On October 23rd, 2014, we updated our
By continuing to use LinkedIn’s SlideShare service, you agree to the revised terms, so please take a few minutes to review them.
is configured according to the user guide of a corresponding equipment type. The following
configurations and operations are based on Huawei S6500 series Ethernet switches. If the
eNodeB performs IEEE 802.1X-based access control, operations on authentication devices are
based on Huawei Authentication, Authorization and Accounting (AAA) server.
l Quidway S6500 Series Ethernet Switches Operation Manual is available. You can obtain
the document from http://support.huawei.com.
l HUAWEI AAA Commissioning Guide is available. You can obtain the document from
l If IEEE 802.1X-based access control is adopted, the operator must use the authentication
access equipment that supports IEEE 802.1X-based access control authentication and the
corresponding AAA server that supports Extensible Authentication Protocol (EAP).
When the SeGW is deployed, you are required to configure data for the SeGW. When IEEE
802.1X-based access control authentication is adopted, you must configure the authentication
access equipment and authentication server. Generally, the authentication server refers to the
Table 4-43 describes the SeGW configuration.
Table 4-43 SeGW configuration
IP address Both the public SeGW and the serving SeGW should be configured with
the IP address of the interface for the untrusted area on the eNodeB side and
IP address of the interface for the trusted area on the evolved packet core
Route l Public SeGW: The routes to the M2000, eNodeB, and temporary
operation and maintenance (O&M) IP address must be configured.
l Serving SeGW: The routes to the M2000, S-GW, mobility management
entity (MME), eNodeB port IP address, S1 signaling and service IP
addresses, and O&M IP address must be configured.
The public SeGW and serving SeGW must be configured.
ike proposal l The authentication method parameter can be set to the