RevPA1ETC/YOF/JSLiangYongzhong2004-10-281联通GPRS核心网维护介绍RevPA1CBC/YOF/JSLiangYongzhong2019/9/172PresentationOutlineGPRS核心网络简介SGSN访问SGSN操作维护交换机操作维护路由器M7i操作维护GPRS部分问题处理RevPA1CBC/YOF/JSLiangYongzhong2019/9/173GPRS核心网络简介RevPA1CBC/YOF/JSLiangYongzhong2019/9/174SGSN访问RevPA1CBC/YOF/JSLiangYongzhong2019/9/175访问方式安全措施操作方式RevPA1CBC/YOF/JSLiangYongzhong2019/9/176访问方式通过控制台访问SGSN1)节点初始安装2)节点网络网络故障(O&M和内部IP网络)通过内部网络访问SGSN1)从GIS访问SGSN2)常用于O&M网络故障,内部网络正常从O&M网络访问SGSN1)O&M网络运行正常2)采用telnet,ssh,PXMRevPA1CBC/YOF/JSLiangYongzhong2019/9/177安全措施用户身份的鉴权每个用户有一个帐号,包括登陆名和口令用户操作的授权SGSN缺省有ReadOnlyRole和SysAdmRole两个角色,可以增加不同权限角色每个角色权限不一样,每个用户仅属于一个角色,不能同时属于多个角色对所有的操作请求提供日志记录SSH保护所有与命令相关的操作Gom网络与Gn网络的分离在Gom接口上使用IPSec加密PXM的操作在Gom接口上对数据包进行过滤RevPA1CBC/YOF/JSLiangYongzhong2019/9/178操作方式命令行方式1)操作人员接入爱立信的SGSN,实施操作维护之前,需要在节点中定义具有PXM功能的用户2)使用telnet或ssh登陆到SGSN,SGSN对该用户的用户名和口令检查成功后,用户才可以登录到系统并且使用CLI命令3)使用cli的3种运行模式之一对SGSN进行操作维护a)交互方式直接运行gsh,系统提示gsh后可输入操作管理命令b)单命令方式gsh操作管理命令c)批处理将单命令集中形成可执行脚本RevPA1CBC/YOF/JSLiangYongzhong2019/9/179PXM1)终端上安装浏览器软件netscape或IE2)终端上安装Javasoftware3)对Java进行配置编辑C:\ProgramFiles\JavaSoft\JRE\1.3.1\bin\security\java.policy在CodeBase的最后添加:8888/classes/-RevPA1CBC/YOF/JSLiangYongzhong2019/9/1710SGSN操作维护RevPA1CBC/YOF/JSLiangYongzhong2019/9/1711SGSN配置SGSN健康检查SGSN系统备份SGSN系统恢复RevPA1CBC/YOF/JSLiangYongzhong2019/9/1712Gb介绍Gb配置C7介绍C7配置Gn/Gom介绍Gn/Gom配置其它配置配置保存SGSN配置RevPA1CBC/YOF/JSLiangYongzhong2019/9/1713Gb介绍BSCNSEBSCNSESGSNGbBVCE1NSVCFrPVCRevPA1CBC/YOF/JSLiangYongzhong2019/9/1714创建Gb1)创建BSC名字gshcreate_bscBscName2)创建NSEgshcreate_nseNsei-bscBscName3)设置e1t1fracationgshset_e1t1_frac-eq{MagazineSlot11}-trunkE1T1Trunk-fracFraction-tsTimeslotID-crc0-flags14)连接帧中继fractiongshconnect_fr_frac-eq{MagazineSlot11}-trunkE1T1Trunk-fracFraction-dte2-mfs1600-lmiLMI5)设置帧中继PVCgshset_fr_pvc-eq{MagazineSlot11}-trunkE1T1Trunk-fracFraction-dlciDLCI-cirCIR-bcBC-be0mag,slot,1,1trunk,frac,dlci6)创建nsvcgshcreate_nsvcNsvci-nseNsei-eqEqId-pvcPvcIdGb数据制作RevPA1CBC/YOF/JSLiangYongzhong2019/9/1715拆除Gb1)拆除NSVCgshdelete_nsvcnsvci2)拆除帧中继PVCgshdelete_fr_pvc-eq{MagazineSlot11}-trunkE1T1Trunk-fracFraction-dlcidlci3)断开帧中继fractiongshdisconnect_fr_frac-eq{MagazineSlot11}-trunkE1T1Trunk-fracFraction4)拆除E1T1fractiongshdelete_e1t1_frac-eq{MagazineSlot11}-trunkE1T1Trunk-fracFraction5)拆除NSEgshdelete_nse-nseNsei6)拆除BSCgshdelete_bsc-bscBscNameRevPA1CBC/YOF/JSLiangYongzhong2019/9/1716创建NTBSC72Gb脚本(ntbsc72.add)#!/usr/bin/shNTBSC72,15,1501,2,3,6,1,1-8GSH=/usr/bin/gsh1502,2,6,3,1,1-8$GSHcreate_bscNTBSC72$GSHcreate_nse15-bscNTBSC72$GSHset_e1t1_frac-eq{2311}-trunk6-frac1-ts12345678-crc0-flags1sleep1$GSHconnect_fr_frac-eq{2311}-trunk6-frac1-dte2-mfs1600-lmi1sleep1$GSHset_fr_pvc-eq{2311}-trunk6-frac1-dlci175-cir512000-bc512000-be0sleep1$GSHcreate_nsvc1501-nse15-eq2,3,1,1-pvc6,1,175sleep1$GSHset_e1t1_frac-eq{2611}-trunk3-frac1-ts12345678-crc0-flags1sleep1$GSHconnect_fr_frac-eq{2611}-trunk3-frac1-dte2-mfs1600-lmi1sleep1$GSHset_fr_pvc-eq{2611}-trunk3-frac1-dlci176-cir512000-bc512000-be0sleep1$GSHcreate_nsvc1502-nse15-eq2,6,1,1-pvc3,1,176RevPA1CBC/YOF/JSLiangYongzhong2019/9/1717拆除NTBSC72Gb脚本(ntbsc72.del)#!/usr/bin/shGSH=/usr/bin/gsh$GSHblock_nsvc1501$GSHdelete_nsvc1501$GSHdelete_fr_pvc-eq{2311}-trunk6-frac1-dlci175sleep1$GSHdisconnect_fr_frac-eq{2311}-trunk6-frac1sleep1$GSHdelete_e1t1_frac-eq{2311}-trunk6-frac1sleep1$GSHblock_nsvc1502$GSHdelete_nsvc1502sleep1$GSHdelete_fr_pvc-eq{2611}-trunk3-frac1-dlci176sleep1$GSHdisconnect_fr_frac-eq{2611}-trunk3-frac1sleep1$GSHdelete_e1t1_frac-eq{2611}-trunk3-frac1$GSHdelete_nse15$GSHdelete_bscNTBSC72RevPA1CBC/YOF/JSLiangYongzhong2019/9/1718实际Gb建立和拆除1)将编辑好的脚本ntbsc72.add和ntbsc72.del通过ftp上传到SGSN2)注意用ascii码上传3)设ntbsc72.add和ntbsc72.del放在目录/Core/coreUser/cli下4)cd/Core/coreUser/cli5)chmod755ntbsc72.addntbsc72.del6)./ntbsc72.add即可创建ntbsc727)./ntbsc72.del即可拆除ntbsc728)检查nsvcgshget_nsvcnsvc9)检查bvcgshlist_bvcs–bvcNTBSC72RevPA1CBC/YOF/JSLiangYongzhong2019/9/1719C7介绍ProtocolstackMTPL-2SSCFFrontEndBackEndSSCOPCPCSSAALATMTCAPSCCPMTPL-3SS7BroadBandSS7NarrowBandRevPA1CBC/YOF/JSLiangYongzhong2019/9/1720SS7LinkNarrowband•Cardtype:IBS7•LinkId:EqpostrunkTimeslotBroadband(SS7overATM)•Cardtype:IBAX•LinkId:EqposVPIVCIATMATMPVCRevPA1CBC/YOF/JSLiangYongzhong2019/9/1721MTPL-3GSNNodeCNodeBNodeALink1Link2Link3Link4LinkSetTabelLinkSet1•Link1•Link2LinkSet2•Link3•Link4RoutSetTabelRoutSetC•AltRout1•AltRout2RoutSetD•AltRout3NodeDLinkSet1LinkSet2AltRout3AltRout2AltRout1RoutSetCRoutSetDRevPA1CBC/YOF/JSLiangYongzhong2019/9/1722•SAP(ServiceAccessPoint)“aSCCPmessagedestination”.RemoteorLocal•GT(Globaltitle)ex+861391•GTTTable(Globaltitletranslationtable)•GTTRuleex861391*usegotoresultHSTP1(Manyentrycanpointoutsameresult)•EntitySetpointsoutwhichSAPtosendthemessage.Ex)Name=HSTP1SAP={NodeC,SSN=6}GSNNodeCNodeBNodeANodeDLocalSAP•SSN=149LocalSAP•SSN=8RemoteSAP•SSN=6RemoteSAP•SSN=8RemoteSAP•SSN=6SCCPRevPA1CBC/YOF/JSLiangYongzhong2019/9/1723C7激活过程plannedSS7stackActiveABC////***SS7Config***////InstanceNAME=“ss7_saal_link”propertyNAME=“SAAL_id”Value