Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Fixed Wireless Access Solution with Dynamic Soft-GRE Tunnels

Read this topic to understand how service providers can offer fixed wireless access (FWA) services for Multi-Dwelling Units (MDUs) by leveraging their existing the Juniper MX Series broadband network gateway (BNG) and 4G/5G packet core.

Fixed Wireless Access for MDUs

Fixed wireless access (FWA) uses wireless technology, typically 4G or 5G, instead of fiber or cables to provide last mile connectivity to Broad Band Edge (BBE) subscribers serving both business and residential consumers. FWA enables rapid and cost-effective deployment, especially in prohibitive or low-density subscriber areas. The advent of 5G has significantly improved the performance of FWA, making it a competitive alternative to wired broadband.

Service Providers are increasingly looking into Fixed Wireless for home users to take advantage of the 4G and 5G proliferation. While the local loop is wireless, these fixed wireless subscribers are managed by the wireline Broadband Network Gateway (BNG), thereby reducing the backend subscriber management requirements such as provisioning, billing, and more. Broadband edge subscriber services over soft-GRE tunnel are developed to support such Wifi Offload Gateway deployments, allowing L2 traffic between the customer premises equipment (CPE) and the BNG.

Service providers can offer FWA services for Multi-Dwelling Units (MDUs) by leveraging their existing the Juniper MX Series broadband network gateway (BNG) and 4G/5G packet core. Consider the topology provided in Figure 1.

Figure 1: Fixed Wireless Access Solution for MDUs Fixed Wireless Access Solution for MDUs

The customer premises equipment (CPE) access to internet is over a 4G or 5G wireless connection that connects the MDU's outdoor CPE (ODCPE) device to the radio tower (eNB/gNB), replacing the wireline local loop. The ODCPE creates a soft-GRE tunnel with the BNG device to enable encapsulated traffic between the CPE and BNG over the 5G core network. Soft-GRE does not require signaling to establish the GRE tunnel. The CPE can either be a DHCP or PPPoE client. The BNG provides IP address to the CPE along with subscriber services, including Authentication, Authorization and Accounting (AAA) and Quality of Service (QoS). One of the benefits of this approach is the ability to have multiple subscriber sessions on a single wireless connection.

Soft-GRE is a stateless GRE tunneling, whereby the BNG initiates tunnel creation while processing incoming GRE packets. The tunnel contexts are created upon receiving PPPoE or DHCP control messages, such as PADI or DISCOVER and the BNG subscriber sessions are created on top of the GRE tunnel. The BNG does not maintain states for unused tunnels, and deletes the GRE tunnels when the subscriber session logs out, improving the solution's scalability. The set services soft-gre gre-group CLI hierarchy must be defined to enable dynamic GRE service. You must define the parameters described in the Table 1 table:

Table 1: Soft-GRE Service Configuration
Parameter Description
source-address IP address on which incoming GRE traffic must be received by the BNG.
destination-networks Specified IP subnets from which the soft-GRE connect requests from the customer will be processed. Soft-GRE sessions from the access networks are accepted only if the prefixes are within the subnet range defined under destination-networks.
service-interface Specified pseudowire subscriber interface device (IFD) on which the tunnels are built.
dynamic-profile Name of the dynamic profile that creates the tunnel.

An example configuration snippet is provided below:

The following key features are supported:

  • Dynamic creation and deletion of GRE tunnels
  • GRE tunnels on VLAN tagged and untagged interfaces

  • IPv4 and IPv6 GRE tunnels

  • VLAN tagged and untagged GRE playloads

  • IPv4 and IPv6 DHCP or PPPoE subscriber termination over GRE

Configuring Dynamic Soft-GRE Tunnels

In this example we will configure dynamic soft-GRE tunnels between the MDU and BNG devices. Please take note of the following IP addresses:
  • BNG Gateway IP: 172.16.0.1

  • Destination Networks: 10.30.0.0/16, 10.40.0.0/16
  • Subscriber IP addresses: 172.31.0.11 through 172.31.0.15

  1. Ensure the loopback address is configured. The local endpoint of the GRE tunnel is anchored to it.
  2. Soft-GRE implementation uses the pseudowire infrastructure for GRE encapsulation and decapsulation. It requires the operator to configure Pseudowire Subscriber (PS) and logical tunnel (LT) or redundant logical tunnel (RLT) interfaces. Configure pseudowire subscriber interfaces on which the soft-GRE tunnels will be built. The service interface is anchored to LT interface for forwarding plane processing. To provide redundancy for the underlying forwarding path, you can also anchor the PS interface to an RLT interface by grouping multiple LT interfaces. PS over RLT supports both active-active and active-backup modes.
  3. Create a dynamic profile for the PPPoE subscribers.
  4. Create a dynamic profile to bring up the soft-GRE tunnel.
  5. You can also configure a dynamic profile to bring up dynamic VLAN interfaces for each VLAN tag in the GRE payload using the auto-sensed VLAN configuration feature.
    1. Configure a dynamic profile to create dynamic VLAN interfaces.
    2. Configure a dynamic profile to bring up the soft-GRE tunnel with dynamic auto-sensed VLANs.
  6. Configure the soft-GRE service. Create separate GRE group for creating soft-GRE tunnels with dynamic auto-sensed VLANs.
  7. Configure DHCP and RADIUS settings, along with additional interface and protocol settings as per your topology.

Verifying Dynamic Soft-GRE Tunnels

Purpose

Verify the subscriber provisioning over dynamic soft-GRE tunnels.

Action

  1. Verify the device configuration.
    1. Loopback and pseudowire interface configuration.

    2. Dynamic profiles configuration.

    3. Soft-GRE services configuration.

  2. Verify the subscriber summary using the show subscriber summary command.

  3. Verify the subscribers using the show subscribers command.

  4. Verify the tunnel summary using the show services soft-gre tunnel summary command.

  5. Verify tunnel details.

  6. Verify tunnel statistics.