The IP Autoconfiguration services such as DHCP servers and Router Advertisements are used primarily to provide the NE with basic IP configuration information (e.g. IP address, netmask, default gateway, domain name, IP address(es) of DNS servers, time servers). IP Autoconfiguration services may recognize the NE as a client (using, for example, the vendor class identifier DHCP option) and provide with information such as IP address or FQDN of CA/RA server, IP address or FQDN of SeGW, IP address or FQDN of SCS, etc.
The specific data formats used by IP Autoconfiguration services for plug-and-connect procedures are described in
TS 28.316.
From the plug-and-connect feature perspective, the IP Autoconfiguration services may be categorized into secure (those located within a Secure Operator Network) and public (those located either within a Non-Secure Operator Network or within an External Network).
DNS servers are used to resolve FQDNs into IP addresses. The FQDNs used for plug-and-connect may be factory programmed, provided by IP Autoconfiguration services, configured by SCS, or derived/generated within the NE using the vendor information, operator network domain name and name of the functional element.
The specific FQDN formats used in plug-and-connect procedures are described in
TS 28.316.
From the plug-and-connect feature perspective, the DNS servers may be categorized into secure (those located within a Secure Operator Network) and public (those located either within a
Non-Secure Operator Network or within an External Network).
The DNS server is an optional functional element and is only required if particular Operator deployment scenario relies on resolution of FQDNs (e.g. FQDNs are configured at the IP Autoconfiguration services, NE and/or SCS, while IP addresses are configured at DNS servers).
The Certification Authority server (CA/RA) is used in the in the plug-and-connect procedures for security certificate enrolment (e.g. to provision operator certificates at the NE using the factory-installed vendor certificates).
There could be one or more CA/RA depending on a particular operator deployment scenario (e.g. one CA/RA per vendor).
The SCS is a vendor-specific functional element that is used in plug-and-connect procedures to provide the NE with correct software and configuration information.
There could be one or more SCS depending on a particular Operator deployment scenario (e.g. initial SCS, serving SCS).
The configuration may contain an IP address or FQDN of (another) SCS that this specific NE shall use as SCS.
The configuration may contain an IP address or FQDN of (another) SeGW that should be used before connecting to the SCS.
SCS can be implemented in EM in IRP based architecture or MnF in SBMA.
The SeGW is used to establish a secure connection between the NE and the Secure Operator Network.
Depending on a particular operator deployment scenario, there could be separate SeGW for connection to the OAM network and to the CN. The OAM SeGW and CN SeGW may or may not be in practice separate physical entities.
Depending on a particular operator deployment scenario, there could be more than one OAM SeGW (e.g. one per vendor).