ZTE performs exploration, design and PoC verification together with Red Hat by combining ZTE's telecom experience with Red Hat's professional OpenStack knowledge. ZTE releases the ZTE RHOSP NFV solution based on Redhat OpenStack Platform.
Based on the Red Hat OSP cloud platform, the ZTE RHOSP NFV integration solution guarantees seamless interconnection between ZTE's service NEs (including vIMS, vEPC, VAS, SDM, and 5GC), CloudStudio (NFVO/VNFM) and CloudEMS products/ third-party hardware/APP and Red Hat OSP cloud platform according to actual scenarios of operators, the function/performance/reliability/stability can satisfy the commercialization requirements.
The ZTE RHOSP NFV solution is an open, standard solution based on an NFV reference architecture, ZTE iterates the solution continuously according to the progress of integration verification, and expands the ZTE RHOSP NFV solution support list.
Highlights of plan:
Provide the solution of the series of products of hardware, Red Hat OSP cloud platform, NFVO/VNFM and VNF.
Realize three-layer decoupling of hardware layer, Red Hat OSP cloud platform and VNF+NFVO/VNFM.
- Pre-integration verification
Perform pre-integration verification in Openlab, and output the commissioning guide, which can support fast deployment and launch online of service NEs in a commercial environment effectively.
Introduce third-party hardware or APPs based on the customer's actual requirements;
Perform iteration based on the solution to expand the supported device list.
- Enhanced Red Hat OSP resource monitoring function
Complete concentrative monitoring of physical & virtual resources with integration of CloudEMS, PIM components and Red Hat OSP for overcoming the shortage of Red Hat OSP.
- Multi-protection mechanism for network security.
Perform security reinforcement of OS to enhance the security of the OS;
Perform security reinforcement of RHOSP components, such as enabling TLS and Barbican, to enhance the security of the OSP cloud platform;
Track the security hole patches and bugs released by Red Hat OSP officially and regularly, and fix the high threatening holes in time;
Divide the security domain on demand to realize isolation between service domains.
Multiple permissions restrict user access to privacy.