Table of Contents |
---|
Remote Netconf Device
- IPV4 or IPV6
- Point-to-point connection to "tunnel client"
- "tunnel client" IP is used as termination IP for VES Message
SSH tunnel Client
- Linux machine (e.g. Raspberry Pi 3B with 1 gig ram)
- Configuration with IPV6 and IPV4 DHCP
- SSH Client, with setup to connect to "SSH tunnel server" via "OWL SSH" Gateway
Installation Guide using the existing configuration of PI
- Connect Laptop directly to Raspberry PI for configuration of the PI.
- ssh pi@raspberrypi.local (user: pi pw: raspberry)
- sudo nano /etc/wpa_supplicant/wpa_supplicant.conf
- Please update the parameters accordently
Code Block network={ ssid="JoyToTheWorld" psk="temp_password" }
sudo service radvd stop
sudo systemctl disable radvd.service // to deactivate DHCPv6
sudo nano /etc/dhcpcd.conf
comment the following line
Code Block # static ip6_address=2001:db8::1/64
- save and close (ctrl-o, ctrl-x)
- Restart the Pi with sudo reboot
- wait 60s
- Discconect cable from Labtop, connect cable end to O-RAN device network
- Connect Labtop to WIFI of the SSID as configured above.
- ssh pi@raspberrypi.local (user: pi pw: raspberry)
- ifconfig
- remember the IPv6 of eth0 which is close to the IpV6 of the O-RAN device (should be different to fe80:...)
Edit tunnel.sh for NCPORT and REMOTEIP with O-RAN device parameters (remote from PI point of view)
Code Block #variables: here you can change # netconf port of the device NCPORT=830 # user for winlab access WINLAB_USER="micha" # ip of the remote RAN device REMOTEIP="[2001:db8::4e50:afd7:a5c6:3d88]"
- start tmux
- start tunnel.sh (./tunnel.sh)
- Configure VES EndPoint in O-RAN device
- use for IP the one from step 15a
- VES port is 30235
- url: http://<ip-from-15a>:30235
- no_auth
- Configure in OWL ONAP SDN-R the mount point with the 10.31.3.71:<NCPORT> of step 16.
Installation Guide from scratch
- Download raspbian-lite image (https://www.raspberrypi.org/downloads/raspbian/)
- extract zip file
- flash img file to microsd card
- linux: dd bs=1M if=file/to/flash.img of=/dev/devicetoflash
- windows: use win32diskimager
- after finished flashing, remount microsd on your computer to add some files
- create an empty file on boot partition named "ssh"
- create a file on boot partition named "wpa_supplicant" with the following content
Code Block |
---|
country=US ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=netdev update_config=1 network={ ssid="NETWORK-NAME" psk="NETWORK-PASSWORD" } |
- unmount microsd card and put it into raspberry pi and start
- now you have to find out the ip address the pi gets in your wifi
- for me with nmap -sn 192.168.202.0/24
- then you can login with ssh pi@ip-address
- if you do not have a local dns in your network you can also try ssh pi@raspberrypi.local
Code Block |
---|
$ sudo apt-get update $ sudo apt-get upgrade $ sudo apt-get install radvd $ ssh-keygen $ sudo nano /etc/sysctl.conf net.ipv6.conf.all.forwarding=1 $ sudo reboot $ sudo nano /etc/dhcpcd.conf static ip6_address=2001:db8::1/64 $ sudo nano /etc/radvd.conf interface eth0 { AdvSendAdvert on; AdvLinkMTU 1280; MaxRtrAdvInterval 120; prefix 2001:db8::/64 { }; AdvSourceLLAddress on; }; $ sudo systemctl enable radvd.service $ sudo reboot |
- now we create a script called tunnel.sh
Code Block |
---|
#!/bin/bash #please do not change VESPORT=30235 WINLAB_GATEWAY_IP="10.31.3.71" VES_COLLECTOR_IP="10.31.3.20" #variables: here you can change # netconf port NCPORT=2230 # user for winlab access WINLAB_USER="micha" # ip of the remote RAN device REMOTEIP="[2001:db8::4e50:afd7:a5c6:3d88]" ssh -L$VESPORT:localhost:$VESPORT -R$NCPORT:$REMOTEIP:$NCPORT $WINLAB_USER@console.sb10.orbit-lab.org -t \ ssh -L$VESPORT:localhost:$VESPORT -R$NCPORT:localhost:$NCPORT -X native@10.30.1.1 -t \ ssh -L$VESPORT:$VES_COLLECTOR_IP:$VESPORT -R$NCPORT:localhost:$NCPORT -X ubuntu@$WINLAB_GATEWAY_IP |
- and make it afterwards executable with "chmod +x tunnel.sh"
- provide the generated ssh public key to a valid winlab user
Code Block |
---|
cat .ssh/id_rsa.pub |
Example of using the PI to connect any device to OWL
The PI has the SSH tunnel pre-configured. However, the SSID and its password need to be configured.
```
```
Cabling
Just power cables and Ethernet between the Device and the PI.