Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
V100R019C02
01
Date
2011-07-30
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Website:
http://www.huawei.com
Email:
support@huawei.com
Issue 01 (2011-07-30)
Purpose
Networking
Data plan
Prerequisite(s)
Note
Configuration flowchart
Configuration procedure
Result
This document helps users to know the configuration of various services on the UA5000.
NOTE
The UA5000 supports IPMB and IPMD control boards. The control board mentioned in this document refers
to the IPMB board unless otherwise stated.
By default, the IPMB control board provides upstream transmission of the upstream port.
The difference between the IPMD board and the IPMB board is the upstream port.
l
The IPMB board provides four FE electrical interfaces and two 2 GE/FE optical interfaces.
The IPMD board provides four GE optical interfaces and two GE electrical interfaces.
Intended Audience
The intended audience of this document are:
l
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Issue 01 (2011-07-30)
ii
Symbol
Description
Indicates a hazard with a high level of risk which, if not
avoided, will result in death or serious injury.
Indicates a hazard with a medium or low level of risk which,
if not avoided, could result in minor or moderate injury.
Indicates a potentially hazardous situation that, if not avoided,
could cause equipment damage, data loss, and performance
degradation, or unexpected results.
Indicates a tip that may help you solve a problem or save time.
Provides additional information to emphasize or supplement
important points of the main text.
Command Conventions
Convention
Description
Boldface
Italic
[]
{ x | y | ... }
[ x | y | ... ]
{ x | y | ... } *
GUI Conventions
Issue 01 (2011-07-30)
Convention
Description
Boldface
>
iii
Update History
Updates between document issues are cumulative. Therefore, the latest document issue contains
all updates made in previous issues.
Issue 01 (2011-07-30)
Compared with Issue 02 (2011-03-25) of V100R019C01, Issue 01 has no change.
Issue 01 (2011-07-30)
iv
Contents
Contents
About This Document.....................................................................................................................ii
1 Managing the License...................................................................................................................1
1.1 Introduction to the License ................................................................................................................................2
1.2 License Principles...............................................................................................................................................2
1.3 Configuration Example of the License Application...........................................................................................3
1.4 Configuring the ESN of the Device....................................................................................................................6
1.5 Configuring the License Server..........................................................................................................................7
Contents
5 Configuring a VLAN..................................................................................................................50
5.1 Introduction to the VLAN................................................................................................................................52
5.2 Configuration Example of a Standard VLAN..................................................................................................53
5.3 Configuration Example of a Smart VLAN.......................................................................................................53
5.4 Configuration Example of a MUX VLAN.......................................................................................................55
5.5 Configuration Example of a Super VLAN.......................................................................................................58
5.6 Adding a VLAN...............................................................................................................................................61
5.7 Configuring the VLAN Attribute.....................................................................................................................62
5.8 Adding an Uplink Port to a VLAN...................................................................................................................63
5.9 Configuring the Upstream CAR for a VLAN..................................................................................................64
5.10 Adding a Service Port to a VLAN..................................................................................................................65
5.11 Configuring the Description Information About a Service Port.....................................................................67
5.12 Activating a Service Port................................................................................................................................68
vi
Contents
vii
Contents
9 Configuring RSTP.....................................................................................................................163
9.1 Introduction to the RSTP Protocol.................................................................................................................164
9.2 Enabling the RSTP Function..........................................................................................................................164
9.3 Setting the RSTP Working Mode...................................................................................................................165
9.4 Setting the Bridge Diameter...........................................................................................................................167
9.5 Configuring the Parameters of a Specified Bridge.........................................................................................168
9.5.1 Setting the Priority of the Specified Bridge...........................................................................................168
9.5.2 Configure the Forward Delay of the Specified Bridge..........................................................................169
9.5.3 Setting the Hello Time of a Specified Bridge........................................................................................170
Issue 01 (2011-07-30)
viii
Contents
10 Configuring RRPP...................................................................................................................179
10.1 Introduction to RRPP....................................................................................................................................180
10.2 Configuration Example of the Single RRPP Ring Networking...................................................................180
10.3 Enabling RRPP.............................................................................................................................................187
10.4 Configuring RRPP Domain Parameters.......................................................................................................188
10.4.1 Configuring an RRPP Domain............................................................................................................188
10.4.2 Configuring the Control VLAN of an RRPP Domain.........................................................................189
10.4.3 Configuring the Interval of the Hello Timer of an RRPP Domain......................................................190
10.4.4 Configuring the Interval of the Fail Timer of an RRPP Domain........................................................191
10.5 Configuring the Running Mode of RRPP.....................................................................................................192
10.6 Configuring an RRPP Ring..........................................................................................................................193
10.7 Configuring the Working Mode of an RRPP Port........................................................................................194
10.8 Configuring the Working Mode of an RRPP Node......................................................................................195
11 Configuring NTP.....................................................................................................................197
11.1 Introduction to NTP......................................................................................................................................199
11.2 Configuration Example of the NTP Broadcast Mode..................................................................................199
11.3 Configuration Example of the NTP Multicast Mode...................................................................................204
11.4 Configuration Example of the NTP Unicast Server Mode...........................................................................209
11.5 Configuration Example of the NTP Peer Mode...........................................................................................213
11.6 Configuring the NTP ID Authentication......................................................................................................217
11.7 Configuring the NTP Master Clock..............................................................................................................219
11.8 Configuring the NTP Server in Broadcast Mode.........................................................................................220
11.9 Configuring the NTP Client in Broadcast Mode..........................................................................................221
11.10 Configuring the NTP Server in Multicast Mode........................................................................................222
11.11 Configuring the NTP Client in Multicast Mode.........................................................................................222
11.12 Configuring the NTP Unicast Client..........................................................................................................223
11.13 Configuring the NTP Peer..........................................................................................................................224
11.14 Configuring the Authority of Access to a Local Device NTP Service.......................................................225
11.15 Configuring an Interface for Transmitting or Receiving NTP Packets......................................................226
ix
Contents
12.3 Setting the Maximum Number of MAC Addresses Learned by a Service Port...........................................230
12.4 Configuring the Aging Time of a Dynamic MAC Address.........................................................................231
12.5 Configuring the MAC Address Filtering Function.......................................................................................232
12.6 Configuring a MAC Address Pool...............................................................................................................232
Contents
xi
Contents
xii
Contents
xiii
Contents
xiv
Contents
A FAQ.............................................................................................................................................645
A.1 How to prevent the system breakdown or the service interruption of the UA5000 caused by the network attacks
through the proper configuration?........................................................................................................................646
A.2 How Many PVCs are Supported by Each xDSL Port?..................................................................................646
A.3 Does the PVC Have Priority?........................................................................................................................646
A.4 How to Configure the Static User?................................................................................................................646
A.5 How to Configure the BMS VLAN?.............................................................................................................647
A.6 How to Change the BMS VLAN?.................................................................................................................647
A.7 How to Change the Service VLAN to Which the xDSL Port Belongs?.......................................................647
A.8 How to Delete the VLAN to Which the Uplink Port Is Bound?...................................................................648
A.9 How to Transparently Transmit the VLAN on the IPM Board?...................................................................648
A.10 Why Is the Actual Rate of the User Lower Than the Rate of the Bound Line Profile?..............................648
A.11 How to Query MAC Addresses of Online Users and Query the Ports that Provide the Access for the Users
According to the MAC Addresses?......................................................................................................................648
A.12 How to Delete the Service Board?...............................................................................................................648
Issue 01 (2011-07-30)
xv
Issue 01 (2011-07-30)
Service Description
When the license function is enabled, the license server performs license control on the function
entries and resources entries supported by the UA5000 and provides individualized services for
customers.
Service Specifications
The control entries of the license function include function entries and resources entries.
A function entry refers to the entry whose license is controlled based on the function. The
controllable function entries supported by the UA5000 include:
l
SELT function
ETHOAM function
A resources entry refers to the entry whose license is controlled based on the count. The
controllable resources entries supported by the UA5000 include:
l
l If you need to use the license function supported by the UA5000, consider the deployment of the license
server in the network planning.
l It is recommended that you install the license server on the same computer with the network
management (NM) server. If no NM server exists, you need to deploy one license server in the network.
The UA5000 uses the network license solution. That is, the license server is deployed in
the network. The license server can be installed on the same computer with the NM server,
but the two servers are different software. The license server can be also installed on a
separate server. Each multi-service access node (MSAN) functions as a license client. The
license server manages the licenses of all the clients in a centralized manner.
In each management range of the license server, each product has only one license file. In
general, a management range can be a district or a city. The license file is stored on the
license server. The license file defines the resources entries of the product. Multiple license
files can be stored on one license server because one licenser server can manage multiple
products.
In the system initialization process of the UA5000, each service module must register their
controlled resources entries or function entries. After the system runs in the normal state,
the management module of a license client obtains the authorization information about the
license controlling entries of the license client from the license server according to the
registration information.
When you configure a service module through the command line or BMS, the device checks
whether the resources entries of the service module are overloaded or whether the function
entries of the service module are authorized.
For license-controlled resources entries, if the resources entries are overloaded, the
system terminates the service configuration and prompts that the license resources are
insufficient.
For license-controlled function entries, if the function entries are not authorized, the
system prompts that the functions are not authorized.
If the resources entries are not overloaded or the function entries are authorized, the
system allows you to continue the service configuration.
For the license-controlled resources entries, the license resources applied for the service
module are released when you delete the service configuration.
Prerequisite
l
Networking
Figure 1-1 shows an example network for configuring the license application.
The license control function is enabled on the UA5000. The license server is installed on the
same computer as the NM server (U2000). The license management tool is installed on the
U2000 client for configuring or managing the license file.UA5000_A communicates with the
license server through port 0/3/0. The TCP port number is 10010.
Issue 01 (2011-07-30)
100.100.100.1/24
U2000 client
Router
60.60.60.2/24
60.60.60.1/24
......
UA5000_A
UA5000_B
UA5000_N
Data Plan
Table 1-1 provides the data plan for configuring the license application.
Table 1-1 Data plan for configuring the license application
Item
Data
License server
IP address: 100.100.100.1/24
TCP port number: 10010
UA5000_A
Router
NOTE
l The configurations on the UA5000 side are the same. This section considers the configuration of
UA5000_A as an example.
l This topic describes only the configuration on the device side. For how to configure the license server,
see the related configuration manual of the license server.
Configuration Flowchart
Figure 1-2 shows the flowchart for configuring the license application.
Issue 01 (2011-07-30)
End
Procedure
Step 1 Configure the interface that communicates with the license server.
1.
Create a VLAN.
huawei(config)#vlan 10 smart
2.
3.
----End
Result
After the configuration, run the display license info command to check whether the
communication between the device and the license server is normal. After UA5000_A is
Issue 01 (2011-07-30)
initialized, each service module can register the controlled resources entries or function entries
in the normal state.
Context
The ESN must be the IP address of the port connecting to the license server. When the IP address
of the port connecting to the license server changes, you need to configure the ESN of the device
again.
Procedure
Step 1 Run the license esn command to configure the ESN of the device.
Step 2 Run the display license info command to query the basic information about the license.
----End
Example
Assume that the device connects to the license server through the maintenance network port and
the IP address of the maintenance network port is 60.60.60.1. To configure the ESN of the device,
do as follows:
NOTE
Run the interface meth command to enter the MEth mode. Then run the ip address command to configure the
IP address of the maintenance network port.
huawei(config)#license esn 60.60.60.1
huawei(config)#display license info
License switch: enable
ESN: 60.60.60.1
IP address of the first server: 100.100.100.1
IP address of the second server: 200.200.200.1
TCP port number: 1024
Communication status: abnormal
License status: unregistered
NOTE
l When the upper layer device is not connected, the communication status of the license client is abnormal
and the license status of the license client is not registered. In this case, new controlled resources cannot be
configured and controlled functions cannot be enabled.
l When the related configuration is complete in the network, the communication status of the license client
is normal and the license status of the license client is registered. In this case, new controlled resources can
be configured and controlled functions can be enabled within the management range of the license.
Related Operation
Table 1-2 lists the related operations for configuring the ESN of the device.
Issue 01 (2011-07-30)
Table 1-2 Related operations for configuring the ESN of the device
To...
license server
Context
l
The IP address of the license server and the number of the TCP port must be consistent
with the data in the actual networking plan.
When the IP address of the license server and the number of the TCP port are changed, you
need to configure the device again.
You can configure two IP addresses for the license server on the device side. The two IP
addresses must be different from each other. You can, however, configure only one TCP
port number on the device side.
Procedure
Step 1 Run the license server command to configure the license server.
Step 2 Run the display license info command to query the basic information about the license.
----End
Example
To configure the IP address of license server 1 to 10.10.10.1, the IP address of license server 2
to 20.20.20.1, and the TCP port number to 1024, do as follows:
huawei(config)#license server ipaddress 10.10.10.1 20.20.20.1 tcpport 1024
huawei(config)#display license info
License switch: enable
ESN: 10.71.55.192
IP address of the first server: 10.10.10.1
IP address of the second server: 20.20.20.1
TCP port number: 1024
Communication status: abnormal
License status: unregistered
Issue 01 (2011-07-30)
NOTE
l When the upper layer device is not connected, the communication status of the license client is abnormal
and the license status of the license client is not registered. In this case, new controlled resources cannot be
configured and controlled functions cannot be enabled.
l When the related configuration is complete in the network, the communication status of the license client
is normal and the license status of the license client is registered. In this case, new controlled resources can
be configured and controlled functions can be enabled within the management range of the license.
Related Operation
Table 1-3 lists the related operations for configuring the license server.
Table 1-3 Related operations for configuring the license server
Issue 01 (2011-07-30)
To...
license esn
Issue 01 (2011-07-30)
Function
Logs are used as important references for maintaining the UA5000 and locating faults.
You can query history commands through the logs on the UA5000. You can also record certain
important information in the logs.
Prerequisite
l
Figure 2-1 shows the example network. The related inband NMS configuration is complete.
You can telnet to the UA5000 to manage and maintain it through PC 1 and PC 2.
CAUTION
The IP address and subnet mask of the maintenance network port of the UA5000 cannot
be 0. Otherwise, the host cannot report the log record.
l
PC 3 is installed with File Transfer Protocol (FTP) or Trivial File Transfer Protocol (TFTP)
software, and can receive and save the logs reported by the UA5000.
Networking
PCs 1, 2 and 3 connect to the inband network port of the UA5000 over a local area network
(LAN). PC 3 functions as the log host of the UA5000. Figure 2-1 shows an example network
for configuring the log host.
Figure 2-1 Example network for configuring the log host
LAN
PC1
PC2
IPM
0/3/0
PC3
COM
ETH
UA5000
Issue 01 (2011-07-30)
10
Data Plan
Table 2-1 provides the data plan for configuring the log host.
Table 2-1 Data plan for configuring the log host
Item
Data
IP address: 10.10.20.1/24
IP address: 10.10.10.2/24
PC 3
IP address: 10.10.10.1/24
Procedure
Step 1 Configure the IP address of the maintenance network port.
huawei(config)#interface meth 0
huawei(config-if-meth0)#ip address 10.10.20.1 255.255.255.0
huawei(config-if-meth0)#quit
When the inband management interface is used to report the log, you are not required to configure
the IP address of the maintenance network port but ensure that the IP address and subnet mask
of the maintenance network port cannot be 0. Otherwise, the host cannot report the log record.
Step 2 Add a log host.
huawei(config)#loghost add 10.10.10.1 huawei
Step 4 Run the ping command to check the connectivity between the UA5000 and the log host to ensure
that the UA5000 can communicate with the log host in the normal state.
Step 5 Configure the TFTP software of the log host.
1.
2.
----End
Result
l
You can obtain the log files in the path preset for saving the reported logs.
The operation commands executed on PCs 1 and 2 to the system are recorded in logs. They
are the same as the operation commands queried on the UA5000.
11
Context
l
The UA5000 can record important information in the log server of the internal network
through the syslog mechanism. The log server can be a UNIX server or a Windows server.
After configuring the log host, you need to enable the log host service of the log server,
and configure the path for saving logs and the log file name to enable real-time reporting
of logs. Set the path and the file name for saving log files to facilitate the real-time log files
report.
Procedure
Step 1 Run the loghost add command to add a log host.
Step 2 Run the loghost activate command to activate the log host.
Step 3 Run the display loghost list command to query the log host information.
----End
Example
To add a log host named huawei with the IP address of 10.10.10.1, do as follows:
huawei(config)#loghost add 10.10.10.1 huawei
huawei(config)#loghost activate name huawei
huawei(config)#display loghost list name huawei
Log server configuration:
IP address
: 10.10.10.1
Host name
: huawei
Terminal state : Normal
Related Operation
Table 2-2 lists the related operations for configuring the log host.
Table 2-2 Related operations for configuring the log host
To...
loghost deactivate
loghost delete
syslog source
Procedure
Step 1 Run the loghost delete command to delete a log host.
Step 2 Run the display loghost list command to query the log host information.
----End
Issue 01 (2011-07-30)
12
Example
To delete the log host with the IP address of 10.10.10.1, do as follows:
huawei(config)#loghost delete ip 10.10.10.1
huawei(config)#display loghost list ip 10.10.10.1
Failure: The log server not exist
Related Operation
Table 2-3 lists the related operations for configuring the log host.
Table 2-3 Related operations for configuring the log host
To...
loghost add
loghost activate
loghost deactivate
Context
The system sends log information only to the activated log host.
Procedure
Step 1 Run the loghost deactivate command to deactivate a log host.
Step 2 Run the display loghost list command to query the log host information.
----End
Example
To deactivate the log host with the IP address of 10.10.10.1, do as follows:
huawei#loghost deactivate ip 10.10.10.1
huawei#display loghost list ip 10.10.10.1
Log server configuration:
IP address
: 10.10.10.1
Host name
: huawei
Terminal state : Deactivate
Related Operation
Table 2-4 lists the related operations for configuring a log host.
Issue 01 (2011-07-30)
13
loghost activate
loghost add
loghost delete
Context
l
The UA5000 can record logs of the latest 512 operations. The system administrator can
query the latest executed operation commands through logs. The executed query commands
cannot be recorded in the logs.
The system can store up to 512 logs. When there are more than 512 records, the old records
are overwritten.
Query and record the system logs immediately in the case of a system failure, to prevent
loss of logs that are used for locating faults.
To record the operation correctly, ensure that the system time is correct before service
configuration.
Procedure
Step 1 Run the display log command to query logs.
----End
Example
To query the logs of operations performed by user root on May 28, 2007, do as follows:
huawei(config)#display log name root 2007-05-28
Command:
display log name root 2007-05-28
--------------------------------------------------------------------------No.
UserName
Domain
IP-Address
448 root
-10.144.78.32
Time: 2007-05-28 23:05:30
Cmd: log on fail
--------------------------------------------------------------------------No.
UserName
Domain
IP-Address
441 root
-10.144.78.32
Time: 2007-05-28 23:02:43
Cmd: log on fail
--------------------------------------------------------------------------No.
UserName
Domain
IP-Address
437 root
-10.144.78.32
Time: 2007-05-28 22:53:38
Cmd: log on fail
--------------------------------------------------------------------------No.
UserName
Domain
IP-Address
Issue 01 (2011-07-30)
14
430 root
----- More ( Press 'Q' to break ) ----
Issue 01 (2011-07-30)
10.144.76.74
15
Issue 01 (2011-07-30)
16
Service Description
l
Shelf management: adding a shelf, adding a connection between shelves, deleting a shelf,
deleting a connection between shelves, configuring the attributes of a shelf, querying shelf
information, and querying a connection between shelves.
Control board management: resetting a control board and querying the information about
the control board.
Service board management: adding a service board offline, confirming a service board,
deleting a service board, resetting a service board, prohibiting a service board, and query
the information about a service board.
Board Name
Control board
Service board
Uplink board
Monitoring board
Power board
PWX
Front access
transfer board
Issue 01 (2011-07-30)
Status
Remarks
Normal
Failed
17
Status
Remarks
Config
Auto_find
It indicates that the board is just inserted, but not confirmed yet.
Prohibited
Context
l
The master shelf and the IPM control board are in the normal state after the master shelf is
added.
The slave shelf is in the faulty state after it is added. The slave shelf will be in the normal
state after a connection is added between shelves.
The connection between shelves is not required when only the master shelf exists.
Procedure
Step 1 Run the frame add command to add a shelf.
Step 2 Run the display frame info command to query the connection between shelves.
----End
Example
To add a connection between the master shelf and the slave shelf, do as follows:
huawei(config)#frame add 1 8
{ local<K> }:local
Command:
frame add 1 8 local
huawei(config)#display frame info
{ <cr>|frameid<U><0,5> }:
Command:
display frame info
-------------------------------------------------------FrameID
FrameType
FrameState
-------------------------------------------------------0
H612HABD
Normal
1
H612HABE(APSB)
Normal
-------------------------------------------------------Total: 2
18
Precaution
l
Set the information of the test group of a shelf before setting the number of the test group.
You cannot modify the number of the test group and the description of the shelf at the same
time.
Procedure
Step 1 Run the frame set command to set the description of a shelf.
Step 2 Run the display frame infoframeid command to query the description of a shelf.
----End
Example
To set the description of shelf 0 to huawei, do as follows:
huawei(config)#frame set 0 desc huawei
huawei(config)#display frame info 0
---------------------------------------------------------------------------Type :
MAIN_F(H612HABD)
State:
Normal
Desc :
huawei
TestGroup: 0
EMU 0 ID: 5
Subnode:12 State:Communications failed
EMU 1 ID: 4
Subnode:15 State:Communications failed
EMU 2 ID: 2
Subnode:1
State:Communications normal
EMU 3 ID: 1
Subnode:2
State:Communications failed
----------------------------------------------------------------------------
Specifications
The control boards include the active control board and standby control board.
Resetting an active control board results in the following:
l
In the case of an active/standby configuration, the operation does not have an adverse
impact on the services that are in progress.
If there is no standby control board, the operation disconnects the control board from all
the service boards, that is, all the service boards in the system are reset.
The resetting may lead to the loss of unsaved data. Therefore, before the operation, run the
save command to save the system data.
Reset the system only when necessary. Otherwise, the services may be affected. In general,
the system is reset after a new application or database is loaded.
Precaution
Issue 01 (2011-07-30)
19
Procedure
Step 1 Run the reboot command to reset the control board.
----End
Example
To reset the active control board, do as follows:
huawei#reboot active
Please check whether data has saved, the unsaved data may lose if reboot active
board, are you sure to reboot active board? (y/n)[n]:y
Reboot active will cause system forced switchover, are you sure to rebootactive
board? (y/n)[n]:y
Context
l
After a service board is added offline, the service board is in failed state. Only when a
service board of the same type as the service board added offline is inserted into the slot,
the status of the service board changes to config and then to normal. If a service board of
different type is inserted, the service board cannot be started because the types of the service
boards do not match.
The service boards that are inserted properly into a shelf can be found automatically.
CAUTION
The service shelves of HABA and HABF with H601IPMD control board can not support
broadband service board in slots 18-35.
Procedure
Step 1 Run the board add command to add a service board offline.
Step 2 Manually add a service board of the same type into the service shelf.
Step 3 Run the board confirm command to confirm the service board.
Step 4 Run the display board command to query the status of the service board.
----End
To insert an ADR board into slot 0/10, do as follows:
Issue 01 (2011-07-30)
20
Related Operation
Table 3-3 lists the related operation for adding a service board.
Table 3-3 Related operation for adding a service board
To...
Remarks
Delete a service
board
board delete
21
Precaution
l
Before deleting a service board, delete the data on the service board. Otherwise, deleting
the service board fails.
The service board in auto-find state cannot be deleted. The faulty service board can be
deleted.
Procedure
Step 1 Run the board delete command to delete a service board that is not required.
Step 2 Run the display board command to query the status of a service board.
----End
To delete the faulty service board in slot 0/12, do as follows:
huawei(config)#board delete 0/12
Are you sure to delete this board? (y/n)[n]: y
0 frame 12 slot board delete successfully
huawei(config)#display board 0/12
Failure: Board does not exist
Related Operation
Table 3-4 lists the related operation for deleting a service board.
Table 3-4 Related operation for deleting a service board
To...
board add
Precaution
l
The system generates a fault alarm after the reset operation. The system generates a
recovery alarm after the board recovers.
When the service board starts successfully after resetting, it reports the registration
information to the control board. The control board configures the data of the service board
to restore the services.
Procedure
Step 1 Run the board reset command to reset a service board.
----End
Issue 01 (2011-07-30)
22
Example
To reset the service board in slot 0/12, do as follows:
huawei(config)#board reset 0/12
Are you sure to reset board? (y/n)[n]:y
0 frame 2 slot reset board message sent successfully...
Prerequisite
In the following cases, you need to prohibit service boards:
l
The service board that is in the auto-find state and is unconfirmed cannot be prohibited.
Precaution
Procedure
Step 1 Run the board prohibit command to delete a service board.
Step 2 Run the display board command to query the status of a service board.
----End
Example
To prohibit the service board in slot 0/12, do as follows:
huawei(config)#board prohibit 0/12
Prohibiting board will interrupt all services on this board, are you sure to
prohibit board? (y/n)[n]:y
Prohibited board successfully
huawei(config)#display board 0/12
-------------------------------------------------------Board Name
: ASL
Board state
: Prohibited
Online state
: Online
Board has ports
: 16
0 port type
: PSTN_PORT
1 port type
: PSTN_PORT
2 port type
: PSTN_PORT
3 port type
: PSTN_PORT
4 port type
: PSTN_PORT
5 port type
: PSTN_PORT
6 port type
: PSTN_PORT
7 port type
: PSTN_PORT
8 port type
: PSTN_PORT
9 port type
: PSTN_PORT
10 port type
: PSTN_PORT
Issue 01 (2011-07-30)
23
11 port type
: PSTN_PORT
12 port type
: PSTN_PORT
13 port type
: PSTN_PORT
14 port type
: PSTN_PORT
15 port type
: PSTN_PORT
A/u Law
: A law
Port Impedance
: Bureau machine in China(200+680|| 100
Port Current
: 25mA steady current
Work Environment : Work Mode
: Ring Voltage
: --------------------------------------------------------
Specification
The IPMB board of the UA5000 provides various types of ports through the subboards attached
hereon.
Replacement principles
The FE optical subboard can be upgraded to the GE optical subboard, but the GE optical
subboard cannot be degraded to the FE optical subboard.
The FE electrical subboard can be upgraded to the GE electrical subboard, but the GE
electrical subboard cannot be degraded to the FE electrical subboard.
The GE optical subboard can be degraded to the FE electrical subboard.
Only the GE electrical port and the GE optical port are interchangeable. Other electrical
ports and optical ports are not interchangeable. That is, interchangeability is not
supported between the FE electrical port and the FE optical port, between the FE
electrical port and the GE optical port, and between the GE electrical port and the FE
optical port.
If any subboard combination does not comply with the preceding principles, the system reports an alarm,
which indicates that the subboard replacement fails. When you query the boards through the CLI, the system
displays the information about original subboards and the faulty status of the subboards.
Issue 01 (2011-07-30)
24
Related Operation
Table 3-5 lists the related operation for managing the subboard.
Table 3-5 Related operation for managing the subboard
Issue 01 (2011-07-30)
To...
Remarks
display board
25
Issue 01 (2011-07-30)
26
Service Description
Remote user authentication refers to the process of examining the remote users who need to log
in to the UA5000. Only authenticated users can log in to, maintain, and manage the device.
Service Specifications
The UA5000 provides the functions of remote user authentication.
What Is AAA
Authentication, authorization and accounting (AAA) is the network security mechanism which
provides a framework for unified authentication, authorization, and accounting configurations.
Advantages of AAA
The AAA works in the server-client structure. That is, the AAA server stores the user information
in a centralized manner. The AAA client runs on the managed resources side.
The AAA framework has the following advantages:
l
Excellent expansibility
What Is RADIUS
As a management framework, AAA can be implemented by a number of protocols. Among
them, RADIUS is widely used.
Issue 01 (2011-07-30)
27
RADIUS is an information exchange protocol with the distributed server-client model. It is used
to manage a large number of distributed dial-up users.
A RADIUS server manages a simple user database to provide AAA functions for users and to
modify the service information of users according to the service types and authority.
The users forward their AAA requests to the RADIUS server through a network access server
(NAS).
Principles of RADIUS
l
When a user wants to access other networks (or use certain network resources), the NAS
forwards the authentication and accounting information of the user to the RADIUS server.
The RADIUS protocol defines how to transmit user and accounting information between
the NAS and the RADIUS server.
The RADIUS server receives the user connection request, authenticates the user name and
password contained in the user data, and returns the required data to the NAS.
NOTE
l The NAS and the RADIUS server also use a key to encrypt the data exchanged between them.
In this case, the data such as the password can be prevented from being intercepted or stolen.
l The RADIUS configuration only defines the parameters related to the connections between the
NAS and the RADIUS server. To validate these parameters, you must first enter the domain
mode, specify a RADIUS scheme, and then select the RADIUS AAA mode.
What Is SSH
Secure Shell (SSH) provides authentication, encryption, and identification to guarantee network
communication security. When users telnet to the router through an insecure network, SSH offers
security guarantee and powerful authentication to protect the UA5000 against attacks such as
IP address spoofing and interception of plain text password.
SSH RFC
Internet Engineering Task Force (IETF) defines the SSH RFC document. The SSH protocol has
two versions:
l
SSHv1.5: SSHv1.5 was issued earlier than SSHv2. At present, a majority of SSHs support
it.
SSHv2: SSHv2 is more standard and precise than SSHv1.5. It enhances security and
includes the file transfer function.
Advantages of SSH
The SSH protocol is based on a client/server mode. It uses TCP for interconnections to realize
secure remote access through insecure networks. Compared with telnet, SSH has the following
advantages:
l
SSH supports the methods of using the password and RSA public key to authenticate clients.
SSH supports Data Encryption Standard (DES), 3DES, and AES to encrypt session data.
Issue 01 (2011-07-30)
28
When the SSH server communicates with the SSH client, the user name and the password
are encrypted to prevent the password from being intercepted.
SSH encrypts the data to guarantee the security and reliability during the transmission.
SSH supports the MD5 and SHA algorithms to identify the integrity of the session data.
This guarantees authenticity of the session data and prevents the data from being altered
maliciously during the transfer process. SSH supports the RSA authentication mode. In this
mode, SSH implements secure key exchange and authentication of the server by generating
public and private keys. These keys are generated according to the encryption principle of
the asymmetric encryption system. This guarantees the entire secure process of sessions.
Networking
Figure 4-1 shows an example network for configuring the remote user authentication.
Figure 4-1 Example network for configuring the remote user authentication
10.10.10.1
Radius
server
Radius
server
10.10.10.2
UA5000
LAN
PC
PC
PC
Data Plan
Table 4-1 provides the data plan for configuring the remote user authentication.
Table 4-1 Data plan for configuring the remote user authentication
Issue 01 (2011-07-30)
Item
Data
10.10.10.1
29
Item
Data
10.10.10.2
1812
NOTE
This topic describes configuration of only the UA5000. For details of the configuration of the RADIUS
server, see the related documents. The RADIUS configuration profile contains only the IP address and port
number of the RADIUS server. Configure other parameters such as RADIUS shared key and RADIUS
server type according to the actual requirements.
Configuration Flowchart
Figure 4-2 shows the flowchart for configuring the remote user authentication.
Figure 4-2 Flowchart for configuring the remote user authentication
Start
Create a domain
End
Issue 01 (2011-07-30)
30
Procedure
Step 1 Create a virtual profile of the RADIUS server.
huawei(config)#radius-server template radius2005
Step 2 Bind the virtual profile of the RADIUS server to the authentication server.
huawei(config-radius-radius2005)#radius-server authentication 10.10.10.1 1812
huawei(config-radius-radius2005)#radius-server authentication 10.10.10.2 1812 se
condary
Step 7 Bind the domain to the virtual profile of the RADIUS server.
huawei(config-aaa-domain-radius1)#radius-server radius2005
----End
Result
After the configuration on the RADIUS server is complete, log in to the UA5000 and enter the
user name in the format of "userid@domain-name". If the RADIUS server contains the user
name and domain configuration, the user can log in to the device and manage it.
31
Context
l
Before referencing the radius authentication scheme, you must configure the RADIUS
protocol (for details, see "4.5 Configuring RADIUS") and configure the related user
information on the remote RADIUS server.
Procedure
Step 1 Run the aaa command to enter the AAA mode.
Step 2 Run the authentication-scheme command to add an authentication scheme.
Step 3 Run the display authentication-scheme command to query an authentication scheme.
----End
Example
To add the authentication scheme named huawei, with the authentication mode of radius, do as
follows:
huawei(config)#aaa
huawei(config-aaa)#authentication-scheme huawei
huawei(config-aaa-authen-huawei)#authentication-mode radius
Related Operation
Table 4-2 lists the related operations for configuring an authentication scheme.
Table 4-2 Related operations for configuring an authentication scheme
To...
Remarks
Delete an
authentication scheme
undo authentication-scheme
Context
l
Issue 01 (2011-07-30)
32
Procedure
Step 1 Run the aaa command to enter the AAA mode.
Step 2 Run the domain command to create a domain.
Step 3 Run the quit command to quit the domain mode.
Step 4 Run the quit command to quit the AAA mode.
Step 5 Run the display domain command to query a domain.
----End
Example
To create a domain named huawei.net, do as follows:
huawei(config)#aaa
huawei(config-aaa)#domain huawei.net
huawei(config-aaa-domain-huawei.net)#quit
Related Operation
Table 4-3 lists the related operations for creating a domain.
Table 4-3 Related operations for creating a domain
To...
Run the
Command...
Remarks
Delete a domain
undo domain
display aaa
configuration
Context
l
An authentication scheme defines the policy for authenticating all the users of an ISP.
Issue 01 (2011-07-30)
33
Procedure
Step 1 Run the aaa command to enter the AAA mode.
Step 2 Run the domain command to specify huawei as the current domain and access domain mode.
Step 3 Run the authentication-scheme command to reference an authentication scheme.
Step 4 Run the quit command to quit the domain mode and the AAA mode.
Step 5 Run the display authentication-scheme command to query the detailed information about a
domain.
----End
Example
To specify "huawei" as the authentication scheme of domain "huawei.net", do as follows:
huawei(config)#aaa
huawei(config-aaa)#domain huawei.net
huawei(config-aaa-domain-huawei.net)#authentication-scheme huawei
huawei(config-aaa-domain-huawei.net)#quit
huawei(config-aaa)#quit
huawei(config)#display authentication-scheme
--------------------------------------------------------------------------Authentication-scheme-name
Authentication-method
--------------------------------------------------------------------------default
local
huawei
radius
--------------------------------------------------------------------------Total 2,2 printed
Related Operation
Table 4-4 lists the related operations for referencing an authentication scheme.
Table 4-4 Related operations for referencing an authentication scheme
To...
Remarks
Delete the
referencing of an
authentication
scheme
undo authentication-scheme
View the
configuration
information about
AAA
34
Context
Before referencing a RADIUS server template, you need to configure the RADIUS server
template. For details, see "4.5 Configuring RADIUS."
Procedure
Step 1 Run the aaa command to enter the AAA mode.
Step 2 Run the domain command to specify "huawei.net" as the current domain.
Step 3 Run the quit command to quit the domain mode and the AAA mode.
Step 4 Run the radius-server template command to bind a RADIUS server template to the AAA
domain.
Step 5 Run the quit command to quit the RADIUS mode.
Step 6 Run the display domain command to query the detailed information about a domain.
----End
Example
To specify "radius1" as the RADIUS server template of domain "huawei.net" for authentication
and accounting, do as follows:
huawei(config)#aaa
huawei(config-aaa)#domain huawei.net
huawei(config-aaa-domain-huawei.net)#quit
huawei(config-aaa)#quit
huawei(config)#radius-server template radius1
huawei(config-radius-radius1)#quit
huawei(config)#display domain huawei.net
------------------------------------------------------------------Domain-name
: huawei.net
Domain-state
: Active
Authentication-scheme-name
: huawei
Accounting-scheme-name
: default
Authorization-scheme-name
: default
Primary-DNS-IP-address
: Second-DNS-IP-address
: Primary-NBNS-IP-address
: Second-NBNS-IP-address
: Idle-data-attribute (time,flow) : 0, 60
User-access-limit
: 384
Online-number
: 0
RADIUS-server-template
: radius1
-------------------------------------------------------------------
Related Operation
Table 4-5 lists the related operation for referencing a RADIUS server template.
Issue 01 (2011-07-30)
35
Remarks
undo radius-server
template
Specifications
For the UA5000, the RADIUS is configured on each RADIUS server group.
In actual networking, a RADIUS server group can be an independent RADIUS server, or a pair
of active/standby RADIUS servers that have the same configuration but different IP addresses.
The attributes of each RADIUS server template include the following:
l
Precautions
The RADIUS configuration defines only the parameters used for data exchange between the
UA5000 and the RADIUS server. To validate these parameters, you must reference the RADIUS
server group in a domain. For details, see "4.4 Configuring AAA."
Context
l
Before configuring RADIUS, you must create a RADIUS server template and enter its
configuration mode.
Issue 01 (2011-07-30)
36
Procedure
Step 1 Run the radius-server template command to create a RADIUS server template and enter the
corresponding configuration mode.
Step 2 Run the quit command to quit the RADIUS mode.
Step 3 Run the display radius-server configuration command to query the created RADIUS server
template.
----End
Example
To create the RADIUS server template named radius1, do as follows:
huawei(config)#radius-server template radius1
huawei(config-radius-radius1)#quit
huawei(config)#display radius-server configuration template radius1
------------------------------------------------------------------Server-template-name
: radius1
Protocol-version
: standard
Traffic-unit
: B
Shared-secret-key
: huawei
Timeout-interval(in second)
: 5
Primary-authentication-server
: 0.0.0.0:0:LoopBack0
Primary-accounting-server
: 0.0.0.0:0:LoopBack0
Secondary-authentication-server : 0.0.0.0:0:LoopBack0
Secondary-accounting-server
: 0.0.0.0:0:LoopBack0
Retransmission
: 3
Domain-included
: YES
-------------------------------------------------------------------
Related Operation
Table 4-6 lists the related operation for creating a RADIUS server template.
Table 4-6 Related operation for creating a RADIUS server template
To...
Context
l
Issue 01 (2011-07-30)
The servers may include the primary and secondary servers. By default, the IP addresses
of the primary and the secondary servers are 0.0.0.0.
37
To ensure normal communication between the UA5000 and the RADIUS server, before
configuring the IP address and UDP port number of the server, ensure that the route between
the UA5000 and the RADIUS server is in the normal state.
Ensure that the port configurations between the UA5000 and the server are consistent.
Procedure
Step 1 Run the radius-server template command to create a RADIUS server template and enter the
corresponding RADIUS mode.
Step 2 Run the radius-server authentication command to configure the primary RADIUS server.
Step 3 Run the radius-server authentication secondary command to configure the secondary
RADIUS server.
Step 4 Run the quit command to quit the RADIUS mode.
Step 5 Run the display radius-server configuration command to query the IP address and port number
of a RADIUS server.
----End
Example
To configure the IP address and port number of the primary server to 10.10.10.1 and 1812, and
the IP address and port number of the secondary server to 10.10.10.2 and 1812, do as follows:
huawei(config)#radius-server template radius1
huawei(config-radius-radius1)#radius-server authentication 10.10.10.1 1812
huawei(config-radius-radius1)#radius-server authentication 10.10.10.2 1812
secondary
huawei(config-radius-radius1)#quit
huawei(config)#display radius-server configuration template radius1
------------------------------------------------------------------Server-template-name
: radius1
Protocol-version
: standard
Traffic-unit
: B
Shared-secret-key
: huawei
Timeout-interval(in second)
: 5
Primary-authentication-server
: 10.10.10.1:1812:LoopBack-1
Primary-accounting-server
: 0.0.0.0:0:LoopBack0
Secondary-authentication-server : 10.10.10.2:1812:LoopBack-1
Secondary-accounting-server
: 0.0.0.0:0:LoopBack0
Retransmission
: 3
Domain-included
: YES
-------------------------------------------------------------------
Related Operation
Table 4-7 lists the related operation for configuring the IP address and the port number of a
RADIUS server.
Table 4-7 Related operation of configuring the IP address and the port number of a RADIUS
server
Issue 01 (2011-07-30)
To...
38
Context
l
The RADIUS client (namely the UA5000) and the RADIUS server use the MD5 algorithm
to encrypt the packets exchanged between them. They respond to the received packets only
when the keys at both ends are identical.
Procedure
Step 1 Run the radius-server template command to create a RADIUS server template and enter the
corresponding RADIUS mode.
Step 2 Run the radius-server shared-key command to configure the shared key of the RADIUS server.
Step 3 Run the quit command to quit the RADIUS mode.
Step 4 Run the display radius-server configuration command to query the shared key of the RADIUS
server.
----End
Example
To configure the shared key of the RADIUS server to "radius2004", do as follows:
huawei(config)#radius-server template radius1
huawei(config-radius-radius1)#radius-server shared-key radius2004
huawei(config-radius-radius1)#quit
huawei(config)#display radius-server configuration template radius1
------------------------------------------------------------------Server-template-name
: radius1
Protocol-version
: standard
Traffic-unit
: B
Shared-secret-key
: radius2004
Timeout-interval(in second)
: 5
Primary-authentication-server
: 10.10.10.1:1812:LoopBack-1
Primary-accounting-server
: 0.0.0.0:0:LoopBack0
Secondary-authentication-server : 10.10.10.2:1812:LoopBack-1
Secondary-accounting-server
: 0.0.0.0:0:LoopBack0
Retransmission
: 3
Domain-included
: YES
-------------------------------------------------------------------
Issue 01 (2011-07-30)
39
Context
l
After RADIUS request packets are sent, if the UA5000 does not receive the response from
the RADIUS server, the RADIUS request packets are sent again to ensure that the users
can use the RADIUS service.
Procedure
Step 1 Run the radius-server template command to create a RADIUS server template and enter the
corresponding RADIUS mode.
Step 2 Run the radius-server timeout command to configure the response timeout interval of the
RADIUS server.
Step 3 Run the quit command to quit the RADIUS mode.
Step 4 Run the display radius-server configuration command to query the response timeout interval
of the RADIUS server.
----End
Example
To confiigure the timeout interval of a RADIUS server as 10s, do as follows:
huawei(config)#radius-server template radius1
huawei(config-radius-radius1)#radius-server timeout 10
huawei(config-radius-radius1)#quit
huawei(config)#display radius-server configuration template radius1
------------------------------------------------------------------Server-template-name
: radius1
Traffic-unit
: Byte
Shared-secret-key
: radius2004
Timeout-interval(in second)
: 10
Retransmission
: 3
Domain-included
: yes
Primary-authentication-server
: 10.10.10.1:1812
Primary-accounting-server
: 0.0.0.0:0
Secondary-authentication-server : 10.10.10.2:1812
Secondary-accounting-server
: 0.0.0.0:0
------------------------------------------------------------------------------------------------------------------------------------Server-template-name
: radius1
Protocol-version
: standard
Traffic-unit
: B
Shared-secret-key
: radius2004
Timeout-interval(in second)
: 10
Primary-authentication-server
: 10.10.10.1:1812:LoopBack-1
Primary-accounting-server
: 0.0.0.0:0:LoopBack0
Secondary-authentication-server : 10.10.10.2:1812:LoopBack-1
Secondary-accounting-server
: 0.0.0.0:0:LoopBack0
Retransmission
: 3
Domain-included
: YES
-------------------------------------------------------------------
Related Operation
Table 4-8 lists the related operation for configuring the response timeout interval of a RADIUS
server.
Issue 01 (2011-07-30)
40
Table 4-8 Related operation for configuring the response timeout interval of a RADIUS server
To...
Context
l
If the UA5000 does not receive the response from the RADIUS server within the timeout
time specified by the timeout timer, the UA5000 resends the RADIUS request packets to
the RADIUS server. When the retransmit count exceeds the specified maximum value, the
UA5000 considers its connection with the RADIUS server as interrupted, and sends the
RADIUS request packets to another RADIUS server.
You can modify the configuration of a RADIUS server template only when the template
is not referenced.
Procedure
Step 1 Run the radius-server template command to create a RADIUS server template and enter the
corresponding RADIUS mode.
Step 2 Run the radius-server retransmit command to configure the retransmit time of the RADIUS
server.
Step 3 Run the quit command to quit the RADIUS mode.
Step 4 Run the display radius-server configuration command to query the maximum retransmit count
of RADIUS request packets.
----End
Example
To configure the maximum retransmit count of RADIUS request packets to 5, do as follows:
huawei(config)#radius-server template radius1
huawei(config-radius-radius1)#radius-server retransmit 5
huawei(config-radius-radius1)#quit
huawei(config)#display radius-server configuration template radius1
------------------------------------------------------------------Server-template-name
: radius1
Traffic-unit
: Byte
Shared-secret-key
: radius2004
Timeout-interval(in second)
: 10
Retransmission
: 5
Domain-included
: yes
Primary-authentication-server
: 10.10.10.1:1812
Issue 01 (2011-07-30)
41
Primary-accounting-server
: 0.0.0.0:0
Secondary-authentication-server : 10.10.10.2:1812
Secondary-accounting-server
: 0.0.0.0:0
------------------------------------------------------------------------------------------------------------------------------------Server-template-name
: radius1
Protocol-version
: standard
Traffic-unit
: B
Shared-secret-key
: radius2004
Timeout-interval(in second)
: 10
Primary-authentication-server
: 10.10.10.1:1812:LoopBack-1
Primary-accounting-server
: 0.0.0.0:0:LoopBack0
Secondary-authentication-server : 10.10.10.2:1812:LoopBack-1
Secondary-accounting-server
: 0.0.0.0:0:LoopBack0
Retransmission
: 5
Domain-included
: YES
-------------------------------------------------------------------
Related Operation
Table 4-9 lists the related operation for configuring the maximum retransmit count of RADIUS
request packets.
Table 4-9 Related operation for configuring the maximum retransmit count of RADIUS request
packets
To...
Context
The UA5000 supports the standard RADIUS protocol and the portal service platform developed
by Huawei Technologies Co., Ltd. (Huawei for short). By default, the standard RADIUS
protocol is used.
Procedure
Step 1 Run the radius-server template command to create a RADIUS server template and enter the
corresponding RADIUS mode.
Step 2 Run the radius-server type command to configure the RADIUS server type.
Step 3 Run the quit command to quit the RADIUS mode.
Step 4 Run the display radius-server configuration command to query the RADIUS server type.
----End
Issue 01 (2011-07-30)
42
Example
To configure the RADIUS server type to portal, do as follows:
huawei(config)#radius-server template radius1
huawei(config-radius-radius1)#radius-server type portal
huawei(config-radius-radius1)#quit
huawei(config)#display radius-server configuration template radius1
------------------------------------------------------------------Server-template-name
: radius1
Protocol-version
: portal
Traffic-unit
: B
Shared-secret-key
: radius2004
Timeout-interval(in second)
: 10
Primary-authentication-server
: 10.10.10.1:1812:LoopBack-1
Primary-accounting-server
: 0.0.0.0:0:LoopBack0
Secondary-authentication-server : 10.10.10.2:1812:LoopBack-1
Secondary-accounting-server
: 0.0.0.0:0:LoopBack0
Retransmission
: 5
Domain-included
: YES
-------------------------------------------------------------------
Context
The NAS port and its ID format are internal extended attributes of Huawei. They are used for
interconnections and server cooperation among Huawei devices.
Procedure
Step 1 Run the radius-server template command to create a RADIUS server template and enter the
corresponding RADIUS mode.
Step 2 Run the radius-server nas-port-format command to configure a NAS port of the RADIUS
server.
Step 3 Run the radius-server nas-port-id-format command to configure the ID format of the NAS
port of the RADIUS server.
----End
Example
To configure the format of the NAS port as "new", and configure the ID of the NAS port as
"new" for the RADIUS server template "radius1", do as follows:
huawei(config)#radius-server template radius1
huawei(config-radius-radius1)#radius-server nas-port-format new
huawei(config-radius-radius1)#radius-server nas-port-id-format new
43
Context
l
By default, the user name of a RADIUS server includes the domain name.
The access users are generally named in the format of "userid@domain-name". The part
following "@" is the domain name. The UA5000 assigns users to different ISP domains
based on their respective domain names.
Certain RADIUS servers that were used earlier reject the user names that include domain
names. In this case, you can run the undo radius-server user-name domain-included
command to specify that the user name to be sent to a RADIUS server does not include a
domain name.
If a RADIUS server group does not allow user names to include domain names, the
RADIUS server group cannot be used at the same time in two or more domains. Otherwise,
when receiving the same user names, the RADIUS server considers the users in different
domains as the same user.
You can modify the configuration of a RADIUS server template only when the template
is not referenced.
Procedure
Step 1 Run the radius-server template command to create a RADIUS server template and enter the
corresponding RADIUS mode.
Step 2 Run the (undo)radius-server user-name domain-included command to set whether the user
name sent to the RADIUS server includes the domain name.
Step 3 Run the quit command to quit the RADIUS mode.
Step 4 Run the display radius-server configuration command to query the format of the user name
that is sent to the RADIUS server.
----End
Example
To specify that a user name to be sent to the RADIUS server does not include the domain name,
do as follows:
huawei(config)#radius-server template radius1
huawei(config-radius-radius1)#undo radius-server user-name domain-included
huawei(config-radius-radius1)#quit
huawei(config)#display radius-server configuration template radius1
------------------------------------------------------------------Server-template-name
: radius1
Traffic-unit
: Byte
Shared-secret-key
: radius2004
Timeout-interval(in second)
: 10
Retransmission
: 5
Domain-included
: no
Primary-authentication-server
: 10.10.10.1:1812
Primary-accounting-server
: 0.0.0.0:0
Secondary-authentication-server : 10.10.10.2:1812
Secondary-accounting-server
: 0.0.0.0:0
------------------------------------------------------------------------------------------------------------------------------------Server-template-name
: radius1
Protocol-version
: portal
Traffic-unit
: B
Shared-secret-key
: radius2004
Timeout-interval(in second)
: 10
Issue 01 (2011-07-30)
44
Primary-authentication-server
: 10.10.10.1:1812:LoopBack-1
Primary-accounting-server
: 0.0.0.0:0:LoopBack0
Secondary-authentication-server : 10.10.10.2:1812:LoopBack-1
Secondary-accounting-server
: 0.0.0.0:0:LoopBack0
Retransmission
: 5
Domain-included
: NO
-------------------------------------------------------------------
To specify that a user name to be sent to the RADIUS server includes the domain name, do as
follows:
huawei(config)#radius-server template radius1
huawei(config-radius-radius1)#radius-server user-name domain-included
huawei(config-radius-radius1)#quit
huawei(config)#display radius-server configuration template radius1
------------------------------------------------------------------Server-template-name
: radius1
Traffic-unit
: Byte
Shared-secret-key
: radius2004
Timeout-interval(in second)
: 10
Retransmission
: 5
Domain-included
: yes
Primary-authentication-server
: 10.10.10.1:1812
Primary-accounting-server
: 0.0.0.0:0
Secondary-authentication-server : 10.10.10.2:1812
Secondary-accounting-server
: 0.0.0.0:0
------------------------------------------------------------------------------------------------------------------------------------Server-template-name
: radius1
Protocol-version
: portal
Traffic-unit
: B
Shared-secret-key
: radius2004
Timeout-interval(in second)
: 10
Primary-authentication-server
: 10.10.10.1:1812:LoopBack-1
Primary-accounting-server
: 0.0.0.0:0:LoopBack0
Secondary-authentication-server : 10.10.10.2:1812:LoopBack-1
Secondary-accounting-server
: 0.0.0.0:0:LoopBack0
Retransmission
: 5
Domain-included
: YES
-------------------------------------------------------------------
Context
l
The key size ranges from 512 bits to 2048 bits. You can change it to 512, 1024, or 2048
bits according to the actual requirements. By default, it is 512 bits.
Before using the SSH service for the first time, you must run the rsa local-key-pair
create command.
If the host key pair and service key pair of the SSH server are destroyed, you must create
a new host key pair and service key pair of the SSH server.
Issue 01 (2011-07-30)
45
Procedure
Step 1 Run the rsa local-key-pair create command to create the local RSA key pair.
Step 2 Run the display rsa local-key-pair public command to query the local RSA key pair.
----End
Example
To create the local RSA key pair, do as follows:
huawei(config)#rsa local-key-pair create
The key name will be: Host
% RSA keys defined for Host already exist.
Confirm to replace them? [y/n]:y
The range of public key size is (512 ~ 2048).
NOTES: If the key modulus is greater than 512,
It will take a few minutes.
Input the bits in the modulus[default = 512]:1024
Generating keys...
...........++++++
....++++++
............................++++++++
.............................++++++++
huawei(config)#display rsa local-key-pair public
=====================================================
Time of Key pair created: 16:17:59 2009/3/5
Key name: Host
Key type: RSA encryption Key
=====================================================
Key code:
308188
028180
ED7690C6 5995B7F4 EFD5A54C 5A9602B7 F6EAD406
B2F506AA 1B99BE43 201FE369 2204E833 5EC1D5A4
8B1EDCA5 C3E61ACE 8A5D4721 67D4BC30 00478292
41B9E1B4 040C760C BB652AFD 28A97D9F 955F0674
CE08C7DD EE5FA2C0 AA3BD8B7 DC5C8DAD E0C48469
D99D6F4F E0A3EC04 01C0E698 AE94B289 F57E1AD0
E8645C44 5268FC61
0203
010001
=====================================================
Time of Key pair created: 16:18:09 2009/3/5
Key name: Server
Key type: RSA encryption Key
=====================================================
Key code:
3067
0260
ECD284B8 818CE5D8 F5AF1DAA 5786D956 88BE396F
A4C8030C 39FDCC6A D6202531 9A75F7F1 DF323176
6F89B14B C90C6A5F F8929316 451212D6 22E2D62A
75B00DBD 61C04BFE B20839AB 4510A9B3 6E809105
4EC76E35 CCEB2577 8471B6FA C1B69D39
0203
010001
Related Operation
Table 4-10 lists the related operation for creating the local RSA key pair.
Issue 01 (2011-07-30)
46
Table 4-10 Related operation for creating the local RSA key pair
To...
Configuration Flowchart
Figure 4-3 shows the flowchart for configuring the public key of the SSH user.
Figure 4-3 Flowchart for configuring the public key of the SSH user
Start
Enter config-rsa-public-key
mode
End
Procedure
Step 1 Run the rsa peer-public-key command to enter the rsa-public-key mode.
Step 2 Run the public-key-code begin command to enter the edit mode of the public key.
Step 3 Enter the public key of the user in key edit mode.
NOTE
For how to configure the key, see "Configuring the SSH Mode."
Step 4 Run the public-key-code end command to quit the edit mode of the public key.
Step 5 Run the peer-public-key end command to return to global config mode.
Issue 01 (2011-07-30)
47
Step 6 Run the display rsa peer-public-key command to query the public key of the SSH user.
----End
Example
To display the converted public key of the user in the current system, do as follows:
huawei(config)#rsa peer-public-key key
huawei(config-rsa-public-key)#public-key-code begin
huawei(config-rsa-key-code)#30818702 818100D6 167E5066 88F6105A 0194029A EDC3454
9
huawei(config-rsa-key-code)#FA68A0A6 2101625B 10DFB8C5 48C46E67 5A7CB3AA 6A2AC9E
0
huawei(config-rsa-key-code)#2ECB7E94 DD69E8E0 9DC943AC D9D2CDE7 CA280EF7 05EB661
5
huawei(config-rsa-key-code)#CA47432F D81095BF E2D99BC4 8734E713 57520D21 33B7A7A
4
huawei(config-rsa-key-code)#D41AB63D 3DBD6663 BCBD63CC E4B4F28F 15471DB9 38428D8
C
huawei(config-rsa-key-code)#C176C803 DA55957A 73F1ED70 BE1B6502 0125
huawei(config-rsa-key-code)#public-key-code end
huawei(config-rsa-public-key)#peer-public-key end
huawei(config)#display rsa peer-public-key
=====================================
Key name: key
=====================================
Key Code:
308186
028180
D6167E50 6688F610 5A019402 9AEDC345
675A7CB3 AA6A2AC9 E02ECB7E 94DD69E8
15CA4743 2FD81095 BFE2D99B C48734E7
63BCBD63 CCE4B4F2 8F15471D B938428D
0201
25
49FA68A0
E09DC943
1357520D
8CC176C8
A6210162
ACD9D2CD
2133B7A7
03DA5595
5B10DFB8
E7CA280E
A4D41AB6
7A73F1ED
C548C46E
F705EB66
3D3DBD66
70BE1B65
Context
SSH user authentication is divided into the following types:
l
all: indicates the password or RSA authentication mode. That is, you can log in to the
UA5000 through password authentication or RSA authentication.
password-publickey: indicates the password and public key authentication. That is, you can
log in to the UA5000 only after you pass the password authentication and RSA
authentication. This is applicable to SSHv2.0 only.
Issue 01 (2011-07-30)
48
Procedure
Step 1 Run the ssh user assign rsa-key command to set the RSA public key of an SSH user.
Step 2 Run the ssh user authentication-type rsa command to set the RSA authentication mode of the
SSH user.
Step 3 Run the display ssh user-information command to query the authentication mode of the SSH
user.
----End
Example
To set key as the RSA public key of SSH user huawei, and RSA as the authentication mode, do
as follows:
huawei(config)#ssh user huawei assign rsa-key key
huawei(config)#ssh user huawei authentication-type rsa
huawei(config)#display ssh user-information
{ <cr>|string<S><Length 1-16> }:
Command:
display ssh user-information
Username
Authentication-type User-public-key-name
huawei
rsa
key
Service-type
stelnet
Related Operation
Table 4-11 lists the related operations for configuring an SSH user.
Table 4-11 Related operations for configuring an SSH user
Issue 01 (2011-07-30)
To...
49
5 Configuring a VLAN
Configuring a VLAN
Issue 01 (2011-07-30)
50
5 Configuring a VLAN
and transmitting the traffic stream between the CPE and the access device to implement the
service access of the subscriber.
5.11 Configuring the Description Information About a Service Port
This topic describes how to configure the description information about a service port.
5.12 Activating a Service Port
This topic describes how to activate or deactivate a service port for a VLAN. In this manner,
you can determine whether to make the service configuration take effect on a specified service
port.
Issue 01 (2011-07-30)
51
5 Configuring a VLAN
Service Description
Virtual local area network (VLAN) is a technology used to implement virtual workgroups by
logically grouping the devices in a LAN. The Institute of Electrical and Electronics Engineers
(IEEE) issued draft IEEE 802.1q in 1999, intended to standardize VLAN implementations.
For details about the VLAN feature, see "VLAN" in the UA5000 Universal Access Unit Feature
Description.
Service Specifications
The UA5000 supports the following types of VLANs:
l
Standard VLAN
Smart VLAN
MUX VLAN
Super VLAN
The UA5000 supports configuring up to 4000 standard VLANs, smart VLANs, and MUX
VLANs. The UA5000 supports configuring up to 16 super VLANs.
Table 5-1 lists the VLAN types and applications.
Table 5-1 VLAN types and applications
Issue 01 (2011-07-30)
Type
Description
Application
Standard
VLAN
Smart VLAN
MUX VLAN
52
5 Configuring a VLAN
Type
Description
Application
Super VLAN
Common
QinQ
Stacking
Application
Common
A VLAN with this attribute can be used as a layer 2 VLAN. You can create a
layer 3 virtual interface for the VLAN if necessary.
QinQ
When a packet is added with the tag of a VLAN with QinQ attribute, the packet
contains two VLAN tags: inner VLAN tag from the private network and outer
VLAN tag allocated by the UA5000. Through the outer VLAN tag, a layer 2
VPN tunnel can be set up to transparently transmit service data among private
networks. For details about the QinQ VLAN, see "26 Configuring the QinQ
VLAN Leased Line Access."
Stacking
When a packet is added with the tag of a VLAN with stacking attribute, the
packet contains two VLAN tags: inner VLAN tag and outer VLAN tag
allocated by the UA5000. By using this attribute, the upper layer BRAS can
authenticate users based on the double VLAN tags, thus increasing the number
of access users. The upper layer network working in layer 2 mode can forward
packets based on the outer "VLAN + MAC" to provide the multi-ISP wholesale
service. For details about the stacking VLAN, see "25 Configuring the VLAN
Stacking Wholesale Service."
53
5 Configuring a VLAN
Networking
Figure 5-1 shows an example network for configuring a smart VLAN.
Figure 5-1 Example network for configuring a smart VLAN
I
P
M
B
UA5000
0/3/0
C
C
C
S
R
B
S
S
R
R
B
0/7/0
0/7/1
PC1
PC2
Modem
Data Plan
Table 5-3 provides the data plan for configuring a smart VLAN.
Table 5-3 Data plan for configuring a smart VLAN
Item
Data
ADSL2+ board
ADSL2+ board
Smart VLAN
VLAN ID: 10
Uplink port
0/3/0
Prerequisite
l
Issue 01 (2011-07-30)
54
5 Configuring a VLAN
Configuration Flowchart
Figure 5-2 shows the flowchart for configuring a smart VLAN.
Figure 5-2 Flowchart for configuring a smart VLAN
Start
End
Procedure
Step 1 Create a smart VLAN.
huawei(config)#vlan 10 smart
----End
Result
After configuration, PC 1 and PC 2 can access the Internet, but they cannot ping each other.
55
5 Configuring a VLAN
Networking
Figure 5-3 shows an example network for configuring a MUX VLAN.
Figure 5-3 Example network for configuring a MUX VLAN
0/3/0
I
P
M
B
UA5000
C
S
R
B
C
C
S
S
R
R
B
0/7/1
0/7/0
Modem
Modem
PC2
PC1
Data Plan
Table 5-4 provides the data plan for configuring a MUX VLAN.
Table 5-4 Data plan for configuring a MUX VLAN
Item
Data
ADSL2+ board
ADSL2+ board
Uplink port
0/3/0
Prerequisite
l
Issue 01 (2011-07-30)
56
5 Configuring a VLAN
Configuration Flowchart
Figure 5-4 shows the flowchart for configuring a MUX VLAN.
Figure 5-4 Flowchart for configuring a MUX VLAN
Start
End
Procedure
Step 1 Create a MUX VLAN.
huawei(config)#vlan 20 mux
huawei(config)#vlan 21 mux
----End
Result
After configuration, PC 1 and PC 2 should be able to access the Internet, but they cannot ping
each other.
Issue 01 (2011-07-30)
57
5 Configuring a VLAN
Networking
Figure 5-5 shows an example network for configuring a super VLAN.
Figure 5-5 Example network for configuring a super VLAN
0/3/0
UA5000
C
C
C
S
S
R
R
B
I
P
M
B
S
R
B
0/7/0
0/9/0
Modem
Modem
PC3
PC1
Data Plan
Table 5-5 provides the data plan for configuring a super VLAN.
Table 5-5 Data plan for configuring a super VLAN
Item
Data
ADSL2+ board
ADSL2+ board
Issue 01 (2011-07-30)
58
5 Configuring a VLAN
Item
Data
Super VLAN
Prerequisite
l
The IP address of the layer 3 interface must be in the same network segment as the IP
address of the PC connecting to the interface. They cannot conflict with each other.
A super VLAN contains up to 480 sub VLANS. These sub VLANs share one layer 3
interface to communicate with each other, thus saving IP network segments.
If the control board is H601IPMD, the system does not support the super VLAN.
Configuration Flowchart
Figure 5-6 shows the flowchart for configuring a super VLAN.
Issue 01 (2011-07-30)
59
5 Configuring a VLAN
End
Procedure
Step 1 Create a super VLAN.
huawei(config)#vlan 100 super
Issue 01 (2011-07-30)
60
5 Configuring a VLAN
The IP address of the layer 3 interface of the super VLAN and the IP address obtained by the PC must be
in the same network segment.
Step 6 Enable ARP proxy for the layer 3 interface of the super VLAN.
huawei(config-if-vlanif100)#arp proxy enable
huawei(config-if-vlanif100)#arp proxy enable subvlan 20
huawei(config-if-vlanif100)#arp proxy enable subvlan 21
----End
Result
After the configuration, PC 1 and PC 3 should be able to communicate with each other and
access the Internet.
Prerequisite
The ID of the VLAN to be added does not exist in the system.
Context
There are up to 4000 configurable VLANs supported by the UA5000.
Procedure
Step 1 Run the vlan command to add a VLAN.
Step 2 Run the display vlan command to query VLAN information.
----End
Example
To add a standard VLAN with the VLAN ID of 2, do as follows:
huawei(config)#vlan 2 standard
huawei(config)#display vlan 2
{ <cr>|to<K> }:
VLAN ID: 2
VLAN type: standard
Issue 01 (2011-07-30)
61
5 Configuring a VLAN
:
:
:
:
enable
-
To add 10 standard VLANs whose VLAN IDs ranging from 1000 to 1009, do as follows:
huawei(config)#vlan 1000 to 1009 standard
It will take several minutes, and console may be timeout, please use command
idle-timeout to set time limit
Are you sure to add VLANs? (y/n)[n]:y
huawei#display vlan all
---------------------------------------------------------------------------VLAN Type
Attribute STND-Port SERV-Port MAC-Learn Max-MAC Up
Down
Num
Num
ability
Num
CAR ID CAR ID
---------------------------------------------------------------------------1 MUX
common
8
0
enable
off
1000 standard common
0
0
enable
1001 standard common
0
0
enable
1002 standard common
0
0
enable
1003 standard common
0
0
enable
1004 standard common
0
0
enable
1005 standard common
0
0
enable
1006 standard common
0
0
enable
1007 standard common
0
0
enable
1008 standard common
0
0
enable
1009 standard common
0
0
enable
---------------------------------------------------------------------------Total: 11
Note : STND-Port--standard port, SERV-Port--service virtual port
*--the vlan contain PVC connection
Related Operation
Table 5-6 lists the related operations for adding a VLAN.
Table 5-6 Related operations for adding a VLAN
To...
Run the
Command...
Remarks
Delete a VLAN
undo vlan
Query VLAN
information
display vlan
display statistics
vlan
62
5 Configuring a VLAN
Prerequisite
The VLAN whose attribute needs to be configured must exist and the VLAN must not contain
the configured service port.
Context
l
When the attribute of a smart VLAN or a MUX VLAN is common, you can configure the
attribute of the VLAN to QinQ or stacking. The attribute of a super VLAN and a standard
VLAN cannot be configured to QinQ or stacking.
The attribute of a VLAN cannot be directly changed from QinQ to stacking or from stacking
to QinQ.
Procedure
Step 1 Run the vlan attrib command to configure the VLAN attribute.
Step 2 Run the display vlan command to query the VLAN attribute.
----End
Example
To set the attribute of smart VLAN 10 to QinQ, do as follows:
huawei(config)#vlan attrib 10 q-in-q
huawei(config)#display vlan 10
VLAN ID: 10
VLAN type: smart
VLAN attribute: QinQ
VLAN MAC learning ability
: enable
VLAN max MAC learning number : VLAN up direction CAR ID
: VLAN down direction CAR ID
: Standard port number: 0
Related Operation
Table 5-7 lists the related operation for configuring the VLAN attribute.
Table 5-7 Related operation for configuring the VLAN attribute
To...
stacking label
63
5 Configuring a VLAN
Prerequisite
The VLAN to which an uplink port needs to be added must exist.
Context
The uplink port of a VLAN must be an Ethernet port.
Procedure
Step 1 Run the port vlan command to add an uplink port.
Step 2 Run the display vlan command to query VLAN information.
----End
Example
To add an uplink port 0/3/0 to VLAN 10, do as follows:
huawei(config)#port vlan 10 0/3 0
huawei(config)#display vlan 10
{<cr>|to<K>}:
Command:
display vlan 10
VLAN ID: 10
VLAN type: smart
VLAN attribute: common
VLAN description:
VLAN MAC learning ability
:
VLAN max MAC learning number :
VLAN up direction CAR ID
:
VLAN down direction CAR ID
:
-----------------------------F/ S/ P
Native VLAN State
-----------------------------0/3/0
1 down
-----------------------------Standard port number: 1
Service virtual port number: 0
enable
CAR off
-
Related Operation
Table 5-8 lists the related operation for adding an uplink port to a VLAN.
Table 5-8 Related operation for adding an uplink port to a VLAN
To...
64
5 Configuring a VLAN
Context
The standard VLAN and super VLAN do not support configuring the upstream CAR.
Procedure
Step 1 Run the vlan command to create a VLAN.
Step 2 Run the cartable command to create a CAR entry.
Step 3 Run the vlan car command to add an upstream CAR entry for a VLAN.
Step 4 Run the display vlan car command to query the VLAN that uses the configured CAR entry.
----End
Example
To configure an upstream CAR with ID 1 for MUX VLAN 2, do as follows:
huawei(config)#vlan 2 mux
huawei(config)#cartable up-direct carid 1
huawei(config)#vlan car 2 up-direct carid
huawei(config)#display vlan car up-direct
huawei(config)#display vlan car up-direct
VLAN list:
--------------------------------------2
--------------------------------------Total: 1
Related Operation
Table 5-9 lists the related operation for configuring an upstream CAR for a VLAN.
Table 5-9 Related operation for configuring an upstream CAR for a VLAN
To...
Prerequisite
l
The VLAN to which the service port needs to be added must exist.
Issue 01 (2011-07-30)
65
5 Configuring a VLAN
Context
l
The UA5000 supports single PVC for multiple services based on user VLANs and service
encapsulation types of the user.
In the case of the service port that supports single PVC for single service on the IPMB
board, the SHDSL port supports up to five service ports. The ADSL port on the master
shelf supports up to six service ports. The ADSL port on the slave shelf supports up to five
service ports.
In the case of the service port that supports single PVC for single service on the IPMD
board, the ADSL port and the VDSL2 port support up to eight service ports respectively.
The SHDSL port supports up to seven ports.
In the case of the service port that supports single PVC for multiple services, the ADSL
port and the SHDSL port support eight service ports respectively.
The UA5000 supports single PVC for multiple services based on the user-side 802.1p
priority.
When configuring the upstream and downstream traffic, ensure that the service types of
the upstream and downstream traffic entries are the same.
Procedure
Step 1 Run the service-port vlan command to add a service port.
Step 2 Run the display service-port vlan command to query a service port.
----End
Example
To add service port 0/7/0 with VPI/VCI 0/35 and traffic profile 5 to VLAN 10, do as follows:
huawei(config)#service-port vlan 10 adsl 0/7/0 vpi 0 vci 35 rx-cttr 5 tx-cttr 5
huawei(config)#display service-port port 0/7/0
-----------------------------------------------------------------------------VLAN VLANATTR PORT F/ S/ P VPI VCI FLOW
FLOW RX TX STATE
LABEL CHN
ID
TYPE
PARA
-----------------------------------------------------------------------------10 common
adl 0/7/0 0
35
5
5
act/up
- -----------------------------------------------------------------------------Total : 1 (Up/Down :
1/0)
Note : F--Frame, S--Slot, P--Port(or Virtual Port, such as IMA GROUP,
VLAN ID etc.), the VPI is access-end VLAN ID in EAU/GAU port
or PON ID in EPON port
Related Operation
Table 5-10 lists the related operations for adding a service port to a VLAN.
Issue 01 (2011-07-30)
66
5 Configuring a VLAN
Remarks
undo service-port
display vlan
Procedure
Step 1 Run the service-port desc command to configure the description information about a service
port.
Step 2 Run the display service-port desc command to query the description information about the
service port.
----End
Example
To configure the description information about service port 0/7/0 with VPI/VCI 0/35, do as
follows:
huawei(config)#service-port desc 0/7/0 vpi 0 vci 35 user0/7/0
huawei(config)#display service-port desc 0/7/0 vpi 0 vci 35
----------------------------------------------------------------------------F/ S/ P VPI
VCI FLOWTYPE FLOWPARA CHANNEL
----------------------------------------------------------------------------0/ 7/ 0
0
35 DESCRIPTION:user0/7/0
-----------------------------------------------------------------------------
Related Operation
Table 5-11 lists the related operation for configuring the description information about a service
port.
Issue 01 (2011-07-30)
67
5 Configuring a VLAN
Table 5-11 Related operation for configuring the description about a service port
To...
NOTE
Prerequisite
l
The VLAN to which a service port needs to be added must be added by running the vlan
command.
The service port to be activated must be in deact state, that is, the service port must be in
deactivated state.
NOTE
The newly created service port is in activated state by default and you cannot directly activate this
port. You must deactivate the port before activating it.
Context
l
Procedure
Step 1 Run the service-port vlan command to add a corresponding service port.
Step 2 Run the deactivate service-port command to deactivate a service port.
Step 3 Run the display service-port command to query a service port.
Step 4 Run the activate service-port command to activate a service port.
Step 5 Run the display service-port command to query a service port.
----End
Example
To add service port 0/7/0 to VLAN 10, set VPI/VCI to 0/35, set traffic entry 6 to be used in the
receive and transmit directions, and deactivate the service port, do as follows:
Issue 01 (2011-07-30)
68
5 Configuring a VLAN
Issue 01 (2011-07-30)
69
5 Configuring a VLAN
-----------------------------------------------------------------------------10 common
adl 0/ 7/ 0 0
35
6
6
act/up
- 10 common
adl 0/ 7/ 1 0
35
6
6
act/up
- 10 common
adl 0/ 7/ 2 0
35
6
6
act/up
- -----------------------------------------------------------------------------Total : 3 (Up/Down :
3/0)
Note : F--Frame, S--Slot, P--Port(or Virtual Port, such as IMA GROUP,
VLAN ID etc.), the VPI is access-end VLAN ID in EAU/GAU port
or PON ID in EPON port
Related Operation
Table 5-12 lists the related operations for activating or deactivating a service port.
Table 5-12 Related operations for activating or deactivating a service port
To...
Remarks
undo service-port
Issue 01 (2011-07-30)
display vlan
70
71
Issue 01 (2011-07-30)
72
Service Description
The Dynamic Host Configuration Protocol (DHCP) works in the server/client mode. The DHCP
client dynamically requests configuration data from the DHCP server and the DHCP server
provides the data for the client conveniently.
Initially, the DHCP protocol was suitable only for applications where the DHCP client and the
DHCP server were located in the same subnet. The DHCP client and the DHCP server could
not work across subnets. In this manner, each subnet must be equipped with a DHCP server.
This is very uneconomical. The introduction of DHCP relay solves this problem.
The UA5000 implements the DHCP relay function. The DHCP relay serves as relay between
the DHCP client and the server located in different subnets. As shown in Figure 6-1, the DHCP
packets can be relayed to the destination DHCP server (or client) across network segments. In
this manner, the DHCP clients on different networks can use the same DHCP server. This is
economical and facilitates centralized management.
Figure 6-1 UA5000 DHCP Relay
LAN
DHCP client
DHCP server
LAN switch
DHCP client
UA5000
DHCP server
DHCP client
For details on the DHCP, see "DHCP Relay" in the UA5000 Universal Access Unit Feature
Description.
Service Specifications
The UA5000 supports layer 2 and layer 3 DHCP relay, and DHCP Option82. This ensures DHCP
security.
NOTE
For the configuration of the DHCP Option82, see "16.4 Enabling the DHCP Option82 Function" and
"16.5 Setting the Maximum Length of a DHCP Packet."
Standard mode
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
73
Option60 mode
Prerequisite
Configure DHCP relay in standard mode to realize the dynamic allocation of IP addresses.
The standard mode refers to selecting a DHCP server from the DHCP server group bound with
a VLAN port. One VLAN port can be bound with one DHCP server group. All the DHCP packets
transmitted through the uplink of the VLAN port are relayed to the DHCP server group bound
with the VLAN port.
Networking
Figure 6-2 shows an example network for configuring the DHCP standard mode.
Figure 6-2 Example network for configuring the DHCP standard mode
10.1.1.1
DHCP Server 1
10.1.1.2
UA5000
LSW
10.2.1.1
DHCP Server 2
Modem
Modem
Modem
Modem
10.2.1.2
VLAN 3
VLAN 2
Networking Description
l
The two PCs in VLAN 2 obtain the IP addresses from DHCP server group 1 through the
DHCP standard mode.
The two PCs in VLAN3 obtain the IP addresses from DHCP server group 2 through the
DHCP standard mode.
Issue 01 (2011-07-30)
74
Data Plan
Table 6-1 provides the data plan for configuring the DHCP standard mode.
Table 6-1 Data plan for configuring the DHCP standard mode
Item
Data
Remarks
VLAN 2
VLAN 3
Uplink port
0/3/0
Service port
0/7/0,0/7/1
LAN switch:
For the
configuration of
the LAN switch,
refer to the
corresponding
configuration
guide.
Configuration Flowchart
NOTE
The configuration on VLAN 3 and VLAN 2 are the same. This topic describes how to configure PCs of
VLAN 2 to obtain the IP addresses.
Figure 6-3 shows the flowchart for configuring the DHCP standard mode.
Issue 01 (2011-07-30)
75
End
Procedure
Step 1 Select the DHCP relay mode.
huawei(config)#dhcp mode layer-3 standard
Step 3 Configure the VLAN uplink port and the service port.
huawei(config)#vlan 2 smart
huawei(config)#port vlan 2 0/3 0
huawei(config)#service-port vlan 2 adsl 0/7/0 vpi 0 vci 35 rx-cttr 6 tx-cttr 6
huawei(config)#service-port vlan 2 adsl 0/7/1 vpi 0 vci 35 rx-cttr 6 tx-cttr 6
Issue 01 (2011-07-30)
76
----End
Result
The PCs can obtain the IP addresses dynamically, and access the Internet.
Prerequisite
Network devices and lines are normal. The IP address of the layer 3 interface of a VLAN and
the IP address of the upper layer router are in the same network segment. A routing exists between
the UA5000 and a DHCP server.
Networking
Figure 6-4 shows an example network for configuring the DHCP option60 mode.
Figure 6-4 Example network for applying the DHCP option60 mode
1.1.1.10
DHCP Server 2
UA5000
LSW
Hub
1.1.1.11
Modem
Hub
VLAN 2
Data Plan
Table 6-2 provides the data plan for configuring the DHCP option60 mode.
Issue 01 (2011-07-30)
77
Table 6-2 Data plan for configuring the DHCP option60 mode
Item
Data
VLAN 2
Uplink port
0/3/0
Service port
0/7/0
Domain
LAN switch:
l The LAN switch must transparently transmit the service packets
of the MA5600.
l Configure the VLAN for the MA5600. The VLAN ID must be
consistent with the upstream VLAN of the MA5600.
Context
l
The name of the option60 domain should be configured according to the type of the
connected terminal devices.
If the DHCP client is of the Windows 98/2000/XP/NT series, the domain name must be
msft.
The system uses the longest match principle to match the configured domain according to
the option60 field of the packet. If a proper matching does not exist, the system processes
the domain according to the default domain.
Configuration Flowchart
Figure 6-5 shows the flowchart for configuring the DHCP option60 mode.
Issue 01 (2011-07-30)
78
End
Procedure
Step 1 Select the DHCP relay mode.
huawei(config)#dhcp mode layer-3 option-60
Issue 01 (2011-07-30)
79
Step 5 Configure the VLAN uplink port and the service port.
huawei(config-dhcp-domain-msft)#quit
huawei(config)#vlan 2 smart
huawei(config)#port vlan 2 0/3 0
huawei(config)#service-port vlan 2 adsl 0/7/0 vpi 0 vci 35 rx-cttr 6 tx-cttr 6
----End
Result
The PCs can obtain the IP addresses dynamically, and access the Internet.
Prerequisite
The IP address of VLAN layer 3 interface and the IP address of the upper router are in the same
network segment. A routing exists between the UA5000 and a DHCP server.
Networking
Figure 6-6 shows an example network for configuring the MAC address segment mode.
Figure 6-6 Example network for configuring the MAC address segment mode
1.1.1.10
DHCP Server 2
LSW
Hub
1.1.1.11
UA5000
Modem
PC
Issue 01 (2011-07-30)
80
Data Plan
Table 6-3 provides the data plan for configuring the MAC address segment mode.
Table 6-3 Data plan for configuring the MAC address segment mode
Item
Data
VLAN 2
Uplink port
0/3/0
Service port
0/7/0
0000-0000-0010
LAN switch:
l The LAN switch must transparently transmit the service
packets of the MA5600.
l Configure the VLAN for the MA5600. The VLAN ID must
be consistent with the upstream VLAN of the MA5600.
Configuration Flowchart
Figure 6-7 shows the flowchart for configuring the MAC address segment mode.
Issue 01 (2011-07-30)
81
Figure 6-7 Flowchart for configuring the MAC address segment mode
Start
End
Procedure
Step 1 Select the DHCP relay mode.
huawei(config)#dhcp mode layer-3 mac-range
Issue 01 (2011-07-30)
82
Step 4 Bind the MAC address segment with the DHCP server group.
huawei(config-mac-range-huawei)#dhcp-server 2
Step 5 Configure the VLAN uplink port and the service port.
huawei(config-mac-range-huawei)#quit
huawei(config)#vlan 2 smart
huawei(config)#port vlan 2 0/3 0
huawei(config)#service-port vlan 2 adsl 0/7/0 vpi 0 vci 35 rx-cttr 6 tx-cttr 6
Step 7 Set the gateway address for the MAC address segment.
huawei(config-if-vlanif2)#dhcp mac-range huawei gateway 10.1.2.1
----End
Result
The PCs can obtain the IP addresses dynamically, and access the Internet.
Context
l
To improve the reliability of a network, you can specify a primary DHCP server and a
secondary DHCP server in a server group to form a DHCP server group.
The primary server or the secondary server is identified by its IP address. The secondary
server cannot be added independently. Instead, it has to be added with the primary server.
Procedure
Step 1 Run the dhcp-server command to create a DHCP server group.
Step 2 Run the display dhcp-server command to query the information about a DHCP server group.
----End
Example
To create DHCP server group 1, in which the IP addresses of primary and secondary DHCP
servers are 10.1.1.1 and 10.1.1.2, do as follows:
huawei(config)#dhcp-server 1 ip 10.1.1.1 10.1.1.2
huawei(config)#display dhcp-server 1
The primary IP address of DHCP server group 1: 10.1.1.1
The secondary IP address of DHCP server group 1: 10.1.1.2
Messages from this server group: 0
Messages to this server group: 0
Messages from clients to this server group: 0
Issue 01 (2011-07-30)
83
Context
The UA5000 supports layer 2 and layer 3 DHCP relay. Layer 3 DHCP relay includes the
following:
l
DHCP standard mode: Select the DHCP server according to the IP address of the VLAN
layer 3 interface for forwarding DHCP packets.
DHCP option60 mode: Select the DHCP server according to the DHCP option60 domain.
Option60 is an option in DHCP packets. It can be used to identify a terminal type. DHCP
Option60 means that you can select the DHCP server according to different terminal types.
DHCP MAC address segment mode: Select the DHCP server group according to the source
MAC address segment of DHCP packets.
Procedure
Step 1 Run the dhcp mode command to set the DHCP working mode.
Step 2 Run the display dhcp config command to query the DHCP working mode.
----End
Example
To set the DHCP relay mode as layer 2, do as follows:
huawei(config)#dhcp mode layer-2
huawei(config)#display dhcp config
DHCP relay mode: layer-2
84
Prerequisite
The DHCP server group is created
Context
l
A VLAN layer 3 interface can be bound with only one DHCP server group. Therefore, all
the DHCP packets transmitted through the VLAN layer 3 interface are forwarded to the
DHCP server group bound with the VLAN interface.
If a layer 3 interface is bound with a DHCP server group, the new setting overwrites the
old setting.
Procedure
Step 1 Run the interface vlanif command to access VLANIF mode.
Step 2 Run the dhcp-server command to bind a DHCP server group.
Step 3 Run the display dhcp-server interface vlanif command to query the DHCP server group that
is bound with a VLAN interface.
----End
Example
To bind DHCP server group 1 to VLAN interface 2, do as follows:
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#dhcp-server 1
huawei(config-if-vlanif2)#quit
huawei(config)#display dhcp-server interface vlanif 2
The DHCP server group of this interface is 1
Related Operation
Table 6-4 lists the related operations for binding a DHCP server group with a VLAN interface.
Table 6-4 Related operations for binding a DHCP server group with a VLAN interface
To...
Remarks
undo dhcp-server
VLANIF mode
85
Context
l
If the DHCP domain that needs to be created exists, enter the domain configuration mode
directly. By default, the system has a DHCP option60 domain named default.
Procedure
Step 1 Run the dhcp domain command to create a domain.
NOTE
Running the dhcp domain command can also enter a created domain.
Example
To create a domain named msft, do as follows:
huawei(config)#dhcp domain msft
huawei(config-dhcp-domain-msft)#quit
huawei(config)#display dhcp domain
{ <cr>|string<S><Length 1-32> }:
Command:
display dhcp domain
-------------------------------------------------------------------Index Name
Server VLANIF Gateway
-group
-------------------------------------------------------------------0
default
none
none
none
1
msft
none
none
none
-------------------------------------------------------------------Total: 2
Related Operation
Table 6-5 lists the related operation for creating a DHCP option60 domain.
Table 6-5 Related operation for creating the DHCP option60 domain
To...
Remarks
86
Context
One DHCP domain can be bound to only one DHCP Server group.
Procedure
Step 1 Run the dhcp domain command to enter the domain mode.
Step 2 Run the dhcp-server command to bind a DHCP server group.
Step 3 Run the display dhcp domain command to query a DHCP server group.
----End
Example
To bind DHCP server group 1 with DHCP domain msft, do as follows:
huawei(config)#dhcp domain msft
huawei(config-dhcp-domain-msft)#dhcp-server 1
huawei(config-dhcp-domain-msft)#quit
huawei(config)#display dhcp domain msft
-------------------------------------------------------------------Index Name
Server VLANIF Gateway
-group
-------------------------------------------------------------------1
msft
1
none
none
--------------------------------------------------------------------
Related Operation
Table 6-6 lists the related operations for binding a DHCP server group with a DHCP option60
domain.
Table 6-6 Related operations for binding a DHCP server group with a DHCP option60 domain
To...
Remarks
undo dhcp-server
Context
l
A DHCP Option60 domain can be configured with only one gateway address.
By default, the gateway address of a domain is the IP address of the VLAN layer 3 interface.
Issue 01 (2011-07-30)
87
Procedure
Step 1 Run the interface vlanif command to enter the VLANIF mode.
Step 2 Run the dhcp domain gateway command to set the gateway address.
Step 3 Run the quit command to exit from the VLANIF mode.
Step 4 Run the display dhcp domain command to query a DHCP server group.
----End
Example
To set the gateway address of domain msft as 10.1.2.1, do as follows:
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#dhcp domain msft gateway 10.1.2.1
huawei(config-if-vlanif2)#quit
huawei(config)#display dhcp domain msft
-------------------------------------------------------------------Index Name
Server VLANIF Gateway
-group
-------------------------------------------------------------------1
msft
1
2
10.1.2.1
--------------------------------------------------------------------
Related Operation
Table 6-7 lists the related operation for configuring the gateway of a DHCP Option60 domain.
Table 6-7 Related operation for configuring the gateway of a DHCP option60 domain
To...
Remarks
VLANIF mode
Prerequisite
l
By default, a MAC address segment named default must exist in the system.
Context
The system supports up to 128 MAC address segments.
Issue 01 (2011-07-30)
88
Procedure
Step 1 Run the dhcp mac-range command to create a DHCP MAC address segment and enter the
MAC address segment mode.
Step 2 Run the display dhcp mac-range command to query a MAC address segment.
----End
Example
To create a MAC address segment named huawei, do as follows:
huawei(config)#dhcp mac-range huawei
huawei(config-mac-range-huawei)#quit
huawei(config)#display dhcp mac-range
{ <cr>|string<S><Length 1-32> }:
Command:
display dhcp mac-range
-----------------------------------------------------------------------------Index Name
MAC-start
MAC-end
Server VLAN Gateway
-group -IF
-----------------------------------------------------------------------------0
default
none
none
none
none none
1
huawei
none
none
none
none none
-----------------------------------------------------------------------------Total: 2
Related Operation
Table 6-8 lists the related operation for creating a DHCP MAC address segment.
Table 6-8 Related operation for creating a DHCP MAC address segment
To...
Remarks
Context
l
A MAC address segment is a consecutive MAC address array specified by a start MAC
address and an end MAC address.
The MAC address adopts the format of "H-H-H" ("H" is a four-bit hexadecimal number).
Procedure
Step 1 Run the dhcp mac-range command to create a MAC address segment and enter MAC address
segment mode.
Issue 01 (2011-07-30)
89
Step 2 Run the mac-range command to set the range of a MAC address segment.
Step 3 Run the quit command to exit from the MAC address segment mode.
Step 4 Run the display dhcp mac-range command to query the range of a MAC address segment.
----End
Example
To set the range of MAC address segment huawei from 0000-0000-0001 to 0000-0000-0100,
do as follows:
huawei(config)#dhcp mac-range huawei
huawei(config-mac-range-huawei)#mac-range 0000-0000-0001 to 0000-0000-0100
huawei(config-mac-range-huawei)#quit
huawei(config)#display dhcp mac-range
{ <cr>|string<S><Length 1-32> }:
Command:
display dhcp mac-range
-----------------------------------------------------------------------------Index Name
MAC-start
MAC-end
Server VLAN Gateway
-group -IF
-----------------------------------------------------------------------------0
default
none
none
none
none none
1
huawei
0000-0000-0001 0000-0000-0100 none
none none
-----------------------------------------------------------------------------Total: 2
Related Operation
Table 6-9 lists the related operation for setting the range of a DHCP MAC address segment
Table 6-9 Related operation for setting the range of a DHCP MAC address segment
To...
Remarks
undo mac-range
Context
A MAC address segment can be bound with only one DHCP server group.
Issue 01 (2011-07-30)
90
Procedure
Step 1 Run the dhcp mac-range command to create a MAC address segment and enter MAC address
segment mode.
Step 2 Run the dhcp-server command to bind a DHCP server group.
Step 3 Run the quit command to quit from MAC address segment mode.
Step 4 Run the display dhcp mac-range command to query the information about a MAC address
segment.
----End
Example
To bind MAC address segment huawei with server group 10, do as follows:
huawei(config)#dhcp mac-range huawei
huawei(config-mac-range-huawei)#dhcp-server 10
huawei(config-mac-range-huawei)#quit
hauwei(config)#display dhcp mac-range
{ <cr>|string<S><Length 1-32> }:
Command:
display dhcp mac-range
-----------------------------------------------------------------------------Index Name
MAC-start
MAC-end
Server VLAN Gateway
-group -IF
-----------------------------------------------------------------------------0
default
none
none
none
none none
1
huawei
none
none
10
none none
-----------------------------------------------------------------------------Total: 2
Related Operation
Table 6-10 lists the related operation for binding a DHCP server group with a DHCP MAC
address segment.
Table 6-10 Related operation for binding a DHCP server group with a DHCP MAC address
segment
To...
undo dhcp-server
Context
A DHCP MAC address segment can be configured with only one gateway address.
Issue 01 (2011-07-30)
91
Procedure
Step 1 Run the interface vlanif command to enter the VLANIF mode.
Step 2 Run the dhcp mac-range gateway command to configure the gateway address.
Step 3 Run the quit command to exit from the VLANIF mode.
Step 4 Run the display dhcp mac-range command to query the information about the gateway address.
----End
Example
To set the gateway address of MAC address segment huawei to 10.1.2.1, do as follows:
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#dhcp mac-range huawei gateway 10.1.2.1
huawei(config-if-vlanif2)#quit
huawei(config)#display dhcp mac-range huawei
-----------------------------------------------------------------------------Index Name
MAC-start
MAC-end
Server VLAN Gateway
-group -IF
-----------------------------------------------------------------------------0
huawei
none
none
none
2
10.1.2.1
------------------------------------------------------------------------------
Related Operation
Table 6-11 lists the related operations for setting the gateway of a DHCP MAC address segment.
Table 6-11 Related operations for setting the gateway of a DHCP MAC address segment
Issue 01 (2011-07-30)
To...
Remarks
undo dhcp-server
92
Issue 01 (2011-07-30)
93
Service Description
Before two hosts in a network communicate with each other, they must know the physical
addresses of each host, that is, the MAC addresses. The IP address represents only the address
of a host at the network layer. To send the data at the network layer to a destination host, the
source host must know the physical address of the destination host. Therefore, the IP address
must be translated into a MAC address.
Address Resolution Protocol (ARP) is used to translate an IP address into a MAC address.
For details on the ARP Proxy feature, see "ARP Proxy" in the UA5000 Universal Access Unit
Feature Description.
Service Specifications
The UA5000 supports the ARP protocol and maintains an ARP table for the mapping between
the MAC addresses and the IP addresses. The UA5000 enables you to configure the static ARP
entries. The system supports up to 500 static ARP entries and 2048 dynamic ARP entries.
Prerequisite
l
Networking
Figure 7-1 shows an example network for configuring ARP proxy.
Issue 01 (2011-07-30)
94
Router
UA5000
PC1
PC2
PC3
Data Plan
Table 7-1 provides the data plan for configuring ARP proxy.
Table 7-1 Data plan for configuring ARP proxy
Item
Data
Super VLAN
Sub VLAN
VLAN ID: 10
VLAN type: smart VLAN
Users:
PC1 (0/7/0)
PC2 (0/7/1)
Sub VLAN
VLAN ID: 20
VLAN type: MUX VLAN
User: PC3 (0/8/0)
Uplink port
Port:0/3/0
VLAN: standard VLAN 30
IP address: 10.0.1.254/24
Issue 01 (2011-07-30)
95
Configuration Flowchart
Figure 7-2 shows the flowchart for configuring ARP proxy.
Figure 7-2 Flowchart for configuring ARP proxy
Start
End
Procedure
Step 1 Create a super VLAN.
huawei(config)#vlan 100 super
96
huawei(config)#vlan 30 standard
huawei(config)#port vlan 30 0/3 0
huawei(config)#interface vlanif 30
huawei(config-if-vlanif30)#ip address 10.0.1.254 24
The IP address of the layer 3 interface of the super VLAN must be in the same network segment as the IP
address obtained by the PC.
2.
Enable ARP Proxy for the layer 3 interface of the super VLAN.
huawei(config)#interface vlanif 100
huawei(config-if-vlanif100)#arp proxy enable
3.
Skip substep 3 in step 6 if you only want PCs in different VLANs to communicate with each other.
----End
Result
After the global ARP proxy function and the ARP proxy function of the super VLAN interface
are enabled, PC 1 and PC 3 in different VLANs can communicate with each other.
After the global ARP proxy function, the ARP proxy function of the super VLAN interface, and
that of the sub VLAN interface are enabled, PC 1 and PC 2 in the same sub VLAN can
communicate with each other.
Context
l
The ARP mapping table is used for address resolution only in a LAN.
Procedure
Step 1 Run the arp command to configure a static ARP entry.
Issue 01 (2011-07-30)
97
Step 2 Run the display arp static command to query the configured static ARP entry.
----End
Example
To add a static ARP entry to set up the mapping between the IP address 129.102.0.1 and the
MAC address 00e0-fc01-0000, passing through port 0/7/0 of VLAN 10, do as follows:
huawei(config)#arp 129.102.0.1 00e0-fc01-0000 10 0/7/0
huawei(config)#display arp static
IP Address
MAC Address
VLAN ID
Port
129.102.0.1
00e0-fc01-0000
10
0/7/0
--1 entry found
---
Type
Static
Related Operation
Table 7-2 lists the related operations for configuring a static ARP entry.
Table 7-2 Related operations for configuring a static ARP entry
To...
Run the
Command...
Remarks
Delete an ARP
entry
undo arp
Clear an ARP
entry
reset arp
Context
l
By default, the ARP proxy is disabled. If the hosts connected to a VLAN interface need to
communicate with each other, you should enable the global ARP proxy and the ARP proxy
on this VLAN interface.
On a super VLAN interface, enable the ARP proxy, thus enabling the proxy between the
sub VLANs of the super VLAN interface. To enable the ARP proxy between hosts in a sub
VLAN, enable the ARP proxy for the specified sub VLAN.
Procedure
Step 1 Run the arp proxy command to enable the ARP proxy.
Step 2 Run the display arp proxy command to query the configuration of ARP proxy.
----End
Issue 01 (2011-07-30)
98
Example
To enable the global ARP proxy, do as follows:
huawei(config)arp proxy enable
huawei(config)#display arp proxy
Global arp proxy is enabled
Related Operation
Table 7-3 lists the related operation for enabling the ARP proxy.
Table 7-3 Related operation for enabling the ARP proxy
Issue 01 (2011-07-30)
To...
99
100
Issue 01 (2011-07-30)
101
Service Description
The routing protocols described in this topic are as follows:
l
Static route: a special type of route that is manually configured by a network administrator.
Static routes are used on small networks with a simple topology that does not change
frequently.
Routing Information Protocol (RIP): a routing protocol that is based on the Vector-Distance
(V-D) algorithm.
Open Shortest Path First (OSPF): a dynamic routing protocol running inside an autonomous
system (AS). OSPF detects and forwards the routing information by collecting and
forwarding the link status of an AS.
For detailed information about the routing protocol, see "Routing" in the UA5000 Universal
Access Unit Feature Description.
Service Specifications
When a routing protocol is running on the UA5000, the UA5000 can work as a router. The
UA5000 supports the following routing protocols:
l
The UA5000 manages static and dynamic routes in a centralized manner to share the routing
information. The system supports manual configuration of up to 1024 static routing entries.
Networking
Figure 8-1 shows an example networking for configuring the static route.
Issue 01 (2011-07-30)
102
1.1.5.2/24
1.1.3.1/24
1.1.2.2/24
1.1.3.2/24
1.1.2.1/24
UA5000_C
1.1.1.2/24
1.1.4.2/24
UA5000_A
UA5000_B
PC_A
1.1.1.1
PC_B
1.1.4.1
UA5000_A, UA5000_B and UA5000_C have the routing function. After the configuration, any
two PCs should be able to communicate with each other.
Data Plan
Table 8-1 provides the data plan for configuring the static route.
Table 8-1 Data plan for configuring the static route
Item
Data
UA5000_A
PC_A
IP address: 1.1.1.1/24
UA5000_B
Issue 01 (2011-07-30)
103
Item
Data
PC_B
IP address: 1.1.4.1/24
UA5000_C
PC_C
IP address: 1.1.5.1/24
Context
Configure a native VLAN of the layer 3 interface of each UA5000 to ensure normal
communication.
Configuration Flowchart
Figure 8-2 shows the flowchart for configuring the static route.
Figure 8-2 Flowchart for configuring the static route
Start
Configure the IP address
of the layer 3 interface
Configure static routes
Configure the host
gateways
Save the data
End
NOTE
To configure static routes on one device, follow the procedure shown in the preceding flowchart. To
configure static routes on multiple devices, repeat the procedure according to the actual network.
Issue 01 (2011-07-30)
104
Procedure
Step 1 Configure the IP address of the layer 3 interface. The configurations for the three devices are
the same. In this case, UA5000_A is considered as an example.
huawei(config)#vlan 2 smart
huawei(config)#port vlan 2 0/3 0
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#ip address 1.1.2.1 24
huawei(config-if-vlanif2)#ip address 1.1.1.2 24 sub
2.
3.
2.
3.
----End
Result
After the configuration, an interconnection can be set up between all the hosts and UA5000s.
Networking
Figure 8-3 shows an example network for configuring RIP.
Issue 01 (2011-07-30)
105
Loopback0
192.0.2.1/24 Ethernet0/3/0
192.0.3.1/24
Ethernet0/3/0
192.0.3.2/24
UA5000_A
Ethernet0/3/0
192.0.1.1/24
UA5000_B
Ethernet0/3/1
192.0.1.2/24
Ethernet
Data Plan
The RIP runs on UA5000_A, UA5000_B and UA5000_C. The convergence time must be within
30s.
Table 8-2 provides the data plan for configuring RIP.
Table 8-2 Data plan for configuring RIP
Item
Data
UA5000_A
UA5000_B
l On UA5000_C side
Uplink port: 0/3/0
IP address of the layer 3 interface: 192.0.3.1/24
l On Ethernet side
Uplink port: 0/3/1
IP address of the layer 3 interface: 192.0.1.2/24
VLAN ID: 2
UA5000_C
Issue 01 (2011-07-30)
106
Context
All the interfaces of the UA5000 are in the same VLAN. If the interfaces of each UA5000 are
in different VLANs, configure a native VLAN of the layer 3 interface of each device to ensure
normal communication.
Configuration Flowchart
NOTE
The following configuration flowchart shows the operations on one device. You can repeat the operations
on multiple devices that are to be configured with the RIP function according to the actual network.
End
Procedure
Step 1 Configure UA5000_A.
1.
2.
3.
Issue 01 (2011-07-30)
107
huawei(config-if-loopback0)#quit
huawei(config)#rip
huawei(config-rip-1)#network 192.0.1.0
huawei(config-rip-1)#network 192.0.2.0
4.
Set the RIP clock of UA5000_A. Set the update time as 10s, age time as 30s, suppress time
as 0s, and Garbage-collect time as 40s.
huawei(config-rip-1)#timers rip 10 30 0 40
5.
2.
3.
Set the RIP clock of UA5000_B. Set the update time as 10s, age time as 30s, suppress time
as 0s, and Garbage-collect time as 40s.
huawei(config-rip-1)#timers rip 10 30 0 40
4.
2.
3.
Set the RIP clock of UA5000_C. Set the update time as 10s, age time as 30s, suppress time
as 0s, and Garbage-collect time as 40s.
huawei(config-rip-1)#timers rip 10 30 0 40
4.
----End
Result
l
Issue 01 (2011-07-30)
On UA5000_B and UA5000_C, run the display ip routing-table protocol rip command
and you can find the route 192.0.2.0/24.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
108
Before adjusting the timer, shut down Ethernet port 0/3/0 of UA5000_A. and you can find
that route 192.0.2.0/24 of UA5000_B and UA5000_C becomes unreachable in 30s.
After adjusting the timer, do not shut down Ethernet port 0/3/0 of UA5000_A and you can
find that the route recovers within 30s. That is, the convergence time of the RIP network
decreases.
Networking
Figure 8-5 shows an example network for configuring OSPF.
Figure 8-5 Example network for configuring OSPF
UA5000_A
1.1.1.1
UA5000_D
4.4.4.4
DR
192.1.1.1/24
192.1.1.4/24
192.1.1.2/24
192.1.1.3/24
BDR
UA5000_B
2.2.2.2
UA5000_C
3.3.3.3
Data Plan
Table 8-3 provides the data plan for configuring OSPF.
Table 8-3 Data plan for configuring OSPF
Item
Data
UA5000_A
UA5000_B
Issue 01 (2011-07-30)
109
Item
Data
VLAN ID: 2
Router ID: 2.2.2.2
UA5000_C
UA5000_D
Context
l
Configure a native VLAN on the layer 3 interface of each UA5000 to ensure normal
communication.
Configuration Flowchart
Figure 8-6 shows the flowchart for configuring OSPF.
Figure 8-6 Flowchart for configuring OSPF
Start
Configure the IP address
of the layer 3 interface
Configure the OSPF
router ID
Enable OSPF
End
Issue 01 (2011-07-30)
110
NOTE
Follow the procedure shown in the preceding flowchart to configure OSPF on one device. You can repeat
the procedure to configure OSPF on multiple devices according to the actual network.
Procedure
Step 1 Configure UA5000_A.
1.
2.
3.
4.
5.
2.
3.
4.
5.
111
huawei(config)#vlan 2 mux
huawei(config)#port vlan 2 0/3 0
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#ip address 192.1.1.3 24
huawei(config-if-vlanif2)#quit
2.
3.
4.
5.
2.
3.
4.
----End
Result
Run the display ip routing-table command and you can find the routing table that is learnt. The
hosts can communicate with each other.
Networking
Figure 8-7 shows an example network for configuring the route policy. UA5000_A and
UA5000_B have the routing function.
Issue 01 (2011-07-30)
112
UA5000_A
1.1.1.1
Vlanif2
10.0.0.2/24
Area 0
UA5000_B
2.2.2.2
Data Plan
Table 8-4 provides the data plan for configuring the route policy.
Table 8-4 Data plan for configuring the route policy
Item
Data
UA5000_A
UA5000_B
Configuration Flowchart
Figure 8-8 shows the flowchart for configuring the route policy.
Issue 01 (2011-07-30)
113
Device B
Start
Start
End
End
NOTE
Follow the procedure shown in the preceding flowchart to configure the route policy on one device. You
can repeat the operations on multiple devices that are to be configured with the route policy according to
the actual network.
Procedure
Step 1 Configure UA5000_A.
1.
2.
Enable OSPF for UA5000_A and specify the ID of the area to which the interface belongs.
huawei(config)#ospf
huawei(config-ospf-1)#area 0
huawei(config-ospf-1-area-0.0.0.0)#network 10.0.0.0 0.0.0.255
huawei(config-ospf-1-area-0.0.0.0)#quit
huawei(config-ospf-1)#quit
3.
4.
5.
Issue 01 (2011-07-30)
Import the static routes in OSPF to improve the capability of obtaining routes.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
114
huawei(config)#ospf
hawei(config-ospf-1)#import-route static
hawei(config-ospf-1)#quit
6.
2.
3.
Enable OSPF for UA5000_B and specify the ID of the area to which the interface belongs.
huawei(config)#ospf
huawei(config-ospf-1)#area 0
huawei(config-ospf-1-area-0.0.0.0)#network 10.0.0.0 0.0.0.255
huawei(config-ospf-1-area-0.0.0.0)#quit
huawei(config-ospf-1)#quit
4.
5.
6.
----End
Result
1.
OSPF should be able to run on UA5000_A and UA5000_B in the normal state, and
UA5000_A and UA5000_B should be able to communicate with each other.
2.
After the route filtering rules are configured on UA5000_B, two of the three imported static
routes are available, but one of them is screened. Routes from segments 20.0.0.0 and
40.0.0.0 are available, but the route from segment 30.0.0.0 is screened.
Prerequisite
The IP address is configured for the layer 3 interface.
Context
l
Issue 01 (2011-07-30)
115
When configuring a static route, specify the transmit interface or the next hop IP address
if necessary. In the case a port supporting ARP or a port connecting to a point-to-point
network, the destination IP address is in the network that connects to the port directly. In
this case, you need to specify the transmit interface.
A route with the destination IP address and network mask as 0.0.0.0 is the default route. If
a matching route is not found in the routing table for an IP packet, the packet is forwarded
through the default route.
Procedure
Step 1 Run the ip route-static command to add a static route.
Step 2 Run the display ip routing-table command to query a static route.
----End
Example
To set up a static route to subnet 10.71.8.0 through gateway 10.71.53.1, do as follows:
huawei(config)#ip route-static 10.71.8.0 255.255.255.0 10.71.53.1
huawei(config)#display ip routing-table protocol static
{ <cr>|inactive<K>|verbose<K> }:
Command:
display ip routing-table protocol static
Total static routes configed in Public routing table: 3
Public routing table : Static
Destinations : 3
Routes : 3
Proto
Pre
Static 60
Static 60
Static 60
Cost
NextHop
0
0
0
10.71.53.1
10.71.8.0
10.71.8.0
Interface
To configure such a route with the destination IP address and network mask of 0.0.0.0 and the
next ho IP address of 129.102.0.2, do as follows:
Issue 01 (2011-07-30)
116
Proto
Pre
Static 60
Cost
NextHop
Interface
10.144.78.1
meth0
Proto
Pre
Static 60
Static 60
Cost
NextHop
0
0
129.102.0.2
10.71.53.1
Interface
Related Operation
Table 8-5 lists the related operation for adding a static route.
Table 8-5 Related operation for adding a static route
To...
undo ip route-static
Context
To configure the global parameters of RIP, you need to enable RIP. You do not have to comply
with this, however, when configuring the interface related parameters.
Procedure
Step 1 Run the rip command to start the RIP process.
Step 2 Run the quit command to quit the RIP mode.
Step 3 Run the display rip command to query a RIP route.
----End
Issue 01 (2011-07-30)
117
Example
To enable RIP process 1, do as follows:
huawei(config)#rip 1
huawei(config-rip-1)#quit
huawei(config)#display rip 1
Public VPN-instance name :
RIP process : 1
RIP version : RIP-1 compatibility
Preference : 100
Checkzero : Enabled
Default-cost : 0
Summary : Enabled
Hostroutes : Enabled
Maximum number of balanced paths : 1
Update time
: 35 sec Age time : 170 sec
Suppress time : 0 sec
Garbage-collect time : 240 sec
Silent interfaces : None
Default routes : Disabled
Verify-source : Enabled
Networks : None
Configured peers : None
Triggered updates sent : 0
Number of route changes : 0
Number of replies to queries : 0
Related Operation
Table 8-6 lists the related operation for enabling RIP process.
Table 8-6 Related operation for enabling RIP process
To...
undo rip
Context
l
By default, the system transmits and sends packets in the RIP-1 format.
Procedure
Step 1 Run the rip command to enable the RIP process.
Step 2 Run the version command to configure the version of RIP.
Step 3 Run the quit command to quit the RIP mode.
Step 4 Run the display rip command to query the version information of RIP.
----End
Issue 01 (2011-07-30)
118
Example
To set the format of packets to RIP-2, do as follows:
huawei(config)#rip 1
huawei(config-rip-1)#version 2
huawei(config-rip-1)#quit
huawei(config)#display rip 1
Public VPN-instance name :
RIP process : 1
RIP version : RIP-2
Preference : 100
Checkzero : Enabled
Default-cost : 0
Summary : Enabled
Hostroutes : Enabled
Maximum number of balanced paths : 1
Update time
: 30 sec Age time : 180 sec
Suppress time : 0 sec
Garbage-collect time : 120 sec
Silent interfaces : None
Default routes : Disabled
Verify-source : Enabled
Networks : None
Configured peers : None
Triggered updates sent : 0
Number of route changes : 0
Number of replies to queries : 0
Related Operation
Table 8-7 lists the related operation for configuring the version of RIP.
Table 8-7 Related operation for configuring the version of RIP
To...
undo version
Context
If the field is not zero, RIP does not process the packet.
Procedure
Step 1 Run the rip command to enable RIP process.
Step 2 Run the checkzero command to configure zero field check for RIP-1 packets.
Step 3 Run the quit command to quit the RIP mode.
Step 4 Run the display rip command to query the configuration information about zero field check.
----End
Issue 01 (2011-07-30)
119
Example
To configure zero field check for RIP-1 packets, do as follows:
huawei(config)#rip 1
huawei(config-rip-1)#checkzero
huawei(config-rip-1)#quit
huawei(config)#display rip 1
Public VPN-instance name :
RIP process : 1
RIP version : RIP-2
Preference : 100
Checkzero : Enabled
Default-cost : 0
Summary : Enabled
Hostroutes : Enabled
Maximum number of balanced paths : 1
Update time
: 35 sec Age time : 170 sec
Suppress time : 0 sec
Garbage-collect time : 240 sec
Silent interfaces : None
Default routes : Disabled
Verify-source : Enabled
Networks : None
Configured peers : None
Triggered updates sent : 0
Number of route changes : 0
Number of replies to queries : 0
Related Operation
Table 8-8 lists the related operation for configuring zero field check for RIP-1 packets.
Table 8-8 Related operation for configuring zero field check for RIP-1 packets
To...
undo checkzero
Procedure
Step 1 Run the rip command to enable the RIP process.
Step 2 Run the default-route originate command to create a default route and configure its cost.
Step 3 Run the quit command to quit the RIP mode.
Step 4 Run the display rip command to query the configured cost of the default route.
----End
Example
To create a default route and configure its cost to 5, do as follows:
huawei(config)#rip 1
Issue 01 (2011-07-30)
120
Related Operation
Table 8-9 lists the related operation for configuring the cost of the default route.
Table 8-9 Related operation for configuring the cost of the default route
To...
Context
Route aggregation involves combining routes of different subnets into one route. Route
aggregation helps to reduce the routing traffic in the network and the size of the routing table.
Procedure
Step 1 Run the rip command to start the RIP process.
Step 2 Run the summary command to enable route aggregation.
Step 3 Run the quit command to quit the RIP mode.
Step 4 Run the display rip command to query the configuration of default route aggregation.
----End
Example
To enable the route aggregation, do as follows:
huawei(config)#rip 1
Issue 01 (2011-07-30)
121
huawei(config-rip-1)#summary
huawei(config-rip-1)#quit
huawei(config)#display rip 1
Public VPN-instance name :
RIP process : 1
RIP version : RIP-2
Preference : 100
Checkzero : Enabled
Default-cost : 0
Summary : Enabled
Hostroutes : Enabled
Maximum number of balanced paths : 1
Update time
: 35 sec Age time : 170 sec
Suppress time : 0 sec
Garbage-collect time : 240 sec
Silent interfaces : None
Default routes : Enabled Default route cost : 5
Verify-source : Enabled
Networks : None
Configured peers : None
Triggered updates sent : 0
Number of route changes : 0
Number of replies to queries : 0
Related Operation
Table 8-10 lists the related operation for configuring route aggregation.
Table 8-10 Related operation for configuring route aggregation
To...
undo summary
Procedure
Step 1 Run the rip command to start the RIP process.
Step 2 Run the default-cost command to set the default routing metric.
Step 3 Run the quit command to quit the RIP mode.
Step 4 Run the display rip command to query the configuration information about the default routing
metric.
----End
Example
To set the default routing metric as 10, do as follows:
huawei(config)#rip 1
huawei(config-rip-1)#default-cost 10
huawei(config-rip-1)#quit
huawei(config)#display rip 1
Public VPN-instance name :
Issue 01 (2011-07-30)
122
RIP process : 1
RIP version : RIP-2
Preference : 100
Checkzero : Enabled
Default-cost : 10
Summary : Enabled
Hostroutes : Enabled
Maximum number of balanced paths : 1
Update time
: 35 sec Age time : 170 sec
Suppress time : 0 sec
Garbage-collect time : 240 sec
Silent interfaces : None
Default routes : Enabled Default route cost : 5
Verify-source : Enabled
Networks : None
Configured peers : None
Triggered updates sent : 0
Number of route changes : 0
Number of replies to queries : 0
Related Operation
Table 8-11 lists the related operation for specifying the default routing metric.
Table 8-11 Related operation for specifying the default routing metric
To...
undo default-cost
Context
To enhance the routing function, the UA5000 allows RIP to import routes of other protocols.
By importing routes (including direct routes, static routes and OSPF routes) of other protocols
into RIP packets on a certain metric and sending the RIP packets, the UA5000 improves the
capability of RIP to obtain routes and enhances the performance of RIP.
Procedure
Step 1 Run the rip command to start the RIP process.
Step 2 Run the import-route command to import routes of other protocols.
----End
Example
To import static routes, do as follows:
huawei(config)#rip 1
huawei(config-rip-1)#import-route static
Issue 01 (2011-07-30)
123
Related Operation
Table 8-12 lists the related operation for importing routes of other protocols.
Table 8-12 Related operation for importing routes of other protocols
To...
undo import-route
Context
By default, receiving host routes is enabled.
Procedure
Step 1 Run the rip command to start the RIP process.
Step 2 Run the undo host-route command to prohibit the system from receiving other host routes.
Step 3 Run the quit command to quit the RIP mode.
Step 4 Run the display rip command to query the configuration information of a host route.
----End
Example
To prohibit the system from receiving other host routes, do as follows:
huawei(config)#rip 1
huawei(config-rip-1)#undo host-route
huawei(config-rip-1)#quit
huawei(config)#display rip 1
Public VPN-instance name :
RIP process : 1
RIP version : RIP-2
Preference : 100
Checkzero : Enabled
Default-cost : 10
Summary : Enabled
Hostroutes : Disabled
Maximum number of balanced paths : 1
Update time
: 35 sec Age time : 170 sec
Suppress time : 0 sec
Garbage-collect time : 240 sec
Silent interfaces : None
Default routes : Enabled Default route cost : 5
Verify-source : Enabled
Networks : None
Configured peers : None
Triggered updates sent : 0
Issue 01 (2011-07-30)
124
Related Operation
Table 8-13 lists the related operation for disabling host routes receiving.
Table 8-13 Related operation for disabling host routes receiving
To...
host-route
Context
l
Each kind of IGP routing protocol has its own priority. The route policy selects the route
of the routing protocol with the highest priority as the optimal route.
Procedure
Step 1 Run the rip command to start the RIP process.
Step 2 Run the preference command to set the RIP priority.
Step 3 Run the quit command to quit the RIP mode.
Step 4 Run the display rip command to query the configuration information about the RIP priority.
----End
Example
To set the RIP priority as 120, do as follows:
huawei(config)#rip 1
huawei(config-rip-1)#preference 120
huawei(config-rip-1)#quit
huawei(config)#display rip 1
Public VPN-instance name :
RIP process : 1
RIP version : RIP-2
Preference : 120
Checkzero : Enabled
Default-cost : 10
Summary : Enabled
Hostroutes : Disabled
Maximum number of balanced paths : 1
Update time
: 35 sec Age time : 170 sec
Suppress time : 0 sec
Garbage-collect time : 240 sec
Silent interfaces : None
Default routes : Enabled Default route cost : 5
Issue 01 (2011-07-30)
125
Verify-source : Enabled
Networks : None
Configured peers : None
Triggered updates sent : 0
Number of route changes : 0
Number of replies to queries : 0
Related Operation
Table 8-14 lists the related operation for configuring the RIP priority.
Table 8-14 Related operation for configuring the RIP priority
To...
undo preference
Context
The route filtering can be performed based on the ACL, IP-prefix list of the system, or the IPprefix of the VLAN interface. Routes that fail to meet the filtering rules should not be received
or sent.
Procedure
Step 1 Run the rip command to start the RIP process.
Step 2 Run the filter-policy ip-prefix export static command to configure the route filtering policy.
----End
Example
To filter the transmitted RIP routing updates based on the IP-prefix list abc, do as follows:
huawei(config)#rip 1
huawei(config-rip-1)#filter-policy ip-prefix abc export static
Related Operation
Table 8-15 lists the related operation for configuring the route filtering policy.
Table 8-15 Related operation for configuring the route filtering policy
Issue 01 (2011-07-30)
To...
undo filter-policy
126
Context
In general, do not disable this function.
Procedure
Step 1 Run the rip command to start the RIP process.
Step 2 Run the verify-source command to verify the source IP address of a RIP route update.
Step 3 Run the quit command to quit the RIP mode.
Step 4 Run the display rip command to query the configuration information.
----End
Example
To enable the verification on the source IP address of a RIP route update, do as follows:
huawei(config)#rip 1
huawei(config-rip-1)#verify-source
huawei(config-rip-1)#quit
huawei(config)#display rip 1
Public VPN-instance name :
RIP process : 1
RIP version : RIP-2
Preference : 120
Checkzero : Enabled
Default-cost : 10
Summary : Enabled
Hostroutes : Disabled
Maximum number of balanced paths : 1
Update time
: 35 sec Age time : 170 sec
Suppress time : 0 sec
Garbage-collect time : 240 sec
Silent interfaces : None
Default routes : Enabled Default route cost : 5
Verify-source : Enabled
Networks : None
Configured peers : None
Triggered updates sent : 0
Number of route changes : 0
Number of replies to queries : 0
Related Operation
Table 8-16 lists the related operation for verifying the source IP address of a RIP route update.
Table 8-16 Related operation for verifying the source IP address of a RIP route update
Issue 01 (2011-07-30)
To...
undo verify-source
127
Procedure
Step 1 Run the rip command to start the RIP process.
Step 2 Run the reset command to restore the system configuration parameters of the RIP process.
Step 3 Run the quit command to quit the RIP mode.
Step 4 Run the display rip command to query the system configuration parameters of the RIP process.
----End
Example
To restore the system configuration parameters of the RIP process, do as follows:
huawei(config)#rip 1
huawei(config-rip-1)#reset
huawei(config-rip-1)#quit
huawei(config)#display rip 1
Public VPN-instance name :
RIP process : 1
RIP version : RIP-1 compatibility
Preference : 100
Checkzero : Enabled
Default-cost : 0
Summary : Enabled
Hostroutes : Enabled
Maximum number of balanced paths : 1
Update time
: 30 sec Age time : 180 sec
Suppress time : 0 sec
Garbage-collect time : 120 sec
Silent interfaces : None
Default routes : Disabled
Verify-source : Enabled
Networks : None
Configured peers : None
Triggered updates sent : 0
Number of route changes : 0
Number of replies to queries : 0
Procedure
Step 1 Run the reset rip statistics command to clear the statistics of the RIP process.
----End
Example
To clear the statistics of RIP process 1, do as follows:
huawei(config)#reset rip 1 statistics
Issue 01 (2011-07-30)
128
Context
After the RIP packet transmission is disabled on an interface, the interface can still receive and
process RIP packets from other routers.
Procedure
Step 1 Run the interface serial command to enter the configuration mode of the serial port.
Step 2 Run the ip address command to configure the IP address of the serial port.
Step 3 Run the quit command to quit the configuration mode of the serial port.
Step 4 Run the rip command to start the RIP process.
Step 5 Run the network command to enable the RIP routing for the interface specified in a network
segment.
Step 6 Run the silent-interface command to disable RIP packet transmission on a specified interface.
Step 7 Run the quit command to quit the RIP mode.
Step 8 Run the display current-configuration command to query the configuration information about
disabling RIP packet transmission on a specified interface.
----End
Example
To disable the serial port from transmitting RIP packets, do as follows:
huawei(config)#interface serial 0
huawei(config-if-serial0)#ip address 192.0.1.2 24
huawei(config-if-serial0)#quit
huawei(config)#rip 1
huawei(config-rip-1)#network 192.0.1.0
huawei(config-rip-1)#silent-interface serial 0
huawei(config-rip-1)#quit
huawei(config)#display current-configuration section rip
[UA5000IPMBV100R017: 11102]
#
[rip]
<rip-1>
rip 1
network 192.0.1.0
silent-interface serial0
#
return
Related Operation
Table 8-17 lists the related operation for disabling RIP packet transmission on a specified
interface.
Issue 01 (2011-07-30)
129
Table 8-17 Related operation for disabling RIP packet transmission on a specified interface
To...
undo silent-interface
Context
Specifying the peer router enables the peer router to receive the same packet in multicast
(broadcast) and unicast modes. Therefore, when running the peer command, it is recommended
that you change the related interface on the router to the silent mode.
Procedure
Step 1 Run the rip command to start the RIP process.
Step 2 Run the peer command to specify the IP address of the peer router.
----End
Example
To specify the IP address of the peer router as 10.0.0.1, do as follows:
huawei(config)#rip 1
huawei(config-rip-1)#peer 10.0.0.1
Related Operation
Table 8-18 lists the related operation for configuring the IP address of a peer router.
Table 8-18 Related operation for configuring the IP address of a peer router
To...
undo peer
130
Context
l
The summary address is valid only when the classifiable aggregation is disabled.
When split horizon or poison reverse is enabled, the summary address and the classifiable
aggregation fail. That is, to transmit route aggregation to neighbors, disable split horizon
or poison reverse of the related interface.
Procedure
Step 1 Run the interface vlanif command to enter the VLANIF mode.
Step 2 Run the rip summary-address command to configure the IP address of a summary route.
----End
Example
To set the summary IP address of interface VLAN 2 as 10.0.0.0, do as follows:
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#rip summary-address 10.0.0.0 255.255.255.0
Related Operation
Table 8-19 lists the related operation for configuring a summary route IP address.
Table 8-19 Related operation for configuring a summary route IP address
To...
Context
By default, an interface is enabled to receive and transmit RIP packets.
Procedure
Step 1 Run the interface vlanif command to enter the VLANIF mode.
Step 2 Run the rip input (rip output) command to enable the interface to receive and transmit RIP
packets.
----End
Example
To enable interface VLAN 2 to receive RIP packets, do as follows:
Issue 01 (2011-07-30)
131
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#rip input
Related Operation
Table 8-20 lists the related operations for enabling an interface to receive and transmit RIP
packets.
Table 8-20 Related operations for enabling an interface to receive and transmit RIP packets
To...
Context
l
The split horizon and poison reserve functions cannot be enabled at the same time.
Procedure
Step 1 Run the interface vlanif command to enter the VLANIF mode.
Step 2 Run the rip split-horizon command to enable the split horizon function.
----End
Example
To enable the RIP split horizon function, do as follows:
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#rip split-horizon
Related Operation
Table 8-21 lists the related operation for enabling the split horizon function.
Issue 01 (2011-07-30)
132
Table 8-21 Related operation for enabling the split horizon function
To...
Context
The split horizon and poison reserve functions cannot be enabled at the same time.
Procedure
Step 1 Run the interface vlanif command to enter the VLANIF mode.
Step 2 Run the rip poison-reverse command to enable the poison reverse function.
----End
Example
To enable the RIP poison reverse function, do as follows:
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#rip poison-reverse
NOTE
After the function is enabled, if a route breaks down but is still kept in RIP packets, the route is configured
as infinite, that is, the routing metric is set as 16. The poison reverse function avoids creating routing loops
among multiple routers.
Related Operation
Table 8-22 lists the related operation for enabling the poison reverse function.
Table 8-22 Related operation for enabling the poison reverse function
To...
133
Context
RIP-2 supports two authentication modes: plain text authentication and MD5 encrypted text
authentication.
l
The plain text authentication does not ensure security. The authentication key, which is not
encrypted, is sent together with the packet.
MD5 encrypted text authentication ensures security. The authentication key is first
encrypted and then sent. MD5 encrypted text authentication has two formats: one is a
common packet format and the other is a non-standard packet format.
Procedure
Step 1 Run the interface vlanif command to enter the VLANIF mode.
Step 2 Run the rip authentication-mode command to configure the RIP-2 authentication mode.
----End
Example
To configure the RIP-2 authentication mode as the plain text mode and password as huawei, do
as follows:
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#rip authentication-mode simple huawei
Related Operation
Table 8-23 lists the related operation for configuring the RIP-2 authentication mode.
Table 8-23 Related operation for configuring the RIP-2 authentication mode
To...
Context
By default, the metric of a route is as follows:
l
Procedure
Step 1 Run the interface vlanif command to enter the VLANIF mode.
Issue 01 (2011-07-30)
134
Step 2 Run the rip metricin (rip metriout) command to configure the additional metric when the
interface receives or transmits the RIP packets.
----End
Example
To configure the added metric when the interface receives the RIP packets as 5, do as follows:
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#rip metricin 5
To configure the added metric when the interface transmits the RIP packets as 5, do as follows:
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#rip metriout 5
Related Operation
Table 8-24 lists the related operations for configuring the additional metric of a route.
Table 8-24 Related operations for configuring the additional metric of a route
To...
Context
By default:
l
The aging time of the route in the route table (garbage-collect time defined in the standard)
is 120s.
135
Procedure
Step 1 Run the rip command to start the RIP process.
Step 2 Run the timers rip command to configure the RIP timer.
Step 3 Run the quit command to quit the RIP mode.
Step 4 Run the display rip command to query the configuration information about the RIP timer.
----End
Example
To set the interval for sending updates as 35s, route expiration time as 170s, suppression time
as 0s and garbage-collect time as 240s, do as follows:
huawei(config)#rip 1
huawei(config-rip-1)#timers rip 35 170 0 240
huawei(config-rip-1)#quit
huawei(config)#display rip 1
Public VPN-instance name :
RIP process : 1
RIP version : RIP-1 compatibility
Preference : 100
Checkzero : Enabled
Default-cost : 0
Summary : Enabled
Hostroutes : Enabled
Maximum number of balanced paths : 1
Update time
: 35 sec Age time : 170 sec
Suppress time : 0 sec
Garbage-collect time : 240 sec
Silent interfaces :
vlanif7
Default routes : Disabled
Verify-source : Enabled
Networks :
192.0.1.0
Configured peers :
10.0.0.1
Triggered updates sent : 0
Number of route changes : 0
Number of replies to queries : 0
Related Operation
Table 8-25 lists the related operation for configuring the RIP timer.
Table 8-25 Related operation for configuring the RIP timer
To...
Issue 01 (2011-07-30)
136
Context
l
The system supports the configuration of only one OSPF process at the same time.
Procedure
Step 1 Run the ospf command to start the OSPF process.
Step 2 Run the quit command to quit the OSPF mode.
Step 3 Run the display ospf command to query the OSPF process.
----End
Example
To enable OSPF process 1, do as follows:
huawei(config)#ospf 1
huawei(config-ospf-1)#quit
huawei(config)#display ospf brief
OSPF Process 1 with Router ID 10.144.78.141
OSPF Protocol Information
RouterID: 10.144.78.141
Border Router:
Route Tag: 0
Multi-VPN-Instance is not enabled
Spf-schedule-interval: 5
Default ASE parameters: Metric: 1 Tag: 1 Type: 2
Route Preference: 10
ASE Route Preference: 150
SPF Computation Count: 0
RFC 1583 Compatible
Retransmission limitation is disabled
Area Count: 0
Nssa Area Count: 0
ExChange/Loading Neighbors: 0
Related Operation
Table 8-26 lists the related operation for enabling the OSPF process.
Table 8-26 Related operation for enabling the OSPF process
To...
undo ospf
137
Context
l
OSPF divides the AS into different areas. Routing information is transmitted between the
areas through the ABRs, which are located at the borders of the areas. This helps to reduce
the number of OSPF packets in the network, thus improving the performance of OSPF.
If the specified area does not exist, the system first creates the area and then enters the area
configuration mode.
You can use an integer or an IP address to identify an area. The area ID is expressed only
in the IP address format.
When an area ID is an integer, the system automatically converts the integer into an IP
address.
Procedure
Step 1 Run the ospf to start the OSPF process.
Step 2 Run the area command to create an area and enter the configuration mode of the area.
----End
Example
To create area 1 and enter the area configuration mode, do as follows:
huawei(config)#ospf 1
huawei(config-ospf-1)#area 1
huawei(config-ospf-1-area-0.0.0.1)#
Related Operation
Table 8-27 lists the related operation for entering the OSPF area configuration mode.
Table 8-27 Related operation for entering the OSPF area configuration mode
To...
Delete an area
undo area
Context
Wildcard-mask in the network command is the reverse of the IP address, that is, the mask of
the IP address is reserved (0 changed to 1 and 1 changed to 0). "1" indicates that the digit in the
IP address is omitted and "0" indicates that the digit must be reserved.
Issue 01 (2011-07-30)
138
Procedure
Step 1 Run the ospf to start the OSPF process.
Step 2 Run the area command to create an area and enter the configuration mode of the area.
Step 3 Run the network command to configure the interface running OSPF and the area to which the
interface belongs.
----End
Example
To configure the subnet 192.1.1.0 for the interface running OSPF, do as follows:
huawei(config)#ospf 1
huawei(config-ospf-1)#area 1
huawei(config-ospf-1-area-0.0.0.1)#network 192.1.1.0 0.0.0.255
Related Operation
Table 8-28 lists the related operation for configuring subnets for an area.
Table 8-28 Related operation for configuring subnets for an area
To...
undo network
Prerequisite
You must run the network command to configure the interface to run the OSPF protocol and
the area to which the interface belongs.
Context
l
OSPF does not support configuring the DR priority for interface NULL.
The DR is for broadcast or NBMA type interfaces. The interfaces of p2p and p2mp network
types do not need DR election.
Before the DR priority is configured, the IP address of the layer 3 interface must be in an
OSPF domain.
Procedure
Step 1 Run the interface vlanif command to enter the VLANIF mode.
Step 2 Run the ospf dr-priority command to set the DR priority.
Issue 01 (2011-07-30)
139
Step 3 Run the display ospf interface command to query the DR priority.
----End
Example
To configure the DR priority for interface VLANIF 2 as 8, do as follows:
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#ip address 192.1.1.1 24
huawei(config-if-vlanif2)#ospf dr-priority 8
huawei(config-if-vlanif2)#quit
huawei(config)#display ospf interface vlanif 2
OSPF Process 1 with Router ID 192.168.1.1
Interfaces
Interface: 192.1.1.1 (vlanif2)
Cost: 1
State: Down
Type: Broadcast
MTU: 1500
Priority: 8
Designated Router: 0.0.0.0
Backup Designated Router: 0.0.0.0
Timers: Hello 10 , Dead 40 , Poll 120 , Retransmit 5 , Transmit Delay 1
Procedure
Step 1 Run the ospf to start the OSPF process.
Step 2 Run the area command to create an area and enter the configuration mode of the area.
Step 3 Run the stub command to configure the OSPF stub area.
----End
Example
To configure OSPF area 1 as a stub area, do as follows:
huawei(config)#ospf 1
huawei(config-ospf-1)#area 1
huawei(config-ospf-1-area-0.0.0.1)#stub
Related Operation
Table 8-29 lists the related operations for configuring a stub area.
Table 8-29 Related operations for configuring a stub area
Issue 01 (2011-07-30)
To...
undo stub
(undo)stub-router
140
Context
l
Procedure
Step 1 Run the ospf to start the OSPF process.
Step 2 Run the peer command to configure an NBMA adjacent router.
----End
Example
To configure the IP address of the NBMA adjacent router as 1.1.1.1 and specify the DR priority
as 120, do as follows:
huawei(config)#ospf 1
huawei(config-ospf-1)#peer 1.1.1.1 dr-priority 120
Related Operation
Table 8-30 lists the related operation for configuring an NBMA adjacent router.
Table 8-30 Related operation for configuring an NBMA adjacent router
To...
undo peer
Context
l
Issue 01 (2011-07-30)
141
Procedure
Step 1 Run the ospf to start the OSPF process.
Step 2 Run the preference command to set the OSPF priority.
Step 3 Run the display ospf interface command to query the OSPF priority.
----End
Example
To set the OSPF priority as 12, do as follows:
huawei(config)#ospf 1
huawei(config-ospf-1)#preference 12
huawei(config-ospf-1)#quit
huawei(config)#display ospf brief
OSPF Process 1 with Router ID 192.0.2.3
OSPF Protocol Information
RouterID: 192.0.2.3
Border Router:
Route Tag: 0
Multi-VPN-Instance is not enabled
Applications Supported: MPLS Traffic-Engineering
Spf-schedule-interval: 5
Default ASE parameters: Metric: 1 Tag: 1 Type: 2
Route Preference: 12
ASE Route Preference: 150
SPF Computation Count: 2
Retransmission limitation is disabled
Area Count: 0
Nssa Area Count: 0
ExChange/Loading Neighbors: 0
Related Operation
Table 8-31 lists the related operation for setting the OSPF priority.
Table 8-31 Related operation for setting the OSPF priority
To...
undo preference
Context
After the transmission is disabled on an interface, the interface is in the silent state. The interface
can still advertise its direct route. The OSPF Hello packets of the interface, however, are blocked,
and no adjacency can be set up on the interface.
Issue 01 (2011-07-30)
142
Procedure
Step 1 Run the ospf to start the OSPF process.
Step 2 Run the silent-interface command to disable OSPF packet transmission on the interface.
----End
Example
To prohibit interface VLAN 7 from transmitting OSPF packets, do as follows:
huawei(config)#ospf 1
huawei(config-ospf-1)#silent-interface vlanif 7
huawei(config-rip-1)#quit
Related Operation
Table 8-32 lists the related operation for prohibiting an interface from transmitting OSPF
packets.
Table 8-32 Related operation for prohibiting an interface from transmitting OSPF packets
To...
Remarks
undo silent-interface
Context
By default, the maximum numbers of OSPF routes are as follows:
l
Procedure
Step 1 Run the ospf to start the OSPF process.
Step 2 Run the maximum-routes command to configure the maximum number of OSPF routes.
----End
Example
To configure the maximum number of OSPF routes to 500, do as follows:
huawei(config)#ospf 1
Issue 01 (2011-07-30)
143
Related Operation
Table 8-33 lists the related operation for configuring the maximum number of OSPF routes.
Table 8-33 Related operation for configuring the maximum number of OSPF routes
To...
undo maximum-routes
Procedure
Step 1 Run the ospf to start the OSPF process.
Step 2 Run the enable log command to enable the log information.
----End
Example
To enable the logging function of OSPF, do as follows:
huawei(config)#ospf 1
huawei(config-ospf-1)#enable log config
Related Operation
Table 8-34 lists the related operation for enabling the OSPF logging function.
Table 8-34 Related operation for enabling the OSPF logging function
To...
144
Context
OSPF supports four network types. By default, the network type of an interface is determined
by the physical interface. For details, see "Table 8-35."
Table 8-35 Description of the network types
Network
Type
Description
Default
Broadcast
NBMA
p2mp
Point-to-Multipoint
p2p
Point-to-Point
Procedure
Step 1 Run the interface vlanif command to enter the VLANIF mode.
Step 2 Run the ospf network-type command to configure the network type.
----End
Example
Assume that Ethernet port 0/3/0 is in VLAN 2. To configure the network type of the port as P2P,
do as follows:
huawei(config)#interface vlanif 2
huawei(config-vlanif-2)#ospf network-type p2p
Related Operation
Table 8-36 lists the related operation for configuring the network type on an OSPF interface.
Table 8-36 Related operation for configuring the network type on an OSPF interface
Issue 01 (2011-07-30)
To...
145
Procedure
Step 1 Run the interface vlanif command to enter the VLANIF mode.
Step 2 Run the ospf cost command to configure the cost of the interface on which the OSPF runs.
----End
Example
To configure the cost of the interface on which the OSPF runs as 5, do as follows:
huawei(config)#interface vlanif 2
huawei(config-vlanif2)#ospf cost 5
Related Operation
Table 8-37 lists the related operation for configuring the cost of the interface on which the OSPF
runs.
Table 8-37 Related operation for configuring the cost of the interface on which the OSPF runs
To...
Run the
Command...
Remarks
Context
l
Procedure
Step 1 Run the interface vlanif command to enter the VLANIF mode.
Step 2 Run the ospf authentication-mode command to configure OSPF packet authentication.
----End
Issue 01 (2011-07-30)
146
Example
To configure the OSPF authentication as plain text authentication and the authentication
password as "huawei", do as follows:
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#ospf authentication-mode simple huawei
Related Operation
Table 8-38 lists the related operation for configuring OSPF packet authentication.
Table 8-38 Related operation for configuring OSPF packet authentication
To...
Context
l
After the adjacency is set up between two routers, the routers begin to transmit DD packets
to each other to exchange the routing information.
By default, the MTU field in DD packets is 0. That is, the interface does not fill in the MTU
field when transmitting the DD packets.
Procedure
Step 1 Run the interface vlanif command to enter the VLANIF mode.
Step 2 Run the ospf mtu-enable command to enable the MTU check in DD packets.
----End
Example
To configure interface vlanif 2 to fill in the MTU field when the interface is transmitting DD
packets, do as follows:
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#ospf mtu-enable
Related Operation
Table 8-39 lists the related operation for configuring the MTU of a DD packet.
Issue 01 (2011-07-30)
147
Context
l
By default, the interval for P2P and broadcast interfaces to send Hello packets is 10s and
the interval for P2MP and NBMA interfaces to send Hello packets is 30s.
The intervals for network neighbors to send Hello packets must be consistent with each
other.
The interval for sending Hello packets is in inversely proportional to the route convergence
speed and network load.
After the network type of an interface is modified, the interval for sending Hello packets
is restored to the default value.
Procedure
Step 1 Run the interface vlanif command to enter the VLANIF mode.
Step 2 Run the ospf timer hello command to set the interval for sending Hello packets.
----End
Example
To set the interval for sending OSPF Hello packet to 15s, do as follows:
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#ospf timer hello 15
Related Operation
Table 8-40 lists the related operation for setting the interval for sending Hello packets.
Issue 01 (2011-07-30)
148
Table 8-40 Related operation for setting the interval for sending Hello packets
To...
Context
l
By default, the dead time between adjacent routers on P2P and broadcast interfaces is 40s
and the dead time between adjacent routers on P2MP and NBMA (non-broadcast) interfaces
is 120s.
The value of the dead time must be four times greater than the interval for sending Hello
packets.
After the network type of an interface is modified, the dead time is restored to the default
value.
Procedure
Step 1 Run the interface vlanif command to enter the VLANIF mode.
Step 2 Run the ospf timer dead command to set the dead time between adjacent routers.
----End
Example
To set the dead time between adjacent routers to 60s, do as follows:
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#ospf timer dead 60
Related Operation
Table 8-41 lists the related operation for setting the dead time between adjacent routers.
Table 8-41 Related operation for setting the dead time between adjacent routers
To...
149
Context
l
In the NBMA network, after the adjacent router fails, a router transmits Hello packets to
the failed router at the poll intervals of Hello packets.
The poll interval of Hello packets must equal to or four times greater than the interval for
sending Hello packets.
Procedure
Step 1 Run the interface vlanif command to enter the VLANIF mode.
Step 2 Run the ospf timer poll command to set the poll interal of Hello packets.
----End
Example
To set the poll interval of Hello packets to 60s, do as follows:
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#ospf timer poll 60
Related Operation
Table 8-42 lists the related operation for setting the poll interval of Hello packets.
Table 8-42 Related operation for setting the poll interval of Hello packets
To...
Context
l
The LSA describes the interface status and the adjacency status of a router. The LSA ages
if it is saved in the link state database (LSDB) of the local router. The LSA, however, does
not age in the process of network transmission.
To ensure the validity of the LSA, it is necessary to add the LSA transmit delay to the aging
time before transmission. This configuration is very important for low speed networks.
Procedure
Step 1 Run the interface vlanif command to enter the VLANIF mode.
Step 2 Run the ospf trans-delay command to set the LSA transmit delay.
----End
Issue 01 (2011-07-30)
150
Example
To set the LSA transmit delay as 10s, do as follows:
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#ospf trans-delay 10
Related Operation
Table 8-43 lists the related operation for setting the LSA transmit delay.
Table 8-43 Related operation for setting the LSA transmit delay
To...
Context
l
When a router sends an LSA to its neighbors, it waits for an ACK from them. If no ACK
is received from the neighbors within the retransmit interval, the router resends an LSA to
the neighbors.
If the LSA retransmit interval on an interface is very small, it may lead to unnecessary
retransmission. If the LSA retransmit interval is very large, it affects the flooding speed in
the case of packet loss.
Procedure
Step 1 Run the interface vlanif command to enter the VLANIF mode.
Step 2 Run the ospf timer retransmit command to set the LSA retransmit interval.
----End
Example
To set the LSA retransmit interval as 8s, do as follows:
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#ospf timer retransmit 8
Related Operation
Table 8-44 lists the related operation for setting the LSA retransmit interval.
Issue 01 (2011-07-30)
151
Table 8-44 Related operation for setting the LSA retransmit interval
To...
Context
l
When the LSDB of OSPF changes, the shortest path must be recalculated.
If the shortest path is calculated when any change takes place, a lot of resources are occupied
and the operation efficiency of the router is affected. Adjusting the SPF calculation interval
can restrain the resource (routers and bandwidth) consumption due to frequent network
changes.
Procedure
Step 1 Run the ospf to start the OSPF process.
Step 2 Run the spf-schedule-interval command to set the SPF calculation interval for OSPF.
----End
Example
To set the SPF calculation interval as 10s, do as follows:
huawei(config)#ospf 1
huawei(config-ospf-1)#spf-schedule-interval 10
Related Operation
Table 8-45 lists the related operation for setting the SPF calculation interval for OSPF.
Table 8-45 Related operation for setting the SPF calculation interval for OSPF
To...
undo spf-schedule-interval
Issue 01 (2011-07-30)
152
Context
l
Procedure
Step 1 Run the ospf to start the OSPF process.
Step 2 Run the area command to create an area and enter the configuration mode of the area.
Step 3 Run the network command to configure the interface on which the OSPF protocol runs and the
area to which the interface belongs.
Step 4 Run the abr-summary command to configure route aggregation between areas.
----End
Example
To summarize the routes in the two network segments 20.20.10.0 and 20.20.20.0 in OSPF area
1 as one routing entry 20.20.0.0 and send it to other areas, do as follows:
huawei(config)#ospf 1
huawei(config-ospf-1)#area 1
huawei(config-ospf-1-area-0.0.0.1)#network 20.20.10.0 0.0.0.255
huawei(config-ospf-1-area-0.0.0.1)#network 20.20.20.0 0.0.0.255
huawei(config-ospf-1-area-0.0.0.1#abr-summary 20.20.0.0 255.255.0.0
Related Operation
Table 8-46 lists the related operation for configuring route aggregation between areas.
Table 8-46 Related operation for configuring route aggregation between areas
To...
undo abr-summary
153
Context
OSPF supports the aggregation of imported routes. By default, the aggregation of imported
routes is disabled.
Procedure
Step 1 Run the ospf command to start the OSPF process.
Step 2 Run the asbr-summary command to summarize the routes with the same prefix.
----End
Example
To configure the aggregation of routes with the same prefix of 10.2, do as follows:
huawei(config)#ospf 1
huawei(config-ospf-1)#asbr-summary 10.2.0.0 255.255.0.0
Related Operation
Table 8-47 lists the related operation for configuring the aggregation of routes imported by
OSPF.
Table 8-47 Related operation for configuring the aggregation of routes imported by OSPF
To...
undo asbr-summary
Context
l
Because of the OSPF feature, the route found by other routing protocols is processed as the
routing information outside the AS. The protocol types of routes that OSPF can import are
RIP, direct routes and static routes.
Procedure
Step 1 Run the ospf to start the OSPF process.
Issue 01 (2011-07-30)
154
Step 2 Run the import-route rip command to import routes from other protocols into OSPF.
----End
Example
To specify the imported RIP route as a type 2 external route, the route label as 33, and the cost
as 50, do as follows:
huawei(config)#ospf 1
huawei(config-ospf-1)#import-route rip 40 type 2 tag 33 cost 50
Related Operation
Table 8-48lists the related operation for importing routes from other protocols into OSPF.
Table 8-48 Related operation for importing routes from other protocols into OSPF
To...
Context
By default, the cost of an imported route is 10. The type of the imported route is 2. The upper
limit of the imported external routes is 1000 at a time. The label value is 10.
Procedure
Step 1 Run the ospf to start the OSPF process.
Step 2 Run the default command to configure the default parameters of OSPF imported routes.
----End
Example
Assume the following: The upper limit of the default imported external routes is 100. The default
cost for OSPF to receive external routes is 8. The default label for OSPF to accept external routes
is 8. The default type of imported routes is 1. To configure the OSPF imported routes, do as
follows:
huawei(config)#ospf 100
huawei(config-ospf-100)#default cost 8 type 1 tag 8 limit 100
Issue 01 (2011-07-30)
155
Related Operation
Table 8-49 lists the related operation for configuring the default parameters of OSPF imported
routes.
Table 8-49 Related operation for configuring the default parameters of OSPF imported routes
To...
Context
l
Routing filtering can be based on an access control list (ACL) or an address prefix. Routes
that do not meet the filtering rules should not be received or sent.
Procedure
Step 1 Run the acl command to create an ACL.
Step 2 Run the rule command to configure the ACL rule.
Step 3 Run the filter-policy import command to filer the received routing information.
----End
Example
To filter the routing information according to the rules specified by ACL 2000, do as follows:
huawei(config)#acl 2000
huawei(config-acl-basic-2000)#rule permit source 192.168.0.1 0
huawei(config-acl-basic-2000)#quit
huawei(config)#ospf 1
huawei(config-ospf-1)#filter-policy 2000 import
Related Operation
Table 8-50 lists the related operation for configuring the route filtering policy.
Table 8-50 Related operation for configuring the route filtering policy
Issue 01 (2011-07-30)
To...
undo filter-policy
156
Context
Table 8-51 lists the commands for querying and debugging OSPF.
Table 8-51 Commands for querying and debugging OSPF
Issue 01 (2011-07-30)
To...
157
To...
Configure the
debugging of OSPF
packets
Configure the
debugging of OSPF
events
Configure the
debugging of OSPF
LSA packets
Configure the
debugging of OSPF
SPF
Context
l
The address prefix list is used to filter IP addresses. An address prefix list contains multiple
entries. Each entry specifies an address prefix range. The relationship between inter entries
is "or". That is, if an IP address passes through one entry in the address prefix list, it passes
the filtering of the address prefix list. If the IP address does not pass through any entry, it
means that the IP address does not pass the filtering of the address prefix list.
The address prefix range consists of two parts: mask-length and [greater-equal-value, lessequal-value]. If the two parts are specified, the IP address to be filtered must match the
prefix range specified by the two parts.
If the specified address prefix range is 0.0.0.0 0 less-equal 32, all the routes are matched.
Procedure
Step 1 Run the ip ip-prefix command to configure an address prefix list.
----End
Example
Assume that: The name of an address prefix list is p1. Its mask length is 17 or 18. The routes in
the network segment 10.0.192.0/8 pass. To configure this address prefix list, do as follows:
huawei(config)#ip ip-prefix
{ string<S><1,19> }: pl
{ index<K>|permit<K>|deny<K> }: permit
{ ip_addr<I><X.X.X.X> }: 10.0.192.0
{ integer<U><0,32> }: 8
Issue 01 (2011-07-30)
158
{ <cr>|greater-equal<K>|less-equal<K> }: greater-equal
{ integer<U><0,32> }: 17
{ <cr>|less-equal<K> }: less-equal
{ integer<U><0,32> }: 18
Command:
ip ip-prefix pl permit 10.0.192.0 8 greater-equal 17 less-equal 18
Related Operation
Table 8-52 lists the related operation for configuring an address prefix list.
Table 8-52 Related operation for configuring an address prefix list
To...
undo ip ip-prefix
Context
l
Up to 16 route policies can be defined in the system, and each route policy can be configured
with up to 20 nodes.
A route policy may consist of several nodes, with each node as a unit for the match test.
The node number and the matching order are the same.
The relationship between nodes of a route policy is OR. The system checks every node of
a route policy. If one node passes the match test, it means that the route policy passes the
match test.
Parameter Description
Table 8-53 lists the parameters for defining a route policy.
Issue 01 (2011-07-30)
159
Description
permit
deny
Procedure
Step 1 Run the route-policy command to create a route policy and enter the configuration mode of the
route policy.
Step 2 Run the display route-policy command to query the running status of the configured route
policy.
----End
Example
To configure route policy 1 with node number 10 and matching mode "permit", do as follows:
huawei(config)#route-policy policy1 permit node 10
Info: New Sequence of this List !
huawei(config-route-policy)#quit
huawei(config)#display route-policy
{ <cr>|string<S><Length 1-19> }:policy1
Command:
display route-policy policy1
Route-policy : policy1
permit : 10
Related Operation
Table 8-54 lists the related operation for configuring a route policy.
Table 8-54 Related operation for configuring a route policy
Issue 01 (2011-07-30)
To...
Remarks
undo route-policy
160
Context
l
The relationship between two if-match clauses of a node is AND. That is, the match test
can be passed only when the matching requirements of all the if-match clauses of the node
are met. After the node match test is performed, the action specified by the apply clause is
taken.
If no if-match clause is specified, all the routes can pass through the node.
Procedure
Step 1 Run the route-policy command to create a route policy and enter the route policy configuration
mode.
Step 2 Run the if-match ip command to set the filtering rules of routing information.
Step 3 Run the display route-policy command to display the configured route policy.
----End
Example
To set the destination address prefix list p1 for filtering route information, do as follows:
huawei(config)#route-policy 1 permit node 1
Info: New Sequence of this List !
huawei(config-route-policy)#if-match ip next-hop ip-prefix p1
huawei(config-route-policy)#quit
huawei(config)#display route-policy
{ <cr>|string<S><Length 1-19> }:1
Command:
display route-policy 1
Route-policy : 1
permit : 1
Match clauses :
if-match ip-prefix p1
Related Operation
Table 8-55 lists the related operation for defining the route policy matching rule.
Table 8-55 Related operation for defining the route policy matching rule
Issue 01 (2011-07-30)
To...
undo if-match ip
161
Context
l
The system performs the operation specified by the apply clause to modify the attributes
if a route when the filtering requirements specified by the if-match clause are met.
Procedure
Step 1 Run the route-policy command to create a route policy and enter the route policy configuration
mode.
Step 2 Run the if-match command to set the filtering rules of routing information.
Step 3 Run the apply tag command to set the tag of the route information.
Step 4 Run the display route-policy command to display the configured route policy.
----End
Example
To set the routing information tag of the filtered route as 100, do as follows:
huawei(config)#route-policy 1 permit node 1
huawei(config-route-policy)#if-match ip-prefix p1
huawei(config-route-policy)#apply tag 100
huawei(config-route-policy)#quit
huawei(config)#display route-policy
{ <cr>|string<S><Length 1-19> }:
1
Command:
display route-policy 1
Route-policy : 1
permit : 1
Match clauses :
if-match ip-prefix p1
Apply clauses :
apply tag 100
Related Operation
Table 8-56 lists the related operation for modifying the attributes of the filtered route.
Table 8-56 Related operation for modifying the attributes of the filtered route
Issue 01 (2011-07-30)
To...
undo apply
162
9 Configuring RSTP
Configuring RSTP
Issue 01 (2011-07-30)
163
9 Configuring RSTP
Service Description
Spanning Tree Protocol (STP) applies to the redundant network. It blocks certain redundant
paths through certain algorithms and prunes a loop network into a loop-free tree network. STP
can prevent the proliferation and infinite cycling of packets in the loop network. When a link
becomes faulty, STP can generate a network, which is reachable and free from redundant paths.
RSTP is an improvement of STP. In addition to all the features of the STP, RSTP reduces the
delay in generating a network topology and ensures the connectivity of the network.
Service Specifications
The UA5000 supports the applications of STP, RSTP and the RSTP ring network to meet the
requirements for diversified network configurations.
Prerequisite
The network devices and lines must be normal.
Context
Pay attention to the following points:
l
The RSTP settings take effect only when RSTP is enabled. You can configure the port or
bridge before RSTP is enabled When RSTP is disabled, these settings are saved. When
RSTP is enabled again, the settings take effect.
After RSTP is enabled for a bridge, it occupies a small amount of network resources. As a
common network contains redundant links, it is recommended that you enable RSTP.
After RSTP is enabled for a bridge, it is also enabled for all the ports of the bridge. To
effectively control RSTP, you can disable it for a specified Ethernet port, to prevent the
port from attending spanning tree calculation.
Procedure
Step 1 Run the stp enable command or the stp port enable command to enable RSTP for a bridge or
a port.
Step 2 Run the display stp command or the display stp port command and you can find that RSTP is
enabled.
----End
Issue 01 (2011-07-30)
164
9 Configuring RSTP
Example
To enable RSTP for a bridge, do as follows:
huawei(config)#stp enable
huawei(config)#display stp
{ <cr>|port<K> }:
Command:
display stp
The bridge is executing the IEEE Rapid Spanning Tree protocol
The bridge diameter is 7
Bridge Priority : 32768
MAC Address : 00e0-fc59-0001
Hello Time: 2 sec Forward Delay: 15 sec Max Age: 20 sec
Root
Priority : 32768
MAC Address : 00e0-fc59-0001
Hello Time: 2 sec Forward Delay: 15 sec Max Age: 20 sec
Path cost to root bridge is 0
-----------------------------------------------------------------Port F/ S/ P Priority
Cost Admin-State Role State Type
-----------------------------------------------------------------9
0/ 2/ 2
128
200000 Enabled
Disa
10
0/ 2/ 3
128
200000 Enabled
Disa
11
0/ 2/ 4
128
200000 Enabled
Disa
12
0/ 2/ 5
128
200000 Enabled
Disa
25
0/ 2/ 0
128
200000 Enabled
Disa
26
0/ 2/ 1
128
200000 Enabled
Disa
------------------------------------------------------------------
Related Operation
Table 9-1 lists the related operations for enabling the RSTP function.
Table 9-1 Related operations for enabling the RSTP function
To...
Remarks
stp disable
undo stp
By default, it is
disabled.
By default, it is
disabled.
Context
l
Issue 01 (2011-07-30)
165
9 Configuring RSTP
STP
l
RSTP can coexist with STP. If a switching network contains bridges running STP, RSTP
can run in RSTP/STP compatible mode automatically.
If the network is in good condition, although the bridge running STP is removed, the
corresponding port still runs in RSTP/STP compatible mode. In this case, run the stp mode
rstp command to force the port to work in RSTP mode.
Procedure
1.
Run the stp mode stp command to set the RSTP working mode as STP.
2.
Run the display stp command and you can find that the STP mode is configured.
Run the stp mode rstp to set the RSTP working mode as RSTP.
2.
Run the display stp command and you can find that the RSTP mode is configured.
----End
Example
To set the RSTP working mode to STP, do as follows:
huawei(config)#stp mode stp
huawei(config)#display stp
{ <cr>|port<K> }:
Command:
display stp
The bridge is executing the IEEE compatible Spanning Tree protocol
The bridge diameter is 7
Bridge Priority : 32768
MAC Address : 00e0-fc11-2233
Hello Time: 2 sec Forward Delay: 15 sec Max Age: 20 sec
Root
Priority : 32768
MAC Address : 00e0-fc11-2233
Hello Time: 2 sec Forward Delay: 15 sec Max Age: 20 sec
Path cost to root bridge is 0
-----------------------------------------------------------------Port F/ S/ P Priority
Cost Admin-State Role State Type
-----------------------------------------------------------------1
0/ 2/ 0
160
200000 Enabled
Disa
2
0/ 2/ 1
128
200000 Enabled
Disa
9
0/ 2/ 2
128
200000 Enabled
Disa
10
0/ 2/ 3
128
200000 Enabled
Disa
11
0/ 2/ 4
128
200000 Enabled
Disa
12
0/ 2/ 5
128
200000 Enabled
Disa
------------------------------------------------------------------
Issue 01 (2011-07-30)
166
9 Configuring RSTP
Related Operation
Table 9-2 lists the related operation for setting the RSTP working mode.
Table 9-2 Related operation for setting the RSTP working mode
To...
Remarks
Context
l
The bridge diameter of the switching network ranges from 1 to 7. The default value is 7.
The bridge diameter decreases by one when the BPDU packet is forwarded by one device
each time. The switching network discards the bridge protocol data unit (BPDU) packet
whose hop count is 0, to restrict the scale of the switching network.
The forwarding delay of packets in the switching network varies according to the bridge
diameter. The larger the bridge diameter, the longer the forwarding delay and the less stable
the network.
Procedure
Step 1 Run the stp bridge-diameter command to set the bridge diameter of the switching network.
Step 2 Run the display stp command and you can find that the bridge diameter is configured correctly.
----End
Example
To set the bridge diameter of a switching network to 5, do as follows:
huawei(config)#stp bridge-diameter 5
huawei(config)#display stp
The bridge is executing the IEEE Rapid Spanning Tree protocol
The bridge diameter is 5
Bridge Priority : 32768
MAC Address : 00e0-fc11-2233
Issue 01 (2011-07-30)
167
Root
9 Configuring RSTP
Hello Time: 2 sec
Priority : 32768
Hello Time: 2 sec
Related Operation
Table 9-3 lists the related operation for setting the bridge diameter of a switching network.
Table 9-3 Related operation for setting the diameter of a switching network
To...
Context
Pay attention to the following points:
l
When RSTP is enabled, setting the priority of a bridge leads to the recalculation of the
spanning tree.
The value of the bridge priority determines whether the bridge can be selected as the root
of the spanning tree.
The smaller the priority value, the higher the priority. In this case, this bridge is more
possible to be the root bridge.
If the priority values of all the bridges in the switching network are the same, the bridge
with the smallest MAC address is selected as the root bridge.
Procedure
Step 1 Run the stp priority command to set the priority of a specified bridge.
Step 2 Run the display stp command and you can find that the priority of the specified bridge is set
correctly.
----End
Example
To set the priority of the specified bridge as 4096, do as follows:
Issue 01 (2011-07-30)
168
9 Configuring RSTP
Related Operation
Table 9-4 lists the related operation for setting the priority of a specified bridge.
Table 9-4 Related operation for setting the priority of a specified bridge
To...
Context
l
By default, the Forward Delay of the specified bridge is 15s. It is recommended that you
use the default setting.
The link fault causes the spanning tree recalculation on the network. The recalculated result,
however, fails to take effect on the entire network.
If the re-elected root port and the specified port begin to forward data immediately, a
temporary loopback occurs on the path.
Therefore, the RSTP protocol applies a state transition mechanism. That is, before restarting
the data transmission, the root port and the specified port must experience an intermediate
state. After the Forward Delay, the intermediate state can switch to the forwarding state.
The Forward Delay guarantees the recalculated result to take effect on the entire network.
Procedure
Step 1 Run the stp timer forward-delay command to set the Forward Delay of a specified bridge.
Step 2 Run the display stp command to and you can find that the Forward Delay of the specified bridge
is set correctly.
----End
Example
To set the Forward Delay of a specified bridge to 20s (2000 centiseconds) after the STP function
is enabled, do as follows:
huawei(config)#stp timer forward-delay 2000
huawei(config)#display stp
The bridge is executing the IEEE compatible Spanning Tree protocol
Issue 01 (2011-07-30)
169
9 Configuring RSTP
5
4096
2 sec
4096
2 sec
MAC Address :
Forward Delay:
MAC Address :
Forward Delay:
00e0-cfc5-1999
20 sec Max Age: 20 sec
00e0-cfc5-1999
20 sec Max Age: 20 sec
Related Operation
Table 9-5 lists the related operation for setting the Forward Delay of a specified bridge.
Table 9-5 Related operation to configure the Forward Delay of the specified bridge
To...
Context
Pay attention to the following points:
l
By default, the Hello Time of the specified bridge is 2s. It is recommended that you use
the default value.
A proper Hello Time ensures timely detection of line failure without occupying too many
network resources.
A very long Hello Time results in recalculation of the spanning tree, because the packet
loss of the link is considered as a link failure by the bridge.
A very short Hello Time enables the bridge to frequently send configuration information.
This increases the load of the switching network and the CPU.
Procedure
Step 1 Run the stp timer hello command to set the Hello Time of the specified bridge.
Step 2 Run the display stp command and you can find that the Hello Time is set correctly.
----End
Issue 01 (2011-07-30)
170
9 Configuring RSTP
Example
To set the Hello Time of a specified bridge to 300 centiseconds (namely 3s), do as follows:
huawei(config)#stp timer hello 300
huawei(config)#display stp
The bridge is executing the IEEE compatible Spanning Tree protocol
The bridge diameter is 5
Bridge Priority : 4096
MAC Address : 00e0-cfc5-1999
Hello Time: 3 sec Forward Delay: 20 sec Max Age: 20 sec
Root
Priority : 4096
MAC Address : 00e0-cfc5-1999
Hello Time: 3 sec Forward Delay: 20 sec Max Age: 20 sec
Path cost to root bridge is 0
-----------------------------------------------------------------Port F/ S/ P Priority
Cost Admin-State Role State Type
-----------------------------------------------------------------9
0/ 2/ 2
128
200 Enabled
Desg FWD
P2P
11
0/ 2/ 4
128
200000 Enabled
Disa
12
0/ 2/ 5
128
200000 Enabled
Disa
25
0/ 2/ 0
128
20 Enabled
Desg FWD
P2P
26
0/ 2/ 1
128
20 Enabled
Desg FWD
P2P
------------------------------------------------------------------
Related Operation
Table 9-6 lists the related operation for setting the Hello Time of a specified bridge.
Table 9-6 Related operation for setting the Hello Time of a specified bridge
To...
Context
l
The three time parameters, including Forward Delay, Hello Time, and Max Age must
comply with the following formula to ensure network stability.
2 x (Forward Delay -1 second) MAX Age
MAX Age 2 x (Hello Time + 1 second)
By default, the Max Age of the specified bridge is 2000 centiseconds (20s). It is
recommended that you use the default settings.
Max Age is a parameter that is used to check whether the configuration information is
outdated. You can set it according to the actual network situation.
A very short Max Age results in frequent calculation of the spanning tree. The network
congestion is considered as a link failure.
A very long Max Age may result in the inability of the bridge to detect the link failure in
time, thereby reducing the network auto-sensing ability.
Issue 01 (2011-07-30)
171
9 Configuring RSTP
Procedure
Step 1 Run the stp timer max-age command to set the MAX Age of a specified bridge.
Step 2 Run the display stp command and you can find that the MAX Age of a specified bridge is set
correctly.
----End
Example
To set the Max Age of a specified bridge to 10s, do as follows:
huawei(config)#stp timer max-age 1000
huawei(config)#display stp
The bridge is executing the IEEE compatible Spanning Tree protocol
The bridge diameter is 5
Bridge Priority : 4096
MAC Address : 00e0-cfc5-1999
Hello Time: 3 sec Forward Delay: 20 sec Max Age: 10 sec
Root
Priority : 4096
MAC Address : 00e0-cfc5-1999
Hello Time: 3 sec Forward Delay: 20 sec Max Age: 10 sec
Path cost to root bridge is 0
-----------------------------------------------------------------Port F/ S/ P Priority
Cost Admin-State Role State Type
-----------------------------------------------------------------9
0/ 2/ 2
128
200 Enabled
Desg FWD
P2P
11
0/ 2/ 4
128
200000 Enabled
Disa
12
0/ 2/ 5
128
200000 Enabled
Disa
25
0/ 2/ 0
128
20 Enabled
Desg FWD
P2P
26
0/ 2/ 1
128
20 Enabled
Desg FWD
P2P
------------------------------------------------------------------
Related Operation
Table 9-7 lists the related operation for setting the Max Age of a specified bridge.
Table 9-7 Related operation for setting the Max Age of a specified bridge
To...
Context
l
Issue 01 (2011-07-30)
The maximum transmission rate of the specified port is the maximum number of BPDU
packets that can be sent by the port within each Hello Time.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
172
9 Configuring RSTP
A port can send up to 255 BPDU packets. By default, a port sends three packets.
The maximum transmission rate of an Ethernet port is related to the physical state of the
port and the network structure. You can set the rate according to the actual network
situation. If the maximum transmission rate of a port is very high, excessive network
resources may be occupied. It is recommended that you use the default settings.
Procedure
Step 1 Run the stp port transit-limit command to set the maximum transmission rate of the specified
port.
Step 2 Run the display stp port command and you can find that the maximum transmission rate is set
correctly.
----End
Example
To set the maximum transmission rate of a port as 5, do as follows:
huawei(config)#stp port 0/3/0 transit-limit 5
huawei(config)#display stp port 0/3/0
Port 25 (0/3/0) of bridge is DOWN
Port spanning tree protocol is enabled
The port is a(n) DisabledPort
Port path cost 200000
Port priority 128
Designated bridge has priority 32768, MAC address 00e0-fc9a-2394
The port is a non-edge port
Maximum transmission limit is 5 BPDUs per hello time
Times: Hello Time 2 second(s),
Max Age 20 second(s)
Forward Delay 15 second(s), Message Age 0 second(s)
Sent BPDU:
0
TCN: 0, RST: 0, Config BPDU: 0
Received BPDU: 0
TCN: 0, RST: 0, Config BPDU: 0
Related Operation
Table 9-8 lists the related operations for setting the maximum transmission rate.
Table 9-8 Related operations for setting the maximum transmission rate
To...
display stp
173
9 Configuring RSTP
Context
l
If an Ethernet port is not connected to any Ethernet port of other bridges, you can configure
the port as an edge port. This allows the edge port to switch to the forwarding state directly
and reduces the transition time.
If a specified port is configured as the edge port when the port is connected to the port of
another bridge, the RSTP automatically detects it and reconfigures it as a non-edge port.
When an Ethernet port switches from a non-edge port to an edge port, It is recommended
that you configure it as an edge port manually because RSTP cannot detect this kind of
transition.
Procedure
Step 1 Run the stp port edged-port enable command to configure the specified port as an edge port.
Step 2 Run the display stp port command and you can find that the specified port is configured as an
edge port.
----End
Example
To configure port 0/3/0 as an edge port, do as follows:
huawei(config)#stp port 0/3/0 edged-port enable
huawei(config)#display stp port 0/3/0
Port 1 (0/3/0) of bridge is DOWN
Port spanning tree protocol is enabled
The port is a(n) DisabledPort
Port path cost 200000
Port priority 128
Designated bridge has priority 32768, MAC address 00e0-fcaa-8516
The port is an edge port
Maximum transmission limit is 5 BPDUs per hello time
Times: Hello Time 2 second(s),
Max Age 10 second(s)
Forward Delay 20 second(s), Message Age 0 second(s)
Sent BPDU:
0
TCN: 0, RST: 0, Config BPDU: 0
Received BPDU: 0
TCN: 0, RST: 0, Config BPDU: 0
Related Operation
Table 9-9 lists the related operation for configuring the specified port as an edge port.
Table 9-9 Related operation for configuring the specified port as an edge port
To...
display stp
174
9 Configuring RSTP
Context
l
By default, the bridge directly obtains the path cost of a port according to the link rate.
The path cost of an Ethernet port is related to the link rate of the port. The higher the link
rate, the smaller the path cost.
RSTP can automatically identify the link rate and convert it into the proper path cost.
Setting the path cost for an Ethernet port causes recalculation of the spanning tree. It is
recommended that you use the default value and allow RSTP to calculate the path cost of
the current Ethernet port.
Procedure
Step 1 Run the stp port cost command to set the path cost of a specified port.
Step 2 Run the display stp port command and you can find the path cost of the specified port is set
correctly.
----End
Example
To set the path cost of a port as 200, do as follows:
huawei(config)#stp port 0/3/0 cost 200
huawei(config)#display stp port 0/3/0
Port 1 (0/3/0) of bridge is DOWN
Port spanning tree protocol is enabled
The port is a(n) DisabledPort
Port path cost 200
Port priority 128
Designated bridge has priority 32768, MAC address 00e0-fcaa-8516
The port is an edge port
Maximum transmission limit is 5 BPDUs per hello time
Times: Hello Time 2 second(s),
Max Age 10 second(s)
Forward Delay 20 second(s), Message Age 0 second(s)
Sent BPDU:
0
TCN: 0, RST: 0, Config BPDU: 0
Received BPDU: 0
TCN: 0, RST: 0, Config BPDU: 0
Related Operation
Table 9-10 lists the related operation for setting the path cost of a specified port.
Table 9-10 Related operation for setting the path cost of a specified port
To...
display stp
175
9 Configuring RSTP
Context
l
By default, the priority value for all the Ethernet ports of a bridge is 128.
In general, as the value becomes lower, the priority of the port becomes higher and the
Ethernet port is more likely to be included in the spanning tree.
Any change of priority for an Ethernet port causes recalculation of the spanning tree. It is
recommended that you change the priority of the specified port with caution.
Procedure
Step 1 Run the stp port port-priority command to set the priority of a specified port.
Step 2 Run the display stp port command and you can find that the priority of the port is set correctly.
----End
Example
To set the priority of a port as 64, do as follows:
huawei(config)#stp port 0/3/0 port-priority 64
huawei(config)#display stp port 0/3/0
Command:
display stp port 0/3/0
Port 25 (0/3/0) of bridge is DOWN
Port spanning tree protocol is enabled
The port is a(n) DisabledPort
Port path cost 200000
Port priority 64
Designated bridge has priority 32768, MAC address 00e0-fc9a-2394
The port is a non-edge port
Maximum transmission limit is 3 BPDUs per hello time
Times: Hello Time 2 second(s),
Max Age 20 second(s)
Forward Delay 15 second(s), Message Age 0 second(s)
Sent BPDU:
0
TCN: 0, RST: 0, Config BPDU: 0
Received BPDU: 0
TCN: 0, RST: 0, Config BPDU: 0
Related Operation
Table 9-11 lists the related operation for setting the priority of a specified port.
Table 9-11 Related operation for setting the priority of a specified port
To...
display stp
176
9 Configuring RSTP
Context
l
If this parameter is configured as auto, RSTP can automatically detect whether the pointto-point link is enabled on the current Ethernet port.
You can configure a point-to-point link for only the port that is an aggregated Ethernet port
or the port that works in full-duplex mode. Otherwise, the configuration does not take effect.
You can manually configure this parameter. It is recommended that you use the auto mode.
Procedure
Step 1 Run the stp port point-to-point command to configure the point-to-point link for a specified
port.
Step 2 Run the display stp port command and you can find that the parameter of the specified port is
configured correctly.
----End
Example
To configure that the point-to-point link for a port can be automatically detected, do as follows:
huawei(config)#stp port 0/3/0 point-to-point auto
huawei(config)#display stp port 0/3/0
Port 1 (0/3/0) of bridge is DOWN
Port spanning tree protocol is enabled
The port is a(n) DisabledPort
Port path cost 200
Port priority 128
Designated bridge has priority 32768, MAC address 00e0-fcaa-8516
The port is an edge port
Maximum transmission limit is 5 BPDUs per hello time
Times: Hello Time 2 second(s),
Max Age 10 second(s)
Forward Delay 20 second(s), Message Age 0 second(s)
Sent BPDU:
0
TCN: 0, RST: 0, Config BPDU: 0
Received BPDU: 0
TCN: 0, RST: 0, Config BPDU: 0
Related Operation
Table 9-12 lists the related operation for configuring a point-to-point link for a specified port.
Table 9-12 Related operation for configuring a point-to-point link for a specified port
To...
display stp
177
9 Configuring RSTP
Context
Run the stp port frameid/slotid/portid mcheck command to check whether there is a bridge that
is running STP in the network segment to which the current port is connected.
l
If the bridge exists, the port changes to the STP compatible mode.
If the network is in good condition, though the bridge running STP is removed, the port
still runs in STP compatible mode. You can run a command to force the port to work in
RSTP mode. Then, whether the port works in RSTP or STP compatible mode is determined
by the types of received packets.
Note that the command must be run in RSTP mode. If the bridge protocol is configured to the
STP mode, the command does not take effect.
Procedure
Step 1 Run the stp port mcheck command to configure the mCheck variable.
----End
Example
To transit port 0/3/0 to work in RSTP mode, do as follows:
huawei(config)#stp port 0/3/0 mcheck
Context
The RSTP statistics of UA5000 or a port can be cleared.
Procedure
l
Run the reset stp command to clear the RSTP statistics of a device.
Run the reset stp port command to clear the RSTP statistics of a port.
----End
Example
To clear the RSTP statistics of the UA5000, do as follows:
huawei(config)#reset stp
Issue 01 (2011-07-30)
178
10 Configuring RRPP
10
Configuring RRPP
Issue 01 (2011-07-30)
179
10 Configuring RRPP
Service Description
RRPP is a link layer protocol that is used particularly for Ethernet ring networks.
RRPP can prevent the broadcast storm caused by a data loop when the Ethernet ring network is
complete. When a link on the Ethernet ring network is disconnected, RRPP can quickly recover
the communication on the ring network.
Service Specifications
When configuring RRPP, you need to configure a role for each node on the RRPP ring.
An RRPP domain contains the RRPP ring, control VLAN, master node, transmission node,
primary port, and secondary port.
Compared with STP, RRPP has the following features:
l
The convergence time is irrelevant to the number of nodes on the ring network.
NOTE
On a ring network, either RRPP or STP can be configured for the same interface. RRPP and STP, however,
cannot be configured for the same interface simultaneously.
Networking
Figure 10-1 shows the example network for configuring the single RRPP ring topology.
Issue 01 (2011-07-30)
180
10 Configuring RRPP
Figure 10-1 Example network for configuring the single RRPP ring topology
Router
0/2/3
0/2/0
B
UA5000_1
0/2/1
0/2/1
UA5000_2
UA5000_4
0/2/0
0/2/0
0/2/1
UA5000_3
0/2/0
0/2/1
0/11/0
Modem
PC
The area inside the dotted line indicates the RRPP domain.
The solid line in blue indicates the RRPP ring.
The arrows in red indicate the service data flow
indicates that when the RRPP network is normal, port 0/2/1 of UA5000_1 is blocked.
Data Plan
Table 10-1 provides the data plan for configuring the single RRPP ring networking.
Issue 01 (2011-07-30)
181
10 Configuring RRPP
Table 10-1 Data plan for configuring the single RRPP ring networking
Config
uration
Item
Data
Remarks
RRPP
domain
ID
Control
VLAN
ID
10
The UA5000s
in the same
domain
should be
configured
with the same
domain ID,
ring ID, and
control
VLAN.
Timer
Hello timer: 2s
Default
value: 1s
Fail timer: 7s
Default
value: 3s
RRPP
ring
UA5000
_1
H612IPMD board:
UA5000
_2
VLAN ID: 20
It must be
consistent
with the upper
layer device.
H612IPMD board:
UA5000
_3
VLAN ID: 20
It must be
consistent
with the upper
layer device.
H612IPMD board:
Issue 01 (2011-07-30)
182
Config
uration
Item
UA5000
_4
10 Configuring RRPP
Data
Remarks
VLAN ID: 20
It must be
consistent
with the upper
layer device.
H612IPMD board:
Internet
access
mode
VLAN ID: 20
It must be
consistent
with the upper
layer device.
The
maintenance
terminal is
connected to
the device
through the
serial port or
the network
port, and you
can maintain
the device
successfully.
The source IP
address must
be the same as
the IP address
of the
modem.
Context
The UA5000s in the same domain should be configured with the same domain ID, ring ID, and
control VLAN.
Configuration Flowchart
Figure 10-2 shows the flowchart for configuring the single RRPP ring networking.
Issue 01 (2011-07-30)
183
10 Configuring RRPP
Figure 10-2 Flowchart for configuring the single RRPP ring networking
Start
Enable RRPP
End
Procedure
l
Configure UA5000_1.
1.
Configure the RRPP domain and the control VLAN for the master node.
huawei(config)#rrpp domain 1
huawei(config-rrpp-region)#control-vlan 10
2.
Configure the intervals of the hello timer and the fail timer for the master node.
huawei(config-rrpp-region)#timer hello-timer 2 fail-timer 7
NOTE
This step is optional. If you do not configure the intervals of the hello timer and the fail timer,
the interval of the hello timer is configured to 1s and the interval of the fail timer is configured
to 3s by default.
3.
Configure UA5000_1 as the master node of the RRPP ring and specify the primary
port and the secondary port.
huawei(config-rrpp-region)#ring 1 node-mode master primary-port 0/2/0
secondary-port 0/2/1 level 0
huawei(config-rrpp-region)#ring 1 enable
huawei(config-rrpp-region)#quit
Issue 01 (2011-07-30)
184
4.
10 Configuring RRPP
Enable RRPP.
huawei(config)#rrpp enable
5.
6.
Add the primary port and the secondary port to the VLAN.
huawei(config)#port vlan 20 0/2 0-1
7.
Configure UA5000_2.
1.
Configure the RRPP domain and the control VLAN for the master node.
huawei(config)#rrpp domain 1
huawei(config-rrpp-region)#control-vlan 10
2.
Configure the intervals of the hello timer and the fail timer for the master node.
huawei(config-rrpp-region)#timer hello-timer 2 fail-timer 7
NOTE
This step is optional. If you do not configure the intervals of the hello timer and the fail timer,
the interval of the hello timer is configured to 1s and the interval of the fail timer is configured
to 3s by default.
3.
Configure UA5000_2 as the transmission node of the RRPP ring and specify the
primary port and the secondary port.
huawei(config-rrpp-region)#ring 1 node-mode Transit primary-port 0/2/0
secondary-port 0/2/1 level 0
huawei(config-rrpp-region)#ring 1 enable
huawei(config-rrpp-region)#quit
4.
Enable RRPP.
huawei(config)#rrpp enable
5.
Create a VLAN and add the primary port and the secondary port to the VLAN.
huawei(config)#vlan 20 smart
huawei(config)#port vlan 20 0/2 0-1
6.
Configure UA5000_3.
1.
Configure the RRPP domain and the control VLAN for the master node.
huawei(config)#rrpp domain 1
huawei(config-rrpp-region)#control-vlan 10
2.
Configure the intervals of the hello timer and the fail timer for the master node.
huawei(config-rrpp-region)#timer hello-timer 2 fail-timer 7
NOTE
This step is optional. If you do not configure the intervals of the hello timer and the fail timer,
the interval of the hello timer is configured to 1s and the interval of the fail timer is configured
to 3s by default.
3.
Configure UA5000_3 as the transmission node of the RRPP ring and specify the
primary port and the secondary port.
huawei(config-rrpp-region)#ring 1 node-mode Transit primary-port 0/2/0
secondary-port 0/2/1 level 0
huawei(config-rrpp-region)#ring 1 enable
huawei(config-rrpp-region)#quit
4.
Issue 01 (2011-07-30)
Enable RRPP.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
185
10 Configuring RRPP
huawei(config)#rrpp enable
5.
Create a VLAN and add the primary port and the secondary port to the VLAN.
huawei(config)#vlan 20 smart
huawei(config)#port vlan 20 0/2 0-1
6.
Add a service port. Use the default traffic entry to set the traffic of the service port.
huawei(config)#service-port vlan 20 adsl 0/11/0 vpi 0 vci 35 rx-cttr 6 txcttr 6
7.
8.
9.
Configure UA5000_4.
1.
Configure the RRPP domain and the control VLAN for the master node.
huawei(config)#rrpp domain 1
huawei(config-rrpp-region)#control-vlan 10
2.
Configure the intervals of the hello timer and the fail timer for the master node.
huawei(config-rrpp-region)#timer hello-timer 2 fail-timer 7
NOTE
This step is optional. If you do not configure the intervals of the hello timer and the fail timer,
the interval of the hello timer is configured to 1s and the interval of the fail timer is configured
to 3s by default.
3.
Configure UA5000_4 as the transmission node of the RRPP ring and specify the
primary port and the secondary port.
huawei(config-rrpp-region)#ring 1 node-mode Transit primary-port 0/2/0
secondary-port 0/2/1 level 0
huawei(config-rrpp-region)#ring 1 enable
huawei(config-rrpp-region)#quit
4.
Enable RRPP.
huawei(config)#rrpp enable
5.
Create a VLAN and add the primary port and the secondary port to the VLAN.
huawei(config)#vlan 20 smart
huawei(config)#port vlan 20 0/2 0-1
6.
----End
Result
l
Issue 01 (2011-07-30)
186
10 Configuring RRPP
Run the display rrpp verbose command to check whether the state of port 0/2/0 on
UA5000_1 is "UP" and the state of port 0/2/1 on UA5000_1 is "BLOCKED."
Run the display rrpp verbose command to check whether the state of port 0/2/0 on
UA5000_3 is "UP" and the state of port 0/2/1 on UA5000_3 is "UP."
The user should be able to access the Internet in IPoA mode.
l
Context
To enable RRPP, you need to enable RRPP on each node of the RRPP ring. In this manner, the
RRPP ring can be activated successfully.
By default, RRPP is disabled.
Procedure
Step 1 Run the rrpp enable command to enable RRPP.
Step 2 Run the display rrpp brief command to query whether RRPP is enabled.
----End
Example
To enable RRPP globally, do as follows:
huawei(config)#rrpp enable
huawei(config)#display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , E - Edge , A - Assistant-Edge
RRPP Protocol Status : Enable
RRPP Protocol Mode
: RRPP
Number of RRPP Domains: 1
Domain Index : 1
Control VLAN : major 10
sub Hello Timer
: 4 sec(default is 1 sec) Fail Timer : 15 sec(default is 3 sec)
Ring
Ring
Node
Primary/Common
Secondary/Edge
Is
ID
Level Mode
Port
Port
Enabled
--------------------------------------------------------------------
Issue 01 (2011-07-30)
187
10 Configuring RRPP
1
0
M
0/2/0
0/2/1
YES
--------------------------------------------------------------------
Related Operation
Table 10-2 lists the related operation for enabling RRPP.
Table 10-2 Related operation for enabling RRPP
To...
Remarks
Disable RRPP
rrpp disable
Prerequisite
Before you create an RRPP domain, the RRPP domain must not exist in the system.
When you delete an RRPP domain, RRPP must be disabled and there must not be any ring in
the RRPP domain.
Procedure
Step 1 Run the rrpp domain command to create an RRPP domain.
Step 2 Run the undo rrpp domain command to delete an RRPP domain.
----End
Example
To create an RRPP domain with ID 1, do as follows:
huawei(config)#rrpp domain 1
huawei(config-rrpp-region)#
Issue 01 (2011-07-30)
188
10 Configuring RRPP
NOTE
If the domain with ID 1 exists in the system when you create the domain, run the rrpp domain command
to enter the configuration mode of the specified domain.
If domain 1 is enabled or a ring exists in the domain, domain 1 cannot be deleted.
Prerequisite
The RRPP domain for which the control VLAN needs to be configured must already exist in
the system.
Context
Each RRPP domain is configured with the control VLAN. The control VLAN should not be
configured with other services.
The control VLAN is a concept in comparison to the data VLAN. That is, in an RRPP domain,
the control VLAN transmits RRPP packets and the data VLAN transmits data packets.
The configured control VLAN must be unique.
Procedure
Step 1 Run the rrpp domain command to enter the domain configuration mode.
Step 2 Run the control vlan command to configure the control VLAN of a domain.
Step 3 Run the quit command to quit the domain configuration mode.
Step 4 Run the display rrpp brief command to query the configuration result.
----End
Example
To create a control VLAN with ID 10, do as follows:
huawei(config)#rrpp domain 1
huawei(config-rrpp-region)#control-vlan 10
huawei(config-rrpp-region)#quit
huawei(config)#display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , E - Edge , A - Assistant-Edge
RRPP Protocol Status : Enable
RRPP Protocol Mode
: RRPP
Number of RRPP Domains: 1
Domain Index : 1
Control VLAN : major 10
sub Hello Timer
: 1 sec(default is 1 sec) Fail Timer : 3 sec(default is 3 sec)
Ring
Ring
Node
Primary/Common
Secondary/Edge
Is
ID
Level Mode
Port
Port
Enabled
--------------------------------------------------------------------
Issue 01 (2011-07-30)
189
10 Configuring RRPP
1
0
T
0/2/0
0/2/1
Yes
--------------------------------------------------------------------
Prerequisite
The RRPP domain for which the interval of the hello timer needs to be configured must already
exist in the system.
Context
By default, the interval of the hello timer is set to 1s.
The interval of the fail timer is at least three times longer than the interval of the hello timer.
Procedure
Step 1 Run the rrpp domain command to enter the domain configuration mode.
Step 2 Run the timer command to configure the interval of the hello timer of an RRPP domain.
Step 3 Run the quit command to quit the domain configuration mode.
Step 4 Run the display rrpp brief command to query the RRPP configuration.
----End
Example
To configure the interval of the hello timer to 4s and the interval of the fail timer to 15s, do as
follows:
huawei(config)#rrpp domain 1
huawei(config-rrpp-region)#timer hello-timer 4 fail-timer 15
huawei(config-rrpp-region)#quit
huawei(config)#display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , E - Edge , A - Assistant-Edge
RRPP Protocol Status : Enable
RRPP Protocol Mode
: RRPP
Number of RRPP Domains: 1
Domain Index : 1
Control VLAN : major 10
sub Hello Timer
: 4 sec(default is 1 sec) Fail Timer : 15 sec(default is 3 sec)
Ring
Ring
Node
Primary/Common
Secondary/Edge
Is
ID
Level Mode
Port
Port
Enabled
-------------------------------------------------------------------1
0
T
0/2/0
0/2/1
Yes
--------------------------------------------------------------------
Related Operation
Table 10-3 lists the related operation for configuring the interval of the hello timer of an RRPP
domain.
Issue 01 (2011-07-30)
190
10 Configuring RRPP
Table 10-3 Related operation for configuring the interval of the hello timer of an RRPP domain
To...
Delete a timer
undo timer
Prerequisite
The RRPP domain for which the interval of the fail timer needs to be configured must already
exist in the system.
Context
By default, the interval of the fail timer is set to 3s.
The interval of the fail timer is at least three times longer than the interval of the hello timer.
Procedure
Step 1 Run the rrpp domain command to enter the domain configuration mode.
Step 2 Run the timer command to configure the interval of the fail timer of an RRPP domain.
Step 3 Run the quit command to quit the domain configuration domain.
Step 4 Run the display rrpp brief command to query the RRPP configuration.
----End
Example
To configure the interval of the hello timer to 4s and the interval of the fail timer to 15s, do as
follows:
huawei(config)#rrpp domain 1
huawei(config-rrpp-region)#timer hello-timer 4 fail-timer 15
huawei(config-rrpp-region)#quit
huawei(config)#display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , E - Edge , A - Assistant-Edge
RRPP Protocol Status : Enable
RRPP Protocol Mode
: RRPP
Number of RRPP Domains: 1
Domain Index : 1
Control VLAN : major 10
sub Hello Timer
: 4 sec(default is 1 sec) Fail Timer : 15 sec(default is 3 sec)
Ring
Ring
Node
Primary/Common
Secondary/Edge
Is
ID
Level Mode
Port
Port
Enabled
-------------------------------------------------------------------1
0
T
0/2/0
0/2/1
Yes
--------------------------------------------------------------------
Issue 01 (2011-07-30)
191
10 Configuring RRPP
Related Operation
Table 10-4lists the related operation for configuring the interval of the fail timer of an RRPP
domain.
Table 10-4 Related operation for configuring the interval of the fail timer of an RRPP domain
To...
Delete a timer
undo timer
Context
l
Procedure
Step 1 Run the config command to enter the global config mode.
Step 2 Run the rrpp enable/disable command to enable or disable RRPP.
Step 3 Run the rrpp mode command to configure the running mode of RRPP.
Step 4 Run the display rrpp brief command to query the RRPP configuration.
----End
Example
To configure the running mode of RRPP as the EAPS standard mode, do as follows:
Enable RRPP globally.
huawei(config)#rrpp enable
Issue 01 (2011-07-30)
:
:
Enable
EAPS
192
10 Configuring RRPP
Before changing the running mode of RRPP, you need to disable RRPP.
Prerequisite
The RRPP domain for which an RRPP ring needs to be configured must already exist in the
system.
Context
Each RRPP ring corresponds to an Ethernet topology where the devices are connected in a ring.
An RRPP ring is identified by an ID that consists of integers.
Each RRPP ring is a local unit of the RRPP domain to which the RRPP ring belongs. In practice,
RRPP takes effect on the RRPP ring.
An RRPP ring cannot be modified once it is created. When an RRPP ring is enabled, it cannot
be deleted.
In the single RRPP ring networking, the level of the RRPP ring must be set to 0.
Procedure
Step 1 Run the rrpp domain command to enter the domain configuration mode.
Step 2 Run the ring command to configure an RRPP ring.
Step 3 Run the enable/disable command to enable or disable an RRPP ring.
Step 4 Run the quit command to quit the domain configuration mode.
Step 5 Run the display rrpp brief command to query the RRPP configuration.
----End
Example
Assume the following:
l
Issue 01 (2011-07-30)
193
10 Configuring RRPP
Related Operation
Table 10-5 lists the related operation for configuring an RRPP ring.
Table 10-5 Related operation for configuring an RRPP ring
To...
undo ring
Prerequisite
The node for which the working mode of the RRPP port needs to be configured must exist in
the system and must work in the normal state.
Context
Of the two ports through which the master node or the transmission node accesses the Ethernet
ring, one port is the primary port and the other port is the secondary port. The port roles are
determined by the user configuration.
The functions of the primary port and the secondary port on the master node are different,
whereas the functions of the primary port and the secondary port on the transmission node are
the same.
The master node transmits the packet to detect the loop status from the primary port. If the
secondary port on the master node can receive the packet, it indicates that the RRPP ring where
Issue 01 (2011-07-30)
194
10 Configuring RRPP
the master node is located is complete. In this case, you need to block the secondary port to
prevent data loops. Conversely, if the secondary port cannot receive the packet within a certain
period, it indicates that the ring is faulty. In this case, you need to unblock the secondary port to
ensure that all the nodes in the ring can communicate successfully.
Procedure
Step 1 Run the rrpp domain command to enter the domain configuration mode.
Step 2 Run the ring command to configure the port working mode of a node in an RRPP ring.
Step 3 Run the quit command to quit the domain configuration mode.
Step 4 Run the display rrpp brief command to query the RRPP configuration.
----End
Example
Assume the following:
l
An RRPP ring cannot be modified once it is created. Therefore, ensure that the parameters are planned correctly
when you configure an RRPP ring. Otherwise, you have to rework if certain parameters are planned incorrectly.
195
10 Configuring RRPP
Context
An RRPP ring consists of nodes. Each RRPP ring must have only one master node.
The master node initiates the polling mechanism (a mechanism for the master node of the RRPP
ring to actively detect the network status), and determines the operations to be performed when
the network topology changes.
The nodes, except the master node in an RRPP ring, are the transmission nodes. The transmission
nodes monitor the status of the RRPP links that are directly connected to the nodes, and notify
the master node of the link change. Then, the master node determines how to handle the change.
Procedure
Step 1 Run the rrpp domain command to enter the domain configuration mode.
Step 2 Run the ring command to configure the working mode of a node in an RRPP ring.
Step 3 Run the quit command to quit the domain configuration mode.
Step 4 Run the display rrpp brief command to query the RRPP configuration.
----End
Example
Assume the following:
l
An RRPP ring cannot be modified once it is created. Therefore, the configuration of the port working mode
must be complete when you create the RRPP ring.
Issue 01 (2011-07-30)
196
11 Configuring NTP
11
Configuring NTP
197
11 Configuring NTP
Issue 01 (2011-07-30)
198
11 Configuring NTP
Service Description
NTP is an application layer protocol in the TCP/IP protocol suite. NTP is used to synchronize
the time between the distributed time server and the client. The network devices that support
NTP maintain consistent time by exchanging NTP packets to implement various service
applications (such as the network management system and the network accounting system) based
on the universal time.
For details on NTP, see "NTP" in the UA5000 Universal Access Unit Feature Description.
Service Specifications
NTP has four working modes as follows:
l
Broadcast
Multicast
Unicast server
Peer
Prerequisite
l
The time zone of the UA5000 must be configured. For details, see "Configuring the System
Time."
The network devices and the line must work in the normal state.
Context
The number of clock strata of the synchronizing device must be equal to or smaller than the
number of clock strata of the synchronized device. Otherwise, the clock synchronization fails.
Networking
Figure 11-1 shows an example network for configuring the NTP broadcast mode.
Issue 01 (2011-07-30)
199
11 Configuring NTP
Figure 11-1 Example network for configuring the NTP broadcast mode
Router
VLAN interface 1
VLAN interface 2
1.1.1.1/24
1.1.1.2/24
UA5000 _A
UA5000 _B
UA5000_A functions as an NTP broadcast server, and periodically sends clock synchronization
packets to destination address 255.255.255.255. UA5000_B functions as a client to listen to the
broadcast packets from the server, and then synchronizes its clock with the clock of the server.
Data Plan
Table 11-1 provides the data plan for configuring the NTP broadcast mode.
Table 11-1 Data plan for configuring the NTP broadcast mode
Item
Data
UA5000_A
VLAN ID: 2
IP address of L3 interface 1: 1.1.1.1
Clock: Functions as the broadcast server. Uses the local clock as
the NTP master clock with two strata.
UA5000_B
VLAN ID: 2
IP address of L3 interface 2: 1.1.1.2
Clock: Functions as the broadcast client. Follows the clock of the
broadcast server.
Configuration Flowchart
Figure 11-2 and Figure 11-3 show the flowcharts for configuring the NTP broadcast mode.
Issue 01 (2011-07-30)
200
11 Configuring NTP
Figure 11-2 Flowchart for configuring the NTP broadcast mode on the UA5000_A side
Start
No
Is the reference
clock available?
Yes
No
Configure an
L3 interface?
No
Yes
Configure an L3 interface
Configure the NTP broadcast server
Save the data
End
Issue 01 (2011-07-30)
201
11 Configuring NTP
Figure 11-3 Flowchart for configuring the NTP broadcast mode on the UA5000_B side
Start
No
Configure an
L3 interface?
No
Yes
Configure an L3 interface
Configure the NTP broadcast client
Save the data
End
Procedure
l
Configure the local clock of UA5000_A as the NTP master clock with two strata.
huawei(config)#ntp-service refclock-master 2
2.
3.
Configure an L3 interface.
huawei(config)#vlan 2 standard
huawei(config)#port vlan 2 0/3 0
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#ip address 1.1.1.1 24
4.
5.
Issue 01 (2011-07-30)
202
11 Configuring NTP
6
huawei(config)#ntp-service reliable authentication-keyid 88
2.
Configure an L3 interface.
huawei(config)#vlan 2 standard
huawei(config)#port vlan 2 0/3 0
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#ip address 1.1.1.2 24
3.
4.
----End
Result
Follow the following steps to verify the configuration:
1.
2.
Issue 01 (2011-07-30)
203
11 Configuring NTP
ms
reference time: 00:00:00.000 UTC Jan 1 1900(00000000.00000000)
3.
In this case, the clock of UA5000_B is synchronized with the clock of UA5000_A. The
clock of UA5000_B has three strata, which is one stratum larger than the clock strata of
UA5000_A.
Prerequisite
l
The time zone of the UA5000 must be configured. For details, see "Configuring the System
Time."
The network devices and the line must work in the normal state.
Context
The number of clock strata of the synchronizing device must be equal to or smaller than the
number of clock strata of the synchronized device. Otherwise, the clock synchronization fails.
Networking
Figure 11-4 shows an example network for configuring the NTP multicast mode.
Issue 01 (2011-07-30)
204
11 Configuring NTP
Figure 11-4 Example network for configuring the NTP multicast mode
Router
VLAN interface 1
VLAN interface 2
1.1.1.1/24
1.1.1.2/24
UA5000 _A
UA5000 _B
UA5000_A sends multicast packets through VLAN interface 2, whereas UA5000_B monitors
multicast packets through VLAN interface 2. After receiving multicast packets from
UA5000_A, UA5000_B synchronizes its clock with the clock of UA5000_A.
Data Plan
Table 11-2 provides the data plan for configuring the NTP multicast mode.
Table 11-2 Data plan for configuring the NTP multicast mode
Item
Data
UA5000_A
UA5000_B
Configuration Flowchart
Figure 11-5 and Figure 11-6 show the flowcharts for configuring the NTP multicast mode.
Issue 01 (2011-07-30)
205
11 Configuring NTP
Figure 11-5 Flowchart for configuring the NTP multicast mode on the UA5000_A side
Start
No
Is the reference
clock available?
Yes
No
Configure an
L3 interface?
No
Yes
Configure an L3 interface
Configure the NTP multicast server
Save the data
End
Issue 01 (2011-07-30)
206
11 Configuring NTP
Figure 11-6 Flowchart for configuring the NTP multicast mode on the UA5000_B side
Start
No
Configure an
L3 interface?
No
Yes
Configure an L3 interface
Configure the NTP multicast client
Save the data
End
Procedure
l
Configure the local clock of UA5000_A as the NTP master clock with two strata.
huawei(config)#ntp-service refclock-master 2
2.
3.
Configure an L3 interface.
huawei(config)#vlan 2 standard
huawei(config)#port vlan 2 0/3 0
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#ip address 1.1.1.1 24
4.
5.
Issue 01 (2011-07-30)
207
11 Configuring NTP
md5 123456
huawei(config)#ntp-service reliable authentication-keyid 88
2.
Configure an L3 interface.
huawei(config)#vlan 2 standard
huawei(config)#port vlan 2 0/3 0
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#ip address 1.1.1.2 24
3.
4.
----End
Result
Follow the following steps to verify the configuration:
1.
2.
Issue 01 (2011-07-30)
208
11 Configuring NTP
ms
reference time: 00:00:00.000 UTC Jan 1 1900(00000000.00000000)
3.
In this case, the clock of UA5000_B is synchronized with the clock of UA5000_A. The
clock of UA5000_B has three strata, which is one stratum larger than the clock strata of
UA5000_A.
Prerequisite
l
The time zone of the UA5000 must be configured. For details, see "Configuring the System
Time."
The network devices and the line must work in the normal state.
Context
The number of clock strata of the synchronizing device must be equal to or smaller than the
number of clock strata of the synchronized device. Otherwise, the clock synchronization fails.
Networking
Figure 11-7 shows an example network for configuring the NTP unicast server mode.
Issue 01 (2011-07-30)
209
11 Configuring NTP
Figure 11-7 Example network for configuring the NTP unicast server mode
Router
VLAN interface 1
1.1.1.1/24
VLAN interface 2
1.1.1.2/24
UA5000 _A
UA5000 _B
UA5000_A functions as an NTP server, whereas UA5000_B functions as a client. The client
sends the request packets for clock synchronization to the server and the server responds to the
request packets and synchronizes the clock.
Data Plan
Table 11-3 provides the data plan for configuring the NTP unicast server mode.
Table 11-3 Data plan for configuring the NTP unicast server mode
Item
Data
UA5000_A
UA5000_B
Configuration Flowchart
Figure 11-8 and Figure 11-9 show the flowcharts for configuring the NTP unicast server mode.
Issue 01 (2011-07-30)
210
11 Configuring NTP
Figure 11-8 Flowchart for configuring the NTP unicast server mode on the UA5000_A side
Start
Yes
Is the reference
clock available?
No
Configure the NTP master clock
Configure an
L3 interface?
No
Yes
Configure an L3 interface
Save the data
End
Figure 11-9 Flowchart for configuring the NTP unicast server mode on the UA5000_B side
Start
Configure an
L3 interface?
No
Yes
Configure an L3 interface
Specify the server
Save the data
End
Procedure
l
Configure the local clock of UA5000_A as the NTP master clock with two strata.
huawei(config)#ntp-service refclock-master 2
2.
Configure an L3 interface.
huawei(config)#vlan 2 standard
huawei(config)#port vlan 2 0/3 0
Issue 01 (2011-07-30)
211
11 Configuring NTP
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#ip address 1.1.1.1 24
huawei(config-if-vlanif2)#quit
3.
Configure an L3 interface.
huawei(config)#vlan 2 standard
huawei(config)#port vlan 2 0/3 0
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#ip address 1.1.1.2 24
huawei(config-if-vlanif2)#quit
2.
3.
----End
Result
Follow the following steps to verify the configuration:
1.
2.
Issue 01 (2011-07-30)
212
11 Configuring NTP
ms
root delay: 0.00
ms
root dispersion: 0.00
ms
peer dispersion: 0.00
ms
reference time: 00:00:00.000 UTC Jan 1 1900(00000000.00000000)
3.
In this case, the clock of UA5000_B is synchronized with the clock of UA5000_A. The
clock of UA5000_B has three strata, which is one stratum larger than the clock strata of
UA5000_A.
Prerequisite
l
The time zone of the UA5000 must be configured. For details, see "Configuring the System
Time."
The network devices and the line must work in the normal state.
Context
Whether the clock of the active peer synchronizes with the clock of the passive peer or the clock
of the passive peer synchronizes with the clock of the active peer is determined by the clock
strata. The clock of the peer with higher stratum is synchronized by the clock of the peer with
lower stratum.
Networking
Figure 11-10 shows an example network for configuring the NTP peer mode.
Issue 01 (2011-07-30)
213
11 Configuring NTP
Figure 11-10 Example network for configuring the NTP peer mode
Router
VLAN interface 1
1.1.1.1/24
VLAN interface 2
1.1.1.2/24
UA5000 _A
UA5000 _B
UA5000_A functions as an NTP active peer, whereas UA5000_B functions as the NTP passive
peer. The active peer sends request packets for clock synchronization to the passive peer, and
then the passive peer responds to the request packets. In this case, the peer with higher stratum
is synchronized by the clock of the peer with lower stratum.
Data Plan
Table 11-4 provides the data plan for configuring the NTP peer mode.
Table 11-4 Data plan for configuring the NTP peer mode
Item
Data
UA5000_A
UA5000_B
Configuration Flowchart
Figure 11-11 and Figure 11-12 show the flowcharts for configuring the NTP peer mode.
Issue 01 (2011-07-30)
214
11 Configuring NTP
Figure 11-11 Flowchart for configuring the NTP peer mode on the UA5000_A side
Start
Yes
Is the reference
clock available?
No
Configure the NTP master clock
Configure an
L3 interface?
No
Yes
Configure an L3 interface
Specify the passive peer
Save the data
End
Figure 11-12 Flowchart for configuring the NTP peer mode on the UA5000_B side
Start
Configure an
L3 interface?
No
Yes
Configure an L3 interface
Save the data
End
Procedure
l
Configure the local clock of UA5000_A as the NTP master clock with two strata.
huawei(config)#ntp-service refclock-master 2
2.
Configure an L3 interface.
huawei(config)#vlan 2 standard
huawei(config)#port vlan 2 0/3 0
Issue 01 (2011-07-30)
215
11 Configuring NTP
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#ip address 1.1.1.1 24
huawei(config-if-vlanif2)#quit
3.
4.
Configure an L3 interface.
huawei(config)#vlan 2 standard
huawei(config)#port vlan 2 0/3 0
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#ip address 1.1.1.2 24
huawei(config-if-vlanif2)#quit
2.
----End
Result
By default, the system clock has 16 strata, so the clock of UA5000_B has 16 strata. The clock
of UA5000_A has two strata. Therefore, the clock of UA5000_B is synchronized by the clock
of UA5000_A.
Follow the following steps to verify the configuration:
1.
2.
Issue 01 (2011-07-30)
216
11 Configuring NTP
3.
In this case, the clock of UA5000_B is synchronized with the clock of UA5000_A. The clock
of UA5000_B has three strata, which is one stratum larger than the clock strata of UA5000_A.
Context
l
If the NTP authentication is disabled on the client, the clock of the client can be
synchronized with the clock of the server, regardless of whether the NTP authentication is
enabled on the server.
The key configuration of the server should be consistent with the key configuration of the
client.
If NTP authentication is enabled on the client, the client can pass the authentication, as long
as the server is configured with the same key as the client. In this case, you need not enable
the NTP authentication on the server or define its key as a reliable one.
The client synchronizes only with the server that provides the reliable key. If the server
provides an unreliable key, the client does not synchronize with the server.
Issue 01 (2011-07-30)
217
11 Configuring NTP
Configuration Flowchart
Figure 11-13 shows the flowchart for configuring the NTP ID authentication.
Figure 11-13 Flowchart for configuring the NTP ID authentication
Start
End
Procedure
Step 1 Run the ntp-service authentication enable command to enable the NTP-service ID
authentication.
Step 2 Run the ntp-service authentication-keyid command to set a key for the NTP ID authentication.
Step 3 Run the ntp-service reliable authentication-keyid command to define the key as a reliable
one.
----End
Example
To enable the NTP ID authentication, configure the name of the NTP ID authentication key to
aNiceKey, configure the key number to 42, and then define key 42 as a reliable key, do as follows:
huawei(config)#ntp-service authentication enable
huawei(config)#ntp-service authentication-keyid 42 authentication-mode md5
aNiceKey
huawei(config)#ntp-service reliable authentication-keyid 42
Related Operation
Table 11-5 lists the related operations for configuring the NTP ID authentication.
Issue 01 (2011-07-30)
218
11 Configuring NTP
Context
l
With no IP address specified, by default, local clock 127.127.1.0 functions as the NTP
master clock.
The number of clock strata represents clock accuracy. The number of clock strata ranges
from 1 to 15. The initial value is 16 before it is configured. The clock with one stratum is
of the highest accuracy. The larger the number of clock strata, the lower the clock accuracy.
Procedure
Step 1 Run the ntp-service refclock-master command to configure the NTP master clock.
----End
Example
To configure the clock of the local device whose IP address is 127.127.1.0 as an NTP master
clock with two strata, do as follows:
huawei(config)#ntp-service refclock-master 127.127.1.0 2
Related Operation
Table 11-6 lists the related operation for configuring the NTP master clock.
Issue 01 (2011-07-30)
219
11 Configuring NTP
Table 11-6 Related operation for configuring the NTP master clock
To...
Context
After the UA5000 is configured as the NTP server in broadcast mode, it periodically sends clock
synchronization packets through specified interfaces to destination address 255.255.255.255.
The client listens to the broadcast packets from the server, and then synchronizes its clock with
the clock of the server.
Procedure
Step 1 Run the interface vlanif command to enter VLANIF mode.
Step 2 Run the ntp-service broadcast-server command to configure the NTP server in broadcast
mode.
----End
Example
Assume that the NTP version is 2. To configure the UA5000 as the NTP server in broadcast
mode to transmit broadcast packets encrypted by key 88 through VLAN interface 2, do as
follows:
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#ntp-service broadcast-server authentication-keyid 88
version 2
Related Operation
Table 11-7 lists the related operations for configuring the NTP server in broadcast mode.
Table 11-7 Related operations for configuring the NTP server in broadcast mode
Issue 01 (2011-07-30)
To...
Remarks
220
11 Configuring NTP
To...
Remarks
debugging ntp-service
Procedure
Step 1 Run the interface vlanif command to enter VLANIF mode.
Step 2 Run the ntp-service broadcast-client command to configure the NTP client in broadcast mode.
----End
Example
To configure the UA5000 as the NTP client in broadcast mode to receive broadcast packets
through VLAN interface 2, do as follows:
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#ntp-service broadcast-client
Related Operation
Table 11-8 lists the related operations for configuring the NTP client in broadcast mode.
Table 11-8 Related operations for configuring the NTP client in broadcast mode
Issue 01 (2011-07-30)
To...
221
11 Configuring NTP
Context
l
After the UA5000 is configured as the NTP server in multicast mode, it periodically sends
clock synchronization packets through specified interfaces to destination address 224.0.1.1.
The client listens to the multicast packets from the server, and then synchronizes its clock
with the clock of the server.
In multicast mode, the NTP configuration must be performed on both the server and the
client. The clock of the client can only be synchronized by the clock of the server.
Procedure
Step 1 Run the interface vlanif command to enter VLANIF mode.
Step 2 Run the ntp-service multicast-server command to configure the NTP server in multicast mode.
----End
Example
Assume that the IP address of the corresponding multicast group is 224.0.1.1 and the NTP version
is 2. To configure the UA5000 as the NTP server in multicast mode to transmit multicast packets
encrypted by key 4 through VLAN interface 2, do as follows:
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#ntp-service multicast-server 224.0.1.1 authenticationkeyid 4 version 2
Related Operation
Table 11-9 lists the related operations for configuring the NTP server in multicast mode.
Table 11-9 Related operations for configuring the NTP server in multicast mode
To...
222
11 Configuring NTP
Context
In multicast mode, the NTP configuration must be performed on both the server and the client.
The clock of the client can be synchronized by only the clock of the server.
Procedure
Step 1 Run the interface vlanif command to enter VLANIF mode.
Step 2 Run the ntp-service multicast-client command to configure the NTP client in multicast mode.
----End
Example
To configure the UA5000 as the NTP client in multicast mode to receive the multicast messages
with multicast IP address 224.0.1.2 from VLAN interface 2, do as follows:
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#ntp-service multicast-client 224.0.1.2
Related Operation
Table 11-10 lists the related operations for configuring the NTP client in multicast mode
Table 11-10 Related operations for configuring the NTP client in multicast mode
To...
Context
l
The client sends request packets for clock synchronization to the server. After receiving
the request packets, the server sends response packets. After receiving the response packets
from the server, the client filters and selects the clock, and synchronizes the clock with the
clock of the server.
In the NTP unicast server mode, only the client needs the NTP configuration while the
server need not. This mode is unidirectional, that is, only the client initiates the clock
synchronization with the server, while the server does not.
Issue 01 (2011-07-30)
223
11 Configuring NTP
Procedure
Step 1 Run the ntp-service unicast-server command to configure a client in the NTP unicast server
mode.
----End
Example
Assume that:
l
The version is 3.
Related Operation
Table 11-11 lists the related operations for configuring the NTP unicast server.
Table 11-11 Related operations for configuring the NTP unicast server
To...
ntp-service max-dynamic-sessions
Context
l
The active peer sends request packets for clock synchronization to the passive peer. After
receiving the request packets, the passive peer sends response packets. The active peer and
the passive peer synchronize their clocks mutually.
In NTP peer mode, the NTP configuration is performed only on the active peer. The peer
mode is bidirectional. The active peer and the passive peer can synchronize their clocks
mutually.
The clock of the peer with larger clock strata is synchronized by the clock of the peer with
smaller clock strata.
Issue 01 (2011-07-30)
224
11 Configuring NTP
Procedure
Step 1 Run the ntp-service unicast-peer command to configure an active peer.
----End
Example
To specify the host with IP address 3.0.1.32 as a passive peer, the device is an active peer, the
version is 2, and the packets are encrypted by key 7, do as follows:
huawei(config)#ntp-service unicast-peer 3.0.1.32 version 2 authentication-keyid
7
Related Operation
Table 11-12 lists the related operation for configuring the NTP peer.
Table 11-12 Related operation for configuring the NTP peer
To...
Prerequisite
The applied access control (ACL) must exist.
Context
By default, access to a local device NTP service is not controlled. The access control authority
is classified into the following levels in a descending order: peer, query, server, and
synchronization.
l
Issue 01 (2011-07-30)
225
11 Configuring NTP
Procedure
Step 1 Run the ntp-service access command to configure the authority of access to a local device NTP
service.
----End
Example
To configure the authority of access to a local device NTP service to "peer", and the applied
ACL to 2000, do as follows:
huawei(config)#ntp-service access peer 2000
Related Operation
Table 11-13 lists the related operations for configuring the authority of access to a local device
NTP service.
Table 11-13 Related operations for configuring the authority of access to a local device NTP
service
To...
ntp-service max-dynamic-sessions
Prerequisite
The ACL applied already exists.
Context
l
Issue 01 (2011-07-30)
226
11 Configuring NTP
Procedure
Step 1 Run the ntp-service source-interface command to specify an interface for transmitting NTP
packets.
----End
Example
To specify VLAN interface 2 for transmitting NTP packets, do as follows:
huawei(config)#ntp-service source-interface vlanif 2
Related Operation
Table 11-14 lists the related operations for configuring an interface for transmitting or receiving
NTP packets.
Table 11-14 Related operations for configuring an interface for transmitting or receiving NTP
packets
Issue 01 (2011-07-30)
To...
Remarks
Configure in the
corresponding
interface config mode.
Configure in the
corresponding
interface config mode.
227
12
Issue 01 (2011-07-30)
228
Service Description
The UA5000 manages the layer 2 address forwarding table (also called the MAC address list).
This table includes the MAC address of a device, VLAN and the number of the port connecting
to the device. According to the MAC address list, the UA5000 distributes the packets to the
corresponding physical ports. MAC address management refers to maintaining the MAC address
list by learning the MAC addresses, configuring the static MAC addresses and setting the aging
time of the MAC addresses.
Service Specifications
The UA5000 supports up to 512 static MAC addresses. If the control board is H601IPMB,
H612IPMB, or H601IPMD, the UA5000 supports up to 16384 dynamic MAC addresses. If the
control board is H612IPMD, the UA5000 supports up to 32768 dynamic MAC addresses.
The UA5000 supports up to 20 MAC address pools, but the total number of MAC addresses
cannot exceed 2048.
Prerequisite
l
Create a service port before adding a static MAC address to the service port.
Add an uplink port to a specified VLAN before adding a static MAC address to the uplink
port.
When you add a static MAC address in the specified service channel or the uplink port of
a specified VLAN, if the same dynamic MAC address exists in the system, the dynamic
MAC address is overwritten by the static MAC address. A static MAC address cannot be
added if the same static MAC address exists in the system.
The configured static MAC address must be excluded from the MAC address pool. You
can run the display mac-pool command to check it.
An uplink port which is included in different VLANs can be configured with the same static
MAC address.
Context
Procedure
Step 1 Run the mac-address static command to add a static MAC address.
Step 2 Run the display mac-address static command to query the configured static MAC address.
----End
Issue 01 (2011-07-30)
229
Example
To configure the MAC address of ADSL2+ port 0/7/0 with VPI/VCI 0/32 to 1010-1010-1010,
do as follows:
huawei(config)#mac-address static adsl 0/7/0 vpi 0 vci 32 1010-1010-1010
huawei(config)#display mac-address static
--------------------------------------------------------------------------Type MAC
MAC Type F/S /P VPI VCI FLOWTYPE FLOWPARA VLANID
--------------------------------------------------------------------------adl
1010-1010-1010 static
0/7 /0 0
32
3
--------------------------------------------------------------------------Total: 1
Note : F--Frame, S--Slot, P--Port(xDSL Port,UP-Link Port,IMA GROUP or
VLAN ID etc.), the VPI is access-end VLAN ID in vdsl/eau port
or PON ID in gpon port
Related Operation
Table 12-1 lists the related operation for adding a static MAC address.
Table 12-1 Related operation for adding a static MAC address
To...
Context
l
By default, the maximum number of MAC addresses learned by a service port is 255.
The maximum number of MAC addresses learned by a service port does not include the
configured static MAC addresses.
Procedure
Step 1 Run the vlan command to add a VLAN.
Step 2 Run the port vlan command to add the uplink port and service virtual port to the VLAN.
Step 3 Run the service-port command to add a service virtual port to the VLAN.
Step 4 Run the mac-address max-mac-count command to set the maximum number of MAC
addresses learned by a service port.
Step 5 Run the display mac-address max-mac-count command to query the configured maximum
number of MAC addresses learned by the service port.
----End
Issue 01 (2011-07-30)
230
To set the maximum number of MAC addresses learned by ADSL service port 0/7/0 with VLAN
ID of 10 at the user side as 10, do as follows:
huawei(config)#vlan 10 smart
huawei(config)#port vlan 10 0/3 0
huawei(config)#service-port vlan 10 adsl 0/7/0 vpi 0 vci 35 multi-service user-v
lan 10 rx-cttr 6 tx-cttr 6
Add service virtual port successfully
huawei(config)#mac-address max-mac-count adsl 0/7/0 vpi 0 vci 32 user-vlan 10 10
huawei(config)#display mac-address max-mac-count adsl 0/7/0 vpi 0 vci 35 user-vl
an 10
---------------------------------------------------------------------------Type
F/S /P
VPI
VCI VLAN ID FLOWTYPE FLOWPARA Learnable MAC number
---------------------------------------------------------------------------adl
0/7/0
0
35
10 byVlan
10
10
---------------------------------------------------------------------------Note : F--Frame, S--Slot, P--Port(xDSL Port,UP-Link Port,IMA GROUP or
VLAN ID etc.), the VPI is access-end VLAN ID in EAU/GAU port
or PON ID in epon port
Context
l
To effectively realize the aging function of dynamic MAC addresses, you need to configure
the aging time. If a device does not receive any packet carrying the source MAC address
during the period which is equal to or double of the aging time, the MAC address of the
device is deleted from the MAC address list.
By default, the aging time of the MAC address is 300s. In general, it is recommended that
you use the default value.
If the aging time is very short, the dynamic MAC address is deleted quickly. In this case,
after receiving the packet that matches the MAC address entry, the device learns the MAC
address again by broadcasting the packet to all the ports in one VLAN. The relearning
affects the running performance of the device.
If the aging time is very long, the device fails to update the MAC address list in time
according to the changes in the network. If the number of the learned MAC addresses
reaches the upper limit in a specified service port, the service port directly discards the
packets that carry new MAC addresses.
The address aging function is effective only for dynamic MAC addresses.
Procedure
Step 1 Run the mac-address-table command to configure the aging time of a dynamic MAC address.
Step 2 Run the display mac-address timer command to query the configured aging time of the
dynamic MAC address.
----End
Example
To set the aging time of a dynamic MAC address as 500s, do as follows:
Issue 01 (2011-07-30)
231
To configure that the dynamic MAC address of the system does not age, do as follows:
huawei(config)#mac-address timer no-aging
huawei(config)#display mac-address timer
MAC aging time: No aging
Context
l
If the control board is IPMB, the system supports filtering packets with up to three MAC
addresses.
If the control board is IPMD, the system supports filtering packets with up to four MAC
addresses.
Procedure
Step 1 Run the security mac-filter command to configure the MAC address filtering function.
Step 2 Run the display security mac-filter command to query the configured MAC address.
----End
Example
To configure the MAC address 1000-0000-0000 as the filtering MAC address if the control
board is H612IPMB, do as follows:
huawei(config)#security mac-filter 1000-0000-0000
huawei(config)#display security mac-filter
--------- Mac Address --------1000-0000-0000
---- 1 mac address found ----
Related Operation
Table 12-2 lists the related operation for configuring the MAC address filtering function.
Table 12-2 Related operation for configuring the MAC address filtering function
To...
232
Context
l
The system supports up to 20 MAC address pools and totally 2048 MAC addresses.
The MAC address pool to be added cannot include MAC addresses of the system, such as
the bridge MAC address and the MAC address used for intra-board communication. The
MAC address pool to be added cannot overlap with others.
Procedure
Step 1 Run the mac-pool command to configure a MAC address pool.
Step 2 Run the display mac-pool command to query the added MAC address pool.
----End
Example
To configure a MAC address pool with index 0, start MAC address 1000-0000-0000, and address
count 800, do as follows:
huawei(config)#mac-pool 0 1000-0000-0000 800
huawei(config)#display mac-pool all
Current allocation method of MAC addresses: manual
User-configured MAC pools :
---------------------------------------------------------------Index
StartMAC
EndMAC
Scope UsedNum
---------------------------------------------------------------0
1000-0000-0000
1000-0000-031f
800
0
---------------------------------------------------------------MAC pools : 1, MAC addresses :800, Addresses in use : 0
Issue 01 (2011-07-30)
233
13
Issue 01 (2011-07-30)
234
Service Description
The TCP connection configuration supported by the UA5000 involves the following:
l
Service Specifications
The UA5000 supports the TCP/IP connection configuration.
synwart Timer
When the synchronization (SYN) packet is sent, TCP enables the synwait timer. If no
acknowledgement (ACK) packet is received before the synwait timer times out, the TCP
connection is terminated.
finwait Timer
If a TCP connection switches from the FIN_WAIT_1 state to the FIN_WAIT_2 state and fails
to receive any new data, the finwait timer is enabled. If this timer times out, the TCP connection
is dropped.
The purpose of enabling the finwait timer is to prevent the situation in which a connection stays
in the FIN_WAIT_2 state forever if the peer end does not send the FIN packet.
Context
The timeout time of the synwait timer ranges from 2s to 600s. The default value is 75s.
Procedure
Step 1 Run the tcp timer syn-timeout comand to configure the synwait timer.
----End
Issue 01 (2011-07-30)
235
Example
To configure the time of the TCP synwait timer as 100s, do as follows:
huawei(config)#tcp timer syn-timeout 100
Related Operation
Table 13-1 lists the related operation for configuring the synwait timer.
Table 13-1 Related operation for configuring the synwait timer
To...
Context
The timeout time of finwait timer ranges from 76s to 3600s. The default is 675s.
Procedure
Step 1 Run the tcp timer fin-timeout command to configure the finwait timer.
----End
Example
To configure the time of the finwait timer as 200s, do as follows:
huawei(config)#tcp timer fin-timeout 200
Related Operation
Table 13-2 lists the related operation for configuring the finwait timer.
Table 13-2 Related operation for configuring the finwait timer
Issue 01 (2011-07-30)
To...
236
Context
The buffer size ranges from 1 KB to 32 KB. The default is 4 KB.
Procedure
Step 1 Run the tcp window command to set the size of the socket transmit and receive buffer.
----End
Example
To configure the size of the socket transmit and receive buffer as 12 KB, do as follows:
huawei(config)#tcp window 12
Related Operation
Table 13-3 lists the related operation for configuring the socket buffer.
Table 13-3 Related operation for configuring the socket buffer
To...
Context
The debugging information is displayed on the terminal only after terminal monitor and (undo)
terminal debugging are enabled.
Procedure
Step 1 Run the debugging tcp packet command to enable the TCP debugging.
----End
Issue 01 (2011-07-30)
237
Example
To enable the TCP debugging, do as follows:
huawei(config)#debugging tcp packet
Related Operation
Table 13-4 lists the related operations for enabling the TCP debugging.
Table 13-4 Related operations for enabling the TCP debugging
To...
Context
The debugging information is displayed on the terminal only after terminal monitor and (undo)
terminal debugging are enabled.
By default, the terminal monitor and (undo) terminal debugging function are disabled.
NOTE
A large amount of debugging information may be displayed on the terminal after the debugging is enabled.
Perform this operation with caution.
Procedure
Step 1 Run the debug ip packet command to enable the IP packet debugging.
----End
Example
To enable the IP packet debugging, do as follows:
huawei(config)#debugging ip packet
*0.880717530 huawei IP/8/debug_case:
Sending, interface = meth0, version = 4, headlen = 20, tos = 192,
pktlen = 316, pktid = 5152, offset = 0, ttl = 255, protocol = 6,
checksum = 36292, s = 10.78.212.64, d = 10.70.47.67
prompt: Sending the packet from local at meth0
Issue 01 (2011-07-30)
238
Related Operation
Table 13-5 lists the related operations for enabling the IP packet debugging.
Table 13-5 Related operations for enabling the IP packet debugging
Issue 01 (2011-07-30)
To...
display ip interface
239
14
Issue 01 (2011-07-30)
240
This topic describes how to configure an advanced ACL rule to filter data packets according to
information such as the source IP address, destination IP address, IP bearer protocol type and
features for the protocol.
14.11 Creating a Layer 2 ACL Rule
This topic describes how to configure a layer 2 ACL rule to filter data packets according to the
link layer information such as the source MAC address, source VLAN ID, layer 2 protocol type,
layer 2 receive port, layer 2 forward port and destination MAC address.
14.12 Creating a Customized ACL Rule
This topic describes how to configure a customized ACL rule to filter data packets according to
any eight character strings (up to four bytes in a character string) in the first 80 bytes of the layer
2 data frame.
14.13 Activating an ACL
This topic describes how to activate a configured ACL.
Issue 01 (2011-07-30)
241
Service Description
An ACL performs the packet filtering function. You can configure some matching rules on
network devices to filter unwanted data packets. With the matching rules, the network devices
can permit or deny the data packets that can pass. The process of filtering packet traffic by the
ACL is the prerequisite for configuring the Quality of Service (QoS).
For details on ACL, see "ACL" in the UA5000 Universal Access Unit Feature Description.
Service Specifications
The UA5000 provides high QoS based on the traffic rule classification, traffic statistics, and
scheduling policies. The UA5000 supports the following types of ACLs: basic ACL, advanced
ACL, layer 2 ACL, and customized ACL. It performs the operations of filtering, traffic mirroring,
traffic limitation, adding the priority tag, redirection, and traffic measurement on packets filtered
by ACL rules.
If ACL rules are delivered to the user port of the UA5000, such as ADSL2+ port 0/10/0, then
all the ADSL2+ ports in slot 0/10 filter packets. If the ACL rules are delivered to an Ethernet
port, then only the Ethernet port filters packets.
In the case of a basic ACL, an advanced ACL, or a layer 2 ACL, the mask of the IP/MAC address
is the inverse mask. In the case of a customized ACL, the mask of the IP/MAC address is the
positive mask.
ACL Types
Table 14-1 lists the four types of ACLs
Table 14-1 ACL types
Type
Numeral
Range
Feature
Basic ACL
20002999
Advanced ACL
30003999
Layer 2 ACL
Issue 01 (2011-07-30)
40004999
242
Type
Numeral
Range
Feature
Customized
ACL
50005999
If all the rules in an ACL are activated at the same time, a rule defined earlier has a higher
priority than the rules defined later.
If all the rules in an ACL are activated one by one, a rule activated later has a higher priority
than the rules activated earlier.
Assume that ACL rule A denies all the IP packets, and ACL rule B permits packets to a specific
IP address, and ACL rule B is configured earlier than ACL rule A. Activate the two rules at the
same time. In this case, the two ACL rules conflict when they are used to process packets to
such specific IP address. Because ACL rule B is configured earlier, it has higher priority over
ACL rule A, so ACL rule B is chosen as the rule to handle the packets to such a specific address.
The combination of ACL rule A and ACL rule B filter all the IP packets except the packets
carrying the specific IP address.
243
Activate the QoS actions consecutively if the QoS actions apply to the same ACL rule.
To enable traffic statistics and traffic limitation on packets that match with rule 10 of
ACL 2001, activate these two actions consecutively. This is because all QoS actions
based on the same rule share the same hardware resource.
Activate the QoS actions consecutively if the rules applied to the QoS actions have the
same parameters with different values. This is because the rules with the same parameters
but different values share the same hardware resource.
Assume that the configuration parameter of ACL 2000 rule 10 is IP group, and the
source IP address is 1.1.1.1. The configuration parameter of ACL 2000 rule 15 is IP
group, and the source IP address is 2.2.2.2.
The parameters used in CLI configuration are the same, but the parameter values are
different. In this case, activate the QoS actions consecutively if the two rules have their
associated QoS actions.
If the rules defined in different ACL groups have the same parameters with different values,
the rules share the same hardware resources. If the QoS actions are delivered based on the
ACL groups, the priorities of the rules defined in the ACL groups become the same.
Assume that the configuration parameter of ACL 2000 rule 10 is IP group, and the
source IP address is 1.1.1.1. The configuration parameter of ACL 2001 rule 15 is IP
group, and the source IP address is 2.2.2.2.
The parameters used in CLI configuration are the same, but the parameter values are
different. The two rules share the same hardware resources. Therefore, they have the
same priority when the QoS actions using the rules are consecutively activated.
If you need the QoS actions applied in different ACL groups to have different priorities,
define the rules in an ACL group with the same parameters and different values.
The activated ACL rules occupy the hardware resources and share the hardware resources
with the protocol module (such as DHCP and IPoA) functions. In this case, the hardware
resources are insufficient.
Occupying of many hardware resources by the ACL rules results in failure in enabling
other service function. Therefore, it is recommended that you initiate the protocol
module first and then activate ACL rules.
If you fail to initiate a protocol module, handle it according to the following steps:
Check whether ACL rules occupy too many resources.
If ACL rules occupy too many resources, deactivate or delete the ACL configurations
that are not important or not in use, and then initiate the protocol module.
244
Data Plan
Table 14-2 provides the data plan for configuring a basic ACL.
Table 14-2 Data plan for configuring a basic ACL
Item
Data
Remarks
ACL number
2000
Source IP
address
2.2.2.2
ACL step
Default value
Time range
Port
0/3/0
Configuration Flowchart
Figure 14-1 shows the flowchart for configuring a basic ACL.
Figure 14-1 Flowchart for configuring a basic ACL
Start
(Optional) Configure
a time range
End
Issue 01 (2011-07-30)
245
Procedure
Step 1 (Optional) Configure a time range.
huawei(config)#time-range time1 00:00 to 12:00 fri
----End
Result
According to the ACL rule, from 00:00 to 12:00 every Friday, port 0/3/0 on the UA5000 can
receive the data packets only from IP address 2.2.2.2, and discard other data packets.
Data Plan
Table 14-3 provides the data plan for configuring an advanced ACL.
Table 14-3 Data plan for configuring an advanced ACL
Issue 01 (2011-07-30)
Item
Data
Remarks
ACL number
3000
Source IP
address
2.2.2.2
Destination
IP address
3.3.3.3
DSCP
23
ACL step
Default value
Time range
Port
0/3/0
246
Configuration Flowchart
Figure 14-2 shows the flowchart for configuring an advanced ACL.
Figure 14-2 Flowchart for configuring an advanced ACL.
Start
(Optional) Configure
a time range
End
Procedure
Step 1 (Optional) Configure a time range.
huawei(config)#time-range time1 00:00 to 12:00 fri
----End
Result
According to the ACL rule, from 00:00 to 12:00 every Friday, port 0/3/0 on the UA5000 can
receive the data packets from 2.2.2.0 to 3.3.3.3 with DSCP of 23. Other packets are discarded.
Issue 01 (2011-07-30)
247
Data Plan
Table 14-4 provides the data plan for configuring a layer 2 ACL.
Table 14-4 Data plan for configuring a layer 2 ACL
Item
Data
Remarks
ACL number
4000
Type
0x8863
COS
802.1p priority
Source VLAN ID
12
Source MAC
address
2222-2222-2222
Destination MAC
address
00e0-fc11-4141
ACL step
Default value
Time range
Port
0/3/0
Context
If you omit "0x" when entering the type of an Ethernet bearer protocol, the input should be
considered as a decimal number. The decimal number you input is converted to hexadecimal
ones for the protocol type.
Configuration Flowchart
Figure 14-3 shows the flowchart for configuring a layer 2 ACL.
Issue 01 (2011-07-30)
248
End
Procedure
Step 1 (Optional) Configure a time range.
huawei(config)#time-range time1 00:00 to 12:00 fri
----End
Result
According to the ACL rule, from 00:00 to 12:00 every Friday, port 0/3/0 on the UA5000 can
receive the Ethernet frames with the source MAC address of 2222-2222-2222, destination MAC
address of 00e0-fc11-4141, VLAN ID of 12, and COS of 1. Other packets are discarded.
Issue 01 (2011-07-30)
249
Context
The customized ACL can only be used to filter the data frame that is in the format of ETH II +
VLAN tag.
Data Plan
Table 14-5 provides the data plan for configuring the customized ACL.
Table 14-5 Data plan for configuring the customized ACL
Item
Data
Remarks
ACL number
5000
Matching byte
06
Offset
27
ACL step
default
Time range
Port
0/3/0
Configuration Flowchart
Figure 14-4 shows the flowchart for configuring a customized ACL.
Issue 01 (2011-07-30)
250
End
Procedure
Step 1 (Optional) Configure a time range.
huawei(config)#time-range time1 00:00 to 12:00 fri
----End
Result
According to the ACL rule, from 00:00 to 12:00 every Friday, port 0/3/0 on the UA5000 rejects
TCP packets.
251
Context
The UA5000 supports up to 64 ACLs. Each ACL can be configured with up to 64 rules.
Table 14-6 lists the ACL number range.
Table 14-6 ACL number range
ACL Type
Numeral Range
2000-2999
3000-3999
4000-4999
Customized ACL
5000-5999
Procedure
Step 1 Run the acl command to create an ACL.
Step 2 Run the quit command to quit from ACL mode.
Step 3 Run the display acl command to query the configuration of the ACL.
----End
Example
To create an advanced ACL with ID of 3000, do as follows:
huawei(config)#acl 3000
huawei(config-acl-adv-3000)#quit
huawei(config)#display acl 3000
Advanced ACL 3000, 0 rule
Acl's step is 5
Related Operation
Table 14-7 lists the related operations for creating an ACL.
Table 14-7 Related operations for creating an ACL
Issue 01 (2011-07-30)
To...
Run the
Command...
Remarks
Delete an ACL
undo acl
Configure the
description for an
ACL
description
252
To...
Run the
Command...
Remarks
Delete the
description for an
ACL
undo
description
step
undo step
By default, it is 5.
Context
ACL time ranges include relative time and absolute time.
l
Relative time refers to periodical intervals, such as the period from 8:30 in the morning to
18:30 in the afternoon every Monday.
Absolute time refers to intervals from a specific moment to another specific moment, such
as the period from 12:00 on June 8, 2006 to 18:00 on August 8, 2006.
When a time range includes only the absolute time or relative time, the union set of all the
intervals in the time range takes effect.
When a time range includes the absolute time and the relative time, the intersection set of
the union sets of relative time and absolute time takes effect.
Procedure
Step 1 Run the time-range command to configure a time range.
Step 2 Run the display time-range command to query the configured time range.
----End
Example
To create a time range named "last24hrs" that is valid through the entire day of 2008-03-24, do
as follows:
huawei(config)#time-range last24hrs from 00:00 2008/03/24 to 24:00 2008/03/24
Issue 01 (2011-07-30)
253
Context
l
When the step is changed to the default value, the rules of the ACL are re-numbered.
For example, assume that the rules of the ACL are numbered as 1, 3 and 5. The step is
2. If you change the step to the default value, the rules are re-numbered as 5, 10 and 15.
Procedure
Step 1 Run the acl command to create a basic ACL.
Step 2 Run the step command to modify the step of the ACL rules.
Step 3 Run the quit command to quit the basic ACL mode.
Step 4 Run the display acl command to query the configured step.
----End
Example
To set the step to 10, do as follows:
huawei(config)#acl 2000
huawei(config-acl-basic-2000)#step 10
huawei(config-acl-basic-2000)#quit
huawei(config)#display acl 2000
Basic ACL 2000, 1 rule
Acl's step is 10
rule 10 permit (0 times matched)
Related Operation
Table 14-8 lists the related operation for setting the step.
Issue 01 (2011-07-30)
254
Run the
Command...
Remarks
undo step
By default, it is 5.
Prerequisite
The basic ACL to which the rule is added already exists.
Context
Up to 64 rules can be created for an ACL.
You can change the configuration of an ACL rule by specifying the number of the rule. This
method does not change another rules.
Procedure
Step 1 Run the acl command to createa basic ACL rule.
Step 2 Run the rule command to configure the basic ACL rule.
Step 3 Run the quit command to quit the basic ACL config mode.
Step 4 Run the display acl command to query the information about the basic ACL rule.
----End
Example
To configure a basic ACL rule that enables data packets from 2.2.2.2 to pass, do as follows:
huawe(config)#acl 2000
huawei(config-acl-basic-2000)#rule permit source 2.2.2.2 0
huawei(config-acl-basic-2000)#quit
huawei(config)#display acl 2000
Basic ACL 2000, 1 rule
Acl's step is 5
rule 5 permit source 2.2.2.2 0 (0 times matched)
Related Operation
Table 14-9 lists the related operation for creating a basic ACL rule.
Issue 01 (2011-07-30)
255
undo rule
Prerequisite
The advanced ACL to which the rule is added already exists.
Context
Up to 64 rules can be created for an ACL.
You can change the configuration of an ACL rule by specifying the number of the rule. This
method does not change another rules.
Procedure
Step 1 Run the acl command to create an advanced ACL rule.
Step 2 Run the rule command to configure the advanced ACL rule.
Step 3 Run the quit command to quit the advanced ACL config mode.
Step 4 Run the display acl command to query the advanced ACL rule.
----End
Example
To configure an advanced ACL rule that allows data packets from 2.2.2.2 to 3.3.3.3 with DSCP
of 23 to pass, and the valid time as the predefined time 1, do as follows:
huawe(config)#acl 3000
huawei(config-acl-adv-3000)#rule 3 permit ip source 2.2.2.2 0 destination 3.3.3.3
0 dscp 23 time-range time1
huawei(config-acl-adv-3000)#quit
huawei(config)#display acl 3000
Advanced ACL 3000, 1 rule
Acl's step is 5
rule 3 permit ip source 2.2.2.2 0 destination 3.3.3.3 0 dscp 23 time-range
time1 (0 times matched)(Inactive)
Related Operation
Table 14-10 lists the related operation for creating an advanced ACL rule.
Issue 01 (2011-07-30)
256
undo rule
Prerequisite
The layer 2 ACL to which the rule is added already exists.
Context
Up to 64 rules can be created for an ACL.
You can change the configuration of an ACL rule by specifying the number of the rule. This
method does not change another rules.
Procedure
Step 1 Run the acl command to create a layer 2 ACL rule.
Step 2 Run the rule command to configure the layer 2 ACL rule.
Step 3 Run the quit command to quit the layer 2 ACL config mode.
Step 4 Run the display acl command to query the information about the layer 2 ACL rule.
----End
Example
To define a layer 2 ACL rule that allows data packets with the type of 0x8863, VLAN ID of 12,
COS of 1, source MAC address of 2222-2222-2222 and destination MAC address of 00e0fc11-4141 to pass, do as follows:
huawe(config)#acl 4000
huawei(config-acl-link-4000)#rule 1 permit type 0x8863 cos 1 source 12
2222-2222-2222 0000-0000-0000 destination 00e0-fc11-4141 0000-0000-0000
huawei(config-acl-link-4000)#quit
huawei(config)#display acl 4000
Basic ACL 4000, 1 rule
Acl's step is 5
rule 1 permit type 0x8863 cos background source 2222-2222-2222 0000-0000-0000
12 destination 00e0-fc11-4141 0000-0000-0000
Related Operation
Table 14-11 lists the related operation for creating a layer 2 ACL rule.
Issue 01 (2011-07-30)
257
undo rule
Prerequisite
The customized ACL to which the rule is added already exists.
Context
Up to 64 rules can be created for an ACL.
You can change the configuration of an ACL rule by specifying the number of the rule. This
method does not change another rules.
Figure 14-5 shows the first 64 bytes of a layer 2 frame. Every letter represents one hexadecimal,
and every two letters represent one byte.
Figure 14-5 First 64 bytes of a layer 2 frame
Table 14-12 lists the meaning of the letters and their offset values.
Table 14-12 Description of letters and their offset values
Issue 01 (2011-07-30)
Letter
Meaning
Offset
Lette
r
Meaning
Offset
Destination MAC
address
TTL field
34
Protocol number (6
refers to TCP and 17
refers to UDP)
35
12
IP check sum
36
258
Letter
Meaning
Offset
Lette
r
Meaning
Offset
14
Source IP address
38
Destination service
access point (DSAP)
filed
18
Destination IP address
42
19
46
Ctrl field
20
48
21
Serial number
50
Type of encapsulated
frame
24
Acknowledgement
54
IP version
26
XY
58
TOS field
27
59
IP packet length
28
60
ID number
30
Other
62
Flags field
32
In Figure 14-5, the offset of their field is their offset in the ETH II +VLAN tag format. For the
customized ACL, the user can use the rule mask and offset parameters to extract any byte from
the first 80 bytes of data frame, and then compare the extracted byte with customized rules to
filter matched data frames for processing.
Procedure
Step 1 Run the acl command to create a customized ACL rule.
Step 2 Run the rule command to configure the customized ACL rule.
Step 3 Run the quit command to quit the customized ACL mode.
Step 4 Run the display acl command to query the information about the ACL rule.
----End
Example
To filter all TCP packets, do as follows:
huawei(config)#acl 5000
huawei(config-acl-adv-5000)#rule permit 06 ff 27
huawei(config-acl-adv-5000)#quit
huawei(config)#display acl 5000
User ACL 5000, 1 rule
Issue 01 (2011-07-30)
259
Acl's step is 5
rule 5 permit 06 ff 27
Related Operation
Table 14-13 lists the related operation for creating a customized ACL rule.
Table 14-13 Related operation for creating a used defined ACL rule
To...
undo rule
Prerequisite
The ACL to be activated must be configured, and the port for which the ACL needs to be activated
must work in the normal state.
Procedure
Step 1 Run the packet-filter command to activate an ACL.
Step 2 Run the display packet-filter port command to query the activated state of the ACL.
----End
Example
To activate ACL 3000 on port 0/3/0, do as follows:
huawei(config)#packet-filter inbound ip-group 3000 port 0/3/0
huawei(config)#display packet-filter port 0/3/0
port 0/3/0
Inbound:
inbound Acl 3000 rule 5
port 0/3/0
running
Total number of packet-filter inbound : 1
Total number of packet-filter outbound : 0
Total number of packet-filter all
: 1
Related Operation
Table 14-14 lists the related operation for activating an ACL.
Table 14-14 Related operation for activating an ACL
Issue 01 (2011-07-30)
To...
Deactivate an ACL
undo packet-filter
260
15
261
15.9 Modifying the VLAN for the Packet That Matches an ACL Rule
This topic describes how to modify the VLAN ID of the packet that matches an ACL rule to
switch the data stream to different VLANs.
15.10 Enabling Line Rate Limitation on a Port
This topic describes how to enable the line rate limitation on a port.
15.11 Configuring the Queue Scheduling Mode
This topic describes how to configure the queue scheduling mode to solve the problem that
multiple data streams compete for network resources when network congestion occurs.
Issue 01 (2011-07-30)
262
Service Description
By setting different parameters of the QoS, such as service availability, throughput, time delay,
jitter, and packet loss rate, you can provide users with high quality services.
For details on QoS, see "QoS" in the UA5000 Universal Access Unit Feature Description.
Service Specifications
The UA5000 supports ACL-based QoS policies and multiple QoS features, including:
l
Priority policies based on the traffic classification: priority specification and priority
duplication
Bandwidth management: the two rate three color marker (trTCM) based on the traffic
classification
Traffic classification refers to the classification of packets from end users on access points. After
the classification, service streams map to different upstream VLANs. The traffic classification
is the basis for service management. It also comprises the principles for QoS policies such as
setting priority labels and performing traffic control for subscriber services. Currently, the
UA5000 supports the following types of traffic classifications:
l
By user VLAN
Configuration Flowchart
Figure 15-1 shows the flowchart for configuring traffic management.
Issue 01 (2011-07-30)
263
End
Procedure
Step 1 Query the traffic class in the rate table.
huawei(config)#display rate table row
Step 2 Configure the traffic class and modify the rate of the No. 1 traffic class from 128 kbit/s to 160
kbit/s.
huawei(config)#modify rate table row 128 160
Issue 01 (2011-07-30)
264
4:ClpTaggingNoScr
5:NoClpScr
6:ClpNoTaggingScr
7:ClpTaggingScr
8:ClpNoTaggingMcr
9:ClpTransparentNoScr
10:ClpTransparentScr
11:NoClpTaggingNoScr
12:NoClpNoScrCdvt
13:NoClpScrCdvt
14:ClpNoTaggingScrCdvt
15:ClpTaggingScrCdvt
-----------------------------------------------------------------------------
----End
Context
ATM traffic management:
The ATM related services of the UA5000 are implemented through PVCs. Traffic profile index
is selected when the PVC is set up. The traffic profile index corresponds to the traffic entry.
The entries included in the ATM traffic profile are as follows:
l
Traffic index
It is the traffic profile index selected at the PVC setup.
Service type
The UA5000 supports four service types: CBR, nrt-VBR, rt-VBR, and UBR. Each
service type corresponds to multiple traffic types.
Traffic type
The UA5000 supports 15 traffic types. Each traffic type has its own parameters.
Traffic parameters
Traffic parameters include peak cell rate (PCR), sustainable cell rate (SCR), and cell
delay variation tolerance (CDVT).
Seven default traffic profiles with the IDs of 0 to 6 exist in the system.
After the traffic profile is added successfully, the system displays the index of the new
profile (TID). Then the TID is used for the operation of referencing or deleting the new
profile.
The system automatically adapts the rate of the traffic profile downwards to a multiple of
64 according to the value input by the user.
If the upstream and downstream traffic profiles of the service traffic are different, ensure
that the priorities of the two profiles are the same.
When adding a service port to the UA5000, select the traffic profile index. The traffic profile
index corresponds to the traffic entry.
The entries included in the ATM traffic profile are as follows:
l
Issue 01 (2011-07-30)
Traffic index
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
265
It is the traffic profile index selected when the service port is added.
l
CAR
Committed access rate (CAR) indicates the maximum access rate.
Procedure
Step 1 Run the traffic table command to configure a traffic entry.
Step 2 Run the display traffic table command to query a traffic entry.
----End
Example
Assume that:
l
clp01Pcr is 160.
802.1p priority is 6.
Issue 01 (2011-07-30)
266
Total Num
1
Traffic type definition:
1:NoTrafficDescriptor
2:NoClpNoScr
3:ClpNoTaggingNoScr
4:ClpTaggingNoScr
5:NoClpScr
6:ClpNoTaggingScr
7:ClpTaggingScr
8:ClpNoTaggingMcr
9:ClpTransparentNoScr
10:ClpTransparentScr
11:NoClpTaggingNoScr
12:NoClpNoScrCdvt
13:NoClpScrCdvt
14:ClpNoTaggingScrCdvt
15:ClpTaggingScrCdvt
-----------------------------------------------------------------------------
Assume that:
l
802.1p priority is 6.
Issue 01 (2011-07-30)
267
Related Operation
Table 15-1 lists the related operation for configuring a traffic entry.
Table 15-1 Related operation for configuring a traffic entry
To...
Remarks
Prerequisite
The ACL and its rules are configured, and the port for traffic limitation works in the normal
state.
Context
l
The traffic limitation is valid for only the permit rules of an ACL.
Procedure
Step 1 Run the traffic-limit command to enable traffic limitation for the packet that matches an ACL
rule.
Step 2 Run the display qos-info traffic-limit port command to query the status of traffic limitation.
----End
Example
In the case of the traffic that is received on port 0/3/0 and matches the rule of ACL 2001, to limit
its rate to 512 kbit/s and to mark DSCP priority tags to the packet that exceeds the limitation,
do as follows:
huawei(config)#traffic-limit inbound ip-group 2001 512 exceed remark-dscp af1 port
0/3/0
huawei(config)#display qos-info traffic-limit port 0/3/0
traffic-limit:
port 0/3/0:
Inbound:
Matches: Acl 2001 rule 5
running
Target rate: 512 Kbps
Exceed action: remark-dscp af1
Issue 01 (2011-07-30)
268
: 1
Related Operation
Table 15-2 lists the related operation for configuring traffic limitation.
Table 15-2 Related operation for configuring traffic limitation
To...
undo traffic-limit
Prerequisite
The ACL and its rules are configured, and the port involved in adding priority tags to packets
works in the normal state.
Context
l
The cos priority and the DSCP priority cannot be configured at the same time.
Procedure
Step 1 Run the traffic-priority command to add priority tags to packets that match an ACL.
Step 2 Run the display qos-info traffic-priority port command to query the configured priority.
----End
Example
Assume that DSCP priority is 10 (af1) and the local priority is 0. To add priority tags to packets
that match ACL 2001 and are received on port 0/3/0, do as follows:
huawei(config)#traffic-priority inbound ip-group 2001 dscp af1 local-precedence 0
port 0/3/0
huawei(config)#display qos-info traffic-priority port 0/3/0
traffic-priority:
port 0/3/0:
Inbound:
Matches: Acl 2001 rule 5
running
Priority action: dscp af1 cos background
Total number of traffic-priority inbound
Issue 01 (2011-07-30)
: 1
269
Related Operation
Table 15-3 lists the related operation for adding priority tags to packets.
Table 15-3 Related operation for adding priority tags to packets
To...
undo traffic-priority
Prerequisite
The ACL and its rules must be configured, and the port involved in traffic mirroring must work
in the normal state.
Context
l
Only one mirroring destination port is supported and the mirroring destination port must
be an uplink port.
Procedure
Step 1 Run the traffic-mirror command to mirror the traffic of the packet that matches an ACL rule.
Step 2 Run the display qos-info traffic-mirror port command to query the traffic mirroring of a port.
----End
Example
Assume that the packets match ACL rule 2001 and are received on port 0/3/1. To mirror the
packets to port 0/3/0, do as follows:
huawei(config)#traffic-mirror inbound ip-group 2001 port 0/3/1 to port 0/3/0
huawei(config)#display qos-info traffic-mirror port 0/3/1
traffic-mirror:
Issue 01 (2011-07-30)
270
port 0/3/1:
Inbound:
Matches: Acl 2001 rule 5
Mirror to: port 0/3/0
running
Related Operation
Table 15-4 lists the related operation for mirroring the traffic of the packet that matches an ACL
rule.
Table 15-4 Related operation for mirroring the traffic of the packet that matches an ACL rule
To...
undo traffic-mirror
Prerequisite
The ACL and its rules are configured, and the port involved in traffic redirection works in the
normal state.
Context
l
The system can redirect only the packets on the control boards.
The system can redirect packets to CPU. The packet redirection to the CPU and the priority
tag adding for the packet should not be configured at the same time.
Procedure
Step 1 Run the traffic-redirect command to redirect the packet that matches an ACL.
Step 2 Run the display qos-info traffic-redirect port command to query the packet redirection.
----End
Example
To redirect the packets that match the rules of ACL 2001 and are received on port 0/3/0 to port
0/3/1, do as follows:
huawei(config)#traffic-redirect inbound ip-group 2001 port 0/3/0 to port 0/3/1
Issue 01 (2011-07-30)
271
Related Operation
Table 15-5 lists the related operation for redirecting packets.
Table 15-5 Related operation for redirecting packets
To...
undo traffic-redirect
Prerequisite
The ACL and its rules are configured, and the port involved in traffic statistics works in the
normal state.
Context
The operation is valid only for permit rules of an ACL.
Traffic statistics are valid for the traffic on only uplink ports.
Procedure
Step 1 Run the traffic-statistic command to collect the traffic statistics of the packet that matches an
ACL.
Step 2 Run the display qos-info traffic-statistic port command to query the traffic statistics
information about a port.
----End
Example
To collect the traffic statistics of the packets that match the rules of ACL 2001 and are received
on port 0/3/0, do as follows:
huawei(config)#traffic-statistic inbound ip-group 2001 port 0/3/0
Issue 01 (2011-07-30)
272
running
Related Operation
Table 15-6 lists the related operations for enabling traffic statistics.
Table 15-6 Related operations for enabling traffic statistics
To...
reset traffic-statistic
undo traffic-statistic
Prerequisite
The ACL-based rule must exist.
Context
NOTE
Procedure
Step 1 Run the acl command to create an ACL rule.
Step 2 Run the rule command to configure the ACL rule.
Step 3 Run the traffic-vlan command to switch the data stream that matches the ACL rule to different
VLANs.
Step 4 Run the display qos-info command to query the configuration information.
----End
Issue 01 (2011-07-30)
273
Example
To configure an ACL rule and switch the data stream that matches the ACL rule to a different
VLAN, do as follows:
huawei(config)#acl 2000
huawei(config-acl-basic-2000)#rule 1 permit source 10.10.10.10 0
huawei(config-acl-basic-2000)#quit
huawei(config)#traffic-vlan inbound ip-group 2000 rule 1 vlanid 20 port 0/3/0
huawei(config)#display qos-info traffic-vlan port 0/3/0
traffic-vlan:
port 0/3/0:
Inbound:
Matches: Acl 2000 rule 1
New Vlan ID: 20
running
Related Operation
Table 15-7 lists the related operation for modifying the VLAN of the packet that matches an
ACL rule.
Table 15-7 Related operation for modifying the VLAN of the packet that matches an ACL rule
To...
undo traffic-vlan
Context
l
Line rate limitation on the UA5000 should limit the total transmit rate of an Ethernet port,
instead of limiting the rate at a specific port on a service board.
Procedure
Step 1 Run the line-rate command to limit the line rate on a port.
Step 2 Run the display qos-info line-rate port command to query the limited line rate on the port.
----End
Example
To limit the rate of Ethernet port 0/3/0 to 640 kbit/s, do as follows:
Issue 01 (2011-07-30)
274
Related Operation
Table 15-8 lists the related operation for enabling the line rate limitation on a port.
Table 15-8 Related operation for enabling the line rate limitation on a port
To...
undo line-rate
Context
The IPMB board of the UA5000 supports four queue scheduling modes: strict-priority queue
(PQ), weighted fair queuing (WFQ), PQ+WRR, and weighted round robin (WRR). By default,
the PQ mode is used.
The IPMD board of the UA5000 does not support the WFQ mode. Other specifications of the
IPMD board are the same as the specifications of the IPMB board of the UA5000.
l
PQ
In PQ mode, the packets are sent strictly according to priority. The packets in a highpriority queue are sent before the packets in a low-priority queue. When the queue of a
higher priority is empty, the packets in the queue of a lower priority are sent.
WFQ
WFQ automatically implements the allocation fairness of the bandwidth to a certain
extent. WFQ arranges all the data streams in queue, monitors the throughput, and
allocates metric based on the sent traffic.
WRR
The system supports WRR for eight queues. Each queue has a weight value (namely,
w7, w6, w5, w4, w3, w2, w1 and w0 in descending order) for resource acquisition. WRR
is performed for the queues in turn. This guarantees that each queue can obtain certain
service time.
The weight sum of queues must be equal to 100.
PQ+WRR
PQ+WRR indicate that the system first meets the requirements of PQ, and then meets
the requirements of WRR.
The system supports PQ+WRR for eight queues.
Issue 01 (2011-07-30)
275
In queue scheduling, 802.1p priority maps with the local priority by default.
Procedure
Step 1 Run the queue-scheduler command to configure queue scheduling.
Step 2 Run the display queue-scheduler command to query the configuration of queue scheduling.
----End
Example
To configure a WRR queue scheduling and assign weight values (10, 10, 20, 20, 10, 10, 10, and
10) to the eight queues, do as follows:
huawei(config)#queue-scheduler wrr 10 10 20 20 10 10 10 10
huawei(config)#display queue-scheduler
Queue scheduling mode: weighted round robin
weight of queue 0:
10%
weight of queue 1:
10%
weight of queue 2:
20%
weight of queue 3:
20%
weight of queue 4:
10%
weight of queue 5:
10%
weight of queue 6:
10%
weight of queue 7:
10%
Related Operation
Table 15-9 lists the related operation for configuring queue scheduling.
Table 15-9 Related operation for configuring queue scheduling
Issue 01 (2011-07-30)
To...
undo queue-scheduler
276
16
277
This topic describes how to enable the anti IP spoofing function. When the anti IP spoofing
function is enabled, unauthorized users are prevented from logging in to the device by using the
IP addresses of legal users.
Issue 01 (2011-07-30)
278
Service Description
Policy Information Transfer Protocol (PITP) is a member of Huawei Group Management
Protocol (HGMP) family. PITP provides the broadband remote access server (BRAS) with the
information about the ports of access users. After the BRAS obtains the user port information,
PITP binds user accounts with the user ports to prevent the theft and roaming of user accounts.
The DHCP option82 contains reliable user port information and terminal information, which are
added to the DHCP packets. It is used as reference for the DHCP server to allocate IP addresses
and other parameters.
For details on the user security feature, see "User Security" in the UA5000 Universal Access
Unit Feature Description.
Service Specifications
The UA5000 supports the PITP V mode, P mode, and DHCP option82 to bind a user account
and a user port.
l
V mode (VBAS mode): After the PPPoE discovery phase, the BRAS actively initiates a
request for querying the user port, requiring the UA5000 to report the port information
about the user. The UA5000 sends the port information to the BRAS through a response
packet.
P mode (PPPoE tag mode): In the PPPoE discovery phase, the UA5000 actively sends the
port information about the user, and adds tags to the PPPoE authentication request packets.
In this manner, the port information about the user is sent to the BRAS.
In addition, the security check on the user password is supported. If a user inputs wrong
password for three consecutive times, the user account is locked.
Prerequisite
If a special PITP tag format is required, you must set the working mode of the RAIO to the
required mode beforehand according to the description in "16.3 Setting the RAIO Working
Mode." Then, configure the PITP function. Generally, use the default working mode common
for the RAIO.
Context
The PITP function works in the following two modes:
Issue 01 (2011-07-30)
279
V mode (VBAS mode): After the PPPoE discovery phase, the BRAS actively initiates a
request for querying the user port, requiring the UA5000 to report the port information
about the user. The UA5000 sends the port information to the BRAS through a response
packet.
P mode (PPPoE tag mode): In the PPPoE discovery phase, the UA5000 actively sends the
port information about the user, and adds tags to the PPPoE authentication request packets.
In this manner, the port information about the user is sent to the BRAS.
The two modes have similar functions, that is, binding a user ID to a user port. The differences
are as follows:
l
In V mode, the BRAS actively initiates a request for querying the user port.
In P mode, the DSLAM actively initiates a request for querying the user port.
The V mode and the P mode can be switched. The system, however, works in only one mode.
Disabling the PITP function invalidates the two modes.
Procedure
l
Run the pitp command to enable the PITP function and select the PITP V mode.
2.
Run the display pitp config command to query the configuration of the PITP function.
3.
Run the pitp vmode ether-type command to configure the Ethernet encapsulation
protocol type.
4.
Run the display pitp vmode ether-type command to query the Ethernet encapsulation
protocol type.
Run the pitp command to enable the PITP function and select the PITP P mode.
2.
Run the display pitp config command to query the configuration of the PITP function.
----End
Example
To enable the PITP V mode and configure the Ethernet encapsulation protocol type, do as
follows:
huawei(config)#pitp enable vmode
huawei(config)#display pitp config
PITP is enabled. Current mode:vmode
huawei(config)#pitp vmode ether-type
huawei(config)#display pitp vmode ether-type
Vmode ethernet type is 0x8400
Related Operation
Table 16-1 lists the related operations for configuring the PITP function.
Issue 01 (2011-07-30)
280
raio-mode
Context
l
The RAIO working mode specifies the formats of the DHCP option82 tag and the PITP
tag. Different operators may have different formats of the DHCP option82 tag and the PITP
tag because these two options are not standardized.
To differentiate the formats, correctly set the RAIO working mode before using the DHCP
option82 and PITP functions.
The RAIO working modes include: common, xdsl-port-rate, cntel, ti, and neuf.
The PITP-VMODE supports only common, cntel, and user-defined RAIO modes. The
PITP-PMODE and DHCP option82 supports all the RAIO modes.
NOTE
Circuit ID (CID), remote ID (RID), and line encapsulation information (optional) are added to the PPPoE tag
and the DHCP option82 field. The DHCP server allocates IP addresses and other parameters according to the
CID and RID. The CID is used to identify the attributes of a device. The RID is used to identify the access
information of a user.
Procedure
Step 1 Run the raio-mode command to set the RAIO working mode.
Step 2 Run the display raio-mode command to query the RAIO working mode.
----End
Example
To set the RAIO working mode as common, do as follows:
huawei(config)#raio-mode common
huawei(config)#display raio-mode
Current mode: common mode
Issue 01 (2011-07-30)
281
To set the RAIO working mode as xdsl-port-rate so that after the PITP P mode is enabled on the
port, the PPPoE packets contain the upstream/downstream activation rate of the port, do as
follows:
huawei(config)#raio-mode xdsl-port-rate pitp-pmode
huawei(config)#display raio-mode
Current mode: xdsl-port-rate mode
Context
l
An option82 field contains the Circuit ID (CID), Remote ID (RID) and sub-option90
(optional) field. It provides the information about the user shelf number, slot number, port
number, VPI and VCI.
The format and the contents of CID and RID are different according to the RAIO
working mode, see "16.3 Setting the RAIO Working Mode."
A sub-option90 field contains the link encapsulation information, and whether to add
the field can be controlled by a switch.
When the DHCP option82 function is enabled, the UA5000 can add/remove the option82
field to/from DHCP packets.
When the DHCP option82 function is disabled, the UA5000 transparently transmits or
directly forwards DHCP packets without processing them.
The DHCP option82 function can be configured in two levels, global config and stream
config (port config). The function can be enabled successfully only when it is enbled in the
two levels.
Procedure
Step 1 Run the dhcp option82 enable command to enable the DHCP Option82 function.
Step 2 Run the display dhcp option82 config command to query whether the DHCP option82 function
is enabled successfully.
Step 3 Run the dhcp option82 service-port command to enable the DHCP option82 function of the
specified service stream.
Step 4 Run the display dhcp option82 service-port command to query the information about the
service stream for which the DHCP option82 function is enabled, such as the VLAN, board type,
shelf ID/slot ID/port ID, and VPI/VCI corresponding to the service stream.
----End
Example
To enable the DHCP option82 on ADSL port 0/11/1 with VPI/VCI 0/35 and VLAN tag 10, do
as follows:
huawei(config)#dhcp option82 enable
huawei(config)#display dhcp option82 config
DHCP option82 is enabled
Issue 01 (2011-07-30)
282
Sub-option
Status
----------------------0x81
disable
0x82
disable
0x83
disable
0x84
disable
0x85
disable
0x86
disable
0x87
disable
0x88
disable
0x89
disable
0x8a
disable
0x8b
disable
0x8c
disable
0x8d
disable
0x8e
disable
0x90
disable
----------------------Maximum length of DHCP packet is 750 bytes
huawei(config)#dhcp option82 service-port 0/11/1 vpi 0 vci 35 user-vlan 10 enable
It will take several minutes, and console may be timeout, please use command
idle-timeout to set time limit
Are you sure to enable flow DHCP option82? (y/n)[n]:y
huawei(config)#display dhcp option82 service-port 0/11/1
---------------------------------------------------------------------------VLAN
Type
F/ S/ P
VPI
VCI
Flow
Flow
Channel
DHCP
ID
Type
Para
Option82
---------------------------------------------------------------------------10
adl
0/11/ 1
0
35
vlan
10
enable
---------------------------------------------------------------------------Total: 1 (Enable/Disable: 1/0)
Note: F--Frame, S--Slot, P--Port(or Virtual Port, such as VLAN ID.)
The VPI is access-end VLAN ID in EAU/GAU port
Total: 1 (Enable/Disable: 1/0)
Note: F--Frame, S--Slot, P--Port(or Virtual Port, such as VLAN ID.)
The VPI is access-end VLAN ID in EAU/GAU port
Related Operation
Table 16-2 lists the related operations for enabling the DHCP option82 function.
Table 16-2 Related operations for enabling the DHCP option82 function
To...
Context
l
Issue 01 (2011-07-30)
283
You can set the maximum length of the DHCP packets added with Relay Agent Information
Option messages. If there are packets with length that exceeds this value, the system
transparently transmits these packets.
If the maximum length is not set, the system uses the length of the maximum transmission
unit (MTU) as the maximum length of a DHCP packet.
Procedure
Step 1 Run the dhcp option82 max-length command to set the maximum length of a DHCP packet.
Step 2 Run the display dhcp option82 config command to query the configured maximum length of
DHCP packets.
----End
Example
To set the maximum length of a DHCP packet to 1300 bytes, do as follows:
huawei(config)#dhcp option82 max-length 1300
huawei(config)#display dhcp option82 config
DHCP option82 is enabled
Maximum length of DHCP packet is 1300 bytes
Context
l
A service channel can be bound with up to 8 IP addresses. The bound IP addresses must
be unicast IP addresses.
The system supports the binding of IP addresses of up to 1024 virtual service ports.
Procedure
Step 1 Run the bind ip command to bind an IP address.
Step 2 Run the display bind command to query the IP address binding information.
----End
Example
To bind the IP address 10.1.1.245 of the service channel (VPI/VCI of 0/35) with ADSL port
0/7/0, do as follows:
huawei(config)#bind ip adsl 0/7/0 vpi 0 vci 35 10.1.1.245
huawei(config)#display bind adsl 0/7/0 vpi 0 vci 35
{ <cr>|user-encap<K>|user-vlan<K> }:
Command:
display bind adsl 0/7/0 vpi 0 vci 35
Issue 01 (2011-07-30)
284
------------------------No.
IP address
------------------------0
10.1.1.245
1
2
3
4
5
6
7
------------------------No.
MAC address
------------------------0
1
2
3
4
5
6
7
-------------------------
Related Operation
Table 16-3 lists the related operation for binding an IP address.
Table 16-3 Related operation for binding an IP address
To...
undo bind ip
Context
l
The anti MAC spoofing function is implemented through MAC address binding.
Each service port can be bound with up to eight different MAC addresses dynamically.
If a user is online before the anti MAC spoofing function is enabled, the system does not
bind MAC address. Then, the user is forced to log out, and log in again.
The user MAC address can be bound only when a user logs in after the anti MAC spoofing
function is enabled.
CAUTION
It is recommended that the anti MAC spoofing function is enabled for the sake of device security.
Issue 01 (2011-07-30)
285
Procedure
Step 1 Run the security anti-macspoofing enable command to enable the anti MAC spoofing function.
Step 2 Run the display security config command and you can find that the function is enabled.
----End
Example
To enable the anti MAC spoofing function, do as follows:
huawei(config)#security anti-macspoofing enable
huawei(config)#display security config
Anti-ipspoofing function
: disable
Anti-dos function
: disable
Anti-macspoofing function
: enable
Anti-ipattack function
: disable
Anti-icmpattack function
: disable
Related Operation
Table 16-4 lists the related operations for enabling the anti MAC spoofing function.
Table 16-4 Related operations for enabling the anti MAC spoofing function
To...
Context
l
The system only binds the IP address of the user who obtains the IP address through DHCP.
If a user is online before the anti IP spoofing function is enabled, the system does not bind
the IP address. Then, the user is forced to log out, and log in again.
The user IP address can be bound only when a user logs in after the anti IP spoofing function
is enabled.
Issue 01 (2011-07-30)
286
Procedure
Step 1 Run the security anti-ipspoofing enable command to enable the anti IP spoofing function.
Step 2 Run the display security config command and you can find that the function is enabled.
----End
Example
To enable the anti IP spoofing function, do as follows:
huawei(config)#security anti-ipspoofing enable
huawei(config)#display security config
Anti-ipspoofing function
: disable
Anti-macspoofing function
: enable
Anti-ipattack function
: disable
Anti-icmpattack function
:
disable
Related Operation
Table 16-5 lists the related operations for enabling the anti IP spoofing function.
Table 16-5 Related operations for enabling the anti IP spoofing function
Issue 01 (2011-07-30)
To...
287
17
288
This topic describes how to configure the accessible address segment for the firewall of a
specified protocol type.
17.10 Configuring an Inaccessible Address Segment
This topic describes how to add an inaccessible address segment for the firewall of the specified
protocol type.
Issue 01 (2011-07-30)
289
Service Description
System security setting prevents attacks initiated on the network or user side. This helps to ensure
device stability.
For details on the system security, see "System Security" in the UA5000 Universal Access
Unit Feature Description.
Service Specifications
The UA5000 supports the following security features: anti IP spoofing, anti MAC spoofing, anti
IP attack, anti ICMP attack, source route filtering, MAC address filtering, IP address binding,
outband firewall, and SSH.
Context
l
After the anti DoS attack function is enabled, the device monitors the control packets sent
by each port and discards the control packets that exceed the restriction.
After the anti DoS attack function is disabled, the device does not monitor the control
packets. When the DoS attack occurs, the CPU occupancy of the device is very high and
the device cannot accept the service requests of the normal subscribers. The DoS attack
may even cause system breakdown.
Procedure
Step 1 Run the security anti-dos enable command to enable the anti DoS attack function.
Step 2 Run the display security config command and you can find that the anti DoS attack function is
enabled.
----End
Example
To enable the anti DoS attack function, do as follows:
huawei(config)#security anti-dos enable
huawei(config)#display security config
Anti-ipspoofing function
: disable
Anti-dos function
: enable
Anti-macspoofing function
: disable
Anti-ipattack function
: disable
Anti-icmpattack function
: disable
Issue 01 (2011-07-30)
290
Related Operation
Table 17-1 lists the related operations for enabling the anti DoS attack function.
Table 17-1 Related operations for enabling the anti DoS attack function
To...
Procedure
Step 1 Run the security anti-ipattack enable command to enable the anti IP attack function.
Step 2 Run the display security config command and you can find that the function is enabled.
----End
Example
To enable the anti IP attack function, do as follows:
huawei(config)#security anti-ipattack enable
huawei(config)#display security config
Anti-ipspoofing function
: disable
Anti-macspoofing function
: disable
Anti-ipattack function
: enable
Anti-icmpattack function
: disable
Related Operation
Table 17-2 lists the related operation for enabling the anti IP attack function.
Table 17-2 Related operation for enabling the anti IP attack function
To...
291
Procedure
Step 1 Run the security anti-icmpattack enable command to enable the anti ICMP attack function.
Step 2 Run the display security config command and you can find that the function is enabled.
----End
Example
To enable the anti ICMP attack function, do as follows:
huawei(config)#security anti-icmpattack enable
huawei(config)#display security config
Anti-ipspoofing function
:
disable
Anti-macspoofing function
: disable
Anti-ipattack function
: disable
Anti-icmpattack function
:
enable
Related Operation
Table 17-3 lists the related operation for enabling the anti ICMP attack function.
Table 17-3 Related operation for enabling the anti ICMP attack function
To...
Context
l
If the control board is IPMB, the system supports filtering packets with up to three MAC
addresses.
If the control board is IPMD, the system supports filtering packets with up to four MAC
addresses.
Procedure
Step 1 Run the security mac-filter command to configure the MAC address filtering function.
Step 2 Run the display security mac-filter command to query the configured MAC address.
----End
Example
To configure the MAC address 1000-0000-0000 as the filtering MAC address if the control
board is H612IPMB, do as follows:
Issue 01 (2011-07-30)
292
Related Operation
Table 17-4 lists the related operation for configuring the MAC address filtering function.
Table 17-4 Related operation for configuring the MAC address filtering function
To...
Context
l
After the ring network detection on the user side is enabled, the system automatically detects
the ring network on the user side.
CAUTION
To ensure the security of the device, it is recommended that the ring network detection on the
user side is enabled.
Procedure
Step 1 Run the ring check enable command to enable the ring network detection on the user side.
Step 2 Run the display ring check command to query the status of the ring network detection on the
user side.
----End
Example
To enable the ring network detection on the user side, do as follows:
hauwei(config)#ring check enable
huawei(config)#display ring check
{ <cr>|result<K> }:
Command:
Issue 01 (2011-07-30)
293
Related Operation
Table 17-5 lists the related operation for enabling the ring network detection on the user side.
Table 17-5 Related operation for enabling the ring network detection on the user side
To...
Prerequisite
The ACL applied to the firewall function exists.
Context
l
You can use the ACL rule when enabling the firewall black list function. In this case, the
priority level of the firewall black list is higher than the priority level of the ACL rule. That
is, the system checks the firewall black list first, and then matches the ACL rule.
The ACL rule used when the black list function is enabled can only be the advanced ACL
rule.
The firewall black list function takes effect only to the service packets that are sent from
the user side.
Procedure
Step 1 Run the firewall blacklist item command to add a firewall black list entry.
Step 2 Run the firewall blacklist enable command to enable the firewall black list function.
Step 3 Run the display firewall blacklist item command to query the configuration of the firewall
black list.
----End
Example
To add the IP address 10.10.10.10 to a firewall black list with the aging time 100 minutes, enable
the firewall black list function, and apply ACL 3000, do as follows:
huawei(config)#firewall blacklist item 10.10.10.10 timeout 100
huawei(config)#firewall blacklist enable acl-number 3000
Issue 01 (2011-07-30)
294
Related Operation
Table 17-6 lists the related operations for configuring the firewall black list function.
Table 17-6 Related operations for configuring the firewall black list function
To...
Prerequisite
The ACL applied to the firewall function already exists.
Context
l
Apply one ACL rule to one direction only. If one direction is applied with multiple ACL
rules, the later rule overwrites the previous rule.
The priority of the ACL rule is higher than the priority of the default operation of the
firewall. That is, the packets matching the ACL rule are processed according to the ACL
rule, and the packets not matching the rule are processed according to the default operation
of the firewall.
When the firewall blacklist function and the ACL rule work together, the priority of the
firewall blacklist is higher than the priority of the ACL rule. That is, the system checks the
firewall blacklist, and then matches the ACL rule.
CAUTION
To ensure the security of the device, the firewall function must be configured to control the
packets that access the device management interface.
Issue 01 (2011-07-30)
295
Configuration Flowchart
Figure 17-1 shows the flowchart for configuring the firewall function.
Figure 17-1 Flowchart for configuring the firewall function
Start
End
Procedure
Step 1 Run the firewall enable command to enable the firewall function.
Step 2 Run the firewall default command to set the default operation of the firewall.
Step 3 Run the interface meth 0 or the interface vlanif command to enter the config mode of the
inband or outband interface.
Step 4 Run the firewall packet-filter command to apply an ACL to the maintenance network port and
VLAN interface.
Step 5 Run the display firewall packet-filter statistics command to query the configuration.
----End
Example
To enable the outband firewall function, set the default operation of the firewall to deny, and
apply ACL 2000 to the maintenance network port to filter packets, do as follows:
huawei(config)#firewall enable
huawei(config)#firewall default deny
huawei(config)#interface meth 0
huawei(config-if-meth0)#firewall packet-filter 2000 inbound
huawei(config)#display firewall packet-filter statistics all
Interface: meth0
In-bound Policy: acl 2000
From 2006-02-16 10:00:26 to 2006-02-16 10:02:43
0 packets, 0 bytes, 0% permitted,
0 packets, 0 bytes, 0% denied,
0 packets, 0 bytes, 0% permitted default,
0 packets, 0 bytes, 0% denied default,
Totally 0 packets, 0 bytes, 0% permitted,
Issue 01 (2011-07-30)
296
To enable the inband firewall function, set the default operation of the firewall to deny, and
apply ACL 2000 to the VLAN interface to filter packets, do as follows:
huawei(config)#firewall enable
huawei(config)#firewall default deny
huawei(config)#interface vlanif 1
huawei(config-if-vlanif1)#firewall packet-filter 2000 inbound
huawei(config)#display firewall packet-filter statistics all
Interface: vlanif1
In-bound Policy: acl 2000
From 2006-02-16 10:00:26 to 2006-02-16 10:02:43
0 packets, 0 bytes, 0% permitted,
0 packets, 0 bytes, 0% denied,
0 packets, 0 bytes, 0% permitted default,
0 packets, 0 bytes, 0% denied default,
Totally 0 packets, 0 bytes, 0% permitted,
Totally 0 packets, 0 bytes, 0% denied.
Related Operation
Table 17-7 lists the related operation for configuring the outband firewall function.
Table 17-7 Related operation for configuring the outband firewall function
To...
Context
l
When adding one address segment, the first address cannot be the same as the existing first
address.
When deleting one address segment, input only the first address of the address segment.
CAUTION
To ensure the security of the device, you must comply with the principle of the minimum
authorization to configure the accessible address segment. The accessible address segment can
contain only the mandatory IP addresses of the management network segment. Other IP
addresses cannot access the device management interface.
Issue 01 (2011-07-30)
297
Procedure
Step 1 Run the sysman ip-access command to add an accessible address segment.
Step 2 Run the display sysman ip-access telnet command to query the configuration of the accessible
address segment.
----End
Example
To add a legal address segment to the access list of the telnet type, do as follows:
huawei (config)#sysman ip-access telnet 1.1.1.1 10.10.10.10
huawei(config)#display sysman ip-access telnet
IP-Access Table:
-------------------------------------------Index
Start-IPAddr
End-IPAddr
-------------------------------------------1
1.1.1.1
10.10.10.10
--------------------------------------------
Related Operation
Table 17-8 lists the related operations for configuring an accessible address segment.
Table 17-8 Related operations for configuring an accessible address segment
To...
display sysman
Context
l
When one address segment is added, the first address cannot be the same as the existing
address.
When deleting one address segment, input only the first address of the address segment.
Procedure
Step 1 Run the sysman ip-refuse command to configure an inaccessible address segment.
Step 2 Run the display sysman ip-refuse command to query configuration of an accessible address
segment.
----End
Issue 01 (2011-07-30)
298
Example
To add an address segment to the refuse list of the telnet type, do as follows:
huawei(config)#sysman ip-refuse telnet 1.1.1.10 10.10.10.1
huawei(config)#display sysman ip-refuse telnet
IP-Refuse Table:
-------------------------------------------Index
Start-IPAddr
End-IPAddr
-------------------------------------------1
1.1.1.10
10.10.10.1
--------------------------------------------
Related Operation
Table 17-9 lists the related operations for configuring an inaccessible address segment.
Table 17-9 Related operations for configuring an inaccessible address segment
Issue 01 (2011-07-30)
To...
display sysman
299
18
300
This topic describes how to configure the upstream and downstream rate reachability thresholds
for an ADSL2+ port.
18.10 Configuring the Rate Change Reporting Switch of an ADSL2+ Port
This topic describes how to configure the rate change reporting switch of an ADSL2+ port.
18.11 Configuring IPoA/IPoE Protocol Conversion
This topic describes how to enable the IPoA users to access the IP network at the upper layer,
thus improving the access capability and the network compatibility of the UA5000.
18.12 Configuring PPPoA/PPPoE Protocol Conversion
This topic describes how to enable the PPPoA users to access the IP network at the upper layer,
thus improving the access capability and network compatibility of the UA5000.
18.13 Querying an ADSL2+ Port
This topic describes how to query the general information about an ADSL2+ port.
Issue 01 (2011-07-30)
301
Service Description
Asymmetrical digital subscriber line 2plus (ADSL2+) adopts the asymmetric transmission
mode. It supports 24 Mbit/s downstream rate and 2.5 Mbit/s upstream rate. The transmission
distance is up to 6.5 km.
Service Specifications
The UA5000 supports the ADSL2+ service through the CSRB, ADRI and ADRB boards. Each
board provides 32 ADSL2+ ports. Table 18-1 lists the maximum number of ADSL2+
subscribers supported by each UA5000 shelf.
Table 18-1 Maximum number of ADSL2+ subscribers supported by each UA5000 shelf
Shelf
Slots
ADSL2+ Subscribers
HABD
12
384
HABE
14
448
HABF
18
576
The UA5000 provides six encapsulation modes, including llc-Bridge, vcmux-Bridge, llc-IPoA,
vcmux-IPoA, llc-PPPoA and vcmux-PPPoA.
The UA5000 provides an Auto mode. The mode includes five encapsulation modes: llc-Bridge,
vcmux-Bridge, llc-IPoA, llc-PPPoA and vcmux-PPPoA.
By default, the encapsulation mode is llc-Bridge.
Table 18-2 lists the encapsulation mode mapping between the UA5000 and the modem.
Table 18-2 Encapsulation mode mapping between the UA5000 and the modem
Access Service Type
Modem Encapsulation
Type
UA5000 Encapsulation
Type
PPPoA
llc-PPPoA
llc-PPPoA, Auto
vcmux-PPPoA
vcmux-PPPoA, Auto
llc-IPoA, Auto
vcmux RFC1483/2684
Route
vcmux-IPoA
llc-Bridge
llc-Bridge, Auto
IPoA
IPoE
Issue 01 (2011-07-30)
302
PPPoE
Modem Encapsulation
Type
UA5000 Encapsulation
Type
vcmux-Bridge
vcmux-Bridge, Auto
llc-RFC1483/2684 Bridge
llc-Bridge, Auto
vcmux-RFC1483/2684
Bridge
vcmux-Bridge, Auto
vcmux-PPPoA
vcmux-Bridge, Auto
llc-PPPoE
llc-Bridge, Auto
Prerequisite
l
To authenticate users on the BRAS device, configure the name and password of the access
users on the BRAS device. To assign the IP addresses to users through the BRAS device,
configure the corresponding IP address pool on the BRAS device.
NOTE
In this example, the extended line profile is not configured. For how to configure the extended line profile,
see "18.6 Adding an ADSL2+ Extended Line Profile."
Context
In the case of IPoA access, select the dynamic IP address (without specifying the source IP
address) or the static IP address (specifying the source IP address) for the packets. To switch
from a dynamic address to a static address in IPoA mode, you must first adopt LLC-Bridge
encapsulation, and then adopt the IPoA static address encapsulation.
UA5000You can restrict the user bandwidth through a specified traffic profile or an ADSL2+
line profile. When the traffic profile and the ADSL2+ line profile work, the smaller bandwidth
specified in the two profiles is used as the user line bandwidth. This configuration example shows
how to restrict the user bandwidth by configuring the traffic profile.If the port qualified rate is
lower than 96%, configure the data manually. If the user bandwidth is insufficient, reconfigure
the data of the traffic profile.
Only the deactivated port can be bound with the line profile.
Networking
Figure 18-1 shows an example network for configuring the ADSL2+ IPoA service.
Issue 01 (2011-07-30)
303
Figure 18-1 Example network for configuring the ADSL2+ IPoA service
BRAS
LSW
0/3/0
0/7/0
C
S
R
B
I
P
M
B
UA5000
Modem
PC
Data Plan
Table 18-3 provides the data plan for configuring the ADSL2+ IPoA service.
Table 18-3 Data plan for configuring the ADSL2+ IPoA service
Item
Data
Remarks
Traffic profile
Index: 7
Issue 01 (2011-07-30)
304
Item
Data
Remarks
Alarm profile
CSRB
VLAN ID: 10
Upstream/Downstream
bandwidth: 3 Mbit/s
IPMB
Gateway IP address:
10.1.1.1/24
Configuration Flowchart
Figure 18-2 shows the flowchart for configuring the ADSL2+ IPoA service.
Issue 01 (2011-07-30)
305
Is there an
appropriate traffic
profile?
No
Yes
Create a VLAN and
add port(s) to it
Is the port
activated?
No
Activate the ADSL2+ port
Yes
Deactivate the ADSL2+ port
Is there an
appropriate line
profile?
No
Yes
Do you need
to add an extended
line profile?
Is there an
appropriate alarm
profile?
Yes
Set the encapsulation mode
Add an extended
line profile
No
Yes
No
End
Add an alarm profile
Procedure
Step 1 Query and configure the traffic profile.
huawei(config)#display traffic table from-index 0
Traffic parameters for IP service:
----------------------------------------------------------------------------TID CAR(kbps) Priority Pri-Policy
----------------------------------------------------------------------------0
1024
6
tag-pri
1
2496
6
tag-pri
2
512
0
tag-pri
3
576
2
tag-pri
4
64
4
tag-pri
5
2048
0
tag-pri
6
-0
tag-pri
----------------------------------------------------------------------------Traffic parameters for ATM service:
-----------------------------------------------------------------------------
Issue 01 (2011-07-30)
306
TID
After the query, it is found that there is no proper traffic profile for use. You need to add a
required traffic profile.
huawei(config)#traffic table index 7 ip car 3072 priority 6 priority-policy pvcSetting
Create traffic descriptor record successfully
----------------------------------------------------------------------------TD Index
: 7
Priority
: 6
Priority policy : pvc-pri
CAR
: 3072 kbps
TD Type
: NoClpNoScr
Service category : ubr
Referenced Status: not used
EnPPDISC
: on
EnEPDISC
: on
Clp01Pcr
: 3072 kbps
-----------------------------------------------------------------------------
Step 2 Configure a VLAN and add a service port and an upstream port to the VLAN.
huawei(config)#vlan 10 smart
huawei(config)#port vlan 10 0/3 0
huawei(config)#service-port vlan 10 adsl 0/7/0 vpi 0 vci 35 rx-cttr 7 tx-cttr 7
Issue 01 (2011-07-30)
307
l Set the IPoA service encapsulation mode of ADSL2+ port 0/7/0 to LLC-IPoA.
huawei(config)#encapsulation 0/7 start-portId 0 end-portId 10 type ipoa llc
Issue 01 (2011-07-30)
308
----End
Result
After the configuration, the users can access the Internet in the IPoA mode.
Prerequisite
l
To authenticate users on the BRAS device, configure the name and password of the access
users on the BRAS device. To assign the IP addresses to users through the BRAS device,
configure the corresponding IP address pool on the BRAS device.
NOTE
In this example, the extended line profile is not configured. For how to configure the extended line profile,
see "18.6 Adding an ADSL2+ Extended Line Profile."
Context
The UA5000 can limit the access rate of the users through the configured traffic profile or the
configured ADSL2+ line profile. If the two profiles work together, the user bandwidth is the
minimum value defined in the two profiles. This configuration example shows how to restrict
the user bandwidth by configuring the traffic profile.If the port qualified rate is lower than 96%,
configure the data manually. If the user bandwidth is insufficient, reconfigure the data of the
traffic profile.
Only the deactivated ports can be bound with the line profile.
Networking
Figure 18-3 shows an example network for the ADSL2+ PPPoA service.
Issue 01 (2011-07-30)
309
BRAS
LSW
0/3/0
0/7/0
C
S
R
B
I
P
M
B
UA5000
Modem
PC
Data Plan
Table 18-4 provides the data plan for configuring the ADSL2+ PPPoA service.
Table 18-4 Data plan for configuring the ADSL2+ PPPoA service
Item
Data
Remarks
Traffic profile
Index: 7
Line profile
Issue 01 (2011-07-30)
310
Item
Data
Remarks
Alarm profile
CSRB
ADSL2+ port:0/7/0
VLAN ID: 10
Upstream/Downstream
bandwidth: 3 Mbit/s
IPMB
Issue 01 (2011-07-30)
Gateway IP address:
10.1.1.1/24
311
Item
Data
Remarks
LAN switch:
Configuration Flowchart
Figure 18-4shows the flowchart for configuring the ADSL2+ PPPoA service.
Issue 01 (2011-07-30)
312
Is there an
appropriate traffic
profile?
No
Yes
Create a VLAN and
add port(s) to it
Is the port
activated?
No
Activate the ADSL2+ port
Yes
Deactivate the ADSL2+ port
Is there an
appropriate line
profile?
No
Yes
Do you need
to add an extended
line profile?
Is there an
appropriate alarm
profile?
Yes
Save the data
Add an extended
line profile
No
Yes
End
No
Procedure
Step 1 Query and configure the traffic profile.
huawei(config)#display traffic table from-index 0
Traffic parameters for IP service:
----------------------------------------------------------------------------TID CAR(kbps) Priority Pri-Policy
----------------------------------------------------------------------------0
1024
6
tag-pri
1
2496
6
tag-pri
2
512
0
tag-pri
3
576
2
tag-pri
4
64
4
tag-pri
5
2048
0
tag-pri
6
-0
tag-pri
7
3072
6
pvc-pri
----------------------------------------------------------------------------Traffic parameters for ATM service:
Issue 01 (2011-07-30)
313
If there is no proper traffic profile after the query, run the traffic table command to create a required traffic
profile.
314
2.
3.
Set the PPPoA service encapsulation mode of ADSL2+ port 0/7/0 to PPPoA-LLC.
huawei(config)#encapsulation 0/7/0 vpi 0 vci 35 type pppoa llc
----End
Result
After the configuration, the users can access the Internet in the PPPoA mode.
Issue 01 (2011-07-30)
315
Prerequisite
l
To authenticate users on the BRAS device, configure the name and password of the access
users on the BRAS device. To assign the IP addresses to users on the BRAS device,
configure the corresponding IP address pool on the BRAS device.
NOTE
In this example, the extended line profile is not configured. If it needs to be configured, see "18.6 Adding
an ADSL2+ Extended Line Profile."
Context
UA5000 can limit the rate of users through the configured traffic profile or the configured
ADSL2+ line profile. If the two profiles work together, the user bandwidth is the minimum value
defined in the two profiles. This configuration example shows how to limit the rate by
configuring the traffic profile.If the port qualified rate is lower than 96%, configure the data
manually. If the user bandwidth is insufficient, reconfigure the data of the traffic profile.
Only a deactivated port can be bound with a line profile.
Networking
Figure 18-5 lists an example network for configuring the ADSL2+ PPPoE/IPoE service.
Issue 01 (2011-07-30)
316
Figure 18-5 Example network for configuring the ADSL2+ PPPoE/IPoE service
BRAS
LSW
0/3/0
0/7/0
C
S
R
B
I
P
M
B
UA5000
Modem
PC
Data Plan
Table 18-5 provides the data plan for configuring the ADSL2+ PPPoE/IPoE service.
Table 18-5 Data plan for configuring the ADSL2+ PPPoE/IPoE service
Item
Data
Remarks
Traffic profile
Index: 7
Line profile
Issue 01 (2011-07-30)
317
Item
Data
Remarks
Alarm profile
CSRB
IPMB
Issue 01 (2011-07-30)
VLAN ID: 10
Upstream/Downstream
bandwidth: 3 Mbit/s
Gateway IP address:
10.1.1.1/24
318
Item
Data
Remarks
LAN switch:
The
Configuration Flowchart
Figure 18-6 shows the flowchart for configuring the ADSL2+ PPPoE/IPoE service.
Issue 01 (2011-07-30)
319
Is there an
appropriate traffic
profile?
No
Yes
Create a VLAN and
add port(s) to it
Is the port
activated?
No
Yes
Deactivate the ADSL2+ port
Bind the alarm profile
Is there an
appropriate line
profile?
No
Yes
Do you need
to add an extended
line profile?
No
Is there an
appropriate alarm
profile?
Yes
Yes
No
End
Procedure
Step 1 Query and configure the traffic profile.
huawei(config)#display traffic table from-index 0
{ <cr>|to-index<K> }:
Command:
display traffic table from-index 0
Traffic parameters for IP service:
----------------------------------------------------------------------------TID CAR(kbps) Priority Pri-Policy
----------------------------------------------------------------------------0
1024
6
tag-pri
1
2496
6
tag-pri
2
512
0
tag-pri
3
576
2
tag-pri
4
64
4
tag-pri
5
2048
0
tag-pri
6
-0
tag-pri
7
3072
6
pvc-pri
Issue 01 (2011-07-30)
320
If there is no proper traffic profile after the query, run the traffic table command to create a required traffic
profile.
Step 2 Create a VLAN and add a service port and an upstream port to the VLAN.
huawei(config)#vlan 10 smart
huawei(config)#port vlan 10 0/3 0
huawei(config)#service-port vlan 10 adsl 0/7/0 vpi 0 vci 35 rx-cttr 7 tx-cttr 7
Issue 01 (2011-07-30)
321
----End
Result
After the configuration, the users can access the Internet in the PPPoE/IPoE mode.
Issue 01 (2011-07-30)
322
Context
When configuring an ADSL2+ line profile, pay attention to the following points:
l
Up to 1002 line profiles can be configured for the UA5000. 1, 1000, 1001, and 1002 are
default line profiles. 1 is the common ADSL line profile, 1000 is the fast mode profile,
1001 is the long-distance profile, and 1002 is the ADSL2+ line profile. The user can modify
the default line profiles but cannot delete the default line profiles.
When the transmission mode is G.lite (G992.2/G992.4), you can select only "interleaved"
as the channel mode.
When the downstream channel mode is fixed, the maximum rate of the downstream channel
must be equal to the minimum rate.
When setting the upstream/downstream SNR margin, ensure that the settings comply with
mini. SNR margin target SNR margin max. SNR margin.
According to G.lite Standards, when the transmission mode is G.lite (G992.2/G992.4), the
supported rate ranges 64-1536 kbit/s in downstream, and 32-512 kbit/s in upstream.
When setting the upstream/downstream SNR margin for rate downshift, ensure that it is
larger than or equal to the upstream/downstream mini. SNR margin and less than the
upstream/downstream target SNR margin. The upstream/downstream SNR margin for rate
upshift should be larger than the upstream/downstream target SNR margin and less than or
equal to the max. upstream/downstream SNR margin.
Configuration Flowchart
Figure 18-7 and Figure 18-8 show the flowchart for configuring an ADSL2+ line profile.
Issue 01 (2011-07-30)
323
No
Yes
Set profile name
No
Yes
Select ADSL2+ working mode
Interleaved mode
No
Yes
Set downstream target SNR margin
Issue 01 (2011-07-30)
324
No
Yes
Set min. downshift time in
downstream
B
Set bit rate?
No
Yes
Set min. transmit rate in
downstream
Set max. transmit rate in
downstream
Set min. transmit rate in
upstream
Set max. transmit rate in
upstream
End
Issue 01 (2011-07-30)
325
NOTE
l The ADSL2+ line profile of the UA5000 supports only the configuration of the downstream seamless
rate adaptation (SRA).
l If the downstream rate adaptation mode is the fixed mode, the judgmental items and the configuration
items in both the dashed frame and the solid frame of Figure 18-8 cannot be displayed or configured.
After setting the max. SNR margin in upstream of the line profile, follow the steps in the flowchart to
set the min. transmit rate in downstream and configure other items.
l If the downstream rate adaptation mode is the adaptAtStartup mode, the judgmental items and the
configuration items in the dashed frame of Figure 18-8 cannot be displayed or configured. After setting
the max. SNR margin in upstream of the line profile, determine whether to set rate parameters, and
follow the steps in the flowchart to configure other items.
Procedure
Step 1 Run the adsl line-profile add command to add an ADSL2+ line profile.
----End
Example
Assume that:
l
Issue 01 (2011-07-30)
326
Related Operation
Table 18-6 lists the related operations for adding an ADSL2+ line profile.
Issue 01 (2011-07-30)
327
Remarks
Quickly modify an
ADSL2+ line profile
adsl line-profile
quickmodify
Context
An ADSL2+ extended line profile is used to configure the extended parameters for an ADSL2
+ port when the port is activated. The three major parameters are as follows:
l
missingtone
When you set this parameter to the specified sub-carrier of the line, these sub-carriers
have no power output, and no bit is allocated to them.
If the noise of certain bands is very unstable, you can set this parameter to forbid this
band. In this manner, the line is not affected by the band.
There are bands that have special purposes in certain regions. To prevent interference
to these bands, you can set the parameter to forbid these bands.
Issue 01 (2011-07-30)
328
The UA5000 supports up to 32 ADSL2+ extended line profiles. After an ADSL2+ extended line
profile is configured, bind it with a port and directly reference it for activating the port.
Procedure
Step 1 Run the adsl extline-profile add command to add an ADSL2+ extended line profile.
Step 2 Run the display adsl extline-profile command to query an ADSL2+ extended line profile.
----End
Example
To add an ADSL2+ extended line profile and disable the tones 80-90, do as follows:
huawei(config)#adsl extline-profile add
Start adding profile
Press 'Q' to quit the current configuration and new configuration will be
neglected
> Do you want to name the profile (y/n) [n]:y
> Please input profile name:ADSL EXTLINEPROFILE
> Warning: The configuration of transmission mode in extline-profle will
replace the one configured in line-profile when the transmission mode is enabled
!
> Will you enable the transmission mode?(y/n)[n]:y
> ADSL transmission mode in standard :
>
1: G992.1 2: G992.2 3: G992.3 4: G992.5 5: T1.413
> Please input the transmission mode(s) possible in use(1-5) [1,3-4]:1
> ADSL Annex type :
>
1: Annex.A 2: Annex.B 3: Annex.L 4: Annex.M
> Please input the Annex type(s) possible in use(1-2) [1-2]:1
> Do you want to configure the disabled tone? (y/n)[n]:y
> Please input the section number you want to configure(1-4)[4]:
> No.1 Please input the start index of the disabled tone(32-511)[32]:80
> Please input the end index of the disabled tone(32-511)[80]:90
> Do you want to validate the settings of this section? (y/n)[n]:y
> No.2 Please input the start index of the disabled tone(32-511)[90]:
> Please input the end index of the disabled tone(32-511)[90]:
> Do you want to validate the settings of this section? (y/n)[n]:
> No.3 Please input the start index of the disabled tone(32-511)[90]:
> Please input the end index of the disabled tone(32-511)[90]:
> Do you want to validate the settings of this section? (y/n)[n]:
> No.4 Please input the start index of the disabled tone(32-511)[90]:
> Please input the end index of the disabled tone(32-511)[90]:
> Do you want to validate the settings of this section? (y/n)[n]:
> Do you want to configure the minimum INP in downstream? (y/n)[n]:
> Do you want to configure the minimum INP in upstream? (y/n)[n]:
> Do you want to configure the TSSi parameter? (y/n)[n]:
> Do you want to configure the L2 parameter? (y/n)[n]:
> Do you want to configure the PSD parameter? (y/n)[n]:
Add profile 1 successfully
huawei(config)#display adsl extline-profile 1
----------------------------------------------------------------------------Profile Index : 1
Name: ADSL EXTLINEPROFILE
ADSL transmission mode in standard
:G992.1
Annex type
:Annex.A
Annex.M tone expand scope
:L2 mode state
:disable
Maximum PSD mask in downstream
:-40
Mininum INP in downstream(DMT Symbol)
:Mininum INP in upstream(DMT Symbol)
:Current configuration of each section:
Sections
Value
Effective
Section 1
80 - 90
y
Section 2
90 - 90
n
Section 3
90 - 90
n
Issue 01 (2011-07-30)
329
Section 4
90 - 90
n
----------------------------------------------------------------------------Total: 1
Note : The value '-' denotes that the value has never been configured
Related Operation
Table 18-7 lists the related operations for adding an ADSL2+ extended line profile.
Table 18-7 Related operations for adding an ADSL2+ extended line profile
To...
Remarks
Quickly add an
ADSL2+ extended
line profile
adsl extline-profile
quickadd
Delete an ADSL2+
extended line profile.
adsl extline-profile
delete
Modify an ADSL2+
extended line profile
adsl extline-profile
modify
Quickly modify an
ADSL2+ extended
line profile
adsl extline-profile
quickmodify
Bind/Unbind the
ADSL2+ extended
line profile.
(undo)extline-config
Prerequisite
The ADLS2+ line meets the requirement for service provisioning.
Context
When adding an ADSL2+ alarm profile, pay attention to the following points: The UA5000 has
a default ADSL2+ alarm profile with the name of DEFVAL and index of 1. You can modify the
profile but cannot delete it. The ADSL2+ alarm profile contains a series of alarm thresholds to
measure and monitor the performance of the activated ADSL2+ line. When a statistic reaches
the threshold, the UA5000 reports the alarm to the BMS.
Issue 01 (2011-07-30)
330
Procedure
Figure 18-9 shows the flowchart for adding an ADSL2+ alarm profile.
Figure 18-9 Flowchart for adding an ADSL2+ alarm profile
End
Issue 01 (2011-07-30)
331
Procedure
Step 1 Run the adsl alarm-profile add command to add an ADSL2+ alarm profile.
----End
Example
To add ADSL2+ alarm profile 2, do as follows:
huawei(config)#adsl alarm-profile add 2
Start adding profile
Press 'Q' to quit the current configuration and new configuration will be
neglected
<ATU-C>
> The number of Loss of Frame Seconds (0~900) [0]:50
> The number of Loss of Signal Seconds (0~900) [0]:10
> The number of Loss of Link Seconds (0~900) [0]:
> The number of Loss of Power Seconds (0~900) [0]:
> The number of Errored Seconds (0~900) [0]:
> Enable or disable the Initial failure trap 0-disable 1-enable (0~1) [0]:
> The number of failed fast retrain seconds (0~900) [0]:10
> The number of severely errored seconds (0~900) [0]:
> The number of unavailable seconds (0~900) [0]:
> Threshold of positive difference between the current and the past transmit
rate in fast mode (0~31968Kbps) [0]:100
> Threshold of positive difference between the current and the past transmit
rate in interleaved mode (0~31968Kbps) [0]:
> Threshold of negative difference between the current and the past transmit
rate in fast mode (0~31968Kbps) [0]:
> Threshold of negative difference between the current and the past transmit
rate in interleaved mode (0~31968Kbps) [0]:
<ATU-R>
> The number of Loss of Frame Seconds (0~900) [0]:10
> The number of Loss of Signal Seconds (0~900) [0]:10
> The number of Loss of Power Seconds (0~900) [0]:10
> The number of Errored Seconds (0~900) [0]:
> The number of severely errored seconds (0~900) [0]:
> The number of unavailable seconds (0~900) [0]:
> Threshold of positive difference between the current and the past transmit
rate in fast mode (0~5968Kbps) [0]:
> Threshold of positive difference between the current and the past transmit
rate in interleaved mode (0~5968Kbps) [0]:
> Threshold of negative difference between the current and the past transmit
rate in fast mode (0~5968Kbps) [0]:
> Threshold of negative difference between the current and the past transmit
rate in interleaved mode (0~5968Kbps) [0]:
Add profile 2 successfully
huawei(config)#display adsl alarm-profile 2
-----------------------------------------------------------------------------Profile Index : 2
Name: ADSL ALARM PROFILE 2
<ATU-C>
The number of Loss of Frame Seconds
: 50
The number of Loss of Signal Seconds
: 10
The number of Loss of Link Seconds
: 0
The number of Loss of Power Seconds
: 0
The number of Errored Seconds
: 0
Enable or disable the initial failure trap
: Disable
The number of failed fast retrain seconds
: 10
The number of severely errored seconds
: 0
The number of unavailable seconds
: 0
Threshold of positive difference between the current and
the past transmit rate in fast mode
: 100
Threshold of positive difference between the current and
the past transmit rate in interleaved mode
: 0
Threshold of negative difference between the current and
the past transmit rate in fast mode
: 0
Threshold of negative difference between the current and
Issue 01 (2011-07-30)
332
Related Operation
Table 18-8 lists the related operations for adding an ADSL2+ alarm profile.
Table 18-8 Related operations for adding an ADSL2+ alarm profile
Issue 01 (2011-07-30)
To...
Remarks
adsl alarm-profile
quickadd
adsl alarm-profile
quickmodify
alarm-config
333
Prerequisite
The ADSL2+ line profile must be configured.
Context
l
Activating (or activation) refers to the training between the ATU-C and the ATU-R. During
the training process, the system checks the line distance and line state based on the settings
included in the line profile, such as upstream/downstream line rate and SNR margin. The
ATU-C negotiates with the ATU-R to check whether the UA5000 can work properly in the
existing conditions.
If the training is successful, the ATU-C can communicate with the ATU-R. At this point
of time, the port works in the activated state, and is ready for service data transmission.
When the ATU-R is online, the activation process ends on the completion of the training.
When the ATU-R goes offline, the communication is terminated, and the ATU-C is in the
listening state. When the ATU-R goes online, the training process begins automatically.
When the training is successful, the port is activated.
To activate an ADSL2+ port, you need to bind the port with an ADSL2+ line profile.
If no profile is specified, the system uses the default profile to activate the ADSL2+
port.
If the index of the line profile to be referenced in this activation is not entered, the system
uses the profile bound with the port last time to activate the ADSL2+ port.
Procedure
Step 1 Run the activate command to activate an ADSL2+ port.
Step 2 Run the display port state command to query the activated port.
----End
Example
To activate all ADSL2+ ports in slot 0/7, and bind line profile 1, do as follows:
huawei(config-if-adsl-0/7)#activate all profile-index 1
huawei(config-if-adsl-0/7)#display port state all
---------------------------------------------------------------------Port Status
Line_Profile Alm_Profile Ext_Profile
Power_Mode
---------------------------------------------------------------------0 Activated
1
1
--1 Activated
1
1
--2 Activated
1
1
--3 Activated
1
1
--4 Activated
1
1
--5 Activated
1
1
--6 Activated
1
1
--7 Activated
1
1
--8 Activated
1
1
--9 Activated
1
1
--...
30 Activated
1
1
---
Issue 01 (2011-07-30)
334
31 Activated
1
1
-----------------------------------------------------------------------Total number of activated port :
0
Total number of unactivated port: 32
To activate ADSL2+ port 0/7/0 and bind line profile named huawei, do as follows:
huawei(config-if-adsl-0/7)#activate 0 profile-name huawei
huawei(config-if-adsl-0/7)#display port state 0
---------------------------------------------------------------------Port Status
Line_Profile Alm_Profile Ext_Profile
Power_Mode
---------------------------------------------------------------------0 Activated
huawei
1
------------------------------------------------------------------------
Related Operation
Table 18-9 lists the related operations for activating an ADSL2+ port.
Table 18-9 Related operations for activating an ADSL2+ port
To...
Run the
Command...
Remarks
Deactivate an ADSL2+
port
deactivate
loopback
Context
l
When an ADSL2+ port is activated, if the status of the upstream or downstream rate
reachability changes, the system reports an alarm for unqualified rate or a recovery alarm.
The threshold for the upstream rate reachability is independent of the threshold of the
downstream rate reachability. To monitor the upstream and downstream rates, set the
thresholds separately.
The upstream and downstream rate reachability thresholds for a port can be configured
according to the required rates or percentages of the upstream and downstream rates to the
maximum upstream and downstream rates specified in the line profile.
The system supports the configuration of the upstream and downstream rate reachability
thresholds for the ADSL ports in an entire shelf.
Issue 01 (2011-07-30)
335
If the rate of a port becomes qualified or unqualified, the system reports an alarm only.
Other processing of the port is not affected.
Procedure
Step 1 Run the adsl line-monitoring command to configure rate reachability thresholds for an ADSL2
+ port.
Step 2 Run the display adsl line-monitoring command to query the configuration of the rate
reachability thresholds for an ADSL2+ port.
----End
Example
huawei(config)#adsl line-monitoring port 0/7/0 rate-threshold upstream upstreamrate 1024
huawei(config)#display adsl line-monitoring 0/7/0
Port ID
: 0/7/0
Port Type
: ADSL
Line Monitoring Upstream Rate
: 1024 kbps
Line Monitoring Downstream Rate : 0
kbps
huawei(config)#adsl line-monitoring port 0/7/0 rate-threshold downstream downst
ream-rate 2048
huawei(config)#display adsl line-monitoring 0/7/0
Port ID
: 0/7/0
Port Type
: ADSL
Line Monitoring Upstream Rate
: 1024 kbps
Line Monitoring Downstream Rate : 2048 kbps
To configure the upstream rate reachability threshold for port 0/7/0 to be 80% of the maximum
upstream rate specified in the bound line profile, do as follows:
hauwei(config)#adsl line-monitoring port 0/7/0 rate-threshold upstream upstreamrate-percent 80
huawei(config)#display adsl line-monitoring 0/7/0
Port ID
: 0/7/0
Port Type
: ADSL
Line Monitoring Upstream Rate-percent : 80
percent
Line Monitoring Downstream Rate
: 2048 kbps
NOTE
The upstream and downstream rate reachability thresholds for a port can be configured according to the required
rates or in percentage. The configuration methods are as follows:
l
The upstream and downstream rate reachability thresholds for a port are configured according to the
required rates.
The upstream and downstream rate reachability thresholds for a port are configured according to the
percentages of the upstream and downstream rates to the maximum upstream and downstream rates
specified in the line profile.
The upstream rate reachability threshold for a port is configured according to the required rate, and the
downstream rate reachability threshold is configured according to the percentage of the downstream rate
to the maximum downstream rate specified in the line profile.
The downstream rate reachability threshold for a port is configured according to the required rate, and the
upstream rate reachability threshold is configured according to the percentage of the upstream rate to the
maximum upstream rate specified in the line profile.
When the rate reachability thresholds for an ADSL port are queried, the corresponding results are displayed
according to configuration methods.
Issue 01 (2011-07-30)
336
Context
l
Only the rate change pertaining to the ADSL2+ lines can be reported. Other lines do not
support the rate change reporting.
The rate change reporting switch of an ADSL2+ port can be enabled only when the port is
configured with service ports.
Currently, an ADSL2+ port supports only three downstream transmission modes, namely,
fixed, adaptAtStartup, and adaptAtRuntime. The rate change is reported only when the port
works in adaptAtStartup mode.
The criteria for comparing the line rate change: An ADSL2+ port that is activated for the
first time reports traps if the port meets the requirements on rate change reporting; when
the difference between the activation rate and the rate reported last time exceeds 32 kbit/s,
traps are reported.
Procedure
Step 1 Run the service-port command to add a service port.
Step 2 Run the display adsl line-rate command to query the thresholds for the qualified rate of an
ADSL2+ port.
----End
Example
To enable the rate change reporting switch of ADSL2+ port 0/7/0, do as follows:
huawei(config)#service-port vlan 21 adsl 0/7/0 vpi 0 vci 35 rx-cttr 2 tx-cttr 2
huawei(config)#adsl line-rate
{ change<K>}:change
{ trap<K> }:trap
{ enable<K>|disable<K> }:enable
Command:
adsl line-rate change trap enable
NOTE: ADSL line-monitoring rate-threshold feature has been disabled by system
because ADSL line-rate change trap feature has been enabled
huawei(config)#display adsl line-rate
{ change<K> }:change
{ trap<K> }:trap
{ config<K> }:config
Command:
display adsl line-rate change trap config
ADSL line-rate change trap function is enabled
Issue 01 (2011-07-30)
337
Procedure
Step 1 Run the ipoa enable command to enable IPoA protocol conversion.
Step 2 Run the display ipoa config command to query the IPoA protocol conversion status.
----End
Example
To enable IPoA protocol conversion, do as follows:
huawei(config)#ipoa enable
huawei(config)#display ipoa
IPoA status
IPoA user default gateway
IPoA expire-time
config
: enable
: 0.0.0.0
: 900 s
Related Operation
Table 18-10 lists the related operation for enabling IPoA protocol conversion.
Table 18-10 Related operation for enabling IPoA protocol conversion
To...
ipoa disable
Context
l
When the aging time times out, the IPoA forwarding entry cannot be updated, and the
system considers users to be offline.
Procedure
Step 1 Run the ipoa expire-time command to set the aging time of an IPoA forwarding entry.
Issue 01 (2011-07-30)
338
Step 2 Run the display ipoa config command to query the aging time of the IPoA forwarding entry.
----End
Example
To set the aging time of an IPoA forwarding entry as 300s, do as follows:
huawei(config)#ipoa expire-time 300
huawei(config)#display ipoa config
IPoA status
: enable
IPoA user default gateway : 0.0.0.0
IPoA expire-time
: 300 s
Context
l
The default gateway IP address of the IPoA user is the IP address of the interface on the
upper device that connects to the UA5000, and not the IP address of the interface on the
UA5000.
Procedure
Step 1 Run the ipoa default gateway command to set the default gateway of the IPoA user.
Step 2 Run the display ipoa config command to query the default gateway of the IPoA user.
----End
Example
To set the default gateway of the IPoA user as 10.1.1.1, do as follows:
huawei(config)#ipoa default
huawei(config)#display ipoa
IPoA status
IPoA user default gateway
IPoA expire-time
gateway 10.1.1.1
config
: enable
: 10.1.1.1
: 300 s
Related Operation
Table 18-11 lists the related operation for configuring the default gateway of the IPoA user.
Table 18-11 Related operation for configuring the default gateway of the IPoA user
Issue 01 (2011-07-30)
To...
339
Context
l
By default, LLC and VC-MUX are used for the IPoA encapsulation. You can set the
encapsulation type as required.
When configuring LLC for the IPoA service, pay attention to the following points:
LLC encapsulation supports both dynamic and static source IP address learning.
Therefore, you need not specify the source IP address if the modem automatically
reports the IP address. If the modem does not automatically reports the IP address, you
need specify the IP address of the modem as the source IP address.
When a default gateway has been configured for the IPoA service, you need not
configure the destination IP address for the IPoA user. In this case, the users destination
IP address is that of the default gateway.
After you have configured IPoA encapsulation for an xDSL port, you can delete a
service port only after you have changed the encapsulation type to LLC bridge.
Ensure that the MAC address pool is configured before the encapsulation configuration.
Otherwise, the encapsulation configuration fails.
When configuring VC-MUX for the IPoA service, pay attention to the following points:
Because VC-MUX encapsulation supports only static source IP address learning, you
must specify the source IP address. Ensure that the specified source IP address is the
same as the IP address of the modem.
When a default gateway has been configured for the IPoA service, you need not
configure the destination IP address for the IPoA user. In this case, the users destination
IP address is that of the default gateway.
After you have configured IPoA encapsulation for an xDSL port, you can delete a
service port only after you have changed the encapsulation type to LLC bridge.
Ensure that the MAC address pool is configured before the encapsulation configuration.
Otherwise, the encapsulation configuration fails.
Procedure
Step 1 Run the encapsulation command to configure the encapsulation type of the IPoA user.
Step 2 Run the display encapsulation type command to query the configuration.
----End
Example
To configure the encapsulation type of the IPoA user as LLC, do as follows:
huawei(config)#encapsulation 0/7/0 vpi 0 vci 34 type ipoa llc
{ <cr>|srcIP<K>|dstIP<K> }:
Command:
encapsulation 0/7/0 vpi 0 vci 34 type ipoa llc
Changing encapsulation type may cause service interruption, are you sure to
make the operation? (y/n)[n]y
Set encapsulation type successfully
huawei(config)#display encapsulation type ipoa llc
{ <cr>|number<K> }:
Issue 01 (2011-07-30)
340
Command:
display encapsulation type ipoa llc
-------------------------------------------------------------------------F/S /P
VPI VCI
ENCAP
SRCIP
DSTIP
SRCIP-MODE
-------------------------------------------------------------------------0/7 /0
0
34
llc_ip
0.0.0.0
1.1.1.1
dynamic
-------------------------------------------------------------------------Total: 1
Note : F--Frame, S--Slot, P--Port(or Virtual Port, such as IMA GROUP,
VLAN ID etc.), The vpi is access-end VLAN ID in vdsl port
Prerequisite
The ADLS2+ line must meet the requirement for service provisioning.
Procedure
Step 1 Run the pppoa enable command to enable PPPoA/PPPoE protocol conversion.
Step 2 Run the display pppoa config command to query the PPPoA/PPPoE protocol conversion state.
----End
Example
To enable the PPPoA/PPPoE protocol conversion, do as follows:
huawei(config)#pppoa enable
Issue 01 (2011-07-30)
341
Related Operation
Table 18-12 lists the related operation for enabling PPPoA protocol conversion.
Table 18-12 Related operation for enabling PPPoA protocol conversion
To...
pppoa disable
Context
l
By default, LLC and VC-MUX are used for the PPPoA encapsulation. You can set the
encapsulation type as required.
In the case of PPPoA access, the system configuration of the LLC encapsulation and the
system configuration of the VC-MUX encapsulation are similar. You can configure it based
on the actual access user type.
After you have configured PPPoA encapsulation for an xDSL port, you can delete a service
port only when you have changed the encapsulation type to LLC bridge.
Ensure that the MAC address pool is configured before the encapsulation configuration.
Otherwise, the encapsulation configuration fails.
Procedure
Step 1 Run the encapsulation command to configure the encapsulation type of the PPPoA user.
Step 2 Run the display encapsulation type command to query the encapsulation type.
----End
Example
To configure the encapsulation type of a PPPoA user as LLC, do as follows:
huawei(config)#encapsulation 0/7/0 vpi 0 vci 34 type pppoa llc
Changing encapsulation type may cause service interruption, are you sure to
make the operation? (y/n)[n]y
Set encapsulation type successfully
huawei(config)#display encapsulation type pppoa llc
-------------------------------------------------------------------------F/S /P
VPI VCI
ENCAP
SRCIP
DSTIP
SRCIP-MODE
-------------------------------------------------------------------------0/7 /0
0
34
llc_ppp
-------------------------------------------------------------------------Total: 1
Issue 01 (2011-07-30)
342
Context
UA5000The UA5000 determines whether to segment and reassemble packets according to the
PPPoA/PPPoE MRU configuration.
l
MRU disabled
The PC initiates the PPPoE connection and negotiates by an MRU of 1492 bytes. In
this case, the packets are segmented and reassembled.
MRU enabled
The UA5000 identifies the PPPoE packets converted from PPPoA packets. It adds a tag
to the packets and then sends them to the upper layer BRAS. The BRAS negotiates with
the CPE according to the 1500-byte MRU. In this manner, the size of the MTU between
the CPE and the BRAS is equal to that of the standard MTU of the Ethernet. In this
case, the packet is not segmented and reassembled.
Procedure
Step 1 Run the pppoa mru enable command to enable PPPoA/PPPoE MRU negotiation.
Step 2 Run the display pppoa config command to query the PPPoA and MRU switch status.
----End
Example
To enable the MRU negotiation, do as follows:
huawei(config)#pppoa mru enable
huawei(config)#display pppoa config
Global PPPoA-to-PPPoE conversion
: Enable
Max-receive-unit negotiate function: Enable
PPPoA-to-PPPoE monitor timeout
: 120 s
Related Operation
Table 18-13 lists the related operation for enabling PPPoA/PPPoE MRU negotiation.
Table 18-13 Related operation for enabling PPPoA/PPPoE MRU negotiation
To...
343
Context
An ADSL2+ port may be in the activating, activated, deactivated, or loopback state.
Figure 18-10 shows the switchover between these statuses.
Figure 18-10 Switchover between ADSL2+ port statuses
undo
loopback
Loopback
Modem training
succeeds
activate
activating
deactivated deactivate
Modem is off or
powered off
activated
deactivate
loopback
Procedure
Step 1 Run the display interface adsl command to query the general information about an ADSL2+
port.
----End
Example
To query the general information about ADSL2+ port 0/7/0, do as follows:
huawei(config)#display interface adsl 0/7/0
huawei(config)#
Adsl 0/ 7/ 0
State of port
Power mode
Description
Bind line-profile
Bind alarm-profile
Bind ext-profile
BTV user bind profile name
Hardware
Last up time
Last down time
Current transmission mode
Current upstream rate (kbps)
Current downstream rate (kbps)
Total count of line training
Total up stream cells num (cell)
Total down stream cells num (cell)
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
down
activating
--No.1
DEFVAL
No.1
DEFVAL
--ATU-C
---0
0
-0
0
PVC
0/35
PVC encapsulation
Flow type
Flow para
Rx-cttr
Tx-cttr
VLAN
Max mac-address learning count
Support down multicast stream
Up stream bytes num (byte)
Up stream packets num (packet)
Down stream bytes num (byte)
Down stream packets num (packet)
:
:
:
:
:
:
:
:
:
:
:
:
Bridge LLC
--6
6
10
255
enable
0
0
0
0
Issue 01 (2011-07-30)
344
Related Operation
Table 18-14 lists the related operations for querying an ADSL2+ port.
Table 18-14 Related operations for querying an ADSL2+ port
Issue 01 (2011-07-30)
To...
display parameter
345
19
346
The purpose of configuring the SHDSL multi-pair (M-pair) binding is to improve the line rate.
When configuring the SHDSL M-pair binding, ensure that no service exists on any SHDSL port
and all the SHDSL ports are deactivated and are in the non-loopback state.
19.9 Configuring the SHDSL EFM M-Pair Binding
The purpose of configuring the SHDSL M-pair binding is to improve the line rate. When
configuring the SHDSL EFM M-pair binding, ensure that no service exists on all the ports and
the ports are in the deactivated and non-loopback state.
19.10 Activating an SHDSL Port
This topic describes how to activate an SHDSL port for service transmission.
19.11 Querying an SHDSL Port
This topic describes how to query the SHDSL port status to check the port conditions.
19.12 Configuring the Channel Mode Switch of SHDSL Chipset
The subscriber can configure the SHDSL chipset channel mode of the H603SHLB board to PTM
or ATM.
19.13 Configuring the Clock Mode
This topic describes how to configure the clock mode.
Issue 01 (2011-07-30)
347
Service Description
The SHDSL technology provides symmetric high rate leased line access service over twisted
pairs to meet the requirements of the small-sized to medium-sized enterprises or small office,
and home office (SOHO) users. SHDSL provides a transmission distance from 3 km to 6 km.
The H601SDLB, H612SDLB, and H603SHLB boards support two-wire and four-wire SHDSL
lines. The rate of the two-wire SHDSL line ranges from 192 kbit/s to 2312 kbit/s. The rate of
the four-wire SHDSL line ranges from 384 kbit/s to 4624 kbit/s. In addition, the H603SHLB
board supports six-wire and eight-wire SHDSL.bis lines. The rate of the six-wire SHDSL line
ranges from 576 kbit/s to 17088 kbit/s. The rate of the eight-wire SHDSL line ranges from 768
kbit/s to 22784 kbit/s.
For details on SHDSL, see "SHDSL Access" in the UA5000 Universal Access Unit Feature
Description.
Service Specifications
The UA5000 provides the SHDSL service through the SDLB/SHLB board. The SDLB board
provides G.SHDSL interface in ATM mode. The SHLB board supports the high-rate SHDSL.bis
feature. Each SDLB/SHLB board provides 16 SHDSL ports.
The SHDSL ports of the SHLB board support the activation in ATM/PTM mode. The ATM/
PTM mode switchover can be implemented on the SHDSL port through profile configuration.
Table 19-1 shows the encapsulation type mapping between the UA5000 and the modem.
Table 19-1 Encapsulation type mapping between the UA5000 and the modem
Access Type
Modem Encapsulation
Type
PPPoA
PPPoA
PPPoA or Auto
IPoA
IPoA or Auto
IPoE
RFC1483 Bridge
Bridge or Auto
PPPoE
RFC1483 Bridge
Bridge or Auto
PPPoE
Bridge or Auto
348
Prerequisite
Before configuring the SHDSL access service, ensure the following:
l
The upper router of the UA5000 must assign VLANs to the SHDSL online users.
Currently, the application service of IPoA/PPPoA users is the common Internet service.
The UA5000 can restrict the user bandwidth through a specified traffic profile or an SHDSL
line profile. When the traffic profile and the SHDSL line profile work, the smaller
bandwidth restricted by the two profiles is used as the user bandwidth.
The following section considers the user rate restriction through an SHDSL line profile as
an example. The bandwidth configured in a traffic profile should be higher than the
bandwidth configured in a line profile.
Networking
Figure 19-1 shows an example network for configuring the SHDSL IPoA service.
Figure 19-1 Example network for configuring the SHDSL IPoA service
BRAS
LSW
0/3/0
0/7/0
S
D
L
B
I
P
M
B
UA5000
Modem
PC
Data Plan
Table 19-2 provides the data plan for configuring the SHDSL IPoA service.
Issue 01 (2011-07-30)
349
Table 19-2 Data plan for configuring the SHDSL IPoA service
Item
Data
Remarks
Traffic profile
Index: 7
Alarm profile
SDLB board
IPMB board
Issue 01 (2011-07-30)
VLAN ID: 10
Uplink port0/3/0
350
Item
Data
Remarks
Configuration Flowchart
Figure 19-2 shows the flowchart for configuring the SHDSL IPoA service.
Figure 19-2 Flowchart for configuring the SHDSL IPoA service
Start
Is there
an appropriate traffic
profile?
No
Yes
Create a VLAN and
add port(s) to it
No
No
Yes
Is there
an appropriate alarm
profile?
Yes
Yes
Is there
an appropriate line
profile?
No
End
Procedure
Step 1 Check whether there is a proper traffic profile. If there is no proper traffic profile, add a required
traffic profile.
huawei(config)#display traffic table from-index 0
Traffic parameters for IP service:
----------------------------------------------------------------------------TID CAR(kbps) Priority Pri-Policy
-----------------------------------------------------------------------------
Issue 01 (2011-07-30)
351
0
1024
6
tag-pri
1
2496
6
tag-pri
2
512
0
tag-pri
3
576
2
tag-pri
4
64
4
tag-pri
5
2048
0
tag-pri
6
-0
tag-pri
10
2048
2
tag-pri
----------------------------------------------------------------------------Traffic parameters for ATM service:
----------------------------------------------------------------------------TID Service Traf CLP01PCR CLP0PCR CLP01SCR CLP0SCR MBS CDVT
PPD/EPD/SHAPE
Type
Type kbps
kbps
kbps
kbps
cells 1/10us
----------------------------------------------------------------------------0
cbr
2
1024
-----off/off/-1
cbr
2
2500
-----off/off/-2
ubr
2
512
-----on /on /-3
nrt-vbr 5
1200
-600
-250 -on /on /-4
rt-vbr 15
128
--64
300 10000000 on /on /off
5
ubr
2
2048
-----on /on /-6
ubr
1
------off/off/-10
ubr
2
2048
-----on /on /-----------------------------------------------------------------------------Total Num
:
8
Traffic type definition:
1:NoTrafficDescriptor
2:NoClpNoScr
3:ClpNoTaggingNoScr
4:ClpTaggingNoScr
5:NoClpScr
6:ClpNoTaggingScr
7:ClpTaggingScr
8:ClpNoTaggingMcr
9:ClpTransparentNoScr
10:ClpTransparentScr
11:NoClpTaggingNoScr
12:NoClpNoScrCdvt
13:NoClpScrCdvt
14:ClpNoTaggingScrCdvt
15:ClpTaggingScrCdvt
-----------------------------------------------------------------------------
After the query, it is found that there is no proper traffic profile for use. You need to add a
required traffic profile.
huawei(config)#traffic table index 7 ip car 2048 priority 6 priority-policy pvcSetting
Create traffic descriptor record successfully
----------------------------------------------------------------------------TD Index
: 7
Priority
: 6
Priority policy : pvc-pri
CAR
: 2048 kbps
TD Type
: NoClpNoScr
Service category : ubr
Referenced Status: not used
EnPPDISC
: on
EnEPDISC
: on
Clp01Pcr
: 2048 kbps
-----------------------------------------------------------------------------
Step 2 Create a VLAN and add a service port and an upstream port to the VLAN.
1.
Create VLAN 10, and add upstream port 0/3/0 to the VLAN.
huawei(config)#vlan 10 smart
huawei(config)#port vlan 10 0/3 0
2.
Issue 01 (2011-07-30)
352
0 Activated
Active
1
1 Normal
None
Normal
-----------------------------------------------------------------------------
Step 9 Configure the MAC address pool. Configure MAC address pool 0 with the start address of
0000-0000-0001.
huawei(config-if-sdl-0/7)#quit
huawei(config)#mac-pool 0 0000-0000-0001
Issue 01 (2011-07-30)
353
In the case of IPoA access, select the dynamic IP address (without specifying the source IP address) or the
static IP address (specifying the source IP address) for the packets. To switch from a dynamic address to
a static address in IPoA mode, you must first use LLC-Bridge encapsulation, and then use the IPoA static
address encapsulation.
----End
Result
After the configuration, the user should be able to access the Internet in IPoA mode.
Prerequisite
l
The upper layer router of the UA5000 must assign VLANs to the SHDSL online users.
Currently, the application service of IPoA/PPPoA users is the common Internet service.
The UA5000 can restrict the user bandwidth through a specified traffic profile or an SHDSL
line profile. When the traffic profile and the SHDSL line profile work, the smaller
bandwidth restricted by the two profiles is used as the user bandwidth.
The following section considers the user rate restriction through an SHDSL line profile as
an example. The bandwidth configured in a traffic profile should be higher than the
bandwidth configured in a line profile.
Context
Networking
Figure 19-3 shows an example network for configuring the SHDSL PPPoA service.
Issue 01 (2011-07-30)
354
Figure 19-3 Example network for configuring the SHDSL PPPoA service
BRAS
LSW
0/3/0
0/7/0
S
D
L
B
I
P
M
B
UA5000
Modem
PC
Data Plan
Table 19-3 provides the data plan for configuring the SHDSL PPPoA service.
Table 19-3 Data plan for configuring the SHDSL PPPoA service
Item
Data
Remarks
Traffic profile
Index: 7
Issue 01 (2011-07-30)
355
Item
Data
Remarks
Alarm profile
SDLB board
IPMB board
Issue 01 (2011-07-30)
VLAN ID: 10
Upstream/Downstream bandwidth:
2 Mbit/s
356
Item
Data
Remarks
Requirements
for the upperlayer device
LAN switch:
Configuration Flowchart
Figure 19-4 shows the flowchart for configuring the SHDSL PPPoA service.
Issue 01 (2011-07-30)
357
Is there
an appropriate traffic
profile?
No
Yes
Create a VLAN and
add port(s) to it
No
Yes
End
Add a line profile
Yes
Is there
an appropriate alarm
profile?
Yes
No
No
Procedure
Step 1 Query and configure the traffic profile.
huawei(config)#display traffic table from-index 0
Traffic parameters for IP service:
----------------------------------------------------------------------------TID CAR(kbps) Priority Pri-Policy
----------------------------------------------------------------------------0
1024
6
tag-pri
1
2496
6
tag-pri
2
512
0
tag-pri
3
576
2
tag-pri
4
64
4
tag-pri
5
2048
0
tag-pri
6
-0
tag-pri
7
2048
6
pvc-pri
10
2048
6
pvc-pri
----------------------------------------------------------------------------Traffic parameters for ATM service:
----------------------------------------------------------------------------TID Service Traf CLP01PCR CLP0PCR CLP01SCR CLP0SCR MBS CDVT
PPD/EPD/SHAPE
Type
Type kbps
kbps
kbps
kbps
cells 1/10us
----------------------------------------------------------------------------0
cbr
2
1024
-----off/off/-1
cbr
2
2500
-----off/off/--
Issue 01 (2011-07-30)
358
2
ubr
2
512
-----on /on /-3
nrt-vbr 5
1200
-600
-250 -on /on /-4
rt-vbr 15
128
--64
300 10000000 on /on /off
5
ubr
2
2048
-----on /on /-6
ubr
1
------off/off/-7
ubr
2
2048
-----on /on /-10
ubr
2
2048
-----on /on /-----------------------------------------------------------------------------Total Num
:
9
Traffic type definition:
1:NoTrafficDescriptor
2:NoClpNoScr
3:ClpNoTaggingNoScr
4:ClpTaggingNoScr
5:NoClpScr
6:ClpNoTaggingScr
7:ClpTaggingScr
8:ClpNoTaggingMcr
9:ClpTransparentNoScr
10:ClpTransparentScr
11:NoClpTaggingNoScr
12:NoClpNoScrCdvt
13:NoClpScrCdvt
14:ClpNoTaggingScrCdvt
15:ClpTaggingScrCdvt
-----------------------------------------------------------------------------
If there is no proper traffic profile after the query, run the traffic table command to create a required traffic
profile.
Step 2 Create a VLAN and add uplink ports and service ports to the VLAN.
1.
Create VLAN 10, and add uplink port 0/3/0 to VLAN 10.
huawei(config)#vlan 10 smart
huawei(config)#port vlan 10 0/3 0
2.
Issue 01 (2011-07-30)
359
Step 9 Configure the MAC address pool. Configure MAC address pool 0 with the start address of
0000-0000-0001.
huawei(config-if-sdl-0/7)#quit
huawei(config)#mac-pool 0 1000-0000-0001
----End
Result
After the configuration, the user should be able to access the Internet in PPPoA mode.
Prerequisite
l
Issue 01 (2011-07-30)
360
The UA5000 can restrict the user rate through a traffic profile or an SHDSL line profile.
When both the traffic profile and the SHDSL line profile work, the smaller one of the
bandwidths restricted by the two profiles is used as the user bandwidth.
In this example, the traffic is considered as an example. Ensure that the user rate configured
in the line profile is larger than the user rate configured in the traffic profile.
Context
Networking
Figure 19-5 shows an example network for the SHDSL IPoE/PPPoE service.
Figure 19-5 Example network of the SHDSL IPoE/PPPoE service
BRAS
LSW
0/3/0
0/7/0
S
D
L
B
I
P
M
B
UA5000
Modem
PC
Data Plan
Table 19-4 provides the data plan for configuring the SHDSL IPoE/PPPoE service.
Table 19-4 Data plan for configuring the SHDSL IPoE/PPPoE service
Item
Data
Remarks
Traffic profile
Index: 7
361
Item
Line profile
Data
Remarks
Alarm profile
SDLB board
IPMB board
Issue 01 (2011-07-30)
VLAN ID: 10
Upstream/Downstream bandwidth:
3 Mbit/s
362
Item
Data
Remarks
Requirements
for the upperlayer device
LAN switch:
Configuration Flowchart
Figure 19-6 shows the flowchart for configuring the SHDSL IPoE/PPPoE service.
Issue 01 (2011-07-30)
363
Is there
an appropriate traffic
profile?
No
Yes
Create a VLAN and
add port(s) to it
Is the SHDSL
port activated?
No
Yes
Deactivate the SHDSL port
Is there
an appropriate line
profile?
No
Yes
Is there
an appropriate alarm
profile?
No
Yes
Bind the alarm profile
Bind the line profile and
activate the SHDSL port
End
Procedure
Step 1 Query and configure a traffic profile.
huawei(config)#display traffic table from-index 0
Traffic parameters for IP service:
----------------------------------------------------------------------------TID CAR(kbps) Priority Pri-Policy
----------------------------------------------------------------------------0
1024
6
tag-pri
1
2496
6
tag-pri
2
512
0
tag-pri
Issue 01 (2011-07-30)
364
3
576
2
tag-pri
4
64
4
tag-pri
5
2048
0
tag-pri
6
-0
tag-pri
7
3072
6
pvc-pri
10
2048
6
pvc-pri
----------------------------------------------------------------------------Traffic parameters for ATM service:
----------------------------------------------------------------------------TID Service Traf CLP01PCR CLP0PCR CLP01SCR CLP0SCR MBS CDVT
PPD/EPD/SHAPE
Type
Type kbps
kbps
kbps
kbps
cells 1/10us
----------------------------------------------------------------------------0
cbr
2
1024
-----off/off/-1
cbr
2
2500
-----off/off/-2
ubr
2
512
-----on /on /-3
nrt-vbr 5
1200
-600
-250 -on /on /-4
rt-vbr 15
128
--64
300 10000000 on /on /off
5
ubr
2
2048
-----on /on /-6
ubr
1
------off/off/-7
ubr
2
3072
-----on /on /-10
ubr
2
2048
-----on /on /-----------------------------------------------------------------------------Total Num
:
9
Traffic type definition:
1:NoTrafficDescriptor
2:NoClpNoScr
3:ClpNoTaggingNoScr
4:ClpTaggingNoScr
5:NoClpScr
6:ClpNoTaggingScr
7:ClpTaggingScr
8:ClpNoTaggingMcr
9:ClpTransparentNoScr
10:ClpTransparentScr
11:NoClpTaggingNoScr
12:NoClpNoScrCdvt
13:NoClpScrCdvt
14:ClpNoTaggingScrCdvt
15:ClpTaggingScrCdvt
-----------------------------------------------------------------------------
If there is no proper traffic profile after the query, run the traffic table command to create a required traffic
profile.
Step 2 Add a VLAN and add a service port and an upstream port to the VLAN.
1.
Create VLAN 10, and add upstream port 0/3/0 to the VLAN.
huawei(config)#vlan 10 smart
huawei(config)#port vlan 10 0/3 0
2.
Issue 01 (2011-07-30)
365
----End
Result
After the configuration, the user should be able to access the Internet in IPoE/PPPoE mode.
Issue 01 (2011-07-30)
366
Context
l
Each SHDSL line of the UA5000 is associated with a specific channel mode, and is bound
with a line profile. A configuration table of the SHDSL line profile can hold up to 103
SHDSL line profiles.
The SHLB board supports the SHDSL.bis feature with high rate.
The SHDSL port supports activation in ATM/PTM mode. Users can switch the SHDSL
port between the ATM mode and the PTM mode by configuring different profiles.
Five SHDSL line profiles are default line profiles, the indexes of which are 1, 100, 101,
102, and 103. These five profiles can be modified but cannot be deleted.
Each SHDSL line of the UA5000 is associated with a specific channel mode, and is bound with
a line profile. A configuration table can hold up to 100 line profiles, including two default
profiles, profile 1 and profile 100, which cannot be deleted but can be modified.
Configuration Flowchart
Figure 19-7 shows the flowchart for adding an SHDSL line profile.
Issue 01 (2011-07-30)
367
No
Yes
Name the profile
No
Yes
Yes
Procedure
Step 1 Run the shdsl line-profile add command to add an SHDSL line profile.
Step 2 Run the display shdsl line-profile command to query the SHDSL line profile which has been
added.
----End
Example
To add an SHDSL line profile with the index of 3, do as follows:
huawei(config)#shdsl line-profile add 3
During inputting,press 'Q' to quit,then settings at this time will be ignored
Do you want to name the profile (y/n) [n]:
> G.SHDSL data path mode(1--ATM;2--PTM)[1]:1
Issue 01 (2011-07-30)
368
Context
There is a default alarm profile with name of DEFVAL and the index of 1.
The default alarm profile cannot be deleted.
Configuration Flowchart
Figure 19-8 shows the flowchart for adding an SHDSL alarm profile.
Issue 01 (2011-07-30)
369
Use default
parameter to create
Yes
alarm profile?
No
Set loop attenuation threshold
End
Procedure
Step 1 Run the shdsl alarm-profile add command to add an SHDSL alarm profile.
----End
Issue 01 (2011-07-30)
370
Example
To add an SHDSL alarm profile with the index of 3, do as follows:
huawei(config)#shdsl alarm-profile add 3
During inputting,press 'Q' to quit,then settings at this time will be ignored
Do you want to name the profile (y/n) [n]:y
Please input profile name:profile-3
> Do you use the default data to create an alarm profile?(y/n)[y]:n
> Loop attenuation threshold (0~127 db)[0]:
> SNR margin threshold (0~10 db)[0]:
> ES threshold (0~900 s)[0]:
> SES threshold (0~900 s)[0]:
> CRC anomaly threshold (0~58981500)[0]:
> LOSWS threshold (0~900 s)[0]:
> UAS threshold (0~900 s)[0]:
Add profile 3 successfully
Parameter Description
Table 19-5 lists the parameters of an SHDSL alarm profile.
Table 19-5 Parameters of an SHDSL alarm profile
Issue 01 (2011-07-30)
Parameter
Description
Profile index
ES threshold
SES threshold
LOSWS threshold
UAS threshold
371
Related Operation
Table 19-6 lists the related operations for adding an SHDSL alarm profile.
Table 19-6 Related operations for adding an SHDSL alarm profile
To...
Remarks
shdsl alarm-profile
delete
shdsl alarm-profile
quickadd
shdsl line-profile
modify
Context
Pay attention to the following points:
l
The SHDSL alarm profile bound with a port takes effect after the port is activated.
If no profile is specified, the system uses the profile bound with the SHDSL port last time
to activate the port. If the port is activated for the first time, the default alarm profile, namely
profile 1 is used for activating the port.
Procedure
Step 1 Run the alarm-config command to bind an SHDSL alarm profile with a port.
Step 2 Run the display port state command to query the binding between the alarm profile and the
port.
----End
Issue 01 (2011-07-30)
372
Example
To bind alarm profile 3 with port 1 of the SHDSL board in slot 0/7, do as follows:
huawei(config-if-sdl-0/7)#alarm-config 1 3
huawei(config-if-sdl-0/7)#display port state 1
--------------------------------------------------------------------------Port Running
Control Line
Alarm
Running
Config
Bind
ID
Status
Status
Profile Profile Operation
Operation
Status
--------------------------------------------------------------------------1 Deactivated Deactive
1
3 Normal
None
Normal
---------------------------------------------------------------------------
Prerequisite
The port for configuring the SHDSL M-pair binding must be deactivated and cannot be
configured as any service port.
Context
Each SHDSL line of the UA5000 has a specific channel mode, and is bound with a line profile.
An SHDSL line profile table contains up to 103 line profiles.The configuration of the default
line profile is as follows:
l
In the SHDSL port encapsulation mode, the SDLB board supports the binding of two-pair and
the SHLB board supports the binding of two-pair, three-pair, and four-pair. The rates are
respectively twice, three times and four times as fast as the rate of the single-pair.
l
The 16 ports of the SDLB board are divided into eight groups. Each group contains two
ports.
The 16 ports of the SHLB board are divided into four groups. Each group contains four
ports.
The ports for the M-pair binding must belong to the same group.
When configuring the SHDSL multi-pair binding, configure the binding type as M-Pair.
The bound ports must be activated by the same profile simultaneously. Only the active port
can be configured. The configuration in this section refers to the operation of activating
and deactivating a port, configuring power backoff, performing and canceling a loopback
on a port.
After a port is bound, each port in the binding group is automatically bound with the
corresponding pair and the default line profile of the encapsulation mode.
Issue 01 (2011-07-30)
373
Procedure
Step 1 Run the interface sdl command to enter the SHDSL mode.
Step 2 Run the port bind command to configure the SHDSL M-pair binding.
Step 3 Run the display port state command to query the SHDSL port status.
----End
Example
To configure ports 0 and 1 in slot 0/7 of the SHDSL board as two-pair, do as follows:
huawei(config)#interface sdl 0/7
huawei(config-if-sdl-0/7)#port bind m-pair 0-1
huawei(config-if-sdl-0/7)#display port state all
--------------------------------------------------------------------------Port Running
Control Line
Alarm
Running
Config
Bind
ID
Status
Status
Profile Profile Operation
Operation
Status
--------------------------------------------------------------------------0 Activating
Deactive
101
1 Normal
None
MPair 0
1 Activating
Deactive
101
1 Normal
None
MPair 0
2 Activating
Deactive
1
1 Normal
None
Normal
3 Deactivated Deactive
1
1 Normal
None
Normal
4 Deactivated Deactive
1
1 Normal
None
Normal
5 Deactivated Deactive
1
1 Normal
None
Normal
6 Deactivated Deactive
1
1 Normal
None
Normal
7 Deactivated Deactive
1
1 Normal
None
Normal
8 Deactivated Deactive
1
1 Normal
None
Normal
9 Deactivated Deactive
1
1 Normal
None
Normal
10 Deactivated Deactive
1
1 Normal
None
Normal
11 Deactivated Deactive
1
1 Normal
None
Normal
12 Deactivated Deactive
1
1 Normal
None
Normal
13 Deactivated Deactive
1
1 Normal
None
Normal
14 Deactivated Deactive
1
1 Normal
None
Normal
15 Deactivated Deactive
1
1 Normal
None
Normal
--------------------------------------------------------------------------Total number of activated port :
0
Total number of unactivated port: 16
Related Operation
Table 19-7 lists the related operations for configuring the SHDSL M-pair binding.
Table 19-7 Related operations for configuring the SHDSL M-pair binding
To...
activate
deactivate
374
Prerequisite
The port for configuring the SHDSL EFM M-pair binding must be deactivated and cannot be
configured with any service port.
Context
Each SHDSL line of the UA5000 has a specific channel mode, and is bound with a line profile.
An SHDSL line profile table contains up to 103 SHDSL line profiles.
l
In SHDSL port encapsulation mode, the system supports the binding of two-pair, three-pair, and
four-pair. The rates are respectively twice, three times and four times as fast as the single-pair
rate.
l
The 16 ports of the SHLB board are divided into four groups. Each group contains four
ports. The ports for the EFM M-pair binding must belong to the same group.
When you configure the SHDSL EFM M-pair binding, configure the binding type as EFM.
The bound ports can be activated by using different line profiles. You can configure each
bound port. The configuration in this section refers to the operation of activating and
deactivating a port, configuring power backoff, performing a loopback, and canceling a
loopback on a port.
After a port is bound, each port in the binding group is automatically bound with the
corresponding pair and the default line profile of the encapsulation mode.
Procedure
Step 1 Run the interface sdl command to enter the SHDSL mode.
Step 2 Run the port bind command to configure the SHDSL EFM M-pair binding.
Step 3 Run the display port state command to query the SHDSL port status.
----End
Example
To configure ports 4, 5 and 6 in slot 0/7 of the SHDSL board as three-pair, do as follows:
huawei(config)#interface sdl 0/7
huawei(config-if-sdl-0/7)#port bind efm 4-6
huawei(config-if-sdl-0/7)#display port state all
--------------------------------------------------------------------------Port Running
Control Line
Alarm
Running
Config
Bind
ID
Status
Status
Profile Profile Operation
Operation
Status
--------------------------------------------------------------------------0 Activating
Active
101
1 Normal
None
MPair 0
1 Activating
Active
101
1 Normal
None
MPair 0
2 Activating
Active
101
1 Normal
None
MPair 0
3 Deactivated Deactive
1
1 Normal
None
Normal
4 Activating
Deactive
103
1 Normal
None
EFM
4
5 Activating
Deactive
103
1 Normal
None
EFM
4
6 Activating
Deactive
103
1 Normal
None
EFM
4
Issue 01 (2011-07-30)
375
7 Deactivated Deactive
1
1 Normal
None
Normal
8 Deactivated Deactive
1
1 Normal
None
Normal
9 Deactivated Deactive
1
1 Normal
None
Normal
10 Deactivated Deactive
1
1 Normal
None
Normal
11 Deactivated Deactive
1
1 Normal
None
Normal
12 Deactivated Deactive
1
1 Normal
None
Normal
13 Deactivated Deactive
1
1 Normal
None
Normal
14 Deactivated Deactive
1
1 Normal
None
Normal
15 Deactivated Deactive
1
1 Normal
None
Normal
--------------------------------------------------------------------------Total number of activated port :
0
Total number of unactivated port: 16
Related Operation
Table 19-8 lists the related operations for configuring the SHDSL EFM M-pair binding.
Table 19-8 Related operations for configuring the SHDSL EFM M-pair binding
To...
activate
deactivate
Prerequisite
There must be a suitable SHDSL line profile.
Context
l
Activating (or activation) refers to the training between the STU-C and the STU-R. During
the training process, the system checks the line distance and line state based on the settings
included in the line profile, such as upstream/downstream line rate and SNR margin. The
STU-C negotiates with the STU-R to check whether the devices can work properly in the
existing conditions.
If the training is successful, the STU-C can communicate with the STU-R. At the same
time, the port works in the activated state, and is ready for service transmission.
When the STU-R is online, the activation process ends after the training is complete. When
the STU-R goes offline, the communication is terminated, and the STU-C is in the listening
state. Once the STU-R goes online, the training process begins automatically. When the
training is successful, the port is activated.
If you require to use new parameters for an activated port, first deactivate the port and then
activate it by using the profile with the required parameters.
Issue 01 (2011-07-30)
376
If no profile is specified, the system uses the profile bound with the SHDSL port last time
to activate the port. If the port is activated for the first time, the default alarm profile, namely,
profile 1 is used for activating the port.
Procedure
Step 1 Run the activate command to activate an SHDSL port.
Step 2 Run the display port state command to query the information of the SHDSL port.
----End
Example
To activate the SHDSL port 0 in slot 0/7 by using line profile 1, do as follows:
huawei(config-if-sdl-0/7)#activate 0 1
huawei(config-if-sdl-0/7)#display port state 0
--------------------------------------------------------------------------Port Running
Control Line
Alarm
Running
Config
Bind
ID
Status
Status
Profile Profile Operation
Operation
Status
--------------------------------------------------------------------------0 Activated
Active
1
1 Normal
None
Normal
---------------------------------------------------------------------------
Related Operation
Table 19-9 lists the related operations for activating an SHDSL port.
Table 19-9 Related operations for activating an SHDSL port
To...
deactivate
loopback
Context
l
Modem training
succeeds
activate
loopback
activating
Remote
loopback
deactivated deactivate
loopback
Issue 01 (2011-07-30)
Remote
loopback
activated
undo
loopback
377
Procedure
Step 1 Run the display port state command to query the SHDSL port state.
----End
Example
To query the configuration and running status of the port 0/7/0, do as follows:
huawei(config-if-sdl-0/7)#display port state 0
------------------------------------------------------------------------Port Running
Control Line
Alarm
Running
Config
Bind
ID
Status
Status
Profile Profile Operation
Operation
Status
-------------------------------------------------------------------------0
Activating
Active
1
1
Normal
None
Normal
--------------------------------------------------------------------------
Context
After the channel mode of a chipset is configured to ATM or PTM by running the set chipsetmode command, the ports on the chipset can be activated only in the corresponding mode.
Procedure
Step 1 Run the interface sdl command to enter the SHDSL mode.
Step 2 Run the set chipset-mode command to configure the channel mode of the SHDSL chipset.
Step 3 Run the display chipset-mode command to query the configured channel mode of the SHDSL
chipset.
----End
Example
To configure the channel mode of the SHDSL chipset to PTM, do as follows:
huawei(config)#interface sdl 0/7
huawei(config-if-sdl-0/7)#set chipset-mode 0 ptm
uawei(config-if-sdl-0/7)#display chipset-mode 0
Command:
display chipset-mode 0
Chipset mode: PTM
378
Context
The clock modes of the SHDSL port are as follows:
l
System
Free-run
The network synchronization reference (NSR) clock mode takes effect only when the port is
reactivated.
l
Procedure
Step 1 Run the set clockmode command to configure the clock mode.
Step 2 Run the display clockmode command to display the set clock mode.
----End
Example
To set the clock mode to system, do as follows:
huawei(config-if-sdl-0/7)#set clockmode system
The new clockmode will not take effect until the port is activated again.
Are you sure to set clockmode? (y/n)[n]:y
huawei(config-if-sdl-0/7)#display clockmode
Clock mode: System
Issue 01 (2011-07-30)
379
20
380
This topic describes how to add a VDSL2 channel alarm profile. The new channel alarm profile
contains alarm thresholds for channel parameters.
20.10 Adding a VDSL2 Alarm Template
This topic describes how to add a VDSL2 alarm template.
20.11 Binding a VDSL2 Alarm Template
This topic describes how to bind a VDSL2 alarm template to a port. After the port is activated,
the system monitors the line according to the alarm threshold configured in the alarm template.
20.12 Activating a VDSL2 Port
This topic describes how to activate a VDSL2 port. Activation refers to the training performed
between the VDSL transceiver unit - central office end (VTU-C) and the VDSL transceiver unit
- remote end (VTU-R). According to the upstream and downstream line rates and the specified
noise margin configured in the line template, the system detects the line length and line
conditions. The VTU-C and the VTU-R negotiates with each other and confirm whether the
VDSL2 port can work normally in the conditions described above.
20.13 Querying a VDSL2 Port
This topic describes how to query the information about a VDSL2 port.
Issue 01 (2011-07-30)
381
Service Description
The VDSL2 service uses the symmetric or asymmetric data transmission mode. The maximum
transmission distance can be 3.5 km.
For details of the VDSL2 service, see "Feature Description VDSL2 Access."
Service Specifications
l
The UA5000 provides the VDSL2 service through the VDMB board.
The UA5000 supports the master shelf and the extended shelf. The master shelf and the
extended shelf house up to 30 VDSL2 boards in total. Each VDSL2 board provides 16
VDSL2 ports. The master shelf and the extended shelf provide up to 480 ports in total for
the VDSL2 service.
Prerequisite
l
The upper layer device of the UA5000 assigns VLANs to the VDSL2 Internet access
subscribers.
The UA5000 can restrict the user bandwidth through the configured traffic profile or the
configured VDSL2 line profile. If the two profiles work together, the user bandwidth is the
minimum value defined in the two profiles.
In the case of IPoA access, select the dynamic IP address (without specifying the source
IP address) or the static IP address (specifying the source IP address) for the packets. When
switching from a dynamic address to a static address in the IPoA mode, you need to use
LLC-Bridge encapsulation first, and then use the IPoA static address encapsulation.
Context
Networking
Figure 20-1 shows an example network for configuring the VDSL2 IPoA service.
Issue 01 (2011-07-30)
382
Figure 20-1 Example network for configuring the VDSL2 IPoA service
BRAS
LSW
0/3/0
I
P
M
B
0/7/0
V
D
M
B
UA5000
Modem
PC
Data Plan
Table 20-1 provides the data plan for configuring the VDSL2 IPoA service.
Table 20-1 Data plan for configuring the VDSL2 IPoA service
Item
Data
Remarks
Traffic profile
Index: 7
Issue 01 (2011-07-30)
383
Item
Data
Remarks
Line template
Line profile:
l Index: 3
l Target downstream/upstream
SNR margin: 12 dB
l Minimum downstream/
upstream SNR margin: 0.5 dB
l Other parameters: default
setting
Channel profile:
l Index: 3
l Path mode: ATM
l Other parameters: default
setting
Alarm template
VDMB board
IPMB board
VLAN ID: 10
Configuration Flowchart
Figure 20-2 shows the flowchart for configuring the VDSL2 IPoA service.
Issue 01 (2011-07-30)
384
Is there
an appropriate traffic
profile?
No
Yes
Create a VLAN and
add port(s) to it
No
Enable the protocol conversion
Configure the IPoA
default gateway
No
Yes
Is there
an appropriate alarm
template?
Yes
Yes
Is there
an appropriate line
template?
No
End
NOTE
When adding a service port, you can select the ATM or PTM as the data path mode. The PTM data path
mode does not support the PPPoA and IPoA modes.
Procedure
Step 1 Check whether there is a proper traffic profile. If there is no proper traffic profile, add a traffic
profile.
huawei(config)#display traffic table from-index 0
Traffic parameters for IP service:
----------------------------------------------------------------------------TID CAR(kbps) Priority Pri-Policy
----------------------------------------------------------------------------0
1024
6
tag-pri
1
2496
6
tag-pri
2
512
0
tag-pri
3
576
2
tag-pri
4
64
4
tag-pri
5
2048
0
tag-pri
6
-0
tag-pri
----------------------------------------------------------------------------Traffic parameters for ATM service:
----------------------------------------------------------------------------TID Service Traf CLP01PCR CLP0PCR CLP01SCR CLP0SCR MBS CDVT
PPD/EPD/SHAPE
Issue 01 (2011-07-30)
385
Type
Type kbps
kbps
kbps
kbps
cells 1/10us
----------------------------------------------------------------------------0
cbr
2
1024
-----off/off/-1
cbr
2
2500
-----off/off/-2
ubr
2
512
-----on /on /-3
nrt-vbr 5
1200
-600
-250 -on /on /-4
rt-vbr 15
128
--64
300 10000000 on /on /off
5
ubr
2
2048
-----on /on /-6
ubr
1
------off/off/-----------------------------------------------------------------------------Total Num
:
7
Traffic type definition:
1:NoTrafficDescriptor
2:NoClpNoScr
3:ClpNoTaggingNoScr
4:ClpTaggingNoScr
5:NoClpScr
6:ClpNoTaggingScr
7:ClpTaggingScr
8:ClpNoTaggingMcr
9:ClpTransparentNoScr
10:ClpTransparentScr
11:NoClpTaggingNoScr
12:NoClpNoScrCdvt
13:NoClpScrCdvt
14:ClpNoTaggingScrCdvt
15:ClpTaggingScrCdvt
-----------------------------------------------------------------------------
After the query, it is found that there is no proper traffic profile in the system to meet the
requirements for the service. Create traffic profile 7 according to the data plan.
huawei(config)#traffic table index 7 ip car 3072 priority 6 priority-policy pvcSetting
Create traffic descriptor record successfully
----------------------------------------------------------------------------TD Index
: 7
Priority
: 6
Priority policy : pvc-pri
CAR
: 3072 kbps
TD Type
: NoClpNoScr
Service category : ubr
Referenced Status: not used
EnPPDISC
: on
EnEPDISC
: on
Clp01Pcr
: 3072 kbps
-----------------------------------------------------------------------------
Step 2 Create VLAN 10 and add uplink port 0/3/0 to the VLAN.
huawei(config)#vlan 10 smart
huawei(config)#port vlan 10 0/3 0
Issue 01 (2011-07-30)
386
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
Issue 01 (2011-07-30)
2: Full rate(G992.1/3/5,T1.413,G993.2)
3: G.DMT (G992.1/3/5,G993.2)
4: G.HS (G992.1~5,G993.2)
5: ADSL (G.992.1~5,T1.413)
6: VDSL (G993.2)
Please select (0~6) [1]:0
Current configured modes:
1-T1.413
2-G.992.1 (Annex A/B/C)
3-G.992.2 (Annex A/C)
4-G.992.3 (Annex A/B/I/J/L/M)
5-G.992.4 (Annex A/I)
6-G.992.5 (Annex A/B/I/J/M)
7-G.993.2 (Annex A/B/C)
Please select 1-Modify 2-Delete 3-Save and quit
[3]:1
1-T1.413
2-G.992.1 (Annex A/B/C)
3-G.992.2 (Annex A/C)
4-G.992.3 (Annex A/B/I/J/L/M)
5-G.992.4 (Annex A/I)
6-G.992.5 (Annex A/B/I/J/M)
7-G.993.2 (Annex A/B/C)
Please select (1,2-3) [1]:2-6
G.992.1: 1-All Annex 2-AnnexA 3-AnnexB 4-AnnexC (1,2-3) [1]:
G.992.2: 1-All Annex 2-AnnexA 3-AnnexC (1,2-3) [1]:
G.992.3: 1-All Annex 2-AnnexA 3-AnnexB 4-AnnexI 5-AnnexJ 6-AnnexL
7-AnnexM (1,2-3) [1]:2-6
G.992.4: 1-All Annex 2-AnnexA 3-AnnexI (1,2-3) [1]:
G.992.5: 1-All Annex 2-AnnexA 3-AnnexB 4-AnnexI 5-AnnexJ 6-AnnexM
(1,2-3) [1]:2-5
Current configured modes:
1-T1.413
2-G.992.1 (Annex A/B/C)
3-G.992.2 (Annex A/C)
4-G.992.3 (Annex A/B/I/J/L)
5-G.992.4 (Annex A/I)
6-G.992.5 (Annex A/B/I/J)
7-G.993.2 (Annex A/B/C)
Please select 1-Modify 2-Delete 3-Save and quit
[3]:3
Please select the form of transmit rate adaptation downstream:
1-fixed 2-adaptAtStartup (1~2) [2]:
Please select the form of transmit rate adaptation upstream:
1-fixed 2-adaptAtStartup (1~2) [2]:
Will you set SNR margin parameters? (y/n) [n]:y
Target SNR margin downstream (0~310 0.1dB) [60]:
Minimum SNR margin downstream (0~60 0.1dB) [0]:
Maximum SNR margin downstream (60~310 0.1dB) [300]:
Target SNR margin upstream (0~310 0.1dB) [60]:
Minimum SNR margin upstream (0~60 0.1dB) [0]:
Maximum SNR margin upstream (60~310 0.1dB) [300]:
Will you set DPBO parameters? (y/n)[n]:y
DPBO E-side electrical length (0~511 0.5dB) [0]:
Will you set UPBO parameters? (y/n)[n]:y
UPBO reference PSD per band, each band consists of two parameters[a, b].
Parameter a value from 40 dBm/Hz (coded as 0) to 80.95 dBm/Hz
(coded as 4095) in steps of 0.01 dBm/Hz; and b value from 0 (coded as 0)
to 40.95 dBm/Hz (coded as 4095) in steps of 0.01 dBm/Hz
UPBO US1 band reference PSD parameter a(0~4095) [1650]:
UPBO US1 band reference PSD parameter b(0~4095) [1020]:
UPBO US2 band reference PSD parameter a(0~4095) [1650]:
UPBO US2 band reference PSD parameter b(0~4095) [615]:
UPBO US3 band reference PSD parameter a(0~4095) [0]:
UPBO US3 band reference PSD parameter b(0~4095) [0]:
Will you force the CPE to use the electrical length to compute the UPBO:
1-forced, 2-auto(1~2) [2]:
Will you set RFI notch configuration parameter? (y/n) [n]:y
Please set the RFI notch band range, the format : tone index(0~4095)
or begin tone index-end tone index. Begin tone index must not be more
than end tone index, for example:20,25-30. You cannot set more than
16 ranges:1-20,50-100,400-700,1000-2000
Will you set ADSL tone blackout configuration parameter? (y/n) [n]:y
The parameter format is : tone index or begin tone index to end tone
index. Begin tone index must not be more than end tone index, for
example: 20,25-30.
Downstream, tone index is from 0 to 511, you cannot set more than 8
rangs:
Upstream, tone index is from 0 to 63, you cannot set more than 4
rangs:
387
Will you set VDSL tone blackout configuration parameter? (y/n) [n]:
Will you set mode-specific parameters? (y/n) [n]:
Add profile 3 successfully
l In this example, the default alarm template is used. Therefore, you need not configure an alarm template.
l If the default alarm template is not used and you need to use alarm template 2, run the vdsl alarm-template
add 2 command to add alarm template 2, and then run the alarm-config 0 2 command to bind the template
to the VDSL2 port.
l A VDSL2 alarm template takes effect only when it is bound to a port. By default, each port is bound to alarm
template 1.
388
huawei(config)#save
----End
Result
After the configuration, the user should be able to access the Internet in IPoA mode.
Prerequisite
l
The upper layer device of the UA5000 assigns VLANs to the VDSL2 Internet access
subscribers.
Context
The UA5000 can restrict the user bandwidth through the configured traffic profile or the
configured VDSL2 line profile. If the two profiles work together, the user bandwidth is the
minimum value defined in the two profiles.
Networking
Figure 20-3 shows an example network for configuring the VDSL2 PPPoA service.
Figure 20-3 Example network for configuring the VDSL2 PPPoA service
BRAS
LSW
0/3/0
I
P
M
B
0/7/0
V
D
M
B
UA5000
Modem
PC
Issue 01 (2011-07-30)
389
Data Plan
Table 20-2 provides the data plan for configuring the VDSL2 PPPoA service.
Table 20-2 Data plan for configuring the VDSL2 PPPoA service
Item
Data
Remarks
Traffic profile
Index: 7
Channel profile:
l Index: 3
l Path mode: ATM
l Other parameters: default
setting
Alarm template
VDMB board
IPMB board
Issue 01 (2011-07-30)
VLAN ID: 10
390
Item
Data
Remarks
Requirements for
the upper-layer
device
LAN switch:
Configuration Flowchart
Figure 20-4 shows the flowchart for configuring the VDSL2 PPPoA service.
Issue 01 (2011-07-30)
391
Is there
an appropriate traffic
profile?
No
Yes
Create a VLAN and add
port(s) to it
No
Yes
Deactivate the VDSL2 port
Is there
an appropriate line
template?
End
No
Add a line template
Yes
Is there
an appropriate alarm
template?
No
Yes
Bind the alarm template
NOTE
When adding a service port, you can select the ATM or PTM as the data path mode. The PTM data path
mode does not support the PPPoA and IPoA modes.
Procedure
Step 1 Check whether there is a proper traffic profile. If there is no proper traffic profile, add a traffic
profile.
huawei(config)#display traffic table from-index 0
Traffic parameters for IP service:
----------------------------------------------------------------------------TID CAR(kbps) Priority Pri-Policy
----------------------------------------------------------------------------0
1024
6
tag-pri
1
2496
6
tag-pri
2
512
0
tag-pri
Issue 01 (2011-07-30)
392
3
576
2
tag-pri
4
64
4
tag-pri
5
2048
0
tag-pri
6
-0
tag-pri
----------------------------------------------------------------------------Traffic parameters for ATM service:
----------------------------------------------------------------------------TID Service Traf CLP01PCR CLP0PCR CLP01SCR CLP0SCR MBS CDVT
PPD/EPD/SHAPE
Type
Type kbps
kbps
kbps
kbps
cells 1/10us
----------------------------------------------------------------------------0
cbr
2
1024
-----off/off/-1
cbr
2
2500
-----off/off/-2
ubr
2
512
-----on /on /-3
nrt-vbr 5
1200
-600
-250 -on /on /-4
rt-vbr 15
128
--64
300 10000000 on /on /off
5
ubr
2
2048
-----on /on /-6
ubr
1
------off/off/-----------------------------------------------------------------------------Total Num
:
7
Traffic type definition:
1:NoTrafficDescriptor
2:NoClpNoScr
3:ClpNoTaggingNoScr
4:ClpTaggingNoScr
5:NoClpScr
6:ClpNoTaggingScr
7:ClpTaggingScr
8:ClpNoTaggingMcr
9:ClpTransparentNoScr
10:ClpTransparentScr
11:NoClpTaggingNoScr
12:NoClpNoScrCdvt
13:NoClpScrCdvt
14:ClpNoTaggingScrCdvt
15:ClpTaggingScrCdvt
-----------------------------------------------------------------------------
After the query, it is found that there is no proper traffic profile in the system to meet the
requirements for the service. Create traffic profile 7 according to the data plan.
huawei(config)#traffic table index 7 ip car 3072 priority 6 priority-policy pvcSetting
Create traffic descriptor record successfully
----------------------------------------------------------------------------TD Index
: 7
Priority
: 6
Priority policy : pvc-pri
CAR
: 3072 kbps
TD Type
: NoClpNoScr
Service category : ubr
Referenced Status: not used
EnPPDISC
: on
EnEPDISC
: on
Clp01Pcr
: 3072 kbps
-----------------------------------------------------------------------------
Step 2 Create VLAN 10, and add uplink port 0/3/0to VLAN 10.
huawei(config)#vlan 10 smart
huawei(config)#port vlan 10 0/3 0
393
huawei(config-if-vdsl-0/7)#quit
huawei(config)#vdsl line-profile add 3
Start adding profile
Press 'Q' to quit the current configuration and new configuration will be
neglected
> Do you want to name the profile (y/n) [n]:
>
Transmission mode:
>
0: Custom
>
1: All (G992.1~5,T1.413,G993.2)
>
2: Full rate(G992.1/3/5,T1.413,G993.2)
>
3: G.DMT (G992.1/3/5,G993.2)
>
4: G.HS (G992.1~5,G993.2)
>
5: ADSL (G.992.1~5,T1.413)
>
6: VDSL (G993.2)
>
Please select (0~6) [1]:0
>
Current configured modes:
>
1-T1.413
2-G.992.1 (Annex A/B/C)
>
3-G.992.2 (Annex A/C)
4-G.992.3 (Annex A/B/I/J/L/M)
>
5-G.992.4 (Annex A/I)
6-G.992.5 (Annex A/B/I/J/M)
>
7-G.993.2 (Annex A/B/C)
>
Please select 1-Modify 2-Delete 3-Save and quit
[3]:1
>
1-T1.413
2-G.992.1 (Annex A/B/C)
>
3-G.992.2 (Annex A/C)
4-G.992.3 (Annex A/B/I/J/L/M)
>
5-G.992.4 (Annex A/I)
6-G.992.5 (Annex A/B/I/J/M)
>
7-G.993.2 (Annex A/B/C)
>
Please select (1,2-3) [1]:2-6
>
G.992.1: 1-All Annex 2-AnnexA 3-AnnexB 4-AnnexC (1,2-3) [1]:
>
G.992.2: 1-All Annex 2-AnnexA 3-AnnexC (1,2-3) [1]:
>
G.992.3: 1-All Annex 2-AnnexA 3-AnnexB 4-AnnexI 5-AnnexJ 6-AnnexL
>
7-AnnexM (1,2-3) [1]:2-6
>
G.992.4: 1-All Annex 2-AnnexA 3-AnnexI (1,2-3) [1]:
>
G.992.5: 1-All Annex 2-AnnexA 3-AnnexB 4-AnnexI 5-AnnexJ 6-AnnexM
>
(1,2-3) [1]:2-5
>
Current configured modes:
>
1-T1.413
2-G.992.1 (Annex A/B/C)
>
3-G.992.2 (Annex A/C)
4-G.992.3 (Annex A/B/I/J/L)
>
5-G.992.4 (Annex A/I)
6-G.992.5 (Annex A/B/I/J)
>
7-G.993.2 (Annex A/B/C)
>
Please select 1-Modify 2-Delete 3-Save and quit
[3]:3
> Please select the form of transmit rate adaptation downstream:
> 1-fixed 2-adaptAtStartup (1~2) [2]:
> Please select the form of transmit rate adaptation upstream:
> 1-fixed 2-adaptAtStartup (1~2) [2]:
> Will you set SNR margin parameters? (y/n) [n]:y
>
Target SNR margin downstream (0~310 0.1dB) [60]:
>
Minimum SNR margin downstream (0~60 0.1dB) [0]:
>
Maximum SNR margin downstream (60~310 0.1dB) [300]:
>
Target SNR margin upstream (0~310 0.1dB) [60]:
>
Minimum SNR margin upstream (0~60 0.1dB) [0]:
>
Maximum SNR margin upstream (60~310 0.1dB) [300]:
> Will you set DPBO parameters? (y/n)[n]:y
>
DPBO E-side electrical length (0~511 0.5dB) [0]:
> Will you set UPBO parameters? (y/n)[n]:y
>
UPBO reference PSD per band, each band consists of two parameters[a, b].
Parameter a value from 40 dBm/Hz (coded as 0) to 80.95 dBm/Hz
(coded as 4095) in steps of 0.01 dBm/Hz; and b value from 0 (coded as 0)
to 40.95 dBm/Hz (coded as 4095) in steps of 0.01 dBm/Hz
>
UPBO US1 band reference PSD parameter a(0~4095) [1650]:
>
UPBO US1 band reference PSD parameter b(0~4095) [1020]:
>
UPBO US2 band reference PSD parameter a(0~4095) [1650]:
>
UPBO US2 band reference PSD parameter b(0~4095) [615]:
>
UPBO US3 band reference PSD parameter a(0~4095) [0]:
>
UPBO US3 band reference PSD parameter b(0~4095) [0]:
>
Will you force the CPE to use the electrical length to compute the UPBO:
>
1-forced, 2-auto(1~2) [2]:
> Will you set RFI notch configuration parameter? (y/n) [n]:y
>
Please set the RFI notch band range, the format : tone index(0~4095)
>
or begin tone index-end tone index. Begin tone index must not be more
>
than end tone index, for example:20,25-30. You cannot set more than
Issue 01 (2011-07-30)
394
16 ranges:1-20,50-100,400-700,1000-2000
Will you set ADSL tone blackout configuration parameter? (y/n) [n]:y
The parameter format is : tone index or begin tone index to end tone
index. Begin tone index must not be more than end tone index, for
example: 20,25-30.
Downstream, tone index is from 0 to 511, you cannot set more than 8
rangs:
Upstream, tone index is from 0 to 63, you cannot set more than 4
rangs:
Will you set VDSL tone blackout configuration parameter? (y/n) [n]:
Will you set mode-specific parameters? (y/n) [n]:
Add profile 3 successfully
l In this example, the default alarm template is used. Therefore, you need not configure an alarm template.
l If the default alarm template is not used and you need to use alarm template 2, run the vdsl alarm-template
add 2 command to add alarm template 2, and then run the alarm-config 0 2 command to bind the template
to the VDSL2 port.
l A VDSL2 alarm template takes effect only when it is bound to a port. By default, each port is bound to alarm
template 1.
Issue 01 (2011-07-30)
395
----End
Result
After the configuration, the user should be able to access the Internet in PPPoA mode.
Prerequisite
l
The upper layer device of the UA5000 assigns VLANs to the VDSL2 Internet access
subscribers.
Context
The UA5000 can restrict the user bandwidth through the configured traffic profile or the
configured VDSL2 line profile. If the two profiles work together, the user bandwidth is the
minimum value defined in the two profiles.
Networking
Figure 20-5 shows an example network for configuring the VDSL2 PPPoE/IPoE service.
Issue 01 (2011-07-30)
396
Figure 20-5 Example network for configuring the VDSL2 PPPoE/IPoE service
BRAS
LSW
0/3/0
I
P
M
B
0/7/0
V
D
M
B
UA5000
Modem
PC
Data Plan
Table 20-3 provides the data plan for configuring the VDSL2 PPPoE/IPoE service.
Table 20-3 Data plan for configuring the VDSL2 PPPoE/IPoE service
Item
Data
Remarks
Traffic profile
Index: 7
Issue 01 (2011-07-30)
397
Item
Data
Remarks
Line template
Line profile:
l Index: 3
l Target downstream/upstream
SNR margin: 12 dB
l Minimum downstream/
upstream SNR margin: 0.5 dB
l Other parameters: default
setting
Channel profile:
l Index: 3
l Path mode: PTM
l Other parameters: default
setting
Alarm template
VDMB board
IPMB board
Issue 01 (2011-07-30)
VLAN ID: 10
398
Item
Data
Remarks
Requirements for
the upper-layer
device
LAN switch:
Configuration Flowchart
Figure 20-6 shows the flowchart for configuring the VDSL2 PPPoE/IPoE service.
Issue 01 (2011-07-30)
399
Is there
an appropriate traffic
profile?
No
Yes
Create a VLAN and
add port(s) to it
No
Yes
Deactivate the VDSL2 port
Is there
an appropriate line
template?
No
Add a line template
Yes
Is there
an appropriate alarm
template?
Yes
No
End
Procedure
Step 1 Check whether there is a proper traffic profile. If there is no proper traffic profile, add a traffic
profile.
huawei(config)#display traffic table from-index 0
Traffic parameters for IP service:
----------------------------------------------------------------------------TID CAR(kbps) Priority Pri-Policy
----------------------------------------------------------------------------0
1024
6
tag-pri
1
2496
6
tag-pri
2
512
0
tag-pri
Issue 01 (2011-07-30)
400
3
576
2
tag-pri
4
64
4
tag-pri
5
2048
0
tag-pri
6
-0
tag-pri
----------------------------------------------------------------------------Traffic parameters for ATM service:
----------------------------------------------------------------------------TID Service Traf CLP01PCR CLP0PCR CLP01SCR CLP0SCR MBS CDVT
PPD/EPD/SHAPE
Type
Type kbps
kbps
kbps
kbps
cells 1/10us
----------------------------------------------------------------------------0
cbr
2
1024
-----off/off/-1
cbr
2
2500
-----off/off/-2
ubr
2
512
-----on /on /-3
nrt-vbr 5
1200
-600
-250 -on /on /-4
rt-vbr 15
128
--64
300 10000000 on /on /off
5
ubr
2
2048
-----on /on /-6
ubr
1
------off/off/-----------------------------------------------------------------------------Total Num
:
7
Traffic type definition:
1:NoTrafficDescriptor
2:NoClpNoScr
3:ClpNoTaggingNoScr
4:ClpTaggingNoScr
5:NoClpScr
6:ClpNoTaggingScr
7:ClpTaggingScr
8:ClpNoTaggingMcr
9:ClpTransparentNoScr
10:ClpTransparentScr
11:NoClpTaggingNoScr
12:NoClpNoScrCdvt
13:NoClpScrCdvt
14:ClpNoTaggingScrCdvt
15:ClpTaggingScrCdvt
-----------------------------------------------------------------------------
After the query, it is found that there is no proper traffic profile in the system to meet the
requirements for the service. Create traffic profile 7 according to the data plan.
huawei(config)#traffic table index 7 ip car 3072 priority 6 priority-policy pvcSetting
Create traffic descriptor record successfully
----------------------------------------------------------------------------TD Index
: 7
Priority
: 6
Priority policy : pvc-pri
CAR
: 3072 kbps
TD Type
: NoClpNoScr
Service category : ubr
Referenced Status: not used
EnPPDISC
: on
EnEPDISC
: on
Clp01Pcr
: 3072 kbps
-----------------------------------------------------------------------------
Create a VLAN.
huawei(config)#vlan 10 smart
2.
3.
401
huawei(config-if-vdsl-0/7)#deactivate 0
Issue 01 (2011-07-30)
402
Please set the RFI notch band range, the format : tone index(0~4095)
or begin tone index-end tone index. Begin tone index must not be more
than end tone index, for example:20,25-30. You cannot set more than
16 ranges:1-20,50-100,400-700,1000-2000
Will you set ADSL tone blackout configuration parameter? (y/n) [n]:y
The parameter format is : tone index or begin tone index to end tone
index. Begin tone index must not be more than end tone index, for
example: 20,25-30.
Downstream, tone index is from 0 to 511, you cannot set more than 8
rangs:
Upstream, tone index is from 0 to 63, you cannot set more than 4
rangs:
Will you set VDSL tone blackout configuration parameter? (y/n) [n]:
Will you set mode-specific parameters? (y/n) [n]:
Add profile 3 successfully
l In this example, the default alarm template is used. Therefore, you need not configure an alarm template.
l If the default alarm template is not used and you need to use alarm template 2, run the vdsl alarm-template
add 2 command to add alarm template 2, and then run the alarm-config 0 2 command to bind the template
to the VDSL2 port.
l A VDSL2 alarm template takes effect only when it is bound to a port. By default, each port is bound to alarm
template 1.
----End
Issue 01 (2011-07-30)
403
Result
After the configuration, the user should be able to access the Internet in PPPoE/IPoE mode.
Context
l
The UA5000 has 128 line profiles in total. Profile 1 functions as the default profile. You
can modify the default line profile but cannot delete it.
If the adaptation mode of the downstream channel is fixed, the maximum rate of the
downstream channel must equal the minimum rate.
When setting the upstream or downstream SNR margin, set the target SNR margin,
minimum SNR margin, and maximum SNR margin by complying with the following
principles: The target SNR margin must be between the minimum SNR margin and the
maximum SNR margin.
Configuration Flowchart
Figure 20-7 shows the flowchart for adding a VDSL2 line profile.
Issue 01 (2011-07-30)
404
Name the
line profile?
No
Yes
Set the name of the line profile
No
Yes
Set the downstream
target SNR margin
Set the minimum
downstream SNR margin
Set the maximum
downstream SNR margin
Issue 01 (2011-07-30)
405
Set DPBO
parameters?
No
Yes
Set the E-side
electrical length?
Not 0
Set the DPBO PSD mask
Set DPBO E-side
cable model scalar A
Set DPBO E-side cable
model scalar B
Set DPBO E-side cable
model scalar C
No
Yes
Set UPBO US1 band
reference PSD parameter a
Set UPBO US1 band
reference PSD parameter b
Set UPBO US2 band
reference PSD parameter a
Set UPBO US2 band
reference PSD parameter b
Set UPBO US3 band
reference PSD parameter a
Set UPBO US3 band
reference PSD parameter b
Issue 01 (2011-07-30)
406
Set mode-specific
parameters?
No
D
Yes
Force the CPE to use
the electrical length to
calculate the UPBO?
No
Yes
Set the upstream maximum
nominal aggregate transmit power
No
No
No
Yes
Yes
Set the VDSL tone blackout
configuration parameter
No
Yes
Yes
Set the RFI notch
configuration parameter
End
Procedure
Step 1 Run the adsl line-profile add command to add a VDSL2 line profile.
Step 2 Run the display vdsl line-profile command to query an added VDSL2 line profile.
----End
Issue 01 (2011-07-30)
407
Example
To add a VDSL2 line profile, do as follows:
huawei(config)#vdsl line-profile add 3
Start adding profile
Press 'Q' to quit the current configuration and new configuration will be
neglected
> Do you want to name the profile (y/n) [n]:
>
Transmission mode:
>
0: Custom
>
1: All (G992.1~5,T1.413,G993.2)
>
2: Full rate(G992.1/3/5,T1.413,G993.2)
>
3: G.DMT (G992.1/3/5,G993.2)
>
4: G.HS (G992.1~5,G993.2)
>
5: ADSL (G.992.1~5,T1.413)
>
6: VDSL (G993.2)
>
Please select (0~6) [1]:0
>
Current configured modes:
>
1-T1.413
2-G.992.1 (Annex A/B/C)
>
3-G.992.2 (Annex A/C)
4-G.992.3 (Annex A/B/I/J/L/M)
>
5-G.992.4 (Annex A/I)
6-G.992.5 (Annex A/B/I/J/M)
>
7-G.993.2 (Annex A/B/C)
>
Please select 1-Modify 2-Delete 3-Save and quit
[3]:1
>
1-T1.413
2-G.992.1 (Annex A/B/C)
>
3-G.992.2 (Annex A/C)
4-G.992.3 (Annex A/B/I/J/L/M)
>
5-G.992.4 (Annex A/I)
6-G.992.5 (Annex A/B/I/J/M)
>
7-G.993.2 (Annex A/B/C)
>
Please select (1,2-3) [1]:2-6
>
G.992.1: 1-All Annex 2-AnnexA 3-AnnexB 4-AnnexC (1,2-3) [1]:
>
G.992.2: 1-All Annex 2-AnnexA 3-AnnexC (1,2-3) [1]:
>
G.992.3: 1-All Annex 2-AnnexA 3-AnnexB 4-AnnexI 5-AnnexJ 6-AnnexL
>
7-AnnexM (1,2-3) [1]:2-6
>
G.992.4: 1-All Annex 2-AnnexA 3-AnnexI (1,2-3) [1]:
>
G.992.5: 1-All Annex 2-AnnexA 3-AnnexB 4-AnnexI 5-AnnexJ 6-AnnexM
>
(1,2-3) [1]:2-5
>
Current configured modes:
>
1-T1.413
2-G.992.1 (Annex A/B/C)
>
3-G.992.2 (Annex A/C)
4-G.992.3 (Annex A/B/I/J/L)
>
5-G.992.4 (Annex A/I)
6-G.992.5 (Annex A/B/I/J)
>
7-G.993.2 (Annex A/B/C)
>
Please select 1-Modify 2-Delete 3-Save and quit
[3]:3
> Please select the form of transmit rate adaptation downstream:
> 1-fixed 2-adaptAtStartup (1~2) [2]:
> Please select the form of transmit rate adaptation upstream:
> 1-fixed 2-adaptAtStartup (1~2) [2]:
> Will you set SNR margin parameters? (y/n) [n]:y
>
Target SNR margin downstream (0~310 0.1dB) [60]:
>
Minimum SNR margin downstream (0~60 0.1dB) [0]:
>
Maximum SNR margin downstream (60~310 0.1dB) [300]:
>
Target SNR margin upstream (0~310 0.1dB) [60]:
>
Minimum SNR margin upstream (0~60 0.1dB) [0]:
>
Maximum SNR margin upstream (60~310 0.1dB) [300]:
> Will you set DPBO parameters? (y/n)[n]:y
>
DPBO E-side electrical length (0~511 0.5dB) [0]:
> Will you set UPBO parameters? (y/n)[n]:y
>
UPBO reference PSD per band, each band consists of two parameters[a, b].
Parameter a value from 40 dBm/Hz (coded as 0) to 80.95 dBm/Hz
(coded as 4095) in steps of 0.01 dBm/Hz; and b value from 0 (coded as 0)
to 40.95 dBm/Hz (coded as 4095) in steps of 0.01 dBm/Hz
>
UPBO US1 band reference PSD parameter a(0~4095) [1650]:
>
UPBO US1 band reference PSD parameter b(0~4095) [1020]:
>
UPBO US2 band reference PSD parameter a(0~4095) [1650]:
>
UPBO US2 band reference PSD parameter b(0~4095) [615]:
>
UPBO US3 band reference PSD parameter a(0~4095) [0]:
>
UPBO US3 band reference PSD parameter b(0~4095) [0]:
>
Will you force the CPE to use the electrical length to compute the UPBO:
>
1-forced, 2-auto(1~2) [2]:
> Will you set RFI notch configuration parameter? (y/n) [n]:y
Issue 01 (2011-07-30)
408
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
Please set the RFI notch band range, the format : tone index(0~4095)
or begin tone index-end tone index. Begin tone index must not be more
than end tone index, for example:20,25-30. You cannot set more than
16 ranges:1-20,50-100,400-700,1000-2000
Will you set ADSL tone blackout configuration parameter? (y/n) [n]:y
The parameter format is : tone index or begin tone index to end tone
index. Begin tone index must not be more than end tone index, for
example: 20,25-30.
Downstream, tone index is from 0 to 511, you cannot set more than 8
rangs:
Upstream, tone index is from 0 to 63, you cannot set more than 4
rangs:
Will you set VDSL tone blackout configuration parameter? (y/n) [n]:
Will you set mode-specific parameters? (y/n) [n]:y
Current configured modes:
1-defmode
Please select 1-Add 2-Modify 3-Save and quit
[3]:1
2-adsl
3-adsl2Pots
4-adsl2Isdn
5-adsl2PlusPots
6-adsl2PlusIsdn
7-adsl2ReachExtended
8-vdsl2Pots
9-vdsl2Isdn
Please select [2]:7
Maximum nominal aggregate transmit power downstream
(0~205 0.1dBm) [145]:
Maximum nominal aggregate transmit power upstream
(0~205 0.1dBm) [145]:
Will you set PSD mask value downstream parameter? (y/n) [n]:
Will you set PSD mask value upstream parameter? (y/n) [n]:
Current configured modes:
1-defmode
7-adsl2ReachExtended
Please select 1-Add 2-Modify 3-Delete 4-Save and quit
[4]:
Add profile 3 successfully
huawei(config)#display vdsl line-profile 3
-----------------------------------------------------------------------------Profile index: 3
Name: VDSL LINE PROFILE 3
Transmission mode:
T1.413
G.992.1(Annex A/B/C)
G.992.2(Annex A/C)
G.992.3(Annex A/B/I/J/L)
G.992.4(Annex A/I)
G.992.5(Annex A/B/I/J)
G.993.2(Annex A/B/C)
Form of transmit rate adaptation downstream
: AdaptAtStartup
Form of transmit rate adaptation upstream
: AdaptAtStartup
Target SNR margin downstream(0.1dB)
: 60
Minimum downstream SNR margin(0.1dB)
: 0
Maximum downstream SNR margin(0.1dB)
: 300
Target SNR margin upstream(0.1dB)
: 60
Minimum SNR margin upstream(0.1dB)
: 0
Maximum SNR margin upstream(0.1dB)
: 300
UPBO US1 band reference PSD parameters[a, b]
: 1650,1020
UPBO US2 band reference PSD parameters[a, b]
: 1650,615
UPBO US3 band reference PSD parameters[a, b]
: 0,0
UPBO use of electrical length to compute UPBO
: Auto
RFI notch configuration:
Number
Start Tone
Stop Tone
Start Frequency
End Frequency
(KHz)
(KHz)
1
1
20
4.3
90.5
2
50
100
215.6
435.5
3
400
700
1725.0
3023.0
4
1000
2000
4312.5
8629.3
<defmode>
G.993.2 profile
: Profile12a
VDSL2 PSD class mask
: AnnexB998-M2x-B(B8-6)
VDSL2 link use of U0
: Unused
Maximum nominal aggregate transmit power
downstream(0.1dBm)
: 145
Maximum nominal aggregate transmit power
upstream(0.1dBm)
: 145
<adsl2ReachExtended>
Maximum nominal aggregate transmit power
downstream(0.1dBm)
: 145
Issue 01 (2011-07-30)
409
Related Operation
Table 20-4 lists the related operations for adding a VDSL2 line profile.
Table 20-4 Related operations for adding a VDSL2 line profile
To...
Remarks
vdsl line-profile
quickmodify
Context
l
The system has a default channel profile. The parameters in the default channel profile are
the data for reference. You can add channel profiles according to the actual line conditions.
The added channel profiles are numbered from 2 to 128. When adding a channel profile,
you can specify the profile index. If you do not specify the profile index, the system
automatically allocates an idle profile index.
You can enter the parameters in interactive mode when adding a channel profile.
Configuration Flowchart
Figure 20-10 shows the flowchart for adding a VDSL2 channel profile.
Issue 01 (2011-07-30)
410
No
No
Yes
Set the max. downstream
interleaved delay
Yes
set the channel profile name
No
Yes
Set the downstream impulse
noise protection
Set the downstream impulse
noise protection
No
Yes
Set the min. downstream
transmit rate
Set the max. downstream
transmit rate
Set the min. upstream
transmit rate
Set the max. upstream
transmit rate
End
Procedure
Step 1 Run the vdsl channel-profile add command to add a VDSL2 channel profile.
Step 2 Run the display vdsl channel-profile command to query the added VDSL2 channel profile.
----End
Example
To add a VDSL2 channel profile, do as follows:
huawei(config)#vdsl channel-profile add 2
Start adding profile
Press 'Q' to quit the current configuration and new configuration will be
neglected
> Do you want to name the profile (y/n) [n]:
> Data path mode 1-ATM, 2-PTM, 3-Both (1~3) [3]:
> Will you set the minimum impulse noise protection? (y/n) [n]:y
>
Minimum impulse noise protection downstream:
>
1-noProtection
2-halfSymbol
3-singleSymbol
4-twoSymbols
Issue 01 (2011-07-30)
411
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
5-threeSymbols
6-fourSymbols
7-fiveSymbols
8-sixSymbols
9-sevenSymbols
10-eightSymbols
11-nineSymbols
12-tenSymbols
13-elevenSymbols 14-twelveSymbols 15-thirteenSymbols 16-fourteenSymbols
17-fifteenSymbols 18-sixteenSymbols
Please select (1~18) [1]:
Minimum impulse noise protection upstream:
1-noProtection
2-halfSymbol
3-singleSymbol
4-twoSymbols
5-threeSymbols
6-fourSymbols
7-fiveSymbols
8-sixSymbols
9-sevenSymbols
10-eightSymbols
11-nineSymbols
12-tenSymbols
13-elevenSymbols 14-twelveSymbols 15-thirteenSymbols 16-fourteenSymbols
17-fifteenSymbols 18-sixteenSymbols
Please select (1~18) [1]:
Will you set interleaving delay parameters? (y/n) [n]:y
Maximum interleaving delay downstream (0~200 ms) [20]:
Maximum interleaving delay upstream (0~200 ms) [20]:
Will you set parameters for rate? (y/n) [n]:y
Minimum transmit rate downstream (128~100000 Kbps) [128]:
Maximum transmit rate downstream (128~100000 Kbps) [100000]:
Minimum transmit rate upstream (128~100000 Kbps) [128]:
Maximum transmit rate upstream (128~100000 Kbps) [100000]:
Add profile 2 successfully
huawei(config)#display vdsl channel-profile
{ <cr>|profile-index<L><1,128> }:2
Command:
display vdsl channel-profile 2
-----------------------------------------------------------------------------Profile index: 2
Name: VDSL CHANNEL PROFILE 2
Data path mode
: Both
Minimum impulse noise protection downstream
: NoProtection
Minimum impulse noise protection upstream
: NoProtection
Maximum interleaving delay downstream(ms)
: 20
Maximum interleaving delay upstream(ms)
: 20
Minimum transmit rate downstream(Kbps)
: 128
Maximum transmit rate downstream(Kbps)
: 100000
Minimum transmit rate upstream(Kbps)
: 128
Maximum transmit rate upstream(Kbps)
: 100000
------------------------------------------------------------------------------
Parameter Description
Table 20-5 lists the parameters of a VDSL2 channel profile.
Table 20-5 Parameters of a VDSL2 channel profile
Issue 01 (2011-07-30)
Parameter
Description
Default Value
profile-index
profile-name
412
Parameter
Description
Default Value
Maximum
interleaved delay
downstream/
upstream
20 ms
Minimum impulse
noise protection
downstream/
upstream
No protection
Minimum transmit
rate downstream/
upstream
128 kbit/s
Maximum transmit
rate downstream/
upstream
100000 kbit/s
Related Operation
Table 20-6 lists the related operations for adding a VDSL2 channel profile.
Table 20-6 Related operations for adding a VDSL2 channel profile
Issue 01 (2011-07-30)
To...
Remarks
vdsl channel-profile
modify
vdsl channel-profile
quickadd
vdsl channel-profile
quickmodify
413
Prerequisite
The line profile and channel profile are configured.
Context
l
The system has a default line template. The parameters in the default line template are the
data for reference. You can add line templates according to the actual line conditions.
The added line templates are numbered from 2 to 128. When adding a template, you can
specify the template index. If you do not specify the template index, the system
automatically allocates an idle template index.
You can enter the parameters in interactive mode when adding a line template.
Procedure
Step 1 Run the vdsl line-template add command to add a VDSL2 line template.
Step 2 Run the display vdsl line-template command to query the added VDSL2 line template.
----End
Example
To add a VDSL2 line template, do as follows:
huawei(config)#vdsl line-template add 2
Start adding template
Press 'Q' to quit the current configuration and new configuration will be
neglected
> Do you want to name the template (y/n) [n]:
> Please set the line-profile index (1~128) [1]:3
> Will you set channel configuration parameters? (y/n) [n]:y
>
Please set the channel number (1~2) [1]:
>
Channel1 configuration parameters:
>
Please set the channel-profile index (1~128) [1]:2
Add template 2 successfully
huawei(config)#display vdsl line-template
{ <cr>|template-index<L><1,128> }:2
Command:
display vdsl line-template 2
-----------------------------------------------------------------------------Template index: 2
Name: VDSL LINE TEMPLATE 2
Line profile index
: 3
Channel1 profile index
: 2
Channel1 rate adaptation ratio downstream
: Channel1 rate adaptation ratio upstream
: ------------------------------------------------------------------------------
Parameter Description
Table 20-7 lists the parameters of a VDSL2 line template.
Issue 01 (2011-07-30)
414
Description
Template index
Template name
Channel count
Related Operation
Table 20-8 lists the related operations for adding a VDSL2 line template.
Table 20-8 Related operations for adding a VDSL2 line template
Issue 01 (2011-07-30)
To...
Remarks
vdsl line-template
quickmodify
415
Context
When configuring a VDSL2 line alarm profile, you cannot delete line alarm profile 1, but you
can modify it. The added line alarm profiles are numbered from 2 to 50.
Configuration Flowchart
Figure 20-11 shows the flowchart for adding a VDSL2 line alarm profile.
Figure 20-11 Flowchart for adding a VDSL2 line alarm profile
Start
No
No
Yes
Yes
No
Yes
Set the forward error correction
seconds
Issue 01 (2011-07-30)
End
416
Procedure
Step 1 Run the vdsl alarm-profile add command to add a VDSL2 line alarm profile.
Step 2 Run the display vdsl alarm-profile command to query an added VDSL line alarm profile.
----End
Example
To add a VDSL2 line alarm profile with the index of 2, do as follows:
huawei(config)#vdsl alarm-profile add 2
Start adding profile
Press 'Q' to quit the current configuration and new configuration will be
neglected
> Do you want to name the profile (y/n) [n]:
> Will you set the line thresholds for CO? (y/n) [n]:y
>
The number of forward error correction seconds (0~900) [0]:10
>
The number of errored seconds (0~900) [0]:
>
The number of severely errored seconds (0~900) [0]:
>
The number of loss of signal seconds (0~900) [0]:
>
The number of unavailable seconds (0~900) [0]:
> Will you set the line thresholds for CPE? (y/n) [n]:y
>
The number of forward error correction seconds (0~900) [0]:10
>
The number of errored seconds (0~900) [0]:10
>
The number of severely errored seconds (0~900) [0]:
>
The number of loss of signal seconds (0~900) [0]:
>
The number of unavailable seconds (0~900) [0]:
> The number of failed full initialization (0~900) [0]:5
Add profile 2 successfully
huawei(config)#display vdsl alarm-profile
{ <cr>|profile-index<L><1,50> }:2
Command:
display vdsl alarm-profile 2
-----------------------------------------------------------------------------Profile index: 2
Name: VDSL ALARM PROFILE 2
<CO>
The number of forward error correction seconds
: 10
The number of errored seconds
: 0
The number of severely errored seconds
: 0
The number of loss of signal seconds
: 0
The number of unavailable seconds
: 0
<CPE>
The number of forward error correction seconds
: 10
The number of errored seconds
: 0
The number of severely errored seconds
: 0
The number of loss of signal seconds
: 0
The number of unavailable seconds
: 0
The number of failed full initialization
: 5
------------------------------------------------------------------------------
Parameter Description
Table 20-9 lists the parameters of a VDSL2 line alarm profile.
Issue 01 (2011-07-30)
417
Description
Errored seconds
Related Operation
Table 20-10 lists the related operations for adding a VDSL2 line alarm profile.
Issue 01 (2011-07-30)
418
Table 20-10 Related operations for adding a VDSL line alarm profile
To...
Remarks
vdsl alarm-profile
quickadd
vdsl alarm-profile
quickmodify
Context
When configuring a VDSL2 channel alarm profile, you cannot delete channel alarm profile 1,
but you can modify it. The added channel alarm profiles are numbered from 2 to 50.
Configuration Flowchart
Figure 20-12 shows the flowchart for adding a VDSL2 channel alarm profile.
Issue 01 (2011-07-30)
419
Start
No
Yes
Set the number of coding violations counts
Yes
Set the name of the channel alarm profile
No
Set the channel
thresholds for CO?
Yes
Set the number of coding violations counts
End
Procedure
Step 1 Run the vdsl channel-alarm-profile add command to add a VDSL2 channel alarm profile.
Step 2 Run the display vdsl channel-alarm-profile command to query the added VDSL2 channel
alarm profile.
----End
Example
To add channel alarm profile 2, do as follows:
huawei(config)#vdsl channel-alarm-profile add 2
Start adding profile
Press 'Q' to quit the current configuration and new configuration will be
neglected
> Do you want to name the profile (y/n) [n]:
> Will you set the channel thresholds for CO? (y/n) [n]:y
>
The number of coding violations counts (0~60000) [0]:10
>
The number of corrected blocks counts (0~60000) [0]:
> Will you set the channel thresholds for CPE? (y/n) [n]:y
>
The number of coding violations counts (0~60000) [0]:10
>
The number of corrected blocks counts (0~60000) [0]:10
> The threshold of channel monitoring rate downstream
> (0~100000Kbps) [0]:2048
> The threshold of channel monitoring rate upstream
> (0~100000Kbps) [0]:4096
Add profile 2 successfully
Issue 01 (2011-07-30)
420
Parameter Description
Table 20-11 lists the parameters of a VDSL2 channel alarm profile.
Table 20-11 Parameters of a VDSL2 channel alarm profile
Parameter
Description
Related Operation
Table 20-12 lists the related operations for adding a VDSL2 channel alarm profile.
Issue 01 (2011-07-30)
421
Table 20-12 Related operations for adding a VDSL2 channel alarm profile
To...
Remarks
vdsl channel-alarm-profile
delete
vdsl channel-alarm-profile
modify
vdsl channel-alarm-profile
quickadd
vdsl channel-alarm-profile
quickmodify
Prerequisite
The line alarm profile and channel alarm profile are configured.
Context
l
The specified line alarm profile and specified channel alarm profile are bound together in
the new VDSL2 alarm template.
If you do not enter a specified index of a line alarm profile or a channel alarm profile, the
default line alarm profile and the default channel alarm profile are bound together in the
VDSL2 alarm template.
Procedure
Step 1 Run the vdsl alarm-template add command to add a VDSL2 alarm template.
Step 2 Run the display vdsl alarm-template command to query the added VDSL2 alarm template.
----End
Issue 01 (2011-07-30)
422
Example
To add the alarm template with the index of 2, do as follows:
huawei(config)#vdsl alarm-template add 2
Start adding template
Press 'Q' to quit the current configuration and new configuration will be
neglected
> Do you want to name the template (y/n) [n]:
> Please set the alarm-profile index (1~50) [1]:2
> Will you set channel configuration parameters? (y/n) [n]:y
>
Please set the channel number (1~2) [1]:
> Please set the channel1 alarm-profile index (1~50) [1]:2
Add template 2 successfully
huawei(config)#display vdsl alarm-template 2
-----------------------------------------------------------------------------Template index: 2
Name: VDSL ALARM TEMPLATE 2
Line alarm profile index
: 2
Channel1 alarm profile index
: 2
------------------------------------------------------------------------------
Parameter Description
Table 20-13 lists the parameters of a VDSL2 alarm template.
Table 20-13 Parameters of a VDSL2 alarm template
Parameter
Description
Channel count
Issue 01 (2011-07-30)
423
Related Operation
Table 20-14 the related operations for adding a VDSL2 alarm template.
Table 20-14 Related operations for adding a VDSL2 alarm template
To...
Remarks
vdsl alarm-template
modify
vdsl alarm-template
quickadd
vdsl alarm-template
quickmodify
alarm-config
Context
l
The threshold configured in the VDSL2 alarm template takes effect only when the VDSL2
alarm template is bound with a port and the port is activated.
By default, alarm template 1 is bound with a port. All the alarm thresholds are configured
to 0 in the template.
Procedure
Step 1 Run the alarm-config command to bind the alarm template with a port.
Issue 01 (2011-07-30)
424
Step 2 Run the display port state command to query the binding between the alarm template and the
port.
----End
Example
To bind alarm template 2 with port 1 of the VDSL2 board in slot 0/7, do as follows:
huawei(config-if-vdsl-0/7)#alarm-config 1 2
huawei(config-if-vdsl-0/7)#display port state 1
----------------------------------------------------------------Port
Status
Loopback
Line Template
Alarm Template
----------------------------------------------------------------1
Activating
Disable
1
2
-----------------------------------------------------------------
Prerequisite
The VDSL2 line template is configured.
Context
l
The port is bound with the line template during the port activation. If the index or the name
of the line template is not entered, the template bound last time is used to activate the port.
If the training is successful, the VTU-C can communicate with the VTU-R. At this point
of time, the port works in the activated state, and is ready for service transmission.
When the VTU-R goes online (or is started), the activation process ends upon the
completion of the training. When the VTU-R goes offline (or is stopped), the
communication established during the port activation is terminated, and the VTU-C is in
the listening state. When the VTU-R goes online again (or is started again), the training
process starts automatically. When the training is successful, the port is activated.
Procedure
Step 1 Run the active command to activate all the ports of a service board.
Step 2 Run the display port state command to query the status of a port and the line template bound
with the port.
----End
Example
To activate all the ports of the VDSL2 board in slot 0/7 and bind line template 1 with the port,
do as follows:
Issue 01 (2011-07-30)
425
Related Operation
Table 20-15 lists the related operation for activating a VDSL2 port.
Table 20-15 Related operation for activating a VDSL2 port
To...
deactivate
loopback
Prerequisite
The VDSL2 line template is configured.
Context
The state of a VDSL port can be activating, activated, deactivated, or loopback.
Issue 01 (2011-07-30)
426
activate
Deactivated
Modem
Successful training
Activating
Modem
Link disconnected
or power off
deactivate
loopback
Activated
deactivate
Procedure
Step 1 Run the display port state command to query the information about a VDSL2 port.
----End
Example
To query the status of VDSL2 port 0/7/0, do as follows:
Activate all the ports of a board and bind line template 1.
huawei(config)#interface vdsl 0/7
huawei(config-if-vdsl-0/7)#display port state 0
----------------------------------------------------------------Port
Status
Loopback
Line Template
Alarm Template
----------------------------------------------------------------0
Activating
Disable
1
1
-----------------------------------------------------------------
Related Operation
Table 20-16 lists the related operations for querying a VDSL2 port.
Table 20-16 Related operations for querying a VDSL2 port
Issue 01 (2011-07-30)
To...
display parameter
display inventory
427
21
Issue 01 (2011-07-30)
428
Service Description
l
The broadband access service of the Internet is gradually becoming popular, and users
demand high performance and stable network access. As a result, carriers prefer the
broadband access equipment that runs stably and has better automatic protection and selfhealing capability.
The UA5000 uses the active/standby mechanism to ensure the normal operation of the
service. In addition, it is designed with the service protection mechanism of dual uplink
ports. When the UA5000 is disconnected from the upper layer device physically due to
certain unknown causes, the UA5000 uses the standby line to transmit the subscriber
services so that the services can recover quickly.
Service Specifications
The UA5000 provides two detection modes of the active/standby switchover to achieve the
service protection of the uplink port.
l
Port status detection mode: It means that the two ports of a protection group, or the Tx ports
of the two boards are enabled. The port status determines whether to implement switchover.
Delay detection mode: It means that only one Tx port in a protection group is enabled, and
the other Tx port is disabled. If the status of the enabled Tx port is DOWN, disable the port.
Then, enable the other Tx port. If the status of the other Tx port is UP, then switchover is
performed. Otherwise, the detection continues.
The UA5000 provides three detection modes of the active/standby switchover to achieve
the service protection of the uplink port.
Link Aggregation Control Protocol (LACP) detection mode: In this mode, the link
aggregation protocol control is performed, the port fault is detected, and protection
switchover function is triggered.
Networking
Figure 21-1 shows an example network for setting the port state detection mode.
Issue 01 (2011-07-30)
429
Figure 21-1 Example network for setting the port state detection mode
NMS
Router
0
1
0
1
0/2 0/3
Active IPMB Standby IPMB
UA5000
Procedure
Step 1 Run the protect command to enter the protect mode.
huawei(config)#protect
Step 2 Run the protect-group command to configure the protection group and set the port state
detection mode for the protection group.
huawei(config-protect)#protect-group first 0/2/0 second 0/3/0 seco eth workmode
portstate enable
Step 3 Run the display protect-group command to query the information about the protection group
of the port.
huawei(config-protect)#display protect-group
{ <cr>|frameid/slotid<S><1,15>|frameid/slotid/portid<S><1,15> }:
Command:
display protect-group
--------------------------------------------------------------------------NO. FirstIntf
SecondIntf
Enable
ActiveFlag
ProtectType
WorkMode
--------------------------------------------------------------------------0
0/2/0
0/3/0
Enable
First
ETH
PortState
--------------------------------------------------------------------------Total : 1
----End
Verification
The service protection of the uplink port uses the port state detection mode.
Issue 01 (2011-07-30)
430
Networking
Figure 21-2 shows an example network for setting the delay detection mode.
Figure 21-2 Example network for setting the delay detection mode
NMS
Router
optical
splitter
0
1
0
1
0/2 0/3
Active IPMB Standby IPMB
UA5000
Procedure
Step 1 Run the protect command to enter the protect mode.
huawei(config)#protect
Step 2 Run the protect-group command to configure the protection group, and set the delay detection
mode for the protection group.
huawei(config-protect)#protect-group first 0/2/0 second 0/3/0 eth workmode
timedelay enable
Step 3 Run the display protect-group command to query the information about the protection group
of the port.
Issue 01 (2011-07-30)
431
huawei(config-protect)#display protect-group
{ <cr>|frameid/slotid<S><1,15>|frameid/slotid/portid<S><1,15> }:
Command:
display protect-group
--------------------------------------------------------------------------NO. FirstIntf
SecondIntf
Enable
ActiveFlag
ProtectType
WorkMode
--------------------------------------------------------------------------0
0/2/0
0/3/0
Enable
First
ETH
TimeDelay
--------------------------------------------------------------------------Total : 1
----End
Verification
The service protection of the uplink port uses the delay detection mode.
Prerequisite
The upper layer device is configured with LACP.
Context
If the LACP protection group activates the protection switching, the service interruption time is
not longer than 4s.
Networking
Figure 21-3 shows an example network for setting the LACP detection mode.
Issue 01 (2011-07-30)
432
Figure 21-3 Example network for setting the LACP detection mode
NMS
Router
0
1
0
1
0/2 0/3
Active IPMB Standby IPMB
UA5000
Procedure
Step 1 Configure the aggregation group of the LACP static port.
huawei(config)#interface ipm 0/2
huawei(config-if-ipm-0/2)#link-aggregation 0-1 egress-ingress workmode lacp-static
Step 2 Configure the protection group and set the LACP detection mode for the protection group.
huawei(config-if-ipm-0/2)#quit
huawei(config)#protect
huawei(config-protect)#protect-group first 0/2/0 second 0/3/0 eth workmode lacp
enable
Step 4 Query the information about the aggregation group of the LACP static port.
huawei(config-protect)#quit
huawei(config)#display lacp link-aggregation summary
Actor
Priority
: 32768
MAC Address: 00e0-cfc5-1999
Short Period: 1 s
Long Period: 30 s
---------------------------------------------------------------Agg Partner Partner
Select Standby Load
Backup Master
ID Pri
MAC
Ports Ports
Sharing Protect Port
---------------------------------------------------------------1
0
2
YES
YES
0/ 2/ 0
---------------------------------------------------------------huawei(config)#display lacp link-aggregation verbose 1
System Priority: 32768
MAC Address
: 00e0-cfc5-1999
Issue 01 (2011-07-30)
433
Protect Mode
: BackupProtect
: 16384
: STANDBY
Oper-key
: 1
Port Status: Non-C&D
: 16384
: STANDBY
Oper-key
: 1
Port Status: Non-C&D
----End
Verification
Configure the LACP detection mode to work with the active/standby switchover mechanism of
the UA5000. The service protection of the uplink port uses the LACP detection mode.
Context
Two uplink ports can be on the same uplink board or on different uplink boards, but they must
be of the same port type.
Networking
Figure 21-4 shows an example network for configuring the upstream link protection.
Figure 21-4 Example network for configuring the upstream link protection
Router
Optical splitter
0/3/0
0/3/1
I
P
M
B
C
S
R
B
UA5000
Modem
PC
Issue 01 (2011-07-30)
434
Data Plan
Table 21-1 provides the data plan for configuring the upstream link protection.
Table 21-1 Data plan for configuring the upstream link protection
Item
Data
VLAN ID
10
Uplink port
Service port
0/7/0
VPI/VCI: 0/35
Traffic profile index: 6 (the default value)
Configuration Flowchart
Figure 21-5 shows the flowchart for configuring the upstream link protection.
Figure 21-5 Flowchart for configuring the upstream link protection
Start
Create a VLAN
End
Issue 01 (2011-07-30)
435
Procedure
Step 1 Aggregate uplink ports.
huawei(config)#interface ipm 0/3
huawei(config-if-ipm-0/3)#link-aggregation 0,1 egress-ingress
----End
Verification
After the configuration, the user should be able to access the Internet. When the upstream link
of uplink port 0/3/0 fails, the system automatically transfers the service to the upstream link of
uplink port 0/3/1. In this manner, the user can still access the Internet.
Context
l
The two ports in the protection group must be the only two ports in the same aggregation
group.
Procedure
Step 1 Run the protect command to enter the protect mode.
Step 2 Run the protect-group command to configure a protection group.
Step 3 Run the display protect-group command to query a protection group.
----End
Example
To configure a protection group that consists of ports 0/2/0 and 0/3/0, do as follows:
huawei(config)#protect
huawei(config-protect)#protect-group first 0/2/0 second 0/3/0 eth workmode timed
elay enable
Issue 01 (2011-07-30)
436
huawei(config-protect)#display protect-group
--------------------------------------------------------------------------NO. FirstIntf
SecondIntf
Enable
ActiveFlag
ProtectType
WorkMode
--------------------------------------------------------------------------0
0/ 2/0
0/ 3/0
Enable
First
ETH
TimeDelay
--------------------------------------------------------------------------Total : 1
Related Operation
Table 21-2 lists the related operation for configuring a protection group.
Table 21-2 Related operation for configuring a protection group
Issue 01 (2011-07-30)
To...
undo protect-group
437
22
Issue 01 (2011-07-30)
438
Service Description
The EPON is a new-generation broadband access technology. It uses the point-to-point
architecture and the passive optical transmission mode.
The EPON is also a low-cost solution. Operators can deploy optical access lines between the
office side and the subscriber side by using the EPON technology. The EPON is the passive
optical network based on the Ethernet mode. The EPON is to implement the full-service access.
That is, the EPON can transmit converged data, video, and voice over one fiber. The UA5000
that supports the EPON upstream transmission is called the fiber multi-service access node
(FMSAN).
Service Specifications
l
The EPON supports the transmission with 1.25 Gbit/s upstream/downstream rate.
Prerequisite
l
The interface VLAN of the upper layer device of the UA5000 must be the same as the
VLAN configured on the uplink port of the UA5000.
When the EP1A board is used for upstream transmission, the UA5000 supports the VoIP,
FoIP, MoIP, and ISDNIP services.
This topic describe only the configuration on the UA5000 side. For the configuration on
the OLT side, see related manuals. For example, if the OLT is the MA5680T provided by
Huawei, see the MA5680T Configuration Guide.
Context
Networking
Figure 22-1 shows an example network for configuring the EPON upstream transmission.
Issue 01 (2011-07-30)
439
Figure 22-1 Example network for configuring the EPON upstream transmission
Router
OLT
EPON 0/3
Splitter
I P E
P V P
1
M M A
EPON
0/7
C
S
R
B
C
S
R
B
HABM shelf
EPON
UA5000 MiniMSAN_B
Modem
UA5000 MiniMSAN_A
Splitter
Modem
PC
PC
Phone
Data Plan
Table 22-1 provides the data plan for configuring the EPON upstream transmission.
Table 22-1 Data plan for the configuring the EPON upstream transmission
Configuration Item
Data
Remarks
UA5000_A
Issue 01 (2011-07-30)
440
Configuration Item
Data
Remarks
Traffic profile
Index: 7
Alarm profile
Index: 1
Alarm thresholds of
parameters are configured in
the alarm profile. After the
alarm profile is bound to a
port, the alarm profile
monitors the line status.
The default profile is used in
this example. All the alarm
thresholds are set to 0, which
indicates that line monitoring
is not performed.
CSRB
VLAN ID: 10
VPI: 0; VCI: 35
Encapsulation mode: PPPoE
EP1A
Issue 01 (2011-07-30)
441
Configuration Flowchart
Figure 22-2 shows the flowchart for configuring the EPON upstream transmission.
Figure 22-2 Flowchart for configuring the EPON upstream transmission
Start
End
Procedure
Step 1 Add an EP1A board or let the system automatically find the board and confirm the board. The
command for adding the EP1A board is as follows.
huawei(config)#board add 0/3 h601ep1a
Issue 01 (2011-07-30)
442
0
cbr
2
1000
-----off/-1
cbr
2
2500
-----off/-2
ubr
2
512
-----on /-3
nrt-vbr 5
1200
-600
-250 -on /-4
rt-vbr 15
128
--64
300 10000000 on /off
5
ubr
2
2048
-----on /-6
ubr
1
------off/-7
ubr
2
3072
-----on /--------------------------------------------------------------------------Total Num
:
8
Traffic type definition:
1:NoTrafficDescriptor
2:NoClpNoScr
3:ClpNoTaggingNoScr
4:ClpTaggingNoScr
5:NoClpScr
6:ClpNoTaggingScr
7:ClpTaggingScr
8:ClpNoTaggingMcr
9:ClpTransparentNoScr
10:ClpTransparentScr
11:NoClpTaggingNoScr
12:NoClpNoScrCdvt
13:NoClpScrCdvt
14:ClpNoTaggingScrCdvt
15:ClpTaggingScrCdvt
--------------------------------------------------------------------------
The query result shows that traffic profile 7 is available. If no traffic profile is available,
you can run the traffic table command to create a traffic profile.
2.
Configure a VLAN and add the service port and uplink port to the VLAN.
huawei(config)#vlan 10 smart
huawei(config)#port vlan 10 0/1 0
huawei(config)#service-port vlan 10 adsl 0/7/0 vpi 0 vci 35 multi-service userencap pppoe rx-cttr 7 tx-cttr 7
3.
4.
5.
----End
Result
After the configuration, you should be able to access the Internet in PPPoE dialup mode.
Context
The EP1A board supports one EPON uplink port and one FE/GE auto-sensing electrical port.
Procedure
Step 1 Run the interface epon command to enter the EPON mode.
Issue 01 (2011-07-30)
443
Step 2 Run the display port statistics command to query the statistics about the EPON port.
Step 3 Run the reset port statistics command to clear the statistics about the EPON port. Then, the
system re-collects the statistics.
Step 4 Run the display port statistics command to query the statistics about the EPON port again.
----End
Example
To clear the statistics about all the ports of the EPON board, do as follows:
huawei(config)#interface epon 0/3
huawei(config-if-epon-0/3)#display port statistics all
Command:
display port statistics all
Number
Number
Number
Number
Number
Number
Number
Number
Number
of
of
of
of
of
of
of
of
of
Issue 01 (2011-07-30)
=1352
=1399
=0
=0
=0
=0
=0
=0
=0
444
23
Issue 01 (2011-07-30)
445
Service Description
l
The GPON is a new-generation broadband access technology that uses the point-tomultipoint (P2MP) architecture.
The GPON is a low-cost solution, which provides the optical access between the central
office (CO) of an operator and a customer site.
The GPON is gigabit-capable passive optical network, which supports the data transmission
with a high bandwidth. In this manner, the GPON can effectively solve the bandwidth
problem of the data transmission over twisted pairs and meet the service requirements of
users for high bandwidth.
Service Specifications
l
The GPON is defined by the ITU-T G.984.x standard series. The downstream rate can be
up to 1.2 or 2.4 Gbit/s, and the upstream rate can be up to 155 or 622 Mbit/s, or 1.2 or 2.4
Gbit/s.
The GPON has a high access capability. That is, the GPON supports a physical distance of
up to 20 km and a logical distance of up to 60 km.
The GPON port supports the upstream rate of up to 1.2 Gbit/s and the downstream rate of
up to 2.4 Gbit/s.
Prerequisite
l
The interface VLAN of the upper layer device of the UA5000 must be the same as the
VLAN configured on the uplink port of the UA5000.
The GPON networking uses the P2MP technology and the access link shared by multiple
points to implement the access services. The GPON supports multiple networking modes
through subtending, including fiber to the curb (FTTC), fiber to the building (FTTB), and
fiber to the home (FTTH).
This topic describes only the configuration on the UA5000 side. For the configuration on
the OLT side, see related manuals. For example, if the OLT is the MA5680T of Huawei,
see the MA5680T Configuration Guide.
Context
Issue 01 (2011-07-30)
446
Networking
Figure 23-1 shows an example network for configuring the GPON upstream transmission.
Figure 23-1 Example network for configuring the GPON upstream transmission
Router
OLT
GPON
Splitter
0/3
I P G
P V P
1
M M A
GPON
0/7
C
S
R
B
C
S
R
B
HABM shelf
GPON
UA5000 MiniMSAN_B
UA5000 MiniMSAN_A
Modem
Splitter
Modem
PC
PC
Phone
Data Plan
Table 23-1 provides the data plan for configuring the GPON upstream transmission.
Issue 01 (2011-07-30)
447
Table 23-1 Data plan for the configuring the GPON upstream transmission
Configuration Item
Data
Remarks
UA5000_A
Index: 8
Access rate: 10240 kbit/s
Priority: 6
Priority policy: Pvc-Setting
Line profile
Alarm profile
Index: 1
CSRB
VLAN ID: 10
VPI: 0; VCI: 35
Encapsulation mode: PPPoE
Issue 01 (2011-07-30)
448
Configuration Item
Data
Remarks
GP1A
Configuration Flowchart
Figure 23-2 shows the flowchart for configuring the GPON upstream transmission.
Figure 23-2 Flowchart for configuring the GPON upstream transmission
Start
End
Procedure
Step 1 Add a GP1A board manually or the system automatically finds and confirms the board.
l After the system query, if the state of the board is auto_find, the board is confirmed.
huawei(config)#board confirm 0/3
l After the system query, if no board exists, you need to add a GP1A board.
huawei(config)#board add 0/3 h601Gp1a
Issue 01 (2011-07-30)
449
4
64
4
tag-pri
5
2048
0
tag-pri
6
-0
tag-pri
7
3072
6
pvc-pri
-------------------------------------------------------------------------Traffic parameters for ATM service:
-------------------------------------------------------------------------TID Service Traf CLP01PCR CLP0PCR CLP01SCR CLP0SCR MBS CDVT PPD/SHAPE
Type
Type
kbps
kbps
kbps
kbps cells 1/10us
-------------------------------------------------------------------------0
cbr
2
1000
-----off/-1
cbr
2
2500
-----off/-2
ubr
2
512
-----on /-3
nrt-vbr 5
1200
-600
-250 -on /-4
rt-vbr 15
128
--64
300 10000000 on /off
5
ubr
2
2048
-----on /-6
ubr
1
------off/-7
ubr
2
3072
-----on /--------------------------------------------------------------------------Total Num
:
8
Traffic type definition:
1:NoTrafficDescriptor
2:NoClpNoScr
3:ClpNoTaggingNoScr
4:ClpTaggingNoScr
5:NoClpScr
6:ClpNoTaggingScr
7:ClpTaggingScr
8:ClpNoTaggingMcr
9:ClpTransparentNoScr
10:ClpTransparentScr
11:NoClpTaggingNoScr
12:NoClpNoScrCdvt
13:NoClpScrCdvt
14:ClpNoTaggingScrCdvt
15:ClpTaggingScrCdvt
--------------------------------------------------------------------------
2.
If no proper traffic profile exists after the query, you can run the traffic table command to
create a traffic profile with index 8 and access rate 10 Mbit/s. The configuration is as
follows:
huawei(config)#traffic table ip car 10240 priority 6 priority-policy tag-InPackage
3.
Create a VLAN and add the service port and the uplink port to the VLAN.
huawei(config)#vlan 10 smart
huawei(config)#port vlan 10 0/1 0
huawei(config)#service-port vlan 10 adsl 0/7/0 vpi 0 vci 35 multi-service userencap pppoe rx-cttr 8 tx-cttr 8
4.
5.
6.
----End
Result
After the configuration, the user should be able to access the Internet through the GPON upstream
transmission in dialup mode.
Issue 01 (2011-07-30)
450
Context
l
The GP1A board provides nine ports: one PON port, one GE/FE auto-sensing electrical
port, one 100 M electrical port, two 100 M optical ports, and four E1 ports.
In the case of the GPON board, ports 0-4 belong to the ETH port group and ports 5-8 belong
to the E1 port group. Clearing port statistics is based on the port groups.
Procedure
Step 1 Run the interface gpon command to enter the GPON mode.
Step 2 Run the display port statistics command to query the statistics of the GPON port.
Step 3 Run the reset port statistics command to clear the statistics of the GPON port so that the system
collects the statistics again.
Step 4 Run the display port statistics command to query the statistics of the GPON port again.
----End
Example
To query the traffic statistics of the ETH port group on the GPON board, do as follows:
huawei(config)#interface gpon 0/6
huawei(config-if-gpon-0/6)#display port statistics ethport-group
huawei(config-if-gpon-0/6)#
Port0(Pon):
Number of transmitted frames
Number of received frames
Number of discarded frames
Port1(Eth1):
Number of transmitted frames
Number of received frames
Number of discarded frames
Port2(Eth0):
Number of transmitted frames
Number of received frames
Number of discarded frames
Port3(Fe1):
Number of transmitted frames
Number of received frames
Number of discarded frames
Port4(Fe0):
Number of transmitted frames
Number of received frames
Number of discarded frames
=0
=0
=0
=0
=6649
=0
=0
=0
=0
=0
=0
=0
=0
=0
=0
To clear the statistics of the ETH port group on the GPON board, do as follows:
huawei(config-if-gpon-0/6)#reset port statistics ethport-group
huawei(config-if-gpon-0/6)#
Clear ethernet statistics successfully
Issue 01 (2011-07-30)
451
To query the traffic statistics of the ETH port group on the GPON board again, do as follows:
huawei(config-if-gpon-0/6)#display port statistics ethport-group
huawei(config-if-gpon-0/6)#
Port0(Pon):
Number of transmitted frames
Number of received frames
Number of discarded frames
Port1(Eth1):
Number of transmitted frames
Number of received frames
Number of discarded frames
Port2(Eth0):
Number of transmitted frames
Number of received frames
Number of discarded frames
Port3(Fe1):
Number of transmitted frames
Number of received frames
Number of discarded frames
Port4(Fe0):
Number of transmitted frames
Number of received frames
Number of discarded frames
=0
=0
=0
=0
=0
=0
=0
=0
=0
=0
=0
=0
=0
=0
=0
NOTE
The statistics of the ETH port group include the number of correctly received frames, the number of correctly
transmitted frames, and the number of discarded frames. The statistics of the E1 port group include the statistics
of the GEM frames on the E1 port, the number of E1 frames received by the TGMAC, and the number of E1
frames transmitted by the TGMAC.
Issue 01 (2011-07-30)
452
24
453
This topic describes how to set the native VLAN of an Ethernet port.
Issue 01 (2011-07-30)
454
Service Description
The UA5000 supports subtending through Ethernet ports. Multiple DSLAMs at different tiers
can be subtended through the FE/GE port to extend the network coverage and meet the
requirements for a large network capacity.
For details on the subtended network, see "Subtended Network Configuration" in the UA5000
Universal Access Unit Feature Description.
Service Specifications
The UA5000 provides Ethernet ports through the IPMB , ETH and OPFA boards.
The IPMB board provides four FE ports for subtending with slave shelves. Based on the attached
subboard, the IPMB board can provide one FE optical port, two FE electrical ports, two FE
optical ports or one GE optical port, to function as the uplink port.
The Ethernet ports provided by the IPMB board are used for upstream service transmission and
subtended network configuration.
The Ethernet ports provided by the OPFA board are used for service access.
l
Port
Working Mode
Rate
100 Base-FX
100M single/
multiple-mode
optical port
Full duplex
100 Mbit/s
100Base-TX
100M electrical
port
10 Mbit/s
1000 Mbit/s
1000Base-SX
Issue 01 (2011-07-30)
100 Mbit/s
455
Port Type
Port
Working Mode
Rate
1000 Base-LX
1000 Mbit/s
10GBase-L
10GE optical
port
10000 Mbit/s
Prerequisite
l
All the control boards of the UA5000 work in the normal state.
GE port 0/3/1 of UA5000_A and GE port 0/3/0 of UA5000_B are of the same port type.
GE port 0/3/1 of UA5000_A and GE port 0/3/0 of UA5000_B have the same rate and duplex
mode: auto-negotiation..
Networking
Figure 24-1 shows an example network for configuring device subtending.
NOTE
The subtending of UA5000s can be implemented through the IPMB or the IPMD board. This section considers
the IPMB board as an example.
Issue 01 (2011-07-30)
456
GE0/3/0
GE0/3/1
IPMB
UA5000_A
GE0/3/0
IPMB
UA5000_B
Configuration Flowchart
Figure 24-2 shows the flowchart for configuring device subtending.
NOTE
The following configurations are performed on UA5000_A. UA5000_B does not require a subtending port. The
other configurations are the same as the configurations of UA5000_A.
Issue 01 (2011-07-30)
457
Create a VLAN
End
Procedure
Step 1 Create a VLAN. The types of VLANs are MUX, standard, smart, and super. This section
considers the standard VLAN as an example.
huawei(config)#vlan 2 standard
----End
Result
After the configuration, the two subtended devices should be able to be configured with various
services.
Context
l
Issue 01 (2011-07-30)
458
Procedure
Step 1 Run the auto-neg command to configure the auto-negotiation mode of an Ethernet port.
Step 2 Run the display port state command to query the configuration of the Ethernet port.
----End
Example
To disable the auto-negotiation mode of Ethernet port 0/3/1 on the IPMB board, do as follows:
huawei(config-if-ipm-0/3)#auto-neg 1 disable
huawei(config-if-ipm-0/3)#display port state 1
The port is active
Native VLAN ID is 1
Ethernet port is offline
Ethernet port is full duplex
Ethernet port rate is 100M
Ethernet port does not support flow control
Ethernet port does not support jumbo frame
Line-adaptive function of the ethernet port is normal
Port mode is FE-Elec
Context
l
The duplex of an Ethernet port can be full duplex, half duplex, or auto-negotiation. When
configuring the duplex mode of an Ethernet port, ensure that the duplex mode of the
Ethernet port is the same as the duplex mode of the interconnected port on the peer device.
This prevents communication failure.
When a port is in auto-negotiation mode, disable the auto-negotiation mode of the port to
change the duplex mode to the full duplex mode or the half duplex mode.
By default, the FE electrical port is in auto-negotiation mode, and the FE optical port is in
full duplex mode.
This configuration takes effect for only the Ethernet electrical port.
Procedure
Step 1 Run the interface ipm command to enter the IPM mode.
Step 2 Run the auto-neg command to disable the auto-negotiation mode of an Ethernet port.
Step 3 Run the duplex command to configure the duplex mode of the Ethernet port.
Step 4 Run the display port state command to query the duplex mode of the port.
----End
Example
To change the auto-negotiation mode of Ethernet electrical port 0/3/1 to the full duplex mode,
do as follows:
huawei(config)#interface ipm 0/3
huawei(config-if-ipm-0/3)#auto-neg 1 disable
Issue 01 (2011-07-30)
459
huawei(config-if-ipm-0/3)#duplex 1 full
huawei(config-if-ipm-0/3)#display port state 1
The port is active
Native VLAN ID is 1
Ethernet port is offline
Ethernet port is full duplex
Ethernet port rate is 100M
Ethernet port does not support flow control
Ethernet port does not support jumbo frame
Line-adaptive function of the ethernet port is normal
Port mode is FE-Elec
Context
When setting the rate of an Ethernet port, ensure that the rate of the Ethernet port is the same as
the rate of the interconnected port on the peer device. This prevents communication failure.
By default:
l
When a port is in auto-negotiation mode, disable the auto-negotiation mode to change the
port rate to a specific value.
The rate of the 1000 Mbit/s electrical port is not compulsorily 1000 Mbit/s, but can be autonegotiated to 1000 Mbit/s.
Procedure
Step 1 Run the interface ipm command to enter the IPM mode.
Step 2 Run the auto-neg command to disable the auto-negotiation mode of an Ethernet port.
Step 3 Run the speed command to set the rate of an Ethernet port.
Step 4 Run the display port state command to query the configuration information about an Ethernet
port.
----End
Example
To set the rate of a GE electrical port to 100 Mbit/s, do as follows:
huawei(config)#interface ipm 0/3
huawei(config-if-ipm-0/3)#auto-neg 1 disable
huawei(config-if-ipm-0/3)#speed 1 100
huawei(config-if-ipm-0/3)#display port state 1
The port is active
Native VLAN ID is 1
Ethernet port is online
Ethernet port is full duplex
Ethernet port rate is 100M
Ethernet port supports flow control
Ethernet port does not support jumbo frame
Issue 01 (2011-07-30)
460
Context
l
The Ethernet electrical port uses a straight-through cable or a crossover cable. The type of
the network cable of the Ethernet electrical port can be configured to straight-through cable,
crossover cable, or auto (auto-adaptive).
When the Ethernet electrical port is not in auto-negotiation mode, the network cable type
cannot be configured as auto.
Procedure
Step 1 Run the interface ipm command to enter the IPM mode.
Step 2 Run the mdi command to configure the network cable type of an Ethernet port.
Step 3 Run the display port state command to query the configured network cable type of an Ethernet
port.
----End
Example
To configure the network cable type of Ethernet electrical port 0/3/0 as straight-through cable,
do as follows:
huawei(config)#interface ipm 0/3
huawei(config-if-ipm-0/3)#mdi 1 normal
huawei(config-if-ipm-0/3)#display port state 1
The port is active
Native VLAN ID is 1
Ethernet port is online
Ethernet port is full duplex
Ethernet port rate is 100M
Ethernet port supports flow control
Ethernet port does not support jumbo frame
Line-adaptive function of the ethernet port is normal
Port mode is FE-Elec
Issue 01 (2011-07-30)
461
Context
l
The control function requires the support from the UA5000 and the peer device. If the peer
device supports flow control, enable the flow control of the UA5000. If the peer device
does not support the flow control, disable the flow control of the UA5000.
Procedure
Step 1 Run the interface ipm command to enter the IPM mode.
Step 2 Run the flow-control command to configure the flow control on the port.
Step 3 Run the display port state command to query the set flow control.
----End
Example
To enable the flow control on port 0/3/2, do as follows:
huawei(config)#interface ipm 0/3
huawei(config-if-ipm-0/3)#flow-control 2
huawei(config-if-ipm-0/3)#display port state 2
The port is active
Native VLAN ID is 1
Ethernet port is offline
Ethernet port is full duplex
Ethernet port rate is 100M
Ethernet port supports flow control
Ethernet port does not support jumbo frame
Line-adaptive function of the ethernet port is normal
Port mode is FE-Elec
Related Operation
Table 24-2 lists the related operation for enabling the flow control of an Ethernet port.
Table 24-2 Related operation for enabling the flow control of an Ethernet port
To...
undo flow-control
Context
The are three traffic suppression modes available on a port are as follows:
l
Issue 01 (2011-07-30)
462
When the broadcast traffic exceeds a preset threshold, the system discards certain
broadcast packets until the broadcast traffic is in the acceptable range. This ensures the
normal network services. This process is called broadcast traffic suppression.
l
By default, the level of broadcast traffic suppression and unknown unicast traffic suppression
is 12.
l
When IGMP Proxy or IGMP snooping is enabled, unknown multicast packets are not
suppressed. When IGMP proxy and IGMP snooping are disabled (by running the igmp
mode off command), unknown multicast packets are suppressed. By default, the level of
unknown multicast traffic suppression is 12.
Procedure
Step 1 Run the interface ipm command to enter the IPM mode.
Step 2 Run the traffic-suppress command to enable the traffic suppression on a port.
Step 3 Run the display traffic-suppress command to query the configuration of the traffic suppression.
----End
Example
To set the broadcast traffic suppression to level 1, do as follows:
huawei(config)#interface ipm 0/3
huawei(config-if-ipm-0/3)#traffic-suppress all broadcast value 1
huawei(config-if-ipm-0/3)#display traffic-suppress 0
Traffic suppression ID definition:
--------------------------------------------------------------------NO. Min bandwidth(kbps) Max bandwidth(kbps)
Package number(pps)
/Jumbo frame enable(kbps)
--------------------------------------------------------------------1
6
145 /
884
12
2
12
291 /
1769
24
3
24
582 /
3538
48
4
48
1153 /
7004
95
5
97
2319 /
14082
191
6
195
4639 /
28164
382
7
390
9265 /
56254
763
8
781
18531 / 112508
1526
9
1562
37063 / 225017
3052
10
3125
74126 / 450035
6104
11
6249
148241 / 899997
12207
12
12499
296483 / 1799995
24414
13
0
0 /
0
0
--------------------------------------------------------------------Current traffic suppression ID of broadcast
: 1
Current traffic suppression ID of multicast
: 7
Current traffic suppression ID of unicast
: 7
To set the unknown unicast traffic suppression for port 0/3/0 to level 1, do as follows:
huawei(config)#interface ipm 0/3
huawei(config-if-ipm-0/3)#traffic-suppress 0 unicast value 1
huawei(config-if-ipm-0/3)#display traffic-suppress 0
Traffic suppression ID definition:
Issue 01 (2011-07-30)
463
Related Operation
Table 24-3 lists the related operations for enabling traffic suppression.
Table 24-3 Related operations for enabling traffic suppression
To...
Context
l
Multiple physical ports can be aggregated only if they meet the following conditions:
All the ports must work in full duplex mode.
The rates of all the ports must be the same, and cannot be configured as auto-negotiation.
The default VLAN (PVID) and VLAN attributes of all the ports must be the same.
One port belongs to only one port aggregation group.
No mirror destination port is included.
Issue 01 (2011-07-30)
464
Procedure
Step 1 Run the duplex command to set the full duplex mode for all the ports.
Step 2 Run the speed command to set the same port rate.
Step 3 Run the link-aggregation command to set the Ethernet port aggregation.
Step 4 Run the display link-aggregation command to query the related information about the
aggregated ports.
----End
Example
To set the Ethernet port aggregation, do as follows:
huawei(config-if-ipm-0/3)#duplex 2 full
huawei(config-if-ipm-0/3)#duplex 3 full
huawei(config-if-ipm-0/3)#speed 2 100
huawei(config-if-ipm-0/3)#speed 3 100
huawei(config-if-ipm-0/3)#link-aggregation 2-3 ingress
huawei(config-if-ipm-0/3)#display link-aggregation
------------------------------------------------------------Master port Sub-ports
Mode
WorkMode
------------------------------------------------------------2 3
ingress
manual
------------------------------------------------------------Total: 1 link-aggregation(s)
Related Operation
Table 24-4 lists the related operation for enabling the Ethernet port aggregation.
Table 24-4 Related operation for enabling the Ethernet port aggregation
To...
undo link-aggregation
Context
l
Issue 01 (2011-07-30)
One IPMB board supports the mirroring of only one destination port.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
465
Procedure
Step 1 Run the mirror port command to enable the mirroring function of an Ethernet port.
Step 2 Run the display mirror command to query the mirroring configuration of the Ethernet port.
----End
Example
To mirror the transmit and receive packets of port 0 to port 1, do as follows:
huawei(config-if-ipm-0/3)#mirror port 0 1 all
huawei(config-if-ipm-0/3)#display mirror
-----------------------------------------------Source port
Direction
Destination port
-----------------------------------------------0
all
1
------------------------------------------------
Procedure
Step 1 Run the vlan command to add a VLAN.
Step 2 Run the port vlan command to add an Ethernet port to a VLAN.
Step 3 Run the display vlan command to query the uplink port of a VLAN.
----End
Example
To add Ethernet port 0/3/0 to MUX VLAN 2, do as follows:
huawei(config)#vlan 2 mux
huawei(config)#port vlan 2 0/3 0
huawei(config)#display vlan 2
VLAN ID: 2
VLAN type: MUX
VLAN attribute: common
VLAN description:
VLAN MAC learning ability
:
VLAN max MAC learning number :
VLAN up direction CAR ID
:
VLAN down direction CAR ID
:
-----------------------------F/ S/ P
Native VLAN State
-----------------------------0/ 3/ 0
1 up
-----------------------------Standard port number: 1
Service virtual port number: 0
Issue 01 (2011-07-30)
enable
CAR off
-
466
Related Operation
Table 24-5 lists the related operation for adding an Ethernet port to a VLAN.
Table 24-5 Related operation for adding an Ethernet port to a VLAN
To...
Context
l
When the Ethernet port is used as the uplink port, there are two cases:
If the native VLAN of the Ethernet port is the same as the VLAN to which this Ethernet
port belongs, the Ethernet port removes the VLAN tag of the upstream packets.
If the native VLAN of the Ethernet port is different from the VLAN to which this
Ethernet port belongs, the Ethernet port retains the VLAN tag of the upstream packets.
Before specifying the native VLAN of an Ethernet port, ensure that the port must be
included in the native VLAN.
Whether the native VLAN is set for the uplink port depends on whether the upper layer
device that is connected to the port supports the packets with VLAN tags. The configuration
on the UA5000 should be consistent with the configuration on the upper layer device.
If the upper layer device supports the packets with VLAN tags, the native VLAN of the
uplink port of the UA5000 must be different from the VLAN to which the uplink port
belongs.
If the upper layer device does not support the packets with VLAN tags, the native VLAN
of the uplink port of the UA5000 must be the same as the VLAN to which the uplink
port belongs.
Procedure
Step 1 Run the interface ipm command to enter the IPM mode.
Step 2 Run the native-vlan command to set the native VLAN of an Ethernet port.
Step 3 Run the display port state command to query the configuration of a native VLAN.
----End
Example
To set the native VLAN of Ethernet port 0/3/0 to VLAN 10, do as follows:
huawei(config)#interface ipm 0/3
huawei(config-if-ipm-0/3)#native-vlan 0 vlan 10
huawei(config-if-ipm-0/3)#display port state 0
The port is active
Issue 01 (2011-07-30)
467
Native VLAN ID is 10
Ethernet port is offline
Ethernet port duplex is auto-negotiation
Ethernet port rate is auto-negotiation
Ethernet port does not support flow control
Ethernet port does not support jumbo frame
Line-adaptive function of the ethernet port is normal
Port mode is FE-Elec
Issue 01 (2011-07-30)
468
25
Issue 01 (2011-07-30)
469
Service Description
Multiple Internet service providers (ISPs) may exist in a layer 2 metropolitan area network
(MAN). With the wholesale service function, users can be connected to different ISPs in batches
based on certain rules.
Service Specifications
The UA5000 offers the VLAN stacking function to realize the multi-ISP wholesale access. The
UA5000 adds two layers of VLAN tags to the user packets. The outer VLAN tag identifies ISP,
and the inner VLAN tag identifies the user.
In the wholesale service, the upper layer device must work in layer 2 mode, and forward packets
based on the VLAN and the MAC address.
Prerequisite
l
The upper layer network must be in L2 mode, and forwards packets based on the VLAN
and the MAC address.
Networking
Figure 25-1 shows an example network for configuring the VLAN stacking multi-ISP wholesale
access.
Issue 01 (2011-07-30)
470
Figure 25-1 Example network for configuring the VLAN stacking multi-ISP wholesale access
ISP1
ISP2
BRAS
BRAS
0/3/0
I
P
M
B
UA5000-1
C
S
R
B
0/3/0
I
P
M
B
0/7/0
Enterprise A
UA5000-2
C
S
R
B
0/7/0
Enterprise B
Data Plan
Table 25-1 provides the data plan for configuring the VLAN stacking multi-ISP wholesale
access.
Table 25-1 Data plan for configuring the VLAN stacking multi-ISP wholesale access
Item
Data
Remarks
Enterprise A
Enterprise B
Uplink port:0/3/0
Identifies ISP 1.
471
Item
Data
Remarks
Identifies ISP 2.
Notes
l
Configuration Flowchart
Figure 25-2 shows the flowchart for configuring the VLAN stacking multi-ISP wholesale
access.
Figure 25-2 Flowchart for configuring the VLAN stacking multi-ISP wholesale access
Start
Create a VLAN
End
Issue 01 (2011-07-30)
472
NOTE
The procedure for configuring enterprise user A is the same as the procedure for configuring enterprise
user B. This section considers only the procedure for configuring enterprise user A as an example. For the
information about how to configure enterprise user B, see the following configuration procedure based on
the data plan of enterprise user B.
Procedure
Step 1 Create a VLAN.
huawei(config)#vlan 60 smart
Step 5 Set the inner tag (VLAN ID) of the service port.
huawei(config)#stacking label vlan 60 baselabel 10
It will take several minutes, and console may be timeout, please use command
idle-timeout to set time limit
Are you sure to continue? (y/n)[n]:y
The total of service virtual port(s) in this operation:
1
The total of service virtual port(s) which could be labeled:
1
Now begin to label these service virtual port(s), please wait ...
----End
Result
Enterprise user A and enterprise user B should be able to connect to ISP1 and ISP2 in the normal
state.
Context
l
By default, the inner and outer Ethernet protocol type of a stacking VLAN is 0x8100. That
is, the Ethernet frame has a 802.1q VLAN Tag.
The protocol type to be set cannot be set as a value for other protocols, such as 0x0800 (IP
packets) or 0x0806 (ARP packets).
Issue 01 (2011-07-30)
473
Procedure
Step 1 Run the stacking inner-ethertype command to set the inner Ethernet protocol type of a stacking
VLAN.
Step 2 Run the display stacking inner-ethertype command to query the inner Ethernet protocol type
of a stacking VLAN.
----End
Example
To set the inner Ethernet protocol type supported by a stacking VLAN as 0x8100, do as follows:
huawei(config)#stacking inner-ethertype 0x8100
huawei(config)#display stacking inner-ethertype
The inner Ethernet type in the system: 0x8100
Prerequisite
l
The service board must work in the normal state, and the service port must exist.
You can configure only the VLAN with the stacking attribute. Before the configuration,
you must run the service-port command to create the service port.
By default, the values of the inner labels of the stacking VLAN of all the service ports are
1.
When the inner labels of the stacking VLAN of the service ports on a certain board are
configured in batches, configure the value of the label of the first service port to baselabel,
and the second to baselabel + 1. The value of the label of the Nth service port is baselabel
+ (n - 1). The value of the label increases by this rule.
When the inner labels of the stacking VLAN of the service ports in the entire system are
configured in batches, configure the value of the label of the first service port to baselabel,
and the second to baselabel + 1. The value of the label of the Nth service port is baselabel
+ (n - 1). The value of the label increases by this rule.
Context
Procedure
Step 1 Run the stacking label command to configure the value of the inner label of the stacking VLAN
of the service port on a certain board or in the entire system.
Step 2 Run the display service-port command to query the value of the inner label of the stacking
VLAN of the service port.
----End
Issue 01 (2011-07-30)
474
Example
Assume that a service port corresponds to the physical location 0/7/0. The VPI of the service
port is 0 and the VCI of the service port is 32. To configure the label of the port to 3000, do as
follows:
huawei(config)#stacking label 0/7/0 vpi 0 vci 32 3000
huawei(config)#display service-port port 0/7/0
-----------------------------------------------------------------------------VLAN VLANATTR PORT F/ S/ P VPI VCI FLOW
FLOW RX TX STATE
LABEL CHN
ID
TYPE
PARA
-----------------------------------------------------------------------------10 stacking adl 0/7/0
0
35
6
6
act/dn
3000 -----------------------------------------------------------------------------Total : 1 (Up/Down :
0/1)
Note : F--Frame, S--Slot, P--Port(or Virtual Port, such as IMA GROUP,
VLAN ID etc.), the VPI is access-end VLAN ID in EAU/GAU port
or PON ID in EPON port
To set the labels of all the service ports of VLAN11 and provide label values according to the
default settings, do as follows:
huawei(config)#stacking label vlan 11 baselabel 1000
It will take several minutes, and console may be timeout, please use command
idle-timeout to set time limit
Are you sure to continue? (y/n)[n]:y
The total of service virtual port(s) in this operation:
4
The total of service virtual port(s) which could be labeled:
4
Now begin to label these service virtual port(s), please wait ...
Issue 01 (2011-07-30)
475
26
Issue 01 (2011-07-30)
476
Service Description
Leased line access meets the requirements for the transparent transmission of service data and
VLANs of private networks to the peer end in a secure manner.
Service Specifications
The leased line access service is realized through the QinQ feature.
l
After receiving a packet with a private VLAN tag, the UA5000 adds an additional VLAN
tag (QinQ VLAN tag) to the packet.
The packet is forwarded by its outer VLAN tag in the public network.
When the packet reaches the peer UA5000, the UA5000 extracts the outer VLAN tag, thus
realizing the transparent transmission of the VLAN in a private network.
NOTE
l In the case of the QinQ feature application, the modem at the access side must support the Ethernet
packets with the VLAN tags.
l For details on the QinQ feature, see "VLAN" in the UA5000 Universal Access Unit Feature
Description.
Prerequisite
l
The upper layer network must work in L2 mode and forward packets according to the
VLAN ID and MAC address.
Networking
Figure 26-1 shows an example network for configuring the leased line service.
Issue 01 (2011-07-30)
477
Figure 26-1 Example network for configuring the leased line service
UA5000_A
0/3/0
I
P
M
B
UA5000_B
0/3/0
C
C
S
S
R
R
B
C
C
S
S
R
R
B
I
P
M
B
0/7/0
0/7/0
Modem
Modem
LANSwitch
LANSwitch
Company A
Company B
Data Plan
Table 26-1 provides the data plan for configuring the leased line service.
Table 26-1 Data plan for configuring the leased line service
Item
Data
UA5000_A
UA5000_B
Configuration Flowchart
Figure 26-2 shows the flowchart for configuring the leased line service.
Issue 01 (2011-07-30)
478
Create a VLAN
End
Procedure
Step 1 Create a VLAN.
huawei(config)#vlan 50 smart
----End
Result
After the configuration, enterprise users A and B should be able to communicate with each other
in the normal state.
479
Context
l
When the transparent transmission of BPDUs is enabled, the layer 2 BPDUs under the
QinQ VLAN can be transparently transmitted.
Procedure
Step 1 Run the bpdu tunnel enable command to enable the transparent transmission of BPDUs.
Step 2 Run the display bpdu tunnel config command to query the transparent transmission status of
BPDUs.
----End
Example
To enable the transparent transmission of BPDUs, do as follows:
huawei(config)#bpdu tunnel enable
huawei(config)#display bpdu tunnel config
BPDU tunnel function is enabled
Related Operation
Table 26-2 lists the related operation for enabling the transparent transmission of BPDUs.
Table 26-2 Related operation for enabling the transparent transmission of BPDUs
Issue 01 (2011-07-30)
To...
480
27
Context
The multicast service of the UA5000 is widely used in streaming media, distance learning, video
conferencing, video multicasting, Web TV, online game, Internet data center (IDC), and other
point-to-multipoint data transmission.
In terms of multicast processing mode, the UA5000 supports the IGMP proxy and IGMP
snooping Layer 2 multicast protocols. IGMP proxy and IGMP snooping both support multicast
video data forwarding, but the two modes have different processing mechanisms.
l
IGMP snooping obtains related information and maintains the multicast forwarding entries
by listening to the IGMP packets in the communication between the user and the multicast
router.
IGMP proxy intercepts the IGMP packets between the user and the multicast router,
processes the IGMP packets, and then forwards the IGMP packets to the upper-layer
multicast router. For the multicast user, the UA5000 is a multicast router that implements
the router functions in the IGMP protocol; for the multicast router, the UA5000 is a
multicast user.
The UA5000 supports the configuration of a single multicast user on a single port and the
configuration of multicast users on a single port.
l
A single multicast user on a single port: A port supports one multicast user.
Multiple multicast users on a single port: Different multicast users are differentiated based
on service streams and each xDSL port supports a maximum of eight multicast users. This
mode provides flexible networking methods and helps increase the bandwidth utilization
ratio.
Table 27-1 shows the specifications of the control boards on the UA5000 for carrying the
multicast service.
Issue 01 (2011-07-30)
481
Table 27-1 Specifications of the control boards on the UA5000 for carrying the multicast service
Access Mode
Non-MVLAN Multicast
Service
MVLAN Multicast
Service
H601IPMD, H601IPMB,
H612IPMB, and H612IPMD
boards
H601IPMB, H612IPMB,
and H612IPMD boards
H612IPMD board
H601IPMB, H612IPMB,
and H612IPMD boards
Issue 01 (2011-07-30)
482
Context
Table 27-2 lists the default settings of the multicast service of the UA5000.
Table 27-2 Default settings of the multicast service of the UA5000
Feature
Default Setting
IGMP mode
Proxy
Authentication function
Enable
Enable
IGMP preview
Enable
Enable
Application Context
The multicast feature of the UA5000 is mainly applied in streaming, remote learning, video
conferencing, video on demand (VOD), network gaming, Internet data center (IDC), and other
point-to-multipoint fields.
Currently, the multicast application of the UA5000 is oriented to L2, and the UA5000 forwards
data based on VLAN ID+multicast MAC address. A multicast program in the network is
identified by VLAN ID + multicast IP address uniquely. The UA5000 differentiates multicast
sources by VLAN ID. It allocates a unique VLAN ID to each multicast source, controls the
multicast domain and the user right based on the multicast VLAN ID, and provides a platform
for different ISPs to implement different multicast video services.
Prerequisites
The license for the multicast program or the multicast user is already requested and installed.
Data Plan
Before configuring the multicast video service, plan the data items as listed in Table 27-3.
Issue 01 (2011-07-30)
483
Data Item
Remarks
UA5000
User VLAN
L2 multicast protocol
IGMP version
Program list
Upper-layer
multicast router
IGMP version
Home gateway or
modem
IGMP version
Procedure
Issue 01 (2011-07-30)
484
Context
Table 27-4 lists the multicast global parameters.
Table 27-4 Default values of the multicast global parameters
Issue 01 (2011-07-30)
Parameter
Default Value
Remarks
license program
1024
IGMP mode
Proxy
Authorization
function
Enabled
35
Default 802.1p
priority
Default user-side
encapsulation type
ipoe
System robustness
General query
interval (unit:
second)
125
Maximum response
time to the V2
general query (unit:
0.1second)
100
485
Issue 01 (2011-07-30)
Parameter
Default Value
Remarks
Maximum response
time to the V3
general query (unit:
0.1second)
100
10
Maximum response
time to the V2 groupspecific query (unit:
0.1second)
Maximum response
time to the V3 groupspecific query (unit:
0.1second)
400
Unsolicited report
interval (unit:
second)
10
Log function
Enabled
Disabled
Preview function
Enabled
Recognition time
(unit: second)
30
04:00:00
Interval for
automatically
generating the log
(unit: hour)
Right mode
Profile mode
Broadband
management
function
Enabled
486
Parameter
Default Value
Remarks
Available bandwidth
(%)
100
CDR function
Disabled
Interval threshold of
automatically
reporting the CDR
(unit: second)
600
Number threshold of
automatically
reporting the CDR
200
IGMP ECHO
function
Disabled
Function of forcibly
switching the uplink
port to V2 version
Disabled
Default multicast
source IP address
192.168.1.1
Querier
150
The following part describes the purpose and principles of the general query and specific query:
The description of a general query is as follows:
l
Purpose: A general query packet is periodically sent by the UA5000 to check whether there
is any multicast user who leaves the multicast group without sending the leave packet.
Based on the query result, the UA5000 periodically updates the multicast forwarding table
and releases the bandwidth of the multicast user that has left the multicast group.
Principles: The UA5000 periodically sends the general query packet to all online IGMP
users. If the UA5000 does not receive the response packet from a multicast user within a
specified time (Robustness variable x General query interval + Maximum response time
of a general query), it regards the user as having left the multicast group and deletes the
user from the multicast group.
Issue 01 (2011-07-30)
487
Purpose: A group-specific query packet is sent by the UA5000 after a multicast user that
is not configured with the quick leave attribute sends the leave packet. The group-specific
query packet is used to check whether the multicast user has left the multicast group.
Principles: When a multicast user leaves a multicast group, for example, switches to another
channel, the user unsolicitedly sends a leave packet to the UA5000. If the multicast user is
not configured with the quick leave attribute, the UA5000 sends a group-specific query
packet to the multicast group. If the UA5000 does not receive the response packet from the
multicast user within a specified duration (Robustness variable x Group-specific query
interval + Maximum response time of a group-specific query), it deletes the multicast user
from the multicast group.
In the general query mode, the UA5000 performs the multicast packet query for all the users. In
the group-specific query mode, the UA5000 performs the multicast packet query for only the
users that watch the specified multicast program.
Table 27-5 lists the default settings of the multicast global parameters. In the actual application,
you can modify the values according to the data plan.
Table 27-5 Default settings of the parameters of the general query and group-specific query
Parameter
Default Value
Group-specific query
parameter
Query interval: 1s
Maximum response time: 0.8s.
Robustness variable (query times): 2
Procedure
Step 1 Set the general query parameters.
1.
Run the igmp proxy router gen-query-interval command to set the general query interval.
By default, the general query interval is 125s.
2.
Run the igmp proxy router gen-response-time command to set the maximum response
time of the general query. By default, the maximum response time of the general query is
10s.
3.
Run the igmp proxy router robustness command to set the robustness variable (query
times) of the general query. By default, the robustness variable (query times) is 2.
Run the igmp proxy router sp-response-time command to set the group-specific query
interval. By default, the group-specific query interval is 1s.
2.
Run the igmp proxy router sp-query-interval command to set the maximum response
time of the group-specific query. By default, the maximum response time of the groupspecific query is 0.8s.
Issue 01 (2011-07-30)
488
3.
Run the igmp proxy router sp-query-number command to set the robustness variable
(query times) of the group-specific query. By default, the robustness variable (query times)
is 2.
Step 3 Run the display igmp config global command to check whether the values of the multicast
parameters are correct.
----End
Example
To set the general query parameters, the general query interval to 150s, the maximum response
time of the general query to 20s, and robustness variable (query times) to 3, do as follows:
huawei(config)#btv
huawei(config-btv)#igmp proxy router gen-query-interval 150
huawei(config-btv)#igmp proxy router gen-response-time v3 200
huawei(config-btv)#igmp proxy router robustness 3
To set the group-specific query parameters, the group-specific query interval to 20s, the
maximum response time of the group-specific query to 10s, and robustness variable (query
times) to 3, do as follows:
huawei(config)#btv
huawei(config-btv)#igmp proxy router sp-query-interval 200
huawei(config-btv)#igmp proxy router sp-response-time v3 100
huawei(config-btv)#igmp proxy router sp-query-number 3
Context
l
When you create the multicast programs, the multicast source IP address is a unicast IP
address and the source IP addresses of different multicast programs can be the same.
For the default settings of the multicast uplink port mode, L2 multicast mode, and IGMP
version, see Table 27-6.
Default Value
Program
L2 multicast mode
Proxy
IGMP version
V3
Procedure
Step 1 Create a program VLAN.
Issue 01 (2011-07-30)
489
1.
Run the vlan command to create a program VLAN, and set the VLAN type according to
the actual application. For details on the VLAN configuration, see 5 Configuring a
VLAN.
2.
Run the port vlan command to add the uplink port to the program VLAN.
Configure a program list for the multicast VLAN beforehand, and bind the programs with
a right profile to implement program right management.
1.
Run the igmp program add [ name name ] ip ip-addr [ sourceip ip-addr ] vlan vlanid
[ bind frameid/slotid/portid ] [ hostip ip-addr ] command to add a multicast program.
NOTE
When you do not configure the source IP address of the program, the source IP address of the program
is 192.168.1.1 by default.
2.
When a user is bound to multiple right profiles, and the right profiles have different rights to a
program, the right with the highest priority prevails. You can run the igmp right-priority command
to adjust the priorities of the four rights: watch, preview, forbidden, and idle. By default, the priorities
of the four rights are forbidden > preview > watch > idle.
Run the igmp uplink-port command to configure the multicast uplink port and the
allocated bandwidth. The corresponding multicast packets are forwarded and received
through this uplink port.
2.
In the BTV mode, run the igmp uplink-port-mode command to change the mode of the
multicast upstream port. By default, the port is in the program mode. In the RSTP network,
the port adopts the RSTP mode; in the RRPP network, the port adopts the RRPP mode.
l program: The program-specified mode. In this mode, the uplink port is bound when the
program is added and the protocol message is sent upstream through this port. Run the
igmp program add [ name name ] ip ip-addr [ sourceip ip-addr ] [ bind frameid/
slotid/portid ] [ hostip ip-addr ] command to bind the uplink port when adding the
program; or run the igmp program modify [ name name ] ip ip-addr [ sourceip ipaddr ] [ bind frameid/slotid/portid ] command to change the uplink port bound to the
program.
l rstp: The RSTP mode. In this mode, the IGMP uplink port is the root port used by the
RSTP protocol. Run the display stp command to query the root port of the device.
l rrpp: The RRPP mode. In this mode. the IGMP uplink port is the master port used by
the RRPP protocol. Run the display rrpp verbose domain command to query the
current master port of the device.
NOTE
When the RRPP protocol is enabled, the device forms the ring multicast and the redundant links are
reserved. When a link in the ring is faulty, the service is automatically switched to the standby link.
The multicast uplink port on the RRPP device can only be in the RRPP mode. This is because only in
this mode, the service is switched to the multicast uplink port during the link switchover, thus
preventing the multicast service from being interrupted.
490
Run the igmp mode { proxy | snooping } command to select the L2 multicast mode. By default,
the multicast mode is IGMP proxy.
In the IGMP snooping mode, proxy can be enabled for the report packet and the leave packet.
When a multicast user joins or leaves a multicast program, the UA5000 can implement IGMP
proxy. IGMP snooping and IGMP proxy are controlled separately.
l Run the igmp report-proxy enable command to enable the proxy of the snooping report
packet. When the first user requests to join a program, after authenticating the user, the
UA5000 sends the user report packet to the network side and receives a corresponding
multicast stream from the multicast router. The subsequent report packets for joining the
program are not sent by the UA5000 to the network side.
l Run the igmp leave-proxy enable command to enable the proxy of the snooping leave
packet. When the last user requests to leave the program, the UA5000 sends the user leave
packet to the network side to request the upper layer device to stop sending multicast streams.
The leave packets of the users that precede the last user are not sent by the UA5000 to the
network side. When the user that goes offline is not the last user, the multicast stream is sent
continuously.
Step 5 Set the IGMP version of the uplink port.
Run the igmp uplink-port force-to-v2 { enable | disable } command to set the IGMP version.
By default, IGMP v3 is enabled in the system. If the upper layer and lower-layer devices in the
network are IGMP v2 devices and cannot recognize the IGMP v3 packets, run this command to
change the IGMP version.
IGMP v3 is compatible with IGMP v2 in packet processing. If IGMP v3 is enabled on the
UA5000 and the upper layer multicast router switches to IGMP v2, the UA5000 automatically
switches to IGMP v2 when receiving the IGMP v2 packets. If the UA5000 does not receive any
more IGMP v2 packets within the preset IGMP v2 timeout time, it automatically switches back
to IGMP v3. In the BTV mode, run the igmp proxy router timeout command to set the IGMP
v2 timeout time. By default, the timeout time is 400s.
Step 6 Change the priority for forwarding IGMP packets.
l In the IGMP proxy mode, the priority for forwarding IGMP packets is fixed and cannot be
changed.
l In the IGMP snooping mode, the IGMP packets forwarded to the network side adopt the
priority of the user service stream. The priority of the service stream is set through the traffic
profile.
Step 7 Check whether the configuration is correct.
l Run the display igmp config command to query the multicast attributes.
l Run the display igmp program command to query the information about the multicast
program.
----End
Example
To create multicast VLAN 101 with program source IP address 224.1.1.1, program bandwidth
5000 kbit/s, multicast VLAN uplink port 0/2/2, IGMP Proxy, and IGMP V3, do as follows:
huawei(config)#vlan 101 smart
huawei(config)#port vlan 101 0/2 2
huawei(config)#btv
huawei(config-btv)#igmp program add name movie ip 224.1.1.1 sourceip 10.10.10.1
Issue 01 (2011-07-30)
491
Prerequisite
Before configuring a multicast user, create a service channel. The procedure is as follows:
1.
2.
3.
Run the interface xDSL frameid/slotid command to enter the board mode to configure the
xDSL user port.
NOTE
4.
l The multicast service supports the IPoE and PPPoE user access modes, but does not support the IPoEoA
or PPPoEoA user access mode.
l In the PPPoE access mode, if the L2 multicast protocol is IGMP snooping, whether to enable the IGMP
echo function is determined according to whether the upper layer device forwarding the IGMP packet
supports the IGMP over PPP packet. This is because, in the IGMP snooping mode, only the IGMP
server can recognize the IGMP over PPP packet, which generally cannot be recognized by other IGMP
sources. When the IGMP echo function is enabled, the IGMP over PPP and IGMP over IP packets can
be sent to the upper layer device at the same time. In this manner, the upper layer device connected to
the UA5000 can recognize the IGMP over PPP packet.
You can run the igmp echo enable command to enable the IGMP echo function.
Context
Add a multicast user, and bind the multicast user to the multicast source IP address to create a
multicast member. Bind the multicast user to a right profile to implement multicast user
authentication.
Table 27-7 lists the default settings of the attributes related to the multicast user.
Table 27-7 Default settings of the attributes related to the multicast user
Issue 01 (2011-07-30)
Parameter
Default Value
mac-based
492
Parameter
Default Value
enable
Procedure
Step 1 In the global config mode, run the btv command to enter the BTV mode.
Step 2 Configure a multicast user and the multicast user attributes.
1.
2.
Configure the maximum number of programs that can be watched by the multicast user.
Run the igmp user add port { desc description | frameid/slotid/portid } { adsl | { shdsl |
vdsl } } { auth | no-auth } [ max-program { max-program-num | no-limit } command
to configure the maximum number of programs that can be watched by the multicast user
concurrently. Up to 32 programs can be watched by the multicast user concurrently. By
default, the system supports one program.
3.
4.
Issue 01 (2011-07-30)
493
the multicast group. Otherwise, the system does not delete the multicast user. This mode
is applied to the scenario with multiple terminals.
Step 3 Configure multicast user authentication.
By default, the system does not authenticate the multicast user. To control the right of a multicast
user, you can enable the multicast user authentication function.
1.
After configuring multicast user authentication, you need to enable the global authentication function
to make the configuration take effect. By default, the global authentication function is enabled. You
can run the igmp proxy authorization command to change the configuration.
2.
Bind the multicast user to the right profile. This operation is to implement user
authentication.
Run the igmp user bind-profile command to bind the user to a right profile. After the
binding, the multicast user has the rights to the programs as configured in the profile.
NOTE
For the configuration of one port for one multicast user, run the igmp user bind-profile port
command to bind the right profile.
For the configuration of one port for multiple multicast users, run the igmp user bind-profile serviceport command to bind the right profile.
Step 4 Run the display igmp user command to check whether the related multicast user information
is correctly configured.
----End
Example
For the configuration of one port for one multicast user: Assume that the authentication is
performed, the log is reported, the maximum number of programs that can be watched by the
multicast user concurrently is 6, right profile music is bound, and the leave mode of the multicast
user is the quick leave mode based on the MAC address. To add multicast user 0/11/1 to service
VLAN 101, do as follows:
huawei(config)#service-port vlan 101 adsl 0/11/1 vpi 0 vci 35 rx-cttr 2 tx-cttr 2
huawei(config)#btv
huawei(config-btv)#igmp user add port 0/11/1 adsl 0 35 auth log enable max-program
6
huawei(config-btv)#igmp user bind-profile smart-vlan 101 profile-name music
For the configuration of one port for multiple multicast users, assume that the stream for carrying
video packets is the same as the stream for carrying IGMP control packets, and the VPI/VCI of
the packet stream is 0/35:
l
VLAN 100: Assume that the ID of the user-side VLAN is 10, the authentication is
performed, the log is reported, the maximum number of programs that can be watched by
the multicast user concurrently is 2, and right profile movie is bound.
VLAN 101: Assume that the ID of the user-side VLAN is 11, the authentication is
performed, the log is reported, the maximum number of programs that can be watched by
the multicast user concurrently is 6, and right profile music is bound.
494
For the configuration of one port for multiple multicast users, assume that the stream for carrying
video packets is different from the stream for carrying IGMP control packets, and the VPI/VCI
of the packet stream is 0/35:
l
VLAN 100: Assume that the ID of the user-side VLAN is 10, the authentication is
performed, the log is reported, the maximum number of programs that can be watched by
the multicast user concurrently is 2, and right profile movie is bound.
VLAN 101: Assume that the ID of the user-side VLAN is 11, the authentication is
performed, the log is reported, the maximum number of programs that can be watched by
the multicast user concurrently is 6, and right profile music is bound.
Prerequisite
The program matching mode of the user VLAN must be the static configuration mode.
Context
If the multicast bandwidth management function is enabled and a user requests a multicast
program, the system compares the remaining bandwidth of the user (bandwidth configured for
the user total bandwidth of the online programs of the user) with the bandwidth of the multicast
program. If the remaining bandwidth of the user is sufficient, the system adds the user to the
multicast group. If the bandwidth is insufficient, the system does not respond to the request of
the user.
Issue 01 (2011-07-30)
495
If the multicast bandwidth management function is disabled, the system does not guarantee the
bandwidth of the multicast program. When the bandwidth is not guaranteed, problems such as
mosaic and delay occur in the multicast program.
Table 27-8 lists the default settings of the multicast bandwidth management parameters.
Table 27-8 Default settings of the multicast bandwidth management parameters
Parameter
Default Value
enable
5000 kbit/s
no-limit
Procedure
Step 1 In the global config mode, run the btv command to enter the BTV mode.
Step 2 Enable the global CAC function.
By default, the global CAC function is already enabled. You can run the igmp bandwidthCAC
{ enable | disable } command to change the setting.
Step 3 Configure the bandwidth of the multicast program.
Run the igmp program add [ name name ] ip ip-addr [ sourceip ip-addr ] vlan vlanid [ bind
frameid/slotid/portid ] bandwidth bandwidth command to configure the bandwidth of a
multicast program.
Step 4 Check whether the multicast bandwidth configuration is correct.
l Run the display igmp config command to check the status of the global CAC function.
l Run the display igmp program command to query the bandwidth of the multicast program.
----End
Example
To enable the bandwidth management function of the multicast user, add multicast user 0/11/1
with maximum number of programs that can be watched concurrently 6, and set the bandwidth
of program 224.1.1.1 to 1 Mbit/s, do as follows:
huawei(config)#btv
huawei(config-btv)#igmp bandwidthCAC enable
huawei(config-btv)#igmp user add port 0/11/1 auth max-program 6
huawei(config-btv)#igmp program add ip 224.1.1.1 vlan 101 bandwidth 1024
496
Prerequisite
The program matching mode of the user VLAN must be the static configuration mode.
Context
The difference between program preview and normal program watching is that, after the user
goes online, the duration of the preview is restricted. When the duration expires, the user goes
offline. The user can request the program again only after the preview interval expires. The count
by which the user can request the program within a day (the start time can be configured) is
restricted by the preview count of the user.
Table 27-9 lists the default settings of the multicast preview parameters.
Table 27-9 Default settings of the multicast preview parameters
Parameter
Default Value
enable
Preview profile
4:00:00
30s
Procedure
Step 1 In the global config mode, run the btv command to enter the BTV mode.
Step 2 Enable the global multicast preview function.
By default, the global multicast preview function is enabled. You can run the igmp preview
{ enable | disable } command to change the setting.
Step 3 Change the time for resetting the preview record.
Run the igmp preview auto-reset-time command to change the time for resetting the preview
record. The preview record of the user remains valid within one day. On the second day, the
preview record is reset. By default, the system resets the preview record at 4:00:00 a.m.
Step 4 Modify the valid duration of multicast preview.
Run the igmp proxy recognition-time command to modify the valid duration of multicast
preview. If the actual preview duration of the user is shorter than the valid duration, the preview
is not regarded as a valid one and is not added to the preview count. By default, the valid duration
of multicast preview is 30s.
Issue 01 (2011-07-30)
497
Step 5 Run the display igmp config command to check whether the values of the multicast preview
parameters are correct.
----End
Example
To enable the multicast preview function, set the time for resetting the preview record to 5:00:00,
and set the valid duration of multicast preview to 40s, do as follows:
huawei(config)#btv
huawei(config-btv)#igmp preview enable
huawei(config-btv)#igmp preview auto-reset-time 5:00:00
huawei(config-btv)#igmp proxy recognition-time 40
Prerequisite
The multicast source must exist on the network and the IP address of the multicast source must
be known.
Context
Multicast program prejoin is the same as program request. The UA5000 plays the role of a user
and sends the report packet for receiving in advance the multicast stream from the upper layer
multicast router to the upstream port.
After the prejoin function is enabled, if the upper layer multicast router does not support static
multicast entry forwarding, the unsolicited report function needs to be enabled so that the user
can request the program quickly. Generally, in the prejoin function, the upper layer multicast
router processes the user request by responding to the group-specific query and the general query.
Table 27-10 lists the default settings of the prejoin parameters.
Table 27-10 Default settings of the prejoin parameters
Parameter
Default Value
Prejoin function
disable
disable
Procedure
Step 1 Enable the prejoin function.
Run the igmp program add ip ip-addr [ sourceip ip-addr ] vlan vlanid [ bind frameid/slotid/
portid ] prejoin enable command to enable the prejoin function of a program. By default, the
prejoin function is disabled.
Issue 01 (2011-07-30)
498
Step 2 After the prejoin function is enabled, if the upper layer multicast router does not support static
multicast entry forwarding, the unsolicited report function needs to be enabled for IGMP packets.
l Run the igmp program add ip ip-addr [ sourceip ip-addr ] vlan vlanid [ bind frameid/
slotid/portid ] unsolicited enable command to enable the unsolicited report function for
IGMP packets. By default, the unsolicited report function is disabled.
l Run the igmp proxy router report-interval command to modify the interval for
unsolicitedly reporting IGMP packets. By default, the interval is 10s.
Step 3 Check whether the prejoin function is configured correctly.
l Run the display igmp program command to query the status of the prejoin function and the
unsolicited report function.
l Run the display igmp config command to query the interval for unsolicitedly reporting IGMP
packets.
----End
Example
To enable the prejoin function when adding program with IP address 224.1.1.1, do as follows:
huawei(config-btv)#igmp program add ip 224.1.1.1 sourceip 192.196.1.1 vlan 101 p
rejoin enable
Prerequisite
If the Syslog is used for reporting multicast logs, the Syslog server must be properly configured.
Context
Multicast logs have two control levels: multicast user level and multicast program level. The
system generates logs only when the logging functions at the two levels are enabled.
When the user stays online for longer than the valid time for generating logs, the system generates
logs in any of the following conditions:
l
The VLAN of the upstream port to which the program is bound changes.
The system supports up to 32K logs. When the user goes online, the system records only the
online date and time. The system generates a complete log only when the user goes offline.
Issue 01 (2011-07-30)
499
The UA5000 can report the multicast log to the log server in the Syslog mode and the call detailed
record (CDR) mode. By default, the UA5000 reports the log in the Syslog mode.
l
Syslog mode: Logs are reported to the Syslog server in the form of a single log.
CDR mode: Logs are reported to the log server in the form of a log file (.cvs). One log file
contains multiple logs.
Table 27-11 lists the default settings of the multicast logging parameters.
Table 27-11 Default settings of the multicast logging parameters
Parameter
Default Value
Syslog mode
enable
enable
enable
2 hours
30s
Procedure
l
2.
Issue 01 (2011-07-30)
500
leaves the multicast group without sending a leave packet, which can affect the
accounting. By default, the interval is two hours.
3.
2.
Configure the multicast log server and the data transmission mode for the CDR-mode
log report.
Run the file-server auto-backup cdr command to configure the active and standby
multicast log servers.
3.
4.
----End
Example
To enable the function of CDR-mode log report (the log is reported to log server 10.10.10.1 in
the TFTP transmission mode), do as follows:
huawei(config)#file-server auto-backup cdr primary 10.10.10.1 tftp
huawei(config)#btv
huawei(config-btv)#igmp cdr enable
Issue 01 (2011-07-30)
501
Application Context
Figure 27-1 shows the application context of the multicast service in a subtending network.
When a subtended device needs to provide the multicast service, the subtending port on the
subtending device needs to be configured as a multicast subtending port. In this way, the
subtending device regards the subtended device as an IGMP user.
Figure 27-1 Application context of multicast service in a subtending network
Multicast
Server
Router
0/3/0
0/3/1
I
P
M
D
C
S
R
B
I
P
M
D
C
S
R
B
0/3/0
0/3/1
UA5000_ A
UA5000_B
0/15
Modem
PC
Modem
PC
Precautions
l
The multicast program list of the subtending device must cover the multicast program list
of the subtended device.
In this network, the UA5000 Universal Access Unit functions as a subtending device, and
the program VLANs of the subtending device and subtended device must be the same.
Issue 01 (2011-07-30)
502
Procedure
The procedure for configuring the subtended device is the same as described in 27.2 Configuring
the Multicast Service on a Standalone NE.
The procedure of configuring the subtending device is as follows:
1.
For details on configuring the multicast service, see 27.2 Configuring the Multicast
Service on a Standalone NE.
2.
3.
When the subtended device requires the quick leave function of the multicast user, run the
igmp cascade-port frameid/slotid/portid quickleave enable command to enable the quick
leave attribute on the multicast subtending port.
CAUTION
If the lower-layer device does not support the proxy of the IGMP leave packet, all the users
requesting the program may go offline when a user requesting the same program goes
offline. Therefore, when the quick leave attribute is enabled on the multicast subtending
port, it is recommended that the lower-layer device use the IGMP proxy function, or switch
to the IGMP snooping mode with the IGMP leave packet proxy function enabled.
Prerequisite
The required parameters have been configured for the RSTP ring network. For details, see
Configuring the RSTP.
Networking
CAUTION
The RRPP protocol and the Rapid Spanning Tree Protocol (RSTP) are mutually exclusive.
Figure 27-2 shows the application context of the multicast service in an RSTP network. When
the multicast service is provided in an RSTP ring network, the multicast upstream port and the
subtending port need to be added to the user VLAN. According to the running result of the RSTP
protocol, the multicast request packets are sent from the root port or the default port (when the
device is a root bridge), and the other ports in the VLAN serve as subtending ports.
Issue 01 (2011-07-30)
503
Multicast Server
Router
0/3
0
1
2
3
IPMD
0/3
0
1
2
3
IPMD
0/15
C
S
R
B
UA5000_A
0/15
C
S
R
B
0/3
0/15
C
S
R
B
0
1
2
3
IPMD
UA5000_B
UA5000_C
0/3
0/15
C
S
R
B
IPMD
UA5000_D
Modem
PC
NOTE
The procedures for configuring the four devices forming an RSTP ring network are similar. Unless
otherwise stated, all the four devices must be configured.
Procedure
Step 1 For details on configuring the RSTP ring network, see 9 Configuring RSTP.
Step 2 Run the igmp uplink-port command to set port 0/3/0 on specified nodes UA5000_A and
UA5000_D on the RSTP ring network as multicast uplink ports.
Issue 01 (2011-07-30)
504
Step 3 Run the igmp uplink-port-mode program command to set port 0/3/0 on specified nodes
UA5000_A and UA5000_D to be in the program mode.
Step 4 Run the igmp uplink-port-mode rstp command to set the ports on specified nodes
UA5000_B and UA5000_C on the RSTP ring network as RSTP ports.
The multicast service can run on an RSTP ring network only after a multicast uplink port is
configured as an RSTP port. After the configuration is complete, multicast packets are forwarded
from the root port.
Step 5 Run the igmp cascade-port command to configure multicast cascade ports.
Set the following ports on an RSTP ring network as multicast cascade ports. This ensures that
services are switched to a normal link when a link on the RSTP ring network fails.
l Node UA5000_A: ports 0/3/1 and 0/3/2
l Nodes UA5000_B and UA5000_C: ports 0/3/0 and 0/3/1
NOTE
The multicast cascade ports have been added to the multicast VLAN by using the port vlan command.
Prerequisite
The required parameters have been configured for the RRPP ring network. For details, see 10.2
Configuration Example of the Single RRPP Ring Networking.
Networking
CAUTION
The RRPP protocol and the Rapid Spanning Tree Protocol (RSTP) are mutually exclusive.
As shown in Figure 27-3, UA5000_1, UA5000_2, UA5000_3, and UA5000_4 form an RRPP
ring network. RRPP efficiently prevents broadcast storms caused by data loops when links on
an RRPP ring network are running properly, and rapidly restores communication among nodes
on an RRPP ring network when a link fails.
Before enabling the multicast service on the RRPP ring network, add both the multicast uplink
port and cascade ports to a user VLAN. Multicast request packets are sent from the primary port
on the primary node. The other ports in the user VLAN are cascade ports.
Issue 01 (2011-07-30)
505
Figure 27-3 Example network for the multicast service on an RRPP ring network
Multicast Server
Router
0/2
0/11
C
S
R
B
0
1
2
3
IPMD
0/2
Master node:
UA5000_1
0/11
0/2
C
S
R
B
0
1
2
3
IPMD
0/11
C
S
R
B
0
1
2
3
Transmission node:
UA5000_2
IPMD
0/2
0
1
2
3
Transmission node:
UA5000_4
0/11
C
S
R
B
Transmission node:
UA5000_3
IPMD
Modem
Multicast Service
RRPP Ring
PC
NOTE
The procedures for configuring the four devices forming an RRPP ring network are similar. Unless
otherwise stated, all the four devices must be configured.
Procedure
Step 1 Configure the multicast service. For details, see 27.2 Configuring the Multicast Service on a
Standalone NE.
Step 2 Run the igmp uplink-port command to set port 0/2/3 on primary node as a multicast uplink
port.
Step 3 Run the igmp uplink-port-mode program command to set port 0/2/3 on the master node to be
in the program mode.
Step 4 Run the igmp uplink-port command to set ports on the transmission nodes as multicast uplink
ports.
Issue 01 (2011-07-30)
506
Set ports 0/2/0 and 0/2/1 on the transmission nodes on an RRPP ring network as multicast uplink
ports.
Step 5 Run the igmp uplink-port-mode RRPP command to set ports on the transmission nodes as
RRPP ports.
The multicast service can run on an RRPP ring network only after a multicast uplink port is
configured as an RRPP port. After the configuration is complete, multicast packets are forwarded
from the root port.
Step 6 Run the igmp cascade-port command to configure multicast cascade ports.
Set ports 0/2/0 and 0/2/1 on all the nodes on an RRPP ring network as multicast cascade ports.
This ensures that services are switched to a normal link when a link on the RRPP ring network
fails.
Step 7 Run the save command to save the configuration data.
----End
Service Requirements
l
Multicast programs are configured statically and multicast users are authenticated.
The users access the programs provided by ISP 1 and ISP 2 in the ADSL2+ IPoE mode.
Issue 01 (2011-07-30)
507
Program:
224.1.1.20
224.1.1.21
ISP 2
ISP 1
10.10.10.10
10.10.10.11
Router
0/3/1
VLAN10
I
P
M
D
UA5000
C
S
R
D
Port:0/7/0
0/7
Port:0/7/1
ADSL modem
ADSL modem
STB
STB
TV
TV
Prerequisites
The license for the multicast program or the multicast user is already requested and installed.
Issue 01 (2011-07-30)
508
Procedure
Step 1 Configure the multicast program and multicast source.
The multicast source IP address of ISP1 is configured to 10.10.10.10 and the multicast source
IP address of ISP2 is configured to 10.10.10.11.
1.
Configure the multicast protocol, multicast uplink port, and program list for ISP1 on the
UA5000.
Multicast VLANs adopt IGMP proxy and the IGMP version is IGMP V3 (system default).
The uplink port is 0/3/1. This uplink port is added to VLAN 10. Programs 224.1.1.1 and
224.1.1.2 are statically configured. The program bandwidth is 6000 kbit/s.
huawei(config)#vlan 10 smart
huawei(config)#port vlan 10 0/3 1
huawei(config)#btv
huawei(config-btv)#igmp mode proxy
huawei(config-btv)#igmp uplink-port 0/3/1 100
huawei(config-btv)#igmp program add name program1 ip
10.10.10.10 vlan 10 bind 0/3/1 bandwidth 6000 hostip
huawei(config-btv)#igmp program add name program2 ip
10.10.10.10 vlan 10 bind 0/3/1 bandwidth 6000 hostip
huawei(config-btv)#quit
2.
224.1.1.1 sourceip
10.0.0.254 log enable
224.1.1.2 sourceip
10.0.0.254 log enable
program3 ip
5000 hostip
program4 ip
5000 hostip
224.1.1.20
10.0.0.254
224.1.1.21
10.0.0.254
sourceip
log enable
sourceip
log enable
Step 2 Configure right profiles named music and movie with the watch right, and bind the right profiles
to the programs.
huawei(config)#btv
huawei(config-btv)#igmp
huawei(config-btv)#igmp
huawei(config-btv)#igmp
huawei(config-btv)#igmp
huawei(config-btv)#igmp
huawei(config-btv)#quit
profile
profile
profile
profile
profile
2.
Issue 01 (2011-07-30)
509
3.
4.
Activate the ports, and bind the ports to the line profile and alarm profile.
ADSL2+ port 0/7/0 and port 0/7/1 are bound to the default line profile (line profile 1) and
the default alarm profile (alarm profile 1).
huawei(config)#interface adsl 0/7
huawei(config-if-adsl-0/7)#deactivate 0
huawei(config-if-adsl-0/7)#activate 0 profile-index 1
huawei(config-if-adsl-0/7)#alarm-config 0 1
huawei(config-if-adsl-0/7)#deactivate 1
huawei(config-if-adsl-0/7)#activate 1 profile-index 1
huawei(config-if-adsl-0/7)#alarm-config 1 1
huawei(config-if-adsl-0/7)#quit
----End
Result
l
Through IP addresses of multicast source ISP1, user 1 can watch the programs with IP
addresses 224.1.1.1 and 224.1.1.2 that are provided by ISP1 and that are bound to right
profile music, but user 1 cannot watch the program with IP address 224.1.1.20.
Through IP addresses of multicast source ISP2, user 2 can watch the program with IP
address 224.1.1.21 that is provided by ISP2 and that is bound to right profile movie.
Configuration File
(config)#
vlan 10 smart
btv
igmp mode proxy
y
igmp uplink-port 0/3/1 100
igmp program add name program1 ip 224.1.1.1 sourceip 10.10.10.10 vlan 10 bind 0/3/1
bandwidth 6000 hostip 10.0.0.254 log enable
igmp program add name program2 ip 224.1.1.2 sourceip 10.10.10.10 vlan 10 bind 0/3/1
bandwidth 6000 hostip 10.0.0.254 log enable
igmp program add name program3 ip 224.1.1.20 sourceip 10.10.10.11 vlan 10 bind
0/3/1 bandwidth 5000 hostip 10.0.0.254 log enable
igmp program add name program4 ip 224.1.1.21 sourceip 10.10.10.11 vlan 10 bind
0/3/1 bandwidth 5000 hostip 10.0.0.254 log enable
igmp profile rename profile1 music
igmp profile profile-name music program-name program1 watch
igmp profile profile-name music program-name program2 watch
igmp profile rename profile2 movie
igmp profile profile-name movie program-name program4 watch
quit
service-port vlan 10 adsl 0/7/0 vpi 0 vci 35 rx-cttr 2 tx-cttr 2
service-port vlan 10 adsl 0/7/1 vpi 0 vci 35 rx-cttr 2 tx-cttr 2
btv
igmp user add port 0/7/0 adsl 0 35 auth log enable
igmp user add port 0/7/1 adsl 0 35 auth log enable
igmp user bind-profile port 0/7/0 profile-name music
igmp user bind-profile port 0/7/1 profile-name movie
Issue 01 (2011-07-30)
510
quit
interface adsl 0/7
deactivate 0
activate 0 profile-index 1
alarm-config 0 1
deactivate 1
activate 1 profile-index 1
alarm-config 1 1
quit
save
Prerequisite
The license for the multicast program or the multicast user is already requested and installed.
Service Requirements
l
Multicast programs are configured statically and multicast users are authenticated.
Multicast user 1, user 2, and user 3 connected to the same port on the UA5000 can request
for programs provided by ISP1, ISP2, and ISP3 respectively. User 1 can request for program
1 and program 2 provided by ISP1. User 2 can request for program 4 provided by ISP2.
User 3 can request for program 5 provided by ISP3.
Issue 01 (2011-07-30)
511
Procedure
Step 1 Configure the multicast program and multicast source.
The planned multicast source IP addresses of ISP1, ISP2, and ISP3 are 10.10.10.10, 10.10.10.11,
and 10.10.10.12 respectively.
1.
2.
Configure the multicast protocol, multicast uplink port, and program list for ISP1 on the
UA5000.
Multicast VLANs adopt IGMP proxy and the IGMP version is IGMP V3 (system default).
Programs 224.1.1.1 and 224.1.1.2 are statically configured. The program bandwidth is 6000
kbit/s.
huawei(config)#btv
huawei(config-btv)#igmp mode proxy
huawei(config-btv)#igmp uplink-port 0/3/1 100
huawei(config-btv)#igmp program add name program1 ip 224.1.1.1 sourceip
10.10.10.10 vlan 100 bind 0/3/1 bandwidth 6000 hostip 10.0.0.254 log enable
video-vlan 10
huawei(config-btv)#igmp program add name program2 ip 224.1.1.2 sourceip
10.10.10.10 vlan 100 bind 0/3/1 bandwidth 6000 hostip 10.0.0.254 log enable
video-vlan 10
3.
4.
Step 2 Configure right profiles profile 1, profile 2, and profile 3 with the watch right, and bind the right
profiles to programs.
huawei(config-btv)#igmp
huawei(config-btv)#igmp
huawei(config-btv)#igmp
huawei(config-btv)#igmp
huawei(config-btv)#quit
profile
profile
profile
profile
profile-name
profile-name
profile-name
profile-name
profile1
profile1
profile2
profile3
program-name
program-name
program-name
program-name
program1
program2
program4
program5
watch
watch
watch
watch
512
1.
2.
3.
4.
Activate the ports, and bind the ports to the line profile and alarm profile.
Line profile 1 (system default) and alarm profile 1 (system default) are bound to VDSL2
port 0/7/0.
huawei(config)#interface vdsl 0/7
huawei(config-if-vdsl-0/7)#deactivate 0
huawei(config-if-vdsl-0/7)#activate 0 profile-index 1
huawei(config-if-vdsl-0/7)#alarm-config 0 1
huawei(config-if-adsl-0/7)#quit
----End
Result
l
Different multicast users connected to the same VDSL2 port can watch programs provided
by multicast sources ISP1, ISP2, and ISP3 respectively.
According to right profile 1, user 1 can watch programs with IP addresses 224.1.1.1 and
224.1.1.2 provided by ISP1.
According to right profile 2, user 2 can watch the program with IP address 224.1.1.21
provided by ISP2.
Issue 01 (2011-07-30)
513
According to right profile 3, user 3 can watch the program with IP address 224.1.1.50
provided by ISP3.
Configuration File
(config)#
vlan 100,200,300 smart
port vlan 100,200,300 0/3 1
btv
igmp mode proxy
igmp uplink-port 0/3/1 100
igmp program add name program1 ip 224.1.1.1 sourceip 10.10.10.10 vlan 100 bind
0/3/1 bandwidth 6000 hostip 10.0.0.254 log enable video-vlan 10
igmp program add name program2 ip 224.1.1.2 sourceip 10.10.10.10 vlan 100 bind
0/3/1 bandwidth 6000 hostip 10.0.0.254 log enable video-vlan 10
igmp program add name program3 ip 224.1.1.20 sourceip 10.10.10.11 vlan 200 bind
0/3/1 bandwidth 5000 hostip 10.0.0.254 log enable video-vlan 20
igmp program add name program4 ip 224.1.1.21 sourceip 10.10.10.11 vlan 200 bind
0/3/1 bandwidth 5000 hostip 10.0.0.254 log enable video-vlan 20
igmp program add name program5 ip 224.1.1.50 sourceip 10.10.10.12 vlan 300 bind
0/3/1 bandwidth 5000 hostip 10.0.0.254 log enable video-vlan 30
igmp program add name program6 ip 224.1.1.51 sourceip 10.10.10.12 vlan 300 bind
0/3/1 bandwidth 5000 hostip 10.0.0.254 log enable video-vlan 30
igmp profile profile-name profile1 program-name program1 watch
igmp profile profile-name profile1 program-name program2 watch
igmp profile profile-name profile2 program-name program4 watch
igmp profile profile-name profile3 program-name program5 watch
quit
service-port vlan 100 vdsl mode atm 0/7/0 vpi 0 vci 35 multi-service user-vlan 10
rx-cttr 2 tx-cttr 2
service-port vlan 200 vdsl mode atm 0/7/0 vpi 0 vci 35 multi-service user-vlan 20
rx-cttr 2 tx-cttr 2
service-port vlan 300 vdsl mode atm 0/7/0 vpi 0 vci 35 multi-service user-vlan 30
rx-cttr 2 tx-cttr 2
btv
igmp user add port 0/7/0 vdsl mode atm 0 35 user-vlan 10 auth log enable video-vlan
tagged
igmp user add port 0/7/0 vdsl mode atm 0 35 user-vlan 20 auth log enable video-vlan
tagged
igmp user add port 0/7/0 vdsl mode atm 0 35 user-vlan 30 auth log enable video-vlan
tagged
igmp user bind-profile service-port vdsl mode atm 0/7/0 0 35 user-vlan 10 profilename profile1
igmp user bind-profile service-port vdsl mode atm 0/7/0 0 35 user-vlan 20 profilename profile2
igmp user bind-profile service-port vdsl mode atm 0/7/0 0 35 user-vlan 30 profilename profile3
quit
interface vdsl 0/7
deactivate 0
activate 0 profile-index 1
alarm-config 0 1
quit
save
Issue 01 (2011-07-30)
514
28
Context
The multicast function of the UA5000 is used for multicast video services, such as live TV and
near-video on demand (NVOD).
In terms of multicast processing mode, the UA5000 supports the IGMP proxy and IGMP
snooping Layer 2 multicast protocols. IGMP proxy and IGMP snooping both support multicast
video data forwarding, but the two modes have different processing mechanisms.
l
IGMP snooping obtains related information and maintains the multicast forwarding entries
by listening to the IGMP packets in the communication between the user and the multicast
router.
IGMP proxy intercepts the IGMP packets between the user and the multicast router,
processes the IGMP packets (the report packets can be sent only when the user orders the
program for the first time and the leave packets can be sent only when the last user leaves
the group of a program), and then forwards the IGMP packets to the upper-layer multicast
router. For the multicast user, the UA5000 is a multicast router that implements the router
functions in the IGMP protocol; for the multicast router, the UA5000 is a multicast user.
In terms of multicast program configuration mode, the UA5000 supports statically configuring
a multicast program library and dynamically generating a multicast program library.
l
Issue 01 (2011-07-30)
515
list need not be configured or maintained; however, the program management, user
multicast bandwidth management, program preview, and program prejoin functions are not
supported.
The UA5000 supports the configuration of a single multicast user on a single port and the
configuration of multicast users on a single port.
l
A single multicast user on a single port: A port supports one multicast user.
Multiple multicast users on a single port: Different multicast users are differentiated based
on service streams and each xDSL port supports a maximum of eight multicast users. This
mode provides flexible networking methods and helps increase the bandwidth utilization
ratio.
Table 28-1 shows the specifications of the control boards on the UA5000 for carrying the
multicast service.
Table 28-1 Specifications of the control boards on the UA5000 for carrying the multicast service
Access Mode
Non-MVLAN Multicast
Service
MVLAN Multicast
Service
H601IPMD, H601IPMB,
H612IPMB, and H612IPMD
boards
H601IPMB, H612IPMB,
and H612IPMD boards
H612IPMD board
H601IPMB, H612IPMB,
and H612IPMD boards
516
28.7 Configuration Example of the Multicast Video Service in Dynamic Mode (Single Port for
a Single Multicast User)
The multicast video service in dynamic mode does not need to be intensively managed by a
device. Users automatically obtain the program menu from the electronic program guide (EPG)
server, reducing maintenance cost caused by frequent program change. The EPG server can be
used to maintain programs. This topic describes how to configure the multicast video service in
dynamic mode (single port for a single multicast user).
28.8 Configuration Example of the Multicast Video Service in Static Mode (Single Port for
Multiple Multicast Users)
The multicast video service in static mode provides carriers with an intensive program
management mode by configuring the parameters such as the maximum bandwidth and rights
management. This topic describes how to configure the multicast video service in static mode
(single port for multiple multicast users).
28.9 Configuration Example of the Multicast Video Service in Dynamic Mode (Single Port for
Multiple Multicast Users)
The multicast video service in dynamic mode does not need to be intensively managed by a
device. Users automatically obtain the program menu from the electronic program guide (EPG)
server, reducing maintenance cost caused by frequent program change. The EPG server can be
used to maintain programs. This topic describes how to configure the multicast video service in
dynamic mode (single port for multiple multicast users).
Issue 01 (2011-07-30)
517
Context
Table 28-2 lists the default settings of the multicast service of the UA5000 Universal Access
Unit.
Table 28-2 Default settings of the multicast service
Feature
Default Setting
Multicast protocol
Disabled
IGMP version
V3
Enabled
Multicast preview
Enabled
Enabled
Application Context
The multicast feature of the UA5000 Universal Access Unit is applied to the live TV and nearvideo on demand (NVOD) multicast video services. The UA5000 Universal Access Unit runs
the IGMP proxy or IGMP snooping protocol, and the interconnected device can run the IGMP
proxy, IGMP snooping, or multicast router protocol.
Currently, the multicast application of the UA5000 Universal Access Unit is oriented to L2, and
the UA5000 Universal Access Unit forwards data based on VLAN ID+multicast MAC address.
A multicast program on the network is identified by VLAN ID + multicast IP address uniquely.
The UA5000 Universal Access Unit differentiates multicast sources by VLAN ID. It allocates
a unique VLAN ID to each multicast source, controls the multicast domain and the user right
based on the multicast VLAN ID, and provides a platform for different ISPs to implement
different multicast video services.
Prerequisites
The license for the multicast program or the multicast user is already requested and installed.
Issue 01 (2011-07-30)
518
Data Plan
Before configuring the multicast video service, plan the data items as listed in Table 28-3.
Table 28-3 Data plan for configuring the multicast service on a standalone UA5000 Universal
Access Unit
Issue 01 (2011-07-30)
Device
Data Item
Remarks
UA5000 Universal
Access Unit
Multicast VLAN
L2 multicast protocol
IGMP version
Program list
Upper-layer
multicast router
IGMP version
Home gateway or
modem
IGMP version
519
Procedure
----End
Context
Table 28-4 lists the global multicast parameters.
Table 28-4 Default settings of global multicast parameters
Issue 01 (2011-07-30)
Item
Default Setting
1024
Authentication
Enabled
Robustness variable
125
100
100
10
400
Disabled
Preview switch
Enabled
30
04:00:00
Default
520
Item
Default Setting
Enabled
Disable
600
200
CDR switch
Disabled
All
Disabled
The purposes and principles of the general query and the group-specific query are as follows:
The description of a general query is as follows:
l
Purpose: A general query packet is periodically sent by the UA5000 Universal Access
Unit to check whether there is any multicast user who leaves the multicast group without
sending the leave packet. Based on the query result, the UA5000 Universal Access Unit
periodically updates the multicast forwarding table and releases the bandwidth of the
multicast user that has left the multicast group.
Principles: The UA5000 Universal Access Unit periodically sends the general query packet
to all online IGMP users. If the UA5000 Universal Access Unit does not receive the
response packet from a multicast user within a specified time (Robustness variable x
General query interval + Maximum response time of a general query), it regards the user
as having left the multicast group and deletes the user from the multicast group.
Purpose: A group-specific query packet is sent by the UA5000 Universal Access Unit after
a multicast user that is not configured with the quick leave attribute sends the leave packet.
The group-specific query packet is used to check whether the multicast user has left the
multicast group.
Principles: When a multicast user leaves a multicast group, for example, switches to another
channel, the user unsolicitedly sends a leave packet to the UA5000 Universal Access
Unit. If the multicast user is not configured with the quick leave attribute, the UA5000
Universal Access Unit sends a group-specific query packet to the multicast group. If the
UA5000 Universal Access Unit does not receive the response packet from the multicast
user within a specified duration (Robustness variable x Group-specific query interval +
Maximum response time of a group-specific query), it deletes the multicast user from the
multicast group.
For the general query, the UA5000 queries the multicast packets of all the users. For the groupspecified query, the UA5000 queries the multicast packets of the user who watches the specified
multicast program.
Table 28-5 lists the default settings of the multicast global parameters. In the actual application,
you can modify the values according to the data plan.
Issue 01 (2011-07-30)
521
Table 28-5 Default settings of general query and group-specific query parameters
Parameter
Default Value
Group-specific query
parameter
Query interval: 1s
Maximum response time: 0.8s.
Robustness variable (query times): 2
Procedure
Step 1 Configure the general query parameters.
1.
Run the igmp proxy router gen-query-interval command to set the general query interval.
By default, the general query interval is 125s.
2.
Run the igmp proxy router gen-response-time command to set the maximum response
time of the general query. By default, the maximum response time of the general query is
10s.
3.
Run the igmp proxy router robustness command to set the robustness variable (query
times) of the general query. By default, the robustness variable (query times) is 2.
Run the igmp proxy router sp-query-interval command to set the group-specific query
interval. By default, the group-specific query interval is 1s.
2.
Run the igmp proxy router sp-response-time command to set the maximum response
time of the group-specific query. By default, the maximum response time of the groupspecific query is 0.8s.
3.
Run the igmp proxy router sp-query-number command to set the robustness variable
(query times) of the group-specific query. By default, the robustness variable (query times)
is 2.
Step 3 Run the display igmp config global command to check whether the values of the multicast
parameters are correct.
----End
Example
To configure the multicast general query parameters by setting the query interval to 150s,
maximum response time to 20s, and number of queries to 3, do as follows:
huawei(config)#btv
huawei(config-btv)#igmp proxy router gen-query-interval 150
huawei(config-btv)#igmp proxy router gen-response-time v3 200
huawei(config-btv)#igmp proxy router robustness 3
huawei(config-btv)#display igmp config global
-------------------------------------------------------Program number of license
: 1024
Authorization
: enable
Robustness variable
: 3
General query interval(s)
: 150
Issue 01 (2011-07-30)
522
To configure the multicast group-specific query parameters by setting the query interval to 20s,
maximum response time to 10s, and number of queries to 3, do as follows:
huawei(config)#btv
huawei(config-btv)#igmp proxy router sp-query-interval 200
huawei(config-btv)#igmp proxy router sp-response-time v3 100
huawei(config-btv)#igmp proxy router sp-query-number 3
huawei(config-btv)#display igmp config global
-------------------------------------------------------Program number of license
: 1024
Authorization
: enable
Robustness variable
: 3
General query interval(s)
: 150
V2 General query response time(0.1s) : 100
V3 General query response time(0.1s) : 200
Specific query interval(0.1s)
: 200
V2 Specific query response time(0.1s) : 8
V3 Specific query response time(0.1s) : 100
Specific query number
: 3
V2 router present timeout(s)
: 400
User action report switch
: disable
Preview switch
: enable
Recognition time(s)
: 30
The time of reset preview-count
: 04:00:00
Auto create log interval(h)
: 2
Uplink port mode
: default
Bandwidth management switch
: enable
Query offline user switch
: disable
CDR auto report interval(s)
: 600
CDR auto report number
: 200
CDR switch
: disable
IGMP Packet encapsulation
: all
IGMP ECHO switch
: disable
---------------------------------------------------------
Issue 01 (2011-07-30)
523
Context
To create a multicast VLAN, a common VLAN must be created first. The multicast VLAN can
be the same as the unicast VLAN. In this case, the two VLANs can share the same service stream
channel. The multicast VLAN can be different from the unicast VLAN. In this case, the two
VLANs use different service stream channels.
One user port can be added to multiple multicast VLANs under the following restrictions:
l
Among all the multicast VLANs of a user port, only one multicast VLAN is allowed to
have dynamically generated programs.
The IGMP versions supported by all the multicast VLANs of the user port must be the
same.
One user port is not allowed to belong to multiple multicast VLANs that are in the IGMP
V3 snooping mode.
Table 28-6 lists the default settings of the multicast VLAN attributes, including the L2 multicast
protocol, IGMP version, multicast program, and multicast uplink port.
Table 28-6 Default settings of the multicast VLAN attributes
Parameter
Default Value
IGMP mode
off
IGMP version
IGMP V3
Log switch
Enable
Disable
Disable
10
IGMP priority
Enable
Procedure
Step 1 Create a multicast VLAN.
1.
Run the vlan command to create a VLAN, and set the VLAN type according to the actual
application. For details on the VLAN configuration, see Configuring VLAN.
2.
Run the multicast-vlan command to set the created VLAN to a multicast VLAN.
524
Static configuration mode: Configure a program list for the multicast VLAN beforehand,
and bind the program to a rights profile to implement program right management.
1.
Run the igmp match mode enable command to set the static configuration mode. By
default, the system adopts the static configuration mode.
2.
Run the igmp program add [name name ] ip ip-addr [ sourceip ip-addr ] [ hostip ipaddr ] command to add a multicast program.
NOTE
If the IGMP version of a multicast VLAN is V3, the program must be configured with a source IP
address. If the IGMP version of a multicast VLAN is V2, the program must not be configured with
a source IP address.
3.
4.
When a user is bound to multiple rights profiles, and the rights profiles have different rights to a
program, the right with the highest priority prevails. You can run the igmp right-priority command
to adjust the priorities of the four rights: watch, preview, forbidden, and idle. By default, the priorities
of the four rights are forbidden > preview > watch > idle.
1.
Run the igmp match mode disable command to set the dynamic generation mode.
CAUTION
The igmp match mode command can be executed only when the IGMP mode is disabled.
2.
Run the igmp match group command to configure the IP address range of the program
group that can be dynamically generated. Users can order only the programs whose IP
addresses are within the specified range.
Run the igmp uplink-port command to configure the multicast uplink port. The packets
of the multicast VLAN corresponding to the uplink port are forwarded and received by this
uplink port.
2.
In the BTV mode, run the igmp uplink-port-mode command to change the mode of the
multicast uplink port. By default, the port is in the default mode. In the RSTP network, the
port adopts the RSTP mode. In the RRPP network, the port adopts the RRPP mode.
l Default mode: If the multicast VLAN contains only one uplink port, the multicast
packets that go upstream can be sent only by this port. If the multicast VLAN contains
multiple upstream ports, the multicast packets that go upstream are sent by all the
upstream ports.
Issue 01 (2011-07-30)
525
l rstp: Indicates the RSTP mode. The IGMP uplink port is the root port used by RSTP.
You can run the display stp command to query the root port of the device.
l rrpp: Indicates the RRPP mode. The IGMP uplink port is the primary port used by RRPP.
You can run the display rrpp verbose domain command to query the current primary
port of the device.
NOTE
RRPP refers to Rapid Ring Protection Protocol. When RRPP is used, the ring network is formed
by the device and the redundancy links are retained. When a link on the ring network is faulty,
the service is automatically switched to the standby link. On the RRPP ring network, the uplink
port on the device must work in the RRPP mode. This ensures that the multicast uplink port can
be switched when the link is switched. In this manner, the continuity of the multicast service is
ensured.
526
l In the IGMP snooping mode, the IGMP packets forwarded to the network side adopt the
priority of the user service stream. The priority of the service stream is set through the traffic
profile.
Step 7 Check whether the configuration is correct.
l Run the display igmp config vlan command to query the attributes of the multicast VLAN.
l Run the display igmp program vlan command to query the information about the program
of the multicast VLAN.
----End
Example
Assume the following configurations: Multicast VLAN 101 is created, the program is configured
with the static attribute, the IP address of the program is 224.1.1.1, the uplink port of the multicast
VLAN is 0/2/0, the IGMP proxy is used, and the IGMP version is IGMP V3. To perform these
configurations, do as follows:
huawei(config)#vlan 101 smart
huawei(config)#multicast-vlan 101
huawei(config-mvlan101)#igmp match mode enable
huawei(config-mvlan101)#igmp program add name movie ip 224.1.1.1 sourceip 10.10.
10.1 hostip 10.0.0.2
huawei(config-mvlan101)#igmp uplink-port 0/2/0
huawei(config-mvlan101)#igmp mode proxy
Are you sure to change IGMP mode?(y/n)[n]:y
huawei(config-mvlan101)#igmp version v3
Assume the following configurations: Multicast VLAN 101 is created, the program is configured
with the dynamic attribute, the IP address for the dynamic program group ranges from 224.1.1.1
to 224.1.1.100, the uplink port of the multicast VLAN is 0/2/0, the IGMP proxy is used, and the
IGMP version is IGMP V3. To perform these configurations, do as follows:
huawei(config)#vlan 101 smart
huawei(config)#multicast-vlan 101
huawei(config-mvlan101)#igmp match mode disable
This operation will delete all the programs in current multicast vlan
Are you sure to change current match mode? (y/n)[n]: y
Command is being executed, please wait...
Command has been executed successfully
huawei(config-mvlan101)#igmp match group ip 224.1.1.1 to-ip 224.1.1.100
huawei(config-mvlan101)#igmp uplink-port 0/2/0
huawei(config-mvlan101)#igmp mode proxy
Are you sure to change IGMP mode?(y/n)[n]:y
huawei(config-mvlan101)#igmp version v3
Prerequisite
The multicast VLAN and program have been configured. For details, see 28.2.2 Configuring
the Multicast VLAN and the Multicast Program.
Before configuring the multicast user, you must create a service channel. The procedure is as
follows:
1.
Issue 01 (2011-07-30)
527
2.
3.
Run the interface xDSL frameid/slotid command to enter the board mode to configure
xDSL port.
NOTE
In the interface xDSL frameid/slotid command, keyword xDSL can be adsl, shdsl, or vdsl.
4.
The multicast service supports the IPoE and PPPoE user access modes but does not support the IPoEoA
or PPPoEoA user access mode.
Context
Before configuring the multicast user in the MVLAN mode, add the port receiving the multicast
service, configure the related attributes (such as the maximum number of programs supported
by the port and whether to perform authentication) of the port, and bind the multicast user to the
multicast VLAN.
Table 28-7 lists the default settings of the attributes related to the multicast user.
Table 28-7 Default settings of the attributes related to the multicast user
Item
Default Setting
mac-based
Procedure
Step 1 In global config mode, run the btv command to enter BTV mode.
Step 2 Configure the multicast user and the multicast user attributes.
1.
2.
(Optional) Run the igmp user add portframeid/slotid/portid { adsl | { shdsl | vdsl } mode
atm } vpi vcivideovpi vci { auth | no-auth } command to configure the PVC that carries
the multicast video stream.
When configuring the multicast service, configure video to specify the PVC that carries
the multicast video stream. In this case, the multicast video stream and the multicast control
packet stream are carried by different PVCs. If no PVC is specified for carrying the
Issue 01 (2011-07-30)
528
multicast video stream, the multicast video stream and the multicast control packet stream
are carried on the same PVC.
3.
Configure the maximum number of programs that can be watched by the multicast user.
l Run the igmp user add portframeid/slotid/portid { adsl | { shdsl | vdsl } } { auth |
no-auth } max-program { max-program-num | no-limit } command to configure the
maximum number of programs that can be watched concurrently by the multicast user.
A maximum of 32 programs can be watched by the multicast user concurrently. The
default setting is eight programs.
l Run the igmp user watch-limit portframeid/slotid/portid stream { hdtv | sdtv |
streaming-video } { watch-limit | no-limit } command to configure the maximum
number of programs of each level that can be watched by the multicast user.
4.
After configuring multicast user authentication, you need to enable the global authentication function
to make the configuration take effect. The default global authentication function of the multicast user
is enabled. You can run the igmp proxy authorization command to change the configuration.
2.
Bind the multicast user to the rights profile. Binding the multicast user to the rights profile
to implement user authentication.
Run the igmp user bind-profile command to bind the rights profile to the multicast user.
After the binding, the multicast user has the rights to the programs configured in the profile.
NOTE
The multicast rights profile bound with the multicast user must be available. You can run the igmp
profile command to create the profile.
529
In multicast VLAN mode, run the igmp multicast-vlan member command to bind the user to
the multicast VLAN. Then, the multicast user becomes a multicast member of the multicast
VLAN and can order the programs configured in the multicast VLAN.
Step 5 Run the display igmp user command to check whether the multicast user is configured correctly.
----End
Example
l
Issue 01 (2011-07-30)
530
The multicast video stream and multicast control packet stream are carried on different
PVCs.
Add two multicast users in VLAN 100 and VLAN 101 to port 0/11/1. The IGMP control
packet stream and video stream are carried on different PVCs. The vpi/vci of the
multicast control packet stream is 0/35. The vpi/vci of the multicast video stream is
0/36.
When the multicast user belongs to VLAN 100, the VLAN ID on the user side is
10, the user authentication is configured, the log report function is enabled, the
maximum number of programs that can be watched is set to 2, and the user is bound
to rights profile movie.
When the multicast user belongs to VLAN 101, the VLAN ID on the user side is
11, the user authentication is configured, the log report function is enabled, the
maximum number of programs that can be watched is set to 6, and the user is bound
to rights profile music.
huawei(config)#service-port vlan 100 adsl 0/11/1 vpi 0 vci 35 multi-service
user-vlan 10
rx-cttr 2 tx-cttr 2
//Create the control packet stream for VLAN 100 of
a multicast user and set vpi/vci to 0/35.
huawei(config)#service-port vlan 100 adsl 0/11/1 vpi 0 vci 36 multi-service
user-vlan 10
rx-cttr 2 tx-cttr 2
//Create the video stream for VLAN 100 of a multicast
user and set vpi/vci to 0/36.
huawei(config)#service-port vlan 101 adsl 0/11/1 vpi 0 vci 35 multi-service
user-vlan 11
rx-cttr 2 tx-cttr 2
//Create the control packet stream for VLAN 101 of
a multicast user and set vpi/vci to 0/35.
huawei(config)#service-port vlan 101 adsl 0/11/1 vpi 0 vci 36 multi-service
user-vlan 11
rx-cttr 2 tx-cttr 2
//Create the control packet stream for VLAN 101 of
a multicast user and set vpi/vci to 0/36.
huawei(config)#btv
huawei(config-btv)#igmp user add port 0/11/1 adsl 0 35 user-vlan 10 video 0
36 user-vlan 10 auth log enable max-program 2
huawei(config-btv)#igmp user bind-profile smart-vlan 100 profile-name movie
huawei(config-btv)#igmp user add port 0/11/1 adsl 0 35 user-vlan 11 video 0
36 user-vlan 11 auth log enable max-program 6
huawei(config-btv)#igmp user bind-profile smart-vlan 101 profile-name music
huawei(config-btv)#multicast-vlan 100
huawei(config-mvlan100)#igmp multicast-vlan member port 0/11/1 0 35 uservlan 10
huawei(config-mvlan100)#multicast-vlan 101
huawei(config-mvlan101)#igmp multicast-vlan member port 0/11/1 0 35 uservlan 11
Prerequisite
The program matching mode of the multicast VLAN must be the static configuration mode. For
details about the configuration, see 28.2.2 Configuring the Multicast VLAN and the Multicast
Program.
Issue 01 (2011-07-30)
531
Context
If the CAC function is enabled and a user requests a multicast program, the system compares
the remaining bandwidth of the user (bandwidth configured for the user total bandwidth of the
online programs of the user) with the bandwidth of the multicast program. If the remaining
bandwidth of the user is sufficient, the system adds the user to the multicast group. If the
bandwidth is insufficient, the system does not respond to the request of the user.
If the CAC function is disabled, the system does not guarantee the bandwidth of the multicast
program. When the bandwidth is not guaranteed, problems such as mosaic and delay occur in
the multicast program.
Table 28-8 lists the default settings of the CAC parameters.
Table 28-8 Default settings of the CAC parameters
Parameter
Default Value
enable
5000 kbit/s
no-limit
Procedure
Step 1 In the global config mode, run the btv command to enter the BTV mode.
Step 2 Enable the global CAC function.
By default, the global CAC function is already enabled. You can run the igmp bandwidthCAC
{ enable | disable } command to change the setting.
Step 3 Configure the bandwidth of the multicast user.
Run the igmp user add port frameid/slotid/portid { adsl | { shdsl | vdsl } vpi vci { auth | noauth } max-bandwidth command to allocate the maximum bandwidth of the multicast user.
Step 4 Configure the bandwidth of the multicast program.
Run the multicast-vlan command to enter MVLAN mode, and then run the igmp program add
ip ip-addr [ sourceip ip-addr ] bandwidth command to configure the bandwidth of a multicast
program.
NOTE
If the IGMP version of the multicast VLAN is V3, the source IP address of the program in the multicast
VLAN must be configured. If the IGMP version of the multicast VLAN is V2, the source IP address of the
program in the multicast VLAN cannot be configured.
532
Example
To use IGMPv3 multicast protocol, enable bandwidth management for multicast users, set the
user bandwidth to 10 Mbit/s when adding multicast user 0/11/1, and configure the program
bandwidth to 1 Mbit/s when adding multicast program 224.1.1.1, do as follows:
huawei(config)#btv
huawei(config-btv)#igmp bandwidthcAC enable
huawei(config-btv)#igmp user add port 0/11/1 adsl 0 35 auth max-bandwidth 10240
huawei(config-btv)#quit
huawei(config)#multicast-vlan 101
huawei(config-mvlan101)#igmp program add ip 224.1.1.1 sourceip 10.10.10.1
bandwidth 1024
huawei(config)#display igmp config global
-------------------------------------------------------Program number of license
: 1024
Authorization
: enable
Robustness variable
: 2
General query interval(s)
: 30
V2 General query response time(0.1s) : 100
V3 General query response time(0.1s) : 100
Specific query interval(0.1s)
: 10
V2 Specific query response time(0.1s) : 8
V3 Specific query response time(0.1s) : 8
Specific query number
: 2
V2 router present timeout(s)
: 400
User action report switch
: disable
Preview switch
: enable
Recognition time(s)
: 30
The time of reset preview-count
: 04:00:00
Auto create log interval(h)
: 2
Uplink port mode
: default
Bandwidth management switch
: enable
//Enable the global multicast
bandwidth management function.
Query offline user switch
: disable
CDR auto report interval(s)
: 600
CDR auto report number
: 200
CDR switch
: disable
IGMP Packet encapsulation
: all
IGMP ECHO switch
: disable
--------------------------------------------------------huawei(config)#display igmp user port 0/11/1 0 35
{ <cr>|user-8021p<K>|user-encap<K>|user-vlan<K> }:
Command:
display igmp user port 0/11/1 0 35
User
: 0/11/1
State
: offline
Authentication
: auth
Quick leave
: MAC-based
IGMP(vpi/vci)
: 0/35
IGMP FLOW TYPE
: IGMP FLOW PARA
: Video(vpi/vci)
: 0/35
Video FLOW TYPE
: Video FLOW PARA
: Log switch
: enable
Bind profiles
: 0
IGMP version
: IGMP v3
Available programs
: 8
Global leave
: disable
User max bandwidth(kbps)
: 10240
//Indicates that the bandwidth for the
multicast user is 10 Mbit/s. Used bandwidth(kbps)
: 0
Used bandwidth
to max bandwidth(%)
: 0.00
huawei(config)#display igmp program vlan 101 ip 224.1.1.1
{ <cr>||<K> }:
Command:
Issue 01 (2011-07-30)
533
Prerequisite
The program matching mode of the multicast VLAN must be the static configuration mode. For
details about the configuration, see 28.2.2 Configuring the Multicast VLAN and the Multicast
Program.
Context
Compared with normal program watch, program preview restricts the duration for watching a
program after users go online. To be specific, users go offline when the preview duration times
out. After the preview duration, users can order the program again. The number of times for
ordering the program is restricted by the number of times of program preview in a day. The start
time can be configured.
Multicast preview parameters are configured through the preview profile. One program can be
bound to only one preview profile, but one preview profile can be referenced by multiple
programs.
Table 28-9 lists the default settings of the multicast preview parameters.
Table 28-9 Default settings of the multicast preview parameters
Issue 01 (2011-07-30)
Parameter
Default Value
enable
Preview profile
534
Parameter
Default Value
4:00:00
30s
Procedure
Step 1 In the global config mode, run the btv command to enter the BTV mode.
Step 2 Enable the global multicast preview function.
By default, the global multicast preview function is enabled. You can run the igmp preview{
enable | disable } command to change the setting.
Step 3 Configure the preview profile.
Run the igmp preview-profile add command to configure the preview profile, and set the
parameters: maximum preview duration, maximum preview count, and minimum interval
between two previews. The system has a default preview profile with index 0.
Step 4 Bind the program to the preview profile.
In the multicast VLAN mode, run the igmp program add ip ip-addr preview-profile index
command to bind the program to be previewed to the preview profile so that the program has
the preview attributes as defined in the preview profile. By default, the program is bound to the
preview profile with index 0.
NOTE
If the IGMP version of the multicast VLAN is V3, the source IP address of the program in the multicast
VLAN must be configured. If the IGMP version of the multicast VLAN is V2, the source IP address of the
program in the multicast VLAN cannot be configured.
535
l Run the display igmp program command to query the preview profile bound to the multicast
program.
----End
Example
To enable preview of multicast programs by using the system default preview profile, do as
follows:
huawei(config)#btv
huawei(config-btv)#igmp preview enable
Assume that the preview function of the multicast program is enabled, preview profile 1 is
configured, the maximum preview duration is 150s, the maximum preview count is 10, to add
the multicast program whose IP address is 224.1.1.1 and source IP address is 10.10.10.1 and
that is bound with preview profile 1, do as follows:
huawei(config)#btv
huawei(config-btv)#igmp preview enable
huawei(config-btv)#igmp preview-profile add index 1 duration 150 times 10
huawei(config-btv)#quit
huawei(config)#multicast-vlan 101
huawei(config-mvlan101)#igmp program add ip 224.1.1.1 sourceip 10.10.10.1 previewprofile 1
huawei(config-btv)#display igmp config global
-------------------------------------------------------Program number of license
: 1024
Authorization
: enable
Robustness variable
: 2
General query interval(s)
: 30
V2 General query response time(0.1s) : 100
V3 General query response time(0.1s) : 100
Specific query interval(0.1s)
: 10
V2 Specific query response time(0.1s) : 8
V3 Specific query response time(0.1s) : 8
Specific query number
: 2
V2 router present timeout(s)
: 400
User action report switch
: disable
Preview switch
: enable
//Enable the global multicast
program preview function.
Recognition time(s)
: 30
The time of reset preview-count
: 04:00:00
//Use the default setting of
the time for clearing the preview counts
Auto create log interval(h)
: 2
Uplink port mode
: default
Bandwidth management switch
: enable
Query offline user switch
: disable
CDR auto report interval(s)
: 600
CDR auto report number
: 200
CDR switch
: disable
IGMP Packet encapsulation
: all
IGMP ECHO switch
: disable
--------------------------------------------------------huawei(config-btv)#display igmp program vlan 101 ip 224.1.1.1
{ <cr>||<K> }:
Command:
display igmp program vlan 101 ip 224.1.1.1
--------------------------------------------Program index
: 0
Create mode
: static
Program name
: PROGRAM-0
IP address
: 224.1.1.1
VLAN ID
: 101
Host attribute
: enable
Issue 01 (2011-07-30)
536
Log attribute
: enable
Prejoin attribute
: disable
Unsolicited attribute
: disable
Priority
: 7
Host IP
: 0.0.0.0
Bandwidth(kbps)
: 1024
SourceIP
: 10.10.10.1
Preview Profile
: 1
//Bind program preview profile 1.
Numbers of watching
: 0
Program Grade
: ---------------------------------------------
Prerequisite
The program matching mode of the multicast VLAN must be the static configuration mode. For
details about the configuration, see 28.2.2 Configuring the Multicast VLAN and the Multicast
Program.
Context
Multicast program prejoin is similar to program order. The UA5000 Universal Access Unit plays
the role of a user and sends the report packet for receiving in advance the multicast stream from
the upper-layer multicast router to the upstream port.
After the prejoin function is enabled, if the upper-layer multicast router does not support static
multicast entry forwarding, the unsolicited report function needs to be enabled so that the user
can order the program quickly. Generally, the upper-layer multicast router processes the user
request by responding to the group-specific query and the general query.
Table 28-10 lists the default settings of the prejoin parameters.
Table 28-10 Default settings of the prejoin parameters
Parameter
Default Value
Prejoin function
disable
disable
Procedure
Step 1 Enable the prejoin function.
Run the igmp program add ip ip-addr prejoin enable command to enable the prejoin function
of a program. By default, the prejoin function is disabled.
NOTE
If the IGMP version of the multicast VLAN is V3, the source IP address of the program in the multicast
VLAN must be configured. If the IGMP version of the multicast VLAN is V2, the source IP address of the
program in the multicast VLAN cannot be configured.
Issue 01 (2011-07-30)
537
Step 2 (Optional) After the prejoin function is enabled, if the upper-layer multicast router does not
support static multicast entry forwarding, the unsolicited report function needs to be enabled for
IGMP packets.
l Run the igmp program add ip ip-addr unsolicited enable command to enable the
unsolicited report function for IGMP packets. By default, the unsolicited report function is
disabled.
l Run the igmp unsolicited-report interval command to modify the interval for unsolicitedly
reporting IGMP packets. By default, the interval is 10s.
Step 3 Check whether the prejoin function is configured correctly.
l Run the display igmp program command to query the status of the prejoin function and the
unsolicited report function.
l Run the display igmp config vlan command to query the interval for unsolicitedly reporting
IGMP packets.
----End
Example
To enable the prejoin function when adding program 224.1.1.1, do as follows:
huawei(config-mvlan101)#igmp program add ip 224.1.1.1 prejoin enable
huawei(config)#display igmp program vlan 101 ip 224.1.1.1
{ <cr>||<K> }:
Command:
display igmp program vlan 101 ip 224.1.1.1
--------------------------------------------Program index
: 0
Create mode
: static
Program name
: PROGRAM-0
IP address
: 224.1.1.1
VLAN ID
: 10
Host attribute
: enable
Log attribute
: enable
Prejoin attribute
: enable
//Enable the multicast program prejoin
Unsolicited attribute
: disable
Priority
: 7
Host IP
: 0.0.0.0
Bandwidth(kbps)
: 1024
SourceIP
: 10.10.10.1
Preview Profile
: 1
Numbers of watching
: 0
Program Grade
: ---------------------------------------------
Prerequisite
If the syslog is used for reporting multicast logs, the syslog server must be properly configured.
Context
Multicast logs have three control levels: multicast VLAN level, multicast user level, and
multicast program level. The system generates logs only when the logging functions at the three
levels are enabled.
Issue 01 (2011-07-30)
538
When the user stays online for longer than the valid time for generating logs, the system generates
logs in any of the following conditions:
l
The VLAN of the uplink port to which the program is bound changes.
The system supports up to 10240 logs. When the user goes online, the system records only the
online date and time. The system generates a complete log only when the user goes offline.
The UA5000 can report the multicast log to the log server in the syslog mode and the call detailed
record (CDR) mode. By default, the UA5000 reports the log in the syslog mode.
l
Syslog mode: Logs are reported to the syslog server in the form of a single log.
CDR mode: Logs are reported to the log server in the form of a log file (.txt). One log file
contains multiple logs.
Table 28-11 lists the default settings of the multicast logging parameters.
Table 28-11 Default settings of the multicast logging parameters
Issue 01 (2011-07-30)
Parameter
Default Value
Syslog mode
enable
enable
enable
2 hours
30s
539
Procedure
l
2.
3.
2.
Configure the multicast log server and the data transmission mode for the CDR-mode
log report.
Run the file-server auto-backup cdr command to configure the active and standby
multicast log servers.
3.
4.
Issue 01 (2011-07-30)
540
Run the display file-server command to query the configuration of the CDR
multicast log server.
Run the display igmp config global command to query the status and other
parameters of the function of CDR-mode log report.
----End
Example
To configure the multicast log to be reported to log server 10.10.10.1 in the CDR mode and use
the TFTP transmission mode, do as follows:
huawei(config)#file-server auto-backup cdr primary 10.10.10.1 tftp
huawei(config)#btv
huawei(config-btv)#igmp cdr enable
Application Context
Figure 28-1 shows an example network of the multicast service on a cascade network. When
cascaded device UA5000_B needs to provide the multicast service, the cascade port on cascading
device UA5000_A needs to be configured as a multicast cascade port. In this manner, the
cascading device regards the cascaded device as an IGMP user.
Issue 01 (2011-07-30)
541
Multicast Server
Router
I
P
M
0/3/0
0/3/1
C
S
R
B
I
P
M
0/3/0
0/3/1
C
S
R
B
UA5000_A
UA5000_B
0/15
Modem
PC
Modem
PC
Precautions
l
The multicast program of the cascading device must contain the multicast program of the
cascaded device.
The cascading device and cascaded device must belong to the same multicast VLAN.
Procedure
The procedure for configuring the cascading device UA5000_B is the same as the procedure
described in Configuring the Multicast Service on a Single-NE Network.
The procedure for configuring the cascaded device UA5000_A is as follows:
Issue 01 (2011-07-30)
542
1.
For details on configuring the multicast service, see Configuring the Multicast Service
on a Single-NE Network.
2.
The multicast cascade ports have been added to the multicast VLAN by using the port vlan command.
3.
(Optional) Configure the mode for the multicast cascade port to process unknown multicast
packets.
By default, the multicast cascade port transparently transmits the unknown multicast
packets from the lower-layer device. This enables the lower-layer device to be capable of
transparently transmitting unknown multicast packets. It is recommended that you run the
igmp cascade-port frameid/slotid/portid mismatch { transparent | discard } command
to change the preceding mode to discarding in the provisioning of multicast services
requiring high security.
4.
(Optional) When the quick leave function of the multicast user needs to be enabled on the
cascading device, run the igmp cascade-port frameid/slotid/portid quickleave enable
command to enable the quick leave function on the multicast cascading port.
CAUTION
If the lower-layer device does not support the proxy of the IGMP leave packet, all the users
ordering the program may go offline when a user ordering the same program goes offline.
To prevent such a problem, before the multicast cascade port uses the quick leave attribute,
it is recommended that the lower-layer device use IGMP proxy or IGMP snooping mode
and the IGMP leave packet proxy function be enabled on the device.
Prerequisite
The required parameters have been configured for the RSTP ring network. For details, see
Configuring the RSTP.
Application Context
CAUTION
The RRPP protocol and the Rapid Spanning Tree Protocol (RSTP) are mutually exclusive.
Issue 01 (2011-07-30)
543
A ring network is used in service deployment to forward the service more effectively. RSTP is
applicable to the loop network to realize path redundancy by using certain algorithms. They also
prune a loop network into a loop-free tree network. This helps to avoid proliferation and infinite
loop of packets on the loop network.
Figure 28-2 shows an example network of the multicast service on an RSTP ring network.
UA5000_A, UA5000_B, and UA5000_C form an RSTP ring network. It can efficiently prevent
data loop from causing broadcast storm when the Ethernet ring is normal, and restore
communication channels among nodes on the Ethernet ring rapidly when a link fails.
When the multicast service is provided on an RSTP ring network, the multicast uplink port and
the cascade port need to be added to the multicast VLAN. According to the running result of the
RSTP protocol, the multicast request packets are sent from the root port or the default port (when
the device is a root bridge), and the other ports in the multicast VLAN serve as cascade ports.
Issue 01 (2011-07-30)
544
Figure 28-2 Example network of the multicast service on an RSTP ring network
Multicast Server
Router
0/3
0
1
2
3
0/15
C
S
R
B
IPMB
0/3
0
1
2
3
IPMB
UA5000_A
0/15
C
S
R
B
0/3
0/15
C
S
R
B
0
1
2
3
IPMB
UA5000_B
UA5000_C
0/3
0/15
C
S
R
B
IPMB
UA5000_D
Modem
PC
NOTE
The procedures for configuring the four devices forming an RSTP ring network are similar. Unless
otherwise stated, all the four devices must be configured.
Procedure
Step 1 Configure the multicast service. For details, see 28.2 Configuring the Multicast Service on a
Single-NE Network.
Issue 01 (2011-07-30)
545
Step 2 Run the igmp uplink-port-mode rstp command to set the ports on the RSTP ring network as
RSTP ports.
The multicast service can run on an RSTP ring network only after a multicast uplink port is
configured as an RSTP port and a default uplink port is configured for the multicast VLAN.
After the configuration is complete, multicast packets are forwarded from the root port or default
port in the multicast VLAN. The uplink ports on the all nodes on the RSTP ring networ kneed
to be set as RSTP ports.
Step 3 Run the igmp default uplink-port command to set port 0/3/0 on specified node UA5000_A on
the RSTP ring network as multicast uplink port.
Step 4 Run the igmp cascade-port command to configure multicast cascade ports.
Set the following ports on an RSTP ring network as multicast cascade ports. This ensures that
services are switched to a normal link when a link on the RSTP ring network fails.
l Node UA5000_A: ports 0/3/1 and 0/3/2
l Nodes UA5000_B and UA5000_C: ports 0/3/0 and 0/3/1
NOTE
The multicast cascade ports have been added to the multicast VLAN by using the port vlan command.
Step 5 Run the igmp uplink-port command to set port 0/3/0 on specified node UA5000_D on the RSTP
ring network as multicast uplink port.
Step 6 Run the igmp uplink-port-mode program command to set port 0/3/0 on specified node
UA5000_D to be in the program mode.
Step 7 Run the save command to save data.
----End
Prerequisite
The required parameters have been configured for the RRPP ring network. For details, see 10.2
Configuration Example of the Single RRPP Ring Networking.
Application Context
CAUTION
The RRPP protocol and the Rapid Spanning Tree Protocol (RSTP) are mutually exclusive.
As shown in Figure 28-3, the users on UA5000_3 access multicast services. This is used as an
example to describe how to configure the multicast service on an RRPP ring network.
Issue 01 (2011-07-30)
546
UA5000_1, UA5000_2, UA5000_3, and UA5000_4 form an RRPP ring network. RRPP
efficiently prevents broadcast storms caused by data loops when links on an RRPP ring network
are running properly, and rapidly restores communication among nodes on an RRPP ring
network when a link fails.
Before enabling the multicast service on the RRPP ring network, add both the multicast uplink
port and cascade ports to the multicast VLAN. Multicast request packets are sent from the
primary port on the primary node. The other ports in the multicast VLAN are cascade ports.
Figure 28-3 Example network for the multicast service on an RRPP network
Multicast Server
Router
0/2
0/11
C
S
R
B
0
1
2
3
IPMB
0/2
Master node:
UA5000_1
0/11
0/2
C
S
R
B
0
1
2
3
IPMB
0/11
C
S
R
B
0
1
2
3
Transmission node:
UA5000_2
0/2
0
1
2
3
IPMB
Transmission node:
UA5000_4
0/11
C
S
R
B
Transmission node:
UA5000_3
IPMB
Modem
Multicast Service
RRPP Ring
PC
NOTE
The procedures for configuring the four devices forming an RRPP ring network are similar. Unless
otherwise stated, all the four devices must be configured.
Issue 01 (2011-07-30)
547
Procedure
Step 1 Configure a multicast service. For details, see 28.2 Configuring the Multicast Service on a
Single-NE Network.
Step 2 Run the igmp uplink-port-mode rrpp command to set ports on the all nodes as RRPP ports.
The multicast service can run on an RRPP ring network only after a multicast uplink port is
configured as an RRPP port and a default uplink port is configured for the multicast VLAN.
After the configuration is complete, multicast packets are forwarded from the root port or default
port in the multicast VLAN.
Step 3 Run the igmp default uplink-port command to set port 0/2/3 on primary node UA5000_1 on
the RRPP ring network as a multicast uplink port.
Step 4 Run the igmp cascade-port command to configure multicast cascade ports.
Set ports 0/2/0 and 0/2/1 on all the nodes on an RRPP ring network as multicast cascade ports.
This ensures that services are switched to a normal link when a link on the RRPP ring network
fails.
NOTE
The multicast cascade ports have been added to the multicast VLAN by using the port vlan command.
Prerequisite
The user has applied for and installed the required multicast program license or user license.
Service Requirements
The carrier in a region provides the multicast video service, which is accessed by different
multicast users by using different VDSL ports. If users need to order programs provided by
different Internet service providers (ISPs), ISPs are differentiated by VLAN.
l
Multicast programs are configured in static mode and multicast users need to be
authenticated.
User1 can order the programs (provided by ISP1) at 224.1.1.1 and 224.1.1.2; User2 can
order the programs (provided by ISP2) at 224.1.1.3 and 224.1.1.4.
Issue 01 (2011-07-30)
548
The bandwidth limit of multicast User1 is 10240 kbit/s and the bandwidth limit of multicast
User2 is 5120 kbit/s.
Program:
224.1.1.3
224.1.1.4
ISP 1
ISP 2
10.10.10.10
10.10.10.11
Router
VLAN10
VLAN20
Port:0/3/1
V
D
M
B
I
P
M
B
UA5000
V
D
M
B
Port:0/7/0
MVLAN:10
Port:0/8/0
MVLAN:20
Modem
Modem
STB
STB
User1
User2
TV
TV
Procedure
Step 1 Configure a multicast VLAN.
Configure smart VLAN 10 as the multicast domain of ISP1, and smart VLAN 20 as the multicast
domain of ISP2.
1.
Configure the protocol, multicast uplink port, and program list of multicast VLAN 10.
For multicast VLAN 10, configure the IGMP mode to igmp snooping, protocol to IGMPv3
(default value), uplink port ID to 0/3/1, and program addresses to 224.1.1.1 and 224.1.1.2.
huawei(config)#vlan 10 smart
huawei(config)#multicast-vlan 10
Issue 01 (2011-07-30)
549
2.
Configure the protocol, multicast uplink port, and program list of multicast VLAN 20.
For multicast VLAN 20, configure the IGMP mode to igmp snooping, protocol to IGMPv3
(default value), uplink port ID to 0/3/1, and program addresses to 224.1.1.3 and 224.1.1.4.
huawei(config)#vlan 20 smart
huawei(config)#multicast-vlan 20
huawei(config-mvlan20)#igmp mode snooping
huawei(config-mvlan20)#igmp uplink-port 0/3/1
huawei(config-mvlan20)#igmp program add name program3 ip 224.1.1.3 sourceip
10.10.10.11 hostip 10.0.0.254 log enable
huawei(config-mvlan20)#igmp program add name program4 ip 224.1.1.4 sourceip
10.10.10.11 hostip 10.0.0.254 log enable
Step 2 Configure rights profiles music and movie with the watch right, and bind the rights profiles to
the programs.
huawei(config)#btv
huawei(config-btv)#igmp
huawei(config-btv)#igmp
huawei(config-btv)#igmp
huawei(config-btv)#igmp
huawei(config-btv)#igmp
huawei(config-btv)#quit
profile
profile
profile
profile
profile
2.
0/3 1
0/3 1
vlan 10 vdsl mode atm 0/7/0 vpi 0 vci 35 rx-cttr 2
vlan 20 vdsl mode atm 0/8/0 vpi 0 vci 35 rx-cttr 2
3.
4.
Issue 01 (2011-07-30)
550
5.
Activate the user ports and bind them to a line configuration template and an alarm profile.
Bind VDSL port 0/7/0 and VDSL port 0/8/0 with default line configuration template 1 and
default alarm profile 1.
huawei(config)#interface vdsl 0/7
huawei(config-if-vdsl-0/7)#deactivate 0
huawei(config-if-vdsl-0/7)#activate 0 template-index 1
huawei(config-if-vdsl-0/7)#alarm-config 0 1
huawei(config-if-vdsl-0/7)#quit
huawei(config)#interface vdsl 0/8
huawei(config-if-vdsl-0/8)#deactivate 0
huawei(config-if-vdsl-0/8)#activate 0 template-index 1
huawei(config-if-vdsl-0/8)#alarm-config 0 1
huawei(config-if-vdsl-0/8)#quit
----End
Result
The cases are as follows regardless of whether the data path type of the modem to which the
user is connected is ATM or PTM:
l
By using multicast VLAN 10, User1 can watch the programs (provided by ISP1 specified
in rights profile music) at 224.1.1.1 and 224.1.1.2.
By using multicast VLAN 20, User2 can watch the program (provided by ISP2 specified
in rights profile movie) at 224.1.1.4.
Configuration File
#
[config]
vlan 10 smart
multicast-vlan 10
igmp mode snooping
igmp uplink-port 0/3/1
igmp program add name program1 ip 224.1.1.1 sourceip 10.10.10.10 hostip
log enable
igmp program add name program2 ip 224.1.1.2 sourceip 10.10.10.10 hostip
log enable
quit
vlan 20 smart
multicast-vlan 20
igmp mode snooping
igmp uplink-port 0/3/1
igmp program add name program3 ip 224.1.1.3 sourceip 10.10.10.11 hostip
log enable
igmp program add name program4 ip 224.1.1.4 sourceip 10.10.10.11 hostip
log enable
btv
igmp profile add profile-name music
igmp profile profile-name music program-name program1 watch
igmp profile profile-name music program-name program2 watch
igmp profile add profile-name movie
igmp profile profile-name movie program-name program4 watch
quit
port vlan 10 0/3 1
port vlan 20 0/3 1
service-port vlan 10 vdsl mode atm 0/7/0 vpi 0 vci 35 rx-cttr 2 tx-cttr
Issue 01 (2011-07-30)
10.0.0.254
10.0.0.254
10.0.0.254
10.0.0.254
551
service-port vlan 20 vdsl mode atm 0/8/0 vpi 0 vci 35 rx-cttr 2 tx-cttr 2
btv
igmp user add port 0/7/0 vdsl mode atm 0 35 auth log enable max-bandwidth 10240 maxprogram 8
igmp user add port 0/8/0 vdsl mode atm 0 35 auth log enable max-bandwidth 5120 maxprogram 8
igmp user bind-profile port 0/7/0 0 35 profile-name music
igmp user bind-profile port 0/8/0 0 35 profile-name movie
multicast-vlan 10
igmp multicast-vlan member port 0/7/0
quit
multicast-vlan 20
igmp multicast-vlan member port 0/8/0
quit
interface vdsl 0/7
deactivate 0
activate 0 template-index 1
alarm-config 0 1
quit
interface vdsl 0/8
deactivate 0
activate 0 template-index 1
alarm-config 0 1
quit
save
Prerequisite
The user has applied for and installed the required multicast program license or user license.
Service Requirements
The carrier in a region provides the multicast video service, which is accessed by different
multicast users by using different VDSL ports. If users need to order programs provided by
different Internet service providers (ISPs), ISPs are differentiated by VLAN.
l
User1 can order the programs (provided by ISP1) at 224.1.1.1 and 224.1.1.2; User2 can
order the programs (provided by ISP2) at 224.1.1.3 and 224.1.1.4.
Issue 01 (2011-07-30)
552
Program:
224.1.1.3
224.1.1.4
ISP 1
ISP 2
Router
VLAN10
VLAN20
Port:0/3/1
V
D
M
B
I
P
M
B
UA5000
V
D
M
B
Port:0/7/0
MVLAN:10
Port:0/8/0
MVLAN:20
Modem
Modem
STB
STB
User1
User2
TV
TV
Procedure
Step 1 Configure a multicast VLAN.
Configure smart VLAN 10 as the multicast domain of ISP1, and smart VLAN 20 as the multicast
domain of ISP2.
1.
Issue 01 (2011-07-30)
Configure the protocol, multicast uplink port, and program list of multicast VLAN 10.
Configure VLAN 10 to work in dynamic program generation mode and specify the IP
address range of orderable programs to 224.1.1.1-224.1.1.2, and configure the multicast
mode to IGMP proxy, protocol to IGMPV3 (default value), and multicast uplink port ID
to 0/3/1.
553
CAUTION
Changing the multicast program configuration mode by running the igmp match mode
command will cause the user to go offline. Therefore, plan the multicast program mode
before configuring the multicast program. This command can be run only when the IGMP
function is disabled. The default multicast mode is off.
huawei(config)#vlan 10 smart
huawei(config)#multicast-vlan 10
huawei(config-mvlan10)#igmp match mode disable
huawei(config-mvlan10)#igmp match group ip 224.1.1.1 to-ip 224.1.1.2
huawei(config-mvlan10)#igmp uplink-port 0/3/1
huawei(config-mvlan10)#igmp mode proxy
huawei(config-mvlan10)#quit
2.
Configure the protocol, multicast uplink port, and program list of multicast VLAN 20.
Configure VLAN 20 to work in dynamic program generation mode and specify the IP
address range of orderable programs to 224.1.1.3-224.1.1.4, and configure the multicast
mode to IGMP proxy, protocol to IGMPV3 (default value), and multicast uplink port ID
to 0/3/1.
huawei(config)#vlan 20 smart
huawei(config)#multicast-vlan 20
huawei(config-mvlan20)#igmp match mode disable
huawei(config-mvlan20)#igmp match group ip 224.1.1.3 to-ip 224.1.1.4
huawei(config-mvlan20)#igmp uplink-port 0/3/1
huawei(config-mvlan20)#igmp mode proxy
huawei(config-mvlan20)#quit
2.
0/3 1
0/3 1
vlan 10 vdsl mode atm 0/7/0 vpi 0 vci 35 rx-cttr 2
vlan 20 vdsl mode atm 0/8/0 vpi 0 vci 35 rx-cttr 2
3.
4.
Activate the user ports and bind them to a line configuration template and an alarm profile.
Bind VDSL port 0/7/0 and VDSL port 0/8/0 with default line configuration template 1 and
default alarm profile 1.
huawei(config)#interface vdsl 0/7
huawei(config-if-vdsl-0/7)#deactivate 0
huawei(config-if-vdsl-0/7)#activate 0 template-index 1
Issue 01 (2011-07-30)
554
huawei(config-if-vdsl-0/7)#alarm-config 0 1
huawei(config-if-vdsl-0/7)#quit
huawei(config)#interface vdsl 0/8
huawei(config-if-vdsl-0/8)#deactivate 0
huawei(config-if-vdsl-0/8)#activate 0 template-index 1
huawei(config-if-vdsl-0/8)#alarm-config 0 1
huawei(config-if-vdsl-0/8)#quit
----End
Result
The cases are as follows regardless of whether the data path type of the modem to which the
user is connected is ATM or PTM:
l
By VLAN 10, User1 can watch the programs provided by ISP1 at 224.1.1.1 and 224.1.1.2.
By VLAN 20, User2 can watch the programs provided by ISP2 at 224.1.1.3 and 224.1.1.4.
Configuration File
vlan 10 smart
multicast-vlan 10
igmp match mode disable
igmp match group ip 224.1.1.1 to-ip 224.1.1.2
igmp uplink-port 0/3/1
igmp mode proxy
quit
vlan 20 smart
multicast-vlan 20
igmp match mode disable
igmp match group ip 224.1.1.3 to-ip 224.1.1.4
igmp uplink-port 0/3/1
igmp mode proxy
quit
port vlan 10 0/7 1
port vlan 20 0/7 1
service-port vlan 10 vdsl mode atm 0/7/0 vpi 0 vci 35 rx-cttr 2 tx-cttr 2
service-port vlan 20 vdsl mode atm 0/8/0 vpi 0 vci 35 rx-cttr 2 tx-cttr 2
btv
igmp user add port 0/7/0 vdsl mode atm 0 35 no-auth log enable
igmp user add port 0/8/0 vdsl mode atm 0 35 no-auth log enable
multicast-vlan 10
igmp multicast-vlan member port 0/7/0 0 35
multicast-vlan 20
igmp multicast-vlan member port 0/8/0 0 35
quit
interface vdsl 0/7
deactivate 0
activate 0 template-index 1
alarm-config 0 1
quit
interface vdsl 0/8
deactivate 0
activate 0 template-index 1
alarm-config 0 1
quit
save
Issue 01 (2011-07-30)
555
Prerequisite
The user has applied for and installed the required multicast program license or user license.
Service Requirements
The carrier in a region expects to maximize bandwidth usage of a VDSL line, rent the bandwidth
to different Internet service providers (ISPs), enable different multicast users on the same VDSL
port to access different ISPs, and differentiate the ISPs by VLAN.
l
On VDSL2 port 0/7/0 of UA5000, User1 and User2 access multicast services in IPoE mode.
User1 can order the programs (provided by ISP1) at 224.1.1.1 and 224.1.1.2; User2 can
order the program (provided by ISP2) at 224.1.1.4.
The maximum bandwidth of multicast User1 is 10240 kbit/s, and the maximum bandwidth
of multicast User2 is 5120 kbit/s.
IPTV
Program:
224.1.1.1
224.1.1.2
VLAN 10
ISP 1
STB
IP Core
User2:
MVLAN 20
IPTV
HG
UA5000
Router
STB
VLAN 20
ISP 2
Program:
224.1.1.3
224.1.1.4
Multicast service
Procedure
Step 1 Configure multicast users.
Issue 01 (2011-07-30)
556
1.
2.
3.
4.
5.
Activate the user ports and bind them to a line configuration template and an alarm profile.
Bind VDSL port 0/7/0 to default line configuration template 1 and default alarm profile 1.
huawei(config)#interface vdsl 0/7
huawei(config-if-vdsl-0/7)#deactivate 0
huawei(config-if-vdsl-0/7)#activate 0 template-index 1
huawei(config-if-vdsl-0/7)#alarm-config 0 1
huawei(config-if-vdsl-0/7)#quit
----End
Result
l
By using multicast VLAN 10, User1 can watch the programs (provided by ISP1 specified
in rights profile music) at 224.1.1.1 and 224.1.1.2.
By using multicast VLAN 20, User2 can watch the program (provided by ISP2 specified
in rights profile movie) at 224.1.1.4.
Configuration File
#
[config]
vlan 10 smart
Issue 01 (2011-07-30)
557
multicast-vlan 10
igmp mode snooping
igmp uplink-port 0/3/1
igmp program add name program1 ip 224.1.1.1 sourceip 10.10.10.10 hostip 10.0.0.254
log enable
igmp program add name program2 ip 224.1.1.2 sourceip 10.10.10.10 hostip 10.0.0.254
log enable
quit
vlan 20 smart
multicast-vlan 20
igmp mode snooping
igmp uplink-port 0/3/1
igmp program add name program3 ip 224.1.1.3 sourceip 10.10.10.11 hostip 10.0.0.254
log enable
igmp program add name program4 ip 224.1.1.4 sourceip 10.10.10.11 hostip 10.0.0.254
log enable
btv
igmp profile add profile-name music
igmp profile profile-name music program-name program1 watch
igmp profile profile-name music program-name program2 watch
igmp profile add profile-name movie
igmp profile profile-name movie program-name program4 watch
quit
port vlan 10 0/3 1
port vlan 20 0/3 1
service-port vlan 10 vdsl mode atm 0/7/0 vpi 0 vci 35 multi-service
user-vlan 10 rx-cttr 2 tx-cttr 2
service-port vlan 20 vdsl mode atm 0/7/0 vpi 0 vci 35 multi-servi
ce user-vlan 20 rx-cttr 2 tx-cttr 2
btv
igmp user add port 0/7/0 vdsl mode atm 0 35 user-vlan 10 auth log
enable max-bandwidth 10240
igmp user add port 0/7/0 vdsl mode atm 0 35 user-vlan 20 auth log enable
max-bandwidth 5120
igmp user bind-profile port 0/7/0 0 35 user-vlan 10 profile-name music
igmp user bind-profile port 0/7/0 0 35 user-vlan 20 profile-name movie
multicast-vlan 10
igmp multicast-vlan member port 0/7/0 0 35 user-vlan 10
multicast-vlan 20
igmp multicast-vlan member port 0/7/0 0 35 user-vlan 20
quit
interface vdsl 0/7
deactivate 0
activate 0 template-index 1
alarm-config 0 1
quit
save
Prerequisite
The user has applied for and installed the required multicast program license or user license.
Issue 01 (2011-07-30)
558
Service Requirements
The carrier in a region expects to maximize bandwidth usage of a VDSL line, rent the bandwidth
to different Internet service providers (ISPs), enable different multicast users on the same VDSL
port to access different ISPs, and differentiate the ISPs by VLAN.
l
User1 and User2 on the same VDSL2 port of UA5000 access multicast services in IPoE
mode. User1 can order the programs provided by ISP1, and User2 can order the programs
provided by ISP2.
Figure 28-7 shows the example network for the multicast service.
Figure 28-7 Example network for the multicast service
User1:
MVLAN 10
Port:0/7/0 Port:0/3/1
IPTV
Program:
224.1.1.1
224.1.1.2
VLAN 10
ISP 1
STB
IP Core
User2:
MVLAN 20
IPTV
HG
UA5000
Router
STB
VLAN 20
ISP 2
Program:
224.1.1.3
224.1.1.4
Multicast service
Procedure
Step 1 Configure multicast users.
1.
2.
3.
Issue 01 (2011-07-30)
559
10
huawei(config-mvlan10)#multicast-vlan 20
huawei(config-mvlan20)#igmp multicast-vlan member port 0/7/0 0 35 user-vlan
20
huawei(config-mvlan20)#quit
4.
Activate the user ports and bind them to a line configuration template and an alarm profile.
To bind VDSL port 0/7/0 to default line configuration template 1 and default alarm profile
1, do as follows:
huawei(config)#interface vdsl 0/7
huawei(config-if-vdsl-0/7)#deactivate 0
huawei(config-if-vdsl-0/7)#activate 0 template-index 1
huawei(config-if-vdsl-0/7)#alarm-config 0 1
huawei(config-if-vdsl-0/7)#quit
----End
Result
The cases are as follows regardless of whether the data channel type of the modem to which the
user is connected is ATM or PTM:
l
By using multicast VLAN 10, User1 can watch the programs (provided by ISP1) at
224.1.1.1 and 224.1.1.2.
By using multicast VLAN 20, User2 can watch the programs (provided by ISP2) at
224.1.1.3 and 224.1.1.4.
Configuration File
vlan 10 smart
multicast-vlan 10
igmp match mode disable
igmp match group ip 224.1.1.1 to-ip 224.1.1.2
igmp uplink-port 0/3/1
igmp mode proxy
quit
vlan 20 smart
multicast-vlan 20
igmp match mode disable
igmp match group ip 224.1.1.3 to-ip 224.1.1.4
igmp uplink-port 0/3/1
igmp mode proxy
quit
port vlan 10 0/3 1
port vlan 20 0/3 1
service-port vlan 10 vdsl mode atm 0/7/0 vpi 0 vci 35 multi-service
user-vlan 10 rx-cttr 2 tx-cttr 2
service-port vlan 20 vdsl mode atm 0/7/0 vpi 0 vci 35 multi-servi
ce user-vlan 20 rx-cttr 2 tx-cttr 2
btv
igmp user add port 0/7/0 vdsl mode atm 0 35 user-vlan 10 auth log
enable max-bandwidth 10240
igmp user add port 0/7/0 vdsl mode atm 0 35 user-vlan 20 auth log enable
max-bandwidth 5120
multicast-vlan 10
igmp multicast-vlan member port 0/7/0 0 35 user-vlan 10
multicast-vlan 20
igmp multicast-vlan member port 0/7/0 0 35 user-vlan 20
quit
Issue 01 (2011-07-30)
560
Issue 01 (2011-07-30)
561
29
Issue 01 (2011-07-30)
562
Service Description
With the rapid development of the broadband services, a lot of users demand a high bandwidth
for different services such as the video service and voice service.
For details of the triple play service, see "Triple Play" in the UA5000 Universal Access Unit
Feature Description.
Service Specifications
The UA5000 supports the triple play service.
In the triple play application, the VoIP, IPTV, and Internet services are transmitted over one
cable to the UA5000 through a home gateway (HG) in a centralized manner.
l
The VoIP and IPTV services use the DHCP mode. The DHCP option60 domain is used to
identify different terminals. The UA5000 can identify different DHCP option60 domains,
and transmit packets of different terminals to different DHCP servers. In this manner, the
terminals can obtain IP addresses from the corresponding DHCP servers.
The Internet service uses the Point-to-Point over Ethernet (PPPoE) for access.
Table 29-1 shows the modes supported by the UA5000 to provide the triple play service.
Table 29-1 Modes to provide the triple play service
Mode
Description
Issue 01 (2011-07-30)
563
NOTE
In the configuration example of the triple play service, the IPTV service is configured in non-mvlan mode.
For the details about how to configure services in mvlan mode, see 28 Configuring the Multicast Service
in MVLAN Mode, and the detailed configuration process will not be described in this section any more.
Prerequisite
Before configuring the triple play service, ensure that the following conditions are met:
l
Networking
Figure 29-1 shows an example network for configuring the triple play service.
l
In this figure, user 1 (home gateway 1) and user 2 (home gateway 2) use the triple play
networking.
The service streams of the Internet, VoIP, and IPTV services are carried in the same PVC.
After different service streams access the UA5000, the UA5000 differentiates the services
according to the user-side VLAN IDs. In addition, the UA5000 provides different QoS for
different service streams according to the traffic priorities in the PVC.
The Internet service uses the PPPoE mode. The VoIP and IPTV services use the DHCP
mode and obtain IP addresses from the DHCP server in DHCP standard mode.
Issue 01 (2011-07-30)
564
Figure 29-1 Example network for configuring the triple play service
OSS & RADIUS Server/
RADIUS Proxy
Multicast Sever
NMS
TG
Router
BRAS
LAN Switch
0/8/0
I
C C
S S
R R
B B
0/2/0
0/7/0
UA5000
Home Gateway1
DHCP
IP Phone
PPPoE
PC
Home Gateway 2
DHCP
DHCP
STB
TV
IP Phone
PPPoE
PC
DHCP
STB
TV
Data Plan
Table 29-2 provides the data plan for configuring the triple play service.
Table 29-2 Data plan for configuring the triple play service by the single PVC for multiple
services (based on user-side VLANs)
Item
Data
CSRB
Issue 01 (2011-07-30)
565
Item
Data
Internet service
l Downstream: 2 Mbit/s
l Upstream: 1 Mbit/s
l Priority: 0
VoIP service
l Downstream: 128 kbit/s
l Upstream: 128 kbit/s
l Priority: 5
IPTV service
l Downstream: 4 Mbit/s
l Upstream: 96 kbit/s
l Priority: 4
Uplink port
0/3/0
Upstream VLAN
User-side VLAN
DHCP
Program library
Rights profile
IGMP user
Issue 01 (2011-07-30)
566
Context
l
The DHCP option60 domains of the STB and the IP phone vary according to the terminal
type. In practice, see the operation instruction of the STB and the IP phone.
Before configuring the triple play service, ensure that the service boards are added correctly.
Configuration Flowchart
NOTE
The following configuration uses the single PVC solution and differentiates services according to user-side
VLANs.
Figure 29-2 shows the flowchart for configuring the triple play service.
Figure 29-2 Flowchart for configuring the triple play service
Start
Internet
IPTV
VoIP
End
Procedure
l
2.
Issue 01 (2011-07-30)
567
In general, the VoIP service has the highest scheduling priority, and the Internet
service has the lowest scheduling priority. In this example, set the scheduling priority
of the Internet service to 0.
huawei(config)#traffic table index 110 ip car 1024 priority 0 prioritypolicy tag-In-Package
huawei(config)#traffic table index 10 ip car 2048 priority 0 prioritypolicy tag-In-Package
3.
You can create the service port based on the user-side service encapsulation mode (the value is ipoe
or pppoe) or based on the user priority of the service port (the range is 1-7). In this example, the
service port is created based on the user-side VLAN ID.
4.
2.
3.
4.
5.
2.
Issue 01 (2011-07-30)
568
3.
4.
5.
CAUTION
On the UA5000, if the PVC is configured with a priority, the priority of the multicast
packets carried by the PVC does not take effect.
6.
----End
Result
After the configuration of the upstream and downstream devices, the triple play service (Internet,
VoIP and IPTV services) is available.
l
The Internet user should be able to access the Internet in PPPoE dialup mode.
The VoIP user should be able to make and receive phone calls.
IPTV users: User 1 should be able to watch all the programs, and user 2 should be able to
watch only program BTV-1.
569
Prerequisite
Before configuring the triple play service, ensure the following:
l
All the boards of the device must work in the normal state.
Networking
Figure 29-3 shows an example network for configuring the triple play service - multiple PVCs
for multiple services.
Figure 29-3 Example network for configuring the triple play service - multiple PVCs for
multiple services
OSS & RADIUS Server/
RADIUS Proxy
Multicast Sever
NMS
TG
Router
BRAS
LAN Switch
0/8/0
I
C C
S S
R R
B B
0/2/0
0/7/0
UA5000
Home Gateway1
DHCP
IP Phone
Issue 01 (2011-07-30)
PPPoE
PC
Home Gateway 2
DHCP
DHCP
STB
TV
IP Phone
PPPoE
PC
DHCP
STB
TV
570
In this figure, user 1 (home gateway 1) and user 2 (home gateway 2) use the triple play
networking.
Data Plan
Table 29-3 provides the data plan for configuring the triple play service - multiple PVCs for
multiple services.
Table 29-3 Data plan for configuring the triple play service - multiple PVCs for multiple services
Item
Data
CSRB board
User ports: 0/7/0 and 0/8/0. The ports use the default line profile.
Internet: VPI/VCI 0/37
VoIP: VPI/VCI 0/36
IPTV: VPI/VCI 0/35
Traffic
profile
parameters
Internet service
l Downstream: 2 Mbit/s
l Upstream: 1 Mbit/s
l Priority: 0
VoIP service
l Downstream: 128 kbit/s
l Upstream: 128 kbit/s
l Priority: 5
IPTV service
l Downstream: 4 Mbit/s
l Upstream: 96 kbit/s
l Priority: 4
Uplink port
0/3/0
VLAN
DHCP
Program
library
Issue 01 (2011-07-30)
571
Item
Data
Program BTV-2, with the program address of 224.1.1.2, multicast source IP
address of 10.10.10.10. It is bound with uplink port 0/3/0 and VLAN 4.
Rights
profile
IGMP user
Priority
802.1p priority:
l VoIP: 6
l IPTV: 5
l Internet: 1
Context
l
The DHCP option60 domains of the STB and the IP phone vary according to the terminal
type. In practice, see the operation instruction of the STB and the IP phone.
Run the dhcp domain command to configure the DHCP domain name. The configured
domain name is a sub-string without a space that maps to the option60 domain of the
terminal.
Configuration Flowchart
Figure 29-4 shows the flowchart for configuring the triple play service - multiple PVCs for
multiple services.
Issue 01 (2011-07-30)
572
Figure 29-4 Flowchart for configuring the triple play service-multiple PVCs for multiple
services
Start
Internet
Select service
type
IPTV
VoIP
Configure the VLAN and
its uplink port
End
Procedure
l
2.
3.
Issue 01 (2011-07-30)
573
4.
2.
3.
4.
5.
2.
3.
Issue 01 (2011-07-30)
574
4.
5.
6.
----End
Result
After the configuration for related upstream and downstream devices is complete, the triple play
service is available.
l
Internet users should be able to access the Internet through PPPoE dialup.
IPTV users: The user connected to port 0/7/0 should be able to watch all the programs, and
the user connected to 0/8/0 should be able to watch only BTV-1.
575
home gateway is connected to multiple terminals to implement the access of multiple services,
such as Internet service, VoIP service, and IPTV service.
Prerequisite
Before configuring the triple play service, ensure that the following conditions are met:
l
Networking
Figure 29-5 shows an example network for configuring the triple play service.
l
User 1 and user 2 adopt the triple play networking through a same port.
The service streams of the Internet, VoIP, and IPTV services are carried in the same PVC.
After different service streams access the UA5000, the UA5000 differentiates the services
according to the user-side VLAN IDs. In addition, the UA5000 provides different QoS for
different service streams according to the traffic priorities in the PVC.
The Internet service uses the PPPoE mode. The VoIP and IPTV services use the DHCP
mode and obtain IP addresses from the DHCP server in DHCP standard mode.
Issue 01 (2011-07-30)
576
Figure 29-5 Example network for configuring the triple play service
Data Plan
Table 29-4 provides the data plan for configuring the triple play service.
Table 29-4 Data plan for configuring the triple play service by the single PVC for multiple
services (based on user-side VLANs)
Item
Data
VDM
Issue 01 (2011-07-30)
577
Item
Data
Traffic profile
parameters
Internet service
l Downstream: 2 Mbit/s
l Upstream: 1 Mbit/s
l Priority: 0
VoIP service
l Downstream: 128 kbit/s
l Upstream: 128 kbit/s
l Priority: 5
IPTV service
l Downstream: 4 Mbit/s
l Upstream: 96 kbit/s
l Priority: 4
Uplink port
0/3/0
Upstream VLAN
User-side VLAN
User 1
l Internet service: Smart VLAN 20
l VoIP service: Smart VLAN 30
l IPTV service: Smart VLAN 40
User 2
l Internet service: Smart VLAN 200
l VoIP service: Smart VLAN 300
l IPTV service: Smart VLAN 400
VoIP: The VoIP service obtains IP addresses in standard DHCP mode.
The IP address of the gateway is 10.1.1.1.
DHCP
ISP1
l Program BTV-1: The program address is 224.1.1.1; the multicast
source IP address is 10.10.10.10.
l Program BTV-2: The program address is 224.1.1.2; the multicast
source IP address is 10.10.10.10.
Issue 01 (2011-07-30)
578
Item
Data
ISP2
l Program BTV-3: The program address is 224.1.10.1; the multicast
source IP address is 10.10.10.11.
l Program BTV-4: The program address is 224.1.10.2; the multicast
source IP address is 10.10.10.10.
Right profile
IGMP user
Context
l
The DHCP option60 domains of the STB and the IP phone vary according to the terminal
type. In practice, see the operation instruction of the STB and the IP phone.
Before configuring the triple play service, ensure that the service boards are added correctly.
Configuration Flowchart
NOTE
The following configuration uses the single PVC solution and differentiates services according to userside VLANs.
Figure 29-6 shows the flowchart for configuring the triple play service.
Issue 01 (2011-07-30)
579
Procedure
l
2.
3.
Issue 01 (2011-07-30)
580
You can create the service port based on the user-side service encapsulation mode (the value is ipoe
or pppoe) or based on the user priority of the service port (the range is 1-7). In this example, the
service port is created based on the user-side VLAN ID.
4.
2.
3.
4.
5.
2.
3.
4.
Issue 01 (2011-07-30)
581
5.
CAUTION
On the UA5000, if the PVC is configured with a priority, the priority of the multicast
packets carried by the PVC does not take effect.
6.
----End
Result
After the configuration of the upstream and downstream devices, the triple play service (Internet,
VoIP, and IPTV services) is available.
l
The Internet user can access the Internet through PPPoE dialup.
IPTV users: User 1 can watch only program BTV-1, and user 2 can watch all the programs.
582
Prerequisite
Before configuring the triple play service, ensure the following items:
l
All the boards of the device must work in the normal state.
Networking
Figure 29-7 shows an example network for configuring the triple play service - multiple PVCs
for multiple services.
Figure 29-7 Example network for configuring the triple play service - multiple PVCs for
multiple services
In this figure, user 1 and user 2 use the triple play networking.
Issue 01 (2011-07-30)
583
Data Plan
Table 29-5 provides the data plan for configuring the triple play service - multiple PVCs for
multiple services.
Table 29-5 Data plan for configuring the triple play service - multiple PVCs for multiple services
Item
Data
VDM
Traffic
profile
parameters
Internet service
l Downstream: 2 Mbit/s
l Upstream: 1 Mbit/s
l Priority: 0
VoIP service
l Downstream: 128 kbit/s
l Upstream: 128 kbit/s
l Priority: 5
IPTV service
l Downstream: 4 Mbit/s
l Upstream: 96 kbit/s
l Priority: 4
Uplink port
0/3/0
VLAN
DHCP
Program
library
ISP1
l The multicast address of program BTV-1 is 224.1.1.1, and the program
source IP address is 10.10.10.10.
l The multicast address of program BTV-2 is 224.1.1.2, and the program
source IP address is 10.10.10.10.
Issue 01 (2011-07-30)
584
Item
Data
ISP2
l The multicast address of program BTV-3 is 224.1.10.1, and the program
source IP address is 10.10.10.11.
l The multicast address of program BTV-4 is 224.1.10.2, and the program
source IP address is 10.10.10.11.
Right profile
IGMP user
Priority
802.1p priority:
l VoIP: 6
l IPTV: 5
l Internet: 1
Context
l
The DHCP option60 domains of the STB and the IP phone vary according to the terminal
type. In practice, see the operation instruction of the STB and the IP phone.
Run the dhcp domain command to configure the DHCP domain name. The configured
domain name is a sub-string without a space that maps to the option60 domain of the
terminal.
Configuration Flowchart
Figure 29-8 shows the flowchart for configuring the triple play service - multiple PVCs for
multiple services.
Issue 01 (2011-07-30)
585
Figure 29-8 Flowchart for configuring the triple play service-multiple PVCs for multiple
services
Procedure
l
2.
3.
Issue 01 (2011-07-30)
586
4.
2.
3.
4.
5.
2.
3.
4.
Issue 01 (2011-07-30)
587
The DHCP relay data of the video service is configured and the DHCP option60
domain is configured to video.
huawei(config)#dhcp mode layer-3 option-60
huawei(config)#dhcp-server 2 ip 20.2.2.2 20.2.2.3
huawei(config)#dhcp domain video //Refer to the actual DHCP option 60
threshold.
huawei(config-dhcp-domain-video)#dhcp-server 2
huawei(config-dhcp-domain-video)#quit
huawei(config)#interface vlanif 4
huawei(config-if-vlanif4)#ip address 10.2.2.1 24
huawei(config-if-vlanif4)#dhcp domain video gateway 10.2.2.1
5.
6.
----End
Result
After the configuration of the upstream and downstream devices, the triple play service (Internet,
VoIP, and IPTV services) is available.
l
The Internet user can access the Internet through PPPoE dialup.
IPTV users: User 1 can watch only program BTV-1, and user 2 can watch all the programs.
Issue 01 (2011-07-30)
588
30
This topic describes how to configure the local area network (LAN) service that is accessed
through a port on the Ethernet service board. The UA5000 accesses the LAN service by using
an Ethernet board, and then transmits the LAN service upstream to the IP network by using the
IPMB board, implementing the private line interconnection service between the local and remote
LANs.
Prerequisite
l
Context
The UA5000 supports the LAN access service by using the ports on the EAUA and GAUA
boards. The EAUA and GAUA boards provide the following types of ports:
l
The procedures for accessing the LAN service by using the EAUA and GAUA boards are the
same. The following uses the EAUA board as an example.
Networking
Figure 30-1 shows the example network of the LAN service over an EAUA board.
Issue 01 (2011-07-30)
589
Figure 30-1 Example network of the LAN service over an EAUA board
Subsidiary
0/3/0
VLAN ID:1000
UA5000
I
P
M
B
E
A
U
0/7/0
VLAN ID:100
Headquaters
VLAN ID:100
Data Plan
Table 30-1 provides the data plan for accessing the LAN service by using the EAUA board.
Table 30-1 Data plan for accessing the LAN service by using the EAUA board
Configuration
Item
Data
Remarks
UA5000
l Board: EAUA
Issue 01 (2011-07-30)
590
Configuration
Item
Data
Remarks
l Board: IPMB
Configuration Flowchart
Figure 30-2 shows the flowchart for accessing the LAN service by using the EAUA board.
Figure 30-2 Flowchart for accessing the LAN service by using the EAUA board
Start
End
Procedure
Step 1 Configure the EAU port and the VLAN.
1.
Issue 01 (2011-07-30)
591
NOTE
If the UA5000 accesses the LAN service by using the GAUA board, the GAUA port cannot be set
to work in auto-negotiation mode because the GE port supports only the rate of 1000 Mbit/s. In this
case, run the duplex command to configure the duplex mode of an Ethernet port according to its
type.
2.
The uplink port on the IPMB board uses the default settings.
2.
----End
Result
After the configuration, the local and remote LAN users can communicate with each other
through a private line.
Configuration Script
interface eau 0/7
auto-neg 0 enable
quit
vlan 100 smart
vlan 1000 smart
port vlan 1000 0/3 0
traffic table ip car 100 priority 5 priority-policy pvc-Setting
service-port vlan 1000 lan 0/7/0 vlan 100 rx-cttr 7 tx-cttr 7
save
Issue 01 (2011-07-30)
592
31
This topic describes how to configure the Ethernet OAM on the UA5000.
Prerequisite
l
Service Requirements
The two devices on the two ends send detection packets periodically to each other to check the
link connectivity.
Networking
Figure 31-1 shows an example network for configuring Ethernet OAM.
In this example network, the Ethernet OAM mechanism is adopted for the link between
UA5000_A and UA5000_B for detecting link faults. The local MEP and remote MEP are
configured on both UA5000_A and UA5000_B. The ID of the local MEP on UA5000_B is the
same as the ID of the remote MEP on UA5000_A, and the ID of the remote MEP on
UA5000_B is the same as the ID of the local MEP on UA5000_A.
Figure 31-1 Example network for configuring Ethernet OAM
Router
0 / 3 / 0
0 / 3 / 1
UA5000_B
UA5000_A
Issue 01 (2011-07-30)
593
Data Plan
Table 31-1 provides the data plan for configuring Ethernet OAM.
Table 31-1 Data plan for configuring Ethernet OAM
Item
Data
UA5000_A
UA5000_B
Procedure
l
Configure UA5000_A.
1.
Create a VLAN.
The VLAN ID is 100, and the VLAN is a smart VLAN.
huawei(config)#vlan 100 smart
2.
3.
4.
Enable the global local CFM function. The default value is disable, that is, the function
is disabled.
huawei(config)#cfm enable
Issue 01 (2011-07-30)
594
5.
Configure an MD.
The index and level of an MD must be unique.
The name format and name of an MD must be unique.
The total length of the names of an MD and its MAs cannot be longer than 44
characters.
huawei(config)#cfm md 0 name-format string huawei level 3 mhf-creation
default-mhf
6.
Configure an MA.
The system supports up to 256 MAs and each MD can be configured with up to
256 MAs. That is, if an MD is configured with 256 MAs, the other MDs in the
system cannot be configured with any MA. An MA of a non-existing MD cannot
be created. An existing MA cannot be created again.
The total length of the names of an MD and its MAs cannot be longer than 44
characters.
huawei(config)#cfm ma 0/0 name-format string huawei-6
7.
8.
Configure the MEP list contained by the MA, including the local MEP and remote
MEP.
Configure the MEP list contained by the MA with index 0/0.
huawei(config)#cfm ma 0/0 meplist 260
huawei(config)#cfm ma 0/0 meplist 2260
9.
Configure an MEP.
MEP refers to the maintenance association end points. Ethernet OAM is used to
test the link connectivity by using the MEPs at the two ends of a maintenance
channel.
By default, the MEP management function is enabled, the priority of sending CFM
packets is 7, and the function of sending CC packets is enabled.
huawei(config)#cfm mep 0/0/260 direction down port 0/3/0 priority 7
11. (Optional) Set the interval for the MA to transmit CCMs. By default, the interval is 1
minute.
huawei(config)#cfm ma 0/0 cc-interval 10m
12. (Optional) Configure the creation rule of the default global MHF. Set the creation
mode to explicit-mhf and creation level to 1.
huawei(config)#cfm default-md mhf-creation explicit-mhf level 1
l
Issue 01 (2011-07-30)
Configure UA5000_B.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
595
1.
Create a VLAN.
The VLAN ID is 100, and the VLAN is a smart VLAN.
huawei(config)#vlan 100 smart
2.
3.
4.
Enable the global local CFM function. The default value is disable, that is, the function
is disabled.
huawei(config)#cfm enable
5.
Configure an MD.
The index and level of an MD must be unique.
The name format and name of an MD must be unique.
The total length of the names of an MD and its MAs cannot be longer than 44
characters.
huawei(config)#cfm md 0 name-format string huawei level 3 mhf-creation
default-mhf
6.
Configure an MA.
The system supports up to 256 MAs and each MD can be configured with up to
256 MAs. That is, if an MD is configured with 256 MAs, the other MDs in the
system cannot be configured with any MA. An MA of a non-existing MD cannot
be created. An existing MA cannot be created again.
The total length of the names of an MD and its MAs cannot be longer than 44
characters.
huawei(config)#cfm ma 0/0 name-format string huawei-6
7.
8.
Configure the MEP list contained by the MA, including the local MEP and remote
MEP.
Configure the MEP list contained by the MA with index 0/0.
huawei(config)#cfm ma 0/0 meplist 2260
huawei(config)#cfm ma 0/0 meplist 260
Issue 01 (2011-07-30)
596
9.
Configure an MEP.
MEP refers to the maintenance association end points. Ethernet OAM is used to
test the link connectivity by using the MEPs at the two ends of a maintenance
channel.
By default, the MEP management function is enabled, the priority of sending CFM
packets is 7, and the function of sending CC packets is enabled.
huawei(config)#cfm mep 0/0/2260 direction down port 0/3/1 priority 7
11. (Optional) Set the interval for the MA to transmit CCMs. By default, the interval is 1
minute.
huawei(config)#cfm ma 0/0 cc-interval 10m
12. (Optional) Configure the creation rule of the default global MHF. Set the creation
mode to explicit-mhf and creation level to 1.
huawei(config)#cfm default-md mhf-creation explicit-mhf level 1
----End
Result
After the configuration, run the display cfm statistics mep command on UA5000_A or
UA5000_B and you can find packet statistics. Of the statistics, "CCM Sent Pkt Num" value is
not zero.
NOTE
l When the line is found to be faulty, run the cfm loopback mep 0/0/260 mepid 2260 command to
perform the loopback.
l When the path needs to be found and the fault needs to be located and isolated, run the cfm link-trace
mep 0/0/260 mepid 2260 command to trace the signaling.
Configuration File
UA5000_A Configurations:
vlan 100 smart
port vlan 100 0/3 0
interface 0/3 ipm
native-vlan 0 vlan 100
quit
cfm enable
cfm md 0 name-format string huawei level 3 mhf-creation default-mhf
cfm ma 0/0 name-format string huawei-6
cfm ma 0/0 vlan 100 mhf-creation explicit-mhf
cfm ma 0/0 meplist 260
cfm ma 0/0 meplist 2260
cfm mep 0/0/260 direction down port 0/3/0 priority 7
cfm remote-mep-detect enable
cfm ma 0/0 cc-interval 10m
cfm default-md mhf-creation explicit-mhf level 1
save
UA5000_B Configurations:
vlan 100 smart
port vlan 100 0/3 1
Issue 01 (2011-07-30)
597
Issue 01 (2011-07-30)
598
32
Issue 01 (2011-07-30)
599
Service Description
Bidirectional forwarding detection (BFD) is used to check the channel state between two devices.
If the active channel is detected to be faulty, services are rapidly switched to the standby channel.
In this case, the services and inband maintenance channel are more reliable.
On the UA5000, BFD is used to bind the active routing channel with the standby routing channel.
In this case, the active/standby protection mechanism of the route is set up.
Service Specifications
l
When a route is bound with the BFD, the BFD state and the route priority are necessary
for routing. When the route is not bound with the BFD, the routing is executed based on
the route priority.
Prevent the route from switching to the route that has a higher priority and is not bound
with the BFD. If another route bound with the BFD reaches the same destination when you
unbind the BFD from the route, lower the priority of the route that is not bound with the
BFD, and cancel the binding to prevent incorrect route switchover.
NOTE
l Deleting either a VLAN interface or the BFD unbinds the route from the BFD.
l When you delete a VLAN interface, if the egress interface of the route is on the VLAN interface, the
route changes into a non-active route. After the interface is added, the route may change into an active
route.
Prerequisite
The peer supports the BFD function.
Networking
Figure 32-1 shows an example network for the BFD route application.
Issue 01 (2011-07-30)
600
Router A
Router B
UA5000
I
P
M
B
Data Plan
Table 32-1 provides the data plan for configuring the BFD route.
Table 32-1 Data plan for configuring the BFD route
Item
Data
Remarks
Uplink port
Active route
Route priority: 30
Route priority: 50
Standby route
NOTE
l The active router corresponds to router A, and the standby router responds to router B.
l The default parameters are used for the BFD session.
Issue 01 (2011-07-30)
601
Procedure
Step 1 Enable the BFD globally.
huawei(config)#bfd
Step 4 Configure the IP address of the layer 3 interface of the VLAN and enable the BFD of the interface.
huawei(config)#interface vlanif 100
huawei(config-if-vlanif100)#ip address 10.10.10.2 24
huawei(config-if-vlanif100)#bfd
huawei(config-if-vlanif100)#quit
huawei(config)#interface vlanif 200
huawei(config-if-vlanif200)#ip address 20.10.10.2 24
huawei(config-if-vlanif200)#bfd
2.
2.
Issue 01 (2011-07-30)
602
Down
------------------------------------------------------------------------------Total UP/DOWN Session Number : 0/2
3.
Query the binding between the static route of the uplink port of the IPMB board and the
BFD session.
huawei(config)#display current-configuration section postsystem
[UA5000IPMBV100R017:
11102]
#
[postsystem]
<postsystem>
ip route-static 0.0.0.0 0.0.0.0 10.10.10.1 preference 30 track bfdsession
bfd001
ip route-static 0.0.0.0 0.0.0.0 20.10.10.1 preference 50 track bfdsession
bfd002
ip route-static 10.70.35.0 255.255.255.0
10.144.78.1
ip route-static 10.71.47.0 255.255.255.0
10.144.78.1
ip route-static 10.144.78.0 255.255.255.0
10.20.2.1
#
return
----End
Verification
When the BFD detects that the link of the active route fails, the services are automatically
switched to the link of the standby route.
Context
The BFD can be enabled for an interface or for the system globally:
l
Enabling the BFD function in global config mode: You can perform other configurations
for the BFD function only after the BFD function is enabled globally. If you disable the
BFD function, all the BFD configurations are deleted.
Procedure
Step 1 In global config mode, run the bfd command to enable the BFD function globally.
Step 2 In interface mode, run the bfd command to enable the BFD function of the interface.
----End
Issue 01 (2011-07-30)
603
Example
To enable the BFD function globally and enable it on VLAN interface 2, do as follows:
huawei(config)#bfd
huawei(config)#interface vlanif 2
huawei(config-if-vlanif2)#bfd
Related Operation
Table 32-2 lists the related operation for enabling the BFD function.
Table 32-2 Related operation for enabling the BFD function
To...
Remarks
undo bfd
Prerequisite
l
Context
The three BFD session parameters are as follows:
l
Interval of sending and receiving the packets. It ranges from 250 ms to 300000 ms. By
default, it is 1000 ms, that is 1s.
Procedure
Step 1 Run the bfd bind peer-ip command to create a BFD session.
Step 2 Run the display bfd configuration command to query the configured BFD session.
----End
Example
To create a BFD session with the peer IP address as 10.10.10.1 and the local interface as the
layer 3 interface of VLAN 100, do as follows:
Issue 01 (2011-07-30)
604
Related Operation
Table 32-3 list the related operation for creating a BFD session.
Table 32-3 Related operation for creating a BFD session
To...
min-tx-interval
min-rx-interval
detect-multiplier
Prerequisite
The BFD must be enabled globally and the BFD session must already be created.
Context
The three BFD session parameters are as follows:
l
Interval of sending and receiving the packets. It ranges from 250 ms to 300000 ms. By
default, it is 1000 ms, that is 1s.
l After you run the commit command, the configured parameters can take effect.
l After you modify the parameters, you need to run the commit command so that the parameters take effect.
Procedure
Step 1 Run the min-tx-interval command to set the interval of sending the packets.
Step 2 Run the min-rx-interval command to set the interval of receiving the packets.
Step 3 Run the detect-multiplier command to set the detection multiple of the BFD session.
Step 4 Run the commit command to enable the BFD session.
----End
Issue 01 (2011-07-30)
605
Example
To set the interval of sending the packets as 30s and validate it, do as follows:
huawei(config)#bfd 1000
huawei(config-bfd-session-1000)#min-tx-interval 30000
huawei(config-bfd-session-1000)#commit
Related Operation
Table 32-4 lists the related operation for configuring the BFD session parameters.
Table 32-4 Related operation for configuring the BFD session parameters
Issue 01 (2011-07-30)
To...
606
33
Issue 01 (2011-07-30)
607
Service Description
The line optimization refers to the improvement of the quality and performance of the line by
adjusting the parameters of the line. The line optimization is a solution to dynamically optimize
the line.
The line optimization optimizes the line by taking the service profile of the selected line as the
target. In this way, the quality of the line can meet the quality of experience (QoE) of the line
required by the service profile to the maximum extent.
The line optimization takes the service profile set by the user as the target, and provides an
optimization profile after the optimization. The user can deliver the optimization profile to the
device automatically or manually. In this way, the entire transmission power can be reduced to
the maximum extent based on the requirement of the service profile to ensure the services of the
VIP users.
For details of the line optimization, see "Line Optimization" of the UA5000 Feature
Description.
Service Specifications
l
The line optimization supports enabling the collection of the DLM/DSM optimization
information about the specified board and querying the collection status of the DLM/DSM
optimization information about the specified board or all the boards.
Issue 01 (2011-07-30)
608
The line optimization supports the binding of the optimization profile to the port or the
unbinding of the optimization profile from the port, and the query of the optimization profile
bound to the port. The priority of the optimization profile is higher than the priority of the
extended line profile and the line profile.
Prerequisite
The network devices and lines must be in the normal state.
Context
l
Currently, the system supports the optimization function of only the ADSL line.
The service of the line optimization is provided only after the license is obtained. The
resources that require the license authorization are as follows:
ADSL port resources
AnnexM resources
AnnexL resources
INP+ resources
Resources bound by the optimization profile
Networking
Figure 33-1 shows the example network for configuring the line optimization.
Figure 33-1 Example network for configuring the line optimization
NOTE
The networking mode of the line optimization is similar to the networking mode of the NMS. The
UA5000 can communicate with the N2510 in the outband or inband mode. This topic considers the
networking in the outband mode as an example to describe the communication between the UA5000 and
the N2510.
Issue 01 (2011-07-30)
609
N2510
Router
0/3
COM
ETH
IPM
UA5000
Data Plan
Table 33-1 provides the data plan for configuring the line optimization.
Table 33-1 Data plan for configuring the line optimization
Item
Data
IP address: 10.10.20.1/24
N2510
IP address: 10.10.21.1/24
IP address: 10.10.20.254/24
Configuration Flowchart
Figure 33-2 shows the flowchart for configuring the line optimization.
Issue 01 (2011-07-30)
610
Configure the
line optimization
End
Procedure
Step 1 Configure the IP address of the maintenance network port.
huawei(config)#interface meth 0
huawei(config-if-meth0)#ip address 10.10.20.1 255.255.255.0
Issue 01 (2011-07-30)
611
The configured version must be consistent with the SNMP version set by the N2510. Assume that the
SNMP version used by the N2510 is SNMP V1.
huawei(config)#snmp-agent sys-info version v1
Step 5 Configure the IP address of the target host contained in trap messages.
huawei(config)#snmp-agent target-host trap-hostname huawei address 10.10.21.1 trapparamsname huawei
huawei(config)#snmp-agent target-host trap-paramsname huawei v1 securityname
public
Step 6 Specify the IP address of the maintenance network port as the source address for sending the
trap messages.
huawei(config)#snmp-agent trap source meth 0
After the N2510 delivers the operation to collect the parameters, the UA5000 collects the parameters of
the port to be optimized. According to the collected parameters, the N2510 provides the optimization
profile. You can deliver the optimization profile to the UA5000 automatically or manually. In this way,
the line optimization is implemented.
----End
Result
Run the display line operation command to query the status of the ADSL port and the line and
the related parameters. Compared with the data before the line optimization, the maximum
upstream/downstream rate of the line is increased. Therefore, the quality of the line is improved.
Issue 01 (2011-07-30)
612
34
613
This topic describes how to configure the report of the FAN running alarms to the EMU.
34.10 Setting the FAN Speed Adjustment Mode
This topic describes how to set the fan speed adjustment mode. If the fan is not in automatic
adjustment mode, the air flow increases to a great extent in the case of low or normal temperature.
34.11 Configuring the FAN Speed
This topic describes how to configure the FAN speed.
34.12 Configuring a POWER4845 EMU
This topic describes how to configure a POWER4845 EMU.
Issue 01 (2011-07-30)
614
Service Description
The device provides an environment monitoring serial port to connect the serial port on a
monitored device. By running the master-slave node protocol or the access network protocol
between the two serial ports, you can monitor the environment of the device from a remote end.
The environment parameters such as temperature, humidity, and power supply can be monitored
to ensure that the UA5000 can work properly in a suitable environment.
To perform environment monitoring on a device, the environment monitoring functional
modules, such as H303ESC or H304ESC must be provided. Certain devices to be monitored
have a built-in monitoring unit, such as POWER4845. These functional modules are referred to
as environment monitor unit (EMU), regardless of whether they are built in or not.
Service Specifications
The environment monitor module of the UA5000 comprises multiple EMUs, including:
l
FAN EMU (FAN): It monitors the running of the fans, and adjusts the running speed of
the fans.
NOTE
The configuration of the fan tray varies with the type of the shelf. The details are as follows:
l
The HABA shelf does not support the configuration of the fan tray. The fan monitoring port is unavailable,
and the fan can be controlled through only the dual in-line package (DIP) switch.
The HABD shelf supports the configuration of the fan tray through software.
The fan tray can be added to the H612HABD, H602HABD, H612HABL, or H601HABM shelf and can
run in the normal state.
The fan tray can be added to the H601HABD or H601HABA shelf but cannot run in the normal state.
Prerequisite
l
The ESC board must communicate with the host successfully through the RS232 serial port
cable.
The DIP switch settings of the H303ESC/H304ESC are not related to the settings of the
slave node of the EMU. The baud rate is set to 9600 bit/s.
Issue 01 (2011-07-30)
615
Data Plan
Table 34-1 provides the data plan for configuring the H303ESC/H304ESC.
Table 34-1 Data plan for configuring the H303ESC/H304ESC
Item
Data
Remarks
EMU
Type: H303ESC/H304ESC
Number: 0
Slave node: 30
Analogue ID: 0
Digital ID: 1
Analogue parameters
Digital parameters
Configuration Flowchart
Figure 34-1 shows the flowchart for configuring the H303ESC/H304ESC.
Issue 01 (2011-07-30)
616
Create an EMU
End
Procedure
Step 1 Create an EMU.
Add the EMU and set its type to h303esc.
huawei(config)#emu add 0 h303ESC 0 30 RS232
Issue 01 (2011-07-30)
617
8 Normal
-128.00
127
-128
---------------------------Digital environment info--------------------------ID Name
State Value |ID Name
State Value
0 Wiring
Normal 1
|1 Door0
Normal 1
2 Normal 1
|3 Normal 1
4 Normal 1
|5 Normal 1
6 Normal 1
|7 Normal 1
8 Normal 1
|9 Water_Alarm
Normal 1
10 Arrester 0
Normal 0
|11 Arrester 1
Normal 0
12 Arrester 2
Normal 0
|13 Arrester 3
Normal 0
14 SW_A1
Normal 0
|15 SW_A2
Normal 0
16 SW_B1
Normal 0
|17 SW_B2
Normal 0
18 SW_C1
Normal 0
|19 SW_C2
Normal 0
20 SW_D1
Normal 0
|21 SW_D2
Normal 0
22 Outer Sensor Power Normal 0
----------------------------------------------------------------------------
----End
Result
After the configuration, the h303esc should be able to work in the normal state.
Prerequisite
The DIP switch setting of FAN is consistent with the settings of the slave node of EMU. The
baud rate is set as 19200 bit/s.
Data Plan
Table 34-2 provides the data plan for configuring the FAN.
Table 34-2 Data plan for configuring the FAN
Item
Data
Remarks
EMU
Type: FAN
Serial number: 1
Subnode: 6
Name: test
FAN
Issue 01 (2011-07-30)
618
Item
Data
Remarks
Configuration Flowchart
Figure 34-2 shows the flowchart for configuring the FAN.
Figure 34-2 shows the flowchart for configuring the FAN.
Start
Automatic
Manual
Set the fan speed
End
Procedure
Step 1 Add an EMU.
huawei(config)#emu add 1 fan 0 6 RS485 test
alarmset
alarmset
alarmset
alarmset
block permit
read-tem-fault permit
tem-high permit
fault permit
Issue 01 (2011-07-30)
619
----End
Result
After the configuration, the fan should be able to work in the normal state.
Prerequisite
The ESC board and the host must be connected with an environment monitoring cable.
The DIP switches on the POWER4845 are set to 00000.
Data Plan
Table 34-3 provides the data plan for configuring the POWER4845.
Table 34-3 Data plan for configuring the POWER4845
Item
Data
Remarks
EMU
Type: POWER4845
Number: 1
Shelf number: 0
Subnode: 15
Name: test
Parameter
configuration
620
Item
Data
Remarks
Configuration Flowchart
Figure 34-3 shows the flowchart for configuring the POWER4845.
Figure 34-3 Flowchart for configuring the POWER4845
Start
Create an EMU
End
Procedure
Step 1 Create an EMU.
huawei(config)#emu add 1 POWER4845 0 15 RS232 test
Issue 01 (2011-07-30)
621
1
Humidity
80
10
100
0
%R.H.
Current
---------------------------------------------------------------------------DigitalID Name
Available Level|DigitalID Name
Available Level
0
1
|
1
1
2
1
|
3
1
4
1
|
5
1
6
1
----------------------------------------------------------------------------
----End
Result
After the configuration, the POWER4845 should be able to work in the normal state.
Prerequisite
The settings of the H303ESC DIP switch must be consistent with the slave node of the EMU.
Data Plan
Table 34-4 provides the data plan for configuring the universal power monitoring.
Table 34-4 Data plan for configuring the universal power monitoring
Item
Data
Remarks
EMU
Type: H303ESC
Number: 0
Slave node: 30
Universal power
Context
The UA5000 mainly uses the following types of the universal power:
Issue 01 (2011-07-30)
622
Zhujiang power
Emerson power
Eltek power
Delta-cimic power
Zhongheng power
Configuration Flowchart
Figure 34-4 shows the flowchart for configuring the universal power monitoring.
Figure 34-4 Flowchart for configuring the universal power monitoring
Start
Add an EMU
End
Procedure
Step 1 Add an EMU.
Add the EMU with ID 0, the type H303ESC, the slave node 30, and the serial port type RS232.
huawei(config)#emu add 0 H303ESC 0 30 rs232 H303ESC
Issue 01 (2011-07-30)
623
----End
Result
After the configuration, the H303ESC should be able to work in the normal state and monitor
the universal power used by the UA5000. When the monitored parameter exceeds the normal
range, the host reports an alarm.
Context
The types of EMUs include H303ESC/H304ESC, POWER4845, and fan.
l
The slave node of H303ESC/H304ESC cannot be the same as the slave node of the fan.
Procedure
Step 1 Run the emu add command to add an EMU.
Step 2 Run the display emu command to query the EMU status.
----End
Example
To add an H303ESC, do as follows:
huawei(config)#emu add 0 H303ESC 0 30 rs232 mdpower
huawei(config)#dispaly emu 0
EMU ID: 0
-------------------------------------------------------------------EMU name
: mdpower
EMU type
: H303ESC
Used or not : Used
EMU state
: Normal
Frame ID
: 0
Subnode
: 30
COM Port
: rs232
Issue 01 (2011-07-30)
624
NOTE
Related Operation
Table 34-5 lists the related operation for adding an EMU.
Table 34-5 Related operation for adding an EMU
To...
Remarks
Delete an EMU
emu del
Prerequisite
The H303ESC,H304ESC EMU is in the position and works in the normal state.
Procedure
Step 1 Run the interface emu command to enter the H303ESC,H304ESC mode.
Step 2 Run the esc analog command to configure the H303ESC,H304ESC analogue parameters.
Step 3 Run the display esc system parameter command to query the ESC system analogue parameters.
----End
Example
To set the upper and lower temperature thresholds as 55C and 5C, do as follows:
Enter the H303ESC,H304ESC mode.
huawei(config)#interface emu 0
Issue 01 (2011-07-30)
625
Related Operation
Table 34-6 shows the related operation for configuring H303ESC,H304ESC analogue
parameters.
Table 34-6 Related operation for configuring H303ESC,H304ESC analogue parameters
Issue 01 (2011-07-30)
To...
Remarks
H303ESC,H304ESC
environment monitoring
mode
H303ESC,H304ESC
environment monitoring
mode
display outside-analog
private-alarm
H303ESC,H304ESC
environment monitoring
mode
Query H303ESC,H304ESC
version number
display version
H303ESC,H304ESC
environment monitoring
mode
626
Prerequisite
The H303ESC or the H304ESC EMU is in the position and works in the normal state.
Procedure
Step 1 Run the interface emu command to enter the H303ESC or the H304ESC mode.
Step 2 Run the esc digital command to configure the H303ESC or the H304ESC digital parameters.
Step 3 Run the display esc system parameter command to query the ESC system digital parameters.
----End
Example
To set the alarm of the door status sensor to high level, do as follows:
Enter the EMU mode.
huawei(config)#interface emu 0
Issue 01 (2011-07-30)
627
22
Outer Sensor Power
0
--------------------------------------------------------------------------------
Related Operation
Table 34-7 lists the related operations for configuring H303ESC or the H304ESC digital
parameters.
Table 34-7 Related operations for configuring H303ESC or the H304ESC digital parameters
To...
Remarks
H303ESC or H304ESC
environment monitoring
mode
H303ESC or H304ESC
environment monitoring
mode
display outside-digital
private-alarm
H303ESC or H304ESC
environment monitoring
mode
display version
H303ESC or H304ESC
environment monitoring
mode
Prerequisite
The FAN EMU must exist and must work in the normal state.
Procedure
Step 1 Run the interface emu command to enter the FAN mode.
Step 2 Run the fan alarmset command to configure the FAN alarm report.
Step 3 Run the display fan system parameter command to query the information about the FAN alarm.
----End
Example
To disable the report of the FAN block alarm, do as follows:
huawei(config)#interface emu 1
huawei(config-if-fan-1)#fan alarmset block forbid
huawei(config-if-fan-1)#display fan system parameter
EMU ID: 0
Issue 01 (2011-07-30)
628
Related Operation
Table 34-8 lists the related operations for configuring the FAN alarm report.
Table 34-8 Related operations for configuring the FAN alarm report
To...
Remarks
FAN environment
monitoring mode
FAN environment
monitoring mode
Prerequisite
The FAN EMU must exist and must work in the normal state.
Context
The two fan speed adjustment modes are as follows:
l
Automatic
Manual
By default, the mode is automatic with the fan speed level of 5. It is recommended that you
change the mode to automatic.
If the mode is not set to automatic, the air flow increases to a great extent in the case of low or
normal temperature.
Procedure
Step 1 Run the interface emu command to enter the FAN mode.
Step 2 Run the fan speed command to set the fan speed adjustment mode.
Issue 01 (2011-07-30)
629
Step 3 Run the display fan system parameter command to query the parameter setting.
----End
Example
To set the fan speed adjustment mode as automatic, do as follows:
huawei(config)#interface emu 0
huawei(config-if-fan-0)#fan speed mode automatic
huawei(config-if-fan-0)#display fan system parameter
EMU ID: 0
FAN configration parameter:
-------------------------------------------------------FAN timing mode: Auto timing
FAN speed level: 4
-------------------------------------------------------Alarm_name
Permit/Forbid
Read temperature fault
Permit
Fan block
Forbid
Temperature high
Permit
Power fault
Permit
--------------------------------------------------------
Related Operation
Table 34-9 lists the related operations for setting the fan speed adjustment mode.
Table 34-9 Related operations for setting the fan speed adjustment mode
To...
Remarks
fan alarmset
Prerequisite
The FAN EMU must exist and must work in the normal state.
Context
FAN speed level ranges from 0 to 5. Level 0 refers to the lowest fan speed level and level 5
refers to the highest fan speed level.
Issue 01 (2011-07-30)
630
The nominated fan speed is enough for heat dissipation when the system works in the
permitted highest temperature.
Running at a low speed can reduce the wearout of a fan and prolong its life.
When abnormality occurs or one of the fans fails, other fans can run at high speed to
compensate the air flow.
Reduction of the fan speed relieves the dust absorption and prevents the air filter from a
block.
You can set the fan speed in the manual fan speed adaptation mode.
Procedure
Step 1 Run the interface emu command to enter the FAN mode.
Step 2 Run the fan speed command to configure the FAN speed.
Step 3 Run the display fan system parameter command to query the setting of the FAN speed.
----End
Example
To set the FAN speed as 3, do as follows:
huawei(config)#interface emu 0
huawei(config-if-fan-0)#fan speed adjust 3
huawei(config-if-fan-0)#display fan system parameter
EMU ID: 0
FAN configration parameter:
-------------------------------------------------------FAN timing mode: Manual timing
FAN speed level: 3
-------------------------------------------------------Alarm_name
Permit/Forbid
Read temperature fault
Permit
Fan block
Forbid
Temperature high
Permit
Power fault
Permit
-------------------------------------------------------
Related Operation
Table 34-10 lists the related operations for setting the FAN speed.
Table 34-10 Related operations for setting the FAN speed
Issue 01 (2011-07-30)
To...
fan alarmset
631
Context
Table 34-11 lists the commands for configuring a POWER4845 EMU.
Table 34-11 Commands for configuring a POWER4845 EMU
Issue 01 (2011-07-30)
Function
Remarks
power environment
power module-num
power module-parameter
632
Function
Remarks
power off
Issue 01 (2011-07-30)
power supply-parameter
power outside_digital
power charge
633
Function
Remarks
power battery-test
power temperature-off
DC over-voltage > battery even charging voltage > battery float charging voltage > DC
under-voltage > load power-off voltage > battery power-off voltage
Procedure
Step 1 Run the commands listed in Table 34-11 to configure a POWER4845 EMU.
----End
Example
To run the power battery parameter command to set the battery charging current-limit
coefficient as 0.2, the equalized-charging time as 60d, the number of the battery group as 1, and
the battery capacity as 130 AH, do as follows:
huawei(config-if-power4845-3)#power battery parameter 0.2 60 1 130
Related Operation
Table 34-12 lists the related operations for configuring a POWER4845 EMU.
Issue 01 (2011-07-30)
634
Issue 01 (2011-07-30)
Function
635
35
Issue 01 (2011-07-30)
636
35.1 Networking
This topic describes a typical integrated networking of the UA5000.
This topic describes the integrated networking of the AMSAN and the CMSAN. After reading
the configuration flow of the main services supported by the UA5000, you will have an overall
understanding about the integrated networking.
l
CMSAN: The IPMB board provides the data service and the PVMB board provides the
voice service. The packets of the voice service, and the management packets of the data
and voice services are directly transmitted upstream through the FMSAN. The bidirectional
forwarding detection (BFD) is used to improve the reliability of the services and the inband
channel.
AMSAN: The packets of the data service transmitted upstream by the CMSAN are
converged on the AMSAN. The BFD is also used to improve the reliability of the
management packets on the AMSAN.
NOTE
The BFD is a mechanism that quickly detects the status of the link between two devices. The BFD ensures
that the services are quickly switched to the standby channel when the active channel is found faulty. In
this manner, the BFD can improve the reliability of the services and the inband maintenance channel.
Issue 01 (2011-07-30)
637
Multicast server
DHCP server
iMangager N2000
Router C
Router A
(Active)
Router B
(Standby)
FMSAN
I
P
M
B
P
W
X
B
P
W
X
B
I
P
M
B
I
P
M
B
P
V
M
B
P
V
M
B
Modem
PC
Issue 01 (2011-07-30)
C
S
R
B
C
S
R
B
D
S
L
D
I
P
M
B
E
D
T
B
CMSAN
ISDN
phone
ISDN
phone
G
A
U
A
G
A
U
A
AMSAN
Phone
Phone
Phone
638
35.2 Prerequisites
This topic describes the prerequisites for the integrated data and voice networking of the
UA5000.
l
The hardware commissioning must be complete, and the system must be available for
service configuration.
The upper layer devices, including the BRAS, DHCP sever, multicast sever, MGC, and
BMS workstation must work in the normal state.
Data
Remarks
Uplink port
Inband BMS
VPI: 8; VCI: 35
VLAN ID: 32-63; type: Mux
Traffic profile: Upstream bandwidth 512
kbit/s, downstream bandwidth 1 Mbit/s
Issue 01 (2011-07-30)
639
Item
Data
Remarks
VPI: 8; VCI: 35
VLAN ID: 64-79; type: Mux
Traffic profile: 1 Mbit/s
Uplink port: 0/2/0
Multicast service
Procedure
Step 1 Query the host software version.
huawei(config)#display language
Issue 01 (2011-07-30)
640
NOTE
If the version does not match the planned version, see the version upgrade guide to update the host software
to the planned host software version.
Step 5 Add a standard VLAN, and assign FE ports 6 and 7 and IP uplink port 0 to the VLAN.
huawei(config)#vlan
huawei(config)#port
huawei(config)#port
huawei(config)#port
1001
vlan
vlan
vlan
standard
1001 0/2 0
1001 0/2 6
1001 0/2 7
Issue 01 (2011-07-30)
641
huawei(config)#service-port vlan
huawei(config)#service-port vlan
huawei(config)#service-port vlan
huawei(config)#service-port vlan
huawei(config)#service-port vlan
huawei(config)#service-port vlan
huawei(config)#service-port vlan
huawei(config)#service-port vlan
huawei(config)#service-port vlan
huawei(config)#service-port vlan
huawei(config)#service-port vlan
huawei(config)#service-port vlan
huawei(config)#adsl line-profile
52 adsl
53 adsl
54 adsl
55 adsl
56 adsl
57 adsl
58 adsl
59 adsl
60 adsl
61 adsl
62 adsl
63 adsl
add 3
0/7/20
0/7/21
0/7/22
0/7/23
0/7/24
0/7/25
0/7/26
0/7/27
0/7/28
0/7/29
0/7/30
0/7/31
vpi
vpi
vpi
vpi
vpi
vpi
vpi
vpi
vpi
vpi
vpi
vpi
8
8
8
8
8
8
8
8
8
8
8
8
vci
vci
vci
vci
vci
vci
vci
vci
vci
vci
vci
vci
35
35
35
35
35
35
35
35
35
35
35
35
rx-cttr
rx-cttr
rx-cttr
rx-cttr
rx-cttr
rx-cttr
rx-cttr
rx-cttr
rx-cttr
rx-cttr
rx-cttr
rx-cttr
7
7
7
7
7
7
7
7
7
7
7
7
tx-cttr
tx-cttr
tx-cttr
tx-cttr
tx-cttr
tx-cttr
tx-cttr
tx-cttr
tx-cttr
tx-cttr
tx-cttr
tx-cttr
7
7
7
7
7
7
7
7
7
7
7
7
Command:
adsl line-profile add
3
Start adding
profile
Press 'Q' to quit the current configuration and new configuration will be
neglected
> Do you want to name the profile (y/n)
[n]:
> Please choose default value type 0-adsl 1-adsl2+ (0~1)
[0]:
> Will you set basic configuration for modem? (y/n)[n]:
> Please select channel mode 0-interleaved 1-fast (0~1) [0]:
> Will you set interleaved delay? (y/n)
[n]:
> Please select form of transmit rate adaptation in downstream:
> 0-fixed 1-adaptAtStartup 2-adaptAtRuntime (0~2) [1]:1
> Will you set SNR margin for modem? (y/n)[n]:y
> Target SNR margin in downstream(0~15 dB) [6]:
> Minimum SNR margin in downstream (0~6 dB) [0]:
> Maximum SNR margin in downstream (6~31 dB) [31]:
> Target SNR margin in upstream (0~15 dB) [6]:
> Minimum SNR margin in upstream (0~6 dB)
[0]:
> Maximum SNR margin in upstream (6~31 dB) [31]:
> Will you set parameters for rate? (y/n)[n]:y
> Minimum transmit rate in downstream (32~8160 Kbps) [32]:
> Maximum transmit rate in downstream (32~8160 Kbps) [6144]:1024
> Minimum transmit rate in upstream (32~896 Kbps)
[32]:
> Maximum transmit rate in upstream (32~896 Kbps) [640]:512
Add profile 3 successfully
huawei(config)#interface adsl 0/7
huawei(config-if-adsl-0/7)#alarm-config all 1
huawei(config-if-adsl-0/7)#deactivate all
huawei(config-if-adsl-0/7)#activate all profile-index 3
Issue 01 (2011-07-30)
642
Issue 01 (2011-07-30)
643
35.5 Verification
This topic describes how to verify the integrated data and voice networking of the UA5000
Context
All the services configured on each UA5000 should be provisioned successfully.
Issue 01 (2011-07-30)
644
A FAQ
FAQ
A.1 How to prevent the system breakdown or the service interruption of the UA5000 caused by
the network attacks through the proper configuration?
A.2 How Many PVCs are Supported by Each xDSL Port?
A.3 Does the PVC Have Priority?
A.4 How to Configure the Static User?
A.5 How to Configure the BMS VLAN?
A.6 How to Change the BMS VLAN?
A.7 How to Change the Service VLAN to Which the xDSL Port Belongs?
A.8 How to Delete the VLAN to Which the Uplink Port Is Bound?
A.9 How to Transparently Transmit the VLAN on the IPM Board?
A.10 Why Is the Actual Rate of the User Lower Than the Rate of the Bound Line Profile?
A.11 How to Query MAC Addresses of Online Users and Query the Ports that Provide the Access
for the Users According to the MAC Addresses?
A.12 How to Delete the Service Board?
Issue 01 (2011-07-30)
645
A FAQ
The ring network detection function and the anti-MAC address-spoofing function are
disabled. When the anti-MAC address-spoofing function is disabled, the illegal user sends
the PPPoE and DHCP control packets by forging the MAC address of a legal user. In this
case, the security of the system is affected.
Run the ring check command to enable the ring network detection function on the user
side. For details, see "17.6 Enabling the Ring Network Detection on the User Side."
Run the security anti-macspoofing enable command to enable the anti-MAC addressspoofing function. For details, see "16.7 Enabling the Anti MAC Spoofing Function."
Manage the device by using the IP addresses of the public network, and the access
authorities are not limited strictly when the ACL rule is configured. In this case, the network
is attacked.
To ensure the security of the device, manage the device by using the IP addresses of the
private network. When configuring the ACL rule, you must comply with the principle of
the minimum authorization to configure the accessible address segment. The accessible
address segment can contain only the mandatory IP addresses of the management network
segment. Other IP addresses cannot access the device management interface. For details,
see "17.9 Configuring an Accessible Address Segment."
The packets that access the device management interface are not controlled so that the
device is attacked by the packets. In this case, the system is caused to be busy and the
services are affected.
Run the firewall packet-filter command to apply the packet filtering rules of the firewall
to the interface to filter the packets that access the interface. In this case, the packet attack
is prevented. For details, see "17.8 Configuring the Firewall Function."
646
A FAQ
A: "Static" and "dynamic" refer to the modes in which the user obtains the IP address. In the
static mode, the IP address of the user is manually added on PC. Therefore, the static user is also
called the user with the fixed IP address. The user should be specified as the static user on the
BRAS. In the dynamic mode, the IP address is allocated by the BRAS and automatically obtained
on PC.
The static user is a type of user on the BRAS. The data of the static user is configured on the
BRAS. The procedure for adding a static user on the UA5000 is the same as the procedure for
adding a dynamic user on the UA5000. You need only to create a VLAN, and add the uplink
port and service port to the VLAN.
Run the vlan command to add the standard VLAN as the BMS VLAN.
2.
Run the port vlan command to add the uplink port to this VLAN.
3.
Run the interface vlanif command to create the VLAN interface in the global config mode
and enter the corresponding VLANIF mode. Run the ip address command to configure
the IP address of the layer 3 interface for the BMS VLAN.
NOTE
For information about the configuration, see "Configuring the IP Address of the Inband BMS." On the
devices of early versions, the "BMS VLAN" is called "management VLAN". The name is unified as "BMS
VLAN" on the UA5000. The configuration of the "BMS VLAN" is different from the configuration of the
previous "management VLAN".
CAUTION
Changing the BMS VLAN interrupts the BMS service temporarily until the configuration of the
new BMS service is complete.
647
A FAQ
Run the undo service-port command to delete the service virtual port (PVC).
2.
For information about the restriction on deleting the service virtual port, see the usage guidelines in the
undo service-port command.
Run the undo port vlan command to delete the uplink port of the VLAN.
2.
A.10 Why Is the Actual Rate of the User Lower Than the Rate
of the Bound Line Profile?
A: The UA5000 can limit the user rate through the line profile or through the traffic table. When
the user rate is limited through both the line profile and the traffic table, the actual rate of the
user is the lower rate limited by the two items. Therefore, when the actual rate of the user is
lower than the rate of the bound line profile, check the rate of the traffic table to which the
corresponding service virtual port (PVC) of the user is bound. Then, change the traffic table or
the rate of the traffic table to which the service virtual port is bound according to the requirement.
648
A FAQ
A: Delete the PVC (namely, the created service virtual port) allocated for the board, and then
delete the board. In the case of the board that is prohibited on site, it is recommended that you
delete the board after unprohibiting the board.
Issue 01 (2011-07-30)
649
A
AAA
ABR
ACL
ARP
AS
Autonomous System
ASBR
B
BDR
BMS
HUAWEI
iManager
N2000
Broadband
Integrated Network Management System
BPDU
BTV
Broadcast TV
C
CAR
CC
Connection Confirm
CFM
CIDR
CLI
CRC
D
DHCP
Issue 01 (2011-07-30)
650
DHCP option82
DoD
Downstream on Demand
DoS
Denial of Service
DR
Designated Router
DSLAM
DU
Downstream Unsolicited
E
EMU
F
FE
Fast Ethernet
FEC
FTP
FIFO
G
GE
Gigabit Ethernet
GEM
I
ICMP
Protocol
IGMP
IGP
IP
Internet Protocol
IPoA
IPoE
IP over Ethernet
ISP
Label
Issue 01 (2011-07-30)
LAN
LDP
LSA
LSDB
LSP
651
M
MA
Maintenance Association
MAC
MBS
MD
Maintenance Domain
MDU
Multi-dwelling unit
MEP
MIB
MIP
MTU
N
NBMA
NHLFE
NIC
NMS
O
OSPF
P
PITP
PON
PPPoA
PPPoE
PQ
Priority Queuing
PPP
Peer-Peer Protocol
PSN
Q
QoS
Quality of Service
Issue 01 (2011-07-30)
RADIUS
RARP
652
RFC
RIP
RMON
RRPP
S
SNMP
SSH
Secure Shell
STB
STP
T
TCP/IP
TFTP
TOS
Type of Service
TTL
Time To Live
U
UDP
V
VLAN
Virtual LAN
VOD
Video On Demand
VT
Virtual Terminal
VTP
VTY
W
WRR
Issue 01 (2011-07-30)
653