: Indicates the signature algorithm for a
EQSIG 0, CA 03010 / Key certificate request file.
NALG BTS390 MOD TDLBF Infrastru GUI Value Range: SHA1(SHA1), MD5(MD5),
0 CA D-00301 cture(P SHA256(SHA256)
WCDM 0/ KI)
A, LST CA MLBFD Unit: None
eNodeB
BTS390 -120003 Supporti Actual Value Range: SHA1, MD5, SHA256
0 LTE, 12 ng Default Value: SHA256(SHA256)
BTS590 LOFD-0 Multi-
0, 81280 / operator
BTS590 TDLOF PKI
0 D-08120
WCDM 6/
A, MLOFD
BTS590 -081282
0 LTE
KEYSIZ BTS390 ADD LBFD-0 Public Meaning: Indicates the length of a key, which can be
E 0, CA 03010 / Key 1024 bits or 2048 bits.
BTS390 MOD TDLBF Infrastru GUI Value Range: KEYSIZE1024(KEYSIZE1024),
0 CA D-00301 cture(P KEYSIZE2048(KEYSIZE2048)
WCDM 0/ KI)
A, LST CA MLBFD Unit: None
eNodeB
BTS390 -120003 Supporti Actual Value Range: KEYSIZE1024, KEYSIZE2048
0 LTE, 12 ng Default Value: KEYSIZE2048(KEYSIZE2048)
BTS590 LOFD-0 Multi-
0, 81280 / operator
BTS590 TDLOF PKI
0 D-08120
WCDM 6/
A, MLOFD
BTS590 -081282
0 LTE
LOCAL BTS390 ADD LBFD-0 Public Meaning: Indicates the local name of a BS. This
NAME 0, CA 03010 / Key parameter is used to generate the DNS name of the
BTS390 MOD TDLBF Infrastru subject alternative name of a certificate, so as to verify
0 CA D-00301 cture(P the peer's identification in IKE negotiation. If this
WCDM 0/ KI) parameter is not configured, the BS automatically uses
A, LST CA MLBFD the common name and its additional information to
eNodeB
BTS390 -120003 Supporti generate the DNS name.
0 LTE, 12 ng GUI Value Range: 0~128 characters
BTS590 LOFD-0 Multi-
0, Unit: None
81280 / operator
BTS590 TDLOF PKI Actual Value Range: 0~128 characters
0 D-08120 Default Value: NULL(empty string)
WCDM 6/
A, MLOFD
BTS590 -081282
0 LTE
LOCAL BTS390 ADD LBFD-0 Public Meaning: Indicates the IP address of the subject
IP 0, CA 03010 / Key alternative name of a certificate.
BTS390 MOD TDLBF Infrastru GUI Value Range: Valid IP address
0 CA D-00301 cture(P
WCDM 0/ KI) Unit: None
A, LST CA MLBFD Actual Value Range: Valid IP address
eNodeB
BTS390 -120003 Supporti Default Value: 0.0.0.0
0 LTE, 12 ng
BTS590 LOFD-0 Multi-
0, 81280 / operator
BTS590 TDLOF PKI
0 D-08120
WCDM 6/
A, MLOFD
BTS590 -081282
0 LTE
CANA BTS390 ADD LOFD-0 Public Meaning: Indicates the name of the CA server
ME 0, CERTM 81280 / Key specified by the certificate.
BTS390 K TDLOF Infrastru GUI Value Range: 1~127 characters
0 MOD D-08121 cture(P
WCDM 0/ KI) Unit: None
CERTM
A, K MLOFD Actual Value Range: 1~127 characters
BTS390 -081282 Default Value: None
0 LTE, DSP
BTS590 CERTM
0, K
BTS590 LST
0 CERTM
WCDM K
A,
BTS590
0 LTE
8 Counters
9 Glossary
10 Reference Documents
1. IETF RFC 4210, "Internet X.509 Public Key Infrastructure Certificate Management
Protocol (CMP)"
2. IETF RFC 4211, "Internet X.509 Public Key Infrastructure Certificate Request Message
Format (CRMF)"
3. IETF RFC 5280, "Internet X.509 Public Key Infrastructure Certificate and CRL Profile"
4. IETF RFC 2585, "Internet X.509 Public Key Infrastructure Operational Protocols: FTP
and HTTP"
5. IPsec Feature Parameter Description for SingleRAN
6. PKI Feature Parameter Description for SingleRAN
7. 3900 & 5900 Series Base Station Alarm Reference