For feedback, use the following: |
ipd_online_feedback@alcatel-lucent.com |
Figure 3: AA Deployment Topologies
Table 3: Traffic Diversion to the ISA Figure 4: DS-Lite DeploymentFigure 5: 6to4 in Access Network DeploymentAA-ISA detects, classifies, reports, and applies polices to 6rd/6to4 packet for the following ESM, SAP, spoke-SDP, and transit-IP (ip-policy) AA subscriber types. See Table 4 for further details:
Table 4: Polices to 6rd/6to4 Packet Figure 7 depicts an example of application mirroring to a specialized offline appliance for further processing.
3. The system supports N+1 AA ISA equipment warm redundancy (N primary and 1 backup). If a backup is configured and there is no ISA available (a primary and backup failed), there will be a “no aa-isa” fault. The backup AA ISA is pre-configured with isa-aa.tim and the group policies. Datapath traffic is only sent to active AA ISAs, so the backup has no flow state. If a backup ISA is unavailable, there will be a “backup missing” fault.Upon failure of a primary AA ISA, all of its AA subscribers and their traffic are operationally moved to the newly active backup AA ISA but the current flow states are lost (warm redundancy). The new AA ISA will identify any session-based active flows at a time of switchover as an existing protocol, while the other flows will be re-identified. The existing protocol-based application filters can be defined to ensure service hot redundancy for a subset of applications. Once the backup AA ISA has taken control, it will wait for operator control to revert activity to the failed primary AA ISA module.Asymmetry removal allows support for the SAP or spoke SDPs to the downstream element to be multi-homed on active links to redundant PE AA nodes as shown in Figure 8:Asymmetry removal also allows a VPN site (Figure 9) to be connected with multi-homed, dual-active links while offering AAN services with the ISA:Figure 9: VPN Site Multi-Homing with Asymmetry
• shunt-sdp sdp-id:vc-id — Node specific but must properly cross-connect the local AA-sub service with the peer Ipipe/service shunt interface in order to operate properly for asymmetry removal for remote divert traffic. Peer AARPs will stay in standalone mode until cross-connect is configured properly.When traffic needs to be remotely diverted it flows over shunts that are provisioned as sdp-id:vc-id between the dual-homed aa-sub local service an a remote vc-switching Ipipe.If it is desired to rebalance the ISA load between the peer nodes, there is a tools perform application-assurance aarp aarp-id force-evaluate command will re-run AARP activity evaluation on a per-ISA basis to determine Master/Backup AARP based on configured priority.Table 5 shows the interaction and dependencies between AARP states between a local node and its peer:
If the re-balancing of AA subscribers is required (for instance after the addition of new ISAs), there is a tools command to rebalance AA subscribers between ISAs within a group. Rebalance affects which AA subs divert to which ISAs based on capacity cost. Transit subs cannot be rebalanced independent of the parent (they move with the parent divert). The system attempts to move aa-subs from the most full ISA to the least full ISA based on the load balancing mode. If the load becomes balanced or an aa-sub move fails due to ISA resources or divert IOM service queuing resources, the load balancing terminates.Figure 11: Application Assurance Functional ComponentsFigure 12 shows the general mechanism for filtering traffic of interest and diverting this traffic to the appropriate AA ISA module residing on an IOM (referred as the host IOM). This traffic management divert method applies to both bridged and routed configurations.Figure 12: Application Assurance Ingress Datapath
•
•
• AA on spoke SDP services allows AA divert of the spoke SDP, logically representing a remote service point, typically used where the remote node does not support AA. A given SAP/spoke can be assigned and app-profile, and when this app-profile is enabled for divert all packets to and from that SAP/spoke will be diverted to an AA ISA (for forwarding classes that are configured as divert eligible).Table 6 shows spoke SDP divert capabilities.
Table 6: Spoke SDP Divert
•
Table 7: Transit AA Subs Support The transit AA-subs within a given parent AA sub can be displayed using the show aa group transit policy or transit-prefix policy command.Figure 13: static-remote-aa-sub Usage Topology
• Allows natural direction of the packet for both the parent aa-sub and the transit-aa-sub, as shown in Figure 13, where a packet from a remote client to a local server will be seen as to-sub for the parent, and from-sub for the transit sub that is logically at the far end site.Figure 14: RADIUS COA Example
•
•
• Inherited by defaults in the sap>sub-sla-mgmt context, to allow default application profile assignment if no application profile was provided.Application Assurance adds new map (app-profile-map) application profile command to associate an app-profile-string from dynamic subscriber management to a specific application profile using its app-profile-name that has been pre-provisioned. The application profile map is configured in the config>subscr-mgmt>sub-ident-pol context.As an example, an operator can define an ASO called ServiceTier to define various HSI services (Super, Lite, etc.) (Figure 16-A). The operator can then reference these defined ASOs when creating the App Profiles that are assigned to AA-subscribers (Figure 16-B).Figure 16: Configuration ExampleThen, the defined ASOs are used in the AQP definition to determine the desired treatment / policy (Figure 17).Figure 17: AQP Definition ExampleAlternatively, if ASOs were not used in the previous example, then the operator would have to define a unique AQP entry for every subscriber. Each of these AQPs will have its “match” criteria setup to point to the subscriber ID, while the action for all of these unique AQPs will be the same for the same service (for Tier 1 service, the policer bandwidth will be the same for all Tier 1 AA subscribers) (Figure 18).Figure 18: Single ASO ExampleThe example in Figure 18, shows how the use of just a single ASO can save the user from having to provision an AQP entry every time a subscriber is created.The override commands can only be used if there is already an app-profile assigned to the aa-sub, otherwise, the overrides are rejected.config>aa>aa-group>aa-sub-scale {residential|vpn} (residential is default)
• Figure 19 shows the relationship between the Application Assurance system components used to identify applications and configure Application Assurance related capabilities. Each ID-related component is defined as follows:Figure 19: Policy StructureTable 8 provides an overview of how those various components used in Application Assurance to recognize types of flows/sessions.
Table 8: AA Flows and Sessions Note: Alcatel-Lucent’s protocol signatures do not rely on IP port numbers to identify a TCP/UDP port based protocols / applications in order to avoid eliminate false-positives but allow operators to define application filters if a port-based identification is deemed adequate (see an example below). Dynamic upgrades of the signatures in the system are implemented by invoking an admin application-assurance upgrade command and then performing AA ISA activity switches.The protocol shutdown feature provides the ability for signature upgrades without automatically affecting policy behavior, especially if some or even all new signatures are not required for a service. All new signatures are disabled on upgrade by default to ensure no policy/service impact because of the signature update.Within a major release, all protocols introduced post-R1 of a major release as part of any isa-aa.tim ISSU upgrade are by default shutdown. They must be enabled on a per-protocol basis (system-wide) to take effect.Application groups are defined as a container for multiple applications. The only application group created by default is Unknown. Any applications not assigned to a group are automatically assigned to the default Unknown group. Application groups are expected to be defined when a common policy on a set of applications is expected, yet per each application visibility in accounting is required. The application group name is a key match criteria within application QoS policy rules.The Application Assurance system provides no pre-defined applications other than Unknown. Applications must be explicitly configured. Any protocols not assigned to an application are automatically assigned to the default Unknown application. Alcatel-Lucent provides sets of known-good application/app-group configurations upon request. Contact the technical support staff for further information.
• HTTP flows are classified in a particular application using the first HTTP request of the flow only by default. Optionally, the MS-ISA offers the flexibility to classify each HTTP request within the same flow independently using http-match-all-request feature.Each record generated contains the record fields as described in Table 9. The header row represents the record type.
Table 10: AA Performance Planning Record Fields
• Reporting of RTCP XR (RFC 3611, RTP Control Protocol Extended Reports (RTCP XR)) VoIP metrics payloads.Table 11 illustrates a policer's hardware rate steps for AA ISA:
Table 11: Policer's Hardware Rate Steps for AA ISA In Figure 20, Application Assurance policers are applied after ingress SAP policers. Configuration of the SAP ingress policers can be set to disable ingress policing or to set PIR/CIR values such that AA ISA ingress PIR/CIR will be invoked first. This enables application aware discard decisions, ingress policing at SAP ingress is application blind. However, this is a design / implementation guideline that is not enforced by the node.In the to-aa-sub direction (Figure 21), traffic hits the AA ISA policers before the SAP egress queuing and scheduling. This allows application aware flow, AA subscriber and node traffic policies to be implemented before the internet traffic is mixed with the other services at node egress. Note that AA ISA policers may remark out-of-profile traffic which allows preferential discard at an IOM egress congestion point only upon congestion.Redirect landing page explains to the user why the page at www.poker.com is not accessible. See Figure 22.Figure 22: HTTP Redirect Due To URL Block
• A high level packet flow diagram of the solution is shown in Figure 23. The AA ISA is the ICAP client and performs inline L7 packet processing functions while the ICAP application server is used for URL filtering offline, thus the application server does not need to be inserted in the data flow:Figure 23: ICAP High Level Flow DiagramAA-ISA provides full customer control to configure an AQP action that redirects traffic that matches the AQP match criteria (Figure 24). Hence, the HTTP redirect service can applied at any level (application, application group, specific subscribers, specific source IP addresses) or any other AQP match criteria.Figure 24: AQP ActionsA high level view of the typical network elements involved in HTTP in browser notifications are describe in Figure 25:Figure 25: HTTP in Browser Notification - High Level
•
→
→ To enter the mode to create or edit policies, the begin keyword must be entered at the prompt. Other editing commands include:
• The commit command saves changes made to policies during a session. The newly committed policy takes affect immediately for all new flows. Existing flows will transition onto the new policy shortly after the commit.
• The abort command discards changes that have been made to policies during a session.To allow flexible order for policy editing, the policy>commit function cross references policy components to verify, among others: