Cloud & Network Synergy

Accelerating ICT transformation and service innovation

Red Hat OSP Integration Solution Introduction

ZTE performs exploration, design and PoC verification together with Red Hat by combining ZTE's telecom experience with Red Hat's professional OpenStack knowledge. ZTE releases the ZTE Red Hat OSP NFV solution based on Red Hat OpenStack Platform.

Based on the Red Hat OpenStack cloud platform, the ZTE RHOSP NFV integration solution guarantees seamless interconnection between ZTE's service NEs (including 5GC, EPC, IMS, SDM and VAS), CloudStudio (NFVO/VNFM) and CloudEMS products/ third-party hardware/APP and RHOSP according to actual scenarios of operators, the function/performance/reliability/stability can satisfy the commercialization requirements.

The ZTE RHOSP NFV solution is an open, standard solution based on an NFV reference architecture, ZTE iterates the solution continuously according to the progress of integration verification, and expands the ZTE RHOSP NFV solution support list.

Highlights of plan:

  • E2E solution

Provide the solution of the series of products of hardware, Red Hat OpenStack Platform, NFVO/VNFM and VNF.

  • Three-layer decoupling

Realize three-layer decoupling of hardware layer, Red Hat OpenStack platform and VNF+NFVO/VNFM.

  • Pre-integration verification

Perform pre-integration verification in Openlab, and output the commissioning guide, which can support fast deployment and launch online of service NEs in a commercial environment effectively.

  • Open solution

Introduce third-party hardware or APPs based on the customer's actual requirements;

Perform iteration based on the solution to expand the supported device list.

  • Enhanced Red Hat OSP resource monitoring function

Complete concentrative monitoring of physical & virtual resources with integration of CloudEMS, PIM components and Red Hat OSP for overcoming the shortage of Red Hat OSP.

  • Multi-protection mechanism for network security.

Perform security reinforcement of OS to enhance the security of the OS;

Perform security reinforcement of RHOSP components, such as enabling TLS and Barbican, to enhance the security of the OSP cloud platform;

Track the security hole patches and bugs released by Red Hat OSP officially and regularly, and fix the high threatening holes in time;

Divide the security domain on demand to realize isolation between service domains.

Multiple permissions restrict user access to privacy.

Customer Value